Date
July 3, 2025, 3:13 p.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 17.954889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 17.945632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 18.005909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 17.932763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 17.961289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 18.009292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 17.971391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 17.871285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 17.853514] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 17.825635] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 49.275603] ================================================================== [ 49.275692] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 49.275692] [ 49.275780] Use-after-free read at 0x00000000a20e83cf (in kfence-#154): [ 49.275832] test_krealloc+0x51c/0x830 [ 49.275874] kunit_try_run_case+0x170/0x3f0 [ 49.275922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.275982] kthread+0x328/0x630 [ 49.276027] ret_from_fork+0x10/0x20 [ 49.276067] [ 49.276090] kfence-#154: 0x00000000a20e83cf-0x000000002ade0885, size=32, cache=kmalloc-32 [ 49.276090] [ 49.276142] allocated by task 340 on cpu 0 at 49.274750s (0.001388s ago): [ 49.276212] test_alloc+0x29c/0x628 [ 49.276252] test_krealloc+0xc0/0x830 [ 49.276289] kunit_try_run_case+0x170/0x3f0 [ 49.276330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.276376] kthread+0x328/0x630 [ 49.276413] ret_from_fork+0x10/0x20 [ 49.276451] [ 49.276475] freed by task 340 on cpu 0 at 49.275201s (0.001270s ago): [ 49.276533] krealloc_noprof+0x148/0x360 [ 49.276571] test_krealloc+0x1dc/0x830 [ 49.276607] kunit_try_run_case+0x170/0x3f0 [ 49.276649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.276695] kthread+0x328/0x630 [ 49.276733] ret_from_fork+0x10/0x20 [ 49.276772] [ 49.276817] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 49.276895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.276924] Hardware name: linux,dummy-virt (DT) [ 49.276970] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 49.193774] ================================================================== [ 49.193875] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 49.193875] [ 49.193983] Use-after-free read at 0x00000000647cd250 (in kfence-#153): [ 49.194039] test_memcache_typesafe_by_rcu+0x280/0x560 [ 49.194089] kunit_try_run_case+0x170/0x3f0 [ 49.194134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.194182] kthread+0x328/0x630 [ 49.194227] ret_from_fork+0x10/0x20 [ 49.194269] [ 49.194292] kfence-#153: 0x00000000647cd250-0x000000001b5f20b0, size=32, cache=test [ 49.194292] [ 49.194341] allocated by task 338 on cpu 1 at 49.174476s (0.019861s ago): [ 49.194412] test_alloc+0x230/0x628 [ 49.194453] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 49.194496] kunit_try_run_case+0x170/0x3f0 [ 49.194536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.194580] kthread+0x328/0x630 [ 49.194617] ret_from_fork+0x10/0x20 [ 49.194657] [ 49.194680] freed by task 338 on cpu 1 at 49.174563s (0.020113s ago): [ 49.194735] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 49.194775] kunit_try_run_case+0x170/0x3f0 [ 49.194815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.194859] kthread+0x328/0x630 [ 49.194896] ret_from_fork+0x10/0x20 [ 49.194936] [ 49.194989] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 49.195067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.195100] Hardware name: linux,dummy-virt (DT) [ 49.195135] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 26.206516] ================================================================== [ 26.208234] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 26.208234] [ 26.208402] Invalid read at 0x0000000021070b09: [ 26.208500] test_invalid_access+0xdc/0x1f0 [ 26.208556] kunit_try_run_case+0x170/0x3f0 [ 26.208610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.208660] kthread+0x328/0x630 [ 26.208708] ret_from_fork+0x10/0x20 [ 26.208761] [ 26.208812] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 26.208942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.209012] Hardware name: linux,dummy-virt (DT) [ 26.209062] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 25.978828] ================================================================== [ 25.978919] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 25.978919] [ 25.978996] Corrupted memory at 0x00000000c78a63be [ ! . . . . . . . . . . . . . . . ] (in kfence-#149): [ 25.979304] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 25.979352] kunit_try_run_case+0x170/0x3f0 [ 25.979398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.979443] kthread+0x328/0x630 [ 25.979484] ret_from_fork+0x10/0x20 [ 25.979523] [ 25.979548] kfence-#149: 0x000000003ca5e7e8-0x000000006adecb7a, size=73, cache=kmalloc-96 [ 25.979548] [ 25.979602] allocated by task 328 on cpu 1 at 25.978576s (0.001023s ago): [ 25.979664] test_alloc+0x29c/0x628 [ 25.979703] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 25.979744] kunit_try_run_case+0x170/0x3f0 [ 25.979785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.979829] kthread+0x328/0x630 [ 25.979868] ret_from_fork+0x10/0x20 [ 25.979907] [ 25.979931] freed by task 328 on cpu 1 at 25.978729s (0.001198s ago): [ 25.980000] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 25.980041] kunit_try_run_case+0x170/0x3f0 [ 25.980082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.980127] kthread+0x328/0x630 [ 25.980165] ret_from_fork+0x10/0x20 [ 25.980204] [ 25.980251] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 25.980328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.980359] Hardware name: linux,dummy-virt (DT) [ 25.980394] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 25.874843] ================================================================== [ 25.874964] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 25.874964] [ 25.875064] Out-of-bounds read at 0x000000009266244c (105B right of kfence-#148): [ 25.875126] test_kmalloc_aligned_oob_read+0x238/0x468 [ 25.875174] kunit_try_run_case+0x170/0x3f0 [ 25.875221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.875268] kthread+0x328/0x630 [ 25.875312] ret_from_fork+0x10/0x20 [ 25.875351] [ 25.875376] kfence-#148: 0x000000003c921865-0x00000000c8e94798, size=73, cache=kmalloc-96 [ 25.875376] [ 25.875429] allocated by task 326 on cpu 0 at 25.874594s (0.000831s ago): [ 25.875500] test_alloc+0x29c/0x628 [ 25.875540] test_kmalloc_aligned_oob_read+0x100/0x468 [ 25.875583] kunit_try_run_case+0x170/0x3f0 [ 25.875625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.875670] kthread+0x328/0x630 [ 25.875709] ret_from_fork+0x10/0x20 [ 25.875748] [ 25.875796] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 25.875874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.875904] Hardware name: linux,dummy-virt (DT) [ 25.875940] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 21.714924] ================================================================== [ 21.715035] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 21.715035] [ 21.715093] Corrupted memory at 0x00000000b42734e6 [ ! ] (in kfence-#108): [ 21.715225] test_corruption+0x284/0x378 [ 21.715270] kunit_try_run_case+0x170/0x3f0 [ 21.715313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.715358] kthread+0x328/0x630 [ 21.715398] ret_from_fork+0x10/0x20 [ 21.715439] [ 21.715464] kfence-#108: 0x00000000a5a09d4c-0x00000000f54258a2, size=32, cache=kmalloc-32 [ 21.715464] [ 21.715518] allocated by task 314 on cpu 1 at 21.714648s (0.000866s ago): [ 21.715576] test_alloc+0x29c/0x628 [ 21.715615] test_corruption+0x198/0x378 [ 21.715657] kunit_try_run_case+0x170/0x3f0 [ 21.715701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.715746] kthread+0x328/0x630 [ 21.715783] ret_from_fork+0x10/0x20 [ 21.715823] [ 21.715847] freed by task 314 on cpu 1 at 21.714752s (0.001091s ago): [ 21.715904] test_corruption+0x284/0x378 [ 21.715941] kunit_try_run_case+0x170/0x3f0 [ 21.715996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.716040] kthread+0x328/0x630 [ 21.716079] ret_from_fork+0x10/0x20 [ 21.716118] [ 21.716162] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 21.716238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.716266] Hardware name: linux,dummy-virt (DT) [ 21.716300] ================================================================== [ 21.402894] ================================================================== [ 21.403030] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 21.403030] [ 21.403097] Corrupted memory at 0x00000000be369ef3 [ ! . . . . . . . . . . . . . . . ] (in kfence-#105): [ 21.404226] test_corruption+0x278/0x378 [ 21.404276] kunit_try_run_case+0x170/0x3f0 [ 21.404324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.404368] kthread+0x328/0x630 [ 21.404412] ret_from_fork+0x10/0x20 [ 21.404451] [ 21.404476] kfence-#105: 0x0000000019246626-0x000000007a290049, size=32, cache=kmalloc-32 [ 21.404476] [ 21.404532] allocated by task 314 on cpu 1 at 21.402612s (0.001917s ago): [ 21.404594] test_alloc+0x29c/0x628 [ 21.404633] test_corruption+0xdc/0x378 [ 21.404672] kunit_try_run_case+0x170/0x3f0 [ 21.404712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.404757] kthread+0x328/0x630 [ 21.404796] ret_from_fork+0x10/0x20 [ 21.404836] [ 21.404859] freed by task 314 on cpu 1 at 21.402712s (0.002143s ago): [ 21.404916] test_corruption+0x278/0x378 [ 21.404965] kunit_try_run_case+0x170/0x3f0 [ 21.405007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.405052] kthread+0x328/0x630 [ 21.405089] ret_from_fork+0x10/0x20 [ 21.405129] [ 21.405175] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 21.405252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.405282] Hardware name: linux,dummy-virt (DT) [ 21.405318] ================================================================== [ 22.026804] ================================================================== [ 22.026902] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 22.026902] [ 22.026981] Corrupted memory at 0x0000000018e0be04 [ ! . . . . . . . . . . . . . . . ] (in kfence-#111): [ 22.027291] test_corruption+0x120/0x378 [ 22.027336] kunit_try_run_case+0x170/0x3f0 [ 22.027381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.027427] kthread+0x328/0x630 [ 22.027469] ret_from_fork+0x10/0x20 [ 22.027508] [ 22.027533] kfence-#111: 0x000000009aeebe34-0x0000000059903a46, size=32, cache=test [ 22.027533] [ 22.027587] allocated by task 316 on cpu 1 at 22.026649s (0.000934s ago): [ 22.027648] test_alloc+0x230/0x628 [ 22.027687] test_corruption+0xdc/0x378 [ 22.027726] kunit_try_run_case+0x170/0x3f0 [ 22.027767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.027811] kthread+0x328/0x630 [ 22.027852] ret_from_fork+0x10/0x20 [ 22.027893] [ 22.027916] freed by task 316 on cpu 1 at 22.026712s (0.001200s ago): [ 22.027987] test_corruption+0x120/0x378 [ 22.028026] kunit_try_run_case+0x170/0x3f0 [ 22.028067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.028116] kthread+0x328/0x630 [ 22.028156] ret_from_fork+0x10/0x20 [ 22.028194] [ 22.028239] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 22.028315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.028346] Hardware name: linux,dummy-virt (DT) [ 22.028380] ================================================================== [ 22.546808] ================================================================== [ 22.546903] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 22.546903] [ 22.546979] Corrupted memory at 0x000000001e14f36e [ ! ] (in kfence-#116): [ 22.547095] test_corruption+0x1d8/0x378 [ 22.547141] kunit_try_run_case+0x170/0x3f0 [ 22.547185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.547230] kthread+0x328/0x630 [ 22.547270] ret_from_fork+0x10/0x20 [ 22.547311] [ 22.547334] kfence-#116: 0x000000008b7c2781-0x00000000013c9571, size=32, cache=test [ 22.547334] [ 22.547387] allocated by task 316 on cpu 1 at 22.546644s (0.000739s ago): [ 22.547447] test_alloc+0x230/0x628 [ 22.547487] test_corruption+0x198/0x378 [ 22.547525] kunit_try_run_case+0x170/0x3f0 [ 22.547565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.547609] kthread+0x328/0x630 [ 22.547648] ret_from_fork+0x10/0x20 [ 22.547687] [ 22.547710] freed by task 316 on cpu 1 at 22.546704s (0.001002s ago): [ 22.547768] test_corruption+0x1d8/0x378 [ 22.547804] kunit_try_run_case+0x170/0x3f0 [ 22.547845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.547888] kthread+0x328/0x630 [ 22.547928] ret_from_fork+0x10/0x20 [ 22.547975] [ 22.548017] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 22.548093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.548126] Hardware name: linux,dummy-virt (DT) [ 22.548161] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 21.090792] ================================================================== [ 21.090893] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 21.090893] [ 21.090969] Invalid free of 0x000000009d830e95 (in kfence-#102): [ 21.091021] test_invalid_addr_free+0xec/0x238 [ 21.091064] kunit_try_run_case+0x170/0x3f0 [ 21.091111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.091156] kthread+0x328/0x630 [ 21.091197] ret_from_fork+0x10/0x20 [ 21.091236] [ 21.091261] kfence-#102: 0x00000000d9121877-0x0000000069c70bdd, size=32, cache=test [ 21.091261] [ 21.091313] allocated by task 312 on cpu 0 at 21.090659s (0.000650s ago): [ 21.091374] test_alloc+0x230/0x628 [ 21.091413] test_invalid_addr_free+0xd4/0x238 [ 21.091453] kunit_try_run_case+0x170/0x3f0 [ 21.091495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.091543] kthread+0x328/0x630 [ 21.091580] ret_from_fork+0x10/0x20 [ 21.091620] [ 21.091662] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 21.091739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.091770] Hardware name: linux,dummy-virt (DT) [ 21.091805] ================================================================== [ 20.986749] ================================================================== [ 20.986847] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 20.986847] [ 20.986906] Invalid free of 0x00000000f2d0c380 (in kfence-#101): [ 20.986977] test_invalid_addr_free+0x1ac/0x238 [ 20.987021] kunit_try_run_case+0x170/0x3f0 [ 20.987067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.987112] kthread+0x328/0x630 [ 20.987154] ret_from_fork+0x10/0x20 [ 20.987194] [ 20.987218] kfence-#101: 0x000000004a15e42d-0x00000000bbc34f21, size=32, cache=kmalloc-32 [ 20.987218] [ 20.987274] allocated by task 310 on cpu 0 at 20.986591s (0.000679s ago): [ 20.987334] test_alloc+0x29c/0x628 [ 20.987373] test_invalid_addr_free+0xd4/0x238 [ 20.987414] kunit_try_run_case+0x170/0x3f0 [ 20.987455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.987499] kthread+0x328/0x630 [ 20.987539] ret_from_fork+0x10/0x20 [ 20.987578] [ 20.987623] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 20.987702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.987732] Hardware name: linux,dummy-virt (DT) [ 20.987766] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 20.882750] ================================================================== [ 20.882846] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 20.882846] [ 20.882905] Invalid free of 0x0000000021d37ea3 (in kfence-#100): [ 20.882974] test_double_free+0x100/0x238 [ 20.883017] kunit_try_run_case+0x170/0x3f0 [ 20.883060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.883105] kthread+0x328/0x630 [ 20.883145] ret_from_fork+0x10/0x20 [ 20.883185] [ 20.883210] kfence-#100: 0x0000000021d37ea3-0x00000000cab75418, size=32, cache=test [ 20.883210] [ 20.883262] allocated by task 308 on cpu 1 at 20.882536s (0.000722s ago): [ 20.883323] test_alloc+0x230/0x628 [ 20.883361] test_double_free+0xd4/0x238 [ 20.883400] kunit_try_run_case+0x170/0x3f0 [ 20.883442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.883485] kthread+0x328/0x630 [ 20.883524] ret_from_fork+0x10/0x20 [ 20.883562] [ 20.883586] freed by task 308 on cpu 1 at 20.882597s (0.000985s ago): [ 20.883646] test_double_free+0xf0/0x238 [ 20.883685] kunit_try_run_case+0x170/0x3f0 [ 20.883726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.883769] kthread+0x328/0x630 [ 20.883809] ret_from_fork+0x10/0x20 [ 20.883846] [ 20.883890] CPU: 1 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 20.883978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.884008] Hardware name: linux,dummy-virt (DT) [ 20.884041] ================================================================== [ 20.779213] ================================================================== [ 20.779335] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 20.779335] [ 20.779403] Invalid free of 0x000000009a1a9171 (in kfence-#99): [ 20.779465] test_double_free+0x1bc/0x238 [ 20.779510] kunit_try_run_case+0x170/0x3f0 [ 20.779555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.779600] kthread+0x328/0x630 [ 20.779642] ret_from_fork+0x10/0x20 [ 20.779681] [ 20.779705] kfence-#99: 0x000000009a1a9171-0x000000009c0ba914, size=32, cache=kmalloc-32 [ 20.779705] [ 20.779758] allocated by task 306 on cpu 1 at 20.778888s (0.000866s ago): [ 20.779818] test_alloc+0x29c/0x628 [ 20.779859] test_double_free+0xd4/0x238 [ 20.779896] kunit_try_run_case+0x170/0x3f0 [ 20.779936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.779998] kthread+0x328/0x630 [ 20.780040] ret_from_fork+0x10/0x20 [ 20.780080] [ 20.780105] freed by task 306 on cpu 1 at 20.778980s (0.001122s ago): [ 20.780165] test_double_free+0x1ac/0x238 [ 20.780205] kunit_try_run_case+0x170/0x3f0 [ 20.780247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.780291] kthread+0x328/0x630 [ 20.780329] ret_from_fork+0x10/0x20 [ 20.780369] [ 20.780416] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 20.780494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.780525] Hardware name: linux,dummy-virt (DT) [ 20.780560] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 20.466720] ================================================================== [ 20.466818] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 20.466818] [ 20.466906] Use-after-free read at 0x00000000055fc2f0 (in kfence-#96): [ 20.466973] test_use_after_free_read+0x114/0x248 [ 20.467019] kunit_try_run_case+0x170/0x3f0 [ 20.467064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.467108] kthread+0x328/0x630 [ 20.467149] ret_from_fork+0x10/0x20 [ 20.467189] [ 20.467215] kfence-#96: 0x00000000055fc2f0-0x000000004776c689, size=32, cache=test [ 20.467215] [ 20.467265] allocated by task 300 on cpu 1 at 20.466544s (0.000717s ago): [ 20.467336] test_alloc+0x230/0x628 [ 20.467375] test_use_after_free_read+0xd0/0x248 [ 20.467420] kunit_try_run_case+0x170/0x3f0 [ 20.467462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.467507] kthread+0x328/0x630 [ 20.467545] ret_from_fork+0x10/0x20 [ 20.467584] [ 20.467608] freed by task 300 on cpu 1 at 20.466602s (0.001003s ago): [ 20.467704] test_use_after_free_read+0xf0/0x248 [ 20.467746] kunit_try_run_case+0x170/0x3f0 [ 20.467787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.467832] kthread+0x328/0x630 [ 20.467869] ret_from_fork+0x10/0x20 [ 20.467908] [ 20.467962] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 20.468039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.468069] Hardware name: linux,dummy-virt (DT) [ 20.468101] ================================================================== [ 20.362914] ================================================================== [ 20.363049] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 20.363049] [ 20.363156] Use-after-free read at 0x00000000f15cdb58 (in kfence-#95): [ 20.363210] test_use_after_free_read+0x114/0x248 [ 20.363256] kunit_try_run_case+0x170/0x3f0 [ 20.363303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.363346] kthread+0x328/0x630 [ 20.363389] ret_from_fork+0x10/0x20 [ 20.363429] [ 20.363454] kfence-#95: 0x00000000f15cdb58-0x00000000a6f5e360, size=32, cache=kmalloc-32 [ 20.363454] [ 20.363506] allocated by task 298 on cpu 1 at 20.362606s (0.000896s ago): [ 20.363578] test_alloc+0x29c/0x628 [ 20.363617] test_use_after_free_read+0xd0/0x248 [ 20.363656] kunit_try_run_case+0x170/0x3f0 [ 20.363699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.363744] kthread+0x328/0x630 [ 20.363782] ret_from_fork+0x10/0x20 [ 20.363826] [ 20.363976] freed by task 298 on cpu 1 at 20.362682s (0.001204s ago): [ 20.364085] test_use_after_free_read+0x1c0/0x248 [ 20.364126] kunit_try_run_case+0x170/0x3f0 [ 20.364167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.364212] kthread+0x328/0x630 [ 20.364250] ret_from_fork+0x10/0x20 [ 20.364303] [ 20.364351] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 20.364429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.364459] Hardware name: linux,dummy-virt (DT) [ 20.364494] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 20.154870] ================================================================== [ 20.154997] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 20.154997] [ 20.155113] Out-of-bounds write at 0x00000000827248e2 (1B left of kfence-#93): [ 20.155184] test_out_of_bounds_write+0x100/0x240 [ 20.155231] kunit_try_run_case+0x170/0x3f0 [ 20.155290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.155347] kthread+0x328/0x630 [ 20.155388] ret_from_fork+0x10/0x20 [ 20.155429] [ 20.155454] kfence-#93: 0x0000000027d2fc31-0x00000000f7362a9e, size=32, cache=kmalloc-32 [ 20.155454] [ 20.155505] allocated by task 294 on cpu 0 at 20.154673s (0.000828s ago): [ 20.155575] test_alloc+0x29c/0x628 [ 20.155613] test_out_of_bounds_write+0xc8/0x240 [ 20.155655] kunit_try_run_case+0x170/0x3f0 [ 20.155696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.155739] kthread+0x328/0x630 [ 20.155779] ret_from_fork+0x10/0x20 [ 20.155817] [ 20.155861] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 20.155938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.155979] Hardware name: linux,dummy-virt (DT) [ 20.156012] ================================================================== [ 20.258655] ================================================================== [ 20.258756] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 20.258756] [ 20.258848] Out-of-bounds write at 0x000000005f1650f9 (1B left of kfence-#94): [ 20.258904] test_out_of_bounds_write+0x100/0x240 [ 20.258966] kunit_try_run_case+0x170/0x3f0 [ 20.259011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.259057] kthread+0x328/0x630 [ 20.259099] ret_from_fork+0x10/0x20 [ 20.259140] [ 20.259164] kfence-#94: 0x000000006d3c89d5-0x000000004d28d8b1, size=32, cache=test [ 20.259164] [ 20.259215] allocated by task 296 on cpu 0 at 20.258570s (0.000641s ago): [ 20.259285] test_alloc+0x230/0x628 [ 20.259326] test_out_of_bounds_write+0xc8/0x240 [ 20.259368] kunit_try_run_case+0x170/0x3f0 [ 20.259409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.259454] kthread+0x328/0x630 [ 20.259494] ret_from_fork+0x10/0x20 [ 20.259535] [ 20.259578] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 20.259656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.259685] Hardware name: linux,dummy-virt (DT) [ 20.259720] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 19.294819] ================================================================== [ 19.295009] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 19.295009] [ 19.295098] Out-of-bounds read at 0x000000001ed46019 (32B right of kfence-#85): [ 19.295173] test_out_of_bounds_read+0x1c8/0x3e0 [ 19.295296] kunit_try_run_case+0x170/0x3f0 [ 19.295342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.295406] kthread+0x328/0x630 [ 19.295446] ret_from_fork+0x10/0x20 [ 19.295497] [ 19.295524] kfence-#85: 0x0000000091bff555-0x000000007a26a38c, size=32, cache=test [ 19.295524] [ 19.295572] allocated by task 292 on cpu 0 at 19.294742s (0.000827s ago): [ 19.295641] test_alloc+0x230/0x628 [ 19.295793] test_out_of_bounds_read+0x198/0x3e0 [ 19.295934] kunit_try_run_case+0x170/0x3f0 [ 19.297565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.297624] kthread+0x328/0x630 [ 19.297664] ret_from_fork+0x10/0x20 [ 19.297703] [ 19.297744] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 19.297826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.297859] Hardware name: linux,dummy-virt (DT) [ 19.297892] ================================================================== [ 18.972082] ================================================================== [ 18.972571] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 18.972571] [ 18.972686] Out-of-bounds read at 0x0000000098996a1e (32B right of kfence-#82): [ 18.972868] test_out_of_bounds_read+0x1c8/0x3e0 [ 18.972921] kunit_try_run_case+0x170/0x3f0 [ 18.973289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.973351] kthread+0x328/0x630 [ 18.973395] ret_from_fork+0x10/0x20 [ 18.973504] [ 18.973531] kfence-#82: 0x00000000c36e1c2d-0x0000000065c27977, size=32, cache=kmalloc-32 [ 18.973531] [ 18.973646] allocated by task 290 on cpu 0 at 18.971564s (0.002062s ago): [ 18.973819] test_alloc+0x29c/0x628 [ 18.973897] test_out_of_bounds_read+0x198/0x3e0 [ 18.973940] kunit_try_run_case+0x170/0x3f0 [ 18.974328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.974573] kthread+0x328/0x630 [ 18.974700] ret_from_fork+0x10/0x20 [ 18.975088] [ 18.975148] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.975364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.975758] Hardware name: linux,dummy-virt (DT) [ 18.975867] ================================================================== [ 18.863706] ================================================================== [ 18.864048] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 18.864048] [ 18.864189] Out-of-bounds read at 0x000000007758fd69 (1B left of kfence-#81): [ 18.864424] test_out_of_bounds_read+0x114/0x3e0 [ 18.864479] kunit_try_run_case+0x170/0x3f0 [ 18.864641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.864938] kthread+0x328/0x630 [ 18.865021] ret_from_fork+0x10/0x20 [ 18.865075] [ 18.865850] kfence-#81: 0x00000000c6a1af3a-0x000000003eacdaaa, size=32, cache=kmalloc-32 [ 18.865850] [ 18.866506] allocated by task 290 on cpu 0 at 18.862651s (0.003466s ago): [ 18.867415] test_alloc+0x29c/0x628 [ 18.867731] test_out_of_bounds_read+0xdc/0x3e0 [ 18.868086] kunit_try_run_case+0x170/0x3f0 [ 18.868446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.868544] kthread+0x328/0x630 [ 18.868671] ret_from_fork+0x10/0x20 [ 18.869075] [ 18.869425] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.869723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.869860] Hardware name: linux,dummy-virt (DT) [ 18.870048] ================================================================== [ 19.187037] ================================================================== [ 19.187145] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 19.187145] [ 19.187239] Out-of-bounds read at 0x00000000470d715f (1B left of kfence-#84): [ 19.187418] test_out_of_bounds_read+0x114/0x3e0 [ 19.187600] kunit_try_run_case+0x170/0x3f0 [ 19.187645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.187691] kthread+0x328/0x630 [ 19.188014] ret_from_fork+0x10/0x20 [ 19.188118] [ 19.188145] kfence-#84: 0x00000000617633ec-0x000000000f2c4f81, size=32, cache=test [ 19.188145] [ 19.188290] allocated by task 292 on cpu 0 at 19.186944s (0.001314s ago): [ 19.188711] test_alloc+0x230/0x628 [ 19.188852] test_out_of_bounds_read+0xdc/0x3e0 [ 19.188927] kunit_try_run_case+0x170/0x3f0 [ 19.189028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.189104] kthread+0x328/0x630 [ 19.189233] ret_from_fork+0x10/0x20 [ 19.189546] [ 19.189609] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 19.189690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.189772] Hardware name: linux,dummy-virt (DT) [ 19.189807] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 18.483374] ================================================================== [ 18.483608] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 18.483809] Write of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288 [ 18.484004] [ 18.484051] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.484175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.484208] Hardware name: linux,dummy-virt (DT) [ 18.484242] Call trace: [ 18.484268] show_stack+0x20/0x38 (C) [ 18.484318] dump_stack_lvl+0x8c/0xd0 [ 18.484494] print_report+0x118/0x608 [ 18.484595] kasan_report+0xdc/0x128 [ 18.484786] kasan_check_range+0x100/0x1a8 [ 18.484899] __kasan_check_write+0x20/0x30 [ 18.485008] strncpy_from_user+0x3c/0x2a0 [ 18.485106] copy_user_test_oob+0x5c0/0xec8 [ 18.485181] kunit_try_run_case+0x170/0x3f0 [ 18.485232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.485295] kthread+0x328/0x630 [ 18.485420] ret_from_fork+0x10/0x20 [ 18.485473] [ 18.485493] Allocated by task 288: [ 18.485527] kasan_save_stack+0x3c/0x68 [ 18.485566] kasan_save_track+0x20/0x40 [ 18.485792] kasan_save_alloc_info+0x40/0x58 [ 18.485841] __kasan_kmalloc+0xd4/0xd8 [ 18.486006] __kmalloc_noprof+0x198/0x4c8 [ 18.486213] kunit_kmalloc_array+0x34/0x88 [ 18.486305] copy_user_test_oob+0xac/0xec8 [ 18.486565] kunit_try_run_case+0x170/0x3f0 [ 18.486697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.486877] kthread+0x328/0x630 [ 18.487071] ret_from_fork+0x10/0x20 [ 18.487118] [ 18.487233] The buggy address belongs to the object at fff00000c77faa00 [ 18.487233] which belongs to the cache kmalloc-128 of size 128 [ 18.487371] The buggy address is located 0 bytes inside of [ 18.487371] allocated 120-byte region [fff00000c77faa00, fff00000c77faa78) [ 18.487731] [ 18.487910] The buggy address belongs to the physical page: [ 18.488053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.488284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.488404] page_type: f5(slab) [ 18.488512] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.488566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.488758] page dumped because: kasan: bad access detected [ 18.488884] [ 18.488909] Memory state around the buggy address: [ 18.488965] fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.489012] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.489058] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.489118] ^ [ 18.489170] fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.489214] fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.489271] ================================================================== [ 18.489972] ================================================================== [ 