Date
June 26, 2025, 11:12 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 20.702039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 20.433846] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 20.404849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 20.414103] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 94.189183] Internal error: Oops: 0000000096000005 [#1] SMP [ 94.191098] Modules linked in: [ 94.191770] CPU: 0 UID: 0 PID: 534 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 94.192658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 94.193187] Hardware name: linux,dummy-virt (DT) [ 94.193706] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.194089] pc : kunit_test_null_dereference+0x70/0x170 [ 94.194887] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.195489] sp : ffff800081ff7d30 [ 94.195848] x29: ffff800081ff7d90 x28: 0000000000000000 x27: 0000000000000000 [ 94.196295] x26: 1ffe0000187dafa1 x25: 0000000000000000 x24: 0000000000000004 [ 94.196644] x23: fff00000c3ed7d0c x22: ffffab8499a01da0 x21: fff00000c1af5108 [ 94.197310] x20: 1ffff000103fefa6 x19: ffff800080087990 x18: 000000008bf881bc [ 94.198180] x17: 0000000047640c11 x16: fff00000c096dc3c x15: 00000000ec314575 [ 94.199038] x14: 00000000f1f1f1f1 x13: 1ffe00001b48f5e0 x12: fffd8000195243a4 [ 94.199971] x11: 1ffe0000195243a3 x10: fffd8000195243a3 x9 : ffffab84999f9208 [ 94.200923] x8 : ffff800081ff7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 94.201783] x5 : ffff7000103fefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 94.202625] x2 : dfff800000000000 x1 : fff00000ca921440 x0 : ffff800080087990 [ 94.203522] Call trace: [ 94.203998] kunit_test_null_dereference+0x70/0x170 (P) [ 94.204643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.204922] kthread+0x328/0x630 [ 94.205499] ret_from_fork+0x10/0x20 [ 94.206269] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 94.207177] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 50.904907] ================================================================== [ 50.904981] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 50.904981] [ 50.905066] Use-after-free read at 0x00000000bf568248 (in kfence-#148): [ 50.905117] test_krealloc+0x51c/0x830 [ 50.905162] kunit_try_run_case+0x170/0x3f0 [ 50.905208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.905255] kthread+0x328/0x630 [ 50.905298] ret_from_fork+0x10/0x20 [ 50.905339] [ 50.905363] kfence-#148: 0x00000000bf568248-0x0000000061505d48, size=32, cache=kmalloc-32 [ 50.905363] [ 50.905417] allocated by task 339 on cpu 1 at 50.904287s (0.001126s ago): [ 50.905487] test_alloc+0x29c/0x628 [ 50.905526] test_krealloc+0xc0/0x830 [ 50.905565] kunit_try_run_case+0x170/0x3f0 [ 50.905607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.905652] kthread+0x328/0x630 [ 50.905691] ret_from_fork+0x10/0x20 [ 50.905731] [ 50.905755] freed by task 339 on cpu 1 at 50.904500s (0.001251s ago): [ 50.905814] krealloc_noprof+0x148/0x360 [ 50.905864] test_krealloc+0x1dc/0x830 [ 50.905902] kunit_try_run_case+0x170/0x3f0 [ 50.905943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.905988] kthread+0x328/0x630 [ 50.906028] ret_from_fork+0x10/0x20 [ 50.906066] [ 50.906110] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 50.906192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.906225] Hardware name: linux,dummy-virt (DT) [ 50.906260] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 50.832301] ================================================================== [ 50.832402] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 50.832402] [ 50.832501] Use-after-free read at 0x00000000fdb9a994 (in kfence-#147): [ 50.832556] test_memcache_typesafe_by_rcu+0x280/0x560 [ 50.832605] kunit_try_run_case+0x170/0x3f0 [ 50.832652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.832698] kthread+0x328/0x630 [ 50.832742] ret_from_fork+0x10/0x20 [ 50.832783] [ 50.832806] kfence-#147: 0x00000000fdb9a994-0x000000008678f50d, size=32, cache=test [ 50.832806] [ 50.832878] allocated by task 337 on cpu 0 at 50.812260s (0.020615s ago): [ 50.832951] test_alloc+0x230/0x628 [ 50.832989] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 50.833030] kunit_try_run_case+0x170/0x3f0 [ 50.833071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.833115] kthread+0x328/0x630 [ 50.833152] ret_from_fork+0x10/0x20 [ 50.833193] [ 50.833215] freed by task 337 on cpu 0 at 50.812364s (0.020848s ago): [ 50.833271] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 50.833313] kunit_try_run_case+0x170/0x3f0 [ 50.833352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.833398] kthread+0x328/0x630 [ 50.833436] ret_from_fork+0x10/0x20 [ 50.833474] [ 50.833521] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 50.833600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.833631] Hardware name: linux,dummy-virt (DT) [ 50.833669] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 28.148233] ================================================================== [ 28.148387] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 28.148387] [ 28.148492] Invalid read at 0x0000000098fe52e4: [ 28.148558] test_invalid_access+0xdc/0x1f0 [ 28.148614] kunit_try_run_case+0x170/0x3f0 [ 28.148668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.148719] kthread+0x328/0x630 [ 28.148768] ret_from_fork+0x10/0x20 [ 28.148820] [ 28.148920] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 28.149019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.149055] Hardware name: linux,dummy-virt (DT) [ 28.149096] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 27.921398] ================================================================== [ 27.921491] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 27.921491] [ 27.921553] Corrupted memory at 0x00000000b5c89fe9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#143): [ 27.921880] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 27.921929] kunit_try_run_case+0x170/0x3f0 [ 27.921974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.922019] kthread+0x328/0x630 [ 27.922060] ret_from_fork+0x10/0x20 [ 27.922101] [ 27.922126] kfence-#143: 0x000000008e33ff6b-0x0000000039ecd8f1, size=73, cache=kmalloc-96 [ 27.922126] [ 27.922180] allocated by task 327 on cpu 0 at 27.921171s (0.001005s ago): [ 27.922244] test_alloc+0x29c/0x628 [ 27.922282] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 27.922324] kunit_try_run_case+0x170/0x3f0 [ 27.922365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.922410] kthread+0x328/0x630 [ 27.922449] ret_from_fork+0x10/0x20 [ 27.922489] [ 27.922511] freed by task 327 on cpu 0 at 27.921312s (0.001196s ago): [ 27.922571] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 27.922612] kunit_try_run_case+0x170/0x3f0 [ 27.922654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.922699] kthread+0x328/0x630 [ 27.922737] ret_from_fork+0x10/0x20 [ 27.922777] [ 27.922817] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 27.922908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.922937] Hardware name: linux,dummy-virt (DT) [ 27.922972] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 27.816629] ================================================================== [ 27.816732] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 27.816732] [ 27.816834] Out-of-bounds read at 0x0000000021ccf533 (105B right of kfence-#142): [ 27.816914] test_kmalloc_aligned_oob_read+0x238/0x468 [ 27.816965] kunit_try_run_case+0x170/0x3f0 [ 27.817011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.817058] kthread+0x328/0x630 [ 27.817101] ret_from_fork+0x10/0x20 [ 27.817142] [ 27.817168] kfence-#142: 0x000000001d093480-0x0000000072463100, size=73, cache=kmalloc-96 [ 27.817168] [ 27.817221] allocated by task 325 on cpu 0 at 27.816375s (0.000842s ago): [ 27.817294] test_alloc+0x29c/0x628 [ 27.817334] test_kmalloc_aligned_oob_read+0x100/0x468 [ 27.817377] kunit_try_run_case+0x170/0x3f0 [ 27.817419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.817465] kthread+0x328/0x630 [ 27.817504] ret_from_fork+0x10/0x20 [ 27.817544] [ 27.817592] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 27.817675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.817705] Hardware name: linux,dummy-virt (DT) [ 27.817743] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 23.552467] ================================================================== [ 23.552564] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 23.552564] [ 23.552626] Corrupted memory at 0x00000000016dc870 [ ! . . . . . . . . . . . . . . . ] (in kfence-#101): [ 23.552951] test_corruption+0x120/0x378 [ 23.552995] kunit_try_run_case+0x170/0x3f0 [ 23.553041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.553088] kthread+0x328/0x630 [ 23.553129] ret_from_fork+0x10/0x20 [ 23.553170] [ 23.553197] kfence-#101: 0x00000000ba1a80d7-0x000000005b6726e9, size=32, cache=test [ 23.553197] [ 23.553251] allocated by task 315 on cpu 0 at 23.552325s (0.000922s ago): [ 23.553314] test_alloc+0x230/0x628 [ 23.553354] test_corruption+0xdc/0x378 [ 23.553393] kunit_try_run_case+0x170/0x3f0 [ 23.553434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.553478] kthread+0x328/0x630 [ 23.553518] ret_from_fork+0x10/0x20 [ 23.553558] [ 23.553580] freed by task 315 on cpu 0 at 23.552383s (0.001194s ago): [ 23.553639] test_corruption+0x120/0x378 [ 23.553677] kunit_try_run_case+0x170/0x3f0 [ 23.553719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.553764] kthread+0x328/0x630 [ 23.553802] ret_from_fork+0x10/0x20 [ 23.553840] [ 23.553893] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 23.553972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.554003] Hardware name: linux,dummy-virt (DT) [ 23.554037] ================================================================== [ 23.136543] ================================================================== [ 23.136634] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 23.136634] [ 23.136696] Corrupted memory at 0x0000000072c7002a [ ! . . . . . . . . . . . . . . . ] (in kfence-#97): [ 23.137021] test_corruption+0x278/0x378 [ 23.137066] kunit_try_run_case+0x170/0x3f0 [ 23.137114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.137158] kthread+0x328/0x630 [ 23.137200] ret_from_fork+0x10/0x20 [ 23.137241] [ 23.137266] kfence-#97: 0x00000000a6ba8850-0x000000003485b675, size=32, cache=kmalloc-32 [ 23.137266] [ 23.137322] allocated by task 313 on cpu 0 at 23.136345s (0.000973s ago): [ 23.137385] test_alloc+0x29c/0x628 [ 23.137424] test_corruption+0xdc/0x378 [ 23.137463] kunit_try_run_case+0x170/0x3f0 [ 23.137504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.137549] kthread+0x328/0x630 [ 23.137589] ret_from_fork+0x10/0x20 [ 23.137626] [ 23.137650] freed by task 313 on cpu 0 at 23.136451s (0.001196s ago): [ 23.137709] test_corruption+0x278/0x378 [ 23.137748] kunit_try_run_case+0x170/0x3f0 [ 23.137790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.137835] kthread+0x328/0x630 [ 23.137885] ret_from_fork+0x10/0x20 [ 23.137925] [ 23.137972] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 23.138053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.138085] Hardware name: linux,dummy-virt (DT) [ 23.138121] ================================================================== [ 23.656520] ================================================================== [ 23.656611] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 23.656611] [ 23.656672] Corrupted memory at 0x00000000080e8bc7 [ ! ] (in kfence-#102): [ 23.656783] test_corruption+0x1d8/0x378 [ 23.656826] kunit_try_run_case+0x170/0x3f0 [ 23.656886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.656932] kthread+0x328/0x630 [ 23.656973] ret_from_fork+0x10/0x20 [ 23.657014] [ 23.657038] kfence-#102: 0x0000000036a90aca-0x00000000aadfa99b, size=32, cache=test [ 23.657038] [ 23.657091] allocated by task 315 on cpu 0 at 23.656360s (0.000728s ago): [ 23.657153] test_alloc+0x230/0x628 [ 23.657192] test_corruption+0x198/0x378 [ 23.657230] kunit_try_run_case+0x170/0x3f0 [ 23.657271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.657316] kthread+0x328/0x630 [ 23.657354] ret_from_fork+0x10/0x20 [ 23.657391] [ 23.657415] freed by task 315 on cpu 0 at 23.656421s (0.000990s ago): [ 23.657474] test_corruption+0x1d8/0x378 [ 23.657511] kunit_try_run_case+0x170/0x3f0 [ 23.657552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.657595] kthread+0x328/0x630 [ 23.657635] ret_from_fork+0x10/0x20 [ 23.657673] [ 23.657712] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 23.657789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.657820] Hardware name: linux,dummy-virt (DT) [ 23.657867] ================================================================== [ 23.240608] ================================================================== [ 23.240699] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 23.240699] [ 23.240757] Corrupted memory at 0x00000000665c4d2a [ ! ] (in kfence-#98): [ 23.240898] test_corruption+0x284/0x378 [ 23.240942] kunit_try_run_case+0x170/0x3f0 [ 23.240987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.241033] kthread+0x328/0x630 [ 23.241074] ret_from_fork+0x10/0x20 [ 23.241115] [ 23.241138] kfence-#98: 0x0000000062c33214-0x00000000c618ad1f, size=32, cache=kmalloc-32 [ 23.241138] [ 23.241193] allocated by task 313 on cpu 0 at 23.240341s (0.000847s ago): [ 23.241256] test_alloc+0x29c/0x628 [ 23.241296] test_corruption+0x198/0x378 [ 23.241333] kunit_try_run_case+0x170/0x3f0 [ 23.241376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.241420] kthread+0x328/0x630 [ 23.241458] ret_from_fork+0x10/0x20 [ 23.241498] [ 23.241520] freed by task 313 on cpu 0 at 23.240444s (0.001072s ago): [ 23.241578] test_corruption+0x284/0x378 [ 23.241615] kunit_try_run_case+0x170/0x3f0 [ 23.241656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.241701] kthread+0x328/0x630 [ 23.241738] ret_from_fork+0x10/0x20 [ 23.241777] [ 23.241817] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 23.241905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.241936] Hardware name: linux,dummy-virt (DT) [ 23.241972] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 23.032466] ================================================================== [ 23.032561] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 23.032561] [ 23.032617] Invalid free of 0x00000000ccc1d97f (in kfence-#96): [ 23.032669] test_invalid_addr_free+0xec/0x238 [ 23.032712] kunit_try_run_case+0x170/0x3f0 [ 23.032759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.032805] kthread+0x328/0x630 [ 23.032847] ret_from_fork+0x10/0x20 [ 23.032904] [ 23.032930] kfence-#96: 0x00000000bdc96dad-0x000000007180765e, size=32, cache=test [ 23.032930] [ 23.032982] allocated by task 311 on cpu 1 at 23.032348s (0.000630s ago): [ 23.033044] test_alloc+0x230/0x628 [ 23.033084] test_invalid_addr_free+0xd4/0x238 [ 23.033124] kunit_try_run_case+0x170/0x3f0 [ 23.033165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.033210] kthread+0x328/0x630 [ 23.033250] ret_from_fork+0x10/0x20 [ 23.033290] [ 23.033333] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 23.033415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.033446] Hardware name: linux,dummy-virt (DT) [ 23.033479] ================================================================== [ 22.928865] ================================================================== [ 22.929060] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 22.929060] [ 22.929120] Invalid free of 0x00000000dbc1e4e1 (in kfence-#95): [ 22.929206] test_invalid_addr_free+0x1ac/0x238 [ 22.929251] kunit_try_run_case+0x170/0x3f0 [ 22.929327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.929391] kthread+0x328/0x630 [ 22.929451] ret_from_fork+0x10/0x20 [ 22.929494] [ 22.929573] kfence-#95: 0x00000000720e4533-0x00000000cd701452, size=32, cache=kmalloc-32 [ 22.929573] [ 22.929683] allocated by task 309 on cpu 1 at 22.928684s (0.000979s ago): [ 22.929746] test_alloc+0x29c/0x628 [ 22.929839] test_invalid_addr_free+0xd4/0x238 [ 22.929892] kunit_try_run_case+0x170/0x3f0 [ 22.929933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.930004] kthread+0x328/0x630 [ 22.930050] ret_from_fork+0x10/0x20 [ 22.930210] [ 22.930258] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.930381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.930418] Hardware name: linux,dummy-virt (DT) [ 22.930453] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 22.825844] ================================================================== [ 22.825932] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 22.825932] [ 22.826013] Invalid free of 0x000000000e5b64f1 (in kfence-#94): [ 22.826077] test_double_free+0x100/0x238 [ 22.826121] kunit_try_run_case+0x170/0x3f0 [ 22.826165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.826210] kthread+0x328/0x630 [ 22.826252] ret_from_fork+0x10/0x20 [ 22.826327] [ 22.826355] kfence-#94: 0x000000000e5b64f1-0x0000000018ede51f, size=32, cache=test [ 22.826355] [ 22.826526] allocated by task 307 on cpu 1 at 22.825280s (0.001144s ago): [ 22.826610] test_alloc+0x230/0x628 [ 22.826660] test_double_free+0xd4/0x238 [ 22.826709] kunit_try_run_case+0x170/0x3f0 [ 22.826751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.826802] kthread+0x328/0x630 [ 22.826845] ret_from_fork+0x10/0x20 [ 22.826902] [ 22.826936] freed by task 307 on cpu 1 at 22.825556s (0.001375s ago): [ 22.826997] test_double_free+0xf0/0x238 [ 22.827072] kunit_try_run_case+0x170/0x3f0 [ 22.827129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.827192] kthread+0x328/0x630 [ 22.827234] ret_from_fork+0x10/0x20 [ 22.827479] [ 22.827555] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.827644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.827686] Hardware name: linux,dummy-virt (DT) [ 22.827720] ================================================================== [ 22.717481] ================================================================== [ 22.717615] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 22.717615] [ 22.717686] Invalid free of 0x00000000209532d7 (in kfence-#93): [ 22.717829] test_double_free+0x1bc/0x238 [ 22.717895] kunit_try_run_case+0x170/0x3f0 [ 22.718159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.718237] kthread+0x328/0x630 [ 22.718283] ret_from_fork+0x10/0x20 [ 22.718325] [ 22.718358] kfence-#93: 0x00000000209532d7-0x000000007d26f695, size=32, cache=kmalloc-32 [ 22.718358] [ 22.718424] allocated by task 305 on cpu 1 at 22.717015s (0.001396s ago): [ 22.718499] test_alloc+0x29c/0x628 [ 22.718601] test_double_free+0xd4/0x238 [ 22.718647] kunit_try_run_case+0x170/0x3f0 [ 22.718686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.718925] kthread+0x328/0x630 [ 22.719000] ret_from_fork+0x10/0x20 [ 22.719044] [ 22.719074] freed by task 305 on cpu 1 at 22.717157s (0.001914s ago): [ 22.719198] test_double_free+0x1ac/0x238 [ 22.719254] kunit_try_run_case+0x170/0x3f0 [ 22.719299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.719454] kthread+0x328/0x630 [ 22.719532] ret_from_fork+0x10/0x20 [ 22.719619] [ 22.719705] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.719838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.720111] Hardware name: linux,dummy-virt (DT) [ 22.720165] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 22.289710] ================================================================== [ 22.289784] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.289784] [ 22.289890] Use-after-free read at 0x000000009af35402 (in kfence-#89): [ 22.289941] test_use_after_free_read+0x114/0x248 [ 22.289987] kunit_try_run_case+0x170/0x3f0 [ 22.290034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.290077] kthread+0x328/0x630 [ 22.290119] ret_from_fork+0x10/0x20 [ 22.290158] [ 22.290183] kfence-#89: 0x000000009af35402-0x0000000006914d05, size=32, cache=kmalloc-32 [ 22.290183] [ 22.290234] allocated by task 297 on cpu 1 at 22.289269s (0.000961s ago): [ 22.290303] test_alloc+0x29c/0x628 [ 22.290340] test_use_after_free_read+0xd0/0x248 [ 22.290380] kunit_try_run_case+0x170/0x3f0 [ 22.290506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.290609] kthread+0x328/0x630 [ 22.290697] ret_from_fork+0x10/0x20 [ 22.290737] [ 22.290759] freed by task 297 on cpu 1 at 22.289479s (0.001276s ago): [ 22.290818] test_use_after_free_read+0x1c0/0x248 [ 22.290866] kunit_try_run_case+0x170/0x3f0 [ 22.290907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.290953] kthread+0x328/0x630 [ 22.290994] ret_from_fork+0x10/0x20 [ 22.291035] [ 22.291168] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.291679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.291719] Hardware name: linux,dummy-virt (DT) [ 22.291767] ================================================================== [ 22.396830] ================================================================== [ 22.397042] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.397042] [ 22.397335] Use-after-free read at 0x00000000f66eab1f (in kfence-#90): [ 22.397487] test_use_after_free_read+0x114/0x248 [ 22.397569] kunit_try_run_case+0x170/0x3f0 [ 22.397616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.397662] kthread+0x328/0x630 [ 22.397703] ret_from_fork+0x10/0x20 [ 22.397750] [ 22.397868] kfence-#90: 0x00000000f66eab1f-0x000000007e34f679, size=32, cache=test [ 22.397868] [ 22.397917] allocated by task 299 on cpu 1 at 22.396465s (0.001449s ago): [ 22.397988] test_alloc+0x230/0x628 [ 22.398028] test_use_after_free_read+0xd0/0x248 [ 22.398069] kunit_try_run_case+0x170/0x3f0 [ 22.398110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.398154] kthread+0x328/0x630 [ 22.398193] ret_from_fork+0x10/0x20 [ 22.398232] [ 22.398254] freed by task 299 on cpu 1 at 22.396531s (0.001719s ago): [ 22.398353] test_use_after_free_read+0xf0/0x248 [ 22.398396] kunit_try_run_case+0x170/0x3f0 [ 22.398437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.398482] kthread+0x328/0x630 [ 22.398586] ret_from_fork+0x10/0x20 [ 22.398626] [ 22.398675] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.398771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.398802] Hardware name: linux,dummy-virt (DT) [ 22.398834] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 22.188404] ================================================================== [ 22.188546] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 22.188546] [ 22.188630] Out-of-bounds write at 0x00000000b9af016b (1B left of kfence-#88): [ 22.188685] test_out_of_bounds_write+0x100/0x240 [ 22.188731] kunit_try_run_case+0x170/0x3f0 [ 22.188954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.189133] kthread+0x328/0x630 [ 22.189263] ret_from_fork+0x10/0x20 [ 22.189305] [ 22.189330] kfence-#88: 0x000000007bc4ee7b-0x0000000088e5c103, size=32, cache=test [ 22.189330] [ 22.189405] allocated by task 295 on cpu 1 at 22.188306s (0.001071s ago): [ 22.189489] test_alloc+0x230/0x628 [ 22.189552] test_out_of_bounds_write+0xc8/0x240 [ 22.189618] kunit_try_run_case+0x170/0x3f0 [ 22.189798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.189929] kthread+0x328/0x630 [ 22.190022] ret_from_fork+0x10/0x20 [ 22.190228] [ 22.190309] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.190679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.190710] Hardware name: linux,dummy-virt (DT) [ 22.190840] ================================================================== [ 22.083088] ================================================================== [ 22.083286] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 22.083286] [ 22.083533] Out-of-bounds write at 0x00000000f30a53c8 (1B left of kfence-#87): [ 22.083776] test_out_of_bounds_write+0x100/0x240 [ 22.083827] kunit_try_run_case+0x170/0x3f0 [ 22.083910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.084147] kthread+0x328/0x630 [ 22.084366] ret_from_fork+0x10/0x20 [ 22.084412] [ 22.084439] kfence-#87: 0x000000008fb00e6c-0x00000000a48b0077, size=32, cache=kmalloc-32 [ 22.084439] [ 22.084492] allocated by task 293 on cpu 1 at 22.082321s (0.002167s ago): [ 22.085053] test_alloc+0x29c/0x628 [ 22.085294] test_out_of_bounds_write+0xc8/0x240 [ 22.085341] kunit_try_run_case+0x170/0x3f0 [ 22.085668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.085900] kthread+0x328/0x630 [ 22.085946] ret_from_fork+0x10/0x20 [ 22.085985] [ 22.086375] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 22.086754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.086785] Hardware name: linux,dummy-virt (DT) [ 22.087373] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 21.558288] ================================================================== [ 21.558362] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.558362] [ 21.558510] Out-of-bounds read at 0x00000000ff87c264 (32B right of kfence-#82): [ 21.558640] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.558688] kunit_try_run_case+0x170/0x3f0 [ 21.558732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.558822] kthread+0x328/0x630 [ 21.559013] ret_from_fork+0x10/0x20 [ 21.559055] [ 21.559079] kfence-#82: 0x00000000536e7e02-0x0000000033aa4f4b, size=32, cache=kmalloc-32 [ 21.559079] [ 21.559132] allocated by task 289 on cpu 1 at 21.557920s (0.001208s ago): [ 21.559214] test_alloc+0x29c/0x628 [ 21.559255] test_out_of_bounds_read+0x198/0x3e0 [ 21.559345] kunit_try_run_case+0x170/0x3f0 [ 21.559389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.559473] kthread+0x328/0x630 [ 21.559654] ret_from_fork+0x10/0x20 [ 21.559842] [ 21.559966] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.560223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.560255] Hardware name: linux,dummy-virt (DT) [ 21.560289] ================================================================== [ 21.976499] ================================================================== [ 21.976590] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.976590] [ 21.976816] Out-of-bounds read at 0x00000000b655f1c9 (32B right of kfence-#86): [ 21.976997] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.977046] kunit_try_run_case+0x170/0x3f0 [ 21.977090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.977137] kthread+0x328/0x630 [ 21.977178] ret_from_fork+0x10/0x20 [ 21.977218] [ 21.977242] kfence-#86: 0x00000000ed38628b-0x00000000a532fb20, size=32, cache=test [ 21.977242] [ 21.977352] allocated by task 291 on cpu 1 at 21.976418s (0.000928s ago): [ 21.977425] test_alloc+0x230/0x628 [ 21.977493] test_out_of_bounds_read+0x198/0x3e0 [ 21.977670] kunit_try_run_case+0x170/0x3f0 [ 21.977713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.977760] kthread+0x328/0x630 [ 21.977806] ret_from_fork+0x10/0x20 [ 21.977933] [ 21.977980] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.978121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.978153] Hardware name: linux,dummy-virt (DT) [ 21.978187] ================================================================== [ 21.454109] ================================================================== [ 21.454227] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 21.454227] [ 21.454360] Out-of-bounds read at 0x00000000d5bd32b0 (1B left of kfence-#81): [ 21.454440] test_out_of_bounds_read+0x114/0x3e0 [ 21.454494] kunit_try_run_case+0x170/0x3f0 [ 21.454541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.455396] kthread+0x328/0x630 [ 21.455720] ret_from_fork+0x10/0x20 [ 21.455765] [ 21.455797] kfence-#81: 0x0000000080740742-0x00000000777906ca, size=32, cache=kmalloc-32 [ 21.455797] [ 21.455871] allocated by task 289 on cpu 1 at 21.453789s (0.002078s ago): [ 21.455950] test_alloc+0x29c/0x628 [ 21.455991] test_out_of_bounds_read+0xdc/0x3e0 [ 21.456070] kunit_try_run_case+0x170/0x3f0 [ 21.456110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.456304] kthread+0x328/0x630 [ 21.456347] ret_from_fork+0x10/0x20 [ 21.456465] [ 21.456655] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.456803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.456833] Hardware name: linux,dummy-virt (DT) [ 21.456882] ================================================================== [ 21.665044] ================================================================== [ 21.665122] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 21.665122] [ 21.665202] Out-of-bounds read at 0x0000000076dc50e6 (1B left of kfence-#83): [ 21.665258] test_out_of_bounds_read+0x114/0x3e0 [ 21.665304] kunit_try_run_case+0x170/0x3f0 [ 21.665359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.665405] kthread+0x328/0x630 [ 21.665497] ret_from_fork+0x10/0x20 [ 21.665541] [ 21.665565] kfence-#83: 0x000000007b5ea106-0x00000000d58a3477, size=32, cache=test [ 21.665565] [ 21.665616] allocated by task 291 on cpu 1 at 21.664736s (0.000876s ago): [ 21.665994] test_alloc+0x230/0x628 [ 21.666044] test_out_of_bounds_read+0xdc/0x3e0 [ 21.666125] kunit_try_run_case+0x170/0x3f0 [ 21.666169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.666215] kthread+0x328/0x630 [ 21.666255] ret_from_fork+0x10/0x20 [ 21.666295] [ 21.666420] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.666642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.666705] Hardware name: linux,dummy-virt (DT) [ 21.666786] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-rcu_uaf_reclaim
[ 18.518028] ================================================================== [ 18.518173] BUG: KFENCE: use-after-free read in rcu_uaf_reclaim+0x48/0x70 [ 18.518173] [ 18.519451] Use-after-free read at 0x000000001a9dec98 (in kfence-#58): [ 18.519529] rcu_uaf_reclaim+0x48/0x70 [ 18.519575] rcu_core+0x9f4/0x1e20 [ 18.519913] rcu_core_si+0x18/0x30 [ 18.519982] handle_softirqs+0x374/0xb28 [ 18.520181] __do_softirq+0x1c/0x28 [ 18.520412] ____do_softirq+0x18/0x30 [ 18.520640] call_on_irq_stack+0x24/0x30 [ 18.520683] do_softirq_own_stack+0x24/0x38 [ 18.520896] __irq_exit_rcu+0x1fc/0x318 [ 18.521232] irq_exit_rcu+0x1c/0x80 [ 18.521433] el1_interrupt+0x38/0x58 [ 18.521665] el1h_64_irq_handler+0x18/0x28 [ 18.521884] el1h_64_irq+0x6c/0x70 [ 18.522149] arch_local_irq_enable+0x4/0x8 [ 18.522333] do_idle+0x384/0x4e8 [ 18.522401] cpu_startup_entry+0x64/0x80 [ 18.522478] rest_init+0x160/0x188 [ 18.522810] start_kernel+0x308/0x3d0 [ 18.523172] __primary_switched+0x8c/0xa0 [ 18.523435] [ 18.523524] kfence-#58: 0x000000001a9dec98-0x000000001dcc1adb, size=24, cache=kmalloc-32 [ 18.523524] [ 18.523898] allocated by task 200 on cpu 0 at 18.289606s (0.234271s ago): [ 18.524053] rcu_uaf+0xb0/0x2d8 [ 18.524273] kunit_try_run_case+0x170/0x3f0 [ 18.524350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.524397] kthread+0x328/0x630 [ 18.524771] ret_from_fork+0x10/0x20 [ 18.525128] [ 18.525367] freed by task 0 on cpu 0 at 18.516959s (0.008379s ago): [ 18.525668] rcu_uaf_reclaim+0x28/0x70 [ 18.525752] rcu_core+0x9f4/0x1e20 [ 18.525978] rcu_core_si+0x18/0x30 [ 18.526282] handle_softirqs+0x374/0xb28 [ 18.526586] __do_softirq+0x1c/0x28 [ 18.526716] ____do_softirq+0x18/0x30 [ 18.527104] call_on_irq_stack+0x24/0x30 [ 18.527175] do_softirq_own_stack+0x24/0x38 [ 18.527402] __irq_exit_rcu+0x1fc/0x318 [ 18.527702] irq_exit_rcu+0x1c/0x80 [ 18.527992] el1_interrupt+0x38/0x58 [ 18.528120] el1h_64_irq_handler+0x18/0x28 [ 18.528173] el1h_64_irq+0x6c/0x70 [ 18.528205] arch_local_irq_enable+0x4/0x8 [ 18.528240] do_idle+0x384/0x4e8 [ 18.528309] cpu_startup_entry+0x64/0x80 [ 18.528348] rest_init+0x160/0x188 [ 18.528402] start_kernel+0x308/0x3d0 [ 18.528446] __primary_switched+0x8c/0xa0 [ 18.528485] [ 18.528536] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.528623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.528662] Hardware name: linux,dummy-virt (DT) [ 18.528695] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_oob_in_memset
[ 17.987502] ================================================================== [ 17.987553] BUG: KFENCE: memory corruption in kmalloc_oob_in_memset+0x160/0x2d0 [ 17.987553] [ 17.987610] Corrupted memory at 0x00000000661a9bfe [ ! ! ! ! ! ! ! ! ] (in kfence-#55): [ 17.990798] kmalloc_oob_in_memset+0x160/0x2d0 [ 17.990850] kunit_try_run_case+0x170/0x3f0 [ 17.990902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.990946] kthread+0x328/0x630 [ 17.990984] ret_from_fork+0x10/0x20 [ 17.991021] [ 17.991041] kfence-#55: 0x00000000f473c568-0x0000000033a18902, size=120, cache=kmalloc-128 [ 17.991041] [ 17.992909] allocated by task 172 on cpu 0 at 17.979646s (0.011448s ago): [ 17.993002] kmalloc_oob_in_memset+0xb0/0x2d0 [ 17.993045] kunit_try_run_case+0x170/0x3f0 [ 17.994029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.994098] kthread+0x328/0x630 [ 17.994134] ret_from_fork+0x10/0x20 [ 17.994169] [ 17.994793] freed by task 172 on cpu 0 at 17.987439s (0.007342s ago): [ 17.994882] kmalloc_oob_in_memset+0x160/0x2d0 [ 17.994923] kunit_try_run_case+0x170/0x3f0 [ 17.996050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.996396] kthread+0x328/0x630 [ 17.996673] ret_from_fork+0x10/0x20 [ 17.997603] [ 17.997689] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.997968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.997996] Hardware name: linux,dummy-virt (DT) [ 17.998028] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 17.655511] ================================================================== [ 17.655580] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 17.655580] [ 17.655639] Corrupted memory at 0x00000000e26f7236 [ ! . . . . . . . . . . . . . . . ] (in kfence-#52): [ 17.660693] kmalloc_track_caller_oob_right+0x224/0x488 [ 17.660974] kunit_try_run_case+0x170/0x3f0 [ 17.661492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.661674] kthread+0x328/0x630 [ 17.661718] ret_from_fork+0x10/0x20 [ 17.661800] [ 17.663042] kfence-#52: 0x00000000c63ab083-0x000000005f51a22e, size=120, cache=kmalloc-128 [ 17.663042] [ 17.663963] allocated by task 144 on cpu 0 at 17.653975s (0.009814s ago): [ 17.664383] kmalloc_track_caller_oob_right+0x184/0x488 [ 17.664463] kunit_try_run_case+0x170/0x3f0 [ 17.664504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.664687] kthread+0x328/0x630 [ 17.664731] ret_from_fork+0x10/0x20 [ 17.664851] [ 17.665313] freed by task 144 on cpu 0 at 17.655005s (0.010063s ago): [ 17.665701] kmalloc_track_caller_oob_right+0x224/0x488 [ 17.665808] kunit_try_run_case+0x170/0x3f0 [ 17.665980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.666050] kthread+0x328/0x630 [ 17.666217] ret_from_fork+0x10/0x20 [ 17.666477] [ 17.666559] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.666685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.666721] Hardware name: linux,dummy-virt (DT) [ 17.666758] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 21.116048] ================================================================== [ 21.116128] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 21.116308] Write of size 1 at addr fff00000c791de78 by task kunit_try_catch/287 [ 21.116900] [ 21.117082] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.117188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.117222] Hardware name: linux,dummy-virt (DT) [ 21.117468] Call trace: [ 21.117599] show_stack+0x20/0x38 (C) [ 21.117957] dump_stack_lvl+0x8c/0xd0 [ 21.118101] print_report+0x118/0x608 [ 21.118285] kasan_report+0xdc/0x128 [ 21.118746] __asan_report_store1_noabort+0x20/0x30 [ 21.118924] strncpy_from_user+0x270/0x2a0 [ 21.119345] copy_user_test_oob+0x5c0/0xec8 [ 21.119476] kunit_try_run_case+0x170/0x3f0 [ 21.119632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.119701] kthread+0x328/0x630 [ 21.119751] ret_from_fork+0x10/0x20 [ 21.119837] [ 21.119870] Allocated by task 287: [ 21.120333] kasan_save_stack+0x3c/0x68 [ 21.120472] kasan_save_track+0x20/0x40 [ 21.120647] kasan_save_alloc_info+0x40/0x58 [ 21.120794] __kasan_kmalloc+0xd4/0xd8 [ 21.120958] __kmalloc_noprof+0x198/0x4c8 [ 21.121000] kunit_kmalloc_array+0x34/0x88 [ 21.121055] copy_user_test_oob+0xac/0xec8 [ 21.121099] kunit_try_run_case+0x170/0x3f0 [ 21.121535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.121651] kthread+0x328/0x630 [ 21.122132] ret_from_fork+0x10/0x20 [ 21.122656] [ 21.122710] The buggy address belongs to the object at fff00000c791de00 [ 21.122710] which belongs to the cache kmalloc-128 of size 128 [ 21.123112] The buggy address is located 0 bytes to the right of [ 21.123112] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.123198] [ 21.123526] The buggy address belongs to the physical page: [ 21.123641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.124455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.124650] page_type: f5(slab) [ 21.124702] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.124758] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.125184] page dumped because: kasan: bad access detected [ 21.125389] [ 21.125418] Memory state around the buggy address: [ 21.125455] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.125505] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.125586] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.125651] ^ [ 21.125707] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.125760] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.125813] ================================================================== [ 21.106438] ================================================================== [ 21.106491] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 21.106812] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.106903] [ 21.106935] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.107021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.107069] Hardware name: linux,dummy-virt (DT) [ 21.107104] Call trace: [ 21.107128] show_stack+0x20/0x38 (C) [ 21.107186] dump_stack_lvl+0x8c/0xd0 [ 21.107236] print_report+0x118/0x608 [ 21.107284] kasan_report+0xdc/0x128 [ 21.107333] kasan_check_range+0x100/0x1a8 [ 21.107383] __kasan_check_write+0x20/0x30 [ 21.107447] strncpy_from_user+0x3c/0x2a0 [ 21.107495] copy_user_test_oob+0x5c0/0xec8 [ 21.107542] kunit_try_run_case+0x170/0x3f0 [ 21.107593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.107649] kthread+0x328/0x630 [ 21.107696] ret_from_fork+0x10/0x20 [ 21.107754] [ 21.107774] Allocated by task 287: [ 21.107804] kasan_save_stack+0x3c/0x68 [ 21.107862] kasan_save_track+0x20/0x40 [ 21.108438] kasan_save_alloc_info+0x40/0x58 [ 21.108816] __kasan_kmalloc+0xd4/0xd8 [ 21.108883] __kmalloc_noprof+0x198/0x4c8 [ 21.108922] kunit_kmalloc_array+0x34/0x88 [ 21.109561] copy_user_test_oob+0xac/0xec8 [ 21.109769] kunit_try_run_case+0x170/0x3f0 [ 21.109847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.109984] kthread+0x328/0x630 [ 21.110276] ret_from_fork+0x10/0x20 [ 21.110319] [ 21.110565] The buggy address belongs to the object at fff00000c791de00 [ 21.110565] which belongs to the cache kmalloc-128 of size 128 [ 21.110787] The buggy address is located 0 bytes inside of [ 21.110787] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.111019] [ 21.111204] The buggy address belongs to the physical page: [ 21.111264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.111348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.112332] page_type: f5(slab) [ 21.112443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.112542] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.112589] page dumped because: kasan: bad access detected [ 21.112763] [ 21.112888] Memory state around the buggy address: [ 21.112963] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.113350] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.113518] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.113654] ^ [ 21.114047] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.114160] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.114319] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 21.062909] ================================================================== [ 21.062989] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 21.063113] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.063230] [ 21.063319] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.063448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.063871] Hardware name: linux,dummy-virt (DT) [ 21.064244] Call trace: [ 21.064332] show_stack+0x20/0x38 (C) [ 21.064393] dump_stack_lvl+0x8c/0xd0 [ 21.064560] print_report+0x118/0x608 [ 21.064825] kasan_report+0xdc/0x128 [ 21.064905] kasan_check_range+0x100/0x1a8 [ 21.065426] __kasan_check_write+0x20/0x30 [ 21.065584] copy_user_test_oob+0x35c/0xec8 [ 21.065718] kunit_try_run_case+0x170/0x3f0 [ 21.065877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.066347] kthread+0x328/0x630 [ 21.066440] ret_from_fork+0x10/0x20 [ 21.066554] [ 21.066585] Allocated by task 287: [ 21.066624] kasan_save_stack+0x3c/0x68 [ 21.066713] kasan_save_track+0x20/0x40 [ 21.066754] kasan_save_alloc_info+0x40/0x58 [ 21.066806] __kasan_kmalloc+0xd4/0xd8 [ 21.066873] __kmalloc_noprof+0x198/0x4c8 [ 21.066912] kunit_kmalloc_array+0x34/0x88 [ 21.066954] copy_user_test_oob+0xac/0xec8 [ 21.066998] kunit_try_run_case+0x170/0x3f0 [ 21.067040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.067095] kthread+0x328/0x630 [ 21.067143] ret_from_fork+0x10/0x20 [ 21.067199] [ 21.067221] The buggy address belongs to the object at fff00000c791de00 [ 21.067221] which belongs to the cache kmalloc-128 of size 128 [ 21.067299] The buggy address is located 0 bytes inside of [ 21.067299] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.067372] [ 21.067405] The buggy address belongs to the physical page: [ 21.067452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.067507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.067564] page_type: f5(slab) [ 21.067610] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.067664] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.067714] page dumped because: kasan: bad access detected [ 21.067777] [ 21.067806] Memory state around the buggy address: [ 21.067850] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.068114] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.068176] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.068221] ^ [ 21.068265] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.069417] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.069879] ================================================================== [ 21.082621] ================================================================== [ 21.082702] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 21.082779] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.082835] [ 21.082881] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.082968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.082998] Hardware name: linux,dummy-virt (DT) [ 21.083031] Call trace: [ 21.083055] show_stack+0x20/0x38 (C) [ 21.083105] dump_stack_lvl+0x8c/0xd0 [ 21.083161] print_report+0x118/0x608 [ 21.083231] kasan_report+0xdc/0x128 [ 21.083277] kasan_check_range+0x100/0x1a8 [ 21.083326] __kasan_check_write+0x20/0x30 [ 21.083375] copy_user_test_oob+0x434/0xec8 [ 21.083423] kunit_try_run_case+0x170/0x3f0 [ 21.083474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.083529] kthread+0x328/0x630 [ 21.083575] ret_from_fork+0x10/0x20 [ 21.083631] [ 21.083652] Allocated by task 287: [ 21.083685] kasan_save_stack+0x3c/0x68 [ 21.083738] kasan_save_track+0x20/0x40 [ 21.083778] kasan_save_alloc_info+0x40/0x58 [ 21.083817] __kasan_kmalloc+0xd4/0xd8 [ 21.083865] __kmalloc_noprof+0x198/0x4c8 [ 21.083963] kunit_kmalloc_array+0x34/0x88 [ 21.084326] copy_user_test_oob+0xac/0xec8 [ 21.084817] kunit_try_run_case+0x170/0x3f0 [ 21.085272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.085334] kthread+0x328/0x630 [ 21.085373] ret_from_fork+0x10/0x20 [ 21.085740] [ 21.086300] The buggy address belongs to the object at fff00000c791de00 [ 21.086300] which belongs to the cache kmalloc-128 of size 128 [ 21.086500] The buggy address is located 0 bytes inside of [ 21.086500] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.086671] [ 21.086695] The buggy address belongs to the physical page: [ 21.087047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.087498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.087653] page_type: f5(slab) [ 21.087921] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.088071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.088122] page dumped because: kasan: bad access detected [ 21.088159] [ 21.088181] Memory state around the buggy address: [ 21.088673] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.089178] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.089248] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.089294] ^ [ 21.089916] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.090371] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.090576] ================================================================== [ 