18.490026] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 18.490205] Write of size 1 at addr fff00000c77faa78 by task kunit_try_catch/288 [ 18.490263] [ 18.490481] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.490778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.490991] Hardware name: linux,dummy-virt (DT) [ 18.491058] Call trace: [ 18.491177] show_stack+0x20/0x38 (C) [ 18.491469] dump_stack_lvl+0x8c/0xd0 [ 18.491730] print_report+0x118/0x608 [ 18.491828] kasan_report+0xdc/0x128 [ 18.491988] __asan_report_store1_noabort+0x20/0x30 [ 18.492162] strncpy_from_user+0x270/0x2a0 [ 18.492281] copy_user_test_oob+0x5c0/0xec8 [ 18.492390] kunit_try_run_case+0x170/0x3f0 [ 18.492444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.492688] kthread+0x328/0x630 [ 18.492898] ret_from_fork+0x10/0x20 [ 18.493308] [ 18.493376] Allocated by task 288: [ 18.493415] kasan_save_stack+0x3c/0x68 [ 18.493474] kasan_save_track+0x20/0x40 [ 18.493510] kasan_save_alloc_info+0x40/0x58 [ 18.493551] __kasan_kmalloc+0xd4/0xd8 [ 18.493588] __kmalloc_noprof+0x198/0x4c8 [ 18.493683] kunit_kmalloc_array+0x34/0x88 [ 18.493735] copy_user_test_oob+0xac/0xec8 [ 18.493777] kunit_try_run_case+0x170/0x3f0 [ 18.493818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.493864] kthread+0x328/0x630 [ 18.493900] ret_from_fork+0x10/0x20 [ 18.493937] [ 18.494606] The buggy address belongs to the object at fff00000c77faa00 [ 18.494606] which belongs to the cache kmalloc-128 of size 128 [ 18.494675] The buggy address is located 0 bytes to the right of [ 18.494675] allocated 120-byte region [fff00000c77faa00, fff00000c77faa78) [ 18.494741] [ 18.494765] The buggy address belongs to the physical page: [ 18.494967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.495201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.495422] page_type: f5(slab) [ 18.495504] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.495833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.495882] page dumped because: kasan: bad access detected [ 18.495937] [ 18.496255] Memory state around the buggy address: [ 18.496533] fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.496756] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.496905] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.496960] ^ [ 18.497139] fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.497192] fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.497575] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 18.459601] ================================================================== [ 18.459865] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 18.460057] Read of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288 [ 18.460115] [ 18.460151] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.460401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.460536] Hardware name: linux,dummy-virt (DT) [ 18.460600] Call trace: [ 18.460860] show_stack+0x20/0x38 (C) [ 18.460996] dump_stack_lvl+0x8c/0xd0 [ 18.461053] print_report+0x118/0x608 [ 18.461100] kasan_report+0xdc/0x128 [ 18.461283] kasan_check_range+0x100/0x1a8 [ 18.461346] __kasan_check_read+0x20/0x30 [ 18.461646] copy_user_test_oob+0x3c8/0xec8 [ 18.461716] kunit_try_run_case+0x170/0x3f0 [ 18.461848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.461909] kthread+0x328/0x630 [ 18.461966] ret_from_fork+0x10/0x20 [ 18.462015] [ 18.462035] Allocated by task 288: [ 18.462066] kasan_save_stack+0x3c/0x68 [ 18.462124] kasan_save_track+0x20/0x40 [ 18.462193] kasan_save_alloc_info+0x40/0x58 [ 18.462235] __kasan_kmalloc+0xd4/0xd8 [ 18.462295] __kmalloc_noprof+0x198/0x4c8 [ 18.462594] kunit_kmalloc_array+0x34/0x88 [ 18.462784] copy_user_test_oob+0xac/0xec8 [ 18.462851] kunit_try_run_case+0x170/0x3f0 [ 18.463114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.463220] kthread+0x328/0x630 [ 18.463405] ret_from_fork+0x10/0x20 [ 18.463623] [ 18.463912] The buggy address belongs to the object at fff00000c77faa00 [ 18.463912] which belongs to the cache kmalloc-128 of size 128 [ 18.464182] The buggy address is located 0 bytes inside of [ 18.464182] allocated 120-byte region [fff00000c77faa00, fff00000c77faa78) [ 18.464444] [ 18.464481] The buggy address belongs to the physical page: [ 18.464556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.464726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.464831] page_type: f5(slab) [ 18.464971] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.465028] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.465072] page dumped because: kasan: bad access detected [ 18.465127] [ 18.465153] Memory state around the buggy address: [ 18.465203] fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.465262] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.465317] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.465358] ^ [ 18.465399] fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.465452] fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.465493] ================================================================== [ 18.422881] ================================================================== [ 18.423451] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 18.423555] Write of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288 [ 18.423611] [ 18.423692] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.423889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.423923] Hardware name: linux,dummy-virt (DT) [ 18.423972] Call trace: [ 18.424165] show_stack+0x20/0x38 (C) [ 18.424255] dump_stack_lvl+0x8c/0xd0 [ 18.424315] print_report+0x118/0x608 [ 18.424487] kasan_report+0xdc/0x128 [ 18.424548] kasan_check_range+0x100/0x1a8 [ 18.424595] __kasan_check_write+0x20/0x30 [ 18.424767] copy_user_test_oob+0x234/0xec8 [ 18.424959] kunit_try_run_case+0x170/0x3f0 [ 18.425070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.425213] kthread+0x328/0x630 [ 18.425397] ret_from_fork+0x10/0x20 [ 18.425457] [ 18.425478] Allocated by task 288: [ 18.425547] kasan_save_stack+0x3c/0x68 [ 18.425591] kasan_save_track+0x20/0x40 [ 18.425628] kasan_save_alloc_info+0x40/0x58 [ 18.425807] __kasan_kmalloc+0xd4/0xd8 [ 18.425855] __kmalloc_noprof+0x198/0x4c8 [ 18.425929] kunit_kmalloc_array+0x34/0x88 [ 18.425979] copy_user_test_oob+0xac/0xec8 [ 18.426017] kunit_try_run_case+0x170/0x3f0 [ 18.426057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.426101] kthread+0x328/0x630 [ 18.426152] ret_from_fork+0x10/0x20 [ 18.426189] [ 18.426212] The buggy address belongs to the object at fff00000c77faa00 [ 18.426212] which belongs to the cache kmalloc-128 of size 128 [ 18.426272] The buggy address is located 0 bytes inside of [ 18.426272] allocated 120-byte region [fff00000c77faa00, fff00000c77faa78) [ 18.426334] [ 18.426358] The buggy address belongs to the physical page: [ 18.426403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.426466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.426529] page_type: f5(slab) [ 18.426572] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.426624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.426681] page dumped because: kasan: bad access detected [ 18.426715] [ 18.426744] Memory state around the buggy address: [ 18.426788] fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.426834] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.426887] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.426927] ^ [ 18.427300] fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.427349] fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.427391] ================================================================== [ 18.473990] ================================================================== [ 18.474575] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 18.474643] Read of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288 [ 18.474911] [ 18.475257] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.475516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.475551] Hardware name: linux,dummy-virt (DT) [ 18.475631] Call trace: [ 18.475750] show_stack+0x20/0x38 (C) [ 18.476122] dump_stack_lvl+0x8c/0xd0 [ 18.476388] print_report+0x118/0x608 [ 18.476583] kasan_report+0xdc/0x128 [ 18.476796] kasan_check_range+0x100/0x1a8 [ 18.476997] __kasan_check_read+0x20/0x30 [ 18.477071] copy_user_test_oob+0x4a0/0xec8 [ 18.477296] kunit_try_run_case+0x170/0x3f0 [ 18.477382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.477835] kthread+0x328/0x630 [ 18.477917] ret_from_fork+0x10/0x20 [ 18.478145] [ 18.478239] Allocated by task 288: [ 18.478491] kasan_save_stack+0x3c/0x68 [ 18.478544] kasan_save_track+0x20/0x40 [ 18.478582] kasan_save_alloc_info+0x40/0x58 [ 18.478623] __kasan_kmalloc+0xd4/0xd8 [ 18.478853] __kmalloc_noprof+0x198/0x4c8 [ 18.478926] kunit_kmalloc_array+0x34/0x88 [ 18.479027] copy_user_test_oob+0xac/0xec8 [ 18.479142] kunit_try_run_case+0x170/0x3f0 [ 18.479356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.479560] kthread+0x328/0x630 [ 18.479721] ret_from_fork+0x10/0x20 [ 18.479934] [ 18.479990] The buggy address belongs to the object at fff00000c77faa00 [ 18.479990] which belongs to the cache kmalloc-128 of size 128 [ 18.480052] The buggy address is located 0 bytes inside of [ 18.480052] allocated 120-byte region [fff00000c77faa00, fff00000c77faa78) [ 18.480520] [ 18.480587] The buggy address belongs to the physical page: [ 18.480802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.480994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.481060] page_type: f5(slab) [ 18.481215] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.481348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.481435] page dumped because: kasan: bad access detected [ 18.481469] [ 18.481501] Memory state around the buggy address: [ 18.481546] fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.481592] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.481641] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.481688] ^ [ 18.481740] fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.481785] fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.481835] ================================================================== [ 18.449813] ================================================================== [ 18.450111] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 18.450241] Write of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288 [ 18.450323] [ 18.450539] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.450725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.451027] Hardware name: linux,dummy-virt (DT) [ 18.451125] Call trace: [ 18.451224] show_stack+0x20/0x38 (C) [ 18.451337] dump_stack_lvl+0x8c/0xd0 [ 18.451589] print_report+0x118/0x608 [ 18.451663] kasan_report+0xdc/0x128 [ 18.451766] kasan_check_range+0x100/0x1a8 [ 18.451926] __kasan_check_write+0x20/0x30 [ 18.452155] copy_user_test_oob+0x35c/0xec8 [ 18.452382] kunit_try_run_case+0x170/0x3f0 [ 18.452488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.452722] kthread+0x328/0x630 [ 18.452795] ret_from_fork+0x10/0x20 [ 18.453205] [ 18.453347] Allocated by task 288: [ 18.453406] kasan_save_stack+0x3c/0x68 [ 18.453581] kasan_save_track+0x20/0x40 [ 18.453718] kasan_save_alloc_info+0x40/0x58 [ 18.454015] __kasan_kmalloc+0xd4/0xd8 [ 18.454156] __kmalloc_noprof+0x198/0x4c8 [ 18.454281] kunit_kmalloc_array+0x34/0x88 [ 18.454518] copy_user_test_oob+0xac/0xec8 [ 18.454573] kunit_try_run_case+0x170/0x3f0 [ 18.454613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.454659] kthread+0x328/0x630 [ 18.455025] ret_from_fork+0x10/0x20 [ 18.455124] [ 18.455315] The buggy address belongs to the object at fff00000c77faa00 [ 18.455315] which belongs to the cache kmalloc-128 of size 128 [ 18.455525] The buggy address is located 0 bytes inside of [ 18.455525] allocated 120-byte region [fff00000c77faa00, fff00000c77faa78) [ 18.455672] [ 18.455732] The buggy address belongs to the physical page: [ 18.455793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.456196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.456310] page_type: f5(slab) [ 18.456655] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.456727] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.456852] page dumped because: kasan: bad access detected [ 18.457043] [ 18.457115] Memory state around the buggy address: [ 18.457171] fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.457221] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.457474] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.457630] ^ [ 18.457883] fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.458056] fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.458298] ================================================================== [ 18.433457] ================================================================== [ 18.433688] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 18.433878] Read of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288 [ 18.433939] [ 18.433983] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.434356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.434402] Hardware name: linux,dummy-virt (DT) [ 18.434641] Call trace: [ 18.434800] show_stack+0x20/0x38 (C) [ 18.434879] dump_stack_lvl+0x8c/0xd0 [ 18.435094] print_report+0x118/0x608 [ 18.435208] kasan_report+0xdc/0x128 [ 18.435287] kasan_check_range+0x100/0x1a8 [ 18.435430] __kasan_check_read+0x20/0x30 [ 18.435542] copy_user_test_oob+0x728/0xec8 [ 18.435765] kunit_try_run_case+0x170/0x3f0 [ 18.436007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.436179] kthread+0x328/0x630 [ 18.436246] ret_from_fork+0x10/0x20 [ 18.436303] [ 18.436662] Allocated by task 288: [ 18.436723] kasan_save_stack+0x3c/0x68 [ 18.437033] kasan_save_track+0x20/0x40 [ 18.437086] kasan_save_alloc_info+0x40/0x58 [ 18.437193] __kasan_kmalloc+0xd4/0xd8 [ 18.437342] __kmalloc_noprof+0x198/0x4c8 [ 18.437449] kunit_kmalloc_array+0x34/0x88 [ 18.437601] copy_user_test_oob+0xac/0xec8 [ 18.437708] kunit_try_run_case+0x170/0x3f0 [ 18.437751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.437918] kthread+0x328/0x630 [ 18.438014] ret_from_fork+0x10/0x20 [ 18.438101] [ 18.438125] The buggy address belongs to the object at fff00000c77faa00 [ 18.438125] which belongs to the cache kmalloc-128 of size 128 [ 18.438185] The buggy address is located 0 bytes inside of [ 18.438185] allocated 120-byte region [fff00000c77faa00, fff00000c77faa78) [ 18.438418] [ 18.438533] The buggy address belongs to the physical page: [ 18.438660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.438764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.439036] page_type: f5(slab) [ 18.439086] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.439159] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.439205] page dumped because: kasan: bad access detected [ 18.439337] [ 18.439546] Memory state around the buggy address: [ 18.439829] fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.439909] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.440250] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.440340] ^ [ 18.440418] fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.440697] fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.440745] ================================================================== [ 18.466057] ================================================================== [ 18.466131] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 18.466440] Write of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288 [ 18.466592] [ 18.466629] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.466932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.467103] Hardware name: linux,dummy-virt (DT) [ 18.467500] Call trace: [ 18.467640] show_stack+0x20/0x38 (C) [ 18.467725] dump_stack_lvl+0x8c/0xd0 [ 18.467832] print_report+0x118/0x608 [ 18.468075] kasan_report+0xdc/0x128 [ 18.468327] kasan_check_range+0x100/0x1a8 [ 18.468509] __kasan_check_write+0x20/0x30 [ 18.468686] copy_user_test_oob+0x434/0xec8 [ 18.468900] kunit_try_run_case+0x170/0x3f0 [ 18.468968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.469275] kthread+0x328/0x630 [ 18.469720] ret_from_fork+0x10/0x20 [ 18.469879] [ 18.470031] Allocated by task 288: [ 18.470129] kasan_save_stack+0x3c/0x68 [ 18.470239] kasan_save_track+0x20/0x40 [ 18.470412] kasan_save_alloc_info+0x40/0x58 [ 18.470461] __kasan_kmalloc+0xd4/0xd8 [ 18.470503] __kmalloc_noprof+0x198/0x4c8 [ 18.470543] kunit_kmalloc_array+0x34/0x88 [ 18.470803] copy_user_test_oob+0xac/0xec8 [ 18.470935] kunit_try_run_case+0x170/0x3f0 [ 18.471226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.471423] kthread+0x328/0x630 [ 18.471578] ret_from_fork+0x10/0x20 [ 18.471739] [ 18.471798] The buggy address belongs to the object at fff00000c77faa00 [ 18.471798] which belongs to the cache kmalloc-128 of size 128 [ 18.472233] The buggy address is located 0 bytes inside of [ 18.472233] allocated 120-byte region [fff00000c77faa00, fff00000c77faa78) [ 18.472417] [ 18.472526] The buggy address belongs to the physical page: [ 18.472717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.472774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.472884] page_type: f5(slab) [ 18.473022] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.473075] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.473118] page dumped because: kasan: bad access detected [ 18.473173] [ 18.473200] Memory state around the buggy address: [ 18.473233] fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.473288] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.473347] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.473388] ^ [ 18.473431] fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.473475] fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.473515] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 18.380630] ================================================================== [ 18.380984] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 18.381074] Read of size 8 at addr fff00000c77fa978 by task kunit_try_catch/284 [ 18.381270] [ 18.381387] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.381519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.381600] Hardware name: linux,dummy-virt (DT) [ 18.381665] Call trace: [ 18.381720] show_stack+0x20/0x38 (C) [ 18.381781] dump_stack_lvl+0x8c/0xd0 [ 18.381835] print_report+0x118/0x608 [ 18.382095] kasan_report+0xdc/0x128 [ 18.382188] __asan_report_load8_noabort+0x20/0x30 [ 18.382326] copy_to_kernel_nofault+0x204/0x250 [ 18.382400] copy_to_kernel_nofault_oob+0x158/0x418 [ 18.382878] kunit_try_run_case+0x170/0x3f0 [ 18.383040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.383127] kthread+0x328/0x630 [ 18.383497] ret_from_fork+0x10/0x20 [ 18.383658] [ 18.383757] Allocated by task 284: [ 18.383793] kasan_save_stack+0x3c/0x68 [ 18.383981] kasan_save_track+0x20/0x40 [ 18.384120] kasan_save_alloc_info+0x40/0x58 [ 18.384336] __kasan_kmalloc+0xd4/0xd8 [ 18.384492] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.384537] copy_to_kernel_nofault_oob+0xc8/0x418 [ 18.384578] kunit_try_run_case+0x170/0x3f0 [ 18.384671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.384721] kthread+0x328/0x630 [ 18.384757] ret_from_fork+0x10/0x20 [ 18.384796] [ 18.384838] The buggy address belongs to the object at fff00000c77fa900 [ 18.384838] which belongs to the cache kmalloc-128 of size 128 [ 18.384899] The buggy address is located 0 bytes to the right of [ 18.384899] allocated 120-byte region [fff00000c77fa900, fff00000c77fa978) [ 18.384981] [ 18.385015] The buggy address belongs to the physical page: [ 18.385051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.385108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.385159] page_type: f5(slab) [ 18.385207] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.385275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.385316] page dumped because: kasan: bad access detected [ 18.385360] [ 18.385389] Memory state around the buggy address: [ 18.385432] fff00000c77fa800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.385487] fff00000c77fa880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.385532] >fff00000c77fa900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.385590] ^ [ 18.385633] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.385692] fff00000c77faa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.385737] ================================================================== [ 18.386319] ================================================================== [ 18.386741] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 18.386847] Write of size 8 at addr fff00000c77fa978 by task kunit_try_catch/284 [ 18.387021] [ 18.387070] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.387418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.387474] Hardware name: linux,dummy-virt (DT) [ 18.387587] Call trace: [ 18.387691] show_stack+0x20/0x38 (C) [ 18.387863] dump_stack_lvl+0x8c/0xd0 [ 18.387922] print_report+0x118/0x608 [ 18.387978] kasan_report+0xdc/0x128 [ 18.388024] kasan_check_range+0x100/0x1a8 [ 18.388071] __kasan_check_write+0x20/0x30 [ 18.388300] copy_to_kernel_nofault+0x8c/0x250 [ 18.388519] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 18.388713] kunit_try_run_case+0x170/0x3f0 [ 18.388923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.389095] kthread+0x328/0x630 [ 18.389321] ret_from_fork+0x10/0x20 [ 18.389513] [ 18.389697] Allocated by task 284: [ 18.389757] kasan_save_stack+0x3c/0x68 [ 18.390134] kasan_save_track+0x20/0x40 [ 18.390376] kasan_save_alloc_info+0x40/0x58 [ 18.390620] __kasan_kmalloc+0xd4/0xd8 [ 18.390788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.390991] copy_to_kernel_nofault_oob+0xc8/0x418 [ 18.391111] kunit_try_run_case+0x170/0x3f0 [ 18.391311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.391587] kthread+0x328/0x630 [ 18.391767] ret_from_fork+0x10/0x20 [ 18.391896] [ 18.391992] The buggy address belongs to the object at fff00000c77fa900 [ 18.391992] which belongs to the cache kmalloc-128 of size 128 [ 18.392162] The buggy address is located 0 bytes to the right of [ 18.392162] allocated 120-byte region [fff00000c77fa900, fff00000c77fa978) [ 18.392231] [ 18.392421] The buggy address belongs to the physical page: [ 18.392657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 18.392874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.393037] page_type: f5(slab) [ 18.393136] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.393250] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.393364] page dumped because: kasan: bad access detected [ 18.393482] [ 18.393535] Memory state around the buggy address: [ 18.393570] fff00000c77fa800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.393863] fff00000c77fa880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.394129] >fff00000c77fa900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.394389] ^ [ 18.394584] fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.394670] fff00000c77faa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.394710] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 18.325499] ================================================================== [ 18.325579] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 18.325922] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/272 [ 18.326008] [ 18.326055] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.326141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.326494] Hardware name: linux,dummy-virt (DT) [ 18.326990] Call trace: [ 18.327045] show_stack+0x20/0x38 (C) [ 18.327159] dump_stack_lvl+0x8c/0xd0 [ 18.327233] print_report+0x310/0x608 [ 18.327345] kasan_report+0xdc/0x128 [ 18.327412] __asan_report_load1_noabort+0x20/0x30 [ 18.327487] vmalloc_oob+0x578/0x5d0 [ 18.327535] kunit_try_run_case+0x170/0x3f0 [ 18.327588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.327644] kthread+0x328/0x630 [ 18.327932] ret_from_fork+0x10/0x20 [ 18.328283] [ 18.328379] The buggy address belongs to the virtual mapping at [ 18.328379] [ffff80008010b000, ffff80008010d000) created by: [ 18.328379] vmalloc_oob+0x98/0x5d0 [ 18.328538] [ 18.328943] The buggy address belongs to the physical page: [ 18.329024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106613 [ 18.329135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.329217] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.329424] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.329678] page dumped because: kasan: bad access detected [ 18.329745] [ 18.329824] Memory state around the buggy address: [ 18.329863] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.330162] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.330327] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.330395] ^ [ 18.330670] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.330761] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.330915] ================================================================== [ 18.331978] ================================================================== [ 18.332033] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 18.332105] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/272 [ 18.332372] [ 18.332667] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.332764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.332875] Hardware name: linux,dummy-virt (DT) [ 18.332919] Call trace: [ 18.332944] show_stack+0x20/0x38 (C) [ 18.333230] dump_stack_lvl+0x8c/0xd0 [ 18.333337] print_report+0x310/0x608 [ 18.333387] kasan_report+0xdc/0x128 [ 18.333434] __asan_report_load1_noabort+0x20/0x30 [ 18.333486] vmalloc_oob+0x51c/0x5d0 [ 18.333533] kunit_try_run_case+0x170/0x3f0 [ 18.333582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.333730] kthread+0x328/0x630 [ 18.334079] ret_from_fork+0x10/0x20 [ 18.334174] [ 18.334243] The buggy address belongs to the virtual mapping at [ 18.334243] [ffff80008010b000, ffff80008010d000) created by: [ 18.334243] vmalloc_oob+0x98/0x5d0 [ 18.334362] [ 18.334459] The buggy address belongs to the physical page: [ 18.334528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106613 [ 18.334602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.334700] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.334752] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.334800] page dumped because: kasan: bad access detected [ 18.335084] [ 18.335172] Memory state around the buggy address: [ 18.335271] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.335588] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.335680] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.335753] ^ [ 18.335838] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.335964] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.336041] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 18.231733] ================================================================== [ 18.231811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.231872] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.231931] [ 18.231976] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.232058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.232092] Hardware name: linux,dummy-virt (DT) [ 18.232125] Call trace: [ 18.232154] show_stack+0x20/0x38 (C) [ 18.232421] dump_stack_lvl+0x8c/0xd0 [ 18.232525] print_report+0x118/0x608 [ 18.232580] kasan_report+0xdc/0x128 [ 18.232634] kasan_check_range+0x100/0x1a8 [ 18.232687] __kasan_check_write+0x20/0x30 [ 18.232801] kasan_atomics_helper+0x147c/0x4858 [ 18.232861] kasan_atomics+0x198/0x2e0 [ 18.232916] kunit_try_run_case+0x170/0x3f0 [ 18.232979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.233041] kthread+0x328/0x630 [ 18.233095] ret_from_fork+0x10/0x20 [ 18.233149] [ 18.233180] Allocated by task 268: [ 18.233221] kasan_save_stack+0x3c/0x68 [ 18.233263] kasan_save_track+0x20/0x40 [ 18.233300] kasan_save_alloc_info+0x40/0x58 [ 18.233341] __kasan_kmalloc+0xd4/0xd8 [ 18.233492] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.233561] kasan_atomics+0xb8/0x2e0 [ 18.233697] kunit_try_run_case+0x170/0x3f0 [ 18.233763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.233827] kthread+0x328/0x630 [ 18.233872] ret_from_fork+0x10/0x20 [ 18.233917] [ 18.233967] The buggy address belongs to the object at fff00000c77e9a80 [ 18.233967] which belongs to the cache kmalloc-64 of size 64 [ 18.234083] The buggy address is located 0 bytes to the right of [ 18.234083] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.234221] [ 18.234278] The buggy address belongs to the physical page: [ 18.234321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.234385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.234454] page_type: f5(slab) [ 18.234501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.234556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.234599] page dumped because: kasan: bad access detected [ 18.234632] [ 18.235059] Memory state around the buggy address: [ 18.235170] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.235419] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.235555] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.235781] ^ [ 18.235835] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.236191] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.236334] ================================================================== [ 18.109560] ================================================================== [ 18.109720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 18.109774] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.109825] [ 18.109893] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.109992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.110020] Hardware name: linux,dummy-virt (DT) [ 18.110063] Call trace: [ 18.110093] show_stack+0x20/0x38 (C) [ 18.110404] dump_stack_lvl+0x8c/0xd0 [ 18.110467] print_report+0x118/0x608 [ 18.110748] kasan_report+0xdc/0x128 [ 18.111025] kasan_check_range+0x100/0x1a8 [ 18.111219] __kasan_check_read+0x20/0x30 [ 18.111307] kasan_atomics_helper+0xdd4/0x4858 [ 18.111356] kasan_atomics+0x198/0x2e0 [ 18.111654] kunit_try_run_case+0x170/0x3f0 [ 18.111786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.112167] kthread+0x328/0x630 [ 18.112264] ret_from_fork+0x10/0x20 [ 18.112340] [ 18.112407] Allocated by task 268: [ 18.112487] kasan_save_stack+0x3c/0x68 [ 18.112554] kasan_save_track+0x20/0x40 [ 18.112751] kasan_save_alloc_info+0x40/0x58 [ 18.112936] __kasan_kmalloc+0xd4/0xd8 [ 18.113008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.113650] kasan_atomics+0xb8/0x2e0 [ 18.113889] kunit_try_run_case+0x170/0x3f0 [ 18.113974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.114043] kthread+0x328/0x630 [ 18.114092] ret_from_fork+0x10/0x20 [ 18.114440] [ 18.114674] The buggy address belongs to the object at fff00000c77e9a80 [ 18.114674] which belongs to the cache kmalloc-64 of size 64 [ 18.115112] The buggy address is located 0 bytes to the right of [ 18.115112] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.115228] [ 18.115266] The buggy address belongs to the physical page: [ 18.115301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.115357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.115406] page_type: f5(slab) [ 18.115445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.115498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.115540] page dumped because: kasan: bad access detected [ 18.115574] [ 18.115931] Memory state around the buggy address: [ 18.116003] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.116284] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.116366] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.116407] ^ [ 18.116444] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.116489] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.116530] ================================================================== [ 18.021372] ================================================================== [ 18.021800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 18.021925] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.022082] [ 18.022117] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.022217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.022278] Hardware name: linux,dummy-virt (DT) [ 18.022404] Call trace: [ 18.022433] show_stack+0x20/0x38 (C) [ 18.022508] dump_stack_lvl+0x8c/0xd0 [ 18.022558] print_report+0x118/0x608 [ 18.022604] kasan_report+0xdc/0x128 [ 18.022649] kasan_check_range+0x100/0x1a8 [ 18.022888] __kasan_check_write+0x20/0x30 [ 18.023062] kasan_atomics_helper+0x99c/0x4858 [ 18.023174] kasan_atomics+0x198/0x2e0 [ 18.023337] kunit_try_run_case+0x170/0x3f0 [ 18.023578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.023660] kthread+0x328/0x630 [ 18.023819] ret_from_fork+0x10/0x20 [ 18.023876] [ 18.023913] Allocated by task 268: [ 18.024084] kasan_save_stack+0x3c/0x68 [ 18.024303] kasan_save_track+0x20/0x40 [ 18.024349] kasan_save_alloc_info+0x40/0x58 [ 18.024440] __kasan_kmalloc+0xd4/0xd8 [ 18.024541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.024726] kasan_atomics+0xb8/0x2e0 [ 18.024854] kunit_try_run_case+0x170/0x3f0 [ 18.025113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.025273] kthread+0x328/0x630 [ 18.025360] ret_from_fork+0x10/0x20 [ 18.025575] [ 18.025622] The buggy address belongs to the object at fff00000c77e9a80 [ 18.025622] which belongs to the cache kmalloc-64 of size 64 [ 18.025827] The buggy address is located 0 bytes to the right of [ 18.025827] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.025995] [ 18.026085] The buggy address belongs to the physical page: [ 18.026406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.026763] page dumped because: kasan: bad access detected [ 18.027585] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.028427] Hardware name: linux,dummy-virt (DT) [ 18.029024] ret_from_fork+0x10/0x20 [ 18.029071] [ 18.029091] Allocated by task 268: [ 18.029121] kasan_save_stack+0x3c/0x68 [ 18.029161] kasan_save_track+0x20/0x40 [ 18.029199] kasan_save_alloc_info+0x40/0x58 [ 18.029240] __kasan_kmalloc+0xd4/0xd8 [ 18.029277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.029341] kasan_atomics+0xb8/0x2e0 [ 18.029380] kunit_try_run_case+0x170/0x3f0 [ 18.029420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.029673] kthread+0x328/0x630 [ 18.030328] ret_from_fork+0x10/0x20 [ 18.030380] [ 18.030402] The buggy address belongs to the object at fff00000c77e9a80 [ 18.030402] which belongs to the cache kmalloc-64 of size 64 [ 18.030467] The buggy address is located 0 bytes to the right of [ 18.030467] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.030532] [ 18.030553] The buggy address belongs to the physical page: [ 18.030585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.030638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.030685] page_type: f5(slab) [ 18.030722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.030774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.030816] page dumped because: kasan: bad access detected [ 18.030849] [ 18.030869] Memory state around the buggy address: [ 18.030902] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.030958] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.031003] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.031042] ^ [ 18.031074] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.031116] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.031156] ================================================================== [ 18.172601] ================================================================== [ 18.172654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.172796] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.172882] [ 18.173060] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.173148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.173177] Hardware name: linux,dummy-virt (DT) [ 18.173458] Call trace: [ 18.173494] show_stack+0x20/0x38 (C) [ 18.174032] dump_stack_lvl+0x8c/0xd0 [ 18.174124] print_report+0x118/0x608 [ 18.174279] kasan_report+0xdc/0x128 [ 18.174344] kasan_check_range+0x100/0x1a8 [ 18.174807] __kasan_check_write+0x20/0x30 [ 18.175073] kasan_atomics_helper+0x1058/0x4858 [ 18.175244] kasan_atomics+0x198/0x2e0 [ 18.175384] kunit_try_run_case+0x170/0x3f0 [ 18.175503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.175587] kthread+0x328/0x630 [ 18.175694] ret_from_fork+0x10/0x20 [ 18.175745] [ 18.175795] Allocated by task 268: [ 18.175853] kasan_save_stack+0x3c/0x68 [ 18.176208] kasan_save_track+0x20/0x40 [ 18.176565] kasan_save_alloc_info+0x40/0x58 [ 18.176656] __kasan_kmalloc+0xd4/0xd8 [ 18.176748] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.176824] kasan_atomics+0xb8/0x2e0 [ 18.176900] kunit_try_run_case+0x170/0x3f0 [ 18.177045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.177098] kthread+0x328/0x630 [ 18.177165] ret_from_fork+0x10/0x20 [ 18.177505] [ 18.177605] The buggy address belongs to the object at fff00000c77e9a80 [ 18.177605] which belongs to the cache kmalloc-64 of size 64 [ 18.178025] The buggy address is located 0 bytes to the right of [ 18.178025] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.178105] [ 18.178359] The buggy address belongs to the physical page: [ 18.178525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.179063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.179157] page_type: f5(slab) [ 18.179216] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.179276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.179429] page dumped because: kasan: bad access detected [ 18.179673] [ 18.179713] Memory state around the buggy address: [ 18.179978] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.180126] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.180331] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.180689] ^ [ 18.180811] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.181102] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.181355] ================================================================== [ 18.102499] ================================================================== [ 18.102553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 18.102794] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.103064] [ 18.103116] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.103423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.103481] Hardware name: linux,dummy-virt (DT) [ 18.103517] Call trace: [ 18.103568] show_stack+0x20/0x38 (C) [ 18.103621] dump_stack_lvl+0x8c/0xd0 [ 18.103752] print_report+0x118/0x608 [ 18.103810] kasan_report+0xdc/0x128 [ 18.103855] __asan_report_load4_noabort+0x20/0x30 [ 18.104071] kasan_atomics_helper+0x3e04/0x4858 [ 18.104232] kasan_atomics+0x198/0x2e0 [ 18.104290] kunit_try_run_case+0x170/0x3f0 [ 18.104586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.104675] kthread+0x328/0x630 [ 18.104766] ret_from_fork+0x10/0x20 [ 18.104820] [ 18.104858] Allocated by task 268: [ 18.104892] kasan_save_stack+0x3c/0x68 [ 18.104993] kasan_save_track+0x20/0x40 [ 18.105045] kasan_save_alloc_info+0x40/0x58 [ 18.105084] __kasan_kmalloc+0xd4/0xd8 [ 18.105268] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.105326] kasan_atomics+0xb8/0x2e0 [ 18.105467] kunit_try_run_case+0x170/0x3f0 [ 18.105521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.105762] kthread+0x328/0x630 [ 18.105823] ret_from_fork+0x10/0x20 [ 18.106155] [ 18.106299] The buggy address belongs to the object at fff00000c77e9a80 [ 18.106299] which belongs to the cache kmalloc-64 of size 64 [ 18.106416] The buggy address is located 0 bytes to the right of [ 18.106416] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.106536] [ 18.106585] The buggy address belongs to the physical page: [ 18.106739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.106960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.107017] page_type: f5(slab) [ 18.107080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.107384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.107540] page dumped because: kasan: bad access detected [ 18.107586] [ 18.107615] Memory state around the buggy address: [ 18.107665] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.108094] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.108173] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.108456] ^ [ 18.108558] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.108662] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.108723] ================================================================== [ 18.125279] ================================================================== [ 18.125340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 18.125455] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.125529] [ 18.125572] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.125780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.125988] Hardware name: linux,dummy-virt (DT) [ 18.126109] Call trace: [ 18.126368] show_stack+0x20/0x38 (C) [ 18.126523] dump_stack_lvl+0x8c/0xd0 [ 18.126578] print_report+0x118/0x608 [ 18.126624] kasan_report+0xdc/0x128 [ 18.126669] kasan_check_range+0x100/0x1a8 [ 18.126750] __kasan_check_write+0x20/0x30 [ 18.127068] kasan_atomics_helper+0xe44/0x4858 [ 18.127373] kasan_atomics+0x198/0x2e0 [ 18.127573] kunit_try_run_case+0x170/0x3f0 [ 18.127686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.127858] kthread+0x328/0x630 [ 18.127971] ret_from_fork+0x10/0x20 [ 18.128071] [ 18.128386] Allocated by task 268: [ 18.128431] kasan_save_stack+0x3c/0x68 [ 18.128613] kasan_save_track+0x20/0x40 [ 18.128691] kasan_save_alloc_info+0x40/0x58 [ 18.129027] __kasan_kmalloc+0xd4/0xd8 [ 18.129114] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.129282] kasan_atomics+0xb8/0x2e0 [ 18.129353] kunit_try_run_case+0x170/0x3f0 [ 18.129471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.129533] kthread+0x328/0x630 [ 18.129588] ret_from_fork+0x10/0x20 [ 18.129773] [ 18.129807] The buggy address belongs to the object at fff00000c77e9a80 [ 18.129807] which belongs to the cache kmalloc-64 of size 64 [ 18.129869] The buggy address is located 0 bytes to the right of [ 18.129869] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.129943] [ 18.129977] The buggy address belongs to the physical page: [ 18.130010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.130078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.130174] page_type: f5(slab) [ 18.130487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.130559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.130603] page dumped because: kasan: bad access detected [ 18.131019] [ 18.131113] Memory state around the buggy address: [ 18.131553] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.131668] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.131831] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.131899] ^ [ 18.131934] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.132187] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.132359] ================================================================== [ 18.133032] ================================================================== [ 18.133295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 18.133538] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.133740] [ 18.133795] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.133894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.133924] Hardware name: linux,dummy-virt (DT) [ 18.133967] Call trace: [ 18.133991] show_stack+0x20/0x38 (C) [ 18.134041] dump_stack_lvl+0x8c/0xd0 [ 18.134090] print_report+0x118/0x608 [ 18.134135] kasan_report+0xdc/0x128 [ 18.134189] __asan_report_store8_noabort+0x20/0x30 [ 18.134240] kasan_atomics_helper+0x3e5c/0x4858 [ 18.134287] kasan_atomics+0x198/0x2e0 [ 18.134332] kunit_try_run_case+0x170/0x3f0 [ 18.134380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.134441] kthread+0x328/0x630 [ 18.134487] ret_from_fork+0x10/0x20 [ 18.134533] [ 18.134553] Allocated by task 268: [ 18.134584] kasan_save_stack+0x3c/0x68 [ 18.134622] kasan_save_track+0x20/0x40 [ 18.134660] kasan_save_alloc_info+0x40/0x58 [ 18.134699] __kasan_kmalloc+0xd4/0xd8 [ 18.134736] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.134775] kasan_atomics+0xb8/0x2e0 [ 18.135131] kunit_try_run_case+0x170/0x3f0 [ 18.135218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.135276] kthread+0x328/0x630 [ 18.135315] ret_from_fork+0x10/0x20 [ 18.135668] [ 18.135728] The buggy address belongs to the object at fff00000c77e9a80 [ 18.135728] which belongs to the cache kmalloc-64 of size 64 [ 18.135812] The buggy address is located 0 bytes to the right of [ 18.135812] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.136137] [ 18.136291] The buggy address belongs to the physical page: [ 18.136327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.136668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.137007] page_type: f5(slab) [ 18.137088] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.137186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.137264] page dumped because: kasan: bad access detected [ 18.137322] [ 18.137421] Memory state around the buggy address: [ 18.137458] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.137696] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.137846] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.137914] ^ [ 18.138096] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.138303] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.138372] ================================================================== [ 18.204525] ================================================================== [ 18.204579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.204631] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.204684] [ 18.204720] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.204913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.204985] Hardware name: linux,dummy-virt (DT) [ 18.205019] Call trace: [ 18.205271] show_stack+0x20/0x38 (C) [ 18.205397] dump_stack_lvl+0x8c/0xd0 [ 18.205450] print_report+0x118/0x608 [ 18.205878] kasan_report+0xdc/0x128 [ 18.205940] kasan_check_range+0x100/0x1a8 [ 18.206140] __kasan_check_write+0x20/0x30 [ 18.206385] kasan_atomics_helper+0x11f8/0x4858 [ 18.206538] kasan_atomics+0x198/0x2e0 [ 18.206613] kunit_try_run_case+0x170/0x3f0 [ 18.206693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.206763] kthread+0x328/0x630 [ 18.206808] ret_from_fork+0x10/0x20 [ 18.207180] [ 18.207263] Allocated by task 268: [ 18.207321] kasan_save_stack+0x3c/0x68 [ 18.207388] kasan_save_track+0x20/0x40 [ 18.207668] kasan_save_alloc_info+0x40/0x58 [ 18.207844] __kasan_kmalloc+0xd4/0xd8 [ 18.207942] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.208027] kasan_atomics+0xb8/0x2e0 [ 18.208148] kunit_try_run_case+0x170/0x3f0 [ 18.208262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.208315] kthread+0x328/0x630 [ 18.208471] ret_from_fork+0x10/0x20 [ 18.209056] [ 18.209405] The buggy address belongs to the object at fff00000c77e9a80 [ 18.209405] which belongs to the cache kmalloc-64 of size 64 [ 18.209501] The buggy address is located 0 bytes to the right of [ 18.209501] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.209621] [ 18.209666] The buggy address belongs to the physical page: [ 18.209730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.209788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.210277] page_type: f5(slab) [ 18.210341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.210393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.210443] page dumped because: kasan: bad access detected [ 18.210478] [ 18.210500] Memory state around the buggy address: [ 18.210534] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.210580] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.210625] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.210665] ^ [ 18.210701] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.210745] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.210784] ================================================================== [ 18.214318] ================================================================== [ 18.214514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.214570] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.214620] [ 18.214651] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.214734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.214763] Hardware name: linux,dummy-virt (DT) [ 18.214795] Call trace: [ 18.214827] show_stack+0x20/0x38 (C) [ 18.214873] dump_stack_lvl+0x8c/0xd0 [ 18.214923] print_report+0x118/0x608 [ 18.215010] kasan_report+0xdc/0x128 [ 18.215055] kasan_check_range+0x100/0x1a8 [ 18.215103] __kasan_check_write+0x20/0x30 [ 18.215150] kasan_atomics_helper+0x12d8/0x4858 [ 18.215244] kasan_atomics+0x198/0x2e0 [ 18.215288] kunit_try_run_case+0x170/0x3f0 [ 18.215352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.215408] kthread+0x328/0x630 [ 18.215452] ret_from_fork+0x10/0x20 [ 18.215607] [ 18.215631] Allocated by task 268: [ 18.215664] kasan_save_stack+0x3c/0x68 [ 18.215705] kasan_save_track+0x20/0x40 [ 18.215847] kasan_save_alloc_info+0x40/0x58 [ 18.215906] __kasan_kmalloc+0xd4/0xd8 [ 18.215989] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.216035] kasan_atomics+0xb8/0x2e0 [ 18.216081] kunit_try_run_case+0x170/0x3f0 [ 18.216126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.216193] kthread+0x328/0x630 [ 18.216237] ret_from_fork+0x10/0x20 [ 18.216284] [ 18.216323] The buggy address belongs to the object at fff00000c77e9a80 [ 18.216323] which belongs to the cache kmalloc-64 of size 64 [ 18.216558] The buggy address is located 0 bytes to the right of [ 18.216558] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.216644] [ 18.216682] The buggy address belongs to the physical page: [ 18.216716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.216779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.216979] page_type: f5(slab) [ 18.217049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.217107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.217232] page dumped because: kasan: bad access detected [ 18.217289] [ 18.217318] Memory state around the buggy address: [ 18.217353] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.217406] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.217465] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.217505] ^ [ 18.217540] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.217583] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.217814] ================================================================== [ 18.245845] ================================================================== [ 18.245907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.245990] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.246146] [ 18.246295] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.246404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.246479] Hardware name: linux,dummy-virt (DT) [ 18.246569] Call trace: [ 18.246654] show_stack+0x20/0x38 (C) [ 18.246723] dump_stack_lvl+0x8c/0xd0 [ 18.246827] print_report+0x118/0x608 [ 18.246913] kasan_report+0xdc/0x128 [ 18.246992] kasan_check_range+0x100/0x1a8 [ 18.247048] __kasan_check_write+0x20/0x30 [ 18.247097] kasan_atomics_helper+0x15b4/0x4858 [ 18.247177] kasan_atomics+0x198/0x2e0 [ 18.247311] kunit_try_run_case+0x170/0x3f0 [ 18.247361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.247417] kthread+0x328/0x630 [ 18.247461] ret_from_fork+0x10/0x20 [ 18.247508] [ 18.247530] Allocated by task 268: [ 18.247793] kasan_save_stack+0x3c/0x68 [ 18.247896] kasan_save_track+0x20/0x40 [ 18.247972] kasan_save_alloc_info+0x40/0x58 [ 18.248081] __kasan_kmalloc+0xd4/0xd8 [ 18.248161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.248453] kasan_atomics+0xb8/0x2e0 [ 18.248525] kunit_try_run_case+0x170/0x3f0 [ 18.248578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.248625] kthread+0x328/0x630 [ 18.248662] ret_from_fork+0x10/0x20 [ 18.248700] [ 18.248723] The buggy address belongs to the object at fff00000c77e9a80 [ 18.248723] which belongs to the cache kmalloc-64 of size 64 [ 18.248783] The buggy address is located 0 bytes to the right of [ 18.248783] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.248848] [ 18.248869] The buggy address belongs to the physical page: [ 18.248912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.248988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.249036] page_type: f5(slab) [ 18.249075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.249126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.249175] page dumped because: kasan: bad access detected [ 18.249219] [ 18.249241] Memory state around the buggy address: [ 18.249274] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.249319] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.249362] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.249418] ^ [ 18.249454] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.249514] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.249571] ================================================================== [ 18.167287] ================================================================== [ 18.167349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 18.167549] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.167615] [ 18.167789] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.167886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.168000] Hardware name: linux,dummy-virt (DT) [ 18.168038] Call trace: [ 18.168064] show_stack+0x20/0x38 (C) [ 18.168137] dump_stack_lvl+0x8c/0xd0 [ 18.168444] print_report+0x118/0x608 [ 18.168502] kasan_report+0xdc/0x128 [ 18.168564] kasan_check_range+0x100/0x1a8 [ 18.168614] __kasan_check_write+0x20/0x30 [ 18.168660] kasan_atomics_helper+0xff0/0x4858 [ 18.168750] kasan_atomics+0x198/0x2e0 [ 18.168816] kunit_try_run_case+0x170/0x3f0 [ 18.168864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.168919] kthread+0x328/0x630 [ 18.168977] ret_from_fork+0x10/0x20 [ 18.169023] [ 18.169055] Allocated by task 268: [ 18.169094] kasan_save_stack+0x3c/0x68 [ 18.169143] kasan_save_track+0x20/0x40 [ 18.169191] kasan_save_alloc_info+0x40/0x58 [ 18.169231] __kasan_kmalloc+0xd4/0xd8 [ 18.169269] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.169315] kasan_atomics+0xb8/0x2e0 [ 18.169355] kunit_try_run_case+0x170/0x3f0 [ 18.169395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.169440] kthread+0x328/0x630 [ 18.169478] ret_from_fork+0x10/0x20 [ 18.169516] [ 18.169537] The buggy address belongs to the object at fff00000c77e9a80 [ 18.169537] which belongs to the cache kmalloc-64 of size 64 [ 18.169598] The buggy address is located 0 bytes to the right of [ 18.169598] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.169669] [ 18.169700] The buggy address belongs to the physical page: [ 18.169732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.169795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.169852] page_type: f5(slab) [ 18.169899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.170684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.170751] page dumped because: kasan: bad access detected [ 18.170804] [ 18.170847] Memory state around the buggy address: [ 18.170922] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.170981] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.171025] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.171067] ^ [ 18.171286] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.171560] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.171643] ================================================================== [ 18.278873] ================================================================== [ 18.278926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.278986] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.279050] [ 18.279082] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.279184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.279249] Hardware name: linux,dummy-virt (DT) [ 18.279465] Call trace: [ 18.279638] show_stack+0x20/0x38 (C) [ 18.280077] dump_stack_lvl+0x8c/0xd0 [ 18.280668] print_report+0x118/0x608 [ 18.280782] kasan_report+0xdc/0x128 [ 18.281228] __asan_report_load8_noabort+0x20/0x30 [ 18.281285] kasan_atomics_helper+0x3e10/0x4858 [ 18.281749] kasan_atomics+0x198/0x2e0 [ 18.282074] kunit_try_run_case+0x170/0x3f0 [ 18.282311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.282479] kthread+0x328/0x630 [ 18.282556] ret_from_fork+0x10/0x20 [ 18.282776] [ 18.282986] Allocated by task 268: [ 18.283048] kasan_save_stack+0x3c/0x68 [ 18.283199] kasan_save_track+0x20/0x40 [ 18.283295] kasan_save_alloc_info+0x40/0x58 [ 18.283598] __kasan_kmalloc+0xd4/0xd8 [ 18.283693] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.283760] kasan_atomics+0xb8/0x2e0 [ 18.283895] kunit_try_run_case+0x170/0x3f0 [ 18.284037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.284121] kthread+0x328/0x630 [ 18.284160] ret_from_fork+0x10/0x20 [ 18.284235] [ 18.284558] The buggy address belongs to the object at fff00000c77e9a80 [ 18.284558] which belongs to the cache kmalloc-64 of size 64 [ 18.284665] The buggy address is located 0 bytes to the right of [ 18.284665] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.284996] [ 18.285099] The buggy address belongs to the physical page: [ 18.285159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.285256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.285390] page_type: f5(slab) [ 18.285468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.285548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.285672] page dumped because: kasan: bad access detected [ 18.285732] [ 18.285770] Memory state around the buggy address: [ 18.286106] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.286219] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.286323] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.286394] ^ [ 18.286456] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.286922] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.286978] ================================================================== [ 18.288266] ================================================================== [ 18.288320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.288373] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.288425] [ 18.288505] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.288618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.288909] Hardware name: linux,dummy-virt (DT) [ 18.289191] Call trace: [ 18.289300] show_stack+0x20/0x38 (C) [ 18.289360] dump_stack_lvl+0x8c/0xd0 [ 18.289487] print_report+0x118/0x608 [ 18.289565] kasan_report+0xdc/0x128 [ 18.289631] kasan_check_range+0x100/0x1a8 [ 18.289698] __kasan_check_write+0x20/0x30 [ 18.289832] kasan_atomics_helper+0x175c/0x4858 [ 18.289885] kasan_atomics+0x198/0x2e0 [ 18.289929] kunit_try_run_case+0x170/0x3f0 [ 18.290016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.290080] kthread+0x328/0x630 [ 18.290125] ret_from_fork+0x10/0x20 [ 18.290748] [ 18.290797] Allocated by task 268: [ 18.290855] kasan_save_stack+0x3c/0x68 [ 18.290992] kasan_save_track+0x20/0x40 [ 18.291060] kasan_save_alloc_info+0x40/0x58 [ 18.291146] __kasan_kmalloc+0xd4/0xd8 [ 18.291280] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.291322] kasan_atomics+0xb8/0x2e0 [ 18.291359] kunit_try_run_case+0x170/0x3f0 [ 18.291399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.291666] kthread+0x328/0x630 [ 18.291830] ret_from_fork+0x10/0x20 [ 18.291895] [ 18.291934] The buggy address belongs to the object at fff00000c77e9a80 [ 18.291934] which belongs to the cache kmalloc-64 of size 64 [ 18.292463] The buggy address is located 0 bytes to the right of [ 18.292463] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.292549] [ 18.292583] The buggy address belongs to the physical page: [ 18.292634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.292689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.292739] page_type: f5(slab) [ 18.292896] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.292977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.293020] page dumped because: kasan: bad access detected [ 18.293055] [ 18.293104] Memory state around the buggy address: [ 18.293138] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.293183] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.293227] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.293268] ^ [ 18.293329] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.293398] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.293445] ================================================================== [ 18.227859] ================================================================== [ 18.228240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.228346] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.228399] [ 18.228437] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.228552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.228589] Hardware name: linux,dummy-virt (DT) [ 18.228638] Call trace: [ 18.228663] show_stack+0x20/0x38 (C) [ 18.228716] dump_stack_lvl+0x8c/0xd0 [ 