21.031606] ================================================================== [ 21.031710] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 21.032384] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.032464] [ 21.032749] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.032874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.033007] Hardware name: linux,dummy-virt (DT) [ 21.033076] Call trace: [ 21.033111] show_stack+0x20/0x38 (C) [ 21.033191] dump_stack_lvl+0x8c/0xd0 [ 21.033288] print_report+0x118/0x608 [ 21.033354] kasan_report+0xdc/0x128 [ 21.033634] kasan_check_range+0x100/0x1a8 [ 21.033726] __kasan_check_write+0x20/0x30 [ 21.033802] copy_user_test_oob+0x234/0xec8 [ 21.034063] kunit_try_run_case+0x170/0x3f0 [ 21.034289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.034581] kthread+0x328/0x630 [ 21.034690] ret_from_fork+0x10/0x20 [ 21.035011] [ 21.035378] Allocated by task 287: [ 21.035684] kasan_save_stack+0x3c/0x68 [ 21.036147] kasan_save_track+0x20/0x40 [ 21.036244] kasan_save_alloc_info+0x40/0x58 [ 21.036434] __kasan_kmalloc+0xd4/0xd8 [ 21.036677] __kmalloc_noprof+0x198/0x4c8 [ 21.036780] kunit_kmalloc_array+0x34/0x88 [ 21.036980] copy_user_test_oob+0xac/0xec8 [ 21.037164] kunit_try_run_case+0x170/0x3f0 [ 21.037409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.037644] kthread+0x328/0x630 [ 21.037732] ret_from_fork+0x10/0x20 [ 21.038127] [ 21.038166] The buggy address belongs to the object at fff00000c791de00 [ 21.038166] which belongs to the cache kmalloc-128 of size 128 [ 21.038329] The buggy address is located 0 bytes inside of [ 21.038329] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.038397] [ 21.038424] The buggy address belongs to the physical page: [ 21.038459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.038524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.038580] page_type: f5(slab) [ 21.038636] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.038691] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.038753] page dumped because: kasan: bad access detected [ 21.038790] [ 21.038818] Memory state around the buggy address: [ 21.038868] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.038916] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.038976] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.039019] ^ [ 21.039077] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.039124] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.039174] ================================================================== [ 21.045972] ================================================================== [ 21.046033] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 21.046088] Read of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.046621] [ 21.046871] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.046974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.047260] Hardware name: linux,dummy-virt (DT) [ 21.047504] Call trace: [ 21.047531] show_stack+0x20/0x38 (C) [ 21.047645] dump_stack_lvl+0x8c/0xd0 [ 21.047759] print_report+0x118/0x608 [ 21.048031] kasan_report+0xdc/0x128 [ 21.048276] kasan_check_range+0x100/0x1a8 [ 21.048549] __kasan_check_read+0x20/0x30 [ 21.048642] copy_user_test_oob+0x728/0xec8 [ 21.048826] kunit_try_run_case+0x170/0x3f0 [ 21.049317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.049643] kthread+0x328/0x630 [ 21.049706] ret_from_fork+0x10/0x20 [ 21.050179] [ 21.050483] Allocated by task 287: [ 21.050673] kasan_save_stack+0x3c/0x68 [ 21.051045] kasan_save_track+0x20/0x40 [ 21.051177] kasan_save_alloc_info+0x40/0x58 [ 21.051428] __kasan_kmalloc+0xd4/0xd8 [ 21.051626] __kmalloc_noprof+0x198/0x4c8 [ 21.051689] kunit_kmalloc_array+0x34/0x88 [ 21.051922] copy_user_test_oob+0xac/0xec8 [ 21.051976] kunit_try_run_case+0x170/0x3f0 [ 21.052271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.052430] kthread+0x328/0x630 [ 21.052491] ret_from_fork+0x10/0x20 [ 21.052553] [ 21.052576] The buggy address belongs to the object at fff00000c791de00 [ 21.052576] which belongs to the cache kmalloc-128 of size 128 [ 21.052647] The buggy address is located 0 bytes inside of [ 21.052647] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.052713] [ 21.052744] The buggy address belongs to the physical page: [ 21.052778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.052833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.052906] page_type: f5(slab) [ 21.052952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.053008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.053077] page dumped because: kasan: bad access detected [ 21.053114] [ 21.053135] Memory state around the buggy address: [ 21.053178] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.053228] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053285] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.053329] ^ [ 21.053390] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053442] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053503] ================================================================== [ 21.072249] ================================================================== [ 21.072309] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 21.072362] Read of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.072416] [ 21.072692] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.072956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.072988] Hardware name: linux,dummy-virt (DT) [ 21.073544] Call trace: [ 21.073586] show_stack+0x20/0x38 (C) [ 21.073766] dump_stack_lvl+0x8c/0xd0 [ 21.073931] print_report+0x118/0x608 [ 21.073984] kasan_report+0xdc/0x128 [ 21.074047] kasan_check_range+0x100/0x1a8 [ 21.074097] __kasan_check_read+0x20/0x30 [ 21.074184] copy_user_test_oob+0x3c8/0xec8 [ 21.074525] kunit_try_run_case+0x170/0x3f0 [ 21.074793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.074869] kthread+0x328/0x630 [ 21.074918] ret_from_fork+0x10/0x20 [ 21.075090] [ 21.075152] Allocated by task 287: [ 21.075189] kasan_save_stack+0x3c/0x68 [ 21.075234] kasan_save_track+0x20/0x40 [ 21.075591] kasan_save_alloc_info+0x40/0x58 [ 21.075809] __kasan_kmalloc+0xd4/0xd8 [ 21.075912] __kmalloc_noprof+0x198/0x4c8 [ 21.076003] kunit_kmalloc_array+0x34/0x88 [ 21.076139] copy_user_test_oob+0xac/0xec8 [ 21.076198] kunit_try_run_case+0x170/0x3f0 [ 21.076243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.076452] kthread+0x328/0x630 [ 21.077045] ret_from_fork+0x10/0x20 [ 21.077168] [ 21.077226] The buggy address belongs to the object at fff00000c791de00 [ 21.077226] which belongs to the cache kmalloc-128 of size 128 [ 21.077290] The buggy address is located 0 bytes inside of [ 21.077290] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.077657] [ 21.077703] The buggy address belongs to the physical page: [ 21.077761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.078307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.078451] page_type: f5(slab) [ 21.078565] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.078620] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.078961] page dumped because: kasan: bad access detected [ 21.079243] [ 21.079327] Memory state around the buggy address: [ 21.079367] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.080340] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.080399] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.080443] ^ [ 21.080488] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.081007] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.081186] ================================================================== [ 21.094515] ================================================================== [ 21.095060] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 21.095131] Read of size 121 at addr fff00000c791de00 by task kunit_try_catch/287 [ 21.095534] [ 21.095700] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 21.095796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.096090] Hardware name: linux,dummy-virt (DT) [ 21.096175] Call trace: [ 21.096608] show_stack+0x20/0x38 (C) [ 21.096784] dump_stack_lvl+0x8c/0xd0 [ 21.096994] print_report+0x118/0x608 [ 21.097104] kasan_report+0xdc/0x128 [ 21.097154] kasan_check_range+0x100/0x1a8 [ 21.097202] __kasan_check_read+0x20/0x30 [ 21.097255] copy_user_test_oob+0x4a0/0xec8 [ 21.097981] kunit_try_run_case+0x170/0x3f0 [ 21.098100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.098371] kthread+0x328/0x630 [ 21.098459] ret_from_fork+0x10/0x20 [ 21.098598] [ 21.098620] Allocated by task 287: [ 21.098876] kasan_save_stack+0x3c/0x68 [ 21.099023] kasan_save_track+0x20/0x40 [ 21.099401] kasan_save_alloc_info+0x40/0x58 [ 21.099536] __kasan_kmalloc+0xd4/0xd8 [ 21.099581] __kmalloc_noprof+0x198/0x4c8 [ 21.099672] kunit_kmalloc_array+0x34/0x88 [ 21.099715] copy_user_test_oob+0xac/0xec8 [ 21.099777] kunit_try_run_case+0x170/0x3f0 [ 21.099820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.099880] kthread+0x328/0x630 [ 21.100159] ret_from_fork+0x10/0x20 [ 21.100614] [ 21.100646] The buggy address belongs to the object at fff00000c791de00 [ 21.100646] which belongs to the cache kmalloc-128 of size 128 [ 21.100710] The buggy address is located 0 bytes inside of [ 21.100710] allocated 120-byte region [fff00000c791de00, fff00000c791de78) [ 21.100776] [ 21.101384] The buggy address belongs to the physical page: [ 21.101682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 21.101962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.102359] page_type: f5(slab) [ 21.102404] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.102648] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.103396] page dumped because: kasan: bad access detected [ 21.103603] [ 21.103912] Memory state around the buggy address: [ 21.103967] fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.104018] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.104066] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.104111] ^ [ 21.104486] fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.104743] fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.104795] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 20.978033] ================================================================== [ 20.978312] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 20.978486] Read of size 8 at addr fff00000c791dd78 by task kunit_try_catch/283 [ 20.978580] [ 20.978620] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.978831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.978978] Hardware name: linux,dummy-virt (DT) [ 20.979115] Call trace: [ 20.979171] show_stack+0x20/0x38 (C) [ 20.979231] dump_stack_lvl+0x8c/0xd0 [ 20.979318] print_report+0x118/0x608 [ 20.979368] kasan_report+0xdc/0x128 [ 20.979414] __asan_report_load8_noabort+0x20/0x30 [ 20.979464] copy_to_kernel_nofault+0x204/0x250 [ 20.979514] copy_to_kernel_nofault_oob+0x158/0x418 [ 20.979576] kunit_try_run_case+0x170/0x3f0 [ 20.979631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.979686] kthread+0x328/0x630 [ 20.979733] ret_from_fork+0x10/0x20 [ 20.979781] [ 20.979808] Allocated by task 283: [ 20.979838] kasan_save_stack+0x3c/0x68 [ 20.980063] kasan_save_track+0x20/0x40 [ 20.980287] kasan_save_alloc_info+0x40/0x58 [ 20.980339] __kasan_kmalloc+0xd4/0xd8 [ 20.980379] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.980673] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.980913] kunit_try_run_case+0x170/0x3f0 [ 20.981097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.981346] kthread+0x328/0x630 [ 20.981631] ret_from_fork+0x10/0x20 [ 20.981748] [ 20.981772] The buggy address belongs to the object at fff00000c791dd00 [ 20.981772] which belongs to the cache kmalloc-128 of size 128 [ 20.981911] The buggy address is located 0 bytes to the right of [ 20.981911] allocated 120-byte region [fff00000c791dd00, fff00000c791dd78) [ 20.982257] [ 20.982346] The buggy address belongs to the physical page: [ 20.982411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 20.982589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.982747] page_type: f5(slab) [ 20.983028] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.983088] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.983351] page dumped because: kasan: bad access detected [ 20.983392] [ 20.983532] Memory state around the buggy address: [ 20.983620] fff00000c791dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.983751] fff00000c791dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.983801] >fff00000c791dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.984135] ^ [ 20.984202] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.984304] fff00000c791de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.984402] ================================================================== [ 20.985700] ================================================================== [ 20.985997] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 20.986412] Write of size 8 at addr fff00000c791dd78 by task kunit_try_catch/283 [ 20.986481] [ 20.986541] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.986628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.986819] Hardware name: linux,dummy-virt (DT) [ 20.986964] Call trace: [ 20.987019] show_stack+0x20/0x38 (C) [ 20.987074] dump_stack_lvl+0x8c/0xd0 [ 20.987366] print_report+0x118/0x608 [ 20.987478] kasan_report+0xdc/0x128 [ 20.987543] kasan_check_range+0x100/0x1a8 [ 20.987597] __kasan_check_write+0x20/0x30 [ 20.987653] copy_to_kernel_nofault+0x8c/0x250 [ 20.987712] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 20.987768] kunit_try_run_case+0x170/0x3f0 [ 20.987821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.988132] kthread+0x328/0x630 [ 20.988375] ret_from_fork+0x10/0x20 [ 20.989028] [ 20.989130] Allocated by task 283: [ 20.989174] kasan_save_stack+0x3c/0x68 [ 20.989263] kasan_save_track+0x20/0x40 [ 20.989587] kasan_save_alloc_info+0x40/0x58 [ 20.989644] __kasan_kmalloc+0xd4/0xd8 [ 20.989849] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.989953] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.990095] kunit_try_run_case+0x170/0x3f0 [ 20.990593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.990758] kthread+0x328/0x630 [ 20.990800] ret_from_fork+0x10/0x20 [ 20.990977] [ 20.991169] The buggy address belongs to the object at fff00000c791dd00 [ 20.991169] which belongs to the cache kmalloc-128 of size 128 [ 20.991273] The buggy address is located 0 bytes to the right of [ 20.991273] allocated 120-byte region [fff00000c791dd00, fff00000c791dd78) [ 20.991613] [ 20.991683] The buggy address belongs to the physical page: [ 20.991947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 20.992160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.992227] page_type: f5(slab) [ 20.992549] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.992619] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.992840] page dumped because: kasan: bad access detected [ 20.992921] [ 20.992944] Memory state around the buggy address: [ 20.992981] fff00000c791dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.993045] fff00000c791dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.993106] >fff00000c791dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.993150] ^ [ 20.993205] fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.993262] fff00000c791de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.993305] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 20.935724] ================================================================== [ 20.935891] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 20.936223] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271 [ 20.936360] [ 20.936568] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.937078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.937203] Hardware name: linux,dummy-virt (DT) [ 20.937367] Call trace: [ 20.937490] show_stack+0x20/0x38 (C) [ 20.937791] dump_stack_lvl+0x8c/0xd0 [ 20.938028] print_report+0x310/0x608 [ 20.938253] kasan_report+0xdc/0x128 [ 20.938397] __asan_report_load1_noabort+0x20/0x30 [ 20.938612] vmalloc_oob+0x51c/0x5d0 [ 20.938704] kunit_try_run_case+0x170/0x3f0 [ 20.938777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.938833] kthread+0x328/0x630 [ 20.938892] ret_from_fork+0x10/0x20 [ 20.938977] [ 20.939007] The buggy address belongs to the virtual mapping at [ 20.939007] [ffff80008010b000, ffff80008010d000) created by: [ 20.939007] vmalloc_oob+0x98/0x5d0 [ 20.939085] [ 20.939106] The buggy address belongs to the physical page: [ 20.939139] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791f [ 20.939208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.939281] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.939337] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.939384] page dumped because: kasan: bad access detected [ 20.939418] [ 20.939447] Memory state around the buggy address: [ 20.939481] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.939539] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.939608] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.939664] ^ [ 20.939717] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.939763] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.939806] ================================================================== [ 20.931266] ================================================================== [ 20.931335] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 20.931397] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271 [ 20.931451] [ 20.931486] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.931589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.931620] Hardware name: linux,dummy-virt (DT) [ 20.931656] Call trace: [ 20.931679] show_stack+0x20/0x38 (C) [ 20.931731] dump_stack_lvl+0x8c/0xd0 [ 20.931781] print_report+0x310/0x608 [ 20.931828] kasan_report+0xdc/0x128 [ 20.931886] __asan_report_load1_noabort+0x20/0x30 [ 20.931938] vmalloc_oob+0x578/0x5d0 [ 20.931984] kunit_try_run_case+0x170/0x3f0 [ 20.932035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.932090] kthread+0x328/0x630 [ 20.932166] ret_from_fork+0x10/0x20 [ 20.932589] [ 20.932677] The buggy address belongs to the virtual mapping at [ 20.932677] [ffff80008010b000, ffff80008010d000) created by: [ 20.932677] vmalloc_oob+0x98/0x5d0 [ 20.932874] [ 20.932960] The buggy address belongs to the physical page: [ 20.932995] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791f [ 20.933335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.933404] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.933550] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.933737] page dumped because: kasan: bad access detected [ 20.933923] [ 20.934347] Memory state around the buggy address: [ 20.934403] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.934490] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.934537] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.934749] ^ [ 20.934793] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.934840] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.934892] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 20.741104] ================================================================== [ 20.741157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.741209] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.741396] [ 20.741533] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.741824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.741869] Hardware name: linux,dummy-virt (DT) [ 20.741928] Call trace: [ 20.741954] show_stack+0x20/0x38 (C) [ 20.742350] dump_stack_lvl+0x8c/0xd0 [ 20.742427] print_report+0x118/0x608 [ 20.742476] kasan_report+0xdc/0x128 [ 20.742521] kasan_check_range+0x100/0x1a8 [ 20.742780] __kasan_check_read+0x20/0x30 [ 20.742914] kasan_atomics_helper+0xdd4/0x4858 [ 20.742971] kasan_atomics+0x198/0x2e0 [ 20.743265] kunit_try_run_case+0x170/0x3f0 [ 20.743357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.743426] kthread+0x328/0x630 [ 20.743698] ret_from_fork+0x10/0x20 [ 20.743779] [ 20.743823] Allocated by task 267: [ 20.743864] kasan_save_stack+0x3c/0x68 [ 20.744032] kasan_save_track+0x20/0x40 [ 20.744108] kasan_save_alloc_info+0x40/0x58 [ 20.744253] __kasan_kmalloc+0xd4/0xd8 [ 20.744296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.744337] kasan_atomics+0xb8/0x2e0 [ 20.744381] kunit_try_run_case+0x170/0x3f0 [ 20.744658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.744757] kthread+0x328/0x630 [ 20.745509] ret_from_fork+0x10/0x20 [ 20.745602] [ 20.745657] The buggy address belongs to the object at fff00000c7a67680 [ 20.745657] which belongs to the cache kmalloc-64 of size 64 [ 20.745745] The buggy address is located 0 bytes to the right of [ 20.745745] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.745974] [ 20.746179] The buggy address belongs to the physical page: [ 20.746240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.746384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.746485] page_type: f5(slab) [ 20.746765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.746882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.746986] page dumped because: kasan: bad access detected [ 20.747064] [ 20.747470] Memory state around the buggy address: [ 20.747546] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.747602] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.747925] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.747975] ^ [ 20.748013] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.748100] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.748154] ================================================================== [ 20.777770] ================================================================== [ 20.778088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.778161] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.778214] [ 20.778491] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.778635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.778667] Hardware name: linux,dummy-virt (DT) [ 20.778707] Call trace: [ 20.778732] show_stack+0x20/0x38 (C) [ 20.779056] dump_stack_lvl+0x8c/0xd0 [ 20.779138] print_report+0x118/0x608 [ 20.779304] kasan_report+0xdc/0x128 [ 20.779371] kasan_check_range+0x100/0x1a8 [ 20.779434] __kasan_check_write+0x20/0x30 [ 20.779485] kasan_atomics_helper+0xf20/0x4858 [ 20.779533] kasan_atomics+0x198/0x2e0 [ 20.779580] kunit_try_run_case+0x170/0x3f0 [ 20.779631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.779688] kthread+0x328/0x630 [ 20.779740] ret_from_fork+0x10/0x20 [ 20.779789] [ 20.779818] Allocated by task 267: [ 20.779850] kasan_save_stack+0x3c/0x68 [ 20.779904] kasan_save_track+0x20/0x40 [ 20.779952] kasan_save_alloc_info+0x40/0x58 [ 20.779999] __kasan_kmalloc+0xd4/0xd8 [ 20.780038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.780078] kasan_atomics+0xb8/0x2e0 [ 20.780114] kunit_try_run_case+0x170/0x3f0 [ 20.780155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.780202] kthread+0x328/0x630 [ 20.780241] ret_from_fork+0x10/0x20 [ 20.780279] [ 20.780301] The buggy address belongs to the object at fff00000c7a67680 [ 20.780301] which belongs to the cache kmalloc-64 of size 64 [ 20.780362] The buggy address is located 0 bytes to the right of [ 20.780362] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.780428] [ 20.780459] The buggy address belongs to the physical page: [ 20.780492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.780545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.780595] page_type: f5(slab) [ 20.780636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.780692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.780738] page dumped because: kasan: bad access detected [ 20.780782] [ 20.780811] Memory state around the buggy address: [ 20.780845] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.781612] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.781681] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.781727] ^ [ 20.781763] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.781811] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.782632] ================================================================== [ 20.904915] ================================================================== [ 20.904966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.905015] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.905067] [ 20.905096] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.905339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.905377] Hardware name: linux,dummy-virt (DT) [ 20.905411] Call trace: [ 20.905435] show_stack+0x20/0x38 (C) [ 20.905486] dump_stack_lvl+0x8c/0xd0 [ 20.905533] print_report+0x118/0x608 [ 20.905704] kasan_report+0xdc/0x128 [ 20.905760] kasan_check_range+0x100/0x1a8 [ 20.905808] __kasan_check_write+0x20/0x30 [ 20.906038] kasan_atomics_helper+0x175c/0x4858 [ 20.906182] kasan_atomics+0x198/0x2e0 [ 20.906365] kunit_try_run_case+0x170/0x3f0 [ 20.906488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.906546] kthread+0x328/0x630 [ 20.906591] ret_from_fork+0x10/0x20 [ 20.906639] [ 20.906661] Allocated by task 267: [ 20.906689] kasan_save_stack+0x3c/0x68 [ 20.906920] kasan_save_track+0x20/0x40 [ 20.907070] kasan_save_alloc_info+0x40/0x58 [ 20.907114] __kasan_kmalloc+0xd4/0xd8 [ 20.907160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.907212] kasan_atomics+0xb8/0x2e0 [ 20.907250] kunit_try_run_case+0x170/0x3f0 [ 20.907291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.907338] kthread+0x328/0x630 [ 20.907376] ret_from_fork+0x10/0x20 [ 20.907413] [ 20.907434] The buggy address belongs to the object at fff00000c7a67680 [ 20.907434] which belongs to the cache kmalloc-64 of size 64 [ 20.907495] The buggy address is located 0 bytes to the right of [ 20.907495] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.907564] [ 20.907586] The buggy address belongs to the physical page: [ 20.907618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.907682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.907733] page_type: f5(slab) [ 20.907784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.907840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.908276] page dumped because: kasan: bad access detected [ 20.908413] [ 20.908435] Memory state around the buggy address: [ 20.908469] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.908722] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.908795] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.908837] ^ [ 20.908883] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.908931] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.908973] ================================================================== [ 20.884633] ================================================================== [ 20.884681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.884728] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.884945] [ 20.885001] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.885088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.885117] Hardware name: linux,dummy-virt (DT) [ 20.885150] Call trace: [ 20.885173] show_stack+0x20/0x38 (C) [ 20.885375] dump_stack_lvl+0x8c/0xd0 [ 20.885428] print_report+0x118/0x608 [ 20.885474] kasan_report+0xdc/0x128 [ 20.885629] kasan_check_range+0x100/0x1a8 [ 20.885731] __kasan_check_write+0x20/0x30 [ 20.885782] kasan_atomics_helper+0x1644/0x4858 [ 20.885964] kasan_atomics+0x198/0x2e0 [ 20.886039] kunit_try_run_case+0x170/0x3f0 [ 20.886091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.886153] kthread+0x328/0x630 [ 20.886355] ret_from_fork+0x10/0x20 [ 20.886561] [ 20.886647] Allocated by task 267: [ 20.886743] kasan_save_stack+0x3c/0x68 [ 20.886818] kasan_save_track+0x20/0x40 [ 20.886886] kasan_save_alloc_info+0x40/0x58 [ 20.886928] __kasan_kmalloc+0xd4/0xd8 [ 20.886965] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.887013] kasan_atomics+0xb8/0x2e0 [ 20.887049] kunit_try_run_case+0x170/0x3f0 [ 20.887091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.887137] kthread+0x328/0x630 [ 20.887179] ret_from_fork+0x10/0x20 [ 20.887217] [ 20.887248] The buggy address belongs to the object at fff00000c7a67680 [ 20.887248] which belongs to the cache kmalloc-64 of size 64 [ 20.887317] The buggy address is located 0 bytes to the right of [ 20.887317] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.887393] [ 20.887423] The buggy address belongs to the physical page: [ 20.887457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.887511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.887560] page_type: f5(slab) [ 20.887599] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.887800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.887921] page dumped because: kasan: bad access detected [ 20.888070] [ 20.888093] Memory state around the buggy address: [ 20.888129] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.888193] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.888240] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.888284] ^ [ 20.888319] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.888387] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.888430] ================================================================== [ 20.662827] ================================================================== [ 20.662944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 20.663108] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.663197] [ 20.663469] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.663589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.663739] dump_stack_lvl+0x8c/0xd0 [ 20.666233] __kasan_kmalloc+0xd4/0xd8 [ 20.666443] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.666519] kasan_atomics+0xb8/0x2e0 [ 20.666884] kunit_try_run_case+0x170/0x3f0 [ 20.666965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.667138] kthread+0x328/0x630 [ 20.667325] ret_from_fork+0x10/0x20 [ 20.667430] [ 20.667534] The buggy address belongs to the object at fff00000c7a67680 [ 20.667534] which belongs to the cache kmalloc-64 of size 64 [ 20.667839] The buggy address is located 0 bytes to the right of [ 20.667839] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.668272] [ 20.668603] The buggy address belongs to the physical page: [ 20.668653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.668713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.668765] page_type: f5(slab) [ 20.668807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.669128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.669669] [ 20.670068] ^ [ 20.672488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.674708] [ 20.674885] kasan_save_stack+0x3c/0x68 [ 20.675428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.675469] kasan_atomics+0xb8/0x2e0 [ 20.675506] kunit_try_run_case+0x170/0x3f0 [ 20.675547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.675806] The buggy address is located 0 bytes to the right of [ 20.675806] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.677355] page dumped because: kasan: bad access detected [ 20.678144] ^ [ 20.679645] ================================================================== [ 20.717248] ================================================================== [ 20.717332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.717387] Read of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.717539] [ 20.717590] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.717872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.718261] Hardware name: linux,dummy-virt (DT) [ 20.718419] Call trace: [ 20.718468] show_stack+0x20/0x38 (C) [ 20.718553] dump_stack_lvl+0x8c/0xd0 [ 20.718607] print_report+0x118/0x608 [ 20.718715] kasan_report+0xdc/0x128 [ 20.718760] __asan_report_load4_noabort+0x20/0x30 [ 20.718814] kasan_atomics_helper+0x3dd8/0x4858 [ 20.719038] kasan_atomics+0x198/0x2e0 [ 20.719099] kunit_try_run_case+0x170/0x3f0 [ 20.719167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.719557] kthread+0x328/0x630 [ 20.719699] ret_from_fork+0x10/0x20 [ 20.719815] [ 20.719844] Allocated by task 267: [ 20.719890] kasan_save_stack+0x3c/0x68 [ 20.720154] kasan_save_track+0x20/0x40 [ 20.720367] kasan_save_alloc_info+0x40/0x58 [ 20.720417] __kasan_kmalloc+0xd4/0xd8 [ 20.720455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.720494] kasan_atomics+0xb8/0x2e0 [ 20.720531] kunit_try_run_case+0x170/0x3f0 [ 20.720573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.720620] kthread+0x328/0x630 [ 20.720914] ret_from_fork+0x10/0x20 [ 20.721036] [ 20.721202] The buggy address belongs to the object at fff00000c7a67680 [ 20.721202] which belongs to the cache kmalloc-64 of size 64 [ 20.721498] The buggy address is located 0 bytes to the right of [ 20.721498] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.721594] [ 20.722025] The buggy address belongs to the physical page: [ 20.722088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.722354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.722698] page_type: f5(slab) [ 20.722768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.723228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.723301] page dumped because: kasan: bad access detected [ 20.723620] [ 20.723678] Memory state around the buggy address: [ 20.723765] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.724073] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.724149] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.724370] ^ [ 20.724577] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.724631] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.724830] ================================================================== [ 20.850515] ================================================================== [ 20.850560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.850847] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.850926] [ 20.851067] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.851177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.851209] Hardware name: linux,dummy-virt (DT) [ 20.851243] Call trace: [ 20.851272] show_stack+0x20/0x38 (C) [ 20.851324] dump_stack_lvl+0x8c/0xd0 [ 20.851390] print_report+0x118/0x608 [ 20.851488] kasan_report+0xdc/0x128 [ 20.851553] __asan_report_load8_noabort+0x20/0x30 [ 20.851606] kasan_atomics_helper+0x3f04/0x4858 [ 20.851654] kasan_atomics+0x198/0x2e0 [ 20.851701] kunit_try_run_case+0x170/0x3f0 [ 20.851789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.851867] kthread+0x328/0x630 [ 20.852009] ret_from_fork+0x10/0x20 [ 20.852289] [ 20.852312] Allocated by task 267: [ 20.852438] kasan_save_stack+0x3c/0x68 [ 20.852599] kasan_save_track+0x20/0x40 [ 20.852647] kasan_save_alloc_info+0x40/0x58 [ 20.852688] __kasan_kmalloc+0xd4/0xd8 [ 20.852731] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.852776] kasan_atomics+0xb8/0x2e0 [ 20.852812] kunit_try_run_case+0x170/0x3f0 [ 20.852868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.853059] kthread+0x328/0x630 [ 20.853099] ret_from_fork+0x10/0x20 [ 20.853137] [ 20.853159] The buggy address belongs to the object at fff00000c7a67680 [ 20.853159] which belongs to the cache kmalloc-64 of size 64 [ 20.853220] The buggy address is located 0 bytes to the right of [ 20.853220] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.853289] [ 20.853310] The buggy address belongs to the physical page: [ 20.853453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.853609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.853704] page_type: f5(slab) [ 20.853871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.854131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.854374] page dumped because: kasan: bad access detected [ 20.854593] [ 20.854661] Memory state around the buggy address: [ 20.854696] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.854746] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.854936] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.855138] ^ [ 20.855229] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.855330] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.855463] ================================================================== [ 20.900699] ================================================================== [ 20.900749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.900798] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.900851] [ 20.900895] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.900980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.901127] Hardware name: linux,dummy-virt (DT) [ 20.901167] Call trace: [ 20.901191] show_stack+0x20/0x38 (C) [ 20.901497] dump_stack_lvl+0x8c/0xd0 [ 20.901567] print_report+0x118/0x608 [ 20.901617] kasan_report+0xdc/0x128 [ 20.901663] __asan_report_load8_noabort+0x20/0x30 [ 20.901815] kasan_atomics_helper+0x3e10/0x4858 [ 20.902037] kasan_atomics+0x198/0x2e0 [ 20.902100] kunit_try_run_case+0x170/0x3f0 [ 20.902151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.902208] kthread+0x328/0x630 [ 20.902305] ret_from_fork+0x10/0x20 [ 20.902438] [ 20.902486] Allocated by task 267: [ 20.902562] kasan_save_stack+0x3c/0x68 [ 20.902604] kasan_save_track+0x20/0x40 [ 20.902641] kasan_save_alloc_info+0x40/0x58 [ 20.902682] __kasan_kmalloc+0xd4/0xd8 [ 20.902717] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.902792] kasan_atomics+0xb8/0x2e0 [ 20.902828] kunit_try_run_case+0x170/0x3f0 [ 20.902881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.903055] kthread+0x328/0x630 [ 20.903257] ret_from_fork+0x10/0x20 [ 20.903314] [ 20.903336] The buggy address belongs to the object at fff00000c7a67680 [ 20.903336] which belongs to the cache kmalloc-64 of size 64 [ 20.903397] The buggy address is located 0 bytes to the right of [ 20.903397] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.903465] [ 20.903487] The buggy address belongs to the physical page: [ 20.903519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.903694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.903762] page_type: f5(slab) [ 20.903819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.903900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.903949] page dumped because: kasan: bad access detected [ 20.903982] [ 20.904005] Memory state around the buggy address: [ 20.904060] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.904110] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.904270] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.904452] ^ [ 20.904538] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.904585] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.904641] ================================================================== [ 20.869635] ================================================================== [ 20.869687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.869763] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.869872] [ 20.869920] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.870008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.870038] Hardware name: linux,dummy-virt (DT) [ 20.870071] Call trace: [ 20.870095] show_stack+0x20/0x38 (C) [ 20.870182] dump_stack_lvl+0x8c/0xd0 [ 20.870339] print_report+0x118/0x608 [ 20.870413] kasan_report+0xdc/0x128 [ 20.870539] kasan_check_range+0x100/0x1a8 [ 20.870635] __kasan_check_write+0x20/0x30 [ 20.870757] kasan_atomics_helper+0x154c/0x4858 [ 20.870832] kasan_atomics+0x198/0x2e0 [ 20.870931] kunit_try_run_case+0x170/0x3f0 [ 20.870987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.871071] kthread+0x328/0x630 [ 20.871119] ret_from_fork+0x10/0x20 [ 20.871179] [ 20.871227] Allocated by task 267: [ 20.871264] kasan_save_stack+0x3c/0x68 [ 20.871424] kasan_save_track+0x20/0x40 [ 20.871465] kasan_save_alloc_info+0x40/0x58 [ 20.871504] __kasan_kmalloc+0xd4/0xd8 [ 20.871663] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.871710] kasan_atomics+0xb8/0x2e0 [ 20.871804] kunit_try_run_case+0x170/0x3f0 [ 20.871846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.872073] kthread+0x328/0x630 [ 20.872315] ret_from_fork+0x10/0x20 [ 20.872515] [ 20.872623] The buggy address belongs to the object at fff00000c7a67680 [ 20.872623] which belongs to the cache kmalloc-64 of size 64 [ 20.872687] The buggy address is located 0 bytes to the right of [ 20.872687] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.872826] [ 20.872871] The buggy address belongs to the physical page: [ 20.872905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.873020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.873211] page_type: f5(slab) [ 20.873337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.873446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.873493] page dumped because: kasan: bad access detected [ 20.873703] [ 20.873725] Memory state around the buggy address: [ 20.873758] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.873807] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.873863] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.873908] ^ [ 20.873942] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.874098] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.874224] ================================================================== [ 20.783333] ================================================================== [ 20.783385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.783790] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.783968] [ 20.784022] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.784117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.784148] Hardware name: linux,dummy-virt (DT) [ 20.784298] Call trace: [ 20.784522] show_stack+0x20/0x38 (C) [ 20.784878] dump_stack_lvl+0x8c/0xd0 [ 20.785032] print_report+0x118/0x608 [ 20.785174] kasan_report+0xdc/0x128 [ 20.785227] kasan_check_range+0x100/0x1a8 [ 20.785697] __kasan_check_write+0x20/0x30 [ 20.785764] kasan_atomics_helper+0xf88/0x4858 [ 20.785945] kasan_atomics+0x198/0x2e0 [ 20.786060] kunit_try_run_case+0x170/0x3f0 [ 20.786117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.786443] kthread+0x328/0x630 [ 20.786567] ret_from_fork+0x10/0x20 [ 20.787118] [ 20.787204] Allocated by task 267: [ 20.787391] kasan_save_stack+0x3c/0x68 [ 20.787492] kasan_save_track+0x20/0x40 [ 20.787538] kasan_save_alloc_info+0x40/0x58 [ 20.787948] __kasan_kmalloc+0xd4/0xd8 [ 20.788049] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.788354] kasan_atomics+0xb8/0x2e0 [ 20.788469] kunit_try_run_case+0x170/0x3f0 [ 20.788595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.788759] kthread+0x328/0x630 [ 20.788917] ret_from_fork+0x10/0x20 [ 20.788982] [ 20.789006] The buggy address belongs to the object at fff00000c7a67680 [ 20.789006] which belongs to the cache kmalloc-64 of size 64 [ 20.789076] The buggy address is located 0 bytes to the right of [ 20.789076] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.789450] [ 20.789507] The buggy address belongs to the physical page: [ 20.789576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.790025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.790120] page_type: f5(slab) [ 20.790163] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.790486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.790659] page dumped because: kasan: bad access detected [ 20.790836] [ 20.790932] Memory state around the buggy address: [ 20.791053] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.791103] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.791405] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.791893] ^ [ 20.791961] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.792125] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.792170] ================================================================== [ 20.889069] ================================================================== [ 20.889120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.889382] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.889437] [ 20.889587] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.889712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.889814] Hardware name: linux,dummy-virt (DT) [ 20.889848] Call trace: [ 20.889935] show_stack+0x20/0x38 (C) [ 20.890037] dump_stack_lvl+0x8c/0xd0 [ 20.890121] print_report+0x118/0x608 [ 20.890217] kasan_report+0xdc/0x128 [ 20.890432] __asan_report_load8_noabort+0x20/0x30 [ 20.890484] kasan_atomics_helper+0x3df4/0x4858 [ 20.890533] kasan_atomics+0x198/0x2e0 [ 20.890596] kunit_try_run_case+0x170/0x3f0 [ 20.890673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.890826] kthread+0x328/0x630 [ 20.891086] ret_from_fork+0x10/0x20 [ 20.891290] [ 20.891312] Allocated by task 267: [ 20.891343] kasan_save_stack+0x3c/0x68 [ 20.891532] kasan_save_track+0x20/0x40 [ 20.891675] kasan_save_alloc_info+0x40/0x58 [ 20.891719] __kasan_kmalloc+0xd4/0xd8 [ 20.891775] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.891954] kasan_atomics+0xb8/0x2e0 [ 20.892048] kunit_try_run_case+0x170/0x3f0 [ 20.892150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.892199] kthread+0x328/0x630 [ 20.892236] ret_from_fork+0x10/0x20 [ 20.892506] [ 20.892532] The buggy address belongs to the object at fff00000c7a67680 [ 20.892532] which belongs to the cache kmalloc-64 of size 64 [ 20.892594] The buggy address is located 0 bytes to the right of [ 20.892594] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.892682] [ 20.892750] The buggy address belongs to the physical page: [ 20.892911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.892973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.893039] page_type: f5(slab) [ 20.893081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.893139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.893190] page dumped because: kasan: bad access detected [ 20.893239] [ 20.893260] Memory state around the buggy address: [ 20.893293] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.893342] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.893400] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.893454] ^ [ 20.893489] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.893546] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.893600] ================================================================== [ 20.879413] ================================================================== [ 20.879462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.879510] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.879564] [ 20.879593] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.879733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.879840] Hardware name: linux,dummy-virt (DT) [ 20.879897] Call trace: [ 20.879922] show_stack+0x20/0x38 (C) [ 20.879987] dump_stack_lvl+0x8c/0xd0 [ 20.880073] print_report+0x118/0x608 [ 20.880142] kasan_report+0xdc/0x128 [ 20.880238] __asan_report_load8_noabort+0x20/0x30 [ 20.880525] kasan_atomics_helper+0x3db0/0x4858 [ 20.880705] kasan_atomics+0x198/0x2e0 [ 20.880789] kunit_try_run_case+0x170/0x3f0 [ 20.880939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.881033] kthread+0x328/0x630 [ 20.881162] ret_from_fork+0x10/0x20 [ 20.881271] [ 20.881393] Allocated by task 267: [ 20.881461] kasan_save_stack+0x3c/0x68 [ 20.881564] kasan_save_track+0x20/0x40 [ 20.881763] kasan_save_alloc_info+0x40/0x58 [ 20.881825] __kasan_kmalloc+0xd4/0xd8 [ 20.881870] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.882086] kasan_atomics+0xb8/0x2e0 [ 20.882121] kunit_try_run_case+0x170/0x3f0 [ 20.882164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.882331] kthread+0x328/0x630 [ 20.882619] ret_from_fork+0x10/0x20 [ 20.882705] [ 20.882781] The buggy address belongs to the object at fff00000c7a67680 [ 20.882781] which belongs to the cache kmalloc-64 of size 64 [ 20.883314] The buggy address is located 0 bytes to the right of [ 20.883314] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.883429] [ 20.883513] The buggy address belongs to the physical page: [ 20.883693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.883778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.883830] page_type: f5(slab) [ 20.883878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.883935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.883982] page dumped because: kasan: bad access detected [ 20.884016] [ 20.884037] Memory state around the buggy address: [ 20.884082] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.884182] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.884229] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.884273] ^ [ 20.884309] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.884365] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.884408] ================================================================== [ 20.828476] ================================================================== [ 20.828527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.828584] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.828784] [ 20.828818] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.829224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.829443] Hardware name: linux,dummy-virt (DT) [ 20.829490] Call trace: [ 20.829514] show_stack+0x20/0x38 (C) [ 20.829566] dump_stack_lvl+0x8c/0xd0 [ 20.829617] print_report+0x118/0x608 [ 20.829662] kasan_report+0xdc/0x128 [ 20.830138] kasan_check_range+0x100/0x1a8 [ 20.830252] __kasan_check_write+0x20/0x30 [ 20.830302] kasan_atomics_helper+0x11f8/0x4858 [ 20.830350] kasan_atomics+0x198/0x2e0 [ 20.830396] kunit_try_run_case+0x170/0x3f0 [ 20.830446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.830502] kthread+0x328/0x630 [ 20.830549] ret_from_fork+0x10/0x20 [ 20.830597] [ 20.830618] Allocated by task 267: [ 20.830647] kasan_save_stack+0x3c/0x68 [ 20.830688] kasan_save_track+0x20/0x40 [ 20.830725] kasan_save_alloc_info+0x40/0x58 [ 20.830777] __kasan_kmalloc+0xd4/0xd8 [ 20.830814] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.830866] kasan_atomics+0xb8/0x2e0 [ 20.830901] kunit_try_run_case+0x170/0x3f0 [ 20.830983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.831064] kthread+0x328/0x630 [ 20.831290] ret_from_fork+0x10/0x20 [ 20.831392] [ 20.831417] The buggy address belongs to the object at fff00000c7a67680 [ 20.831417] which belongs to the cache kmalloc-64 of size 64 [ 20.831507] The buggy address is located 0 bytes to the right of [ 20.831507] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.831607] [ 20.831695] The buggy address belongs to the physical page: [ 20.831730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.831833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.831905] page_type: f5(slab) [ 20.832023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.832137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.832325] page dumped because: kasan: bad access detected [ 20.832361] [ 20.832382] Memory state around the buggy address: [ 20.832673] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.832735] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.832783] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.832827] ^ [ 20.832902] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.832989] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.833134] ================================================================== [ 20.909623] ================================================================== [ 20.909676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.909779] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.909832] [ 20.909877] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.910056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.910184] Hardware name: linux,dummy-virt (DT) [ 20.910219] Call trace: [ 20.910241] show_stack+0x20/0x38 (C) [ 20.910294] dump_stack_lvl+0x8c/0xd0 [ 20.910342] print_report+0x118/0x608 [ 20.910391] kasan_report+0xdc/0x128 [ 20.910438] __asan_report_load8_noabort+0x20/0x30 [ 20.910488] kasan_atomics_helper+0x3e20/0x4858 [ 20.910651] kasan_atomics+0x198/0x2e0 [ 20.910707] kunit_try_run_case+0x170/0x3f0 [ 20.910759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.910851] kthread+0x328/0x630 [ 20.911038] ret_from_fork+0x10/0x20 [ 20.911127] [ 20.911254] Allocated by task 267: [ 20.911290] kasan_save_stack+0x3c/0x68 [ 20.911332] kasan_save_track+0x20/0x40 [ 20.911370] kasan_save_alloc_info+0x40/0x58 [ 20.911411] __kasan_kmalloc+0xd4/0xd8 [ 20.911448] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.911487] kasan_atomics+0xb8/0x2e0 [ 20.911523] kunit_try_run_case+0x170/0x3f0 [ 20.911582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.911739] kthread+0x328/0x630 [ 20.911951] ret_from_fork+0x10/0x20 [ 20.911998] [ 20.912019] The buggy address belongs to the object at fff00000c7a67680 [ 20.912019] which belongs to the cache kmalloc-64 of size 64 [ 20.912080] The buggy address is located 0 bytes to the right of [ 20.912080] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.912149] [ 20.912171] The buggy address belongs to the physical page: [ 20.912204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.912258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.912310] page_type: f5(slab) [ 20.912349] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.912405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.912451] page dumped because: kasan: bad access detected [ 20.912486] [ 20.912507] Memory state around the buggy address: [ 20.912540] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.912588] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.912636] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.912679] ^ [ 20.912713] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.912761] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.912804] ================================================================== [ 20.893817] ================================================================== [ 20.893880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.893954] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.894251] [ 20.894291] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.894378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.894431] Hardware name: linux,dummy-virt (DT) [ 20.894463] Call trace: [ 20.894487] show_stack+0x20/0x38 (C) [ 20.894552] dump_stack_lvl+0x8c/0xd0 [ 20.894604] print_report+0x118/0x608 [ 20.894651] kasan_report+0xdc/0x128 [ 20.894696] kasan_check_range+0x100/0x1a8 [ 20.894943] __kasan_check_write+0x20/0x30 [ 20.895002] kasan_atomics_helper+0x16d0/0x4858 [ 20.895087] kasan_atomics+0x198/0x2e0 [ 20.895165] kunit_try_run_case+0x170/0x3f0 [ 20.895325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.895556] kthread+0x328/0x630 [ 20.895611] ret_from_fork+0x10/0x20 [ 20.895716] [ 20.895764] Allocated by task 267: [ 20.895954] kasan_save_stack+0x3c/0x68 [ 20.896076] kasan_save_track+0x20/0x40 [ 20.896117] kasan_save_alloc_info+0x40/0x58 [ 20.896157] __kasan_kmalloc+0xd4/0xd8 [ 20.896333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.896373] kasan_atomics+0xb8/0x2e0 [ 20.896410] kunit_try_run_case+0x170/0x3f0 [ 20.896450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.896704] kthread+0x328/0x630 [ 20.896839] ret_from_fork+0x10/0x20 [ 20.896997] [ 20.897114] The buggy address belongs to the object at fff00000c7a67680 [ 20.897114] which belongs to the cache kmalloc-64 of size 64 [ 20.897253] The buggy address is located 0 bytes to the right of [ 20.897253] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.897694] [ 20.897793] The buggy address belongs to the physical page: [ 20.897944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.898050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.898342] page_type: f5(slab) [ 20.898387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.898540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.898745] page dumped because: kasan: bad access detected [ 20.898897] [ 20.898918] Memory state around the buggy address: [ 20.898951] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.899006] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.899400] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.899536] ^ [ 20.899573] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.899721] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.900023] ================================================================== [ 20.732369] ================================================================== [ 20.732422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.732475] Read of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.732537] [ 20.732567] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.732651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.732690] Hardware name: linux,dummy-virt (DT) [ 20.732724] Call trace: [ 20.732747] show_stack+0x20/0x38 (C) [ 20.732805] dump_stack_lvl+0x8c/0xd0 [ 20.732867] print_report+0x118/0x608 [ 20.732913] kasan_report+0xdc/0x128 [ 20.732960] __asan_report_load4_noabort+0x20/0x30 [ 20.733011] kasan_atomics_helper+0x3e04/0x4858 [ 20.733059] kasan_atomics+0x198/0x2e0 [ 20.733105] kunit_try_run_case+0x170/0x3f0 [ 20.733904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.734012] kthread+0x328/0x630 [ 20.734064] ret_from_fork+0x10/0x20 [ 20.734325] [ 20.734361] Allocated by task 267: [ 20.734411] kasan_save_stack+0x3c/0x68 [ 20.734521] kasan_save_track+0x20/0x40 [ 20.734578] kasan_save_alloc_info+0x40/0x58 [ 20.734619] __kasan_kmalloc+0xd4/0xd8 [ 20.734658] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.734960] kasan_atomics+0xb8/0x2e0 [ 20.735042] kunit_try_run_case+0x170/0x3f0 [ 20.735087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.735403] kthread+0x328/0x630 [ 20.735531] ret_from_fork+0x10/0x20 [ 20.735575] [ 20.735597] The buggy address belongs to the object at fff00000c7a67680 [ 20.735597] which belongs to the cache kmalloc-64 of size 64 [ 20.735684] The buggy address is located 0 bytes to the right of [ 20.735684] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.735989] [ 20.736086] The buggy address belongs to the physical page: [ 20.736405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.736594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.736662] page_type: f5(slab) [ 20.736879] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.736951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.737148] page dumped because: kasan: bad access detected [ 20.737274] [ 20.737437] Memory state around the buggy address: [ 20.737684] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.737740] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.737804] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.738116] ^ [ 20.738185] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.738507] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.738582] ================================================================== [ 20.865579] ================================================================== [ 20.865637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.865688] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.865741] [ 20.865770] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.865876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.865915] Hardware name: linux,dummy-virt (DT) [ 20.865948] Call trace: [ 20.865983] show_stack+0x20/0x38 (C) [ 20.866033] dump_stack_lvl+0x8c/0xd0 [ 20.866089] print_report+0x118/0x608 [ 20.866137] kasan_report+0xdc/0x128 [ 20.866181] kasan_check_range+0x100/0x1a8 [ 20.866231] __kasan_check_write+0x20/0x30 [ 20.866278] kasan_atomics_helper+0x14e4/0x4858 [ 20.866326] kasan_atomics+0x198/0x2e0 [ 20.866371] kunit_try_run_case+0x170/0x3f0 [ 20.866419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.866483] kthread+0x328/0x630 [ 20.866529] ret_from_fork+0x10/0x20 [ 20.866583] [ 20.866609] Allocated by task 267: [ 20.866644] kasan_save_stack+0x3c/0x68 [ 20.866684] kasan_save_track+0x20/0x40 [ 20.866724] kasan_save_alloc_info+0x40/0x58 [ 20.866763] __kasan_kmalloc+0xd4/0xd8 [ 20.866800] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.866839] kasan_atomics+0xb8/0x2e0 [ 20.866886] kunit_try_run_case+0x170/0x3f0 [ 20.866925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.866973] kthread+0x328/0x630 [ 20.867010] ret_from_fork+0x10/0x20 [ 20.867048] [ 20.867068] The buggy address belongs to the object at fff00000c7a67680 [ 20.867068] which belongs to the cache kmalloc-64 of size 64 [ 20.867131] The buggy address is located 0 bytes to the right of [ 20.867131] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.867204] [ 20.867249] The buggy address belongs to the physical page: [ 20.867592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.867662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.867817] page_type: f5(slab) [ 20.867878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.868019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.868181] page dumped because: kasan: bad access detected [ 20.868347] [ 20.868436] Memory state around the buggy address: [ 20.868578] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.868644] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.868804] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.868878] ^ [ 20.868913] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.868962] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869003] ================================================================== [ 20.834095] ================================================================== [ 20.834210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.834264] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.834316] [ 20.834437] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.834577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.834623] Hardware name: linux,dummy-virt (DT) [ 20.835018] Call trace: [ 20.835085] show_stack+0x20/0x38 (C) [ 20.835219] dump_stack_lvl+0x8c/0xd0 [ 20.835370] print_report+0x118/0x608 [ 20.835435] kasan_report+0xdc/0x128 [ 20.835509] kasan_check_range+0x100/0x1a8 [ 20.835628] __kasan_check_write+0x20/0x30 [ 20.835695] kasan_atomics_helper+0x126c/0x4858 [ 20.835750] kasan_atomics+0x198/0x2e0 [ 20.835802] kunit_try_run_case+0x170/0x3f0 [ 20.835864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.835928] kthread+0x328/0x630 [ 20.836005] ret_from_fork+0x10/0x20 [ 20.836065] [ 20.836087] Allocated by task 267: [ 20.836117] kasan_save_stack+0x3c/0x68 [ 20.836185] kasan_save_track+0x20/0x40 [ 20.836224] kasan_save_alloc_info+0x40/0x58 [ 20.836266] __kasan_kmalloc+0xd4/0xd8 [ 20.836617] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.836731] kasan_atomics+0xb8/0x2e0 [ 20.836847] kunit_try_run_case+0x170/0x3f0 [ 20.836980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.837214] kthread+0x328/0x630 [ 20.837331] ret_from_fork+0x10/0x20 [ 20.837375] [ 20.837399] The buggy address belongs to the object at fff00000c7a67680 [ 20.837399] which belongs to the cache kmalloc-64 of size 64 [ 20.837538] The buggy address is located 0 bytes to the right of [ 20.837538] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.837627] [ 20.837725] The buggy address belongs to the physical page: [ 20.837800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.837976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.838160] page_type: f5(slab) [ 20.838261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.838317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.838363] page dumped because: kasan: bad access detected [ 20.838704] [ 20.838770] Memory state around the buggy address: [ 20.838892] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.839037] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.839293] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.839363] ^ [ 20.839616] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.839778] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.839821] ================================================================== [ 20.793650] ================================================================== [ 20.794129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.794209] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.794262] [ 20.794296] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.794472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.794506] Hardware name: linux,dummy-virt (DT) [ 20.794540] Call trace: [ 20.794565] show_stack+0x20/0x38 (C) [ 20.794661] dump_stack_lvl+0x8c/0xd0 [ 20.794735] print_report+0x118/0x608 [ 20.794782] kasan_report+0xdc/0x128 [ 20.794838] kasan_check_range+0x100/0x1a8 [ 20.794898] __kasan_check_write+0x20/0x30 [ 20.794948] kasan_atomics_helper+0xff0/0x4858 [ 20.795012] kasan_atomics+0x198/0x2e0 [ 20.795064] kunit_try_run_case+0x170/0x3f0 [ 20.795116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.795179] kthread+0x328/0x630 [ 20.795225] ret_from_fork+0x10/0x20 [ 20.795275] [ 20.795304] Allocated by task 267: [ 20.795334] kasan_save_stack+0x3c/0x68 [ 20.795375] kasan_save_track+0x20/0x40 [ 20.795412] kasan_save_alloc_info+0x40/0x58 [ 20.795453] __kasan_kmalloc+0xd4/0xd8 [ 20.795489] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.795531] kasan_atomics+0xb8/0x2e0 [ 20.795575] kunit_try_run_case+0x170/0x3f0 [ 20.795616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.795663] kthread+0x328/0x630 [ 20.795710] ret_from_fork+0x10/0x20 [ 20.795749] [ 20.795771] The buggy address belongs to the object at fff00000c7a67680 [ 20.795771] which belongs to the cache kmalloc-64 of size 64 [ 20.795831] The buggy address is located 0 bytes to the right of [ 20.795831] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.796555] [ 20.796601] The buggy address belongs to the physical page: [ 20.796653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.796953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.797026] page_type: f5(slab) [ 20.797069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.797403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.797743] page dumped because: kasan: bad access detected [ 20.797786] [ 20.797831] Memory state around the buggy address: [ 20.798177] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.798397] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.798592] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.798747] ^ [ 20.798792] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.798840] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.799174] ================================================================== [ 20.840435] ================================================================== [ 20.840484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.840532] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.840584] [ 20.840614] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.840698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.840755] Hardware name: linux,dummy-virt (DT) [ 20.840789] Call trace: [ 20.840839] show_stack+0x20/0x38 (C) [ 20.840906] dump_stack_lvl+0x8c/0xd0 [ 20.840991] print_report+0x118/0x608 [ 20.841084] kasan_report+0xdc/0x128 [ 20.841159] kasan_check_range+0x100/0x1a8 [ 20.841460] __kasan_check_write+0x20/0x30 [ 20.841531] kasan_atomics_helper+0x12d8/0x4858 [ 20.841831] kasan_atomics+0x198/0x2e0 [ 20.842020] kunit_try_run_case+0x170/0x3f0 [ 20.842072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.842128] kthread+0x328/0x630 [ 20.842199] ret_from_fork+0x10/0x20 [ 20.842605] [ 20.842632] Allocated by task 267: [ 20.842680] kasan_save_stack+0x3c/0x68 [ 20.842742] kasan_save_track+0x20/0x40 [ 20.842893] kasan_save_alloc_info+0x40/0x58 [ 20.842983] __kasan_kmalloc+0xd4/0xd8 [ 20.843024] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.843064] kasan_atomics+0xb8/0x2e0 [ 20.843142] kunit_try_run_case+0x170/0x3f0 [ 20.843306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.843391] kthread+0x328/0x630 [ 20.843525] ret_from_fork+0x10/0x20 [ 20.843592] [ 20.843670] The buggy address belongs to the object at fff00000c7a67680 [ 20.843670] which belongs to the cache kmalloc-64 of size 64 [ 20.843821] The buggy address is located 0 bytes to the right of [ 20.843821] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.843901] [ 20.843924] The buggy address belongs to the physical page: [ 20.843958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.844077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.844149] page_type: f5(slab) [ 20.844189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.844247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.844293] page dumped because: kasan: bad access detected [ 20.844347] [ 20.844368] Memory state around the buggy address: [ 20.844402] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.844450] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.844496] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.844539] ^ [ 20.844655] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.844700] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.844743] ================================================================== [ 20.874949] ================================================================== [ 20.875010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.875060] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.875257] [ 20.875345] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.875488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.875646] Hardware name: linux,dummy-virt (DT) [ 20.875682] Call trace: [ 20.875707] show_stack+0x20/0x38 (C) [ 20.875759] dump_stack_lvl+0x8c/0xd0 [ 20.876517] print_report+0x118/0x608 [ 20.876578] kasan_report+0xdc/0x128 [ 20.876625] kasan_check_range+0x100/0x1a8 [ 20.876674] __kasan_check_write+0x20/0x30 [ 20.876722] kasan_atomics_helper+0x15b4/0x4858 [ 20.876772] kasan_atomics+0x198/0x2e0 [ 20.876817] kunit_try_run_case+0x170/0x3f0 [ 20.876878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.876934] kthread+0x328/0x630 [ 20.876980] ret_from_fork+0x10/0x20 [ 20.877030] [ 20.877050] Allocated by task 267: [ 20.877081] kasan_save_stack+0x3c/0x68 [ 20.877121] kasan_save_track+0x20/0x40 [ 20.877160] kasan_save_alloc_info+0x40/0x58 [ 20.877199] __kasan_kmalloc+0xd4/0xd8 [ 20.877237] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.877276] kasan_atomics+0xb8/0x2e0 [ 20.877313] kunit_try_run_case+0x170/0x3f0 [ 20.877353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.877400] kthread+0x328/0x630 [ 20.877437] ret_from_fork+0x10/0x20 [ 20.877476] [ 20.877496] The buggy address belongs to the object at fff00000c7a67680 [ 20.877496] which belongs to the cache kmalloc-64 of size 64 [ 20.877558] The buggy address is located 0 bytes to the right of [ 20.877558] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.877626] [ 20.877647] The buggy address belongs to the physical page: [ 20.877680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.877734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.877784] page_type: f5(slab) [ 20.877824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.877946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.878013] page dumped because: kasan: bad access detected [ 20.878061] [ 20.878099] Memory state around the buggy address: [ 20.878132] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.878235] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.878322] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.878373] ^ [ 20.878579] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.878683] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.878808] ================================================================== [ 20.861059] ================================================================== [ 20.861113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.861161] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.861214] [ 20.861411] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.861614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.861689] Hardware name: linux,dummy-virt (DT) [ 20.861793] Call trace: [ 20.861818] show_stack+0x20/0x38 (C) [ 20.861912] dump_stack_lvl+0x8c/0xd0 [ 20.862007] print_report+0x118/0x608 [ 20.862082] kasan_report+0xdc/0x128 [ 20.862163] kasan_check_range+0x100/0x1a8 [ 20.862229] __kasan_check_write+0x20/0x30 [ 20.862301] kasan_atomics_helper+0x147c/0x4858 [ 20.862376] kasan_atomics+0x198/0x2e0 [ 20.862432] kunit_try_run_case+0x170/0x3f0 [ 20.862482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.862537] kthread+0x328/0x630 [ 20.862584] ret_from_fork+0x10/0x20 [ 20.862979] [ 20.863026] Allocated by task 267: [ 20.863060] kasan_save_stack+0x3c/0x68 [ 20.863172] kasan_save_track+0x20/0x40 [ 20.863248] kasan_save_alloc_info+0x40/0x58 [ 20.863289] __kasan_kmalloc+0xd4/0xd8 [ 20.863327] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.863366] kasan_atomics+0xb8/0x2e0 [ 20.863404] kunit_try_run_case+0x170/0x3f0 [ 20.863465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.863554] kthread+0x328/0x630 [ 20.863596] ret_from_fork+0x10/0x20 [ 20.863636] [ 20.863657] The buggy address belongs to the object at fff00000c7a67680 [ 20.863657] which belongs to the cache kmalloc-64 of size 64 [ 20.863775] The buggy address is located 0 bytes to the right of [ 20.863775] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.863924] [ 20.864003] The buggy address belongs to the physical page: [ 20.864066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.864121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.864236] page_type: f5(slab) [ 20.864372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.864477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.864524] page dumped because: kasan: bad access detected [ 20.864559] [ 20.864752] Memory state around the buggy address: [ 20.864787] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.864835] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.864895] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.865039] ^ [ 20.865169] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.865289] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.865347] ================================================================== [ 20.749598] ================================================================== [ 20.749654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.749803] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.749873] [ 20.750155] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.750270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.750385] Hardware name: linux,dummy-virt (DT) [ 20.750441] Call trace: [ 20.750467] show_stack+0x20/0x38 (C) [ 20.750583] dump_stack_lvl+0x8c/0xd0 [ 20.750659] print_report+0x118/0x608 [ 20.750771] kasan_report+0xdc/0x128 [ 20.750822] __asan_report_load8_noabort+0x20/0x30 [ 20.750885] kasan_atomics_helper+0x3f58/0x4858 [ 20.751291] kasan_atomics+0x198/0x2e0 [ 20.751413] kunit_try_run_case+0x170/0x3f0 [ 20.751477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.751652] kthread+0x328/0x630 [ 20.751715] ret_from_fork+0x10/0x20 [ 20.751847] [ 20.751882] Allocated by task 267: [ 20.751990] kasan_save_stack+0x3c/0x68 [ 20.752160] kasan_save_track+0x20/0x40 [ 20.752340] kasan_save_alloc_info+0x40/0x58 [ 20.752414] __kasan_kmalloc+0xd4/0xd8 [ 20.752452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.752522] kasan_atomics+0xb8/0x2e0 [ 20.752560] kunit_try_run_case+0x170/0x3f0 [ 20.752602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.752649] kthread+0x328/0x630 [ 20.752688] ret_from_fork+0x10/0x20 [ 20.752741] [ 20.752769] The buggy address belongs to the object at fff00000c7a67680 [ 20.752769] which belongs to the cache kmalloc-64 of size 64 [ 20.752838] The buggy address is located 0 bytes to the right of [ 20.752838] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.752930] [ 20.752969] The buggy address belongs to the physical page: [ 20.753019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.753075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.753126] page_type: f5(slab) [ 20.753180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.753237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.753283] page dumped because: kasan: bad access detected [ 20.753326] [ 20.753345] Memory state around the buggy address: [ 20.753378] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.753436] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.753482] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.753525] ^ [ 20.753561] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.753616] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.753669] ================================================================== [ 20.913252] ================================================================== [ 20.913332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.913387] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.913439] [ 20.913524] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.913634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.913691] Hardware name: linux,dummy-virt (DT) [ 20.913725] Call trace: [ 20.913776] show_stack+0x20/0x38 (C) [ 20.913824] dump_stack_lvl+0x8c/0xd0 [ 20.913943] print_report+0x118/0x608 [ 20.913990] kasan_report+0xdc/0x128 [ 20.914038] kasan_check_range+0x100/0x1a8 [ 20.914086] __kasan_check_write+0x20/0x30 [ 20.914134] kasan_atomics_helper+0x17ec/0x4858 [ 20.914182] kasan_atomics+0x198/0x2e0 [ 20.914226] kunit_try_run_case+0x170/0x3f0 [ 20.914415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.914531] kthread+0x328/0x630 [ 20.914617] ret_from_fork+0x10/0x20 [ 20.914731] [ 20.914760] Allocated by task 267: [ 20.914947] kasan_save_stack+0x3c/0x68 [ 20.914994] kasan_save_track+0x20/0x40 [ 20.915057] kasan_save_alloc_info+0x40/0x58 [ 20.915291] __kasan_kmalloc+0xd4/0xd8 [ 20.915396] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.915578] kasan_atomics+0xb8/0x2e0 [ 20.915616] kunit_try_run_case+0x170/0x3f0 [ 20.915711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.915824] kthread+0x328/0x630 [ 20.915909] ret_from_fork+0x10/0x20 [ 20.916008] [ 20.916068] The buggy address belongs to the object at fff00000c7a67680 [ 20.916068] which belongs to the cache kmalloc-64 of size 64 [ 20.916137] The buggy address is located 0 bytes to the right of [ 20.916137] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.916211] [ 20.916235] The buggy address belongs to the physical page: [ 20.916267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.916506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.916557] page_type: f5(slab) [ 20.916596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.916937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.917172] page dumped because: kasan: bad access detected [ 20.917437] [ 20.917483] Memory state around the buggy address: [ 20.917682] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.917747] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.917928] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.918046] ^ [ 20.918125] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.918172] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.918215] ================================================================== [ 20.800436] ================================================================== [ 20.800558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.800651] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.800761] [ 20.800840] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.800951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.801257] Hardware name: linux,dummy-virt (DT) [ 20.801314] Call trace: [ 20.801340] show_stack+0x20/0x38 (C) [ 20.801394] dump_stack_lvl+0x8c/0xd0 [ 20.801708] print_report+0x118/0x608 [ 20.801788] kasan_report+0xdc/0x128 [ 20.801931] kasan_check_range+0x100/0x1a8 [ 20.802005] __kasan_check_write+0x20/0x30 [ 20.802129] kasan_atomics_helper+0x1058/0x4858 [ 20.802192] kasan_atomics+0x198/0x2e0 [ 20.802240] kunit_try_run_case+0x170/0x3f0 [ 20.802597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.802687] kthread+0x328/0x630 [ 20.803000] ret_from_fork+0x10/0x20 [ 20.803080] [ 20.803167] Allocated by task 267: [ 20.803228] kasan_save_stack+0x3c/0x68 [ 20.803271] kasan_save_track+0x20/0x40 [ 20.803372] kasan_save_alloc_info+0x40/0x58 [ 20.803416] __kasan_kmalloc+0xd4/0xd8 [ 20.803471] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.803518] kasan_atomics+0xb8/0x2e0 [ 20.803557] kunit_try_run_case+0x170/0x3f0 [ 20.803616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.803913] kthread+0x328/0x630 [ 20.803999] ret_from_fork+0x10/0x20 [ 20.804339] [ 20.804388] The buggy address belongs to the object at fff00000c7a67680 [ 20.804388] which belongs to the cache kmalloc-64 of size 64 [ 20.804540] The buggy address is located 0 bytes to the right of [ 20.804540] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.804634] [ 20.805037] The buggy address belongs to the physical page: [ 20.805115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.805520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.805681] page_type: f5(slab) [ 20.805738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.806197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.806484] page dumped because: kasan: bad access detected [ 20.807104] [ 20.807236] Memory state around the buggy address: [ 20.807324] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.807401] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.807746] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.808157] ^ [ 20.808237] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.808310] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.808465] ================================================================== [ 20.755257] ================================================================== [ 20.755410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.755518] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.755839] [ 20.755941] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.756032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.756294] Hardware name: linux,dummy-virt (DT) [ 20.756378] Call trace: [ 20.756427] show_stack+0x20/0x38 (C) [ 20.756707] dump_stack_lvl+0x8c/0xd0 [ 20.756799] print_report+0x118/0x608 [ 20.756990] kasan_report+0xdc/0x128 [ 20.757112] kasan_check_range+0x100/0x1a8 [ 20.757202] __kasan_check_write+0x20/0x30 [ 20.757377] kasan_atomics_helper+0xe44/0x4858 [ 20.757430] kasan_atomics+0x198/0x2e0 [ 20.757713] kunit_try_run_case+0x170/0x3f0 [ 20.757893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.758102] kthread+0x328/0x630 [ 20.758290] ret_from_fork+0x10/0x20 [ 20.758418] [ 20.758489] Allocated by task 267: [ 20.758569] kasan_save_stack+0x3c/0x68 [ 20.758742] kasan_save_track+0x20/0x40 [ 20.758804] kasan_save_alloc_info+0x40/0x58 [ 20.759102] __kasan_kmalloc+0xd4/0xd8 [ 20.759191] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.759474] kasan_atomics+0xb8/0x2e0 [ 20.759563] kunit_try_run_case+0x170/0x3f0 [ 20.759624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.759792] kthread+0x328/0x630 [ 20.759960] ret_from_fork+0x10/0x20 [ 20.760069] [ 20.760163] The buggy address belongs to the object at fff00000c7a67680 [ 20.760163] which belongs to the cache kmalloc-64 of size 64 [ 20.760276] The buggy address is located 0 bytes to the right of [ 20.760276] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.760438] [ 20.760474] The buggy address belongs to the physical page: [ 20.760507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.761020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.761118] page_type: f5(slab) [ 20.761447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.761575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.761634] page dumped because: kasan: bad access detected [ 20.761670] [ 20.761690] Memory state around the buggy address: [ 20.762120] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.762484] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.762550] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.762593] ^ [ 20.762657] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.762870] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.763037] ================================================================== [ 20.823129] ================================================================== [ 20.823332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.823439] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.823592] [ 20.823640] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.823730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.824431] Hardware name: linux,dummy-virt (DT) [ 20.824613] Call trace: [ 20.824670] show_stack+0x20/0x38 (C) [ 20.824789] dump_stack_lvl+0x8c/0xd0 [ 20.824994] print_report+0x118/0x608 [ 20.825085] kasan_report+0xdc/0x128 [ 20.825144] kasan_check_range+0x100/0x1a8 [ 20.825193] __kasan_check_write+0x20/0x30 [ 20.825243] kasan_atomics_helper+0x1190/0x4858 [ 20.825292] kasan_atomics+0x198/0x2e0 [ 20.825338] kunit_try_run_case+0x170/0x3f0 [ 20.826056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.826130] kthread+0x328/0x630 [ 20.826180] ret_from_fork+0x10/0x20 [ 20.826231] [ 20.826252] Allocated by task 267: [ 20.826283] kasan_save_stack+0x3c/0x68 [ 20.826324] kasan_save_track+0x20/0x40 [ 20.826363] kasan_save_alloc_info+0x40/0x58 [ 20.826402] __kasan_kmalloc+0xd4/0xd8 [ 20.826440] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.826479] kasan_atomics+0xb8/0x2e0 [ 20.826516] kunit_try_run_case+0x170/0x3f0 [ 20.826556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.826604] kthread+0x328/0x630 [ 20.826641] ret_from_fork+0x10/0x20 [ 20.826677] [ 20.826699] The buggy address belongs to the object at fff00000c7a67680 [ 20.826699] which belongs to the cache kmalloc-64 of size 64 [ 20.826760] The buggy address is located 0 bytes to the right of [ 20.826760] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.826828] [ 20.826851] The buggy address belongs to the physical page: [ 20.826896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.826951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.827001] page_type: f5(slab) [ 20.827042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.827099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.827151] page dumped because: kasan: bad access detected [ 20.827186] [ 20.827262] Memory state around the buggy address: [ 20.827433] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.827494] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.827541] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.827584] ^ [ 20.827689] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.827736] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.827809] ================================================================== [ 20.769952] ================================================================== [ 20.770229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.770305] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.770421] [ 20.770481] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.770600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.770634] Hardware name: linux,dummy-virt (DT) [ 20.770668] Call trace: [ 20.770691] show_stack+0x20/0x38 (C) [ 20.770756] dump_stack_lvl+0x8c/0xd0 [ 20.770919] print_report+0x118/0x608 [ 20.770982] kasan_report+0xdc/0x128 [ 20.771156] kasan_check_range+0x100/0x1a8 [ 20.771339] __kasan_check_write+0x20/0x30 [ 20.771506] kasan_atomics_helper+0xeb8/0x4858 [ 20.771617] kasan_atomics+0x198/0x2e0 [ 20.771669] kunit_try_run_case+0x170/0x3f0 [ 20.771768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.771829] kthread+0x328/0x630 [ 20.771946] ret_from_fork+0x10/0x20 [ 20.772147] [ 20.772178] Allocated by task 267: [ 20.772210] kasan_save_stack+0x3c/0x68 [ 20.772253] kasan_save_track+0x20/0x40 [ 20.772300] kasan_save_alloc_info+0x40/0x58 [ 20.772632] __kasan_kmalloc+0xd4/0xd8 [ 20.772718] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.772978] kasan_atomics+0xb8/0x2e0 [ 20.773037] kunit_try_run_case+0x170/0x3f0 [ 20.773392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.773487] kthread+0x328/0x630 [ 20.773909] ret_from_fork+0x10/0x20 [ 20.774253] [ 20.774353] The buggy address belongs to the object at fff00000c7a67680 [ 20.774353] which belongs to the cache kmalloc-64 of size 64 [ 20.774478] The buggy address is located 0 bytes to the right of [ 20.774478] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.774665] [ 20.774818] The buggy address belongs to the physical page: [ 20.774979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.775039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.775329] page_type: f5(slab) [ 20.775420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.775759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.775863] page dumped because: kasan: bad access detected [ 20.775927] [ 20.775948] Memory state around the buggy address: [ 20.775983] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.776038] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.776087] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.776239] ^ [ 20.776484] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.776552] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.776597] ================================================================== [ 20.764696] ================================================================== [ 20.764750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.764885] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.764968] [ 20.765070] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.765176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.765206] Hardware