18.228881] print_report+0x118/0x608 [ 18.228940] kasan_report+0xdc/0x128 [ 18.228998] kasan_check_range+0x100/0x1a8 [ 18.229046] __kasan_check_write+0x20/0x30 [ 18.229169] kasan_atomics_helper+0x1414/0x4858 [ 18.229245] kasan_atomics+0x198/0x2e0 [ 18.229289] kunit_try_run_case+0x170/0x3f0 [ 18.229352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.229415] kthread+0x328/0x630 [ 18.229467] ret_from_fork+0x10/0x20 [ 18.229516] [ 18.229562] Allocated by task 268: [ 18.229594] kasan_save_stack+0x3c/0x68 [ 18.229639] kasan_save_track+0x20/0x40 [ 18.229678] kasan_save_alloc_info+0x40/0x58 [ 18.229717] __kasan_kmalloc+0xd4/0xd8 [ 18.229762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.229800] kasan_atomics+0xb8/0x2e0 [ 18.229836] kunit_try_run_case+0x170/0x3f0 [ 18.229875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.229923] kthread+0x328/0x630 [ 18.229972] ret_from_fork+0x10/0x20 [ 18.230009] [ 18.230031] The buggy address belongs to the object at fff00000c77e9a80 [ 18.230031] which belongs to the cache kmalloc-64 of size 64 [ 18.230089] The buggy address is located 0 bytes to the right of [ 18.230089] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.230354] [ 18.230392] The buggy address belongs to the physical page: [ 18.230478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.230552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.230611] page_type: f5(slab) [ 18.230650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.230793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.230883] page dumped because: kasan: bad access detected [ 18.230979] [ 18.231030] Memory state around the buggy address: [ 18.231100] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.231181] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.231257] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.231299] ^ [ 18.231335] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.231377] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.231440] ================================================================== [ 18.273595] ================================================================== [ 18.273668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.273723] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.273775] [ 18.274075] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.274263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.274334] Hardware name: linux,dummy-virt (DT) [ 18.274406] Call trace: [ 18.274476] show_stack+0x20/0x38 (C) [ 18.274583] dump_stack_lvl+0x8c/0xd0 [ 18.274630] print_report+0x118/0x608 [ 18.274678] kasan_report+0xdc/0x128 [ 18.274864] kasan_check_range+0x100/0x1a8 [ 18.275357] __kasan_check_write+0x20/0x30 [ 18.275591] kasan_atomics_helper+0x16d0/0x4858 [ 18.275726] kasan_atomics+0x198/0x2e0 [ 18.275794] kunit_try_run_case+0x170/0x3f0 [ 18.275935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.276007] kthread+0x328/0x630 [ 18.276218] ret_from_fork+0x10/0x20 [ 18.276297] [ 18.276325] Allocated by task 268: [ 18.276370] kasan_save_stack+0x3c/0x68 [ 18.276425] kasan_save_track+0x20/0x40 [ 18.276485] kasan_save_alloc_info+0x40/0x58 [ 18.276527] __kasan_kmalloc+0xd4/0xd8 [ 18.276572] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.276613] kasan_atomics+0xb8/0x2e0 [ 18.276657] kunit_try_run_case+0x170/0x3f0 [ 18.276698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.276758] kthread+0x328/0x630 [ 18.276805] ret_from_fork+0x10/0x20 [ 18.276842] [ 18.276868] The buggy address belongs to the object at fff00000c77e9a80 [ 18.276868] which belongs to the cache kmalloc-64 of size 64 [ 18.276934] The buggy address is located 0 bytes to the right of [ 18.276934] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.277015] [ 18.277039] The buggy address belongs to the physical page: [ 18.277088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.277152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.277209] page_type: f5(slab) [ 18.277271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.277324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.277386] page dumped because: kasan: bad access detected [ 18.277421] [ 18.277443] Memory state around the buggy address: [ 18.277477] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.277522] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.277576] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.277625] ^ [ 18.277662] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.277707] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.277745] ================================================================== [ 18.015983] ================================================================== [ 18.016032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 18.016084] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.016135] [ 18.016166] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.016246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.016428] print_report+0x118/0x608 [ 18.016999] kasan_save_alloc_info+0x40/0x58 [ 18.017075] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.017386] The buggy address is located 0 bytes to the right of [ 18.017386] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.018217] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.019025] Call trace: [ 18.019049] show_stack+0x20/0x38 (C) [ 18.019099] dump_stack_lvl+0x8c/0xd0 [ 18.019145] print_report+0x118/0x608 [ 18.019190] kasan_report+0xdc/0x128 [ 18.019235] kasan_check_range+0x100/0x1a8 [ 18.019281] __kasan_check_write+0x20/0x30 [ 18.019329] kasan_atomics_helper+0x934/0x4858 [ 18.019375] kasan_atomics+0x198/0x2e0 [ 18.019420] kunit_try_run_case+0x170/0x3f0 [ 18.019471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.019536] kthread+0x328/0x630 [ 18.019581] ret_from_fork+0x10/0x20 [ 18.019629] [ 18.019650] Allocated by task 268: [ 18.019688] kasan_save_stack+0x3c/0x68 [ 18.019730] kasan_save_track+0x20/0x40 [ 18.019766] kasan_save_alloc_info+0x40/0x58 [ 18.019807] __kasan_kmalloc+0xd4/0xd8 [ 18.019845] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.019882] kasan_atomics+0xb8/0x2e0 [ 18.019918] kunit_try_run_case+0x170/0x3f0 [ 18.019971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.020018] kthread+0x328/0x630 [ 18.020056] ret_from_fork+0x10/0x20 [ 18.020093] [ 18.020113] The buggy address belongs to the object at fff00000c77e9a80 [ 18.020113] which belongs to the cache kmalloc-64 of size 64 [ 18.020167] The buggy address is located 0 bytes to the right of [ 18.020167] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.020259] [ 18.020281] The buggy address belongs to the physical page: [ 18.020320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.020372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.020417] page_type: f5(slab) [ 18.020465] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.020524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.020566] page dumped because: kasan: bad access detected [ 18.020609] [ 18.020629] Memory state around the buggy address: [ 18.020660] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.020704] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.020757] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.020805] ^ [ 18.020839] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.020883] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.020924] ================================================================== [ 18.031422] ================================================================== [ 18.031630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 18.031693] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.031761] [ 18.031828] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.031985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.032022] Hardware name: linux,dummy-virt (DT) [ 18.032055] Call trace: [ 18.032079] show_stack+0x20/0x38 (C) [ 18.032127] dump_stack_lvl+0x8c/0xd0 [ 18.032174] print_report+0x118/0x608 [ 18.032220] kasan_report+0xdc/0x128 [ 18.032265] kasan_check_range+0x100/0x1a8 [ 18.032312] __kasan_check_write+0x20/0x30 [ 18.032360] kasan_atomics_helper+0xa6c/0x4858 [ 18.032407] kasan_atomics+0x198/0x2e0 [ 18.032763] kasan_save_track+0x20/0x40 [ 18.032940] kasan_save_alloc_info+0x40/0x58 [ 18.032994] __kasan_kmalloc+0xd4/0xd8 [ 18.033031] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.033116] kasan_atomics+0xb8/0x2e0 [ 18.033183] kunit_try_run_case+0x170/0x3f0 [ 18.033226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.033273] kthread+0x328/0x630 [ 18.033310] ret_from_fork+0x10/0x20 [ 18.033349] [ 18.033376] The buggy address belongs to the object at fff00000c77e9a80 [ 18.033376] which belongs to the cache kmalloc-64 of size 64 [ 18.034114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.034426] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.035742] Call trace: [ 18.036057] kasan_check_range+0x100/0x1a8 [ 18.037088] kasan_save_alloc_info+0x40/0x58 [ 18.037138] __kasan_kmalloc+0xd4/0xd8 [ 18.037213] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.037315] kasan_atomics+0xb8/0x2e0 [ 18.037382] kunit_try_run_case+0x170/0x3f0 [ 18.037440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.037487] kthread+0x328/0x630 [ 18.037559] ret_from_fork+0x10/0x20 [ 18.037598] [ 18.037619] The buggy address belongs to the object at fff00000c77e9a80 [ 18.037619] which belongs to the cache kmalloc-64 of size 64 [ 18.037679] The buggy address is located 0 bytes to the right of [ 18.037679] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.037746] [ 18.037768] The buggy address belongs to the physical page: [ 18.037800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.037928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.037997] page_type: f5(slab) [ 18.038034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.038088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.038554] [ 18.038837] ^ [ 18.039345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 18.040260] kasan_atomics_helper+0x3dcc/0x4858 [ 18.041676] __kasan_kmalloc+0xd4/0xd8 [ 18.042147] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.042609] ret_from_fork+0x10/0x20 [ 18.043593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.044807] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.045168] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.045964] dump_stack_lvl+0x8c/0xd0 [ 18.049659] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.050959] The buggy address is located 0 bytes to the right of [ 18.050959] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.051984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.052774] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.053806] ================================================================== [ 18.249759] ================================================================== [ 18.249804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.249860] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.250425] [ 18.250606] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.250709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.250737] Hardware name: linux,dummy-virt (DT) [ 18.250770] Call trace: [ 18.250793] show_stack+0x20/0x38 (C) [ 18.250845] dump_stack_lvl+0x8c/0xd0 [ 18.250995] print_report+0x118/0x608 [ 18.251073] kasan_report+0xdc/0x128 [ 18.251148] __asan_report_load8_noabort+0x20/0x30 [ 18.251255] kasan_atomics_helper+0x3db0/0x4858 [ 18.251535] kasan_atomics+0x198/0x2e0 [ 18.251602] kunit_try_run_case+0x170/0x3f0 [ 18.251653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.252003] kthread+0x328/0x630 [ 18.252121] ret_from_fork+0x10/0x20 [ 18.252194] [ 18.252604] Allocated by task 268: [ 18.252741] kasan_save_stack+0x3c/0x68 [ 18.252816] kasan_save_track+0x20/0x40 [ 18.252920] kasan_save_alloc_info+0x40/0x58 [ 18.252995] __kasan_kmalloc+0xd4/0xd8 [ 18.253092] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.253132] kasan_atomics+0xb8/0x2e0 [ 18.253352] kunit_try_run_case+0x170/0x3f0 [ 18.253764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.253852] kthread+0x328/0x630 [ 18.253964] ret_from_fork+0x10/0x20 [ 18.254078] [ 18.254175] The buggy address belongs to the object at fff00000c77e9a80 [ 18.254175] which belongs to the cache kmalloc-64 of size 64 [ 18.254260] The buggy address is located 0 bytes to the right of [ 18.254260] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.254435] [ 18.254476] The buggy address belongs to the physical page: [ 18.254510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.254683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.254899] page_type: f5(slab) [ 18.254985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.255088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.255162] page dumped because: kasan: bad access detected [ 18.255489] [ 18.255534] Memory state around the buggy address: [ 18.255626] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.255675] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.255742] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.255925] ^ [ 18.256132] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.256184] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.256510] ================================================================== [ 18.147110] ================================================================== [ 18.147166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 18.147238] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.147433] [ 18.147792] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.147905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.148085] Hardware name: linux,dummy-virt (DT) [ 18.148180] Call trace: [ 18.148228] show_stack+0x20/0x38 (C) [ 18.148280] dump_stack_lvl+0x8c/0xd0 [ 18.148381] print_report+0x118/0x608 [ 18.148449] kasan_report+0xdc/0x128 [ 18.148513] kasan_check_range+0x100/0x1a8 [ 18.148560] __kasan_check_write+0x20/0x30 [ 18.150003] kasan_atomics_helper+0xf20/0x4858 [ 18.150472] kasan_atomics+0x198/0x2e0 [ 18.150653] kunit_try_run_case+0x170/0x3f0 [ 18.150711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.151099] kthread+0x328/0x630 [ 18.151278] ret_from_fork+0x10/0x20 [ 18.151378] [ 18.151521] Allocated by task 268: [ 18.151613] kasan_save_stack+0x3c/0x68 [ 18.151680] kasan_save_track+0x20/0x40 [ 18.151735] kasan_save_alloc_info+0x40/0x58 [ 18.152140] __kasan_kmalloc+0xd4/0xd8 [ 18.153076] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.153617] kasan_atomics+0xb8/0x2e0 [ 18.153807] kunit_try_run_case+0x170/0x3f0 [ 18.153995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.154061] kthread+0x328/0x630 [ 18.154174] ret_from_fork+0x10/0x20 [ 18.154217] [ 18.154548] The buggy address belongs to the object at fff00000c77e9a80 [ 18.154548] which belongs to the cache kmalloc-64 of size 64 [ 18.154640] The buggy address is located 0 bytes to the right of [ 18.154640] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.155021] [ 18.155068] The buggy address belongs to the physical page: [ 18.155419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.155515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.155603] page_type: f5(slab) [ 18.155938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.156085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.156130] page dumped because: kasan: bad access detected [ 18.156172] [ 18.156492] Memory state around the buggy address: [ 18.156540] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.156588] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.156634] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.156676] ^ [ 18.156761] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.156817] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.156855] ================================================================== [ 18.197379] ================================================================== [ 18.197429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.197474] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.197525] [ 18.197556] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.197640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.197668] Hardware name: linux,dummy-virt (DT) [ 18.197704] Call trace: [ 18.197728] show_stack+0x20/0x38 (C) [ 18.197775] dump_stack_lvl+0x8c/0xd0 [ 18.197822] print_report+0x118/0x608 [ 18.197869] kasan_report+0xdc/0x128 [ 18.198036] kasan_check_range+0x100/0x1a8 [ 18.198093] __kasan_check_write+0x20/0x30 [ 18.198165] kasan_atomics_helper+0x1190/0x4858 [ 18.198213] kasan_atomics+0x198/0x2e0 [ 18.198258] kunit_try_run_case+0x170/0x3f0 [ 18.198926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.199122] kthread+0x328/0x630 [ 18.199258] ret_from_fork+0x10/0x20 [ 18.199344] [ 18.199412] Allocated by task 268: [ 18.199731] kasan_save_stack+0x3c/0x68 [ 18.199829] kasan_save_track+0x20/0x40 [ 18.199898] kasan_save_alloc_info+0x40/0x58 [ 18.199940] __kasan_kmalloc+0xd4/0xd8 [ 18.200016] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.200081] kasan_atomics+0xb8/0x2e0 [ 18.200135] kunit_try_run_case+0x170/0x3f0 [ 18.200196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.200285] kthread+0x328/0x630 [ 18.200371] ret_from_fork+0x10/0x20 [ 18.200614] [ 18.200675] The buggy address belongs to the object at fff00000c77e9a80 [ 18.200675] which belongs to the cache kmalloc-64 of size 64 [ 18.200967] The buggy address is located 0 bytes to the right of [ 18.200967] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.201080] [ 18.201164] The buggy address belongs to the physical page: [ 18.201509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.201991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.202245] page_type: f5(slab) [ 18.202303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.202499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.202552] page dumped because: kasan: bad access detected [ 18.202617] [ 18.202653] Memory state around the buggy address: [ 18.202693] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.202740] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.202791] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.202856] ^ [ 18.202893] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.202937] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.203534] ================================================================== [ 18.117442] ================================================================== [ 18.117495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 18.117563] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.117664] [ 18.117698] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.117789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.117888] Hardware name: linux,dummy-virt (DT) [ 18.117933] Call trace: [ 18.117967] show_stack+0x20/0x38 (C) [ 18.118018] dump_stack_lvl+0x8c/0xd0 [ 18.118072] print_report+0x118/0x608 [ 18.118119] kasan_report+0xdc/0x128 [ 18.118505] __asan_report_load8_noabort+0x20/0x30 [ 18.118584] kasan_atomics_helper+0x3f58/0x4858 [ 18.118647] kasan_atomics+0x198/0x2e0 [ 18.118709] kunit_try_run_case+0x170/0x3f0 [ 18.118766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.118828] kthread+0x328/0x630 [ 18.119269] ret_from_fork+0x10/0x20 [ 18.119372] [ 18.119639] Allocated by task 268: [ 18.119745] kasan_save_stack+0x3c/0x68 [ 18.119895] kasan_save_track+0x20/0x40 [ 18.119971] kasan_save_alloc_info+0x40/0x58 [ 18.120383] __kasan_kmalloc+0xd4/0xd8 [ 18.120480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.120547] kasan_atomics+0xb8/0x2e0 [ 18.120983] kunit_try_run_case+0x170/0x3f0 [ 18.121048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.121381] kthread+0x328/0x630 [ 18.121478] ret_from_fork+0x10/0x20 [ 18.121582] [ 18.121604] The buggy address belongs to the object at fff00000c77e9a80 [ 18.121604] which belongs to the cache kmalloc-64 of size 64 [ 18.121978] The buggy address is located 0 bytes to the right of [ 18.121978] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.122181] [ 18.122301] The buggy address belongs to the physical page: [ 18.122506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.122703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.122911] page_type: f5(slab) [ 18.123018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.123091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.123317] page dumped because: kasan: bad access detected [ 18.123357] [ 18.123386] Memory state around the buggy address: [ 18.123523] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.124074] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.124161] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.124204] ^ [ 18.124245] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.124314] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.124354] ================================================================== [ 18.257844] ================================================================== [ 18.257908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.258333] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.258517] [ 18.258802] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.258994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.259054] Hardware name: linux,dummy-virt (DT) [ 18.259119] Call trace: [ 18.259187] show_stack+0x20/0x38 (C) [ 18.259460] dump_stack_lvl+0x8c/0xd0 [ 18.259536] print_report+0x118/0x608 [ 18.259624] kasan_report+0xdc/0x128 [ 18.259695] kasan_check_range+0x100/0x1a8 [ 18.259759] __kasan_check_write+0x20/0x30 [ 18.259808] kasan_atomics_helper+0x1644/0x4858 [ 18.259864] kasan_atomics+0x198/0x2e0 [ 18.259908] kunit_try_run_case+0x170/0x3f0 [ 18.259985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.260041] kthread+0x328/0x630 [ 18.260087] ret_from_fork+0x10/0x20 [ 18.260143] [ 18.260170] Allocated by task 268: [ 18.260215] kasan_save_stack+0x3c/0x68 [ 18.260268] kasan_save_track+0x20/0x40 [ 18.260316] kasan_save_alloc_info+0x40/0x58 [ 18.260377] __kasan_kmalloc+0xd4/0xd8 [ 18.260414] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.260452] kasan_atomics+0xb8/0x2e0 [ 18.260504] kunit_try_run_case+0x170/0x3f0 [ 18.260544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.260600] kthread+0x328/0x630 [ 18.260636] ret_from_fork+0x10/0x20 [ 18.260673] [ 18.260710] The buggy address belongs to the object at fff00000c77e9a80 [ 18.260710] which belongs to the cache kmalloc-64 of size 64 [ 18.260783] The buggy address is located 0 bytes to the right of [ 18.260783] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.260848] [ 18.260872] The buggy address belongs to the physical page: [ 18.260904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.260970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.261244] page_type: f5(slab) [ 18.261683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.262046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.262352] page dumped because: kasan: bad access detected [ 18.262486] [ 18.262512] Memory state around the buggy address: [ 18.262835] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.263920] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.264135] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.264214] ^ [ 18.264412] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.264486] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.264535] ================================================================== [ 18.094306] ================================================================== [ 18.094562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 18.094751] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.095114] [ 18.095189] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.095392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.095452] Hardware name: linux,dummy-virt (DT) [ 18.095547] Call trace: [ 18.095649] show_stack+0x20/0x38 (C) [ 18.095705] dump_stack_lvl+0x8c/0xd0 [ 18.095754] print_report+0x118/0x608 [ 18.095826] kasan_report+0xdc/0x128 [ 18.096263] kasan_check_range+0x100/0x1a8 [ 18.096492] __kasan_check_write+0x20/0x30 [ 18.096670] kasan_atomics_helper+0xd3c/0x4858 [ 18.096766] kasan_atomics+0x198/0x2e0 [ 18.096841] kunit_try_run_case+0x170/0x3f0 [ 18.097006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.097076] kthread+0x328/0x630 [ 18.097459] ret_from_fork+0x10/0x20 [ 18.097557] [ 18.097602] Allocated by task 268: [ 18.097978] kasan_save_stack+0x3c/0x68 [ 18.098063] kasan_save_track+0x20/0x40 [ 18.098205] kasan_save_alloc_info+0x40/0x58 [ 18.098252] __kasan_kmalloc+0xd4/0xd8 [ 18.098535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.098646] kasan_atomics+0xb8/0x2e0 [ 18.098930] kunit_try_run_case+0x170/0x3f0 [ 18.099016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.099292] kthread+0x328/0x630 [ 18.099507] ret_from_fork+0x10/0x20 [ 18.099718] [ 18.099783] The buggy address belongs to the object at fff00000c77e9a80 [ 18.099783] which belongs to the cache kmalloc-64 of size 64 [ 18.099968] The buggy address is located 0 bytes to the right of [ 18.099968] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.100181] [ 18.100226] The buggy address belongs to the physical page: [ 18.100263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.100347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.100668] page_type: f5(slab) [ 18.100728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.101058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.101135] page dumped because: kasan: bad access detected [ 18.101191] [ 18.101224] Memory state around the buggy address: [ 18.101308] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.101379] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.101424] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.101467] ^ [ 18.101509] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.101552] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.101591] ================================================================== [ 18.223884] ================================================================== [ 18.223930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.224075] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.224221] [ 18.224288] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.224400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.224445] Hardware name: linux,dummy-virt (DT) [ 18.224479] Call trace: [ 18.224509] show_stack+0x20/0x38 (C) [ 18.224570] dump_stack_lvl+0x8c/0xd0 [ 18.224676] print_report+0x118/0x608 [ 18.224745] kasan_report+0xdc/0x128 [ 18.224876] __asan_report_load8_noabort+0x20/0x30 [ 18.224987] kasan_atomics_helper+0x3f04/0x4858 [ 18.225038] kasan_atomics+0x198/0x2e0 [ 18.225082] kunit_try_run_case+0x170/0x3f0 [ 18.225144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.225209] kthread+0x328/0x630 [ 18.225263] ret_from_fork+0x10/0x20 [ 18.225327] [ 18.225353] Allocated by task 268: [ 18.225394] kasan_save_stack+0x3c/0x68 [ 18.225435] kasan_save_track+0x20/0x40 [ 18.225473] kasan_save_alloc_info+0x40/0x58 [ 18.225520] __kasan_kmalloc+0xd4/0xd8 [ 18.225670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.225819] kasan_atomics+0xb8/0x2e0 [ 18.225864] kunit_try_run_case+0x170/0x3f0 [ 18.225910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.225972] kthread+0x328/0x630 [ 18.226080] ret_from_fork+0x10/0x20 [ 18.226118] [ 18.226140] The buggy address belongs to the object at fff00000c77e9a80 [ 18.226140] which belongs to the cache kmalloc-64 of size 64 [ 18.226310] The buggy address is located 0 bytes to the right of [ 18.226310] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.226433] [ 18.226481] The buggy address belongs to the physical page: [ 18.226538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.226787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.227021] page_type: f5(slab) [ 18.227076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.227135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.227180] page dumped because: kasan: bad access detected [ 18.227213] [ 18.227364] Memory state around the buggy address: [ 18.227398] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.227443] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.227489] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.227529] ^ [ 18.227565] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.227610] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.227650] ================================================================== [ 18.240967] ================================================================== [ 18.241039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.241093] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.241143] [ 18.241180] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.241270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.241509] Hardware name: linux,dummy-virt (DT) [ 18.241579] Call trace: [ 18.241605] show_stack+0x20/0x38 (C) [ 18.241657] dump_stack_lvl+0x8c/0xd0 [ 18.241714] print_report+0x118/0x608 [ 18.241767] kasan_report+0xdc/0x128 [ 18.241812] kasan_check_range+0x100/0x1a8 [ 18.241868] __kasan_check_write+0x20/0x30 [ 18.241926] kasan_atomics_helper+0x154c/0x4858 [ 18.241993] kasan_atomics+0x198/0x2e0 [ 18.242047] kunit_try_run_case+0x170/0x3f0 [ 18.242107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.242169] kthread+0x328/0x630 [ 18.242233] ret_from_fork+0x10/0x20 [ 18.242321] [ 18.242364] Allocated by task 268: [ 18.242394] kasan_save_stack+0x3c/0x68 [ 18.242659] kasan_save_track+0x20/0x40 [ 18.242705] kasan_save_alloc_info+0x40/0x58 [ 18.242760] __kasan_kmalloc+0xd4/0xd8 [ 18.242864] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.242943] kasan_atomics+0xb8/0x2e0 [ 18.243021] kunit_try_run_case+0x170/0x3f0 [ 18.243101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.243188] kthread+0x328/0x630 [ 18.243225] ret_from_fork+0x10/0x20 [ 18.243263] [ 18.243421] The buggy address belongs to the object at fff00000c77e9a80 [ 18.243421] which belongs to the cache kmalloc-64 of size 64 [ 18.243497] The buggy address is located 0 bytes to the right of [ 18.243497] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.243580] [ 18.243616] The buggy address belongs to the physical page: [ 18.243678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.243740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.243798] page_type: f5(slab) [ 18.243837] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.243889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.243931] page dumped because: kasan: bad access detected [ 18.244456] [ 18.244519] Memory state around the buggy address: [ 18.244607] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.244705] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.245023] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.245085] ^ [ 18.245181] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.245248] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.245349] ================================================================== [ 18.191305] ================================================================== [ 18.191361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.191416] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.191467] [ 18.191500] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.191817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.191862] Hardware name: linux,dummy-virt (DT) [ 18.191898] Call trace: [ 18.192146] show_stack+0x20/0x38 (C) [ 18.192224] dump_stack_lvl+0x8c/0xd0 [ 18.192414] print_report+0x118/0x608 [ 18.192476] kasan_report+0xdc/0x128 [ 18.192541] kasan_check_range+0x100/0x1a8 [ 18.192880] __kasan_check_write+0x20/0x30 [ 18.192994] kasan_atomics_helper+0x1128/0x4858 [ 18.193044] kasan_atomics+0x198/0x2e0 [ 18.193090] kunit_try_run_case+0x170/0x3f0 [ 18.193303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.193375] kthread+0x328/0x630 [ 18.193420] ret_from_fork+0x10/0x20 [ 18.193694] [ 18.193738] Allocated by task 268: [ 18.193773] kasan_save_stack+0x3c/0x68 [ 18.193818] kasan_save_track+0x20/0x40 [ 18.194045] kasan_save_alloc_info+0x40/0x58 [ 18.194196] __kasan_kmalloc+0xd4/0xd8 [ 18.194326] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.194373] kasan_atomics+0xb8/0x2e0 [ 18.194410] kunit_try_run_case+0x170/0x3f0 [ 18.194457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.194504] kthread+0x328/0x630 [ 18.194678] ret_from_fork+0x10/0x20 [ 18.194908] [ 18.194937] The buggy address belongs to the object at fff00000c77e9a80 [ 18.194937] which belongs to the cache kmalloc-64 of size 64 [ 18.195011] The buggy address is located 0 bytes to the right of [ 18.195011] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.195369] [ 18.195507] The buggy address belongs to the physical page: [ 18.195554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.195900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.195977] page_type: f5(slab) [ 18.196017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.196350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.196494] page dumped because: kasan: bad access detected [ 18.196836] [ 18.196867] Memory state around the buggy address: [ 18.196904] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.196961] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.197007] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.197047] ^ [ 18.197084] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.197128] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.197166] ================================================================== [ 18.211091] ================================================================== [ 18.211141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.211187] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.211373] [ 18.211419] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.211518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.211549] Hardware name: linux,dummy-virt (DT) [ 18.211589] Call trace: [ 18.211623] show_stack+0x20/0x38 (C) [ 18.211680] dump_stack_lvl+0x8c/0xd0 [ 18.211730] print_report+0x118/0x608 [ 18.211775] kasan_report+0xdc/0x128 [ 18.211819] kasan_check_range+0x100/0x1a8 [ 18.211867] __kasan_check_write+0x20/0x30 [ 18.211913] kasan_atomics_helper+0x126c/0x4858 [ 18.211983] kasan_atomics+0x198/0x2e0 [ 18.212036] kunit_try_run_case+0x170/0x3f0 [ 18.212085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.212140] kthread+0x328/0x630 [ 18.212184] ret_from_fork+0x10/0x20 [ 18.212238] [ 18.212259] Allocated by task 268: [ 18.212298] kasan_save_stack+0x3c/0x68 [ 18.212353] kasan_save_track+0x20/0x40 [ 18.212392] kasan_save_alloc_info+0x40/0x58 [ 18.212432] __kasan_kmalloc+0xd4/0xd8 [ 18.212469] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.212507] kasan_atomics+0xb8/0x2e0 [ 18.212544] kunit_try_run_case+0x170/0x3f0 [ 18.212591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.212639] kthread+0x328/0x630 [ 18.212677] ret_from_fork+0x10/0x20 [ 18.212716] [ 18.212738] The buggy address belongs to the object at fff00000c77e9a80 [ 18.212738] which belongs to the cache kmalloc-64 of size 64 [ 18.212796] The buggy address is located 0 bytes to the right of [ 18.212796] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.212861] [ 18.212893] The buggy address belongs to the physical page: [ 18.212926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.212988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.213035] page_type: f5(slab) [ 18.213074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.213127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.213170] page dumped because: kasan: bad access detected [ 18.213203] [ 18.213225] Memory state around the buggy address: [ 18.213723] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.213785] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.213849] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.213896] ^ [ 18.213942] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.214005] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.214061] ================================================================== [ 18.218141] ================================================================== [ 18.218339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.218392] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.218561] [ 18.218854] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.219063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.219111] Hardware name: linux,dummy-virt (DT) [ 18.219174] Call trace: [ 18.219223] show_stack+0x20/0x38 (C) [ 18.219300] dump_stack_lvl+0x8c/0xd0 [ 18.219378] print_report+0x118/0x608 [ 18.219445] kasan_report+0xdc/0x128 [ 18.219508] kasan_check_range+0x100/0x1a8 [ 18.219801] __kasan_check_write+0x20/0x30 [ 18.219892] kasan_atomics_helper+0x1384/0x4858 [ 18.219969] kasan_atomics+0x198/0x2e0 [ 18.220037] kunit_try_run_case+0x170/0x3f0 [ 18.220147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.220234] kthread+0x328/0x630 [ 18.220297] ret_from_fork+0x10/0x20 [ 18.220381] [ 18.220441] Allocated by task 268: [ 18.220483] kasan_save_stack+0x3c/0x68 [ 18.220523] kasan_save_track+0x20/0x40 [ 18.220711] kasan_save_alloc_info+0x40/0x58 [ 18.220753] __kasan_kmalloc+0xd4/0xd8 [ 18.221809] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.221857] kasan_atomics+0xb8/0x2e0 [ 18.221933] kunit_try_run_case+0x170/0x3f0 [ 18.222011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.222082] kthread+0x328/0x630 [ 18.222145] ret_from_fork+0x10/0x20 [ 18.222230] [ 18.222290] The buggy address belongs to the object at fff00000c77e9a80 [ 18.222290] which belongs to the cache kmalloc-64 of size 64 [ 18.222364] The buggy address is located 0 bytes to the right of [ 18.222364] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.222434] [ 18.222457] The buggy address belongs to the physical page: [ 18.222489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.222541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.222589] page_type: f5(slab) [ 18.222628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.222680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.222841] page dumped because: kasan: bad access detected [ 18.222888] [ 18.222926] Memory state around the buggy address: [ 18.222990] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.223058] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.223158] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.223248] ^ [ 18.223489] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.223544] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.223597] ================================================================== [ 18.084104] ================================================================== [ 18.084435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 18.084602] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.084665] [ 18.084698] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.084974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.085005] Hardware name: linux,dummy-virt (DT) [ 18.085150] Call trace: [ 18.085191] show_stack+0x20/0x38 (C) [ 18.085361] dump_stack_lvl+0x8c/0xd0 [ 18.085417] print_report+0x118/0x608 [ 18.085466] kasan_report+0xdc/0x128 [ 18.085780] __asan_report_load4_noabort+0x20/0x30 [ 18.085971] kasan_atomics_helper+0x3dd8/0x4858 [ 18.086153] kasan_atomics+0x198/0x2e0 [ 18.086269] kunit_try_run_case+0x170/0x3f0 [ 18.086459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.086554] kthread+0x328/0x630 [ 18.086707] ret_from_fork+0x10/0x20 [ 18.086761] [ 18.086781] Allocated by task 268: [ 18.087028] kasan_save_stack+0x3c/0x68 [ 18.087199] kasan_save_track+0x20/0x40 [ 18.087277] kasan_save_alloc_info+0x40/0x58 [ 18.087472] __kasan_kmalloc+0xd4/0xd8 [ 18.087520] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.087561] kasan_atomics+0xb8/0x2e0 [ 18.087744] kunit_try_run_case+0x170/0x3f0 [ 18.088333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.088476] kthread+0x328/0x630 [ 18.090057] ret_from_fork+0x10/0x20 [ 18.090179] [ 18.090221] The buggy address belongs to the object at fff00000c77e9a80 [ 18.090221] which belongs to the cache kmalloc-64 of size 64 [ 18.090783] The buggy address is located 0 bytes to the right of [ 18.090783] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.090915] [ 18.090957] The buggy address belongs to the physical page: [ 18.091155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.091522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.091747] page_type: f5(slab) [ 18.091794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.091848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.092242] page dumped because: kasan: bad access detected [ 18.092563] [ 18.092627] Memory state around the buggy address: [ 18.092694] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.092739] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.093210] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.093280] ^ [ 18.093328] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.093383] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.093437] ================================================================== [ 18.294576] ================================================================== [ 18.294665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.294727] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.294780] [ 18.294813] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.295237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.295442] Hardware name: linux,dummy-virt (DT) [ 18.295485] Call trace: [ 18.295596] show_stack+0x20/0x38 (C) [ 18.295650] dump_stack_lvl+0x8c/0xd0 [ 18.295753] print_report+0x118/0x608 [ 18.295820] kasan_report+0xdc/0x128 [ 18.295875] __asan_report_load8_noabort+0x20/0x30 [ 18.296111] kasan_atomics_helper+0x3e20/0x4858 [ 18.296256] kasan_atomics+0x198/0x2e0 [ 18.296312] kunit_try_run_case+0x170/0x3f0 [ 18.296609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.296698] kthread+0x328/0x630 [ 18.296768] ret_from_fork+0x10/0x20 [ 18.296827] [ 18.296931] Allocated by task 268: [ 18.297005] kasan_save_stack+0x3c/0x68 [ 18.297049] kasan_save_track+0x20/0x40 [ 18.297093] kasan_save_alloc_info+0x40/0x58 [ 18.297211] __kasan_kmalloc+0xd4/0xd8 [ 18.297251] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.297291] kasan_atomics+0xb8/0x2e0 [ 18.297344] kunit_try_run_case+0x170/0x3f0 [ 18.297404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.297701] kthread+0x328/0x630 [ 18.297789] ret_from_fork+0x10/0x20 [ 18.297838] [ 18.298128] The buggy address belongs to the object at fff00000c77e9a80 [ 18.298128] which belongs to the cache kmalloc-64 of size 64 [ 18.298241] The buggy address is located 0 bytes to the right of [ 18.298241] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.298717] [ 18.298757] The buggy address belongs to the physical page: [ 18.298819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.298878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.299264] page_type: f5(slab) [ 18.299361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.299444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.299693] page dumped because: kasan: bad access detected [ 18.299822] [ 18.299857] Memory state around the buggy address: [ 18.299892] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.300174] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.300272] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.300553] ^ [ 18.300627] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.300764] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.300839] ================================================================== [ 18.158129] ================================================================== [ 18.158455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 18.158532] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.158644] [ 18.158722] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.158923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.159238] Hardware name: linux,dummy-virt (DT) [ 18.159329] Call trace: [ 18.159389] show_stack+0x20/0x38 (C) [ 18.159465] dump_stack_lvl+0x8c/0xd0 [ 18.159909] print_report+0x118/0x608 [ 18.160010] kasan_report+0xdc/0x128 [ 18.160374] kasan_check_range+0x100/0x1a8 [ 18.160536] __kasan_check_write+0x20/0x30 [ 18.160613] kasan_atomics_helper+0xf88/0x4858 [ 18.160999] kasan_atomics+0x198/0x2e0 [ 18.161130] kunit_try_run_case+0x170/0x3f0 [ 18.161279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.161409] kthread+0x328/0x630 [ 18.161463] ret_from_fork+0x10/0x20 [ 18.161682] [ 18.161908] Allocated by task 268: [ 18.161972] kasan_save_stack+0x3c/0x68 [ 18.162026] kasan_save_track+0x20/0x40 [ 18.162085] kasan_save_alloc_info+0x40/0x58 [ 18.162124] __kasan_kmalloc+0xd4/0xd8 [ 18.162317] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.162460] kasan_atomics+0xb8/0x2e0 [ 18.162507] kunit_try_run_case+0x170/0x3f0 [ 18.162982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.163075] kthread+0x328/0x630 [ 18.163119] ret_from_fork+0x10/0x20 [ 18.163249] [ 18.163445] The buggy address belongs to the object at fff00000c77e9a80 [ 18.163445] which belongs to the cache kmalloc-64 of size 64 [ 18.163670] The buggy address is located 0 bytes to the right of [ 18.163670] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.164003] [ 18.164129] The buggy address belongs to the physical page: [ 18.164166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.164241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.164448] page_type: f5(slab) [ 18.164600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.164832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.165036] page dumped because: kasan: bad access detected [ 18.165233] [ 18.165392] Memory state around the buggy address: [ 18.165457] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.165573] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.165647] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.165982] ^ [ 18.166173] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.166521] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.166684] ================================================================== [ 18.236718] ================================================================== [ 18.236767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.236922] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.237005] [ 18.237069] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.237156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.237184] Hardware name: linux,dummy-virt (DT) [ 18.237217] Call trace: [ 18.237256] show_stack+0x20/0x38 (C) [ 18.237323] dump_stack_lvl+0x8c/0xd0 [ 18.237373] print_report+0x118/0x608 [ 18.237418] kasan_report+0xdc/0x128 [ 18.237513] kasan_check_range+0x100/0x1a8 [ 18.237590] __kasan_check_write+0x20/0x30 [ 18.237749] kasan_atomics_helper+0x14e4/0x4858 [ 18.237826] kasan_atomics+0x198/0x2e0 [ 18.237887] kunit_try_run_case+0x170/0x3f0 [ 18.237938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.238088] kthread+0x328/0x630 [ 18.238157] ret_from_fork+0x10/0x20 [ 18.238363] [ 18.238412] Allocated by task 268: [ 18.238524] kasan_save_stack+0x3c/0x68 [ 18.238637] kasan_save_track+0x20/0x40 [ 18.238690] kasan_save_alloc_info+0x40/0x58 [ 18.238740] __kasan_kmalloc+0xd4/0xd8 [ 18.238776] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.238830] kasan_atomics+0xb8/0x2e0 [ 18.238866] kunit_try_run_case+0x170/0x3f0 [ 18.238909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.238975] kthread+0x328/0x630 [ 18.239012] ret_from_fork+0x10/0x20 [ 18.239050] [ 18.239072] The buggy address belongs to the object at fff00000c77e9a80 [ 18.239072] which belongs to the cache kmalloc-64 of size 64 [ 18.239422] The buggy address is located 0 bytes to the right of [ 18.239422] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.239516] [ 18.239574] The buggy address belongs to the physical page: [ 18.239633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.239711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.239777] page_type: f5(slab) [ 18.239863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.239928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.239985] page dumped because: kasan: bad access detected [ 18.240018] [ 18.240039] Memory state around the buggy address: [ 18.240163] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.240284] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.240386] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.240452] ^ [ 18.240494] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.240536] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.240576] ================================================================== [ 18.182375] ================================================================== [ 18.182642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.182745] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.182983] [ 18.183073] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.183354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.183507] Hardware name: linux,dummy-virt (DT) [ 18.183585] Call trace: [ 18.183639] show_stack+0x20/0x38 (C) [ 18.183935] dump_stack_lvl+0x8c/0xd0 [ 18.184036] print_report+0x118/0x608 [ 18.184186] kasan_report+0xdc/0x128 [ 18.184305] kasan_check_range+0x100/0x1a8 [ 18.184364] __kasan_check_write+0x20/0x30 [ 18.184845] kasan_atomics_helper+0x10c0/0x4858 [ 18.185101] kasan_atomics+0x198/0x2e0 [ 18.185320] kunit_try_run_case+0x170/0x3f0 [ 18.185499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.185576] kthread+0x328/0x630 [ 18.185890] ret_from_fork+0x10/0x20 [ 18.186061] [ 18.186177] Allocated by task 268: [ 18.186304] kasan_save_stack+0x3c/0x68 [ 18.186369] kasan_save_track+0x20/0x40 [ 18.186427] kasan_save_alloc_info+0x40/0x58 [ 18.186469] __kasan_kmalloc+0xd4/0xd8 [ 18.186505] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.186555] kasan_atomics+0xb8/0x2e0 [ 18.186590] kunit_try_run_case+0x170/0x3f0 [ 18.186659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.186706] kthread+0x328/0x630 [ 18.187138] ret_from_fork+0x10/0x20 [ 18.187349] [ 18.187403] The buggy address belongs to the object at fff00000c77e9a80 [ 18.187403] which belongs to the cache kmalloc-64 of size 64 [ 18.187580] The buggy address is located 0 bytes to the right of [ 18.187580] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.187659] [ 18.187682] The buggy address belongs to the physical page: [ 18.187715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.188075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.188392] page_type: f5(slab) [ 18.188536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.188626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.188671] page dumped because: kasan: bad access detected [ 18.188966] [ 18.189013] Memory state around the buggy address: [ 18.189210] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.189284] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.189466] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.189528] ^ [ 18.189816] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.189961] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.190336] ================================================================== [ 18.301621] ================================================================== [ 18.301750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.301804] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.301936] [ 18.301991] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.302209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.302380] Hardware name: linux,dummy-virt (DT) [ 18.302479] Call trace: [ 18.302538] show_stack+0x20/0x38 (C) [ 18.302683] dump_stack_lvl+0x8c/0xd0 [ 18.302771] print_report+0x118/0x608 [ 18.302818] kasan_report+0xdc/0x128 [ 18.302891] kasan_check_range+0x100/0x1a8 [ 18.302941] __kasan_check_write+0x20/0x30 [ 18.303000] kasan_atomics_helper+0x17ec/0x4858 [ 18.303048] kasan_atomics+0x198/0x2e0 [ 18.303109] kunit_try_run_case+0x170/0x3f0 [ 18.303158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.303228] kthread+0x328/0x630 [ 18.303287] ret_from_fork+0x10/0x20 [ 18.303335] [ 18.303356] Allocated by task 268: [ 18.303395] kasan_save_stack+0x3c/0x68 [ 18.303437] kasan_save_track+0x20/0x40 [ 18.303474] kasan_save_alloc_info+0x40/0x58 [ 18.303532] __kasan_kmalloc+0xd4/0xd8 [ 18.303568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.303608] kasan_atomics+0xb8/0x2e0 [ 18.303643] kunit_try_run_case+0x170/0x3f0 [ 18.303692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.303739] kthread+0x328/0x630 [ 18.303775] ret_from_fork+0x10/0x20 [ 18.303823] [ 18.303846] The buggy address belongs to the object at fff00000c77e9a80 [ 18.303846] which belongs to the cache kmalloc-64 of size 64 [ 18.303918] The buggy address is located 0 bytes to the right of [ 18.303918] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.305061] [ 18.305114] The buggy address belongs to the physical page: [ 18.305156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.306112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.306179] page_type: f5(slab) [ 18.306606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.306663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.306706] page dumped because: kasan: bad access detected [ 18.306742] [ 18.307755] Memory state around the buggy address: [ 18.308140] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.308217] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.308264] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.308580] ^ [ 18.308980] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.309066] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.309230] ================================================================== [ 18.139104] ================================================================== [ 18.139167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 18.139231] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.139283] [ 18.139318] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.139412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.139452] Hardware name: linux,dummy-virt (DT) [ 18.139501] Call trace: [ 18.139535] show_stack+0x20/0x38 (C) [ 18.139583] dump_stack_lvl+0x8c/0xd0 [ 18.139633] print_report+0x118/0x608 [ 18.139680] kasan_report+0xdc/0x128 [ 18.139734] kasan_check_range+0x100/0x1a8 [ 18.139781] __kasan_check_write+0x20/0x30 [ 18.139829] kasan_atomics_helper+0xeb8/0x4858 [ 18.139876] kasan_atomics+0x198/0x2e0 [ 18.139919] kunit_try_run_case+0x170/0x3f0 [ 18.139981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.140036] kthread+0x328/0x630 [ 18.140080] ret_from_fork+0x10/0x20 [ 18.140786] [ 18.140834] Allocated by task 268: [ 18.140869] kasan_save_stack+0x3c/0x68 [ 18.140914] kasan_save_track+0x20/0x40 [ 18.140972] kasan_save_alloc_info+0x40/0x58 [ 18.141014] __kasan_kmalloc+0xd4/0xd8 [ 18.141049] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.141268] kasan_atomics+0xb8/0x2e0 [ 18.141320] kunit_try_run_case+0x170/0x3f0 [ 18.141472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.141582] kthread+0x328/0x630 [ 18.141625] ret_from_fork+0x10/0x20 [ 18.141999] [ 18.142041] The buggy address belongs to the object at fff00000c77e9a80 [ 18.142041] which belongs to the cache kmalloc-64 of size 64 [ 18.142103] The buggy address is located 0 bytes to the right of [ 18.142103] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.142588] [ 18.142638] The buggy address belongs to the physical page: [ 18.143136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.143204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.143479] page_type: f5(slab) [ 18.143550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.143710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.143767] page dumped because: kasan: bad access detected [ 18.144019] [ 18.144282] Memory state around the buggy address: [ 18.144351] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.144420] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.144697] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.144945] ^ [ 18.145016] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.145070] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.145444] ================================================================== [ 18.265269] ================================================================== [ 18.265649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.265716] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.265769] [ 18.265884] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.266006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.266241] Hardware name: linux,dummy-virt (DT) [ 18.266414] Call trace: [ 18.266735] show_stack+0x20/0x38 (C) [ 18.266885] dump_stack_lvl+0x8c/0xd0 [ 18.267054] print_report+0x118/0x608 [ 18.267129] kasan_report+0xdc/0x128 [ 18.267255] __asan_report_load8_noabort+0x20/0x30 [ 18.267328] kasan_atomics_helper+0x3df4/0x4858 [ 18.267376] kasan_atomics+0x198/0x2e0 [ 18.267429] kunit_try_run_case+0x170/0x3f0 [ 18.267478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.267859] kthread+0x328/0x630 [ 18.268241] ret_from_fork+0x10/0x20 [ 18.268398] [ 18.268456] Allocated by task 268: [ 18.268538] kasan_save_stack+0x3c/0x68 [ 18.268976] kasan_save_track+0x20/0x40 [ 18.269093] kasan_save_alloc_info+0x40/0x58 [ 18.269363] __kasan_kmalloc+0xd4/0xd8 [ 18.269584] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.269668] kasan_atomics+0xb8/0x2e0 [ 18.269740] kunit_try_run_case+0x170/0x3f0 [ 18.269871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.269925] kthread+0x328/0x630 [ 18.270148] ret_from_fork+0x10/0x20 [ 18.270207] [ 18.270352] The buggy address belongs to the object at fff00000c77e9a80 [ 18.270352] which belongs to the cache kmalloc-64 of size 64 [ 18.270581] The buggy address is located 0 bytes to the right of [ 18.270581] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.270802] [ 18.270943] The buggy address belongs to the physical page: [ 18.271009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.271154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.271241] page_type: f5(slab) [ 18.271309] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.271447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.271523] page dumped because: kasan: bad access detected [ 18.271558] [ 18.271586] Memory state around the buggy address: [ 18.271925] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.272002] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.272152] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.272229] ^ [ 18.272557] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.272618] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.272657] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 17.736839] ================================================================== [ 17.736919] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 17.737012] Read of size 1 at addr ffff800080a07c2a by task kunit_try_catch/252 [ 17.737068] [ 17.737101] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.737422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.737464] Hardware name: linux,dummy-virt (DT) [ 17.737623] Call trace: [ 17.737649] show_stack+0x20/0x38 (C) [ 17.737722] dump_stack_lvl+0x8c/0xd0 [ 17.737773] print_report+0x310/0x608 [ 17.737820] kasan_report+0xdc/0x128 [ 17.737865] __asan_report_load1_noabort+0x20/0x30 [ 17.737916] kasan_stack_oob+0x238/0x270 [ 17.738026] kunit_try_run_case+0x170/0x3f0 [ 17.738080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.738134] kthread+0x328/0x630 [ 17.738305] ret_from_fork+0x10/0x20 [ 17.738361] [ 17.738424] The buggy address belongs to stack of task kunit_try_catch/252 [ 17.738531] and is located at offset 138 in frame: [ 17.738674] kasan_stack_oob+0x0/0x270 [ 17.739070] [ 17.739106] This frame has 4 objects: [ 17.739235] [48, 49) '__assertion' [ 17.739458] [64, 72) 'array' [ 17.740815] ffff800080a07b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.746100] dump_stack_lvl+0x8c/0xd0 [ 17.747545] [ 17.748454] ffff800080a07a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.754455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.755976] [ 17.756040] The buggy address belongs to the physical page: [ 17.772576] page dumped because: kasan: bad access detected [ 17.773425] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 17.721078] ================================================================== [ 17.721139] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 17.721192] Read of size 1 at addr ffffa3b0e8e035ad by task kunit_try_catch/248 [ 17.721280] [ 17.721317] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.721396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.721423] Hardware name: linux,dummy-virt (DT) [ 17.721453] Call trace: [ 17.721473] show_stack+0x20/0x38 (C) [ 17.721619] dump_stack_lvl+0x8c/0xd0 [ 17.721775] print_report+0x310/0x608 [ 17.721840] kasan_report+0xdc/0x128 [ 17.721893] __asan_report_load1_noabort+0x20/0x30 [ 17.722140] kasan_global_oob_right+0x230/0x270 [ 17.722548] kunit_try_run_case+0x170/0x3f0 [ 17.722607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.722660] kthread+0x328/0x630 [ 17.722705] ret_from_fork+0x10/0x20 [ 17.722763] [ 17.722816] The buggy address belongs to the variable: [ 17.723201] global_array+0xd/0x40 [ 17.723321] [ 17.723448] The buggy address belongs to