name: linux,dummy-virt (DT) [ 20.765240] Call trace: [ 20.765264] show_stack+0x20/0x38 (C) [ 20.765569] dump_stack_lvl+0x8c/0xd0 [ 20.765648] print_report+0x118/0x608 [ 20.765821] kasan_report+0xdc/0x128 [ 20.765895] __asan_report_store8_noabort+0x20/0x30 [ 20.765948] kasan_atomics_helper+0x3e5c/0x4858 [ 20.765998] kasan_atomics+0x198/0x2e0 [ 20.766045] kunit_try_run_case+0x170/0x3f0 [ 20.766097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.766154] kthread+0x328/0x630 [ 20.766204] ret_from_fork+0x10/0x20 [ 20.766255] [ 20.766293] Allocated by task 267: [ 20.766332] kasan_save_stack+0x3c/0x68 [ 20.766383] kasan_save_track+0x20/0x40 [ 20.766421] kasan_save_alloc_info+0x40/0x58 [ 20.766468] __kasan_kmalloc+0xd4/0xd8 [ 20.766515] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.766554] kasan_atomics+0xb8/0x2e0 [ 20.766591] kunit_try_run_case+0x170/0x3f0 [ 20.766632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.766683] kthread+0x328/0x630 [ 20.766729] ret_from_fork+0x10/0x20 [ 20.766768] [ 20.766790] The buggy address belongs to the object at fff00000c7a67680 [ 20.766790] which belongs to the cache kmalloc-64 of size 64 [ 20.766861] The buggy address is located 0 bytes to the right of [ 20.766861] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.766929] [ 20.766950] The buggy address belongs to the physical page: [ 20.766982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.767038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.767547] page_type: f5(slab) [ 20.767608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.767675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.768031] page dumped because: kasan: bad access detected [ 20.768083] [ 20.768103] Memory state around the buggy address: [ 20.768358] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.768424] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.768731] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.769039] ^ [ 20.769114] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.769283] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.769375] ================================================================== [ 20.813194] ================================================================== [ 20.813579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.813668] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.813808] [ 20.813840] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.813939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.813970] Hardware name: linux,dummy-virt (DT) [ 20.814003] Call trace: [ 20.814028] show_stack+0x20/0x38 (C) [ 20.814080] dump_stack_lvl+0x8c/0xd0 [ 20.814372] print_report+0x118/0x608 [ 20.814612] kasan_report+0xdc/0x128 [ 20.814821] kasan_check_range+0x100/0x1a8 [ 20.814953] __kasan_check_write+0x20/0x30 [ 20.815006] kasan_atomics_helper+0x1128/0x4858 [ 20.815057] kasan_atomics+0x198/0x2e0 [ 20.815387] kunit_try_run_case+0x170/0x3f0 [ 20.815485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.815552] kthread+0x328/0x630 [ 20.815895] ret_from_fork+0x10/0x20 [ 20.816127] [ 20.816198] Allocated by task 267: [ 20.816364] kasan_save_stack+0x3c/0x68 [ 20.816421] kasan_save_track+0x20/0x40 [ 20.816465] kasan_save_alloc_info+0x40/0x58 [ 20.816507] __kasan_kmalloc+0xd4/0xd8 [ 20.816543] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.816586] kasan_atomics+0xb8/0x2e0 [ 20.816622] kunit_try_run_case+0x170/0x3f0 [ 20.816993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.817471] kthread+0x328/0x630 [ 20.817602] ret_from_fork+0x10/0x20 [ 20.817801] [ 20.817981] The buggy address belongs to the object at fff00000c7a67680 [ 20.817981] which belongs to the cache kmalloc-64 of size 64 [ 20.818045] The buggy address is located 0 bytes to the right of [ 20.818045] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.818308] [ 20.818410] The buggy address belongs to the physical page: [ 20.818550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.818903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.818971] page_type: f5(slab) [ 20.819013] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.819725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.819805] page dumped because: kasan: bad access detected [ 20.819962] [ 20.820030] Memory state around the buggy address: [ 20.820232] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.820459] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.820532] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.820698] ^ [ 20.820787] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.821106] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.821188] ================================================================== [ 20.655762] ================================================================== [ 20.655816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.655880] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.655935] [ 20.655987] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.656077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.656108] Hardware name: linux,dummy-virt (DT) [ 20.656142] Call trace: [ 20.656167] show_stack+0x20/0x38 (C) [ 20.656217] dump_stack_lvl+0x8c/0xd0 [ 20.656265] print_report+0x118/0x608 [ 20.656313] kasan_report+0xdc/0x128 [ 20.656359] kasan_check_range+0x100/0x1a8 [ 20.656408] __kasan_check_write+0x20/0x30 [ 20.656456] kasan_atomics_helper+0xa6c/0x4858 [ 20.656505] kasan_atomics+0x198/0x2e0 [ 20.656551] kunit_try_run_case+0x170/0x3f0 [ 20.656601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.656667] kthread+0x328/0x630 [ 20.656725] ret_from_fork+0x10/0x20 [ 20.656775] [ 20.656804] Allocated by task 267: [ 20.656835] kasan_save_stack+0x3c/0x68 [ 20.657531] kasan_save_track+0x20/0x40 [ 20.657603] kasan_save_alloc_info+0x40/0x58 [ 20.657692] __kasan_kmalloc+0xd4/0xd8 [ 20.657801] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.658014] kasan_atomics+0xb8/0x2e0 [ 20.658057] kunit_try_run_case+0x170/0x3f0 [ 20.658121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.658435] kthread+0x328/0x630 [ 20.658592] ret_from_fork+0x10/0x20 [ 20.658707] [ 20.658762] The buggy address belongs to the object at fff00000c7a67680 [ 20.658762] which belongs to the cache kmalloc-64 of size 64 [ 20.658941] The buggy address is located 0 bytes to the right of [ 20.658941] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.659060] [ 20.659136] The buggy address belongs to the physical page: [ 20.659182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.659273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.659643] page_type: f5(slab) [ 20.659761] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.659924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.659981] page dumped because: kasan: bad access detected [ 20.660017] [ 20.660181] Memory state around the buggy address: [ 20.660222] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.660286] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.660425] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.660472] ^ [ 20.660918] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.661024] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.661356] ================================================================== [ 20.845786] ================================================================== [ 20.845841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.845910] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.845962] [ 20.845994] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.846224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.846272] Hardware name: linux,dummy-virt (DT) [ 20.846307] Call trace: [ 20.846330] show_stack+0x20/0x38 (C) [ 20.846382] dump_stack_lvl+0x8c/0xd0 [ 20.846475] print_report+0x118/0x608 [ 20.846558] kasan_report+0xdc/0x128 [ 20.846606] kasan_check_range+0x100/0x1a8 [ 20.846653] __kasan_check_write+0x20/0x30 [ 20.846702] kasan_atomics_helper+0x1384/0x4858 [ 20.846749] kasan_atomics+0x198/0x2e0 [ 20.846794] kunit_try_run_case+0x170/0x3f0 [ 20.846844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.846912] kthread+0x328/0x630 [ 20.847026] ret_from_fork+0x10/0x20 [ 20.847081] [ 20.847162] Allocated by task 267: [ 20.847241] kasan_save_stack+0x3c/0x68 [ 20.847325] kasan_save_track+0x20/0x40 [ 20.847383] kasan_save_alloc_info+0x40/0x58 [ 20.847435] __kasan_kmalloc+0xd4/0xd8 [ 20.847541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.847582] kasan_atomics+0xb8/0x2e0 [ 20.847622] kunit_try_run_case+0x170/0x3f0 [ 20.847665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.847710] kthread+0x328/0x630 [ 20.847747] ret_from_fork+0x10/0x20 [ 20.847786] [ 20.847809] The buggy address belongs to the object at fff00000c7a67680 [ 20.847809] which belongs to the cache kmalloc-64 of size 64 [ 20.847973] The buggy address is located 0 bytes to the right of [ 20.847973] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.848065] [ 20.848086] The buggy address belongs to the physical page: [ 20.848303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.848426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.848481] page_type: f5(slab) [ 20.848522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.849314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.849623] page dumped because: kasan: bad access detected [ 20.849709] [ 20.849733] Memory state around the buggy address: [ 20.849769] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.850032] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.850173] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.850231] ^ [ 20.850265] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.850323] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.850366] ================================================================== [ 20.809103] ================================================================== [ 20.809155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.809613] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.809753] [ 20.809785] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.809884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.809914] Hardware name: linux,dummy-virt (DT) [ 20.809947] Call trace: [ 20.809972] show_stack+0x20/0x38 (C) [ 20.810025] dump_stack_lvl+0x8c/0xd0 [ 20.810092] print_report+0x118/0x608 [ 20.810140] kasan_report+0xdc/0x128 [ 20.810185] kasan_check_range+0x100/0x1a8 [ 20.810243] __kasan_check_write+0x20/0x30 [ 20.810298] kasan_atomics_helper+0x10c0/0x4858 [ 20.810348] kasan_atomics+0x198/0x2e0 [ 20.810395] kunit_try_run_case+0x170/0x3f0 [ 20.810444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.810499] kthread+0x328/0x630 [ 20.810551] ret_from_fork+0x10/0x20 [ 20.810610] [ 20.810638] Allocated by task 267: [ 20.810674] kasan_save_stack+0x3c/0x68 [ 20.810714] kasan_save_track+0x20/0x40 [ 20.810762] kasan_save_alloc_info+0x40/0x58 [ 20.810803] __kasan_kmalloc+0xd4/0xd8 [ 20.810840] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.810888] kasan_atomics+0xb8/0x2e0 [ 20.810926] kunit_try_run_case+0x170/0x3f0 [ 20.810966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.811011] kthread+0x328/0x630 [ 20.811055] ret_from_fork+0x10/0x20 [ 20.811102] [ 20.811123] The buggy address belongs to the object at fff00000c7a67680 [ 20.811123] which belongs to the cache kmalloc-64 of size 64 [ 20.811190] The buggy address is located 0 bytes to the right of [ 20.811190] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.811258] [ 20.811287] The buggy address belongs to the physical page: [ 20.811319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.811372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.811421] page_type: f5(slab) [ 20.811461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.811517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.811563] page dumped because: kasan: bad access detected [ 20.811598] [ 20.811619] Memory state around the buggy address: [ 20.811652] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.811698] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.811745] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.811789] ^ [ 20.811822] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.812340] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.812820] ================================================================== [ 20.709381] ================================================================== [ 20.711171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 20.711981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.712720] kasan_check_range+0x100/0x1a8 [ 20.713402] kthread+0x328/0x630 [ 20.714063] [ 20.714084] The buggy address belongs to the object at fff00000c7a67680 [ 20.714084] which belongs to the cache kmalloc-64 of size 64 [ 20.714154] The buggy address is located 0 bytes to the right of [ 20.714154] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.714222] [ 20.714265] The buggy address belongs to the physical page: [ 20.714299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.714354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.714414] page_type: f5(slab) [ 20.714453] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.714509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.714555] page dumped because: kasan: bad access detected [ 20.714599] [ 20.714641] Memory state around the buggy address: [ 20.714673] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.714729] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.714773] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.714832] ^ [ 20.714877] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.715443] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.715848] ================================================================== [ 20.856211] ================================================================== [ 20.856264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.856315] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.856368] [ 20.856399] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.856484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.856513] Hardware name: linux,dummy-virt (DT) [ 20.856546] Call trace: [ 20.856590] show_stack+0x20/0x38 (C) [ 20.856642] dump_stack_lvl+0x8c/0xd0 [ 20.856693] print_report+0x118/0x608 [ 20.856738] kasan_report+0xdc/0x128 [ 20.856785] kasan_check_range+0x100/0x1a8 [ 20.856840] __kasan_check_write+0x20/0x30 [ 20.856909] kasan_atomics_helper+0x1414/0x4858 [ 20.856958] kasan_atomics+0x198/0x2e0 [ 20.857004] kunit_try_run_case+0x170/0x3f0 [ 20.857080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.857303] kthread+0x328/0x630 [ 20.857409] ret_from_fork+0x10/0x20 [ 20.857573] [ 20.857601] Allocated by task 267: [ 20.857646] kasan_save_stack+0x3c/0x68 [ 20.857689] kasan_save_track+0x20/0x40 [ 20.857726] kasan_save_alloc_info+0x40/0x58 [ 20.857767] __kasan_kmalloc+0xd4/0xd8 [ 20.857826] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.857879] kasan_atomics+0xb8/0x2e0 [ 20.858030] kunit_try_run_case+0x170/0x3f0 [ 20.858123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.858198] kthread+0x328/0x630 [ 20.858254] ret_from_fork+0x10/0x20 [ 20.858308] [ 20.858365] The buggy address belongs to the object at fff00000c7a67680 [ 20.858365] which belongs to the cache kmalloc-64 of size 64 [ 20.858521] The buggy address is located 0 bytes to the right of [ 20.858521] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.858591] [ 20.858786] The buggy address belongs to the physical page: [ 20.858825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.858894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.858945] page_type: f5(slab) [ 20.858985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.859222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.859323] page dumped because: kasan: bad access detected [ 20.859398] [ 20.859426] Memory state around the buggy address: [ 20.859463] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.859511] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.859716] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.859881] ^ [ 20.859993] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.860140] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.860245] ================================================================== [ 20.726151] ================================================================== [ 20.726211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.726266] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.726593] [ 20.726664] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.726946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.727176] Hardware name: linux,dummy-virt (DT) [ 20.727305] Call trace: [ 20.727335] show_stack+0x20/0x38 (C) [ 20.727390] dump_stack_lvl+0x8c/0xd0 [ 20.727444] print_report+0x118/0x608 [ 20.727708] kasan_report+0xdc/0x128 [ 20.727785] kasan_check_range+0x100/0x1a8 [ 20.727964] __kasan_check_write+0x20/0x30 [ 20.728148] kasan_atomics_helper+0xd3c/0x4858 [ 20.728282] kasan_atomics+0x198/0x2e0 [ 20.728413] kunit_try_run_case+0x170/0x3f0 [ 20.728548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.728673] kthread+0x328/0x630 [ 20.728831] ret_from_fork+0x10/0x20 [ 20.729187] [ 20.729270] Allocated by task 267: [ 20.729825] kasan_save_stack+0x3c/0x68 [ 20.729907] kasan_save_track+0x20/0x40 [ 20.730242] kasan_save_alloc_info+0x40/0x58 [ 20.730397] __kasan_kmalloc+0xd4/0xd8 [ 20.730458] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.730758] kasan_atomics+0xb8/0x2e0 [ 20.730885] kunit_try_run_case+0x170/0x3f0 [ 20.731044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.731123] kthread+0x328/0x630 [ 20.731169] ret_from_fork+0x10/0x20 [ 20.731208] [ 20.731231] The buggy address belongs to the object at fff00000c7a67680 [ 20.731231] which belongs to the cache kmalloc-64 of size 64 [ 20.731303] The buggy address is located 0 bytes to the right of [ 20.731303] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.731382] [ 20.731418] The buggy address belongs to the physical page: [ 20.731458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.731527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.731589] page_type: f5(slab) [ 20.731631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.731696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.731749] page dumped because: kasan: bad access detected [ 20.731794] [ 20.731814] Memory state around the buggy address: [ 20.731849] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.731906] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.731953] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.731997] ^ [ 20.732040] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.732105] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.732169] ================================================================== [ 20.638755] ================================================================== [ 20.639085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.639181] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.639341] [ 20.639424] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.639728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.639810] Hardware name: linux,dummy-virt (DT) [ 20.639846] Call trace: [ 20.640214] show_stack+0x20/0x38 (C) [ 20.640389] dump_stack_lvl+0x8c/0xd0 [ 20.640533] print_report+0x118/0x608 [ 20.640584] kasan_report+0xdc/0x128 [ 20.640632] kasan_check_range+0x100/0x1a8 [ 20.641088] __kasan_check_write+0x20/0x30 [ 20.641229] kasan_atomics_helper+0x99c/0x4858 [ 20.641499] kasan_atomics+0x198/0x2e0 [ 20.642208] ret_from_fork+0x10/0x20 [ 20.642379] [ 20.642848] kasan_save_track+0x20/0x40 [ 20.644324] [ 20.644545] The buggy address is located 0 bytes to the right of [ 20.644545] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.645105] page dumped because: kasan: bad access detected [ 20.645275] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.646786] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.648392] kasan_atomics+0x198/0x2e0 [ 20.649407] [ 20.649474] Allocated by task 267: [ 20.649552] kasan_save_stack+0x3c/0x68 [ 20.649597] kasan_save_track+0x20/0x40 [ 20.649905] kasan_save_alloc_info+0x40/0x58 [ 20.649996] __kasan_kmalloc+0xd4/0xd8 [ 20.650133] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.650228] kasan_atomics+0xb8/0x2e0 [ 20.650506] kunit_try_run_case+0x170/0x3f0 [ 20.650594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.650809] kthread+0x328/0x630 [ 20.650851] ret_from_fork+0x10/0x20 [ 20.651179] [ 20.651231] The buggy address belongs to the object at fff00000c7a67680 [ 20.651231] which belongs to the cache kmalloc-64 of size 64 [ 20.651331] The buggy address is located 0 bytes to the right of [ 20.651331] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.651807] [ 20.651907] The buggy address belongs to the physical page: [ 20.651964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.652102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.652325] page_type: f5(slab) [ 20.652433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.652768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.652937] page dumped because: kasan: bad access detected [ 20.653107] [ 20.653247] Memory state around the buggy address: [ 20.653586] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.653663] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.653845] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.653988] ^ [ 20.654144] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.654237] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.654551] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 20.352156] ================================================================== [ 20.352219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.352277] Write of size 8 at addr fff00000c3ef2e88 by task kunit_try_catch/263 [ 20.352331] [ 20.352364] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.352451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.352483] Hardware name: linux,dummy-virt (DT) [ 20.352517] Call trace: [ 20.352543] show_stack+0x20/0x38 (C) [ 20.352595] dump_stack_lvl+0x8c/0xd0 [ 20.352646] print_report+0x118/0x608 [ 20.352693] kasan_report+0xdc/0x128 [ 20.352739] kasan_check_range+0x100/0x1a8 [ 20.352788] __kasan_check_write+0x20/0x30 [ 20.352838] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.352905] kasan_bitops_generic+0x110/0x1c8 [ 20.352954] kunit_try_run_case+0x170/0x3f0 [ 20.353006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.353096] kthread+0x328/0x630 [ 20.354394] ret_from_fork+0x10/0x20 [ 20.354449] [ 20.354476] Allocated by task 263: [ 20.354508] kasan_save_stack+0x3c/0x68 [ 20.354566] kasan_save_track+0x20/0x40 [ 20.354605] kasan_save_alloc_info+0x40/0x58 [ 20.354648] __kasan_kmalloc+0xd4/0xd8 [ 20.354689] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.354731] kasan_bitops_generic+0xa0/0x1c8 [ 20.354772] kunit_try_run_case+0x170/0x3f0 [ 20.354824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.354884] kthread+0x328/0x630 [ 20.354936] ret_from_fork+0x10/0x20 [ 20.354974] [ 20.354996] The buggy address belongs to the object at fff00000c3ef2e80 [ 20.354996] which belongs to the cache kmalloc-16 of size 16 [ 20.355056] The buggy address is located 8 bytes inside of [ 20.355056] allocated 9-byte region [fff00000c3ef2e80, fff00000c3ef2e89) [ 20.355131] [ 20.355180] The buggy address belongs to the physical page: [ 20.355222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef2 [ 20.355279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.355328] page_type: f5(slab) [ 20.355369] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.355424] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.355469] page dumped because: kasan: bad access detected [ 20.355519] [ 20.355554] Memory state around the buggy address: [ 20.355598] fff00000c3ef2d80: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc [ 20.355659] fff00000c3ef2e00: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc [ 20.355705] >fff00000c3ef2e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.355761] ^ [ 20.355807] fff00000c3ef2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.356766] fff00000c3ef2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.357026] ================================================================== [ 20.358750] ================================================================== [ 20.359120] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.359449] Read of size 8 at addr fff00000c3ef2e88 by task kunit_try_catch/263 [ 20.359521] [ 20.359692] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.359834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.360158] Hardware name: linux,dummy-virt (DT) [ 20.360283] Call trace: [ 20.360351] show_stack+0x20/0x38 (C) [ 20.360408] dump_stack_lvl+0x8c/0xd0 [ 20.361503] print_report+0x118/0x608 [ 20.361658] kasan_report+0xdc/0x128 [ 20.361867] __asan_report_load8_noabort+0x20/0x30 [ 20.361930] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.362401] kasan_bitops_generic+0x110/0x1c8 [ 20.362654] kunit_try_run_case+0x170/0x3f0 [ 20.362777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.363361] kthread+0x328/0x630 [ 20.363611] ret_from_fork+0x10/0x20 [ 20.363783] [ 20.363864] Allocated by task 263: [ 20.364072] kasan_save_stack+0x3c/0x68 [ 20.364134] kasan_save_track+0x20/0x40 [ 20.364346] kasan_save_alloc_info+0x40/0x58 [ 20.364687] __kasan_kmalloc+0xd4/0xd8 [ 20.364891] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.365027] kasan_bitops_generic+0xa0/0x1c8 [ 20.365219] kunit_try_run_case+0x170/0x3f0 [ 20.365321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.367892] page_type: f5(slab) [ 20.368477] page dumped because: kasan: bad access detected [ 20.369499] fff00000c3ef2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.371212] [ 20.372040] Hardware name: linux,dummy-virt (DT) [ 20.372383] __kasan_check_write+0x20/0x30 [ 20.372757] Allocated by task 263: [ 20.374656] ret_from_fork+0x10/0x20 [ 20.375283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef2 [ 20.376088] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.377326] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 20.333903] ================================================================== [ 20.333987] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 20.334041] Read of size 1 at addr fff00000c5be7090 by task kunit_try_catch/261 [ 20.334341] [ 20.334450] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.334549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.334578] Hardware name: linux,dummy-virt (DT) [ 20.334612] Call trace: [ 20.334636] show_stack+0x20/0x38 (C) [ 20.334690] dump_stack_lvl+0x8c/0xd0 [ 20.335065] print_report+0x118/0x608 [ 20.335316] kasan_report+0xdc/0x128 [ 20.335384] __asan_report_load1_noabort+0x20/0x30 [ 20.335437] strnlen+0x80/0x88 [ 20.335491] kasan_strings+0x478/0xb00 [ 20.335937] kunit_try_run_case+0x170/0x3f0 [ 20.336035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.336157] kthread+0x328/0x630 [ 20.336211] ret_from_fork+0x10/0x20 [ 20.336609] [ 20.336654] Allocated by task 261: [ 20.336865] kasan_save_stack+0x3c/0x68 [ 20.337042] kasan_save_track+0x20/0x40 [ 20.337242] kasan_save_alloc_info+0x40/0x58 [ 20.337326] __kasan_kmalloc+0xd4/0xd8 [ 20.337448] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.337538] kasan_strings+0xc8/0xb00 [ 20.337728] kunit_try_run_case+0x170/0x3f0 [ 20.337946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.338122] kthread+0x328/0x630 [ 20.338212] ret_from_fork+0x10/0x20 [ 20.338350] [ 20.338576] Freed by task 261: [ 20.338652] kasan_save_stack+0x3c/0x68 [ 20.338999] kasan_save_track+0x20/0x40 [ 20.339139] kasan_save_free_info+0x4c/0x78 [ 20.339544] __kasan_slab_free+0x6c/0x98 [ 20.339780] kfree+0x214/0x3c8 [ 20.339975] kasan_strings+0x24c/0xb00 [ 20.340022] kunit_try_run_case+0x170/0x3f0 [ 20.340065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.340345] kthread+0x328/0x630 [ 20.340537] ret_from_fork+0x10/0x20 [ 20.340712] [ 20.340770] The buggy address belongs to the object at fff00000c5be7080 [ 20.340770] which belongs to the cache kmalloc-32 of size 32 [ 20.340941] The buggy address is located 16 bytes inside of [ 20.340941] freed 32-byte region [fff00000c5be7080, fff00000c5be70a0) [ 20.341208] [ 20.341422] The buggy address belongs to the physical page: [ 20.341539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be7 [ 20.341796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.342050] page_type: f5(slab) [ 20.342113] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.342185] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.342248] page dumped because: kasan: bad access detected [ 20.342283] [ 20.342313] Memory state around the buggy address: [ 20.342359] fff00000c5be6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.342417] fff00000c5be7000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.342479] >fff00000c5be7080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.342531] ^ [ 20.342562] fff00000c5be7100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.342608] fff00000c5be7180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.342660] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 20.320047] ================================================================== [ 20.320701] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 20.320810] Read of size 1 at addr fff00000c5be7090 by task kunit_try_catch/261 [ 20.320903] [ 20.321367] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.321560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.321659] Hardware name: linux,dummy-virt (DT) [ 20.321840] Call trace: [ 20.321913] show_stack+0x20/0x38 (C) [ 20.322498] dump_stack_lvl+0x8c/0xd0 [ 20.322577] print_report+0x118/0x608 [ 20.323008] kasan_report+0xdc/0x128 [ 20.323095] __asan_report_load1_noabort+0x20/0x30 [ 20.323186] strlen+0xa8/0xb0 [ 20.323375] kasan_strings+0x418/0xb00 [ 20.323564] kunit_try_run_case+0x170/0x3f0 [ 20.323998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.324163] kthread+0x328/0x630 [ 20.324292] ret_from_fork+0x10/0x20 [ 20.324576] [ 20.324604] Allocated by task 261: [ 20.324706] kasan_save_stack+0x3c/0x68 [ 20.324990] kasan_save_track+0x20/0x40 [ 20.325108] kasan_save_alloc_info+0x40/0x58 [ 20.325505] __kasan_kmalloc+0xd4/0xd8 [ 20.325876] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.326058] kasan_strings+0xc8/0xb00 [ 20.326157] kunit_try_run_case+0x170/0x3f0 [ 20.326324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.326630] kthread+0x328/0x630 [ 20.326710] ret_from_fork+0x10/0x20 [ 20.326898] [ 20.327058] Freed by task 261: [ 20.327195] kasan_save_stack+0x3c/0x68 [ 20.327538] kasan_save_track+0x20/0x40 [ 20.327662] kasan_save_free_info+0x4c/0x78 [ 20.327833] __kasan_slab_free+0x6c/0x98 [ 20.327964] kfree+0x214/0x3c8 [ 20.327999] kasan_strings+0x24c/0xb00 [ 20.328352] kunit_try_run_case+0x170/0x3f0 [ 20.328474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.328688] kthread+0x328/0x630 [ 20.328909] ret_from_fork+0x10/0x20 [ 20.329140] [ 20.329225] The buggy address belongs to the object at fff00000c5be7080 [ 20.329225] which belongs to the cache kmalloc-32 of size 32 [ 20.329318] The buggy address is located 16 bytes inside of [ 20.329318] freed 32-byte region [fff00000c5be7080, fff00000c5be70a0) [ 20.329499] [ 20.329587] The buggy address belongs to the physical page: [ 20.329743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be7 [ 20.330072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.330149] page_type: f5(slab) [ 20.330341] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.330532] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.330582] page dumped because: kasan: bad access detected [ 20.330749] [ 20.330900] Memory state around the buggy address: [ 20.331061] fff00000c5be6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.331305] fff00000c5be7000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.331389] >fff00000c5be7080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.331890] ^ [ 20.332019] fff00000c5be7100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.332148] fff00000c5be7180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.332310] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 20.313145] ================================================================== [ 20.313225] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 20.313537] Read of size 1 at addr fff00000c5be7090 by task kunit_try_catch/261 [ 20.313619] [ 20.313754] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.313889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.313921] Hardware name: linux,dummy-virt (DT) [ 20.313968] Call trace: [ 20.313995] show_stack+0x20/0x38 (C) [ 20.314060] dump_stack_lvl+0x8c/0xd0 [ 20.314115] print_report+0x118/0x608 [ 20.314170] kasan_report+0xdc/0x128 [ 20.314218] __asan_report_load1_noabort+0x20/0x30 [ 20.314270] kasan_strings+0x95c/0xb00 [ 20.314319] kunit_try_run_case+0x170/0x3f0 [ 20.314381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.314436] kthread+0x328/0x630 [ 20.314484] ret_from_fork+0x10/0x20 [ 20.314534] [ 20.314564] Allocated by task 261: [ 20.314602] kasan_save_stack+0x3c/0x68 [ 20.314643] kasan_save_track+0x20/0x40 [ 20.314697] kasan_save_alloc_info+0x40/0x58 [ 20.314744] __kasan_kmalloc+0xd4/0xd8 [ 20.314783] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.314822] kasan_strings+0xc8/0xb00 [ 20.314871] kunit_try_run_case+0x170/0x3f0 [ 20.314912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.314959] kthread+0x328/0x630 [ 20.314996] ret_from_fork+0x10/0x20 [ 20.315035] [ 20.315056] Freed by task 261: [ 20.315082] kasan_save_stack+0x3c/0x68 [ 20.315120] kasan_save_track+0x20/0x40 [ 20.315167] kasan_save_free_info+0x4c/0x78 [ 20.315215] __kasan_slab_free+0x6c/0x98 [ 20.315254] kfree+0x214/0x3c8 [ 20.315293] kasan_strings+0x24c/0xb00 [ 20.315333] kunit_try_run_case+0x170/0x3f0 [ 20.315373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.315430] kthread+0x328/0x630 [ 20.315468] ret_from_fork+0x10/0x20 [ 20.315506] [ 20.315527] The buggy address belongs to the object at fff00000c5be7080 [ 20.315527] which belongs to the cache kmalloc-32 of size 32 [ 20.315589] The buggy address is located 16 bytes inside of [ 20.315589] freed 32-byte region [fff00000c5be7080, fff00000c5be70a0) [ 20.315652] [ 20.315675] The buggy address belongs to the physical page: [ 20.315708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be7 [ 20.315759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.315810] page_type: f5(slab) [ 20.315849] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.316260] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.316308] page dumped because: kasan: bad access detected [ 20.316713] [ 20.316792] Memory state around the buggy address: [ 20.317242] fff00000c5be6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.317592] fff00000c5be7000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.317885] >fff00000c5be7080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.318062] ^ [ 20.318169] fff00000c5be7100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.318220] fff00000c5be7180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.318451] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 20.294801] ================================================================== [ 20.294883] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 20.294991] Read of size 1 at addr fff00000c5be7090 by task kunit_try_catch/261 [ 20.295074] [ 20.295202] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.295310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.295350] Hardware name: linux,dummy-virt (DT) [ 20.295449] Call trace: [ 20.295474] show_stack+0x20/0x38 (C) [ 20.295562] dump_stack_lvl+0x8c/0xd0 [ 20.295614] print_report+0x118/0x608 [ 20.295793] kasan_report+0xdc/0x128 [ 20.295866] __asan_report_load1_noabort+0x20/0x30 [ 20.296230] strcmp+0xc0/0xc8 [ 20.296296] kasan_strings+0x340/0xb00 [ 20.296549] kunit_try_run_case+0x170/0x3f0 [ 20.296606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.296700] kthread+0x328/0x630 [ 20.296748] ret_from_fork+0x10/0x20 [ 20.297681] [ 20.297939] Allocated by task 261: [ 20.298180] kasan_save_stack+0x3c/0x68 [ 20.298377] kasan_save_track+0x20/0x40 [ 20.298706] kasan_save_alloc_info+0x40/0x58 [ 20.298873] __kasan_kmalloc+0xd4/0xd8 [ 20.299071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.299768] kasan_strings+0xc8/0xb00 [ 20.299949] kunit_try_run_case+0x170/0x3f0 [ 20.300057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.300348] kthread+0x328/0x630 [ 20.300388] ret_from_fork+0x10/0x20 [ 20.300960] [ 20.301027] Freed by task 261: [ 20.301334] kasan_save_stack+0x3c/0x68 [ 20.301604] kasan_save_track+0x20/0x40 [ 20.301711] kasan_save_free_info+0x4c/0x78 [ 20.301771] __kasan_slab_free+0x6c/0x98 [ 20.302262] kfree+0x214/0x3c8 [ 20.302446] kasan_strings+0x24c/0xb00 [ 20.302621] kunit_try_run_case+0x170/0x3f0 [ 20.302779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.303041] kthread+0x328/0x630 [ 20.303113] ret_from_fork+0x10/0x20 [ 20.303186] [ 20.303593] The buggy address belongs to the object at fff00000c5be7080 [ 20.303593] which belongs to the cache kmalloc-32 of size 32 [ 20.303687] The buggy address is located 16 bytes inside of [ 20.303687] freed 32-byte region [fff00000c5be7080, fff00000c5be70a0) [ 20.304068] [ 20.304162] The buggy address belongs to the physical page: [ 20.304211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be7 [ 20.304296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.304474] page_type: f5(slab) [ 20.304883] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.304962] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.305299] page dumped because: kasan: bad access detected [ 20.305382] [ 20.305525] Memory state around the buggy address: [ 20.305592] fff00000c5be6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.305973] fff00000c5be7000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.306167] >fff00000c5be7080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.306214] ^ [ 20.306529] fff00000c5be7100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.306813] fff00000c5be7180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.306928] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 20.279578] ================================================================== [ 20.279645] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 20.279795] Read of size 1 at addr fff00000c791ced8 by task kunit_try_catch/259 [ 20.279879] [ 20.279925] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.280052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.280138] Hardware name: linux,dummy-virt (DT) [ 20.280280] Call trace: [ 20.280330] show_stack+0x20/0x38 (C) [ 20.280435] dump_stack_lvl+0x8c/0xd0 [ 20.280554] print_report+0x118/0x608 [ 20.280635] kasan_report+0xdc/0x128 [ 20.280713] __asan_report_load1_noabort+0x20/0x30 [ 20.280767] memcmp+0x198/0x1d8 [ 20.280811] kasan_memcmp+0x16c/0x300 [ 20.280869] kunit_try_run_case+0x170/0x3f0 [ 20.281048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.281108] kthread+0x328/0x630 [ 20.281158] ret_from_fork+0x10/0x20 [ 20.281294] [ 20.281369] Allocated by task 259: [ 20.281399] kasan_save_stack+0x3c/0x68 [ 20.281473] kasan_save_track+0x20/0x40 [ 20.281667] kasan_save_alloc_info+0x40/0x58 [ 20.281745] __kasan_kmalloc+0xd4/0xd8 [ 20.281795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.281966] kasan_memcmp+0xbc/0x300 [ 20.282015] kunit_try_run_case+0x170/0x3f0 [ 20.282056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.282108] kthread+0x328/0x630 [ 20.282167] ret_from_fork+0x10/0x20 [ 20.282223] [ 20.282252] The buggy address belongs to the object at fff00000c791cec0 [ 20.282252] which belongs to the cache kmalloc-32 of size 32 [ 20.282511] The buggy address is located 0 bytes to the right of [ 20.282511] allocated 24-byte region [fff00000c791cec0, fff00000c791ced8) [ 20.282648] [ 20.282731] The buggy address belongs to the physical page: [ 20.282800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791c [ 20.282884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.283048] page_type: f5(slab) [ 20.283122] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.283216] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.283264] page dumped because: kasan: bad access detected [ 20.283298] [ 20.283317] Memory state around the buggy address: [ 20.283359] fff00000c791cd80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.283413] fff00000c791ce00: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.283476] >fff00000c791ce80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.283519] ^ [ 20.283583] fff00000c791cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.283645] fff00000c791cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.283688] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 20.265744] ================================================================== [ 20.265809] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 20.265974] Read of size 1 at addr ffff800080ac7b4a by task kunit_try_catch/255 [ 20.266142] [ 20.266198] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.266392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.266438] Hardware name: linux,dummy-virt (DT) [ 20.266510] Call trace: [ 20.266535] show_stack+0x20/0x38 (C) [ 20.266588] dump_stack_lvl+0x8c/0xd0 [ 20.266641] print_report+0x310/0x608 [ 20.266807] kasan_report+0xdc/0x128 [ 20.266913] __asan_report_load1_noabort+0x20/0x30 [ 20.266967] kasan_alloca_oob_right+0x2dc/0x340 [ 20.267019] kunit_try_run_case+0x170/0x3f0 [ 20.267071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.267127] kthread+0x328/0x630 [ 20.267190] ret_from_fork+0x10/0x20 [ 20.267240] [ 20.267262] The buggy address belongs to stack of task kunit_try_catch/255 [ 20.267455] [ 20.267528] The buggy address belongs to the virtual mapping at [ 20.267528] [ffff800080ac0000, ffff800080ac9000) created by: [ 20.267528] kernel_clone+0x150/0x7a8 [ 20.267654] [ 20.267693] The buggy address belongs to the physical page: [ 20.267750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be6 [ 20.267884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.267988] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.268081] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.268129] page dumped because: kasan: bad access detected [ 20.268164] [ 20.268184] Memory state around the buggy address: [ 20.268217] ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.268265] ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.268310] >ffff800080ac7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 20.268354] ^ [ 20.268549] ffff800080ac7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.268656] ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.268710] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 20.257349] ================================================================== [ 20.257508] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 20.257568] Read of size 1 at addr ffff800080ac7b5f by task kunit_try_catch/253 [ 20.257620] [ 20.257650] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.257734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.257760] Hardware name: linux,dummy-virt (DT) [ 20.257807] Call trace: [ 20.258961] show_stack+0x20/0x38 (C) [ 20.259031] dump_stack_lvl+0x8c/0xd0 [ 20.259083] print_report+0x310/0x608 [ 20.259129] kasan_report+0xdc/0x128 [ 20.259180] __asan_report_load1_noabort+0x20/0x30 [ 20.259231] kasan_alloca_oob_left+0x2b8/0x310 [ 20.259282] kunit_try_run_case+0x170/0x3f0 [ 20.259331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.259385] kthread+0x328/0x630 [ 20.259432] ret_from_fork+0x10/0x20 [ 20.259479] [ 20.259498] The buggy address belongs to stack of task kunit_try_catch/253 [ 20.259570] [ 20.259595] The buggy address belongs to the virtual mapping at [ 20.259595] [ffff800080ac0000, ffff800080ac9000) created by: [ 20.259595] kernel_clone+0x150/0x7a8 [ 20.259674] [ 20.259696] The buggy address belongs to the physical page: [ 20.259726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be6 [ 20.259778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.259842] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.259908] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.259952] page dumped because: kasan: bad access detected [ 20.259985] [ 20.260004] Memory state around the buggy address: [ 20.260037] ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.260085] ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.260131] >ffff800080ac7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 20.260173] ^ [ 20.260211] ffff800080ac7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.260257] ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.260296] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 20.246023] ================================================================== [ 20.246144] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 20.246251] Read of size 1 at addr ffff800080ac7c2a by task kunit_try_catch/251 [ 20.246303] [ 20.246397] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.246510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.246586] Hardware name: linux,dummy-virt (DT) [ 20.246639] Call trace: [ 20.246677] show_stack+0x20/0x38 (C) [ 20.246731] dump_stack_lvl+0x8c/0xd0 [ 20.246797] print_report+0x310/0x608 [ 20.246843] kasan_report+0xdc/0x128 [ 20.247205] __asan_report_load1_noabort+0x20/0x30 [ 20.247317] kasan_stack_oob+0x238/0x270 [ 20.247402] kunit_try_run_case+0x170/0x3f0 [ 20.247456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.247539] kthread+0x328/0x630 [ 20.247612] ret_from_fork+0x10/0x20 [ 20.247668] [ 20.247751] The buggy address belongs to stack of task kunit_try_catch/251 [ 20.248100] and is located at offset 138 in frame: [ 20.248153] kasan_stack_oob+0x0/0x270 [ 20.248370] [ 20.248402] This frame has 4 objects: [ 20.248629] [48, 49) '__assertion' [ 20.248685] [64, 72) 'array' [ 20.248720] [96, 112) '__assertion' [ 20.248846] [128, 138) 'stack_array' [ 20.249128] [ 20.249216] The buggy address belongs to the virtual mapping at [ 20.249216] [ffff800080ac0000, ffff800080ac9000) created by: [ 20.249216] kernel_clone+0x150/0x7a8 [ 20.249413] [ 20.249475] The buggy address belongs to the physical page: [ 20.249505] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be6 [ 20.249557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.249986] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.250181] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.250286] page dumped because: kasan: bad access detected [ 20.250407] [ 20.250495] Memory state around the buggy address: [ 20.250618] ffff800080ac7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.250743] ffff800080ac7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 20.250828] >ffff800080ac7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 20.251204] ^ [ 20.251372] ffff800080ac7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 20.251497] ffff800080ac7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.251572] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 20.231894] ================================================================== [ 20.231955] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 20.232426] Read of size 1 at addr ffffab84a02035ad by task kunit_try_catch/247 [ 20.232526] [ 20.232577] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.232670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.232700] Hardware name: linux,dummy-virt (DT) [ 20.232866] Call trace: [ 20.232894] show_stack+0x20/0x38 (C) [ 20.233011] dump_stack_lvl+0x8c/0xd0 [ 20.233073] print_report+0x310/0x608 [ 20.233167] kasan_report+0xdc/0x128 [ 20.233263] __asan_report_load1_noabort+0x20/0x30 [ 20.233368] kasan_global_oob_right+0x230/0x270 [ 20.233505] kunit_try_run_case+0x170/0x3f0 [ 20.233566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.233621] kthread+0x328/0x630 [ 20.233666] ret_from_fork+0x10/0x20 [ 20.233877] [ 20.234033] The buggy address belongs to the variable: [ 20.234152] global_array+0xd/0x40 [ 20.234245] [ 20.234396] The buggy address belongs to the virtual mapping at [ 20.234396] [ffffab849e420000, ffffab84a02c1000) created by: [ 20.234396] paging_init+0x66c/0x7d0 [ 20.234505] [ 20.236047] The buggy address belongs to the physical page: [ 20.236093] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c03 [ 20.236151] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 20.236219] raw: 03fffe0000002000 ffffc1ffc01f00c8 ffffc1ffc01f00c8 0000000000000000 [ 20.236272] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.236315] page dumped because: kasan: bad access detected [ 20.236348] [ 20.236365] Memory state around the buggy address: [ 20.236397] ffffab84a0203480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.236443] ffffab84a0203500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 20.236487] >ffffab84a0203580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 20.236529] ^ [ 20.236562] ffffab84a0203600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 20.236606] ffffab84a0203680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.236646] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 20.208949] ================================================================== [ 20.209022] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.209083] Free of addr fff00000c791d901 by task kunit_try_catch/243 [ 20.209127] [ 20.209161] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.209247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.209276] Hardware name: linux,dummy-virt (DT) [ 20.209307] Call trace: [ 20.209331] show_stack+0x20/0x38 (C) [ 20.209379] dump_stack_lvl+0x8c/0xd0 [ 20.209429] print_report+0x118/0x608 [ 20.209473] kasan_report_invalid_free+0xc0/0xe8 [ 20.209524] check_slab_allocation+0xfc/0x108 [ 20.209570] __kasan_mempool_poison_object+0x78/0x150 [ 20.209620] mempool_free+0x28c/0x328 [ 20.209667] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.209722] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.209776] kunit_try_run_case+0x170/0x3f0 [ 20.209825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.209893] kthread+0x328/0x630 [ 20.209938] ret_from_fork+0x10/0x20 [ 20.209986] [ 20.210006] Allocated by task 243: [ 20.210034] kasan_save_stack+0x3c/0x68 [ 20.210074] kasan_save_track+0x20/0x40 [ 20.210110] kasan_save_alloc_info+0x40/0x58 [ 20.210149] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.210192] remove_element+0x130/0x1f8 [ 20.210230] mempool_alloc_preallocated+0x58/0xc0 [ 20.210272] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 20.210316] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.210358] kunit_try_run_case+0x170/0x3f0 [ 20.210398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.210444] kthread+0x328/0x630 [ 20.210480] ret_from_fork+0x10/0x20 [ 20.210517] [ 20.210536] The buggy address belongs to the object at fff00000c791d900 [ 20.210536] which belongs to the cache kmalloc-128 of size 128 [ 20.210593] The buggy address is located 1 bytes inside of [ 20.210593] 128-byte region [fff00000c791d900, fff00000c791d980) [ 20.210654] [ 20.210673] The buggy address belongs to the physical page: [ 20.210703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 20.210756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.210807] page_type: f5(slab) [ 20.210845] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.210907] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.210951] page dumped because: kasan: bad access detected [ 20.210983] [ 20.211000] Memory state around the buggy address: [ 20.211031] fff00000c791d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.211078] fff00000c791d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.211123] >fff00000c791d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.211170] ^ [ 20.211196] fff00000c791d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.211240] fff00000c791da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.211282] ================================================================== [ 20.222833] ================================================================== [ 20.222955] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.223016] Free of addr fff00000c7adc001 by task kunit_try_catch/245 [ 20.223122] [ 20.223159] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.223448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.223483] Hardware name: linux,dummy-virt (DT) [ 20.223573] Call trace: [ 20.223600] show_stack+0x20/0x38 (C) [ 20.223652] dump_stack_lvl+0x8c/0xd0 [ 20.223702] print_report+0x118/0x608 [ 20.223747] kasan_report_invalid_free+0xc0/0xe8 [ 20.223823] __kasan_mempool_poison_object+0xfc/0x150 [ 20.223888] mempool_free+0x28c/0x328 [ 20.223936] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.224105] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 20.224279] kunit_try_run_case+0x170/0x3f0 [ 20.224411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.224498] kthread+0x328/0x630 [ 20.224545] ret_from_fork+0x10/0x20 [ 20.224601] [ 20.224622] The buggy address belongs to the physical page: [ 20.224654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107adc [ 20.224745] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.224794] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.224849] page_type: f8(unknown) [ 20.224901] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.224957] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.225010] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.225190] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.225296] head: 0bfffe0000000002 ffffc1ffc31eb701 00000000ffffffff 00000000ffffffff [ 20.225410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.225521] page dumped because: kasan: bad access detected [ 20.225576] [ 20.225610] Memory state around the buggy address: [ 20.225707] fff00000c7adbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.225752] fff00000c7adbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.226107] >fff00000c7adc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.226170] ^ [ 20.226208] fff00000c7adc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.226267] fff00000c7adc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.226308] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 20.125112] ================================================================== [ 20.125181] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.125241] Free of addr fff00000c791d500 by task kunit_try_catch/237 [ 20.125284] [ 20.125317] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.125403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.125432] Hardware name: linux,dummy-virt (DT) [ 20.125464] Call trace: [ 20.125487] show_stack+0x20/0x38 (C) [ 20.125535] dump_stack_lvl+0x8c/0xd0 [ 20.125584] print_report+0x118/0x608 [ 20.125631] kasan_report_invalid_free+0xc0/0xe8 [ 20.125682] check_slab_allocation+0xd4/0x108 [ 20.125728] __kasan_mempool_poison_object+0x78/0x150 [ 20.125779] mempool_free+0x28c/0x328 [ 20.125829] mempool_double_free_helper+0x150/0x2e8 [ 20.125895] mempool_kmalloc_double_free+0xc0/0x118 [ 20.125947] kunit_try_run_case+0x170/0x3f0 [ 20.125997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.126052] kthread+0x328/0x630 [ 20.126097] ret_from_fork+0x10/0x20 [ 20.126144] [ 20.126164] Allocated by task 237: [ 20.126191] kasan_save_stack+0x3c/0x68 [ 20.126231] kasan_save_track+0x20/0x40 [ 20.126266] kasan_save_alloc_info+0x40/0x58 [ 20.126306] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.126348] remove_element+0x130/0x1f8 [ 20.126385] mempool_alloc_preallocated+0x58/0xc0 [ 20.126427] mempool_double_free_helper+0x94/0x2e8 [ 20.126469] mempool_kmalloc_double_free+0xc0/0x118 [ 20.126510] kunit_try_run_case+0x170/0x3f0 [ 20.126553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.126596] kthread+0x328/0x630 [ 20.126632] ret_from_fork+0x10/0x20 [ 20.126668] [ 20.126685] Freed by task 237: [ 20.126712] kasan_save_stack+0x3c/0x68 [ 20.126747] kasan_save_track+0x20/0x40 [ 20.126783] kasan_save_free_info+0x4c/0x78 [ 20.126823] __kasan_mempool_poison_object+0xc0/0x150 [ 20.126896] mempool_free+0x28c/0x328 [ 20.126935] mempool_double_free_helper+0x100/0x2e8 [ 20.126977] mempool_kmalloc_double_free+0xc0/0x118 [ 20.127019] kunit_try_run_case+0x170/0x3f0 [ 20.127058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.127102] kthread+0x328/0x630 [ 20.127136] ret_from_fork+0x10/0x20 [ 20.127178] [ 20.127196] The buggy address belongs to the object at fff00000c791d500 [ 20.127196] which belongs to the cache kmalloc-128 of size 128 [ 20.127257] The buggy address is located 0 bytes inside of [ 20.127257] 128-byte region [fff00000c791d500, fff00000c791d580) [ 20.127317] [ 20.127336] The buggy address belongs to the physical page: [ 20.127366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 20.127421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.127470] page_type: f5(slab) [ 20.127511] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.127564] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.127607] page dumped because: kasan: bad access detected [ 20.127639] [ 20.127656] Memory state around the buggy address: [ 20.127686] fff00000c791d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.127731] fff00000c791d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.127776] >fff00000c791d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.127819] ^ [ 20.127845] fff00000c791d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.127926] fff00000c791d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.127989] ================================================================== [ 20.184788] ================================================================== [ 20.185330] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.185995] Free of addr fff00000c795c000 by task kunit_try_catch/241 [ 20.186045] [ 20.186082] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.186167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.186196] Hardware name: linux,dummy-virt (DT) [ 20.187754] Call trace: [ 20.188049] show_stack+0x20/0x38 (C) [ 20.188625] dump_stack_lvl+0x8c/0xd0 [ 20.188873] print_report+0x118/0x608 [ 20.188922] kasan_report_invalid_free+0xc0/0xe8 [ 20.188971] __kasan_mempool_poison_pages+0xe0/0xe8 [ 20.189021] mempool_free+0x24c/0x328 [ 20.190339] mempool_double_free_helper+0x150/0x2e8 [ 20.190409] mempool_page_alloc_double_free+0xbc/0x118 [ 20.190460] kunit_try_run_case+0x170/0x3f0 [ 20.191659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.191862] kthread+0x328/0x630 [ 20.192364] ret_from_fork+0x10/0x20 [ 20.192776] [ 20.193317] The buggy address belongs to the physical page: [ 20.193393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c [ 20.194021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.194459] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.194762] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.195044] page dumped because: kasan: bad access detected [ 20.195081] [ 20.195099] Memory state around the buggy address: [ 20.195623] fff00000c795bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.195678] fff00000c795bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.196240] >fff00000c795c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.196439] ^ [ 20.197006] fff00000c795c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.197076] fff00000c795c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.197119] ================================================================== [ 20.154959] ================================================================== [ 20.155045] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.155141] Free of addr fff00000c795c000 by task kunit_try_catch/239 [ 20.155372] [ 20.155679] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.155944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.156007] Hardware name: linux,dummy-virt (DT) [ 20.156059] Call trace: [ 20.156223] show_stack+0x20/0x38 (C) [ 20.156374] dump_stack_lvl+0x8c/0xd0 [ 20.156423] print_report+0x118/0x608 [ 20.156469] kasan_report_invalid_free+0xc0/0xe8 [ 20.156520] __kasan_mempool_poison_object+0x14c/0x150 [ 20.156872] mempool_free+0x28c/0x328 [ 20.157267] mempool_double_free_helper+0x150/0x2e8 [ 20.157385] mempool_kmalloc_large_double_free+0xc0/0x118 [ 20.157666] kunit_try_run_case+0x170/0x3f0 [ 20.158240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.158635] kthread+0x328/0x630 [ 20.158741] ret_from_fork+0x10/0x20 [ 20.159306] [ 20.159430] The buggy address belongs to the physical page: [ 20.159634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c [ 20.160022] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.160364] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.160425] page_type: f8(unknown) [ 20.160665] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.160729] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.161057] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.161119] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.161470] head: 0bfffe0000000002 ffffc1ffc31e5701 00000000ffffffff 00000000ffffffff [ 20.162182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.162261] page dumped because: kasan: bad access detected [ 20.162573] [ 20.162598] Memory state around the buggy address: [ 20.162635] fff00000c795bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.162688] fff00000c795bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.162734] >fff00000c795c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.162776] ^ [ 20.163412] fff00000c795c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.163471] fff00000c795c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.163514] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 20.017196] ================================================================== [ 20.017263] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.017322] Read of size 1 at addr fff00000c7a88000 by task kunit_try_catch/231 [ 20.017372] [ 20.017407] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.018032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.018078] Hardware name: linux,dummy-virt (DT) [ 20.018161] Call trace: [ 20.018188] show_stack+0x20/0x38 (C) [ 20.018599] dump_stack_lvl+0x8c/0xd0 [ 20.018792] print_report+0x118/0x608 [ 20.018920] kasan_report+0xdc/0x128 [ 20.019187] __asan_report_load1_noabort+0x20/0x30 [ 20.019293] mempool_uaf_helper+0x314/0x340 [ 20.019549] mempool_kmalloc_large_uaf+0xc4/0x120 [ 20.019641] kunit_try_run_case+0x170/0x3f0 [ 20.019745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.019798] kthread+0x328/0x630 [ 20.019843] ret_from_fork+0x10/0x20 [ 20.020139] [ 20.020167] The buggy address belongs to the physical page: [ 20.020246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a88 [ 20.020307] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.020354] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.020410] page_type: f8(unknown) [ 20.020451] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.020504] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.020556] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.020607] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.020659] head: 0bfffe0000000002 ffffc1ffc31ea201 00000000ffffffff 00000000ffffffff [ 20.020710] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.020752] page dumped because: kasan: bad access detected [ 20.020784] [ 20.020802] Memory state around the buggy address: [ 20.020834] fff00000c7a87f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.020890] fff00000c7a87f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.021107] >fff00000c7a88000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.021148] ^ [ 20.021241] fff00000c7a88080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.021286] fff00000c7a88100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.021652] ================================================================== [ 20.102701] ================================================================== [ 20.102772] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.102838] Read of size 1 at addr fff00000c795c000 by task kunit_try_catch/235 [ 20.102910] [ 20.102946] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.103035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.103064] Hardware name: linux,dummy-virt (DT) [ 20.103099] Call trace: [ 20.103121] show_stack+0x20/0x38 (C) [ 20.103176] dump_stack_lvl+0x8c/0xd0 [ 20.103227] print_report+0x118/0x608 [ 20.103273] kasan_report+0xdc/0x128 [ 20.103317] __asan_report_load1_noabort+0x20/0x30 [ 20.103367] mempool_uaf_helper+0x314/0x340 [ 20.103416] mempool_page_alloc_uaf+0xc0/0x118 [ 20.103462] kunit_try_run_case+0x170/0x3f0 [ 20.103513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.103567] kthread+0x328/0x630 [ 20.103614] ret_from_fork+0x10/0x20 [ 20.103664] [ 20.103684] The buggy address belongs to the physical page: [ 20.103718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c [ 20.103772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.103840] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.103938] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.103999] page dumped because: kasan: bad access detected [ 20.104033] [ 20.104051] Memory state around the buggy address: [ 20.104090] fff00000c795bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.104135] fff00000c795bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.104181] >fff00000c795c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.104222] ^ [ 20.104251] fff00000c795c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.104295] fff00000c795c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.104336] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 20.046182] ================================================================== [ 20.046248] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.046307] Read of size 1 at addr fff00000c7a61240 by task kunit_try_catch/233 [ 20.046357] [ 20.046391] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.046478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.047623] Hardware name: linux,dummy-virt (DT) [ 20.047711] Call trace: [ 20.047744] show_stack+0x20/0x38 (C) [ 20.047869] dump_stack_lvl+0x8c/0xd0 [ 20.048200] print_report+0x118/0x608 [ 20.048431] kasan_report+0xdc/0x128 [ 20.048508] __asan_report_load1_noabort+0x20/0x30 [ 20.048560] mempool_uaf_helper+0x314/0x340 [ 20.048610] mempool_slab_uaf+0xc0/0x118 [ 20.048710] kunit_try_run_case+0x170/0x3f0 [ 20.049160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.049645] kthread+0x328/0x630 [ 20.050144] ret_from_fork+0x10/0x20 [ 20.050472] [ 20.050507] Allocated by task 233: [ 20.050539] kasan_save_stack+0x3c/0x68 [ 20.050585] kasan_save_track+0x20/0x40 [ 20.050927] kasan_save_alloc_info+0x40/0x58 [ 20.051227] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.051274] remove_element+0x16c/0x1f8 [ 20.051644] mempool_alloc_preallocated+0x58/0xc0 [ 20.051696] mempool_uaf_helper+0xa4/0x340 [ 20.051738] mempool_slab_uaf+0xc0/0x118 [ 20.051950] kunit_try_run_case+0x170/0x3f0 [ 20.052007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.052363] kthread+0x328/0x630 [ 20.052435] ret_from_fork+0x10/0x20 [ 20.052766] [ 20.052898] Freed by task 233: [ 20.053093] kasan_save_stack+0x3c/0x68 [ 20.053253] kasan_save_track+0x20/0x40 [ 20.053380] kasan_save_free_info+0x4c/0x78 [ 20.053509] __kasan_mempool_poison_object+0xc0/0x150 [ 20.053770] mempool_free+0x28c/0x328 [ 20.054072] mempool_uaf_helper+0x104/0x340 [ 20.054208] mempool_slab_uaf+0xc0/0x118 [ 20.054460] kunit_try_run_case+0x170/0x3f0 [ 20.054575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.054621] kthread+0x328/0x630 [ 20.055060] ret_from_fork+0x10/0x20 [ 20.055474] [ 20.055538] The buggy address belongs to the object at fff00000c7a61240 [ 20.055538] which belongs to the cache test_cache of size 123 [ 20.055875] The buggy address is located 0 bytes inside of [ 20.055875] freed 123-byte region [fff00000c7a61240, fff00000c7a612bb) [ 20.055947] [ 20.055967] The buggy address belongs to the physical page: [ 20.055998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a61 [ 20.056236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.056392] page_type: f5(slab) [ 20.056451] raw: 0bfffe0000000000 fff00000c59d6b40 dead000000000122 0000000000000000 [ 20.056723] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.056833] page dumped because: kasan: bad access detected [ 20.056876] [ 20.056894] Memory state around the buggy address: [ 20.057438] fff00000c7a61100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.057749] fff00000c7a61180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.057956] >fff00000c7a61200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 20.058002] ^ [ 20.058038] fff00000c7a61280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.058521] fff00000c7a61300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.058581] ================================================================== [ 20.000950] ================================================================== [ 20.001027] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.001097] Read of size 1 at addr fff00000c791d100 by task kunit_try_catch/229 [ 20.001150] [ 20.001191] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.001278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.001307] Hardware name: linux,dummy-virt (DT) [ 20.001342] Call trace: [ 20.001365] show_stack+0x20/0x38 (C) [ 20.001416] dump_stack_lvl+0x8c/0xd0 [ 20.001467] print_report+0x118/0x608 [ 20.001513] kasan_report+0xdc/0x128 [ 20.001557] __asan_report_load1_noabort+0x20/0x30 [ 20.001609] mempool_uaf_helper+0x314/0x340 [ 20.001658] mempool_kmalloc_uaf+0xc4/0x120 [ 20.001706] kunit_try_run_case+0x170/0x3f0 [ 20.001757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.001811] kthread+0x328/0x630 [ 20.001887] ret_from_fork+0x10/0x20 [ 20.001938] [ 20.001957] Allocated by task 229: [ 20.001985] kasan_save_stack+0x3c/0x68 [ 20.002025] kasan_save_track+0x20/0x40 [ 20.002062] kasan_save_alloc_info+0x40/0x58 [ 20.002100] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.002142] remove_element+0x130/0x1f8 [ 20.002185] mempool_alloc_preallocated+0x58/0xc0 [ 20.002226] mempool_uaf_helper+0xa4/0x340 [ 20.002267] mempool_kmalloc_uaf+0xc4/0x120 [ 20.002305] kunit_try_run_case+0x170/0x3f0 [ 20.002345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.002391] kthread+0x328/0x630 [ 20.002426] ret_from_fork+0x10/0x20 [ 20.002462] [ 20.002481] Freed by task 229: [ 20.002507] kasan_save_stack+0x3c/0x68 [ 20.002542] kasan_save_track+0x20/0x40 [ 20.002578] kasan_save_free_info+0x4c/0x78 [ 20.002615] __kasan_mempool_poison_object+0xc0/0x150 [ 20.002658] mempool_free+0x28c/0x328 [ 20.002695] mempool_uaf_helper+0x104/0x340 [ 20.002735] mempool_kmalloc_uaf+0xc4/0x120 [ 20.002773] kunit_try_run_case+0x170/0x3f0 [ 20.002812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.002867] kthread+0x328/0x630 [ 20.002902] ret_from_fork+0x10/0x20 [ 20.002937] [ 20.002958] The buggy address belongs to the object at fff00000c791d100 [ 20.002958] which belongs to the cache kmalloc-128 of size 128 [ 20.003018] The buggy address is located 0 bytes inside of [ 20.003018] freed 128-byte region [fff00000c791d100, fff00000c791d180) [ 20.003080] [ 20.003101] The buggy address belongs to the physical page: [ 20.003132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 20.003192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.003244] page_type: f5(slab) [ 20.003286] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.003339] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.003382] page dumped because: kasan: bad access detected [ 20.003414] [ 20.003432] Memory state around the buggy address: [ 20.003464] fff00000c791d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.003510] fff00000c791d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.003557] >fff00000c791d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.003599] ^ [ 20.003627] fff00000c791d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.003672] fff00000c791d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.003714] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 19.933393] ================================================================== [ 19.933451] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.933510] Read of size 1 at addr fff00000c7a6e001 by task kunit_try_catch/225 [ 19.933559] [ 19.933591] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 19.933676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.933703] Hardware name: linux,dummy-virt (DT) [ 19.933735] Call trace: [ 19.933757] show_stack+0x20/0x38 (C) [ 19.935894] dump_stack_lvl+0x8c/0xd0 [ 19.936288] print_report+0x118/0x608 [ 19.936333] kasan_report+0xdc/0x128 [ 19.936378] __asan_report_load1_noabort+0x20/0x30 [ 19.936426] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.936477] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 19.936530] kunit_try_run_case+0x170/0x3f0 [ 19.936577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.936630] kthread+0x328/0x630 [ 19.936675] ret_from_fork+0x10/0x20 [ 19.936723] [ 19.936743] The buggy address belongs to the physical page: [ 19.936779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a6c [ 19.936833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.936959] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.937019] page_type: f8(unknown) [ 19.937061] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.937121] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.937242] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.937303] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.937357] head: 0bfffe0000000002 ffffc1ffc31e9b01 00000000ffffffff 00000000ffffffff [ 19.937409] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.937876] page dumped because: kasan: bad access detected [ 19.938280] [ 19.938338] Memory state around the buggy address: [ 19.938393] fff00000c7a6df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.938474] fff00000c7a6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.938698] >fff00000c7a6e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.939037] ^ [ 19.939099] fff00000c7a6e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.939155] fff00000c7a6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.939244] ================================================================== [ 19.911022] ================================================================== [ 19.911092] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.911170] Read of size 1 at addr fff00000c7a5f173 by task kunit_try_catch/223 [ 19.911220] [ 19.911261] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 19.911350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.911377] Hardware name: linux,dummy-virt (DT) [ 19.911413] Call trace: [ 19.911437] show_stack+0x20/0x38 (C) [ 19.911487] dump_stack_lvl+0x8c/0xd0 [ 19.911536] print_report+0x118/0x608 [ 19.911582] kasan_report+0xdc/0x128 [ 19.911625] __asan_report_load1_noabort+0x20/0x30 [ 19.911676] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.911728] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.911779] kunit_try_run_case+0x170/0x3f0 [ 19.911830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.911915] kthread+0x328/0x630 [ 19.911962] ret_from_fork+0x10/0x20 [ 19.912012] [ 19.912031] Allocated by task 223: [ 19.912059] kasan_save_stack+0x3c/0x68 [ 19.912100] kasan_save_track+0x20/0x40 [ 19.912139] kasan_save_alloc_info+0x40/0x58 [ 19.912177] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.912221] remove_element+0x130/0x1f8 [ 19.912261] mempool_alloc_preallocated+0x58/0xc0 [ 19.912303] mempool_oob_right_helper+0x98/0x2f0 [ 19.912346] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.912386] kunit_try_run_case+0x170/0x3f0 [ 19.912427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.912471] kthread+0x328/0x630 [ 19.912527] ret_from_fork+0x10/0x20 [ 19.912563] [ 19.912583] The buggy address belongs to the object at fff00000c7a5f100 [ 19.912583] which belongs to the cache kmalloc-128 of size 128 [ 19.912642] The buggy address is located 0 bytes to the right of [ 19.912642] allocated 115-byte region [fff00000c7a5f100, fff00000c7a5f173) [ 19.912710] [ 19.912731] The buggy address belongs to the physical page: [ 19.912764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5f [ 19.912819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.912882] page_type: f5(slab) [ 19.912927] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.912980] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.913023] page dumped because: kasan: bad access detected [ 19.913059] [ 19.913077] Memory state around the buggy address: [ 19.913111] fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.913158] fff00000c7a5f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.913205] >fff00000c7a5f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.913249] ^ [ 19.913293] fff00000c7a5f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.913341] fff00000c7a5f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.913382] ================================================================== [ 19.952297] ================================================================== [ 19.952418] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.952484] Read of size 1 at addr fff00000c5c432bb by task kunit_try_catch/227 [ 19.952538] [ 19.952571] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 19.953355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.954038] Hardware name: linux,dummy-virt (DT) [ 19.954738] Call trace: [ 19.954802] show_stack+0x20/0x38 (C) [ 19.955068] dump_stack_lvl+0x8c/0xd0 [ 19.955325] print_report+0x118/0x608 [ 19.955504] kasan_report+0xdc/0x128 [ 19.955668] __asan_report_load1_noabort+0x20/0x30 [ 19.955727] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.956083] mempool_slab_oob_right+0xc0/0x118 [ 19.956238] kunit_try_run_case+0x170/0x3f0 [ 19.956401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.956532] kthread+0x328/0x630 [ 19.956758] ret_from_fork+0x10/0x20 [ 19.956869] [ 19.956889] Allocated by task 227: [ 19.956917] kasan_save_stack+0x3c/0x68 [ 19.956957] kasan_save_track+0x20/0x40 [ 19.957049] kasan_save_alloc_info+0x40/0x58 [ 19.957090] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.957299] remove_element+0x16c/0x1f8 [ 19.957562] mempool_alloc_preallocated+0x58/0xc0 [ 19.957697] mempool_oob_right_helper+0x98/0x2f0 [ 19.957902] mempool_slab_oob_right+0xc0/0x118 [ 19.957960] kunit_try_run_case+0x170/0x3f0 [ 19.958086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.958338] kthread+0x328/0x630 [ 19.958377] ret_from_fork+0x10/0x20 [ 19.958614] [ 19.958661] The buggy address belongs to the object at fff00000c5c43240 [ 19.958661] which belongs to the cache test_cache of size 123 [ 19.959103] The buggy address is located 0 bytes to the right of [ 19.959103] allocated 123-byte region [fff00000c5c43240, fff00000c5c432bb) [ 19.959178] [ 19.959516] The buggy address belongs to the physical page: [ 19.959750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c43 [ 19.959825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.960086] page_type: f5(slab) [ 19.960217] raw: 0bfffe0000000000 fff00000c59d6a00 dead000000000122 0000000000000000 [ 19.960415] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.960461] page dumped because: kasan: bad access detected [ 19.960751] [ 19.960779] Memory state around the buggy address: [ 19.960878] fff00000c5c43180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.960925] fff00000c5c43200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 19.960970] >fff00000c5c43280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 19.961086] ^ [ 19.961123] fff00000c5c43300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.961352] fff00000c5c43380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.961396] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 19.350981] ================================================================== [ 19.351069] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 19.351156] Read of size 1 at addr fff00000c5a3b3c0 by task kunit_try_catch/217 [ 19.351210] [ 19.351254] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 19.351345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.351374] Hardware name: linux,dummy-virt (DT) [ 19.351410] Call trace: [ 19.351436] show_stack+0x20/0x38 (C) [ 19.351487] dump_stack_lvl+0x8c/0xd0 [ 19.351540] print_report+0x118/0x608 [ 19.351585] kasan_report+0xdc/0x128 [ 19.351631] __kasan_check_byte+0x54/0x70 [ 19.351678] kmem_cache_destroy+0x34/0x218 [ 19.351723] kmem_cache_double_destroy+0x174/0x300 [ 19.351775] kunit_try_run_case+0x170/0x3f0 [ 19.351825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.351896] kthread+0x328/0x630 [ 19.351942] ret_from_fork+0x10/0x20 [ 19.351993] [ 19.352011] Allocated by task 217: [ 19.352040] kasan_save_stack+0x3c/0x68 [ 19.352081] kasan_save_track+0x20/0x40 [ 19.352117] kasan_save_alloc_info+0x40/0x58 [ 19.352157] __kasan_slab_alloc+0xa8/0xb0 [ 19.352194] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.352233] __kmem_cache_create_args+0x178/0x280 [ 19.352274] kmem_cache_double_destroy+0xc0/0x300 [ 19.352314] kunit_try_run_case+0x170/0x3f0 [ 19.352354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.352399] kthread+0x328/0x630 [ 19.352438] ret_from_fork+0x10/0x20 [ 19.352474] [ 19.352493] Freed by task 217: [ 19.352519] kasan_save_stack+0x3c/0x68 [ 19.352554] kasan_save_track+0x20/0x40 [ 19.352590] kasan_save_free_info+0x4c/0x78 [ 19.352628] __kasan_slab_free+0x6c/0x98 [ 19.352665] kmem_cache_free+0x260/0x468 [ 19.352701] slab_kmem_cache_release+0x38/0x50 [ 19.352739] kmem_cache_release+0x1c/0x30 [ 19.352777] kobject_put+0x17c/0x420 [ 19.352813] sysfs_slab_release+0x1c/0x30 [ 19.352850] kmem_cache_destroy+0x118/0x218 [ 19.352898] kmem_cache_double_destroy+0x128/0x300 [ 19.352940] kunit_try_run_case+0x170/0x3f0 [ 19.352978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.353022] kthread+0x328/0x630 [ 19.353058] ret_from_fork+0x10/0x20 [ 19.353095] [ 19.353114] The buggy address belongs to the object at fff00000c5a3b3c0 [ 19.353114] which belongs to the cache kmem_cache of size 208 [ 19.353175] The buggy address is located 0 bytes inside of [ 19.353175] freed 208-byte region [fff00000c5a3b3c0, fff00000c5a3b490) [ 19.353237] [ 19.353258] The buggy address belongs to the physical page: [ 19.353292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a3b [ 19.353346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.353402] page_type: f5(slab) [ 19.353447] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 19.353500] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 19.353545] page dumped because: kasan: bad access detected [ 19.353579] [ 19.353597] Memory state around the buggy address: [ 19.353632] fff00000c5a3b280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.353678] fff00000c5a3b300: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 19.353725] >fff00000c5a3b380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 19.353767] ^ [ 19.353800] fff00000c5a3b400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.353846] fff00000c5a3b480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.353896] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 19.268438] ================================================================== [ 19.268550] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 19.268627] Read of size 1 at addr fff00000c7a50000 by task kunit_try_catch/215 [ 19.268680] [ 19.268720] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 19.268811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.268839] Hardware name: linux,dummy-virt (DT) [ 19.268908] Call trace: [ 19.268935] show_stack+0x20/0x38 (C) [ 19.268985] dump_stack_lvl+0x8c/0xd0 [ 19.269037] print_report+0x118/0x608 [ 19.269081] kasan_report+0xdc/0x128 [ 19.269126] __asan_report_load1_noabort+0x20/0x30 [ 19.269176] kmem_cache_rcu_uaf+0x388/0x468 [ 19.269224] kunit_try_run_case+0x170/0x3f0 [ 19.269275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.269330] kthread+0x328/0x630 [ 19.269380] ret_from_fork+0x10/0x20 [ 19.269432] [ 19.269450] Allocated by task 215: [ 19.269478] kasan_save_stack+0x3c/0x68 [ 19.269520] kasan_save_track+0x20/0x40 [ 19.269557] kasan_save_alloc_info+0x40/0x58 [ 19.269596] __kasan_slab_alloc+0xa8/0xb0 [ 19.269633] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.269674] kmem_cache_rcu_uaf+0x12c/0x468 [ 19.269715] kunit_try_run_case+0x170/0x3f0 [ 19.269755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.269801] kthread+0x328/0x630 [ 19.269836] ret_from_fork+0x10/0x20 [ 19.269883] [ 19.269903] Freed by task 0: [ 19.269930] kasan_save_stack+0x3c/0x68 [ 19.269967] kasan_save_track+0x20/0x40 [ 19.270003] kasan_save_free_info+0x4c/0x78 [ 19.270041] __kasan_slab_free+0x6c/0x98 [ 19.270077] slab_free_after_rcu_debug+0xd4/0x2f8 [ 19.270116] rcu_core+0x9f4/0x1e20 [ 19.270151] rcu_core_si+0x18/0x30 [ 19.270185] handle_softirqs+0x374/0xb28 [ 19.270222] __do_softirq+0x1c/0x28 [ 19.270255] [ 19.270275] Last potentially related work creation: [ 19.270300] kasan_save_stack+0x3c/0x68 [ 19.270336] kasan_record_aux_stack+0xb4/0xc8 [ 19.270374] kmem_cache_free+0x120/0x468 [ 19.270410] kmem_cache_rcu_uaf+0x16c/0x468 [ 19.270451] kunit_try_run_case+0x170/0x3f0 [ 19.270488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.270533] kthread+0x328/0x630 [ 19.270567] ret_from_fork+0x10/0x20 [ 19.270603] [ 19.270621] The buggy address belongs to the object at fff00000c7a50000 [ 19.270621] which belongs to the cache test_cache of size 200 [ 19.270681] The buggy address is located 0 bytes inside of [ 19.270681] freed 200-byte region [fff00000c7a50000, fff00000c7a500c8) [ 19.270743] [ 19.270763] The buggy address belongs to the physical page: [ 19.270797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a50 [ 19.270864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.270918] page_type: f5(slab) [ 19.270964] raw: 0bfffe0000000000 fff00000c59d6780 dead000000000122 0000000000000000 [ 19.271020] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.271065] page dumped because: kasan: bad access detected [ 19.271101] [ 19.271118] Memory state around the buggy address: [ 19.271158] fff00000c7a4ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.271204] fff00000c7a4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.271251] >fff00000c7a50000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.271294] ^ [ 19.271322] fff00000c7a50080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 19.271367] fff00000c7a50100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.271409] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 18.758845] ================================================================== [ 18.758958] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 18.759018] Free of addr fff00000c7a36001 by task kunit_try_catch/213 [ 18.759059] [ 18.759098] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.759353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.759411] Hardware name: linux,dummy-virt (DT) [ 18.759446] Call trace: [ 18.759497] show_stack+0x20/0x38 (C) [ 18.759558] dump_stack_lvl+0x8c/0xd0 [ 18.759644] print_report+0x118/0x608 [ 18.759694] kasan_report_invalid_free+0xc0/0xe8 [ 18.759745] check_slab_allocation+0xfc/0x108 [ 18.760047] __kasan_slab_pre_free+0x2c/0x48 [ 18.760216] kmem_cache_free+0xf0/0x468 [ 18.760390] kmem_cache_invalid_free+0x184/0x3c8 [ 18.760460] kunit_try_run_case+0x170/0x3f0 [ 18.760533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.760591] kthread+0x328/0x630 [ 18.760636] ret_from_fork+0x10/0x20 [ 18.760893] [ 18.760960] Allocated by task 213: [ 18.761051] kasan_save_stack+0x3c/0x68 [ 18.761128] kasan_save_track+0x20/0x40 [ 18.761223] kasan_save_alloc_info+0x40/0x58 [ 18.761261] __kasan_slab_alloc+0xa8/0xb0 [ 18.761500] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.761681] kmem_cache_invalid_free+0x12c/0x3c8 [ 18.761797] kunit_try_run_case+0x170/0x3f0 [ 18.761867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.761912] kthread+0x328/0x630 [ 18.762161] ret_from_fork+0x10/0x20 [ 18.762310] [ 18.762349] The buggy address belongs to the object at fff00000c7a36000 [ 18.762349] which belongs to the cache test_cache of size 200 [ 18.762545] The buggy address is located 1 bytes inside of [ 18.762545] 200-byte region [fff00000c7a36000, fff00000c7a360c8) [ 18.762627] [ 18.762646] The buggy address belongs to the physical page: [ 18.762880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a36 [ 18.763068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.763199] page_type: f5(slab) [ 18.763336] raw: 0bfffe0000000000 fff00000c59d6640 dead000000000122 0000000000000000 [ 18.763449] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.763537] page dumped because: kasan: bad access detected [ 18.763569] [ 18.763587] Memory state around the buggy address: [ 18.763692] fff00000c7a35f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.763958] fff00000c7a35f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.764016] >fff00000c7a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.764177] ^ [ 18.764207] fff00000c7a36080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 18.764280] fff00000c7a36100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.764322] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 