the virtual mapping at [ 17.723448] [ffffa3b0e7020000, ffffa3b0e8ec1000) created by: [ 17.723448] paging_init+0x66c/0x7d0 [ 17.723555] [ 17.723723] The buggy address belongs to the physical page: [ 17.723759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c03 [ 17.723812] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 17.723887] raw: 03fffe0000002000 ffffc1ffc01f00c8 ffffc1ffc01f00c8 0000000000000000 [ 17.723966] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 17.724008] page dumped because: kasan: bad access detected [ 17.724040] [ 17.724085] Memory state around the buggy address: [ 17.724140] ffffa3b0e8e03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.724190] ffffa3b0e8e03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 17.724233] >ffffa3b0e8e03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 17.724270] ^ [ 17.724301] ffffa3b0e8e03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 17.724343] ffffa3b0e8e03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.724382] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 17.702267] ================================================================== [ 17.702348] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 17.702498] Free of addr fff00000c77fa501 by task kunit_try_catch/244 [ 17.702663] [ 17.702711] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.702793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.702845] Hardware name: linux,dummy-virt (DT) [ 17.702876] Call trace: [ 17.702899] show_stack+0x20/0x38 (C) [ 17.703116] dump_stack_lvl+0x8c/0xd0 [ 17.703191] print_report+0x118/0x608 [ 17.703296] kasan_report_invalid_free+0xc0/0xe8 [ 17.703384] check_slab_allocation+0xfc/0x108 [ 17.703450] __kasan_mempool_poison_object+0x78/0x150 [ 17.703522] mempool_free+0x28c/0x328 [ 17.703578] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 17.703775] mempool_kmalloc_invalid_free+0xc0/0x118 [ 17.703979] kunit_try_run_case+0x170/0x3f0 [ 17.704179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.704372] kthread+0x328/0x630 [ 17.704447] ret_from_fork+0x10/0x20 [ 17.704558] [ 17.704598] Allocated by task 244: [ 17.704655] kasan_save_stack+0x3c/0x68 [ 17.704734] kasan_save_track+0x20/0x40 [ 17.704814] kasan_save_alloc_info+0x40/0x58 [ 17.704890] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.704931] remove_element+0x130/0x1f8 [ 17.705195] mempool_alloc_preallocated+0x58/0xc0 [ 17.705312] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 17.705390] mempool_kmalloc_invalid_free+0xc0/0x118 [ 17.705446] kunit_try_run_case+0x170/0x3f0 [ 17.705523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.705579] kthread+0x328/0x630 [ 17.705627] ret_from_fork+0x10/0x20 [ 17.705735] [ 17.705783] The buggy address belongs to the object at fff00000c77fa500 [ 17.705783] which belongs to the cache kmalloc-128 of size 128 [ 17.705872] The buggy address is located 1 bytes inside of [ 17.705872] 128-byte region [fff00000c77fa500, fff00000c77fa580) [ 17.705977] [ 17.706004] The buggy address belongs to the physical page: [ 17.706043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 17.706230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.706281] page_type: f5(slab) [ 17.706548] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.706624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.706679] page dumped because: kasan: bad access detected [ 17.706734] [ 17.706765] Memory state around the buggy address: [ 17.706833] fff00000c77fa400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.706941] fff00000c77fa480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.707038] >fff00000c77fa500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.707093] ^ [ 17.707164] fff00000c77fa580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.707673] fff00000c77fa600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.707715] ================================================================== [ 17.712819] ================================================================== [ 17.712873] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 17.712928] Free of addr fff00000c7924001 by task kunit_try_catch/246 [ 17.712987] [ 17.713017] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.713111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.713138] Hardware name: linux,dummy-virt (DT) [ 17.713257] Call trace: [ 17.713303] show_stack+0x20/0x38 (C) [ 17.713355] dump_stack_lvl+0x8c/0xd0 [ 17.713432] print_report+0x118/0x608 [ 17.713485] kasan_report_invalid_free+0xc0/0xe8 [ 17.713542] __kasan_mempool_poison_object+0xfc/0x150 [ 17.713608] mempool_free+0x28c/0x328 [ 17.713663] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 17.713716] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 17.713914] kunit_try_run_case+0x170/0x3f0 [ 17.713976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.714037] kthread+0x328/0x630 [ 17.714083] ret_from_fork+0x10/0x20 [ 17.714129] [ 17.714279] The buggy address belongs to the physical page: [ 17.714340] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107924 [ 17.714436] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.714519] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.714599] page_type: f8(unknown) [ 17.714655] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.714728] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.714825] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.714874] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.714935] head: 0bfffe0000000002 ffffc1ffc31e4901 00000000ffffffff 00000000ffffffff [ 17.714992] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.715032] page dumped because: kasan: bad access detected [ 17.715063] [ 17.715080] Memory state around the buggy address: [ 17.715111] fff00000c7923f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.715178] fff00000c7923f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.715220] >fff00000c7924000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.715266] ^ [ 17.715294] fff00000c7924080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.715335] fff00000c7924100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.715373] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 17.665013] ================================================================== [ 17.665094] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 17.665156] Free of addr fff00000c77fa100 by task kunit_try_catch/238 [ 17.665198] [ 17.666270] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.666396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.668486] Hardware name: linux,dummy-virt (DT) [ 17.668538] Call trace: [ 17.668560] show_stack+0x20/0x38 (C) [ 17.668612] dump_stack_lvl+0x8c/0xd0 [ 17.668661] print_report+0x118/0x608 [ 17.668706] kasan_report_invalid_free+0xc0/0xe8 [ 17.668754] check_slab_allocation+0xd4/0x108 [ 17.668801] __kasan_mempool_poison_object+0x78/0x150 [ 17.668851] mempool_free+0x28c/0x328 [ 17.668897] mempool_double_free_helper+0x150/0x2e8 [ 17.668962] mempool_kmalloc_double_free+0xc0/0x118 [ 17.669013] kunit_try_run_case+0x170/0x3f0 [ 17.669061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.669114] kthread+0x328/0x630 [ 17.669158] ret_from_fork+0x10/0x20 [ 17.669206] [ 17.669223] Allocated by task 238: [ 17.669256] kasan_save_stack+0x3c/0x68 [ 17.669294] kasan_save_track+0x20/0x40 [ 17.669330] kasan_save_alloc_info+0x40/0x58 [ 17.669367] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.669407] remove_element+0x130/0x1f8 [ 17.669443] mempool_alloc_preallocated+0x58/0xc0 [ 17.669483] mempool_double_free_helper+0x94/0x2e8 [ 17.669523] mempool_kmalloc_double_free+0xc0/0x118 [ 17.669564] kunit_try_run_case+0x170/0x3f0 [ 17.669600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.669643] kthread+0x328/0x630 [ 17.669678] ret_from_fork+0x10/0x20 [ 17.669996] [ 17.670052] Freed by task 238: [ 17.670291] kasan_save_stack+0x3c/0x68 [ 17.670387] kasan_save_track+0x20/0x40 [ 17.670465] kasan_save_free_info+0x4c/0x78 [ 17.670504] __kasan_mempool_poison_object+0xc0/0x150 [ 17.670544] mempool_free+0x28c/0x328 [ 17.670579] mempool_double_free_helper+0x100/0x2e8 [ 17.670619] mempool_kmalloc_double_free+0xc0/0x118 [ 17.670661] kunit_try_run_case+0x170/0x3f0 [ 17.670697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.670742] kthread+0x328/0x630 [ 17.670776] ret_from_fork+0x10/0x20 [ 17.670811] [ 17.670829] The buggy address belongs to the object at fff00000c77fa100 [ 17.670829] which belongs to the cache kmalloc-128 of size 128 [ 17.670889] The buggy address is located 0 bytes inside of [ 17.670889] 128-byte region [fff00000c77fa100, fff00000c77fa180) [ 17.670956] [ 17.670976] The buggy address belongs to the physical page: [ 17.671007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 17.671060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.671106] page_type: f5(slab) [ 17.671145] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.671194] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.671234] page dumped because: kasan: bad access detected [ 17.671263] [ 17.671281] Memory state around the buggy address: [ 17.671312] fff00000c77fa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.671426] fff00000c77fa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.671489] >fff00000c77fa100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.671527] ^ [ 17.671558] fff00000c77fa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.671601] fff00000c77fa200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.671638] ================================================================== [ 17.693081] ================================================================== [ 17.693256] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 17.693412] Free of addr fff00000c7924000 by task kunit_try_catch/242 [ 17.693462] [ 17.693494] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.693595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.693759] Hardware name: linux,dummy-virt (DT) [ 17.693806] Call trace: [ 17.693834] show_stack+0x20/0x38 (C) [ 17.693892] dump_stack_lvl+0x8c/0xd0 [ 17.693966] print_report+0x118/0x608 [ 17.694011] kasan_report_invalid_free+0xc0/0xe8 [ 17.694069] __kasan_mempool_poison_pages+0xe0/0xe8 [ 17.694125] mempool_free+0x24c/0x328 [ 17.694282] mempool_double_free_helper+0x150/0x2e8 [ 17.694368] mempool_page_alloc_double_free+0xbc/0x118 [ 17.694457] kunit_try_run_case+0x170/0x3f0 [ 17.694546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.694622] kthread+0x328/0x630 [ 17.694702] ret_from_fork+0x10/0x20 [ 17.694747] [ 17.694767] The buggy address belongs to the physical page: [ 17.694818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107924 [ 17.694872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.694931] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 17.694991] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 17.695250] page dumped because: kasan: bad access detected [ 17.695329] [ 17.695393] Memory state around the buggy address: [ 17.695450] fff00000c7923f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.695549] fff00000c7923f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.695607] >fff00000c7924000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.695646] ^ [ 17.695674] fff00000c7924080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.695856] fff00000c7924100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.696027] ================================================================== [ 17.682502] ================================================================== [ 17.682566] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 17.683775] Free of addr fff00000c7924000 by task kunit_try_catch/240 [ 17.683841] [ 17.683877] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.683976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.684004] Hardware name: linux,dummy-virt (DT) [ 17.684038] Call trace: [ 17.684061] show_stack+0x20/0x38 (C) [ 17.684111] dump_stack_lvl+0x8c/0xd0 [ 17.684158] print_report+0x118/0x608 [ 17.684210] kasan_report_invalid_free+0xc0/0xe8 [ 17.684258] __kasan_mempool_poison_object+0x14c/0x150 [ 17.684309] mempool_free+0x28c/0x328 [ 17.684359] mempool_double_free_helper+0x150/0x2e8 [ 17.684409] mempool_kmalloc_large_double_free+0xc0/0x118 [ 17.684820] kunit_try_run_case+0x170/0x3f0 [ 17.684894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.684988] kthread+0x328/0x630 [ 17.685034] ret_from_fork+0x10/0x20 [ 17.685110] [ 17.685131] The buggy address belongs to the physical page: [ 17.685164] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107924 [ 17.685219] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.685594] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.685696] page_type: f8(unknown) [ 17.685752] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.685837] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.685988] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.686063] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.686190] head: 0bfffe0000000002 ffffc1ffc31e4901 00000000ffffffff 00000000ffffffff [ 17.686258] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.686343] page dumped because: kasan: bad access detected [ 17.686444] [ 17.686491] Memory state around the buggy address: [ 17.686524] fff00000c7923f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.686589] fff00000c7923f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.686633] >fff00000c7924000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.686671] ^ [ 17.686698] fff00000c7924080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.686739] fff00000c7924100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.686777] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 17.647701] ================================================================== [ 17.647765] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 17.647829] Read of size 1 at addr fff00000c7920000 by task kunit_try_catch/236 [ 17.647877] [ 17.647914] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.648015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.648040] Hardware name: linux,dummy-virt (DT) [ 17.648072] Call trace: [ 17.648095] show_stack+0x20/0x38 (C) [ 17.648144] dump_stack_lvl+0x8c/0xd0 [ 17.648193] print_report+0x118/0x608 [ 17.648236] kasan_report+0xdc/0x128 [ 17.648319] __asan_report_load1_noabort+0x20/0x30 [ 17.648368] mempool_uaf_helper+0x314/0x340 [ 17.648416] mempool_page_alloc_uaf+0xc0/0x118 [ 17.648461] kunit_try_run_case+0x170/0x3f0 [ 17.648509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.648561] kthread+0x328/0x630 [ 17.648605] ret_from_fork+0x10/0x20 [ 17.648652] [ 17.648693] The buggy address belongs to the physical page: [ 17.648752] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107920 [ 17.648807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.648873] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 17.648921] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 17.648972] page dumped because: kasan: bad access detected [ 17.649004] [ 17.649021] Memory state around the buggy address: [ 17.649054] fff00000c791ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.649095] fff00000c791ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.649137] >fff00000c7920000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.649174] ^ [ 17.649201] fff00000c7920080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.649240] fff00000c7920100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.649276] ================================================================== [ 17.584351] ================================================================== [ 17.584439] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 17.584891] Read of size 1 at addr fff00000c791c000 by task kunit_try_catch/232 [ 17.585307] [ 17.585429] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.585516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.585543] Hardware name: linux,dummy-virt (DT) [ 17.586004] Call trace: [ 17.586032] show_stack+0x20/0x38 (C) [ 17.586086] dump_stack_lvl+0x8c/0xd0 [ 17.586597] print_report+0x118/0x608 [ 17.586665] kasan_report+0xdc/0x128 [ 17.586709] __asan_report_load1_noabort+0x20/0x30 [ 17.586883] mempool_uaf_helper+0x314/0x340 [ 17.586938] mempool_kmalloc_large_uaf+0xc4/0x120 [ 17.586998] kunit_try_run_case+0x170/0x3f0 [ 17.587254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.587353] kthread+0x328/0x630 [ 17.587414] ret_from_fork+0x10/0x20 [ 17.587472] [ 17.587608] The buggy address belongs to the physical page: [ 17.587672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791c [ 17.587764] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.587833] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.588321] page_type: f8(unknown) [ 17.588683] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.589496] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.589651] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.589701] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.589749] head: 0bfffe0000000002 ffffc1ffc31e4701 00000000ffffffff 00000000ffffffff [ 17.589796] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.590356] page dumped because: kasan: bad access detected [ 17.590403] [ 17.590432] Memory state around the buggy address: [ 17.590542] fff00000c791bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.590935] fff00000c791bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.591118] >fff00000c791c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.591222] ^ [ 17.591254] fff00000c791c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.591318] fff00000c791c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.591357] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 17.625118] ================================================================== [ 17.625252] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 17.625416] Read of size 1 at addr fff00000c77fa240 by task kunit_try_catch/234 [ 17.625477] [ 17.625552] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.625645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.625672] Hardware name: linux,dummy-virt (DT) [ 17.625709] Call trace: [ 17.625732] show_stack+0x20/0x38 (C) [ 17.625791] dump_stack_lvl+0x8c/0xd0 [ 17.625841] print_report+0x118/0x608 [ 17.625884] kasan_report+0xdc/0x128 [ 17.625931] __asan_report_load1_noabort+0x20/0x30 [ 17.625998] mempool_uaf_helper+0x314/0x340 [ 17.626059] mempool_slab_uaf+0xc0/0x118 [ 17.626106] kunit_try_run_case+0x170/0x3f0 [ 17.626154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.626206] kthread+0x328/0x630 [ 17.626251] ret_from_fork+0x10/0x20 [ 17.626300] [ 17.626317] Allocated by task 234: [ 17.626347] kasan_save_stack+0x3c/0x68 [ 17.626386] kasan_save_track+0x20/0x40 [ 17.626430] kasan_save_alloc_info+0x40/0x58 [ 17.626466] __kasan_mempool_unpoison_object+0xbc/0x180 [ 17.626507] remove_element+0x16c/0x1f8 [ 17.626546] mempool_alloc_preallocated+0x58/0xc0 [ 17.626587] mempool_uaf_helper+0xa4/0x340 [ 17.626624] mempool_slab_uaf+0xc0/0x118 [ 17.626658] kunit_try_run_case+0x170/0x3f0 [ 17.626700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.626747] kthread+0x328/0x630 [ 17.626782] ret_from_fork+0x10/0x20 [ 17.626815] [ 17.626834] Freed by task 234: [ 17.626858] kasan_save_stack+0x3c/0x68 [ 17.626892] kasan_save_track+0x20/0x40 [ 17.626927] kasan_save_free_info+0x4c/0x78 [ 17.626980] __kasan_mempool_poison_object+0xc0/0x150 [ 17.627019] mempool_free+0x28c/0x328 [ 17.627056] mempool_uaf_helper+0x104/0x340 [ 17.627094] mempool_slab_uaf+0xc0/0x118 [ 17.627128] kunit_try_run_case+0x170/0x3f0 [ 17.627165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.627212] kthread+0x328/0x630 [ 17.627245] ret_from_fork+0x10/0x20 [ 17.627279] [ 17.627299] The buggy address belongs to the object at fff00000c77fa240 [ 17.627299] which belongs to the cache test_cache of size 123 [ 17.627355] The buggy address is located 0 bytes inside of [ 17.627355] freed 123-byte region [fff00000c77fa240, fff00000c77fa2bb) [ 17.627416] [ 17.627436] The buggy address belongs to the physical page: [ 17.627465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 17.627518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.627565] page_type: f5(slab) [ 17.627606] raw: 0bfffe0000000000 fff00000c5d10b40 dead000000000122 0000000000000000 [ 17.627653] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 17.627692] page dumped because: kasan: bad access detected [ 17.627722] [ 17.627739] Memory state around the buggy address: [ 17.627771] fff00000c77fa100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.627813] fff00000c77fa180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.627855] >fff00000c77fa200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 17.627891] ^ [ 17.627924] fff00000c77fa280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.627972] fff00000c77fa300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.628021] ================================================================== [ 17.539965] ================================================================== [ 17.540047] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 17.540115] Read of size 1 at addr fff00000c638ed00 by task kunit_try_catch/230 [ 17.540183] [ 17.540224] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.540553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.540581] Hardware name: linux,dummy-virt (DT) [ 17.540732] Call trace: [ 17.540872] show_stack+0x20/0x38 (C) [ 17.540960] dump_stack_lvl+0x8c/0xd0 [ 17.542218] print_report+0x118/0x608 [ 17.542265] kasan_report+0xdc/0x128 [ 17.542325] __asan_report_load1_noabort+0x20/0x30 [ 17.542380] mempool_uaf_helper+0x314/0x340 [ 17.542435] mempool_kmalloc_uaf+0xc4/0x120 [ 17.542482] kunit_try_run_case+0x170/0x3f0 [ 17.542531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.542584] kthread+0x328/0x630 [ 17.542627] ret_from_fork+0x10/0x20 [ 17.542709] [ 17.542729] Allocated by task 230: [ 17.542770] kasan_save_stack+0x3c/0x68 [ 17.542810] kasan_save_track+0x20/0x40 [ 17.542846] kasan_save_alloc_info+0x40/0x58 [ 17.542908] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.543073] remove_element+0x130/0x1f8 [ 17.543160] mempool_alloc_preallocated+0x58/0xc0 [ 17.543201] mempool_uaf_helper+0xa4/0x340 [ 17.543248] mempool_kmalloc_uaf+0xc4/0x120 [ 17.543288] kunit_try_run_case+0x170/0x3f0 [ 17.543327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.543376] kthread+0x328/0x630 [ 17.543411] ret_from_fork+0x10/0x20 [ 17.543446] [ 17.543469] Freed by task 230: [ 17.543747] kasan_save_stack+0x3c/0x68 [ 17.543826] kasan_save_track+0x20/0x40 [ 17.544074] kasan_save_free_info+0x4c/0x78 [ 17.544120] __kasan_mempool_poison_object+0xc0/0x150 [ 17.544280] mempool_free+0x28c/0x328 [ 17.544335] mempool_uaf_helper+0x104/0x340 [ 17.544661] mempool_kmalloc_uaf+0xc4/0x120 [ 17.544760] kunit_try_run_case+0x170/0x3f0 [ 17.544877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.544934] kthread+0x328/0x630 [ 17.545029] ret_from_fork+0x10/0x20 [ 17.545065] [ 17.545084] The buggy address belongs to the object at fff00000c638ed00 [ 17.545084] which belongs to the cache kmalloc-128 of size 128 [ 17.545440] The buggy address is located 0 bytes inside of [ 17.545440] freed 128-byte region [fff00000c638ed00, fff00000c638ed80) [ 17.545682] [ 17.545707] The buggy address belongs to the physical page: [ 17.545738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e [ 17.545866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.545920] page_type: f5(slab) [ 17.545979] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.546028] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.546087] page dumped because: kasan: bad access detected [ 17.546117] [ 17.546137] Memory state around the buggy address: [ 17.546446] fff00000c638ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.546506] fff00000c638ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.546745] >fff00000c638ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.546788] ^ [ 17.547682] fff00000c638ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.547930] fff00000c638ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.548000] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 17.511004] ================================================================== [ 17.511086] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.511158] Read of size 1 at addr fff00000c78032bb by task kunit_try_catch/228 [ 17.511208] [ 17.511253] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.511347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.511374] Hardware name: linux,dummy-virt (DT) [ 17.511417] Call trace: [ 17.511439] show_stack+0x20/0x38 (C) [ 17.511504] dump_stack_lvl+0x8c/0xd0 [ 17.511556] print_report+0x118/0x608 [ 17.511611] kasan_report+0xdc/0x128 [ 17.512052] __asan_report_load1_noabort+0x20/0x30 [ 17.512115] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.512165] mempool_slab_oob_right+0xc0/0x118 [ 17.512211] kunit_try_run_case+0x170/0x3f0 [ 17.512261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.512313] kthread+0x328/0x630 [ 17.512357] ret_from_fork+0x10/0x20 [ 17.512407] [ 17.512424] Allocated by task 228: [ 17.512454] kasan_save_stack+0x3c/0x68 [ 17.512509] kasan_save_track+0x20/0x40 [ 17.512632] kasan_save_alloc_info+0x40/0x58 [ 17.512671] __kasan_mempool_unpoison_object+0xbc/0x180 [ 17.512719] remove_element+0x16c/0x1f8 [ 17.512870] mempool_alloc_preallocated+0x58/0xc0 [ 17.512938] mempool_oob_right_helper+0x98/0x2f0 [ 17.512998] mempool_slab_oob_right+0xc0/0x118 [ 17.513033] kunit_try_run_case+0x170/0x3f0 [ 17.513078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.513121] kthread+0x328/0x630 [ 17.513155] ret_from_fork+0x10/0x20 [ 17.513496] [ 17.513521] The buggy address belongs to the object at fff00000c7803240 [ 17.513521] which belongs to the cache test_cache of size 123 [ 17.513580] The buggy address is located 0 bytes to the right of [ 17.513580] allocated 123-byte region [fff00000c7803240, fff00000c78032bb) [ 17.513642] [ 17.513663] The buggy address belongs to the physical page: [ 17.513694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107803 [ 17.513746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.513795] page_type: f5(slab) [ 17.514175] raw: 0bfffe0000000000 fff00000c5d10a00 dead000000000122 0000000000000000 [ 17.514234] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 17.514278] page dumped because: kasan: bad access detected [ 17.514309] [ 17.514326] Memory state around the buggy address: [ 17.514359] fff00000c7803180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.514556] fff00000c7803200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 17.514602] >fff00000c7803280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 17.514650] ^ [ 17.514804] fff00000c7803300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.514879] fff00000c7803380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.514927] ================================================================== [ 17.473773] ================================================================== [ 17.473847] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.473924] Read of size 1 at addr fff00000c638e973 by task kunit_try_catch/224 [ 17.473992] [ 17.474036] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.474124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.474159] Hardware name: linux,dummy-virt (DT) [ 17.474583] Call trace: [ 17.474610] show_stack+0x20/0x38 (C) [ 17.474668] dump_stack_lvl+0x8c/0xd0 [ 17.474719] print_report+0x118/0x608 [ 17.474765] kasan_report+0xdc/0x128 [ 17.474808] __asan_report_load1_noabort+0x20/0x30 [ 17.474857] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.474907] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.474973] kunit_try_run_case+0x170/0x3f0 [ 17.475026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.475077] kthread+0x328/0x630 [ 17.475124] ret_from_fork+0x10/0x20 [ 17.475172] [ 17.475191] Allocated by task 224: [ 17.475222] kasan_save_stack+0x3c/0x68 [ 17.475261] kasan_save_track+0x20/0x40 [ 17.475298] kasan_save_alloc_info+0x40/0x58 [ 17.475336] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.475378] remove_element+0x130/0x1f8 [ 17.475418] mempool_alloc_preallocated+0x58/0xc0 [ 17.475459] mempool_oob_right_helper+0x98/0x2f0 [ 17.475499] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.475540] kunit_try_run_case+0x170/0x3f0 [ 17.475580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.475625] kthread+0x328/0x630 [ 17.475659] ret_from_fork+0x10/0x20 [ 17.475694] [ 17.475715] The buggy address belongs to the object at fff00000c638e900 [ 17.475715] which belongs to the cache kmalloc-128 of size 128 [ 17.475772] The buggy address is located 0 bytes to the right of [ 17.475772] allocated 115-byte region [fff00000c638e900, fff00000c638e973) [ 17.475835] [ 17.475857] The buggy address belongs to the physical page: [ 17.475890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e [ 17.475955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.476008] page_type: f5(slab) [ 17.476050] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.476100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.476140] page dumped because: kasan: bad access detected [ 17.476172] [ 17.476191] Memory state around the buggy address: [ 17.476223] fff00000c638e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.476266] fff00000c638e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.476310] >fff00000c638e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.476348] ^ [ 17.476388] fff00000c638e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.476431] fff00000c638ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.476470] ================================================================== [ 17.484139] ================================================================== [ 17.484221] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.484279] Read of size 1 at addr fff00000c791e001 by task kunit_try_catch/226 [ 17.484339] [ 17.484372] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 17.484465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.484492] Hardware name: linux,dummy-virt (DT) [ 17.484523] Call trace: [ 17.484550] show_stack+0x20/0x38 (C) [ 17.484599] dump_stack_lvl+0x8c/0xd0 [ 17.484650] print_report+0x118/0x608 [ 17.484697] kasan_report+0xdc/0x128 [ 17.484738] __asan_report_load1_noabort+0x20/0x30 [ 17.484797] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.484851] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 17.484909] kunit_try_run_case+0x170/0x3f0 [ 17.485396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.485661] kthread+0x328/0x630 [ 17.485731] ret_from_fork+0x10/0x20 [ 17.485922] [ 17.485992] The buggy address belongs to the physical page: [ 17.486063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791c [ 17.486137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.486229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.486291] page_type: f8(unknown) [ 17.486339] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.486395] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.486451] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.486748] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.486907] head: 0bfffe0000000002 ffffc1ffc31e4701 00000000ffffffff 00000000ffffffff [ 17.487204] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.487535] page dumped because: kasan: bad access detected [ 17.487573] [ 17.487767] Memory state around the buggy address: [ 17.487803] fff00000c791df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.488125] fff00000c791df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.488183] >fff00000c791e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.488419] ^ [ 17.488453] fff00000c791e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.488512] fff00000c791e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.488550] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 16.921264] ================================================================== [ 16.921354] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 16.921432] Read of size 1 at addr fff00000c78a73c0 by task kunit_try_catch/218 [ 16.921484] [ 16.921527] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 16.921614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.921642] Hardware name: linux,dummy-virt (DT) [ 16.921676] Call trace: [ 16.921702] show_stack+0x20/0x38 (C) [ 16.921755] dump_stack_lvl+0x8c/0xd0 [ 16.921807] print_report+0x118/0x608 [ 16.921852] kasan_report+0xdc/0x128 [ 16.921896] __kasan_check_byte+0x54/0x70 [ 16.921941] kmem_cache_destroy+0x34/0x218 [ 16.922001] kmem_cache_double_destroy+0x174/0x300 [ 16.922051] kunit_try_run_case+0x170/0x3f0 [ 16.922101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.922183] kthread+0x328/0x630 [ 16.922229] ret_from_fork+0x10/0x20 [ 16.922279] [ 16.922298] Allocated by task 218: [ 16.922329] kasan_save_stack+0x3c/0x68 [ 16.922368] kasan_save_track+0x20/0x40 [ 16.922403] kasan_save_alloc_info+0x40/0x58 [ 16.922445] __kasan_slab_alloc+0xa8/0xb0 [ 16.922482] kmem_cache_alloc_noprof+0x10c/0x398 [ 16.922522] __kmem_cache_create_args+0x178/0x280 [ 16.922558] kmem_cache_double_destroy+0xc0/0x300 [ 16.922599] kunit_try_run_case+0x170/0x3f0 [ 16.922638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.922682] kthread+0x328/0x630 [ 16.922716] ret_from_fork+0x10/0x20 [ 16.922753] [ 16.922771] Freed by task 218: [ 16.922796] kasan_save_stack+0x3c/0x68 [ 16.922831] kasan_save_track+0x20/0x40 [ 16.922865] kasan_save_free_info+0x4c/0x78 [ 16.922903] __kasan_slab_free+0x6c/0x98 [ 16.922937] kmem_cache_free+0x260/0x468 [ 16.922982] slab_kmem_cache_release+0x38/0x50 [ 16.923019] kmem_cache_release+0x1c/0x30 [ 16.923058] kobject_put+0x17c/0x420 [ 16.923095] sysfs_slab_release+0x1c/0x30 [ 16.923129] kmem_cache_destroy+0x118/0x218 [ 16.923165] kmem_cache_double_destroy+0x128/0x300 [ 16.923205] kunit_try_run_case+0x170/0x3f0 [ 16.923244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.923288] kthread+0x328/0x630 [ 16.923322] ret_from_fork+0x10/0x20 [ 16.923357] [ 16.923376] The buggy address belongs to the object at fff00000c78a73c0 [ 16.923376] which belongs to the cache kmem_cache of size 208 [ 16.923432] The buggy address is located 0 bytes inside of [ 16.923432] freed 208-byte region [fff00000c78a73c0, fff00000c78a7490) [ 16.923492] [ 16.923513] The buggy address belongs to the physical page: [ 16.923546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a7 [ 16.923597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.923650] page_type: f5(slab) [ 16.923691] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 16.923740] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 16.923782] page dumped because: kasan: bad access detected [ 16.923814] [ 16.923831] Memory state around the buggy address: [ 16.923866] fff00000c78a7280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.923909] fff00000c78a7300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 16.923963] >fff00000c78a7380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 16.924001] ^ [ 16.924035] fff00000c78a7400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.924078] fff00000c78a7480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.924116] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 16.826736] ================================================================== [ 16.826863] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 16.826978] Read of size 1 at addr fff00000c78ae000 by task kunit_try_catch/216 [ 16.827031] [ 16.827074] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 16.827175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.827203] Hardware name: linux,dummy-virt (DT) [ 16.827236] Call trace: [ 16.827262] show_stack+0x20/0x38 (C) [ 16.827315] dump_stack_lvl+0x8c/0xd0 [ 16.827368] print_report+0x118/0x608 [ 16.827413] kasan_report+0xdc/0x128 [ 16.827456] __asan_report_load1_noabort+0x20/0x30 [ 16.827506] kmem_cache_rcu_uaf+0x388/0x468 [ 16.827553] kunit_try_run_case+0x170/0x3f0 [ 16.827605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.827659] kthread+0x328/0x630 [ 16.827704] ret_from_fork+0x10/0x20 [ 16.827754] [ 16.827773] Allocated by task 216: [ 16.827802] kasan_save_stack+0x3c/0x68 [ 16.827842] kasan_save_track+0x20/0x40 [ 16.827878] kasan_save_alloc_info+0x40/0x58 [ 16.827916] __kasan_slab_alloc+0xa8/0xb0 [ 16.827963] kmem_cache_alloc_noprof+0x10c/0x398 [ 16.828004] kmem_cache_rcu_uaf+0x12c/0x468 [ 16.828044] kunit_try_run_case+0x170/0x3f0 [ 16.828082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.828126] kthread+0x328/0x630 [ 16.828163] ret_from_fork+0x10/0x20 [ 16.828201] [ 16.828219] Freed by task 0: [ 16.828248] kasan_save_stack+0x3c/0x68 [ 16.828283] kasan_save_track+0x20/0x40 [ 16.828319] kasan_save_free_info+0x4c/0x78 [ 16.828356] __kasan_slab_free+0x6c/0x98 [ 16.828393] slab_free_after_rcu_debug+0xd4/0x2f8 [ 16.828431] rcu_core+0x9f4/0x1e20 [ 16.828467] rcu_core_si+0x18/0x30 [ 16.828499] handle_softirqs+0x374/0xb28 [ 16.828536] __do_softirq+0x1c/0x28 [ 16.828568] [ 16.828588] Last potentially related work creation: [ 16.828615] kasan_save_stack+0x3c/0x68 [ 16.828651] kasan_record_aux_stack+0xb4/0xc8 [ 16.828690] kmem_cache_free+0x120/0x468 [ 16.828724] kmem_cache_rcu_uaf+0x16c/0x468 [ 16.828763] kunit_try_run_case+0x170/0x3f0 [ 16.828801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.828846] kthread+0x328/0x630 [ 16.828883] ret_from_fork+0x10/0x20 [ 16.828918] [ 16.828938] The buggy address belongs to the object at fff00000c78ae000 [ 16.828938] which belongs to the cache test_cache of size 200 [ 16.829004] The buggy address is located 0 bytes inside of [ 16.829004] freed 200-byte region [fff00000c78ae000, fff00000c78ae0c8) [ 16.829065] [ 16.829086] The buggy address belongs to the physical page: [ 16.829119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ae [ 16.829174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.829227] page_type: f5(slab) [ 16.829268] raw: 0bfffe0000000000 fff00000c78a7280 dead000000000122 0000000000000000 [ 16.829318] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 16.829358] page dumped because: kasan: bad access detected [ 16.829390] [ 16.829407] Memory state around the buggy address: [ 16.829440] fff00000c78adf00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 16.829485] fff00000c78adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.829528] >fff00000c78ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.829568] ^ [ 16.829595] fff00000c78ae080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 16.829637] fff00000c78ae100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.829677] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 16.332567] ================================================================== [ 16.332695] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 16.332757] Free of addr fff00000c78ad001 by task kunit_try_catch/214 [ 16.332798] [ 16.332830] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 16.333149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.333228] Hardware name: linux,dummy-virt (DT) [ 16.333264] Call trace: [ 16.333300] show_stack+0x20/0x38 (C) [ 16.333352] dump_stack_lvl+0x8c/0xd0 [ 16.333403] print_report+0x118/0x608 [ 16.333446] kasan_report_invalid_free+0xc0/0xe8 [ 16.333513] check_slab_allocation+0xfc/0x108 [ 16.333559] __kasan_slab_pre_free+0x2c/0x48 [ 16.333605] kmem_cache_free+0xf0/0x468 [ 16.333770] kmem_cache_invalid_free+0x184/0x3c8 [ 16.333842] kunit_try_run_case+0x170/0x3f0 [ 16.333894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.333958] kthread+0x328/0x630 [ 16.334033] ret_from_fork+0x10/0x20 [ 16.334120] [ 16.334207] Allocated by task 214: [ 16.334363] kasan_save_stack+0x3c/0x68 [ 16.334550] kasan_save_track+0x20/0x40 [ 16.334742] kasan_save_alloc_info+0x40/0x58 [ 16.334778] __kasan_slab_alloc+0xa8/0xb0 [ 16.334829] kmem_cache_alloc_noprof+0x10c/0x398 [ 16.334868] kmem_cache_invalid_free+0x12c/0x3c8 [ 16.335077] kunit_try_run_case+0x170/0x3f0 [ 16.335166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.335211] kthread+0x328/0x630 [ 16.335499] ret_from_fork+0x10/0x20 [ 16.335585] [ 16.335643] The buggy address belongs to the object at fff00000c78ad000 [ 16.335643] which belongs to the cache test_cache of size 200 [ 16.335701] The buggy address is located 1 bytes inside of [ 16.335701] 200-byte region [fff00000c78ad000, fff00000c78ad0c8) [ 16.335844] [ 16.335982] The buggy address belongs to the physical page: [ 16.336070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ad [ 16.336125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.336394] page_type: f5(slab) [ 16.336438] raw: 0bfffe0000000000 fff00000c78a7140 dead000000000122 0000000000000000 [ 16.336554] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 16.336665] page dumped because: kasan: bad access detected [ 16.336696] [ 16.336714] Memory state around the buggy address: [ 16.336756] fff00000c78acf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.336820] fff00000c78acf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.336863] >fff00000c78ad000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.336910] ^ [ 16.336943] fff00000c78ad080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 16.337024] fff00000c78ad100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.337082] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 16.308522] ================================================================== [ 16.308586] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 16.308708] Free of addr fff00000c78a9000 by task kunit_try_catch/212 [ 16.308799] [ 16.308847] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 16.308931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.308973] Hardware name: linux,dummy-virt (DT) [ 16.309093] Call trace: [ 16.309255] show_stack+0x20/0x38 (C) [ 16.309328] dump_stack_lvl+0x8c/0xd0 [ 16.309381] print_report+0x118/0x608 [ 16.309436] kasan_report_invalid_free+0xc0/0xe8 [ 16.309580] check_slab_allocation+0xd4/0x108 [ 16.309647] __kasan_slab_pre_free+0x2c/0x48 [ 16.309691] kmem_cache_free+0xf0/0x468 [ 16.309736] kmem_cache_double_free+0x190/0x3c8 [ 16.309829] kunit_try_run_case+0x170/0x3f0 [ 16.309882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.309936] kthread+0x328/0x630 [ 16.310007] ret_from_fork+0x10/0x20 [ 16.310056] [ 16.310073] Allocated by task 212: [ 16.310130] kasan_save_stack+0x3c/0x68 [ 16.310482] kasan_save_track+0x20/0x40 [ 16.310625] kasan_save_alloc_info+0x40/0x58 [ 16.310712] __kasan_slab_alloc+0xa8/0xb0 [ 16.310819] kmem_cache_alloc_noprof+0x10c/0x398 [ 16.310882] kmem_cache_double_free+0x12c/0x3c8 [ 16.310922] kunit_try_run_case+0x170/0x3f0 [ 16.310969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.311032] kthread+0x328/0x630 [ 16.311066] ret_from_fork+0x10/0x20 [ 16.311103] [ 16.311121] Freed by task 212: [ 16.311146] kasan_save_stack+0x3c/0x68 [ 16.311182] kasan_save_track+0x20/0x40 [ 16.311217] kasan_save_free_info+0x4c/0x78 [ 16.311254] __kasan_slab_free+0x6c/0x98 [ 16.311288] kmem_cache_free+0x260/0x468 [ 16.311321] kmem_cache_double_free+0x140/0x3c8 [ 16.311362] kunit_try_run_case+0x170/0x3f0 [ 16.311400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.311527] kthread+0x328/0x630 [ 16.311657] ret_from_fork+0x10/0x20 [ 16.311817] [ 16.312046] The buggy address belongs to the object at fff00000c78a9000 [ 16.312046] which belongs to the cache test_cache of size 200 [ 16.312106] The buggy address is located 0 bytes inside of [ 16.312106] 200-byte region [fff00000c78a9000, fff00000c78a90c8) [ 16.312230] [ 16.312405] The buggy address belongs to the physical page: [ 16.312502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a9 [ 16.312557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.312764] page_type: f5(slab) [ 16.313044] raw: 0bfffe0000000000 fff00000c78a7000 dead000000000122 0000000000000000 [ 16.313265] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 16.313332] page dumped because: kasan: bad access detected [ 16.313364] [ 16.313380] Memory state around the buggy address: [ 16.313413] fff00000c78a8f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 16.313712] fff00000c78a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.313936] >fff00000c78a9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.314082] ^ [ 16.314262] fff00000c78a9080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 16.314304] fff00000c78a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.314542] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 16.057789] ================================================================== [ 16.058339] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 16.058408] Read of size 1 at addr fff00000c78a70c8 by task kunit_try_catch/210 [ 16.058489] [ 16.058538] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 16.058623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.058650] Hardware name: linux,dummy-virt (DT) [ 16.058684] Call trace: [ 16.058710] show_stack+0x20/0x38 (C) [ 16.058763] dump_stack_lvl+0x8c/0xd0 [ 16.058860] print_report+0x118/0x608 [ 16.058906] kasan_report+0xdc/0x128 [ 16.059020] __asan_report_load1_noabort+0x20/0x30 [ 16.059070] kmem_cache_oob+0x344/0x430 [ 16.059118] kunit_try_run_case+0x170/0x3f0 [ 16.059167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.059220] kthread+0x328/0x630 [ 16.059290] ret_from_fork+0x10/0x20 [ 16.059336] [ 16.059354] Allocated by task 210: [ 16.059383] kasan_save_stack+0x3c/0x68 [ 16.059423] kasan_save_track+0x20/0x40 [ 16.059458] kasan_save_alloc_info+0x40/0x58 [ 16.059495] __kasan_slab_alloc+0xa8/0xb0 [ 16.059529] kmem_cache_alloc_noprof+0x10c/0x398 [ 16.059570] kmem_cache_oob+0x12c/0x430 [ 16.059606] kunit_try_run_case+0x170/0x3f0 [ 16.059644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.059814] kthread+0x328/0x630 [ 16.059868] ret_from_fork+0x10/0x20 [ 16.059966] [ 16.060028] The buggy address belongs to the object at fff00000c78a7000 [ 16.060028] which belongs to the cache test_cache of size 200 [ 16.060095] The buggy address is located 0 bytes to the right of [ 16.060095] allocated 200-byte region [fff00000c78a7000, fff00000c78a70c8) [ 16.060163] [ 16.060518] The buggy address belongs to the physical page: [ 16.060658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a7 [ 16.060768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.060842] page_type: f5(slab) [ 16.060883] raw: 0bfffe0000000000 fff00000c114bdc0 dead000000000122 0000000000000000 [ 16.060933] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 16.060981] page dumped because: kasan: bad access detected [ 16.061012] [ 16.061029] Memory state around the buggy address: [ 16.061061] fff00000c78a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.061105] fff00000c78a7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.061165] >fff00000c78a7080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 16.061204] ^ [ 16.061239] fff00000c78a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.061281] fff00000c78a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.061319] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 16.017251] ================================================================== [ 16.017388] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 16.017516] Read of size 8 at addr fff00000c65c5580 by task kunit_try_catch/203 [ 16.017902] [ 16.018026] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 16.018113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.018140] Hardware name: linux,dummy-virt (DT) [ 16.018370] Call trace: [ 16.018411] show_stack+0x20/0x38 (C) [ 16.018470] dump_stack_lvl+0x8c/0xd0 [ 16.018752] print_report+0x118/0x608 [ 16.018811] kasan_report+0xdc/0x128 [ 16.018854] __asan_report_load8_noabort+0x20/0x30 [ 16.018903] workqueue_uaf+0x480/0x4a8 [ 16.019622] kunit_try_run_case+0x170/0x3f0 [ 16.019710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.019788] kthread+0x328/0x630 [ 16.019835] ret_from_fork+0x10/0x20 [ 16.019882] [ 16.019902] Allocated by task 203: [ 16.019930] kasan_save_stack+0x3c/0x68 [ 16.019979] kasan_save_track+0x20/0x40 [ 16.020014] kasan_save_alloc_info+0x40/0x58 [ 16.020053] __kasan_kmalloc+0xd4/0xd8 [ 16.020090] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.020129] workqueue_uaf+0x13c/0x4a8 [ 16.020166] kunit_try_run_case+0x170/0x3f0 [ 16.021494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.021728] kthread+0x328/0x630 [ 16.021770] ret_from_fork+0x10/0x20 [ 16.021807] [ 16.021826] Freed by task 51: [ 16.021854] kasan_save_stack+0x3c/0x68 [ 16.022504] kasan_save_track+0x20/0x40 [ 16.022592] kasan_save_free_info+0x4c/0x78 [ 16.022787] __kasan_slab_free+0x6c/0x98 [ 16.022838] kfree+0x214/0x3c8 [ 16.022869] workqueue_uaf_work+0x18/0x30 [ 16.022906] process_one_work+0x530/0xf98 [ 16.023538] worker_thread+0x618/0xf38 [ 16.023621] kthread+0x328/0x630 [ 16.023659] ret_from_fork+0x10/0x20 [ 16.023834] [ 16.024031] Last potentially related work creation: [ 16.024065] kasan_save_stack+0x3c/0x68 [ 16.024191] kasan_record_aux_stack+0xb4/0xc8 [ 16.024594] __queue_work+0x65c/0x1008 [ 16.024856] queue_work_on+0xbc/0xf8 [ 16.025170] workqueue_uaf+0x210/0x4a8 [ 16.025335] kunit_try_run_case+0x170/0x3f0 [ 16.025812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.025906] kthread+0x328/0x630 [ 16.025941] ret_from_fork+0x10/0x20 [ 16.025986] [ 16.026006] The buggy address belongs to the object at fff00000c65c5580 [ 16.026006] which belongs to the cache kmalloc-32 of size 32 [ 16.026066] The buggy address is located 0 bytes inside of [ 16.026066] freed 32-byte region [fff00000c65c5580, fff00000c65c55a0) [ 16.026125] [ 16.026148] The buggy address belongs to the physical page: [ 16.026688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 16.026821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.026875] page_type: f5(slab) [ 16.027107] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 16.027666] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.027880] page dumped because: kasan: bad access detected [ 16.027944] [ 16.027972] Memory state around the buggy address: [ 16.028007] fff00000c65c5480: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 16.028529] fff00000c65c5500: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 16.028581] >fff00000c65c5580: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.028743] ^ [ 16.028801] fff00000c65c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.029227] fff00000c65c5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.029270] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 15.958504] ================================================================== [ 15.959877] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 15.960598] Read of size 4 at addr fff00000c65c5380 by task swapper/1/0 [ 15.961553] [ 15.961669] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.961755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.961782] Hardware name: linux,dummy-virt (DT) [ 15.961814] Call trace: [ 15.962729] show_stack+0x20/0x38 (C) [ 15.963434] dump_stack_lvl+0x8c/0xd0 [ 15.963861] print_report+0x118/0x608 [ 15.964342] kasan_report+0xdc/0x128 [ 15.964812] __asan_report_load4_noabort+0x20/0x30 [ 15.965355] rcu_uaf_reclaim+0x64/0x70 [ 15.966165] rcu_core+0x9f4/0x1e20 [ 15.966580] rcu_core_si+0x18/0x30 [ 15.966653] handle_softirqs+0x374/0xb28 [ 15.966700] __do_softirq+0x1c/0x28 [ 15.966742] ____do_softirq+0x18/0x30 [ 15.966784] call_on_irq_stack+0x24/0x30 [ 15.966829] do_softirq_own_stack+0x24/0x38 [ 15.968226] __irq_exit_rcu+0x1fc/0x318 [ 15.969023] irq_exit_rcu+0x1c/0x80 [ 15.969316] el1_interrupt+0x38/0x58 [ 15.969701] el1h_64_irq_handler+0x18/0x28 [ 15.969752] el1h_64_irq+0x6c/0x70 [ 15.971315] arch_local_irq_enable+0x4/0x8 (P) [ 15.971580] do_idle+0x384/0x4e8 [ 15.972093] cpu_startup_entry+0x68/0x80 [ 15.972151] secondary_start_kernel+0x288/0x340 [ 15.972541] __secondary_switched+0xc0/0xc8 [ 15.973211] [ 15.973237] Allocated by task 201: [ 15.973892] kasan_save_stack+0x3c/0x68 [ 15.974193] kasan_save_track+0x20/0x40 [ 15.974228] kasan_save_alloc_info+0x40/0x58 [ 15.974267] __kasan_kmalloc+0xd4/0xd8 [ 15.974301] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.974855] rcu_uaf+0xb0/0x2d8 [ 15.975460] kunit_try_run_case+0x170/0x3f0 [ 15.975562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.975608] kthread+0x328/0x630 [ 15.975644] ret_from_fork+0x10/0x20 [ 15.975682] [ 15.975702] Freed by task 0: [ 15.975728] kasan_save_stack+0x3c/0x68 [ 15.975765] kasan_save_track+0x20/0x40 [ 15.977126] kasan_save_free_info+0x4c/0x78 [ 15.977619] __kasan_slab_free+0x6c/0x98 [ 15.978210] kfree+0x214/0x3c8 [ 15.978255] rcu_uaf_reclaim+0x28/0x70 [ 15.978431] rcu_core+0x9f4/0x1e20 [ 15.978759] rcu_core_si+0x18/0x30 [ 15.979339] handle_softirqs+0x374/0xb28 [ 15.979391] __do_softirq+0x1c/0x28 [ 15.980011] [ 15.980322] Last potentially related work creation: [ 15.980367] kasan_save_stack+0x3c/0x68 [ 15.980417] kasan_record_aux_stack+0xb4/0xc8 [ 15.981775] __call_rcu_common.constprop.0+0x70/0x8b0 [ 15.981905] call_rcu+0x18/0x30 [ 15.981960] rcu_uaf+0x14c/0x2d8 [ 15.981996] kunit_try_run_case+0x170/0x3f0 [ 15.982035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.983085] kthread+0x328/0x630 [ 15.983195] ret_from_fork+0x10/0x20 [ 15.983576] [ 15.983619] The buggy address belongs to the object at fff00000c65c5380 [ 15.983619] which belongs to the cache kmalloc-32 of size 32 [ 15.984355] The buggy address is located 0 bytes inside of [ 15.984355] freed 32-byte region [fff00000c65c5380, fff00000c65c53a0) [ 15.985071] [ 15.985251] The buggy address belongs to the physical page: [ 15.985370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 15.985557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.986198] page_type: f5(slab) [ 15.986493] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 15.987649] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 15.987884] page dumped because: kasan: bad access detected [ 15.988585] [ 15.988718] Memory state around the buggy address: [ 15.988769] fff00000c65c5280: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 15.988999] fff00000c65c5300: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 15.989202] >fff00000c65c5380: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 15.989284] ^ [ 15.989379] fff00000c65c5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.989823] fff00000c65c5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.989865] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 15.844758] ================================================================== [ 15.844812] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 15.845068] Read of size 1 at addr fff00000c7811700 by task kunit_try_catch/199 [ 15.845161] [ 15.845206] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.845635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.845666] Hardware name: linux,dummy-virt (DT) [ 15.845963] Call trace: [ 15.846000] show_stack+0x20/0x38 (C) [ 15.846052] dump_stack_lvl+0x8c/0xd0 [ 15.846097] print_report+0x118/0x608 [ 15.846550] kasan_report+0xdc/0x128 [ 15.846630] __asan_report_load1_noabort+0x20/0x30 [ 15.847100] ksize_uaf+0x598/0x5f8 [ 15.847178] kunit_try_run_case+0x170/0x3f0 [ 15.847387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.847612] kthread+0x328/0x630 [ 15.847695] ret_from_fork+0x10/0x20 [ 15.847848] [ 15.847917] Allocated by task 199: [ 15.848143] kasan_save_stack+0x3c/0x68 [ 15.848183] kasan_save_track+0x20/0x40 [ 15.848420] kasan_save_alloc_info+0x40/0x58 [ 15.848594] __kasan_kmalloc+0xd4/0xd8 [ 15.848695] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.848811] ksize_uaf+0xb8/0x5f8 [ 15.848997] kunit_try_run_case+0x170/0x3f0 [ 15.849099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.849288] kthread+0x328/0x630 [ 15.849560] ret_from_fork+0x10/0x20 [ 15.849723] [ 15.849775] Freed by task 199: [ 15.849902] kasan_save_stack+0x3c/0x68 [ 15.850004] kasan_save_track+0x20/0x40 [ 15.850040] kasan_save_free_info+0x4c/0x78 [ 15.850314] __kasan_slab_free+0x6c/0x98 [ 15.850602] kfree+0x214/0x3c8 [ 15.850842] ksize_uaf+0x11c/0x5f8 [ 15.851019] kunit_try_run_case+0x170/0x3f0 [ 15.851143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.851250] kthread+0x328/0x630 [ 15.851322] ret_from_fork+0x10/0x20 [ 15.851477] [ 15.851546] The buggy address belongs to the object at fff00000c7811700 [ 15.851546] which belongs to the cache kmalloc-128 of size 128 [ 15.851840] The buggy address is located 0 bytes inside of [ 15.851840] freed 128-byte region [fff00000c7811700, fff00000c7811780) [ 15.852065] [ 15.852114] The buggy address belongs to the physical page: [ 15.852174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.852318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.852425] page_type: f5(slab) [ 15.852585] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.852647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.852818] page dumped because: kasan: bad access detected [ 15.853031] [ 15.853084] Memory state around the buggy address: [ 15.853190] fff00000c7811600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.853237] fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.853280] >fff00000c7811700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.853318] ^ [ 15.853357] fff00000c7811780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.853400] fff00000c7811800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.853438] ================================================================== [ 15.853939] ================================================================== [ 15.854003] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 15.854050] Read of size 1 at addr fff00000c7811778 by task kunit_try_catch/199 [ 15.854294] [ 15.854688] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.854785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.854876] Hardware name: linux,dummy-virt (DT) [ 15.854965] Call trace: [ 15.854998] show_stack+0x20/0x38 (C) [ 15.855217] dump_stack_lvl+0x8c/0xd0 [ 15.855326] print_report+0x118/0x608 [ 15.855457] kasan_report+0xdc/0x128 [ 15.855525] __asan_report_load1_noabort+0x20/0x30 [ 15.855677] ksize_uaf+0x544/0x5f8 [ 15.855745] kunit_try_run_case+0x170/0x3f0 [ 15.856029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.856231] kthread+0x328/0x630 [ 15.856360] ret_from_fork+0x10/0x20 [ 15.856487] [ 15.856505] Allocated by task 199: [ 15.856740] kasan_save_stack+0x3c/0x68 [ 15.856920] kasan_save_track+0x20/0x40 [ 15.857517] kasan_save_alloc_info+0x40/0x58 [ 15.857714] __kasan_kmalloc+0xd4/0xd8 [ 15.857904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.858079] ksize_uaf+0xb8/0x5f8 [ 15.858145] kunit_try_run_case+0x170/0x3f0 [ 15.858241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.858309] kthread+0x328/0x630 [ 15.858346] ret_from_fork+0x10/0x20 [ 15.858382] [ 15.858402] Freed by task 199: [ 15.858434] kasan_save_stack+0x3c/0x68 [ 15.858655] kasan_save_track+0x20/0x40 [ 15.858830] kasan_save_free_info+0x4c/0x78 [ 15.858997] __kasan_slab_free+0x6c/0x98 [ 15.859127] kfree+0x214/0x3c8 [ 15.859187] ksize_uaf+0x11c/0x5f8 [ 15.859332] kunit_try_run_case+0x170/0x3f0 [ 15.859372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.859582] kthread+0x328/0x630 [ 15.859843] ret_from_fork+0x10/0x20 [ 15.859905] [ 15.860034] The buggy address belongs to the object at fff00000c7811700 [ 15.860034] which belongs to the cache kmalloc-128 of size 128 [ 15.860152] The buggy address is located 120 bytes inside of [ 15.860152] freed 128-byte region [fff00000c7811700, fff00000c7811780) [ 15.860465] [ 15.860527] The buggy address belongs to the physical page: [ 15.860794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.860933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.861039] page_type: f5(slab) [ 15.861166] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.861687] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.861775] page dumped because: kasan: bad access detected [ 15.861919] [ 15.862009] Memory state around the buggy address: [ 15.862069] fff00000c7811600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.862457] fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.862621] >fff00000c7811700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.862787] ^ [ 15.862871] fff00000c7811780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.862926] fff00000c7811800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.863102] ================================================================== [ 15.835178] ================================================================== [ 15.835240] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 15.836202] Read of size 1 at addr fff00000c7811700 by task kunit_try_catch/199 [ 15.836300] [ 15.836360] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.836448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.836475] Hardware name: linux,dummy-virt (DT) [ 15.836504] Call trace: [ 15.836528] show_stack+0x20/0x38 (C) [ 15.836933] dump_stack_lvl+0x8c/0xd0 [ 15.837214] print_report+0x118/0x608 [ 15.837259] kasan_report+0xdc/0x128 [ 15.837305] __kasan_check_byte+0x54/0x70 [ 15.837349] ksize+0x30/0x88 [ 15.837785] ksize_uaf+0x168/0x5f8 [ 15.837882] kunit_try_run_case+0x170/0x3f0 [ 15.837933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.838692] kthread+0x328/0x630 [ 