18.736641] ================================================================== [ 18.736713] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 18.736789] Free of addr fff00000c7a34000 by task kunit_try_catch/211 [ 18.736834] [ 18.736885] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.737022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.737088] Hardware name: linux,dummy-virt (DT) [ 18.737165] Call trace: [ 18.737215] show_stack+0x20/0x38 (C) [ 18.737267] dump_stack_lvl+0x8c/0xd0 [ 18.737353] print_report+0x118/0x608 [ 18.737399] kasan_report_invalid_free+0xc0/0xe8 [ 18.737520] check_slab_allocation+0xd4/0x108 [ 18.737623] __kasan_slab_pre_free+0x2c/0x48 [ 18.737783] kmem_cache_free+0xf0/0x468 [ 18.737903] kmem_cache_double_free+0x190/0x3c8 [ 18.737996] kunit_try_run_case+0x170/0x3f0 [ 18.738077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.738257] kthread+0x328/0x630 [ 18.738468] ret_from_fork+0x10/0x20 [ 18.738533] [ 18.738551] Allocated by task 211: [ 18.738582] kasan_save_stack+0x3c/0x68 [ 18.738707] kasan_save_track+0x20/0x40 [ 18.738867] kasan_save_alloc_info+0x40/0x58 [ 18.738999] __kasan_slab_alloc+0xa8/0xb0 [ 18.739075] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.739121] kmem_cache_double_free+0x12c/0x3c8 [ 18.739167] kunit_try_run_case+0x170/0x3f0 [ 18.739251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.739316] kthread+0x328/0x630 [ 18.739358] ret_from_fork+0x10/0x20 [ 18.739402] [ 18.739428] Freed by task 211: [ 18.739455] kasan_save_stack+0x3c/0x68 [ 18.739490] kasan_save_track+0x20/0x40 [ 18.739525] kasan_save_free_info+0x4c/0x78 [ 18.739567] __kasan_slab_free+0x6c/0x98 [ 18.739603] kmem_cache_free+0x260/0x468 [ 18.739639] kmem_cache_double_free+0x140/0x3c8 [ 18.739679] kunit_try_run_case+0x170/0x3f0 [ 18.739723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.739768] kthread+0x328/0x630 [ 18.739802] ret_from_fork+0x10/0x20 [ 18.739836] [ 18.739865] The buggy address belongs to the object at fff00000c7a34000 [ 18.739865] which belongs to the cache test_cache of size 200 [ 18.739929] The buggy address is located 0 bytes inside of [ 18.739929] 200-byte region [fff00000c7a34000, fff00000c7a340c8) [ 18.740012] [ 18.740037] The buggy address belongs to the physical page: [ 18.740070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a34 [ 18.740128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.740470] page_type: f5(slab) [ 18.740619] raw: 0bfffe0000000000 fff00000c59d6500 dead000000000122 0000000000000000 [ 18.740729] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.740773] page dumped because: kasan: bad access detected [ 18.740825] [ 18.740844] Memory state around the buggy address: [ 18.740890] fff00000c7a33f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.740965] fff00000c7a33f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.741183] >fff00000c7a34000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.741247] ^ [ 18.741324] fff00000c7a34080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 18.741479] fff00000c7a34100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.741556] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 18.584998] ================================================================== [ 18.585062] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 18.585121] Read of size 1 at addr fff00000c79850c8 by task kunit_try_catch/209 [ 18.585554] [ 18.585689] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.586081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.586187] Hardware name: linux,dummy-virt (DT) [ 18.586262] Call trace: [ 18.586407] show_stack+0x20/0x38 (C) [ 18.586472] dump_stack_lvl+0x8c/0xd0 [ 18.586564] print_report+0x118/0x608 [ 18.586851] kasan_report+0xdc/0x128 [ 18.587102] __asan_report_load1_noabort+0x20/0x30 [ 18.587174] kmem_cache_oob+0x344/0x430 [ 18.587357] kunit_try_run_case+0x170/0x3f0 [ 18.587467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.587528] kthread+0x328/0x630 [ 18.587574] ret_from_fork+0x10/0x20 [ 18.587630] [ 18.587647] Allocated by task 209: [ 18.587817] kasan_save_stack+0x3c/0x68 [ 18.587992] kasan_save_track+0x20/0x40 [ 18.588093] kasan_save_alloc_info+0x40/0x58 [ 18.588187] __kasan_slab_alloc+0xa8/0xb0 [ 18.588373] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.588467] kmem_cache_oob+0x12c/0x430 [ 18.588692] kunit_try_run_case+0x170/0x3f0 [ 18.588906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.589012] kthread+0x328/0x630 [ 18.589167] ret_from_fork+0x10/0x20 [ 18.589362] [ 18.589418] The buggy address belongs to the object at fff00000c7985000 [ 18.589418] which belongs to the cache test_cache of size 200 [ 18.589602] The buggy address is located 0 bytes to the right of [ 18.589602] allocated 200-byte region [fff00000c7985000, fff00000c79850c8) [ 18.589674] [ 18.589987] The buggy address belongs to the physical page: [ 18.590039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107985 [ 18.590207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.590301] page_type: f5(slab) [ 18.590481] raw: 0bfffe0000000000 fff00000c59d63c0 dead000000000122 0000000000000000 [ 18.590734] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.590888] page dumped because: kasan: bad access detected [ 18.590975] [ 18.591121] Memory state around the buggy address: [ 18.591195] fff00000c7984f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.591332] fff00000c7985000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.591380] >fff00000c7985080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 18.591423] ^ [ 18.591460] fff00000c7985100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.591547] fff00000c7985180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.591589] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 18.549580] ================================================================== [ 18.549770] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 18.550083] Read of size 8 at addr fff00000c797f680 by task kunit_try_catch/202 [ 18.550220] [ 18.550327] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.550528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.550606] Hardware name: linux,dummy-virt (DT) [ 18.550671] Call trace: [ 18.550729] show_stack+0x20/0x38 (C) [ 18.550786] dump_stack_lvl+0x8c/0xd0 [ 18.550841] print_report+0x118/0x608 [ 18.550896] kasan_report+0xdc/0x128 [ 18.550942] __asan_report_load8_noabort+0x20/0x30 [ 18.550992] workqueue_uaf+0x480/0x4a8 [ 18.551038] kunit_try_run_case+0x170/0x3f0 [ 18.551543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.551621] kthread+0x328/0x630 [ 18.551990] ret_from_fork+0x10/0x20 [ 18.552400] [ 18.552582] Allocated by task 202: [ 18.552682] kasan_save_stack+0x3c/0x68 [ 18.552729] kasan_save_track+0x20/0x40 [ 18.552765] kasan_save_alloc_info+0x40/0x58 [ 18.552836] __kasan_kmalloc+0xd4/0xd8 [ 18.552883] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.552923] workqueue_uaf+0x13c/0x4a8 [ 18.552962] kunit_try_run_case+0x170/0x3f0 [ 18.553000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.553046] kthread+0x328/0x630 [ 18.553081] ret_from_fork+0x10/0x20 [ 18.553117] [ 18.553135] Freed by task 75: [ 18.553162] kasan_save_stack+0x3c/0x68 [ 18.553527] kasan_save_track+0x20/0x40 [ 18.553603] kasan_save_free_info+0x4c/0x78 [ 18.553747] __kasan_slab_free+0x6c/0x98 [ 18.553785] kfree+0x214/0x3c8 [ 18.554227] workqueue_uaf_work+0x18/0x30 [ 18.554293] process_one_work+0x530/0xf98 [ 18.554351] worker_thread+0x618/0xf38 [ 18.554405] kthread+0x328/0x630 [ 18.554440] ret_from_fork+0x10/0x20 [ 18.554478] [ 18.554532] Last potentially related work creation: [ 18.554569] kasan_save_stack+0x3c/0x68 [ 18.554621] kasan_record_aux_stack+0xb4/0xc8 [ 18.554661] __queue_work+0x65c/0x1008 [ 18.554711] queue_work_on+0xbc/0xf8 [ 18.554768] workqueue_uaf+0x210/0x4a8 [ 18.554810] kunit_try_run_case+0x170/0x3f0 [ 18.554872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.554921] kthread+0x328/0x630 [ 18.554968] ret_from_fork+0x10/0x20 [ 18.555011] [ 18.555056] The buggy address belongs to the object at fff00000c797f680 [ 18.555056] which belongs to the cache kmalloc-32 of size 32 [ 18.555122] The buggy address is located 0 bytes inside of [ 18.555122] freed 32-byte region [fff00000c797f680, fff00000c797f6a0) [ 18.555201] [ 18.555223] The buggy address belongs to the physical page: [ 18.555260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10797f [ 18.555333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.555401] page_type: f5(slab) [ 18.555455] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.555508] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.555561] page dumped because: kasan: bad access detected [ 18.555602] [ 18.555620] Memory state around the buggy address: [ 18.555658] fff00000c797f580: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 18.555705] fff00000c797f600: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 18.555751] >fff00000c797f680: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.555794] ^ [ 18.555821] fff00000c797f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.556640] fff00000c797f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.556754] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 18.255060] ================================================================== [ 18.255278] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 18.255342] Read of size 1 at addr fff00000c5bdcd00 by task kunit_try_catch/198 [ 18.255554] [ 18.255621] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.255713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.255934] Hardware name: linux,dummy-virt (DT) [ 18.256100] Call trace: [ 18.256152] show_stack+0x20/0x38 (C) [ 18.256294] dump_stack_lvl+0x8c/0xd0 [ 18.256471] print_report+0x118/0x608 [ 18.256601] kasan_report+0xdc/0x128 [ 18.256790] __kasan_check_byte+0x54/0x70 [ 18.256975] ksize+0x30/0x88 [ 18.257047] ksize_uaf+0x168/0x5f8 [ 18.257199] kunit_try_run_case+0x170/0x3f0 [ 18.257356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.257484] kthread+0x328/0x630 [ 18.257722] ret_from_fork+0x10/0x20 [ 18.258128] [ 18.258174] Allocated by task 198: [ 18.258242] kasan_save_stack+0x3c/0x68 [ 18.258403] kasan_save_track+0x20/0x40 [ 18.258536] kasan_save_alloc_info+0x40/0x58 [ 18.258600] __kasan_kmalloc+0xd4/0xd8 [ 18.258635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.259038] ksize_uaf+0xb8/0x5f8 [ 18.259181] kunit_try_run_case+0x170/0x3f0 [ 18.259312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.259508] kthread+0x328/0x630 [ 18.259557] ret_from_fork+0x10/0x20 [ 18.259592] [ 18.259668] Freed by task 198: [ 18.260002] kasan_save_stack+0x3c/0x68 [ 18.260072] kasan_save_track+0x20/0x40 [ 18.260227] kasan_save_free_info+0x4c/0x78 [ 18.260419] __kasan_slab_free+0x6c/0x98 [ 18.260554] kfree+0x214/0x3c8 [ 18.260589] ksize_uaf+0x11c/0x5f8 [ 18.260625] kunit_try_run_case+0x170/0x3f0 [ 18.260940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.261099] kthread+0x328/0x630 [ 18.261301] ret_from_fork+0x10/0x20 [ 18.261439] [ 18.261602] The buggy address belongs to the object at fff00000c5bdcd00 [ 18.261602] which belongs to the cache kmalloc-128 of size 128 [ 18.261697] The buggy address is located 0 bytes inside of [ 18.261697] freed 128-byte region [fff00000c5bdcd00, fff00000c5bdcd80) [ 18.261897] [ 18.261943] The buggy address belongs to the physical page: [ 18.261991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 18.262046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.262097] page_type: f5(slab) [ 18.262137] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.262200] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.262259] page dumped because: kasan: bad access detected [ 18.262302] [ 18.262320] Memory state around the buggy address: [ 18.262370] fff00000c5bdcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.262416] fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.262467] >fff00000c5bdcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.262519] ^ [ 18.262556] fff00000c5bdcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.262601] fff00000c5bdce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.262642] ================================================================== [ 18.272994] ================================================================== [ 18.273048] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 18.273341] Read of size 1 at addr fff00000c5bdcd78 by task kunit_try_catch/198 [ 18.273529] [ 18.273564] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.273660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.274046] Hardware name: linux,dummy-virt (DT) [ 18.274168] Call trace: [ 18.274195] show_stack+0x20/0x38 (C) [ 18.274248] dump_stack_lvl+0x8c/0xd0 [ 18.274357] print_report+0x118/0x608 [ 18.274407] kasan_report+0xdc/0x128 [ 18.274451] __asan_report_load1_noabort+0x20/0x30 [ 18.274500] ksize_uaf+0x544/0x5f8 [ 18.274786] kunit_try_run_case+0x170/0x3f0 [ 18.274881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.274937] kthread+0x328/0x630 [ 18.275064] ret_from_fork+0x10/0x20 [ 18.275153] [ 18.275201] Allocated by task 198: [ 18.275299] kasan_save_stack+0x3c/0x68 [ 18.275386] kasan_save_track+0x20/0x40 [ 18.275440] kasan_save_alloc_info+0x40/0x58 [ 18.275774] __kasan_kmalloc+0xd4/0xd8 [ 18.275820] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.275897] ksize_uaf+0xb8/0x5f8 [ 18.276006] kunit_try_run_case+0x170/0x3f0 [ 18.276170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.276305] kthread+0x328/0x630 [ 18.276427] ret_from_fork+0x10/0x20 [ 18.276604] [ 18.276809] Freed by task 198: [ 18.276872] kasan_save_stack+0x3c/0x68 [ 18.276986] kasan_save_track+0x20/0x40 [ 18.277122] kasan_save_free_info+0x4c/0x78 [ 18.277225] __kasan_slab_free+0x6c/0x98 [ 18.277458] kfree+0x214/0x3c8 [ 18.277523] ksize_uaf+0x11c/0x5f8 [ 18.277806] kunit_try_run_case+0x170/0x3f0 [ 18.277907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.277959] kthread+0x328/0x630 [ 18.277995] ret_from_fork+0x10/0x20 [ 18.278033] [ 18.278056] The buggy address belongs to the object at fff00000c5bdcd00 [ 18.278056] which belongs to the cache kmalloc-128 of size 128 [ 18.278120] The buggy address is located 120 bytes inside of [ 18.278120] freed 128-byte region [fff00000c5bdcd00, fff00000c5bdcd80) [ 18.278261] [ 18.278310] The buggy address belongs to the physical page: [ 18.278369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 18.278431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.278480] page_type: f5(slab) [ 18.278518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.278571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.278623] page dumped because: kasan: bad access detected [ 18.278655] [ 18.278674] Memory state around the buggy address: [ 18.278713] fff00000c5bdcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.278758] fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.278804] >fff00000c5bdcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.278844] ^ [ 18.278916] fff00000c5bdcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.278976] fff00000c5bdce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.279017] ================================================================== [ 18.264812] ================================================================== [ 18.265057] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 18.265203] Read of size 1 at addr fff00000c5bdcd00 by task kunit_try_catch/198 [ 18.265318] [ 18.265414] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.265505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.265792] Hardware name: linux,dummy-virt (DT) [ 18.265882] Call trace: [ 18.265909] show_stack+0x20/0x38 (C) [ 18.266014] dump_stack_lvl+0x8c/0xd0 [ 18.266066] print_report+0x118/0x608 [ 18.266148] kasan_report+0xdc/0x128 [ 18.266202] __asan_report_load1_noabort+0x20/0x30 [ 18.266523] ksize_uaf+0x598/0x5f8 [ 18.266591] kunit_try_run_case+0x170/0x3f0 [ 18.266669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.266725] kthread+0x328/0x630 [ 18.266770] ret_from_fork+0x10/0x20 [ 18.267065] [ 18.267112] Allocated by task 198: [ 18.267376] kasan_save_stack+0x3c/0x68 [ 18.267447] kasan_save_track+0x20/0x40 [ 18.267483] kasan_save_alloc_info+0x40/0x58 [ 18.267586] __kasan_kmalloc+0xd4/0xd8 [ 18.267632] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.267671] ksize_uaf+0xb8/0x5f8 [ 18.267706] kunit_try_run_case+0x170/0x3f0 [ 18.267874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.268051] kthread+0x328/0x630 [ 18.268171] ret_from_fork+0x10/0x20 [ 18.268219] [ 18.268240] Freed by task 198: [ 18.268268] kasan_save_stack+0x3c/0x68 [ 18.268304] kasan_save_track+0x20/0x40 [ 18.268611] kasan_save_free_info+0x4c/0x78 [ 18.268682] __kasan_slab_free+0x6c/0x98 [ 18.269064] kfree+0x214/0x3c8 [ 18.269306] ksize_uaf+0x11c/0x5f8 [ 18.269398] kunit_try_run_case+0x170/0x3f0 [ 18.269714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.269849] kthread+0x328/0x630 [ 18.270062] ret_from_fork+0x10/0x20 [ 18.270401] [ 18.270450] The buggy address belongs to the object at fff00000c5bdcd00 [ 18.270450] which belongs to the cache kmalloc-128 of size 128 [ 18.270591] The buggy address is located 0 bytes inside of [ 18.270591] freed 128-byte region [fff00000c5bdcd00, fff00000c5bdcd80) [ 18.270742] [ 18.270812] The buggy address belongs to the physical page: [ 18.270843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 18.271326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.271454] page_type: f5(slab) [ 18.271498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.271706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.271769] page dumped because: kasan: bad access detected [ 18.271809] [ 18.271827] Memory state around the buggy address: [ 18.271894] fff00000c5bdcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.271940] fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.271984] >fff00000c5bdcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.272026] ^ [ 18.272064] fff00000c5bdcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.272109] fff00000c5bdce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.272152] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 18.233760] ================================================================== [ 18.233810] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.233878] Read of size 1 at addr fff00000c5bdcc78 by task kunit_try_catch/196 [ 18.233929] [ 18.233959] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.234045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.234074] Hardware name: linux,dummy-virt (DT) [ 18.234106] Call trace: [ 18.234145] show_stack+0x20/0x38 (C) [ 18.234194] dump_stack_lvl+0x8c/0xd0 [ 18.234252] print_report+0x118/0x608 [ 18.234298] kasan_report+0xdc/0x128 [ 18.234351] __asan_report_load1_noabort+0x20/0x30 [ 18.234403] ksize_unpoisons_memory+0x618/0x740 [ 18.234454] kunit_try_run_case+0x170/0x3f0 [ 18.234508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.234569] kthread+0x328/0x630 [ 18.234615] ret_from_fork+0x10/0x20 [ 18.234662] [ 18.234681] Allocated by task 196: [ 18.234722] kasan_save_stack+0x3c/0x68 [ 18.234770] kasan_save_track+0x20/0x40 [ 18.234807] kasan_save_alloc_info+0x40/0x58 [ 18.234844] __kasan_kmalloc+0xd4/0xd8 [ 18.235526] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.235578] ksize_unpoisons_memory+0xc0/0x740 [ 18.235621] kunit_try_run_case+0x170/0x3f0 [ 18.235818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.235888] kthread+0x328/0x630 [ 18.235954] ret_from_fork+0x10/0x20 [ 18.236203] [ 18.236332] The buggy address belongs to the object at fff00000c5bdcc00 [ 18.236332] which belongs to the cache kmalloc-128 of size 128 [ 18.236397] The buggy address is located 5 bytes to the right of [ 18.236397] allocated 115-byte region [fff00000c5bdcc00, fff00000c5bdcc73) [ 18.236470] [ 18.236490] The buggy address belongs to the physical page: [ 18.236815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 18.236956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.237010] page_type: f5(slab) [ 18.237344] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.237501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.237557] page dumped because: kasan: bad access detected [ 18.237607] [ 18.237944] Memory state around the buggy address: [ 18.238016] fff00000c5bdcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.238101] fff00000c5bdcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.238150] >fff00000c5bdcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.238364] ^ [ 18.238521] fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.238647] fff00000c5bdcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.239001] ================================================================== [ 18.240605] ================================================================== [ 18.240658] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.240810] Read of size 1 at addr fff00000c5bdcc7f by task kunit_try_catch/196 [ 18.240925] [ 18.240957] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.241335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.241409] Hardware name: linux,dummy-virt (DT) [ 18.241445] Call trace: [ 18.241485] show_stack+0x20/0x38 (C) [ 18.241537] dump_stack_lvl+0x8c/0xd0 [ 18.241820] print_report+0x118/0x608 [ 18.241890] kasan_report+0xdc/0x128 [ 18.241938] __asan_report_load1_noabort+0x20/0x30 [ 18.241990] ksize_unpoisons_memory+0x690/0x740 [ 18.242119] kunit_try_run_case+0x170/0x3f0 [ 18.242172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.242501] kthread+0x328/0x630 [ 18.242581] ret_from_fork+0x10/0x20 [ 18.242748] [ 18.242787] Allocated by task 196: [ 18.242817] kasan_save_stack+0x3c/0x68 [ 18.243093] kasan_save_track+0x20/0x40 [ 18.243173] kasan_save_alloc_info+0x40/0x58 [ 18.243221] __kasan_kmalloc+0xd4/0xd8 [ 18.243294] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.243349] ksize_unpoisons_memory+0xc0/0x740 [ 18.243392] kunit_try_run_case+0x170/0x3f0 [ 18.243658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.243745] kthread+0x328/0x630 [ 18.243795] ret_from_fork+0x10/0x20 [ 18.243831] [ 18.244068] The buggy address belongs to the object at fff00000c5bdcc00 [ 18.244068] which belongs to the cache kmalloc-128 of size 128 [ 18.244310] The buggy address is located 12 bytes to the right of [ 18.244310] allocated 115-byte region [fff00000c5bdcc00, fff00000c5bdcc73) [ 18.244516] [ 18.244539] The buggy address belongs to the physical page: [ 18.244569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 18.244777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.244911] page_type: f5(slab) [ 18.245009] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.245127] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.245204] page dumped because: kasan: bad access detected [ 18.245346] [ 18.245444] Memory state around the buggy address: [ 18.245600] fff00000c5bdcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.245675] fff00000c5bdcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.246078] >fff00000c5bdcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.246263] ^ [ 18.246366] fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.246450] fff00000c5bdcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.246620] ================================================================== [ 18.226223] ================================================================== [ 18.226324] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.226601] Read of size 1 at addr fff00000c5bdcc73 by task kunit_try_catch/196 [ 18.226901] [ 18.227033] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.227161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.227207] Hardware name: linux,dummy-virt (DT) [ 18.227240] Call trace: [ 18.227299] show_stack+0x20/0x38 (C) [ 18.227545] dump_stack_lvl+0x8c/0xd0 [ 18.227597] print_report+0x118/0x608 [ 18.227741] kasan_report+0xdc/0x128 [ 18.227795] __asan_report_load1_noabort+0x20/0x30 [ 18.227959] ksize_unpoisons_memory+0x628/0x740 [ 18.228168] kunit_try_run_case+0x170/0x3f0 [ 18.228223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.228278] kthread+0x328/0x630 [ 18.228323] ret_from_fork+0x10/0x20 [ 18.228371] [ 18.228390] Allocated by task 196: [ 18.228417] kasan_save_stack+0x3c/0x68 [ 18.228457] kasan_save_track+0x20/0x40 [ 18.228493] kasan_save_alloc_info+0x40/0x58 [ 18.228532] __kasan_kmalloc+0xd4/0xd8 [ 18.228567] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.228606] ksize_unpoisons_memory+0xc0/0x740 [ 18.228646] kunit_try_run_case+0x170/0x3f0 [ 18.228686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.228730] kthread+0x328/0x630 [ 18.228764] ret_from_fork+0x10/0x20 [ 18.229158] [ 18.229239] The buggy address belongs to the object at fff00000c5bdcc00 [ 18.229239] which belongs to the cache kmalloc-128 of size 128 [ 18.229396] The buggy address is located 0 bytes to the right of [ 18.229396] allocated 115-byte region [fff00000c5bdcc00, fff00000c5bdcc73) [ 18.229642] [ 18.229697] The buggy address belongs to the physical page: [ 18.229734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 18.230265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.230360] page_type: f5(slab) [ 18.230494] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.230600] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.231001] page dumped because: kasan: bad access detected [ 18.231066] [ 18.231124] Memory state around the buggy address: [ 18.231871] fff00000c5bdcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.231954] fff00000c5bdcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.232024] >fff00000c5bdcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.232099] ^ [ 18.232179] fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.232309] fff00000c5bdcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.232406] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 18.202008] ================================================================== [ 18.202079] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 18.202249] Free of addr fff00000c59e5600 by task kunit_try_catch/194 [ 18.202304] [ 18.202333] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.202419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.202447] Hardware name: linux,dummy-virt (DT) [ 18.202481] Call trace: [ 18.202523] show_stack+0x20/0x38 (C) [ 18.202575] dump_stack_lvl+0x8c/0xd0 [ 18.202631] print_report+0x118/0x608 [ 18.202676] kasan_report_invalid_free+0xc0/0xe8 [ 18.202730] check_slab_allocation+0xd4/0x108 [ 18.202785] __kasan_slab_pre_free+0x2c/0x48 [ 18.202840] kfree+0xe8/0x3c8 [ 18.202893] kfree_sensitive+0x3c/0xb0 [ 18.202938] kmalloc_double_kzfree+0x168/0x308 [ 18.202986] kunit_try_run_case+0x170/0x3f0 [ 18.203040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.203092] kthread+0x328/0x630 [ 18.203157] ret_from_fork+0x10/0x20 [ 18.203204] [ 18.203221] Allocated by task 194: [ 18.203249] kasan_save_stack+0x3c/0x68 [ 18.203288] kasan_save_track+0x20/0x40 [ 18.203323] kasan_save_alloc_info+0x40/0x58 [ 18.203363] __kasan_kmalloc+0xd4/0xd8 [ 18.203398] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.203435] kmalloc_double_kzfree+0xb8/0x308 [ 18.203476] kunit_try_run_case+0x170/0x3f0 [ 18.203513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.203567] kthread+0x328/0x630 [ 18.203609] ret_from_fork+0x10/0x20 [ 18.203647] [ 18.203664] Freed by task 194: [ 18.203696] kasan_save_stack+0x3c/0x68 [ 18.203731] kasan_save_track+0x20/0x40 [ 18.203766] kasan_save_free_info+0x4c/0x78 [ 18.203804] __kasan_slab_free+0x6c/0x98 [ 18.203848] kfree+0x214/0x3c8 [ 18.204676] kfree_sensitive+0x80/0xb0 [ 18.204751] kmalloc_double_kzfree+0x11c/0x308 [ 18.204812] kunit_try_run_case+0x170/0x3f0 [ 18.204912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.205219] kthread+0x328/0x630 [ 18.205288] ret_from_fork+0x10/0x20 [ 18.205325] [ 18.205590] The buggy address belongs to the object at fff00000c59e5600 [ 18.205590] which belongs to the cache kmalloc-16 of size 16 [ 18.205757] The buggy address is located 0 bytes inside of [ 18.205757] 16-byte region [fff00000c59e5600, fff00000c59e5610) [ 18.205866] [ 18.205886] The buggy address belongs to the physical page: [ 18.206146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5 [ 18.206238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.206386] page_type: f5(slab) [ 18.206596] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.206832] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.207029] page dumped because: kasan: bad access detected [ 18.207236] [ 18.207285] Memory state around the buggy address: [ 18.207336] fff00000c59e5500: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 18.207769] fff00000c59e5580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.207819] >fff00000c59e5600: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.208155] ^ [ 18.208228] fff00000c59e5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.208351] fff00000c59e5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.208395] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 18.190987] ================================================================== [ 18.191288] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 18.191364] Read of size 1 at addr fff00000c59e5600 by task kunit_try_catch/194 [ 18.191424] [ 18.191459] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.191878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.192071] Hardware name: linux,dummy-virt (DT) [ 18.192157] Call trace: [ 18.192279] show_stack+0x20/0x38 (C) [ 18.192373] dump_stack_lvl+0x8c/0xd0 [ 18.192546] print_report+0x118/0x608 [ 18.192601] kasan_report+0xdc/0x128 [ 18.192791] __kasan_check_byte+0x54/0x70 [ 18.193233] kfree_sensitive+0x30/0xb0 [ 18.193332] kmalloc_double_kzfree+0x168/0x308 [ 18.193477] kunit_try_run_case+0x170/0x3f0 [ 18.193629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.193749] kthread+0x328/0x630 [ 18.193921] ret_from_fork+0x10/0x20 [ 18.194153] [ 18.194179] Allocated by task 194: [ 18.194435] kasan_save_stack+0x3c/0x68 [ 18.194558] kasan_save_track+0x20/0x40 [ 18.194685] kasan_save_alloc_info+0x40/0x58 [ 18.194754] __kasan_kmalloc+0xd4/0xd8 [ 18.194795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.195107] kmalloc_double_kzfree+0xb8/0x308 [ 18.195204] kunit_try_run_case+0x170/0x3f0 [ 18.195293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.195411] kthread+0x328/0x630 [ 18.195450] ret_from_fork+0x10/0x20 [ 18.195914] [ 18.196009] Freed by task 194: [ 18.196122] kasan_save_stack+0x3c/0x68 [ 18.196201] kasan_save_track+0x20/0x40 [ 18.196309] kasan_save_free_info+0x4c/0x78 [ 18.196563] __kasan_slab_free+0x6c/0x98 [ 18.196687] kfree+0x214/0x3c8 [ 18.196795] kfree_sensitive+0x80/0xb0 [ 18.196977] kmalloc_double_kzfree+0x11c/0x308 [ 18.197311] kunit_try_run_case+0x170/0x3f0 [ 18.197393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.197576] kthread+0x328/0x630 [ 18.197625] ret_from_fork+0x10/0x20 [ 18.197883] [ 18.197928] The buggy address belongs to the object at fff00000c59e5600 [ 18.197928] which belongs to the cache kmalloc-16 of size 16 [ 18.198102] The buggy address is located 0 bytes inside of [ 18.198102] freed 16-byte region [fff00000c59e5600, fff00000c59e5610) [ 18.198394] [ 18.198540] The buggy address belongs to the physical page: [ 18.198623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5 [ 18.198728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.198801] page_type: f5(slab) [ 18.199124] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.199202] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.199338] page dumped because: kasan: bad access detected [ 18.199417] [ 18.199729] Memory state around the buggy address: [ 18.199783] fff00000c59e5500: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 18.199875] fff00000c59e5580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.199975] >fff00000c59e5600: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.200084] ^ [ 18.200118] fff00000c59e5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.200174] fff00000c59e5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.200216] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 18.167114] ================================================================== [ 18.167178] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 18.167235] Read of size 1 at addr fff00000c797b428 by task kunit_try_catch/190 [ 18.167285] [ 18.167317] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.167402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.167430] Hardware name: linux,dummy-virt (DT) [ 18.167462] Call trace: [ 18.167483] show_stack+0x20/0x38 (C) [ 18.167531] dump_stack_lvl+0x8c/0xd0 [ 18.167579] print_report+0x118/0x608 [ 18.168367] kasan_report+0xdc/0x128 [ 18.168506] __asan_report_load1_noabort+0x20/0x30 [ 18.168876] kmalloc_uaf2+0x3f4/0x468 [ 18.168952] kunit_try_run_case+0x170/0x3f0 [ 18.169035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.169208] kthread+0x328/0x630 [ 18.169345] ret_from_fork+0x10/0x20 [ 18.169756] [ 18.169812] Allocated by task 190: [ 18.169896] kasan_save_stack+0x3c/0x68 [ 18.170090] kasan_save_track+0x20/0x40 [ 18.170132] kasan_save_alloc_info+0x40/0x58 [ 18.170406] __kasan_kmalloc+0xd4/0xd8 [ 18.170531] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.170644] kmalloc_uaf2+0xc4/0x468 [ 18.170836] kunit_try_run_case+0x170/0x3f0 [ 18.171168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.171261] kthread+0x328/0x630 [ 18.171338] ret_from_fork+0x10/0x20 [ 18.171440] [ 18.171567] Freed by task 190: [ 18.171792] kasan_save_stack+0x3c/0x68 [ 18.171834] kasan_save_track+0x20/0x40 [ 18.172153] kasan_save_free_info+0x4c/0x78 [ 18.172200] __kasan_slab_free+0x6c/0x98 [ 18.172237] kfree+0x214/0x3c8 [ 18.172298] kmalloc_uaf2+0x134/0x468 [ 18.172689] kunit_try_run_case+0x170/0x3f0 [ 18.172789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.172964] kthread+0x328/0x630 [ 18.173015] ret_from_fork+0x10/0x20 [ 18.173205] [ 18.173367] The buggy address belongs to the object at fff00000c797b400 [ 18.173367] which belongs to the cache kmalloc-64 of size 64 [ 18.173483] The buggy address is located 40 bytes inside of [ 18.173483] freed 64-byte region [fff00000c797b400, fff00000c797b440) [ 18.173570] [ 18.173598] The buggy address belongs to the physical page: [ 18.173630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10797b [ 18.173683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.173742] page_type: f5(slab) [ 18.173791] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.173870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.173919] page dumped because: kasan: bad access detected [ 18.173951] [ 18.173968] Memory state around the buggy address: [ 18.174009] fff00000c797b300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.174064] fff00000c797b380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.174109] >fff00000c797b400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.174149] ^ [ 18.174190] fff00000c797b480: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 18.174236] fff00000c797b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.174295] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 18.145364] ================================================================== [ 18.145430] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 18.145491] Write of size 33 at addr fff00000c797b280 by task kunit_try_catch/188 [ 18.145544] [ 18.145797] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.146002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.146032] Hardware name: linux,dummy-virt (DT) [ 18.146414] Call trace: [ 18.146482] show_stack+0x20/0x38 (C) [ 18.146640] dump_stack_lvl+0x8c/0xd0 [ 18.146725] print_report+0x118/0x608 [ 18.146772] kasan_report+0xdc/0x128 [ 18.146837] kasan_check_range+0x100/0x1a8 [ 18.147168] __asan_memset+0x34/0x78 [ 18.147248] kmalloc_uaf_memset+0x170/0x310 [ 18.147300] kunit_try_run_case+0x170/0x3f0 [ 18.147451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.147511] kthread+0x328/0x630 [ 18.147556] ret_from_fork+0x10/0x20 [ 18.147610] [ 18.147629] Allocated by task 188: [ 18.147913] kasan_save_stack+0x3c/0x68 [ 18.148069] kasan_save_track+0x20/0x40 [ 18.148172] kasan_save_alloc_info+0x40/0x58 [ 18.148360] __kasan_kmalloc+0xd4/0xd8 [ 18.148465] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.148609] kmalloc_uaf_memset+0xb8/0x310 [ 18.148671] kunit_try_run_case+0x170/0x3f0 [ 18.148731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.148777] kthread+0x328/0x630 [ 18.148814] ret_from_fork+0x10/0x20 [ 18.148849] [ 18.149049] Freed by task 188: [ 18.149123] kasan_save_stack+0x3c/0x68 [ 18.149326] kasan_save_track+0x20/0x40 [ 18.149440] kasan_save_free_info+0x4c/0x78 [ 18.149529] __kasan_slab_free+0x6c/0x98 [ 18.149745] kfree+0x214/0x3c8 [ 18.149787] kmalloc_uaf_memset+0x11c/0x310 [ 18.150026] kunit_try_run_case+0x170/0x3f0 [ 18.150801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.150929] kthread+0x328/0x630 [ 18.150996] ret_from_fork+0x10/0x20 [ 18.151059] [ 18.151108] The buggy address belongs to the object at fff00000c797b280 [ 18.151108] which belongs to the cache kmalloc-64 of size 64 [ 18.151271] The buggy address is located 0 bytes inside of [ 18.151271] freed 64-byte region [fff00000c797b280, fff00000c797b2c0) [ 18.151493] [ 18.151537] The buggy address belongs to the physical page: [ 18.151783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10797b [ 18.152002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.152434] page_type: f5(slab) [ 18.152616] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.152778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.152826] page dumped because: kasan: bad access detected [ 18.153265] [ 18.153453] Memory state around the buggy address: [ 18.153516] fff00000c797b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.153612] fff00000c797b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.153668] >fff00000c797b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.153737] ^ [ 18.153783] fff00000c797b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.153845] fff00000c797b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.153901] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 18.115182] ================================================================== [ 18.115242] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 18.115298] Read of size 1 at addr fff00000c59e55e8 by task kunit_try_catch/186 [ 18.115349] [ 18.115380] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.115463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.115491] Hardware name: linux,dummy-virt (DT) [ 18.115529] Call trace: [ 18.115564] show_stack+0x20/0x38 (C) [ 18.115612] dump_stack_lvl+0x8c/0xd0 [ 18.115660] print_report+0x118/0x608 [ 18.115710] kasan_report+0xdc/0x128 [ 18.115756] __asan_report_load1_noabort+0x20/0x30 [ 18.115804] kmalloc_uaf+0x300/0x338 [ 18.115849] kunit_try_run_case+0x170/0x3f0 [ 18.116511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.116568] kthread+0x328/0x630 [ 18.116616] ret_from_fork+0x10/0x20 [ 18.117087] [ 18.117143] Allocated by task 186: [ 18.117180] kasan_save_stack+0x3c/0x68 [ 18.117506] kasan_save_track+0x20/0x40 [ 18.117667] kasan_save_alloc_info+0x40/0x58 [ 18.117711] __kasan_kmalloc+0xd4/0xd8 [ 18.117774] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.118157] kmalloc_uaf+0xb8/0x338 [ 18.118260] kunit_try_run_case+0x170/0x3f0 [ 18.118744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.118948] kthread+0x328/0x630 [ 18.119034] ret_from_fork+0x10/0x20 [ 18.119079] [ 18.119429] Freed by task 186: [ 18.119498] kasan_save_stack+0x3c/0x68 [ 18.119598] kasan_save_track+0x20/0x40 [ 18.119918] kasan_save_free_info+0x4c/0x78 [ 18.119995] __kasan_slab_free+0x6c/0x98 [ 18.120120] kfree+0x214/0x3c8 [ 18.120205] kmalloc_uaf+0x11c/0x338 [ 18.120249] kunit_try_run_case+0x170/0x3f0 [ 18.120565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.120723] kthread+0x328/0x630 [ 18.120930] ret_from_fork+0x10/0x20 [ 18.121086] [ 18.121109] The buggy address belongs to the object at fff00000c59e55e0 [ 18.121109] which belongs to the cache kmalloc-16 of size 16 [ 18.121202] The buggy address is located 8 bytes inside of [ 18.121202] freed 16-byte region [fff00000c59e55e0, fff00000c59e55f0) [ 18.121556] [ 18.121582] The buggy address belongs to the physical page: [ 18.121903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5 [ 18.122056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.122382] page_type: f5(slab) [ 18.122454] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.122754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.122846] page dumped because: kasan: bad access detected [ 18.123101] [ 18.123165] Memory state around the buggy address: [ 18.123321] fff00000c59e5480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.123406] fff00000c59e5500: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 18.123732] >fff00000c59e5580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.123846] ^ [ 18.124002] fff00000c59e5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.124165] fff00000c59e5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.124391] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 18.093784] ================================================================== [ 18.094137] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 18.094366] Read of size 64 at addr fff00000c6759f84 by task kunit_try_catch/184 [ 18.094419] [ 18.094453] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.094585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.094612] Hardware name: linux,dummy-virt (DT) [ 18.094643] Call trace: [ 18.094907] show_stack+0x20/0x38 (C) [ 18.095041] dump_stack_lvl+0x8c/0xd0 [ 18.095094] print_report+0x118/0x608 [ 18.095138] kasan_report+0xdc/0x128 [ 18.095274] kasan_check_range+0x100/0x1a8 [ 18.095361] __asan_memmove+0x3c/0x98 [ 18.095422] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 18.095673] kunit_try_run_case+0x170/0x3f0 [ 18.095726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.095840] kthread+0x328/0x630 [ 18.096494] ret_from_fork+0x10/0x20 [ 18.096581] [ 18.096604] Allocated by task 184: [ 18.096947] kasan_save_stack+0x3c/0x68 [ 18.097024] kasan_save_track+0x20/0x40 [ 18.097090] kasan_save_alloc_info+0x40/0x58 [ 18.097289] __kasan_kmalloc+0xd4/0xd8 [ 18.097538] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.097610] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 18.098021] kunit_try_run_case+0x170/0x3f0 [ 18.098102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.098190] kthread+0x328/0x630 [ 18.098409] ret_from_fork+0x10/0x20 [ 18.098492] [ 18.098628] The buggy address belongs to the object at fff00000c6759f80 [ 18.098628] which belongs to the cache kmalloc-64 of size 64 [ 18.098745] The buggy address is located 4 bytes inside of [ 18.098745] allocated 64-byte region [fff00000c6759f80, fff00000c6759fc0) [ 18.099157] [ 18.099211] The buggy address belongs to the physical page: [ 18.099395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106759 [ 18.099545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.099658] page_type: f5(slab) [ 18.099706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.100092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.100177] page dumped because: kasan: bad access detected [ 18.100342] [ 18.100384] Memory state around the buggy address: [ 18.100435] fff00000c6759e80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.100536] fff00000c6759f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.100583] >fff00000c6759f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.100924] ^ [ 18.100990] fff00000c675a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.101108] fff00000c675a080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.101196] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 18.070011] ================================================================== [ 18.070081] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.070256] Read of size 18446744073709551614 at addr fff00000c6759d84 by task kunit_try_catch/182 [ 18.070358] [ 18.070389] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.070698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.070736] Hardware name: linux,dummy-virt (DT) [ 18.070774] Call trace: [ 18.071011] show_stack+0x20/0x38 (C) [ 18.071116] dump_stack_lvl+0x8c/0xd0 [ 18.071175] print_report+0x118/0x608 [ 18.071219] kasan_report+0xdc/0x128 [ 18.071262] kasan_check_range+0x100/0x1a8 [ 18.071308] __asan_memmove+0x3c/0x98 [ 18.071352] kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.071461] kunit_try_run_case+0x170/0x3f0 [ 18.071528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.071591] kthread+0x328/0x630 [ 18.071673] ret_from_fork+0x10/0x20 [ 18.071728] [ 18.071747] Allocated by task 182: [ 18.071773] kasan_save_stack+0x3c/0x68 [ 18.071876] kasan_save_track+0x20/0x40 [ 18.072048] kasan_save_alloc_info+0x40/0x58 [ 18.072099] __kasan_kmalloc+0xd4/0xd8 [ 18.072142] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.072282] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 18.072332] kunit_try_run_case+0x170/0x3f0 [ 18.072371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.072422] kthread+0x328/0x630 [ 18.072605] ret_from_fork+0x10/0x20 [ 18.072777] [ 18.072911] The buggy address belongs to the object at fff00000c6759d80 [ 18.072911] which belongs to the cache kmalloc-64 of size 64 [ 18.073291] The buggy address is located 4 bytes inside of [ 18.073291] 64-byte region [fff00000c6759d80, fff00000c6759dc0) [ 18.073443] [ 18.073559] The buggy address belongs to the physical page: [ 18.073683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106759 [ 18.074016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.074210] page_type: f5(slab) [ 18.074303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.074355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.074533] page dumped because: kasan: bad access detected [ 18.074628] [ 18.074764] Memory state around the buggy address: [ 18.074893] fff00000c6759c80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 18.074971] fff00000c6759d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.075213] >fff00000c6759d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.075378] ^ [ 18.075456] fff00000c6759e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.075574] fff00000c6759e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.075616] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 18.057228] ================================================================== [ 18.057621] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 18.057771] Write of size 16 at addr fff00000c5bdcb69 by task kunit_try_catch/180 [ 18.057825] [ 18.057866] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.058166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.058281] Hardware name: linux,dummy-virt (DT) [ 18.058380] Call trace: [ 18.058480] show_stack+0x20/0x38 (C) [ 18.058534] dump_stack_lvl+0x8c/0xd0 [ 18.058608] print_report+0x118/0x608 [ 18.058659] kasan_report+0xdc/0x128 [ 18.058950] kasan_check_range+0x100/0x1a8 [ 18.059019] __asan_memset+0x34/0x78 [ 18.059064] kmalloc_oob_memset_16+0x150/0x2f8 [ 18.059358] kunit_try_run_case+0x170/0x3f0 [ 18.059430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.059484] kthread+0x328/0x630 [ 18.059528] ret_from_fork+0x10/0x20 [ 18.059658] [ 18.059725] Allocated by task 180: [ 18.059754] kasan_save_stack+0x3c/0x68 [ 18.059949] kasan_save_track+0x20/0x40 [ 18.060001] kasan_save_alloc_info+0x40/0x58 [ 18.060040] __kasan_kmalloc+0xd4/0xd8 [ 18.060155] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.060274] kmalloc_oob_memset_16+0xb0/0x2f8 [ 18.060354] kunit_try_run_case+0x170/0x3f0 [ 18.060533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.060693] kthread+0x328/0x630 [ 18.060789] ret_from_fork+0x10/0x20 [ 18.060860] [ 18.060880] The buggy address belongs to the object at fff00000c5bdcb00 [ 18.060880] which belongs to the cache kmalloc-128 of size 128 [ 18.060937] The buggy address is located 105 bytes inside of [ 18.060937] allocated 120-byte region [fff00000c5bdcb00, fff00000c5bdcb78) [ 18.060999] [ 18.061019] The buggy address belongs to the physical page: [ 18.061049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 18.061483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.061644] page_type: f5(slab) [ 18.061750] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.061981] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.062107] page dumped because: kasan: bad access detected [ 18.062141] [ 18.062159] Memory state around the buggy address: [ 18.062396] fff00000c5bdca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.062561] fff00000c5bdca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.062737] >fff00000c5bdcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.062843] ^ [ 18.062995] fff00000c5bdcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.063050] fff00000c5bdcc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.063089] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 18.042745] ================================================================== [ 18.042801] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 18.042866] Write of size 8 at addr fff00000c5bdca71 by task kunit_try_catch/178 [ 18.042916] [ 18.042944] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.043026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.043053] Hardware name: linux,dummy-virt (DT) [ 18.043082] Call trace: [ 18.043103] show_stack+0x20/0x38 (C) [ 18.043156] dump_stack_lvl+0x8c/0xd0 [ 18.043202] print_report+0x118/0x608 [ 18.043245] kasan_report+0xdc/0x128 [ 18.043288] kasan_check_range+0x100/0x1a8 [ 18.043333] __asan_memset+0x34/0x78 [ 18.043376] kmalloc_oob_memset_8+0x150/0x2f8 [ 18.043423] kunit_try_run_case+0x170/0x3f0 [ 18.043469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.043521] kthread+0x328/0x630 [ 18.043564] ret_from_fork+0x10/0x20 [ 18.043644] [ 18.043712] Allocated by task 178: [ 18.043739] kasan_save_stack+0x3c/0x68 [ 18.043813] kasan_save_track+0x20/0x40 [ 18.043848] kasan_save_alloc_info+0x40/0x58 [ 18.043896] __kasan_kmalloc+0xd4/0xd8 [ 18.044095] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.044233] kmalloc_oob_memset_8+0xb0/0x2f8 [ 18.044291] kunit_try_run_case+0x170/0x3f0 [ 18.044647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.044690] kthread+0x328/0x630 [ 18.044725] ret_from_fork+0x10/0x20 [ 18.044794] [ 18.044896] The buggy address belongs to the object at fff00000c5bdca00 [ 18.044896] which belongs to the cache kmalloc-128 of size 128 [ 18.044952] The buggy address is located 113 bytes inside of [ 18.044952] allocated 120-byte region [fff00000c5bdca00, fff00000c5bdca78) [ 18.045065] [ 18.045130] The buggy address belongs to the physical page: [ 18.045158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 18.045263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.045319] page_type: f5(slab) [ 18.045357] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.045467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.045531] page dumped because: kasan: bad access detected [ 18.045617] [ 18.045726] Memory state around the buggy address: [ 18.045815] fff00000c5bdc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.045888] fff00000c5bdc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.045961] >fff00000c5bdca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.045999] ^ [ 18.046053] fff00000c5bdca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.046096] fff00000c5bdcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.046135] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 18.033963] ================================================================== [ 18.034057] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 18.034155] Write of size 4 at addr fff00000c5bdc975 by task kunit_try_catch/176 [ 18.034210] [ 18.034257] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.034447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.034487] Hardware name: linux,dummy-virt (DT) [ 18.034517] Call trace: [ 18.034551] show_stack+0x20/0x38 (C) [ 18.034600] dump_stack_lvl+0x8c/0xd0 [ 18.034698] print_report+0x118/0x608 [ 18.034753] kasan_report+0xdc/0x128 [ 18.034797] kasan_check_range+0x100/0x1a8 [ 18.034842] __asan_memset+0x34/0x78 [ 18.034954] kmalloc_oob_memset_4+0x150/0x300 [ 18.035030] kunit_try_run_case+0x170/0x3f0 [ 18.035100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.035186] kthread+0x328/0x630 [ 18.035231] ret_from_fork+0x10/0x20 [ 18.035296] [ 18.035342] Allocated by task 176: [ 18.035456] kasan_save_stack+0x3c/0x68 [ 18.035566] kasan_save_track+0x20/0x40 [ 18.035603] kasan_save_alloc_info+0x40/0x58 [ 18.035646] __kasan_kmalloc+0xd4/0xd8 [ 18.035687] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.035776] kmalloc_oob_memset_4+0xb0/0x300 [ 18.035842] kunit_try_run_case+0x170/0x3f0 [ 18.035922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.036000] kthread+0x328/0x630 [ 18.036048] ret_from_fork+0x10/0x20 [ 18.036125] [ 18.036144] The buggy address belongs to the object at fff00000c5bdc900 [ 18.036144] which belongs to the cache kmalloc-128 of size 128 [ 18.036211] The buggy address is located 117 bytes inside of [ 18.036211] allocated 120-byte region [fff00000c5bdc900, fff00000c5bdc978) [ 18.036274] [ 18.036293] The buggy address belongs to the physical page: [ 18.036322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 18.036639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.036687] page_type: f5(slab) [ 18.036778] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.036956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.037047] page dumped because: kasan: bad access detected [ 18.037105] [ 18.037195] Memory state around the buggy address: [ 18.037303] fff00000c5bdc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.037347] fff00000c5bdc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.037585] >fff00000c5bdc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.037769] ^ [ 18.037896] fff00000c5bdc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.037999] fff00000c5bdca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.038106] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 18.026108] ================================================================== [ 18.026172] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 18.026230] Write of size 2 at addr fff00000c5bdc877 by task kunit_try_catch/174 [ 18.026280] [ 18.026314] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 18.026403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.026462] Hardware name: linux,dummy-virt (DT) [ 18.026494] Call trace: [ 18.026518] show_stack+0x20/0x38 (C) [ 18.026568] dump_stack_lvl+0x8c/0xd0 [ 18.026616] print_report+0x118/0x608 [ 18.026659] kasan_report+0xdc/0x128 [ 18.026701] kasan_check_range+0x100/0x1a8 [ 18.026746] __asan_memset+0x34/0x78 [ 18.026790] kmalloc_oob_memset_2+0x150/0x2f8 [ 18.026836] kunit_try_run_case+0x170/0x3f0 [ 18.026896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.026958] kthread+0x328/0x630 [ 18.027003] ret_from_fork+0x10/0x20 [ 18.027049] [ 18.027068] Allocated by task 174: [ 18.027094] kasan_save_stack+0x3c/0x68 [ 18.027137] kasan_save_track+0x20/0x40 [ 18.027178] kasan_save_alloc_info+0x40/0x58 [ 18.027215] __kasan_kmalloc+0xd4/0xd8 [ 18.027254] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.027302] kmalloc_oob_memset_2+0xb0/0x2f8 [ 18.027341] kunit_try_run_case+0x170/0x3f0 [ 18.027387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.027430] kthread+0x328/0x630 [ 18.027466] ret_from_fork+0x10/0x20 [ 18.027502] [ 18.027521] The buggy address belongs to the object at fff00000c5bdc800 [ 18.027521] which belongs to the cache kmalloc-128 of size 128 [ 18.027577] The buggy address is located 119 bytes inside of [ 18.027577] allocated 120-byte region [fff00000c5bdc800, fff00000c5bdc878) [ 18.027637] [ 18.027657] The buggy address belongs to the physical page: [ 18.027688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 18.027740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.027801] page_type: f5(slab) [ 18.027843] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.027904] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.027945] page dumped because: kasan: bad access detected [ 18.027976] [ 18.027993] Memory state around the buggy address: [ 18.028025] fff00000c5bdc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.028068] fff00000c5bdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.028112] >fff00000c5bdc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.028151] ^ [ 18.028189] fff00000c5bdc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.028399] fff00000c5bdc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.028569] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 17.922800] ================================================================== [ 17.922872] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 17.922930] Read of size 16 at addr fff00000c59e55c0 by task kunit_try_catch/170 [ 17.922980] [ 17.923012] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.923095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.923122] Hardware name: linux,dummy-virt (DT) [ 17.923160] Call trace: [ 17.923182] show_stack+0x20/0x38 (C) [ 17.923229] dump_stack_lvl+0x8c/0xd0 [ 17.923277] print_report+0x118/0x608 [ 17.923322] kasan_report+0xdc/0x128 [ 17.924711] __asan_report_load16_noabort+0x20/0x30 [ 17.924785] kmalloc_uaf_16+0x3bc/0x438 [ 17.925274] kunit_try_run_case+0x170/0x3f0 [ 17.925328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.925617] kthread+0x328/0x630 [ 17.925670] ret_from_fork+0x10/0x20 [ 17.925718] [ 17.925737] Allocated by task 170: [ 17.926277] kasan_save_stack+0x3c/0x68 [ 17.926386] kasan_save_track+0x20/0x40 [ 17.926430] kasan_save_alloc_info+0x40/0x58 [ 17.926468] __kasan_kmalloc+0xd4/0xd8 [ 17.926542] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.926610] kmalloc_uaf_16+0x140/0x438 [ 17.926712] kunit_try_run_case+0x170/0x3f0 [ 17.926752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.926845] kthread+0x328/0x630 [ 17.927036] ret_from_fork+0x10/0x20 [ 17.927073] [ 17.927091] Freed by task 170: [ 17.927454] kasan_save_stack+0x3c/0x68 [ 17.927691] kasan_save_track+0x20/0x40 [ 17.927728] kasan_save_free_info+0x4c/0x78 [ 17.927767] __kasan_slab_free+0x6c/0x98 [ 17.927803] kfree+0x214/0x3c8 [ 17.927835] kmalloc_uaf_16+0x190/0x438 [ 17.928187] kunit_try_run_case+0x170/0x3f0 [ 17.928231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.928302] kthread+0x328/0x630 [ 17.928530] ret_from_fork+0x10/0x20 [ 17.928824] [ 17.928991] The buggy address belongs to the object at fff00000c59e55c0 [ 17.928991] which belongs to the cache kmalloc-16 of size 16 [ 17.929178] The buggy address is located 0 bytes inside of [ 17.929178] freed 16-byte region [fff00000c59e55c0, fff00000c59e55d0) [ 17.929243] [ 17.929262] The buggy address belongs to the physical page: [ 17.929638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5 [ 17.929944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.930000] page_type: f5(slab) [ 17.930048] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.930370] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.930423] page dumped because: kasan: bad access detected [ 17.930464] [ 17.930483] Memory state around the buggy address: [ 17.930515] fff00000c59e5480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.930891] fff00000c59e5500: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 17.931400] >fff00000c59e5580: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 17.931718] ^ [ 17.931760] fff00000c59e5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.931847] fff00000c59e5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.932246] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 17.903185] ================================================================== [ 17.903247] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 17.903302] Write of size 16 at addr fff00000c59e5560 by task kunit_try_catch/168 [ 17.903353] [ 17.903384] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.903467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.903494] Hardware name: linux,dummy-virt (DT) [ 17.903524] Call trace: [ 17.903754] show_stack+0x20/0x38 (C) [ 17.904050] dump_stack_lvl+0x8c/0xd0 [ 17.904539] print_report+0x118/0x608 [ 17.904981] kasan_report+0xdc/0x128 [ 17.905037] __asan_report_store16_noabort+0x20/0x30 [ 17.905131] kmalloc_oob_16+0x3a0/0x3f8 [ 17.905179] kunit_try_run_case+0x170/0x3f0 [ 17.905230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.905750] kthread+0x328/0x630 [ 17.905806] ret_from_fork+0x10/0x20 [ 17.905867] [ 17.906010] Allocated by task 168: [ 17.906256] kasan_save_stack+0x3c/0x68 [ 17.906520] kasan_save_track+0x20/0x40 [ 17.906562] kasan_save_alloc_info+0x40/0x58 [ 17.906640] __kasan_kmalloc+0xd4/0xd8 [ 17.906682] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.906970] kmalloc_oob_16+0xb4/0x3f8 [ 17.907015] kunit_try_run_case+0x170/0x3f0 [ 17.907053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.907321] kthread+0x328/0x630 [ 17.907379] ret_from_fork+0x10/0x20 [ 17.907415] [ 17.907463] The buggy address belongs to the object at fff00000c59e5560 [ 17.907463] which belongs to the cache kmalloc-16 of size 16 [ 17.907629] The buggy address is located 0 bytes inside of [ 17.907629] allocated 13-byte region [fff00000c59e5560, fff00000c59e556d) [ 17.908065] [ 17.908088] The buggy address belongs to the physical page: [ 17.908126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5 [ 17.908178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.908226] page_type: f5(slab) [ 17.908595] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.908742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.909054] page dumped because: kasan: bad access detected [ 17.909087] [ 17.909292] Memory state around the buggy address: [ 17.909593] fff00000c59e5400: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 17.909823] fff00000c59e5480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.910080] >fff00000c59e5500: fa fb fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 17.910414] ^ [ 17.910461] fff00000c59e5580: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.910506] fff00000c59e5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.910546] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 17.882848] ================================================================== [ 17.882977] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 17.883072] Read of size 1 at addr fff00000c4776000 by task kunit_try_catch/166 [ 17.883125] [ 17.883161] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.883380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.883441] Hardware name: linux,dummy-virt (DT) [ 17.883490] Call trace: [ 17.883512] show_stack+0x20/0x38 (C) [ 17.883562] dump_stack_lvl+0x8c/0xd0 [ 17.883772] print_report+0x118/0x608 [ 17.883917] kasan_report+0xdc/0x128 [ 17.884011] __kasan_check_byte+0x54/0x70 [ 17.884243] krealloc_noprof+0x44/0x360 [ 17.884467] krealloc_uaf+0x180/0x520 [ 17.884617] kunit_try_run_case+0x170/0x3f0 [ 17.884670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.884969] kthread+0x328/0x630 [ 17.885140] ret_from_fork+0x10/0x20 [ 17.885300] [ 17.885369] Allocated by task 166: [ 17.885485] kasan_save_stack+0x3c/0x68 [ 17.885618] kasan_save_track+0x20/0x40 [ 17.885707] kasan_save_alloc_info+0x40/0x58 [ 17.885945] __kasan_kmalloc+0xd4/0xd8 [ 17.886165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.886235] krealloc_uaf+0xc8/0x520 [ 17.886271] kunit_try_run_case+0x170/0x3f0 [ 17.886368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.886421] kthread+0x328/0x630 [ 17.886456] ret_from_fork+0x10/0x20 [ 17.886492] [ 17.886528] Freed by task 166: [ 17.886566] kasan_save_stack+0x3c/0x68 [ 17.886613] kasan_save_track+0x20/0x40 [ 17.886656] kasan_save_free_info+0x4c/0x78 [ 17.886704] __kasan_slab_free+0x6c/0x98 [ 17.886739] kfree+0x214/0x3c8 [ 17.886771] krealloc_uaf+0x12c/0x520 [ 17.886803] kunit_try_run_case+0x170/0x3f0 [ 17.886864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.886910] kthread+0x328/0x630 [ 17.886945] ret_from_fork+0x10/0x20 [ 17.887007] [ 17.887032] The buggy address belongs to the object at fff00000c4776000 [ 17.887032] which belongs to the cache kmalloc-256 of size 256 [ 17.887159] The buggy address is located 0 bytes inside of [ 17.887159] freed 256-byte region [fff00000c4776000, fff00000c4776100) [ 17.887223] [ 17.887248] The buggy address belongs to the physical page: [ 17.887279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104776 [ 17.887339] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.887384] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.887444] page_type: f5(slab) [ 17.887489] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.887550] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.887601] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.887652] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.887701] head: 0bfffe0000000001 ffffc1ffc311dd81 00000000ffffffff 00000000ffffffff [ 17.887751] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.887791] page dumped because: kasan: bad access detected [ 17.887841] [ 17.887931] Memory state around the buggy address: [ 17.888202] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.888291] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.888337] >fff00000c4776000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.888385] ^ [ 17.888416] fff00000c4776080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.888459] fff00000c4776100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.888499] ================================================================== [ 17.889574] ================================================================== [ 17.889744] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 17.889827] Read of size 1 at addr fff00000c4776000 by task kunit_try_catch/166 [ 17.889957] [ 17.890006] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.890293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.890419] Hardware name: linux,dummy-virt (DT) [ 17.890472] Call trace: [ 17.890563] show_stack+0x20/0x38 (C) [ 17.890617] dump_stack_lvl+0x8c/0xd0 [ 17.890664] print_report+0x118/0x608 [ 17.890708] kasan_report+0xdc/0x128 [ 17.890803] __asan_report_load1_noabort+0x20/0x30 [ 17.890866] krealloc_uaf+0x4c8/0x520 [ 17.890909] kunit_try_run_case+0x170/0x3f0 [ 17.890962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.891015] kthread+0x328/0x630 [ 17.891099] ret_from_fork+0x10/0x20 [ 17.891191] [ 17.891210] Allocated by task 166: [ 17.891237] kasan_save_stack+0x3c/0x68 [ 17.891481] kasan_save_track+0x20/0x40 [ 17.891526] kasan_save_alloc_info+0x40/0x58 [ 17.891575] __kasan_kmalloc+0xd4/0xd8 [ 17.891611] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.891713] krealloc_uaf+0xc8/0x520 [ 17.891821] kunit_try_run_case+0x170/0x3f0 [ 17.891875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.892181] kthread+0x328/0x630 [ 17.892270] ret_from_fork+0x10/0x20 [ 17.892436] [ 17.892462] Freed by task 166: [ 17.892581] kasan_save_stack+0x3c/0x68 [ 17.892651] kasan_save_track+0x20/0x40 [ 17.892687] kasan_save_free_info+0x4c/0x78 [ 17.892732] __kasan_slab_free+0x6c/0x98 [ 17.892870] kfree+0x214/0x3c8 [ 17.892970] krealloc_uaf+0x12c/0x520 [ 17.893134] kunit_try_run_case+0x170/0x3f0 [ 17.893304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.893352] kthread+0x328/0x630 [ 17.893615] ret_from_fork+0x10/0x20 [ 17.893909] [ 17.894080] The buggy address belongs to the object at fff00000c4776000 [ 17.894080] which belongs to the cache kmalloc-256 of size 256 [ 17.894205] The buggy address is located 0 bytes inside of [ 17.894205] freed 256-byte region [fff00000c4776000, fff00000c4776100) [ 17.894350] [ 17.894370] The buggy address belongs to the physical page: [ 17.894400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104776 [ 17.894693] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.894800] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.894956] page_type: f5(slab) [ 17.895105] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.895210] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.895318] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.895606] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.895682] head: 0bfffe0000000001 ffffc1ffc311dd81 00000000ffffffff 00000000ffffffff [ 17.895846] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.896057] page dumped because: kasan: bad access detected [ 17.896147] [ 17.896282] Memory state around the buggy address: [ 17.896421] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.896470] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.896534] >fff00000c4776000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.896582] ^ [ 17.896747] fff00000c4776080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.897036] fff00000c4776100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.897181] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 17.864446] ================================================================== [ 17.864491] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.864538] Write of size 1 at addr fff00000c79160ea by task kunit_try_catch/164 [ 17.864773] [ 17.864957] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.865047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.865082] Hardware name: linux,dummy-virt (DT) [ 17.865206] Call trace: [ 17.865255] show_stack+0x20/0x38 (C) [ 17.865373] dump_stack_lvl+0x8c/0xd0 [ 17.865660] print_report+0x118/0x608 [ 17.865795] kasan_report+0xdc/0x128 [ 17.865880] __asan_report_store1_noabort+0x20/0x30 [ 17.865988] krealloc_less_oob_helper+0xae4/0xc50 [ 17.866038] krealloc_large_less_oob+0x20/0x38 [ 17.866084] kunit_try_run_case+0x170/0x3f0 [ 17.866131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.866184] kthread+0x328/0x630 [ 17.866235] ret_from_fork+0x10/0x20 [ 17.866291] [ 17.866320] The buggy address belongs to the physical page: [ 17.866358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914 [ 17.866409] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.866455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.866504] page_type: f8(unknown) [ 17.866542] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.866603] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.866663] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.866714] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.866764] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff [ 17.866814] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.866866] page dumped because: kasan: bad access detected [ 17.866908] [ 17.867137] Memory state around the buggy address: [ 17.867327] fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.867470] fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.867530] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.867705] ^ [ 17.867748] fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.867926] fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.868062] ================================================================== [ 17.847845] ================================================================== [ 17.847984] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.848134] Write of size 1 at addr fff00000c79160c9 by task kunit_try_catch/164 [ 17.848397] [ 17.848560] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.848667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.848815] Hardware name: linux,dummy-virt (DT) [ 17.848944] Call trace: [ 17.849020] show_stack+0x20/0x38 (C) [ 17.849100] dump_stack_lvl+0x8c/0xd0 [ 17.849229] print_report+0x118/0x608 [ 17.849275] kasan_report+0xdc/0x128 [ 17.849319] __asan_report_store1_noabort+0x20/0x30 [ 17.849547] krealloc_less_oob_helper+0xa48/0xc50 [ 17.849682] krealloc_large_less_oob+0x20/0x38 [ 17.849730] kunit_try_run_case+0x170/0x3f0 [ 17.850126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.850202] kthread+0x328/0x630 [ 17.850279] ret_from_fork+0x10/0x20 [ 17.850441] [ 17.850519] The buggy address belongs to the physical page: [ 17.850776] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914 [ 17.850886] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.850949] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.851075] page_type: f8(unknown) [ 17.851163] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.851330] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.851485] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.851603] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.851792] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff [ 17.851910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.851986] page dumped because: kasan: bad access detected [ 17.852032] [ 17.852088] Memory state around the buggy address: [ 17.852130] fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.852175] fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.852221] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.852261] ^ [ 17.852304] fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.852357] fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.852397] ================================================================== [ 17.853494] ================================================================== [ 17.853543] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.853783] Write of size 1 at addr fff00000c79160d0 by task kunit_try_catch/164 [ 17.853924] [ 17.853963] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.854046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.854080] Hardware name: linux,dummy-virt (DT) [ 17.854226] Call trace: [ 17.854277] show_stack+0x20/0x38 (C) [ 17.854361] dump_stack_lvl+0x8c/0xd0 [ 17.854442] print_report+0x118/0x608 [ 17.854487] kasan_report+0xdc/0x128 [ 17.854531] __asan_report_store1_noabort+0x20/0x30 [ 17.854614] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.854720] krealloc_large_less_oob+0x20/0x38 [ 17.854915] kunit_try_run_case+0x170/0x3f0 [ 17.854968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.855021] kthread+0x328/0x630 [ 17.855072] ret_from_fork+0x10/0x20 [ 17.855119] [ 17.855140] The buggy address belongs to the physical page: [ 17.855383] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914 [ 17.855518] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.855615] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.855736] page_type: f8(unknown) [ 17.855849] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.856126] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.856188] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.856568] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.856740] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff [ 17.857004] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.857155] page dumped because: kasan: bad access detected [ 17.857309] [ 17.857366] Memory state around the buggy address: [ 17.857400] fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.857445] fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.857495] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.857580] ^ [ 17.857638] fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.857690] fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.857744] ================================================================== [ 17.790769] ================================================================== [ 17.790822] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.791058] Write of size 1 at addr fff00000c4775ed0 by task kunit_try_catch/160 [ 17.791112] [ 17.791327] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.791545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.791601] Hardware name: linux,dummy-virt (DT) [ 17.791635] Call trace: [ 17.791656] show_stack+0x20/0x38 (C) [ 17.792023] dump_stack_lvl+0x8c/0xd0 [ 17.792145] print_report+0x118/0x608 [ 17.792548] kasan_report+0xdc/0x128 [ 17.792733] __asan_report_store1_noabort+0x20/0x30 [ 17.792797] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.793022] krealloc_less_oob+0x20/0x38 [ 17.793099] kunit_try_run_case+0x170/0x3f0 [ 17.793275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.793468] kthread+0x328/0x630 [ 17.793610] ret_from_fork+0x10/0x20 [ 17.793765] [ 17.793959] Allocated by task 160: [ 17.794023] kasan_save_stack+0x3c/0x68 [ 17.794166] kasan_save_track+0x20/0x40 [ 17.794241] kasan_save_alloc_info+0x40/0x58 [ 17.794339] __kasan_krealloc+0x118/0x178 [ 17.794428] krealloc_noprof+0x128/0x360 [ 17.794570] krealloc_less_oob_helper+0x168/0xc50 [ 17.794686] krealloc_less_oob+0x20/0x38 [ 17.794721] kunit_try_run_case+0x170/0x3f0 [ 17.794915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.795104] kthread+0x328/0x630 [ 17.795154] ret_from_fork+0x10/0x20 [ 17.795189] [ 17.795463] The buggy address belongs to the object at fff00000c4775e00 [ 17.795463] which belongs to the cache kmalloc-256 of size 256 [ 17.795695] The buggy address is located 7 bytes to the right of [ 17.795695] allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9) [ 17.795801] [ 17.795958] The buggy address belongs to the physical page: [ 17.796138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.796204] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.796249] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.796323] page_type: f5(slab) [ 17.796636] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.796723] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.796864] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.796966] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.797118] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.797282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.797631] page dumped because: kasan: bad access detected [ 17.797739] [ 17.797813] Memory state around the buggy address: [ 17.797970] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.798042] fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.798124] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.798575] ^ [ 17.798656] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.798712] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.798922] ================================================================== [ 17.782758] ================================================================== [ 17.782815] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.783419] Write of size 1 at addr fff00000c4775ec9 by task kunit_try_catch/160 [ 17.783601] [ 17.783673] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.783761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.783789] Hardware name: linux,dummy-virt (DT) [ 17.783822] Call trace: [ 17.783844] show_stack+0x20/0x38 (C) [ 17.784070] dump_stack_lvl+0x8c/0xd0 [ 17.784119] print_report+0x118/0x608 [ 17.784164] kasan_report+0xdc/0x128 [ 17.784590] __asan_report_store1_noabort+0x20/0x30 [ 17.784750] krealloc_less_oob_helper+0xa48/0xc50 [ 17.784909] krealloc_less_oob+0x20/0x38 [ 17.785245] kunit_try_run_case+0x170/0x3f0 [ 17.785312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.785697] kthread+0x328/0x630 [ 17.785789] ret_from_fork+0x10/0x20 [ 17.785838] [ 17.785893] Allocated by task 160: [ 17.785923] kasan_save_stack+0x3c/0x68 [ 17.785983] kasan_save_track+0x20/0x40 [ 17.786032] kasan_save_alloc_info+0x40/0x58 [ 17.786080] __kasan_krealloc+0x118/0x178 [ 17.786127] krealloc_noprof+0x128/0x360 [ 17.786164] krealloc_less_oob_helper+0x168/0xc50 [ 17.786201] krealloc_less_oob+0x20/0x38 [ 17.786235] kunit_try_run_case+0x170/0x3f0 [ 17.786278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.786327] kthread+0x328/0x630 [ 17.786377] ret_from_fork+0x10/0x20 [ 17.786422] [ 17.786441] The buggy address belongs to the object at fff00000c4775e00 [ 17.786441] which belongs to the cache kmalloc-256 of size 256 [ 17.786508] The buggy address is located 0 bytes to the right of [ 17.786508] allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9) [ 17.786587] [ 17.786607] The buggy address belongs to the physical page: [ 17.786638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.786690] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.786737] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.786798] page_type: f5(slab) [ 17.786869] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.786922] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.786975] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.787583] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.787651] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.787728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.787935] page dumped because: kasan: bad access detected [ 17.787974] [ 17.788009] Memory state around the buggy address: [ 17.788042] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.788399] fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.788452] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.788621] ^ [ 17.788790] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.789008] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.789122] ================================================================== [ 17.817228] ================================================================== [ 17.817441] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.817513] Write of size 1 at addr fff00000c4775eeb by task kunit_try_catch/160 [ 17.817698] [ 17.817930] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.818029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.818206] Hardware name: linux,dummy-virt (DT) [ 17.818274] Call trace: [ 17.818322] show_stack+0x20/0x38 (C) [ 17.818545] dump_stack_lvl+0x8c/0xd0 [ 17.818608] print_report+0x118/0x608 [ 17.818653] kasan_report+0xdc/0x128 [ 17.818705] __asan_report_store1_noabort+0x20/0x30 [ 17.818946] krealloc_less_oob_helper+0xa58/0xc50 [ 17.819028] krealloc_less_oob+0x20/0x38 [ 17.819079] kunit_try_run_case+0x170/0x3f0 [ 17.819127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.819185] kthread+0x328/0x630 [ 17.819441] ret_from_fork+0x10/0x20 [ 17.819626] [ 17.819665] Allocated by task 160: [ 17.819712] kasan_save_stack+0x3c/0x68 [ 17.819907] kasan_save_track+0x20/0x40 [ 17.819953] kasan_save_alloc_info+0x40/0x58 [ 17.820119] __kasan_krealloc+0x118/0x178 [ 17.820210] krealloc_noprof+0x128/0x360 [ 17.820390] krealloc_less_oob_helper+0x168/0xc50 [ 17.820479] krealloc_less_oob+0x20/0x38 [ 17.820515] kunit_try_run_case+0x170/0x3f0 [ 17.820805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.821044] kthread+0x328/0x630 [ 17.821088] ret_from_fork+0x10/0x20 [ 17.821420] [ 17.821473] The buggy address belongs to the object at fff00000c4775e00 [ 17.821473] which belongs to the cache kmalloc-256 of size 256 [ 17.821673] The buggy address is located 34 bytes to the right of [ 17.821673] allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9) [ 17.821759] [ 17.822142] The buggy address belongs to the physical page: [ 17.822263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.822387] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.822516] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.822677] page_type: f5(slab) [ 17.822786] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.822931] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.823006] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.823096] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.823426] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.823498] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.823655] page dumped because: kasan: bad access detected [ 17.823707] [ 17.823933] Memory state around the buggy address: [ 17.824180] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824237] fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.824303] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.824453] ^ [ 17.824659] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824773] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824891] ================================================================== [ 17.868415] ================================================================== [ 17.868460] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.868517] Write of size 1 at addr fff00000c79160eb by task kunit_try_catch/164 [ 17.868884] [ 17.869159] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.869426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.869494] Hardware name: linux,dummy-virt (DT) [ 17.869555] Call trace: [ 17.869732] show_stack+0x20/0x38 (C) [ 17.869795] dump_stack_lvl+0x8c/0xd0 [ 17.869895] print_report+0x118/0x608 [ 17.870072] kasan_report+0xdc/0x128 [ 17.870248] __asan_report_store1_noabort+0x20/0x30 [ 17.870382] krealloc_less_oob_helper+0xa58/0xc50 [ 17.870487] krealloc_large_less_oob+0x20/0x38 [ 17.870671] kunit_try_run_case+0x170/0x3f0 [ 17.870730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.870816] kthread+0x328/0x630 [ 17.870974] ret_from_fork+0x10/0x20 [ 17.871289] [ 17.871345] The buggy address belongs to the physical page: [ 17.871377] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914 [ 17.871463] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.871610] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.871730] page_type: f8(unknown) [ 17.871770] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.872039] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.872562] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.872744] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.872910] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff [ 17.873013] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.873056] page dumped because: kasan: bad access detected [ 17.873119] [ 17.873138] Memory state around the buggy address: [ 17.873170] fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.873339] fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.873428] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.873475] ^ [ 17.873745] fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.873951] fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.874165] ================================================================== [ 17.859078] ================================================================== [ 17.859179] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.859375] Write of size 1 at addr fff00000c79160da by task kunit_try_catch/164 [ 17.859451] [ 17.859599] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.859719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.859747] Hardware name: linux,dummy-virt (DT) [ 17.859841] Call trace: [ 17.859966] show_stack+0x20/0x38 (C) [ 17.860124] dump_stack_lvl+0x8c/0xd0 [ 17.860358] print_report+0x118/0x608 [ 17.860409] kasan_report+0xdc/0x128 [ 17.860471] __asan_report_store1_noabort+0x20/0x30 [ 17.860528] krealloc_less_oob_helper+0xa80/0xc50 [ 17.860576] krealloc_large_less_oob+0x20/0x38 [ 17.860801] kunit_try_run_case+0x170/0x3f0 [ 17.861013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.861126] kthread+0x328/0x630 [ 17.861287] ret_from_fork+0x10/0x20 [ 17.861383] [ 17.861555] The buggy address belongs to the physical page: [ 17.861749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914 [ 17.861825] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.862145] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.862226] page_type: f8(unknown) [ 17.862418] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.862480] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.862723] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.862789] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.862850] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff [ 17.863020] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.863151] page dumped because: kasan: bad access detected [ 17.863250] [ 17.863344] Memory state around the buggy address: [ 17.863376] fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.863588] fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.863669] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.863711] ^ [ 17.863779] fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.863846] fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.863958] ================================================================== [ 17.800653] ================================================================== [ 17.800705] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.801133] Write of size 1 at addr fff00000c4775eda by task kunit_try_catch/160 [ 17.801203] [ 17.801261] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.801509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.801728] Hardware name: linux,dummy-virt (DT) [ 17.801801] Call trace: [ 17.801824] show_stack+0x20/0x38 (C) [ 17.801949] dump_stack_lvl+0x8c/0xd0 [ 17.801998] print_report+0x118/0x608 [ 17.802043] kasan_report+0xdc/0x128 [ 17.802086] __asan_report_store1_noabort+0x20/0x30 [ 17.802136] krealloc_less_oob_helper+0xa80/0xc50 [ 17.802182] krealloc_less_oob+0x20/0x38 [ 17.802235] kunit_try_run_case+0x170/0x3f0 [ 17.802285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.802339] kthread+0x328/0x630 [ 17.802398] ret_from_fork+0x10/0x20 [ 17.802446] [ 17.802464] Allocated by task 160: [ 17.802491] kasan_save_stack+0x3c/0x68 [ 17.802537] kasan_save_track+0x20/0x40 [ 17.802573] kasan_save_alloc_info+0x40/0x58 [ 17.802610] __kasan_krealloc+0x118/0x178 [ 17.802653] krealloc_noprof+0x128/0x360 [ 17.802695] krealloc_less_oob_helper+0x168/0xc50 [ 17.802740] krealloc_less_oob+0x20/0x38 [ 17.802779] kunit_try_run_case+0x170/0x3f0 [ 17.802826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.802881] kthread+0x328/0x630 [ 17.802915] ret_from_fork+0x10/0x20 [ 17.802961] [ 17.802980] The buggy address belongs to the object at fff00000c4775e00 [ 17.802980] which belongs to the cache kmalloc-256 of size 256 [ 17.803038] The buggy address is located 17 bytes to the right of [ 17.803038] allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9) [ 17.803112] [ 17.803131] The buggy address belongs to the physical page: [ 17.803167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.803217] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.803263] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.803313] page_type: f5(slab) [ 17.803350] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.803401] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.803463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.803513] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.803564] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.803620] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.803670] page dumped because: kasan: bad access detected [ 17.803704] [ 17.803722] Memory state around the buggy address: [ 17.803760] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.803806] fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.803850] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.804150] ^ [ 17.804469] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.804675] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.805011] ================================================================== [ 17.807576] ================================================================== [ 17.807667] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.807838] Write of size 1 at addr fff00000c4775eea by task kunit_try_catch/160 [ 17.808058] [ 17.808167] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.808324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.808468] Hardware name: linux,dummy-virt (DT) [ 17.808523] Call trace: [ 17.808545] show_stack+0x20/0x38 (C) [ 17.808890] dump_stack_lvl+0x8c/0xd0 [ 17.808962] print_report+0x118/0x608 [ 17.809069] kasan_report+0xdc/0x128 [ 17.809166] __asan_report_store1_noabort+0x20/0x30 [ 17.809282] krealloc_less_oob_helper+0xae4/0xc50 [ 17.809382] krealloc_less_oob+0x20/0x38 [ 17.809744] kunit_try_run_case+0x170/0x3f0 [ 17.809869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.810118] kthread+0x328/0x630 [ 17.810317] ret_from_fork+0x10/0x20 [ 17.810496] [ 17.810839] Allocated by task 160: [ 17.810910] kasan_save_stack+0x3c/0x68 [ 17.811003] kasan_save_track+0x20/0x40 [ 17.811109] kasan_save_alloc_info+0x40/0x58 [ 17.811155] __kasan_krealloc+0x118/0x178 [ 17.811433] krealloc_noprof+0x128/0x360 [ 17.811580] krealloc_less_oob_helper+0x168/0xc50 [ 17.811661] krealloc_less_oob+0x20/0x38 [ 17.811747] kunit_try_run_case+0x170/0x3f0 [ 17.811982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.812259] kthread+0x328/0x630 [ 17.812440] ret_from_fork+0x10/0x20 [ 17.812496] [ 17.812557] The buggy address belongs to the object at fff00000c4775e00 [ 17.812557] which belongs to the cache kmalloc-256 of size 256 [ 17.812702] The buggy address is located 33 bytes to the right of [ 17.812702] allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9) [ 17.812932] [ 17.813137] The buggy address belongs to the physical page: [ 17.813560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.813636] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.813707] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.813823] page_type: f5(slab) [ 17.813921] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.814051] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.814119] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.814191] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.814537] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.814724] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.814787] page dumped because: kasan: bad access detected [ 17.814903] [ 17.814922] Memory state around the buggy address: [ 17.814989] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.815201] fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.815383] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.815447] ^ [ 17.815662] fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.816090] fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.816190] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 17.835142] ================================================================== [ 17.835407] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.835528] Write of size 1 at addr fff00000c79120f0 by task kunit_try_catch/162 [ 17.835581] [ 17.835609] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.835697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.835724] Hardware name: linux,dummy-virt (DT) [ 17.835863] Call trace: [ 17.835914] show_stack+0x20/0x38 (C) [ 17.836088] dump_stack_lvl+0x8c/0xd0 [ 17.836137] print_report+0x118/0x608 [ 17.836181] kasan_report+0xdc/0x128 [ 17.836473] __asan_report_store1_noabort+0x20/0x30 [ 17.836624] krealloc_more_oob_helper+0x5c0/0x678 [ 17.836834] krealloc_large_more_oob+0x20/0x38 [ 17.837027] kunit_try_run_case+0x170/0x3f0 [ 17.837145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.837331] kthread+0x328/0x630 [ 17.837384] ret_from_fork+0x10/0x20 [ 17.837862] [ 17.837963] The buggy address belongs to the physical page: [ 17.838121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910 [ 17.838294] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.838342] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.838524] page_type: f8(unknown) [ 17.838751] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.838845] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.838959] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.839063] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.839234] head: 0bfffe0000000002 ffffc1ffc31e4401 00000000ffffffff 00000000ffffffff [ 17.839350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.839414] page dumped because: kasan: bad access detected [ 17.839446] [ 17.839463] Memory state around the buggy address: [ 17.839565] fff00000c7911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.839612] fff00000c7912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.839974] >fff00000c7912080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.840066] ^ [ 17.840155] fff00000c7912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.840288] fff00000c7912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.840328] ================================================================== [ 17.762984] ================================================================== [ 17.763218] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.763285] Write of size 1 at addr fff00000c4775cf0 by task kunit_try_catch/158 [ 17.763336] [ 17.763460] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.763604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.763865] Hardware name: linux,dummy-virt (DT) [ 17.764114] Call trace: [ 17.764163] show_stack+0x20/0x38 (C) [ 17.764245] dump_stack_lvl+0x8c/0xd0 [ 17.764407] print_report+0x118/0x608 [ 17.764466] kasan_report+0xdc/0x128 [ 17.764537] __asan_report_store1_noabort+0x20/0x30 [ 17.764587] krealloc_more_oob_helper+0x5c0/0x678 [ 17.764882] krealloc_more_oob+0x20/0x38 [ 17.765136] kunit_try_run_case+0x170/0x3f0 [ 17.765321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.765459] kthread+0x328/0x630 [ 17.765527] ret_from_fork+0x10/0x20 [ 17.765895] [ 17.765943] Allocated by task 158: [ 17.766064] kasan_save_stack+0x3c/0x68 [ 17.766152] kasan_save_track+0x20/0x40 [ 17.766322] kasan_save_alloc_info+0x40/0x58 [ 17.766409] __kasan_krealloc+0x118/0x178 [ 17.766782] krealloc_noprof+0x128/0x360 [ 17.766846] krealloc_more_oob_helper+0x168/0x678 [ 17.767044] krealloc_more_oob+0x20/0x38 [ 17.767203] kunit_try_run_case+0x170/0x3f0 [ 17.767303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.767393] kthread+0x328/0x630 [ 17.767442] ret_from_fork+0x10/0x20 [ 17.767736] [ 17.767806] The buggy address belongs to the object at fff00000c4775c00 [ 17.767806] which belongs to the cache kmalloc-256 of size 256 [ 17.768078] The buggy address is located 5 bytes to the right of [ 17.768078] allocated 235-byte region [fff00000c4775c00, fff00000c4775ceb) [ 17.768248] [ 17.768293] The buggy address belongs to the physical page: [ 17.768333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.768502] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.768604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.768786] page_type: f5(slab) [ 17.768871] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.769097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.769161] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.769360] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.769541] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.769603] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.769689] page dumped because: kasan: bad access detected [ 17.769805] [ 17.770057] Memory state around the buggy address: [ 17.770243] fff00000c4775b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.770297] fff00000c4775c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.770365] >fff00000c4775c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.770559] ^ [ 17.770681] fff00000c4775d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.770785] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.770824] ================================================================== [ 17.830722] ================================================================== [ 17.830774] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.830825] Write of size 1 at addr fff00000c79120eb by task kunit_try_catch/162 [ 17.830924] [ 17.831103] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.831474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.831541] Hardware name: linux,dummy-virt (DT) [ 17.831575] Call trace: [ 17.832051] show_stack+0x20/0x38 (C) [ 17.832122] dump_stack_lvl+0x8c/0xd0 [ 17.832169] print_report+0x118/0x608 [ 17.832213] kasan_report+0xdc/0x128 [ 17.832256] __asan_report_store1_noabort+0x20/0x30 [ 17.832306] krealloc_more_oob_helper+0x60c/0x678 [ 17.832352] krealloc_large_more_oob+0x20/0x38 [ 17.832397] kunit_try_run_case+0x170/0x3f0 [ 17.832444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.832497] kthread+0x328/0x630 [ 17.832541] ret_from_fork+0x10/0x20 [ 17.832587] [ 17.832606] The buggy address belongs to the physical page: [ 17.832636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910 [ 17.832688] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.832733] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.832784] page_type: f8(unknown) [ 17.832823] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.832893] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.832944] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.832994] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.833045] head: 0bfffe0000000002 ffffc1ffc31e4401 00000000ffffffff 00000000ffffffff [ 17.833095] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.833138] page dumped because: kasan: bad access detected [ 17.833169] [ 17.833186] Memory state around the buggy address: [ 17.833216] fff00000c7911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.833260] fff00000c7912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.833304] >fff00000c7912080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.833342] ^ [ 17.833665] fff00000c7912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.833850] fff00000c7912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.834010] ================================================================== [ 17.755631] ================================================================== [ 17.755733] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.755841] Write of size 1 at addr fff00000c4775ceb by task kunit_try_catch/158 [ 17.756253] [ 17.756392] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.756610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.756649] Hardware name: linux,dummy-virt (DT) [ 17.756688] Call trace: [ 17.756720] show_stack+0x20/0x38 (C) [ 17.756823] dump_stack_lvl+0x8c/0xd0 [ 17.756882] print_report+0x118/0x608 [ 17.756936] kasan_report+0xdc/0x128 [ 17.756985] __asan_report_store1_noabort+0x20/0x30 [ 17.757050] krealloc_more_oob_helper+0x60c/0x678 [ 17.757105] krealloc_more_oob+0x20/0x38 [ 17.757148] kunit_try_run_case+0x170/0x3f0 [ 17.757198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.757261] kthread+0x328/0x630 [ 17.757306] ret_from_fork+0x10/0x20 [ 17.757367] [ 17.757409] Allocated by task 158: [ 17.757436] kasan_save_stack+0x3c/0x68 [ 17.757486] kasan_save_track+0x20/0x40 [ 17.757520] kasan_save_alloc_info+0x40/0x58 [ 17.757564] __kasan_krealloc+0x118/0x178 [ 17.757599] krealloc_noprof+0x128/0x360 [ 17.757635] krealloc_more_oob_helper+0x168/0x678 [ 17.757672] krealloc_more_oob+0x20/0x38 [ 17.757715] kunit_try_run_case+0x170/0x3f0 [ 17.757762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.757815] kthread+0x328/0x630 [ 17.758121] ret_from_fork+0x10/0x20 [ 17.758362] [ 17.758395] The buggy address belongs to the object at fff00000c4775c00 [ 17.758395] which belongs to the cache kmalloc-256 of size 256 [ 17.758586] The buggy address is located 0 bytes to the right of [ 17.758586] allocated 235-byte region [fff00000c4775c00, fff00000c4775ceb) [ 17.758882] [ 17.759162] The buggy address belongs to the physical page: [ 17.759241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774 [ 17.759325] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.759677] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.759767] page_type: f5(slab) [ 17.759960] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.760067] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.760143] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.760242] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.760369] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff [ 17.760532] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.760577] page dumped because: kasan: bad access detected [ 17.760610] [ 17.760628] Memory state around the buggy address: [ 17.760659] fff00000c4775b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.760818] fff00000c4775c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.761116] >fff00000c4775c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.761243] ^ [ 17.761350] fff00000c4775d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.761404] fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.761525] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 17.742000] ================================================================== [ 17.742061] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 17.742116] Read of size 1 at addr fff00000c79d0000 by task kunit_try_catch/156 [ 17.742308] [ 17.742351] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.742550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.742618] Hardware name: linux,dummy-virt (DT) [ 17.742651] Call trace: [ 17.742673] show_stack+0x20/0x38 (C) [ 17.742727] dump_stack_lvl+0x8c/0xd0 [ 17.742774] print_report+0x118/0x608 [ 17.742818] kasan_report+0xdc/0x128 [ 17.742876] __asan_report_load1_noabort+0x20/0x30 [ 17.742926] page_alloc_uaf+0x328/0x350 [ 17.742969] kunit_try_run_case+0x170/0x3f0 [ 17.743032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.743086] kthread+0x328/0x630 [ 17.743137] ret_from_fork+0x10/0x20 [ 17.743189] [ 17.743208] The buggy address belongs to the physical page: [ 17.743238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d0 [ 17.743289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.743337] page_type: f0(buddy) [ 17.743377] raw: 0bfffe0000000000 fff00000ff616020 fff00000ff616020 0000000000000000 [ 17.743427] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 17.743468] page dumped because: kasan: bad access detected [ 17.743499] [ 17.743516] Memory state around the buggy address: [ 17.743547] fff00000c79cff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.743591] fff00000c79cff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.743642] >fff00000c79d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.743681] ^ [ 17.743708] fff00000c79d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.743751] fff00000c79d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.743793] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 17.715623] ================================================================== [ 17.715925] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 17.716124] Free of addr fff00000c7910001 by task kunit_try_catch/152 [ 17.716530] [ 17.716678] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.716811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.716986] Hardware name: linux,dummy-virt (DT) [ 17.717141] Call trace: [ 17.717217] show_stack+0x20/0x38 (C) [ 17.717365] dump_stack_lvl+0x8c/0xd0 [ 17.717513] print_report+0x118/0x608 [ 17.717609] kasan_report_invalid_free+0xc0/0xe8 [ 17.717766] __kasan_kfree_large+0x5c/0xa8 [ 17.718099] free_large_kmalloc+0x64/0x190 [ 17.718178] kfree+0x270/0x3c8 [ 17.718325] kmalloc_large_invalid_free+0x108/0x270 [ 17.718463] kunit_try_run_case+0x170/0x3f0 [ 17.718607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.718928] kthread+0x328/0x630 [ 17.719004] ret_from_fork+0x10/0x20 [ 17.719373] [ 17.719424] The buggy address belongs to the physical page: [ 17.719465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910 [ 17.719610] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.719668] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.719925] page_type: f8(unknown) [ 17.720097] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.720196] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.720321] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.720501] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.720785] head: 0bfffe0000000002 ffffc1ffc31e4401 00000000ffffffff 00000000ffffffff [ 17.721002] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.721229] page dumped because: kasan: bad access detected [ 17.721383] [ 17.721484] Memory state around the buggy address: [ 17.721600] fff00000c790ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.721663] fff00000c790ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.721719] >fff00000c7910000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.722053] ^ [ 17.722140] fff00000c7910080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.722188] fff00000c7910100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.722587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 17.699518] ================================================================== [ 17.699647] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 17.699724] Read of size 1 at addr fff00000c790c000 by task kunit_try_catch/150 [ 17.699848] [ 17.700000] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.700210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.700243] Hardware name: linux,dummy-virt (DT) [ 17.700275] Call trace: [ 17.700297] show_stack+0x20/0x38 (C) [ 17.700499] dump_stack_lvl+0x8c/0xd0 [ 17.700633] print_report+0x118/0x608 [ 17.700680] kasan_report+0xdc/0x128 [ 17.700940] __asan_report_load1_noabort+0x20/0x30 [ 17.701097] kmalloc_large_uaf+0x2cc/0x2f8 [ 17.701198] kunit_try_run_case+0x170/0x3f0 [ 17.701297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.701460] kthread+0x328/0x630 [ 17.701568] ret_from_fork+0x10/0x20 [ 17.701669] [ 17.701784] The buggy address belongs to the physical page: [ 17.701872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790c [ 17.702001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.702401] raw: 0bfffe0000000000 ffffc1ffc31e4408 fff00000da47ee00 0000000000000000 [ 17.702586] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 17.702655] page dumped because: kasan: bad access detected [ 17.702687] [ 17.703040] Memory state around the buggy address: [ 17.703317] fff00000c790bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.703405] fff00000c790bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.703769] >fff00000c790c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.703969] ^ [ 17.704163] fff00000c790c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.704275] fff00000c790c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.704318] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 17.687296] ================================================================== [ 17.687421] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 17.687742] Write of size 1 at addr fff00000c790e00a by task kunit_try_catch/148 [ 17.687941] [ 17.688024] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.688242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.688330] Hardware name: linux,dummy-virt (DT) [ 17.688499] Call trace: [ 17.688549] show_stack+0x20/0x38 (C) [ 17.688609] dump_stack_lvl+0x8c/0xd0 [ 17.688829] print_report+0x118/0x608 [ 17.689015] kasan_report+0xdc/0x128 [ 17.689091] __asan_report_store1_noabort+0x20/0x30 [ 17.689284] kmalloc_large_oob_right+0x278/0x2b8 [ 17.689425] kunit_try_run_case+0x170/0x3f0 [ 17.689541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.689907] kthread+0x328/0x630 [ 17.689970] ret_from_fork+0x10/0x20 [ 17.690215] [ 17.690517] The buggy address belongs to the physical page: [ 17.690646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790c [ 17.690700] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.690778] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.691010] page_type: f8(unknown) [ 17.691067] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.691153] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.691281] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.691411] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.691565] head: 0bfffe0000000002 ffffc1ffc31e4301 00000000ffffffff 00000000ffffffff [ 17.691674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.691737] page dumped because: kasan: bad access detected [ 17.691934] [ 17.691975] Memory state around the buggy address: [ 17.692008] fff00000c790df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.692060] fff00000c790df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.692199] >fff00000c790e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.692341] ^ [ 17.692380] fff00000c790e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.692424] fff00000c790e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.692511] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 17.674242] ================================================================== [ 17.674304] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.674516] Write of size 1 at addr fff00000c46ddf00 by task kunit_try_catch/146 [ 17.674599] [ 17.674634] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.674726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.674753] Hardware name: linux,dummy-virt (DT) [ 17.674884] Call trace: [ 17.674912] show_stack+0x20/0x38 (C) [ 17.674982] dump_stack_lvl+0x8c/0xd0 [ 17.675182] print_report+0x118/0x608 [ 17.675242] kasan_report+0xdc/0x128 [ 17.675330] __asan_report_store1_noabort+0x20/0x30 [ 17.675502] kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.675613] kunit_try_run_case+0x170/0x3f0 [ 17.675902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.676091] kthread+0x328/0x630 [ 17.676207] ret_from_fork+0x10/0x20 [ 17.676305] [ 17.676325] Allocated by task 146: [ 17.676353] kasan_save_stack+0x3c/0x68 [ 17.676406] kasan_save_track+0x20/0x40 [ 17.676587] kasan_save_alloc_info+0x40/0x58 [ 17.676662] __kasan_kmalloc+0xd4/0xd8 [ 17.676702] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.676748] kmalloc_big_oob_right+0xb8/0x2f0 [ 17.676912] kunit_try_run_case+0x170/0x3f0 [ 17.677045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.677123] kthread+0x328/0x630 [ 17.677159] ret_from_fork+0x10/0x20 [ 17.677352] [ 17.677381] The buggy address belongs to the object at fff00000c46dc000 [ 17.677381] which belongs to the cache kmalloc-8k of size 8192 [ 17.677478] The buggy address is located 0 bytes to the right of [ 17.677478] allocated 7936-byte region [fff00000c46dc000, fff00000c46ddf00) [ 17.677578] [ 17.677640] The buggy address belongs to the physical page: [ 17.677927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d8 [ 17.678005] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.678188] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.678251] page_type: f5(slab) [ 17.678407] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.678482] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.678664] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.678833] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.678930] head: 0bfffe0000000003 ffffc1ffc311b601 00000000ffffffff 00000000ffffffff [ 17.679089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.679142] page dumped because: kasan: bad access detected [ 17.679347] [ 17.679367] Memory state around the buggy address: [ 17.679400] fff00000c46dde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.679457] fff00000c46dde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.679502] >fff00000c46ddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.679718] ^ [ 17.679759] fff00000c46ddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.679912] fff00000c46de000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.679994] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 17.648813] ================================================================== [ 17.648885] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 17.648938] Write of size 1 at addr fff00000c5bdc678 by task kunit_try_catch/144 [ 17.649039] [ 17.649069] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.649164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.649213] Hardware name: linux,dummy-virt (DT) [ 17.649245] Call trace: [ 17.649266] show_stack+0x20/0x38 (C) [ 17.649316] dump_stack_lvl+0x8c/0xd0 [ 17.649362] print_report+0x118/0x608 [ 17.649416] kasan_report+0xdc/0x128 [ 17.649460] __asan_report_store1_noabort+0x20/0x30 [ 17.649517] kmalloc_track_caller_oob_right+0x40c/0x488 [ 17.649567] kunit_try_run_case+0x170/0x3f0 [ 17.649615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.649668] kthread+0x328/0x630 [ 17.649713] ret_from_fork+0x10/0x20 [ 17.649764] [ 17.649781] Allocated by task 144: [ 17.649808] kasan_save_stack+0x3c/0x68 [ 17.649846] kasan_save_track+0x20/0x40 [ 17.650107] kasan_save_alloc_info+0x40/0x58 [ 17.650353] __kasan_kmalloc+0xd4/0xd8 [ 17.650430] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.650483] kmalloc_track_caller_oob_right+0xa8/0x488 [ 17.650568] kunit_try_run_case+0x170/0x3f0 [ 17.650645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.650690] kthread+0x328/0x630 [ 17.650941] ret_from_fork+0x10/0x20 [ 17.651002] [ 17.651034] The buggy address belongs to the object at fff00000c5bdc600 [ 17.651034] which belongs to the cache kmalloc-128 of size 128 [ 17.651129] The buggy address is located 0 bytes to the right of [ 17.651129] allocated 120-byte region [fff00000c5bdc600, fff00000c5bdc678) [ 17.651200] [ 17.651219] The buggy address belongs to the physical page: [ 17.651373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 17.651461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.651582] page_type: f5(slab) [ 17.651653] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.651707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.651793] page dumped because: kasan: bad access detected [ 17.651879] [ 17.652004] Memory state around the buggy address: [ 17.652039] fff00000c5bdc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.652085] fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.652136] >fff00000c5bdc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.652175] ^ [ 17.652214] fff00000c5bdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.652257] fff00000c5bdc700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.652422] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 17.634135] ================================================================== [ 17.634206] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 17.634576] Read of size 1 at addr fff00000c79a1000 by task kunit_try_catch/142 [ 17.634876] [ 17.634947] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.635184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.635268] Hardware name: linux,dummy-virt (DT) [ 17.635349] Call trace: [ 17.635371] show_stack+0x20/0x38 (C) [ 17.635623] dump_stack_lvl+0x8c/0xd0 [ 17.635724] print_report+0x118/0x608 [ 17.635780] kasan_report+0xdc/0x128 [ 17.635911] __asan_report_load1_noabort+0x20/0x30 [ 17.636000] kmalloc_node_oob_right+0x2f4/0x330 [ 17.636046] kunit_try_run_case+0x170/0x3f0 [ 17.636097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.636293] kthread+0x328/0x630 [ 17.636347] ret_from_fork+0x10/0x20 [ 17.636527] [ 17.636645] Allocated by task 142: [ 17.636732] kasan_save_stack+0x3c/0x68 [ 17.636791] kasan_save_track+0x20/0x40 [ 17.636967] kasan_save_alloc_info+0x40/0x58 [ 17.637161] __kasan_kmalloc+0xd4/0xd8 [ 17.637229] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 17.637379] kmalloc_node_oob_right+0xbc/0x330 [ 17.637420] kunit_try_run_case+0x170/0x3f0 [ 17.637708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.637917] kthread+0x328/0x630 [ 17.638004] ret_from_fork+0x10/0x20 [ 17.638104] [ 17.638127] The buggy address belongs to the object at fff00000c79a0000 [ 17.638127] which belongs to the cache kmalloc-4k of size 4096 [ 17.638200] The buggy address is located 0 bytes to the right of [ 17.638200] allocated 4096-byte region [fff00000c79a0000, fff00000c79a1000) [ 17.638516] [ 17.638560] The buggy address belongs to the physical page: [ 17.638754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079a0 [ 17.639651] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.639937] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.640067] page_type: f5(slab) [ 17.640109] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.640162] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.640259] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.640320] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.640372] head: 0bfffe0000000003 ffffc1ffc31e6801 00000000ffffffff 00000000ffffffff [ 17.640423] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.640483] page dumped because: kasan: bad access detected [ 17.640514] [ 17.640532] Memory state around the buggy address: [ 17.640569] fff00000c79a0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.640622] fff00000c79a0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.640674] >fff00000c79a1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.640720] ^ [ 17.640757] fff00000c79a1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.640809] fff00000c79a1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.640868] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 17.622700] ================================================================== [ 17.622761] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 17.622817] Read of size 1 at addr fff00000c59e553f by task kunit_try_catch/140 [ 17.622893] [ 17.622937] CPU: 0 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.623021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.623048] Hardware name: linux,dummy-virt (DT) [ 17.623080] Call trace: [ 17.623111] show_stack+0x20/0x38 (C) [ 17.623166] dump_stack_lvl+0x8c/0xd0 [ 17.623212] print_report+0x118/0x608 [ 17.623256] kasan_report+0xdc/0x128 [ 17.623307] __asan_report_load1_noabort+0x20/0x30 [ 17.623357] kmalloc_oob_left+0x2ec/0x320 [ 17.623404] kunit_try_run_case+0x170/0x3f0 [ 17.623451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.623503] kthread+0x328/0x630 [ 17.623547] ret_from_fork+0x10/0x20 [ 17.623594] [ 17.623611] Allocated by task 9: [ 17.623637] kasan_save_stack+0x3c/0x68 [ 17.623675] kasan_save_track+0x20/0x40 [ 17.623709] kasan_save_alloc_info+0x40/0x58 [ 17.623746] __kasan_kmalloc+0xd4/0xd8 [ 17.623781] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.623822] kvasprintf+0xe0/0x180 [ 17.624682] __kthread_create_on_node+0x16c/0x350 [ 17.624948] kthread_create_on_node+0xe4/0x130 [ 17.625059] create_worker+0x380/0x6b8 [ 17.625097] worker_thread+0x808/0xf38 [ 17.625262] kthread+0x328/0x630 [ 17.625305] ret_from_fork+0x10/0x20 [ 17.625340] [ 17.625367] The buggy address belongs to the object at fff00000c59e5520 [ 17.625367] which belongs to the cache kmalloc-16 of size 16 [ 17.625424] The buggy address is located 19 bytes to the right of [ 17.625424] allocated 12-byte region [fff00000c59e5520, fff00000c59e552c) [ 17.625558] [ 17.625770] The buggy address belongs to the physical page: [ 17.625933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5 [ 17.625988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.626159] page_type: f5(slab) [ 17.626347] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.626402] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.626582] page dumped because: kasan: bad access detected [ 17.626769] [ 17.626809] Memory state around the buggy address: [ 17.626842] fff00000c59e5400: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 17.627032] fff00000c59e5480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.627185] >fff00000c59e5500: fa fb fc fc 00 04 fc fc 00 07 fc fc fc fc fc fc [ 17.627227] ^ [ 17.627413] fff00000c59e5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.627462] fff00000c59e5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.627557] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 17.598688] ================================================================== [ 17.598741] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.599082] Read of size 1 at addr fff00000c5bdc580 by task kunit_try_catch/138 [ 17.599185] [ 17.599225] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.599316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.599454] Hardware name: linux,dummy-virt (DT) [ 17.599520] Call trace: [ 17.599641] show_stack+0x20/0x38 (C) [ 17.599719] dump_stack_lvl+0x8c/0xd0 [ 17.599820] print_report+0x118/0x608 [ 17.599882] kasan_report+0xdc/0x128 [ 17.599965] __asan_report_load1_noabort+0x20/0x30 [ 17.600171] kmalloc_oob_right+0x5d0/0x660 [ 17.600229] kunit_try_run_case+0x170/0x3f0 [ 17.600285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.600374] kthread+0x328/0x630 [ 17.600421] ret_from_fork+0x10/0x20 [ 17.600777] [ 17.600817] Allocated by task 138: [ 17.600936] kasan_save_stack+0x3c/0x68 [ 17.601166] kasan_save_track+0x20/0x40 [ 17.601300] kasan_save_alloc_info+0x40/0x58 [ 17.601481] __kasan_kmalloc+0xd4/0xd8 [ 17.601523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.601606] kmalloc_oob_right+0xb0/0x660 [ 17.601844] kunit_try_run_case+0x170/0x3f0 [ 17.601989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.602096] kthread+0x328/0x630 [ 17.602191] ret_from_fork+0x10/0x20 [ 17.602233] [ 17.602508] The buggy address belongs to the object at fff00000c5bdc500 [ 17.602508] which belongs to the cache kmalloc-128 of size 128 [ 17.602631] The buggy address is located 13 bytes to the right of [ 17.602631] allocated 115-byte region [fff00000c5bdc500, fff00000c5bdc573) [ 17.602762] [ 17.602791] The buggy address belongs to the physical page: [ 17.602821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 17.603023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.603084] page_type: f5(slab) [ 17.603122] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.603326] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.603380] page dumped because: kasan: bad access detected [ 17.603418] [ 17.603435] Memory state around the buggy address: [ 17.603466] fff00000c5bdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.603512] fff00000c5bdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.603603] >fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.603644] ^ [ 17.603672] fff00000c5bdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.603729] fff00000c5bdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.603770] ================================================================== [ 17.582202] ================================================================== [ 17.582528] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.583369] Write of size 1 at addr fff00000c5bdc573 by task kunit_try_catch/138 [ 17.583475] [ 17.584282] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.15.4-rc3 #1 PREEMPT [ 17.584430] Tainted: [N]=TEST [ 17.584465] Hardware name: linux,dummy-virt (DT) [ 17.584687] Call trace: [ 17.584869] show_stack+0x20/0x38 (C) [ 17.585003] dump_stack_lvl+0x8c/0xd0 [ 17.585066] print_report+0x118/0x608 [ 17.585111] kasan_report+0xdc/0x128 [ 17.585155] __asan_report_store1_noabort+0x20/0x30 [ 17.585205] kmalloc_oob_right+0x5a4/0x660 [ 17.585253] kunit_try_run_case+0x170/0x3f0 [ 17.585310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.585366] kthread+0x328/0x630 [ 17.585412] ret_from_fork+0x10/0x20 [ 17.585567] [ 17.585605] Allocated by task 138: [ 17.585720] kasan_save_stack+0x3c/0x68 [ 17.585784] kasan_save_track+0x20/0x40 [ 17.585820] kasan_save_alloc_info+0x40/0x58 [ 17.585870] __kasan_kmalloc+0xd4/0xd8 [ 17.585904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.585943] kmalloc_oob_right+0xb0/0x660 [ 17.585980] kunit_try_run_case+0x170/0x3f0 [ 17.586018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.586063] kthread+0x328/0x630 [ 17.586097] ret_from_fork+0x10/0x20 [ 17.586151] [ 17.586210] The buggy address belongs to the object at fff00000c5bdc500 [ 17.586210] which belongs to the cache kmalloc-128 of size 128 [ 17.586302] The buggy address is located 0 bytes to the right of [ 17.586302] allocated 115-byte region [fff00000c5bdc500, fff00000c5bdc573) [ 17.586369] [ 17.586449] The buggy address belongs to the physical page: [ 17.586646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 17.586924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.587229] page_type: f5(slab) [ 17.587513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.587577] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.587691] page dumped because: kasan: bad access detected [ 17.587730] [ 17.587755] Memory state around the buggy address: [ 17.588007] fff00000c5bdc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.588080] fff00000c5bdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.588137] >fff00000c5bdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.588193] ^ [ 17.588273] fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.588317] fff00000c5bdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.588382] ================================================================== [ 17.589455] ================================================================== [ 17.589500] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.589971] Write of size 1 at addr fff00000c5bdc578 by task kunit_try_catch/138 [ 17.590060] [ 17.590099] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 17.590627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.590736] Hardware name: linux,dummy-virt (DT) [ 17.590780] Call trace: [ 17.590987] show_stack+0x20/0x38 (C) [ 17.591048] dump_stack_lvl+0x8c/0xd0 [ 17.591094] print_report+0x118/0x608 [ 17.591138] kasan_report+0xdc/0x128 [ 17.591189] __asan_report_store1_noabort+0x20/0x30 [ 17.591261] kmalloc_oob_right+0x538/0x660 [ 17.591639] kunit_try_run_case+0x170/0x3f0 [ 17.591761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.592077] kthread+0x328/0x630 [ 17.592170] ret_from_fork+0x10/0x20 [ 17.592270] [ 17.592427] Allocated by task 138: [ 17.592601] kasan_save_stack+0x3c/0x68 [ 17.592794] kasan_save_track+0x20/0x40 [ 17.592995] kasan_save_alloc_info+0x40/0x58 [ 17.593192] __kasan_kmalloc+0xd4/0xd8 [ 17.593240] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.593278] kmalloc_oob_right+0xb0/0x660 [ 17.593317] kunit_try_run_case+0x170/0x3f0 [ 17.593367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.593411] kthread+0x328/0x630 [ 17.593446] ret_from_fork+0x10/0x20 [ 17.593691] [ 17.593790] The buggy address belongs to the object at fff00000c5bdc500 [ 17.593790] which belongs to the cache kmalloc-128 of size 128 [ 17.594182] The buggy address is located 5 bytes to the right of [ 17.594182] allocated 115-byte region [fff00000c5bdc500, fff00000c5bdc573) [ 17.594386] [ 17.594471] The buggy address belongs to the physical page: [ 17.594592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc [ 17.594844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.595007] page_type: f5(slab) [ 17.595101] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.595352] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.595507] page dumped because: kasan: bad access detected [ 17.595564] [ 17.595624] Memory state around the buggy address: [ 17.595768] fff00000c5bdc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.595822] fff00000c5bdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.596042] >fff00000c5bdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.596088] ^ [ 17.596155] fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.596488] fff00000c5bdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.596560] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 95.111677] WARNING: CPU: 1 PID: 658 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 95.113071] Modules linked in: [ 95.113772] CPU: 1 UID: 0 PID: 658 Comm: kunit_try_catch Tainted: G B D W N 6.15.4-rc3 #1 PREEMPT [ 95.115057] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 95.115831] Hardware name: linux,dummy-virt (DT) [ 95.116587] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 95.117256] pc : intlog10+0x38/0x48 [ 95.117457] lr : intlog10_test+0xe4/0x200 [ 95.117650] sp : ffff8000820c7c10 [ 95.117807] x29: ffff8000820c7c90 x28: 0000000000000000 x27: 0000000000000000 [ 95.118286] x26: 1ffe000019381d61 x25: 0000000000000000 x24: ffff8000820c7ce0 [ 95.118734] x23: ffff8000820c7d00 x22: 0000000000000000 x21: 1ffff00010418f82 [ 95.119191] x20: ffffab849c435180 x19: ffff800080087990 x18: 00000000fa957322 [ 95.119669] x17: 000000007fd647cf x16: 00000000b73bbe94 x15: 000000008a1b0a78 [ 95.120222] x14: 00000000f1f1f1f1 x13: 1ffe00001b4939e0 x12: ffff757094039b71 [ 95.120738] x11: 1ffff57094039b70 x10: ffff757094039b70 x9 : ffffab8499a147c4 [ 95.121187] x8 : ffffab84a01cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 95.121627] x5 : ffff700010418f82 x4 : 1ffff00010010f3a x3 : 1ffff57093886a30 [ 95.122226] x2 : 1ffff57093886a30 x1 : 0000000000000003 x0 : 0000000000000000 [ 95.122997] Call trace: [ 95.123300] intlog10+0x38/0x48 (P) [ 95.123708] kunit_try_run_case+0x170/0x3f0 [ 95.124118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.124535] kthread+0x328/0x630 [ 95.124730] ret_from_fork+0x10/0x20 [ 95.124944] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 95.062284] WARNING: CPU: 0 PID: 640 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 95.063282] Modules linked in: [ 95.063504] CPU: 0 UID: 0 PID: 640 Comm: kunit_try_catch Tainted: G B D N 6.15.4-rc3 #1 PREEMPT [ 95.064076] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 95.064996] Hardware name: linux,dummy-virt (DT) [ 95.065570] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 95.066351] pc : intlog2+0xd8/0xf8 [ 95.066825] lr : intlog2_test+0xe4/0x200 [ 95.067361] sp : ffff800082347c10 [ 95.067804] x29: ffff800082347c90 x28: 0000000000000000 x27: 0000000000000000 [ 95.068721] x26: 1ffe000019381ce1 x25: 0000000000000000 x24: ffff800082347ce0 [ 95.069599] x23: ffff800082347d00 x22: 0000000000000000 x21: 1ffff00010468f82 [ 95.070437] x20: ffffab849c435080 x19: ffff800080087990 x18: 00000000b6d9949c [ 95.071283] x17: 000000002ae0dfa8 x16: fff00000c096dc3c x15: fff00000ff616b08 [ 95.072184] x14: 00000000f1f1f1f1 x13: 1ffe00001b493a1d x12: ffff757094039b71 [ 95.073015] x11: 1ffff57094039b70 x10: ffff757094039b70 x9 : ffffab8499a149c4 [ 95.073376] x8 : ffffab84a01cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 95.073718] x5 : ffff700010468f82 x4 : 1ffff00010010f3a x3 : 1ffff57093886a10 [ 95.074073] x2 : 1ffff57093886a10 x1 : 0000000000000003 x0 : 0000000000000000 [ 95.074416] Call trace: [ 95.074551] intlog2+0xd8/0xf8 (P) [ 95.074742] kunit_try_run_case+0x170/0x3f0 [ 95.075237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.076186] kthread+0x328/0x630 [ 95.076779] ret_from_fork+0x10/0x20 [ 95.077320] ---[ end trace 0000000000000000 ]---