15.838811] ret_from_fork+0x10/0x20 [ 15.838911] [ 15.838974] Allocated by task 199: [ 15.839097] kasan_save_stack+0x3c/0x68 [ 15.839256] kasan_save_track+0x20/0x40 [ 15.839640] kasan_save_alloc_info+0x40/0x58 [ 15.839824] __kasan_kmalloc+0xd4/0xd8 [ 15.839882] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.839930] ksize_uaf+0xb8/0x5f8 [ 15.840014] kunit_try_run_case+0x170/0x3f0 [ 15.840056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.840103] kthread+0x328/0x630 [ 15.840137] ret_from_fork+0x10/0x20 [ 15.840182] [ 15.840223] Freed by task 199: [ 15.840259] kasan_save_stack+0x3c/0x68 [ 15.840296] kasan_save_track+0x20/0x40 [ 15.840336] kasan_save_free_info+0x4c/0x78 [ 15.840384] __kasan_slab_free+0x6c/0x98 [ 15.840418] kfree+0x214/0x3c8 [ 15.840459] ksize_uaf+0x11c/0x5f8 [ 15.840493] kunit_try_run_case+0x170/0x3f0 [ 15.840532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.840573] kthread+0x328/0x630 [ 15.840618] ret_from_fork+0x10/0x20 [ 15.840652] [ 15.840670] The buggy address belongs to the object at fff00000c7811700 [ 15.840670] which belongs to the cache kmalloc-128 of size 128 [ 15.840727] The buggy address is located 0 bytes inside of [ 15.840727] freed 128-byte region [fff00000c7811700, fff00000c7811780) [ 15.840785] [ 15.840805] The buggy address belongs to the physical page: [ 15.840849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.840908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.841626] page_type: f5(slab) [ 15.841705] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.841778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.842125] page dumped because: kasan: bad access detected [ 15.842190] [ 15.842406] Memory state around the buggy address: [ 15.842574] fff00000c7811600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.842663] fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.842707] >fff00000c7811700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.842746] ^ [ 15.842937] fff00000c7811780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.843258] fff00000c7811800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.843472] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 15.821545] ================================================================== [ 15.821595] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 15.821685] Read of size 1 at addr fff00000c781167f by task kunit_try_catch/197 [ 15.821737] [ 15.821766] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.821848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.821913] Hardware name: linux,dummy-virt (DT) [ 15.821943] Call trace: [ 15.821978] show_stack+0x20/0x38 (C) [ 15.822024] dump_stack_lvl+0x8c/0xd0 [ 15.822075] print_report+0x118/0x608 [ 15.822119] kasan_report+0xdc/0x128 [ 15.822164] __asan_report_load1_noabort+0x20/0x30 [ 15.822212] ksize_unpoisons_memory+0x690/0x740 [ 15.822265] kunit_try_run_case+0x170/0x3f0 [ 15.822322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.822385] kthread+0x328/0x630 [ 15.822441] ret_from_fork+0x10/0x20 [ 15.822486] [ 15.822512] Allocated by task 197: [ 15.822541] kasan_save_stack+0x3c/0x68 [ 15.822577] kasan_save_track+0x20/0x40 [ 15.822621] kasan_save_alloc_info+0x40/0x58 [ 15.822666] __kasan_kmalloc+0xd4/0xd8 [ 15.822710] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.822747] ksize_unpoisons_memory+0xc0/0x740 [ 15.822786] kunit_try_run_case+0x170/0x3f0 [ 15.822824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.822867] kthread+0x328/0x630 [ 15.822900] ret_from_fork+0x10/0x20 [ 15.822933] [ 15.823387] The buggy address belongs to the object at fff00000c7811600 [ 15.823387] which belongs to the cache kmalloc-128 of size 128 [ 15.823763] The buggy address is located 12 bytes to the right of [ 15.823763] allocated 115-byte region [fff00000c7811600, fff00000c7811673) [ 15.823879] [ 15.824037] The buggy address belongs to the physical page: [ 15.824357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.824445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.824700] page_type: f5(slab) [ 15.824808] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.824942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.825057] page dumped because: kasan: bad access detected [ 15.825125] [ 15.825144] Memory state around the buggy address: [ 15.825428] fff00000c7811500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.825673] fff00000c7811580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.825767] >fff00000c7811600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.825920] ^ [ 15.826006] fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.826341] fff00000c7811700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.826497] ================================================================== [ 15.803291] ================================================================== [ 15.803354] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 15.803534] Read of size 1 at addr fff00000c7811673 by task kunit_try_catch/197 [ 15.803585] [ 15.803663] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.803784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.803989] Hardware name: linux,dummy-virt (DT) [ 15.804137] Call trace: [ 15.804250] show_stack+0x20/0x38 (C) [ 15.804321] dump_stack_lvl+0x8c/0xd0 [ 15.804440] print_report+0x118/0x608 [ 15.804535] kasan_report+0xdc/0x128 [ 15.804582] __asan_report_load1_noabort+0x20/0x30 [ 15.804836] ksize_unpoisons_memory+0x628/0x740 [ 15.804908] kunit_try_run_case+0x170/0x3f0 [ 15.804968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.805022] kthread+0x328/0x630 [ 15.805217] ret_from_fork+0x10/0x20 [ 15.805280] [ 15.805297] Allocated by task 197: [ 15.805355] kasan_save_stack+0x3c/0x68 [ 15.805732] kasan_save_track+0x20/0x40 [ 15.805896] kasan_save_alloc_info+0x40/0x58 [ 15.805940] __kasan_kmalloc+0xd4/0xd8 [ 15.806006] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.806140] ksize_unpoisons_memory+0xc0/0x740 [ 15.806271] kunit_try_run_case+0x170/0x3f0 [ 15.806482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.806752] kthread+0x328/0x630 [ 15.806814] ret_from_fork+0x10/0x20 [ 15.807549] [ 15.807620] The buggy address belongs to the object at fff00000c7811600 [ 15.807620] which belongs to the cache kmalloc-128 of size 128 [ 15.807726] The buggy address is located 0 bytes to the right of [ 15.807726] allocated 115-byte region [fff00000c7811600, fff00000c7811673) [ 15.807866] [ 15.807887] The buggy address belongs to the physical page: [ 15.808133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.808254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.808514] page_type: f5(slab) [ 15.808564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.808729] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.809447] page dumped because: kasan: bad access detected [ 15.809534] [ 15.809636] Memory state around the buggy address: [ 15.809734] fff00000c7811500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.810059] fff00000c7811580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.810351] >fff00000c7811600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.810591] ^ [ 15.810667] fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.810722] fff00000c7811700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.810759] ================================================================== [ 15.812357] ================================================================== [ 15.812657] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 15.812726] Read of size 1 at addr fff00000c7811678 by task kunit_try_catch/197 [ 15.812934] [ 15.813098] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.813191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.813415] Hardware name: linux,dummy-virt (DT) [ 15.813616] Call trace: [ 15.813652] show_stack+0x20/0x38 (C) [ 15.813728] dump_stack_lvl+0x8c/0xd0 [ 15.813778] print_report+0x118/0x608 [ 15.813822] kasan_report+0xdc/0x128 [ 15.813864] __asan_report_load1_noabort+0x20/0x30 [ 15.813913] ksize_unpoisons_memory+0x618/0x740 [ 15.813987] kunit_try_run_case+0x170/0x3f0 [ 15.814035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.814088] kthread+0x328/0x630 [ 15.814132] ret_from_fork+0x10/0x20 [ 15.814384] [ 15.814583] Allocated by task 197: [ 15.815267] kasan_save_stack+0x3c/0x68 [ 15.815448] kasan_save_track+0x20/0x40 [ 15.815487] kasan_save_alloc_info+0x40/0x58 [ 15.815559] __kasan_kmalloc+0xd4/0xd8 [ 15.815983] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.816083] ksize_unpoisons_memory+0xc0/0x740 [ 15.816185] kunit_try_run_case+0x170/0x3f0 [ 15.816471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.816641] kthread+0x328/0x630 [ 15.816970] ret_from_fork+0x10/0x20 [ 15.817108] [ 15.817198] The buggy address belongs to the object at fff00000c7811600 [ 15.817198] which belongs to the cache kmalloc-128 of size 128 [ 15.817328] The buggy address is located 5 bytes to the right of [ 15.817328] allocated 115-byte region [fff00000c7811600, fff00000c7811673) [ 15.817682] [ 15.817821] The buggy address belongs to the physical page: [ 15.818049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.818298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.818677] page_type: f5(slab) [ 15.818879] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.819204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.819279] page dumped because: kasan: bad access detected [ 15.819422] [ 15.819442] Memory state around the buggy address: [ 15.819661] fff00000c7811500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.819756] fff00000c7811580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820092] >fff00000c7811600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.820177] ^ [ 15.820325] fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820416] fff00000c7811700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820573] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 15.779594] ================================================================== [ 15.779668] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 15.779717] Free of addr fff00000c55f0940 by task kunit_try_catch/195 [ 15.780089] [ 15.780141] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.780572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.780618] Hardware name: linux,dummy-virt (DT) [ 15.780954] Call trace: [ 15.781082] show_stack+0x20/0x38 (C) [ 15.781139] dump_stack_lvl+0x8c/0xd0 [ 15.781205] print_report+0x118/0x608 [ 15.781259] kasan_report_invalid_free+0xc0/0xe8 [ 15.781610] check_slab_allocation+0xd4/0x108 [ 15.781732] __kasan_slab_pre_free+0x2c/0x48 [ 15.781984] kfree+0xe8/0x3c8 [ 15.782331] kfree_sensitive+0x3c/0xb0 [ 15.782541] kmalloc_double_kzfree+0x168/0x308 [ 15.782668] kunit_try_run_case+0x170/0x3f0 [ 15.782831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.782888] kthread+0x328/0x630 [ 15.783072] ret_from_fork+0x10/0x20 [ 15.783260] [ 15.783387] Allocated by task 195: [ 15.783779] kasan_save_stack+0x3c/0x68 [ 15.783965] kasan_save_track+0x20/0x40 [ 15.784365] kasan_save_alloc_info+0x40/0x58 [ 15.784627] __kasan_kmalloc+0xd4/0xd8 [ 15.784669] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.784957] kmalloc_double_kzfree+0xb8/0x308 [ 15.785202] kunit_try_run_case+0x170/0x3f0 [ 15.785313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.785361] kthread+0x328/0x630 [ 15.785572] ret_from_fork+0x10/0x20 [ 15.785895] [ 15.785930] Freed by task 195: [ 15.786198] kasan_save_stack+0x3c/0x68 [ 15.786297] kasan_save_track+0x20/0x40 [ 15.786334] kasan_save_free_info+0x4c/0x78 [ 15.786382] __kasan_slab_free+0x6c/0x98 [ 15.786418] kfree+0x214/0x3c8 [ 15.786454] kfree_sensitive+0x80/0xb0 [ 15.786490] kmalloc_double_kzfree+0x11c/0x308 [ 15.787140] kunit_try_run_case+0x170/0x3f0 [ 15.787280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.787435] kthread+0x328/0x630 [ 15.787518] ret_from_fork+0x10/0x20 [ 15.787591] [ 15.787741] The buggy address belongs to the object at fff00000c55f0940 [ 15.787741] which belongs to the cache kmalloc-16 of size 16 [ 15.787983] The buggy address is located 0 bytes inside of [ 15.787983] 16-byte region [fff00000c55f0940, fff00000c55f0950) [ 15.788134] [ 15.788223] The buggy address belongs to the physical page: [ 15.788263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0 [ 15.788315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.788398] page_type: f5(slab) [ 15.788446] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 15.788505] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.788554] page dumped because: kasan: bad access detected [ 15.788600] [ 15.788620] Memory state around the buggy address: [ 15.788652] fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.788694] fff00000c55f0880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.788736] >fff00000c55f0900: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 15.788773] ^ [ 15.788818] fff00000c55f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.788860] fff00000c55f0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.788899] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 15.768806] ================================================================== [ 15.769261] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 15.769477] Read of size 1 at addr fff00000c55f0940 by task kunit_try_catch/195 [ 15.769588] [ 15.769633] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.769716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.770159] Hardware name: linux,dummy-virt (DT) [ 15.770217] Call trace: [ 15.770502] show_stack+0x20/0x38 (C) [ 15.770566] dump_stack_lvl+0x8c/0xd0 [ 15.770615] print_report+0x118/0x608 [ 15.770658] kasan_report+0xdc/0x128 [ 15.770701] __kasan_check_byte+0x54/0x70 [ 15.770983] kfree_sensitive+0x30/0xb0 [ 15.771345] kmalloc_double_kzfree+0x168/0x308 [ 15.771462] kunit_try_run_case+0x170/0x3f0 [ 15.771579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.771729] kthread+0x328/0x630 [ 15.771817] ret_from_fork+0x10/0x20 [ 15.772068] [ 15.772130] Allocated by task 195: [ 15.772162] kasan_save_stack+0x3c/0x68 [ 15.772570] kasan_save_track+0x20/0x40 [ 15.772704] kasan_save_alloc_info+0x40/0x58 [ 15.772884] __kasan_kmalloc+0xd4/0xd8 [ 15.773051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.773271] kmalloc_double_kzfree+0xb8/0x308 [ 15.773318] kunit_try_run_case+0x170/0x3f0 [ 15.773490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.773973] kthread+0x328/0x630 [ 15.774058] ret_from_fork+0x10/0x20 [ 15.774224] [ 15.774301] Freed by task 195: [ 15.774332] kasan_save_stack+0x3c/0x68 [ 15.774569] kasan_save_track+0x20/0x40 [ 15.774699] kasan_save_free_info+0x4c/0x78 [ 15.774778] __kasan_slab_free+0x6c/0x98 [ 15.774855] kfree+0x214/0x3c8 [ 15.774887] kfree_sensitive+0x80/0xb0 [ 15.775101] kmalloc_double_kzfree+0x11c/0x308 [ 15.775292] kunit_try_run_case+0x170/0x3f0 [ 15.775339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.775427] kthread+0x328/0x630 [ 15.775839] ret_from_fork+0x10/0x20 [ 15.776026] [ 15.776375] The buggy address belongs to the object at fff00000c55f0940 [ 15.776375] which belongs to the cache kmalloc-16 of size 16 [ 15.776612] The buggy address is located 0 bytes inside of [ 15.776612] freed 16-byte region [fff00000c55f0940, fff00000c55f0950) [ 15.776857] [ 15.776891] The buggy address belongs to the physical page: [ 15.776942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0 [ 15.777008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.777057] page_type: f5(slab) [ 15.777121] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 15.777189] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.777229] page dumped because: kasan: bad access detected [ 15.777261] [ 15.777279] Memory state around the buggy address: [ 15.777327] fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.777390] fff00000c55f0880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.777433] >fff00000c55f0900: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 15.777472] ^ [ 15.777506] fff00000c55f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.777549] fff00000c55f0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.777613] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 15.741469] ================================================================== [ 15.742146] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 15.742425] Read of size 1 at addr fff00000c63d0428 by task kunit_try_catch/191 [ 15.742484] [ 15.742700] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.742911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.743079] Hardware name: linux,dummy-virt (DT) [ 15.743115] Call trace: [ 15.743168] show_stack+0x20/0x38 (C) [ 15.743541] dump_stack_lvl+0x8c/0xd0 [ 15.743770] print_report+0x118/0x608 [ 15.743944] kasan_report+0xdc/0x128 [ 15.744125] __asan_report_load1_noabort+0x20/0x30 [ 15.744371] kmalloc_uaf2+0x3f4/0x468 [ 15.744602] kunit_try_run_case+0x170/0x3f0 [ 15.744686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.744795] kthread+0x328/0x630 [ 15.744991] ret_from_fork+0x10/0x20 [ 15.745224] [ 15.745284] Allocated by task 191: [ 15.745577] kasan_save_stack+0x3c/0x68 [ 15.745646] kasan_save_track+0x20/0x40 [ 15.745755] kasan_save_alloc_info+0x40/0x58 [ 15.745836] __kasan_kmalloc+0xd4/0xd8 [ 15.746109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.746326] kmalloc_uaf2+0xc4/0x468 [ 15.746526] kunit_try_run_case+0x170/0x3f0 [ 15.746567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.746849] kthread+0x328/0x630 [ 15.746908] ret_from_fork+0x10/0x20 [ 15.746958] [ 15.746977] Freed by task 191: [ 15.747003] kasan_save_stack+0x3c/0x68 [ 15.747040] kasan_save_track+0x20/0x40 [ 15.747084] kasan_save_free_info+0x4c/0x78 [ 15.747122] __kasan_slab_free+0x6c/0x98 [ 15.747167] kfree+0x214/0x3c8 [ 15.747206] kmalloc_uaf2+0x134/0x468 [ 15.747242] kunit_try_run_case+0x170/0x3f0 [ 15.747282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.747335] kthread+0x328/0x630 [ 15.747368] ret_from_fork+0x10/0x20 [ 15.747425] [ 15.747444] The buggy address belongs to the object at fff00000c63d0400 [ 15.747444] which belongs to the cache kmalloc-64 of size 64 [ 15.747502] The buggy address is located 40 bytes inside of [ 15.747502] freed 64-byte region [fff00000c63d0400, fff00000c63d0440) [ 15.747573] [ 15.747603] The buggy address belongs to the physical page: [ 15.747644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d0 [ 15.747700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.747748] page_type: f5(slab) [ 15.747789] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 15.747848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.747897] page dumped because: kasan: bad access detected [ 15.747928] [ 15.747998] Memory state around the buggy address: [ 15.748161] fff00000c63d0300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.748458] fff00000c63d0380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.748855] >fff00000c63d0400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.749143] ^ [ 15.749438] fff00000c63d0480: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 15.749625] fff00000c63d0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.749913] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 15.720187] ================================================================== [ 15.720246] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 15.720305] Write of size 33 at addr fff00000c63d0280 by task kunit_try_catch/189 [ 15.720357] [ 15.720389] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.720468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.720493] Hardware name: linux,dummy-virt (DT) [ 15.720524] Call trace: [ 15.720546] show_stack+0x20/0x38 (C) [ 15.720645] dump_stack_lvl+0x8c/0xd0 [ 15.720716] print_report+0x118/0x608 [ 15.720762] kasan_report+0xdc/0x128 [ 15.720804] kasan_check_range+0x100/0x1a8 [ 15.720850] __asan_memset+0x34/0x78 [ 15.720894] kmalloc_uaf_memset+0x170/0x310 [ 15.720940] kunit_try_run_case+0x170/0x3f0 [ 15.721909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.721995] kthread+0x328/0x630 [ 15.722314] ret_from_fork+0x10/0x20 [ 15.722542] [ 15.722687] Allocated by task 189: [ 15.722835] kasan_save_stack+0x3c/0x68 [ 15.722879] kasan_save_track+0x20/0x40 [ 15.723218] kasan_save_alloc_info+0x40/0x58 [ 15.723293] __kasan_kmalloc+0xd4/0xd8 [ 15.723511] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.723754] kmalloc_uaf_memset+0xb8/0x310 [ 15.723820] kunit_try_run_case+0x170/0x3f0 [ 15.723860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.724133] kthread+0x328/0x630 [ 15.724426] ret_from_fork+0x10/0x20 [ 15.724522] [ 15.724709] Freed by task 189: [ 15.724738] kasan_save_stack+0x3c/0x68 [ 15.724881] kasan_save_track+0x20/0x40 [ 15.725001] kasan_save_free_info+0x4c/0x78 [ 15.725189] __kasan_slab_free+0x6c/0x98 [ 15.725350] kfree+0x214/0x3c8 [ 15.725565] kmalloc_uaf_memset+0x11c/0x310 [ 15.725611] kunit_try_run_case+0x170/0x3f0 [ 15.726045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.726177] kthread+0x328/0x630 [ 15.726290] ret_from_fork+0x10/0x20 [ 15.726510] [ 15.726681] The buggy address belongs to the object at fff00000c63d0280 [ 15.726681] which belongs to the cache kmalloc-64 of size 64 [ 15.726914] The buggy address is located 0 bytes inside of [ 15.726914] freed 64-byte region [fff00000c63d0280, fff00000c63d02c0) [ 15.727122] [ 15.727201] The buggy address belongs to the physical page: [ 15.727336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d0 [ 15.727726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.727969] page_type: f5(slab) [ 15.728106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 15.728247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.728358] page dumped because: kasan: bad access detected [ 15.728395] [ 15.728551] Memory state around the buggy address: [ 15.728696] fff00000c63d0180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.728918] fff00000c63d0200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.729053] >fff00000c63d0280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.729250] ^ [ 15.729279] fff00000c63d0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.729349] fff00000c63d0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.729587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 15.699220] ================================================================== [ 15.699279] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 15.699334] Read of size 1 at addr fff00000c55f0928 by task kunit_try_catch/187 [ 15.699382] [ 15.699413] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.699493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.699520] Hardware name: linux,dummy-virt (DT) [ 15.699548] Call trace: [ 15.699571] show_stack+0x20/0x38 (C) [ 15.699616] dump_stack_lvl+0x8c/0xd0 [ 15.699667] print_report+0x118/0x608 [ 15.699747] kasan_report+0xdc/0x128 [ 15.699792] __asan_report_load1_noabort+0x20/0x30 [ 15.699839] kmalloc_uaf+0x300/0x338 [ 15.699883] kunit_try_run_case+0x170/0x3f0 [ 15.699931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.701031] kthread+0x328/0x630 [ 15.701492] ret_from_fork+0x10/0x20 [ 15.701875] [ 15.702059] Allocated by task 187: [ 15.702144] kasan_save_stack+0x3c/0x68 [ 15.702214] kasan_save_track+0x20/0x40 [ 15.702249] kasan_save_alloc_info+0x40/0x58 [ 15.702540] __kasan_kmalloc+0xd4/0xd8 [ 15.702734] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.702812] kmalloc_uaf+0xb8/0x338 [ 15.703010] kunit_try_run_case+0x170/0x3f0 [ 15.703060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.703206] kthread+0x328/0x630 [ 15.703532] ret_from_fork+0x10/0x20 [ 15.703681] [ 15.703840] Freed by task 187: [ 15.704030] kasan_save_stack+0x3c/0x68 [ 15.704256] kasan_save_track+0x20/0x40 [ 15.704440] kasan_save_free_info+0x4c/0x78 [ 15.704917] __kasan_slab_free+0x6c/0x98 [ 15.705054] kfree+0x214/0x3c8 [ 15.705092] kmalloc_uaf+0x11c/0x338 [ 15.705185] kunit_try_run_case+0x170/0x3f0 [ 15.705633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.705968] kthread+0x328/0x630 [ 15.706182] ret_from_fork+0x10/0x20 [ 15.706226] [ 15.706410] The buggy address belongs to the object at fff00000c55f0920 [ 15.706410] which belongs to the cache kmalloc-16 of size 16 [ 15.706628] The buggy address is located 8 bytes inside of [ 15.706628] freed 16-byte region [fff00000c55f0920, fff00000c55f0930) [ 15.706743] [ 15.706874] The buggy address belongs to the physical page: [ 15.706909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0 [ 15.707099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.707339] page_type: f5(slab) [ 15.707397] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 15.707447] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.707876] page dumped because: kasan: bad access detected [ 15.708054] [ 15.708258] Memory state around the buggy address: [ 15.708320] fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.708479] fff00000c55f0880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.708631] >fff00000c55f0900: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 15.708715] ^ [ 15.708902] fff00000c55f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.709138] fff00000c55f0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.709209] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 15.684214] ================================================================== [ 15.684277] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 15.684606] Read of size 64 at addr fff00000c7816f84 by task kunit_try_catch/185 [ 15.684768] [ 15.684811] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.684921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.684959] Hardware name: linux,dummy-virt (DT) [ 15.684991] Call trace: [ 15.685013] show_stack+0x20/0x38 (C) [ 15.685063] dump_stack_lvl+0x8c/0xd0 [ 15.685158] print_report+0x118/0x608 [ 15.685205] kasan_report+0xdc/0x128 [ 15.685269] kasan_check_range+0x100/0x1a8 [ 15.685321] __asan_memmove+0x3c/0x98 [ 15.685366] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 15.685417] kunit_try_run_case+0x170/0x3f0 [ 15.685474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.685525] kthread+0x328/0x630 [ 15.685569] ret_from_fork+0x10/0x20 [ 15.685615] [ 15.685640] Allocated by task 185: [ 15.685669] kasan_save_stack+0x3c/0x68 [ 15.685722] kasan_save_track+0x20/0x40 [ 15.685758] kasan_save_alloc_info+0x40/0x58 [ 15.685797] __kasan_kmalloc+0xd4/0xd8 [ 15.685831] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.685871] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 15.685915] kunit_try_run_case+0x170/0x3f0 [ 15.686394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.686690] kthread+0x328/0x630 [ 15.686733] ret_from_fork+0x10/0x20 [ 15.686770] [ 15.686790] The buggy address belongs to the object at fff00000c7816f80 [ 15.686790] which belongs to the cache kmalloc-64 of size 64 [ 15.686855] The buggy address is located 4 bytes inside of [ 15.686855] allocated 64-byte region [fff00000c7816f80, fff00000c7816fc0) [ 15.686915] [ 15.686935] The buggy address belongs to the physical page: [ 15.687401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107816 [ 15.687542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.687753] page_type: f5(slab) [ 15.687841] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 15.688330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.688559] page dumped because: kasan: bad access detected [ 15.688643] [ 15.688747] Memory state around the buggy address: [ 15.688780] fff00000c7816e80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.689121] fff00000c7816f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.689249] >fff00000c7816f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.689426] ^ [ 15.689480] fff00000c7817000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.689768] fff00000c7817080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.690068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 15.662250] ================================================================== [ 15.662617] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 15.662852] Read of size 18446744073709551614 at addr fff00000c7816e04 by task kunit_try_catch/183 [ 15.663394] [ 15.663510] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.663609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.663828] Hardware name: linux,dummy-virt (DT) [ 15.663990] Call trace: [ 15.664109] show_stack+0x20/0x38 (C) [ 15.664214] dump_stack_lvl+0x8c/0xd0 [ 15.664322] print_report+0x118/0x608 [ 15.664406] kasan_report+0xdc/0x128 [ 15.664630] kasan_check_range+0x100/0x1a8 [ 15.665152] __asan_memmove+0x3c/0x98 [ 15.665399] kmalloc_memmove_negative_size+0x154/0x2e0 [ 15.665585] kunit_try_run_case+0x170/0x3f0 [ 15.665844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.666219] kthread+0x328/0x630 [ 15.666414] ret_from_fork+0x10/0x20 [ 15.666468] [ 15.666487] Allocated by task 183: [ 15.667803] kasan_save_stack+0x3c/0x68 [ 15.668001] kasan_save_track+0x20/0x40 [ 15.668235] kasan_save_alloc_info+0x40/0x58 [ 15.668306] __kasan_kmalloc+0xd4/0xd8 [ 15.668682] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.668748] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 15.668987] kunit_try_run_case+0x170/0x3f0 [ 15.669132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.669441] kthread+0x328/0x630 [ 15.669486] ret_from_fork+0x10/0x20 [ 15.669523] [ 15.669665] The buggy address belongs to the object at fff00000c7816e00 [ 15.669665] which belongs to the cache kmalloc-64 of size 64 [ 15.669887] The buggy address is located 4 bytes inside of [ 15.669887] 64-byte region [fff00000c7816e00, fff00000c7816e40) [ 15.670188] [ 15.670310] The buggy address belongs to the physical page: [ 15.670402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107816 [ 15.670467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.670627] page_type: f5(slab) [ 15.670674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 15.670724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.671130] page dumped because: kasan: bad access detected [ 15.671300] [ 15.671823] Memory state around the buggy address: [ 15.671885] fff00000c7816d00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 15.671966] fff00000c7816d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.672164] >fff00000c7816e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.672373] ^ [ 15.672410] fff00000c7816e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.672650] fff00000c7816f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.672910] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 15.644811] ================================================================== [ 15.644877] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 15.644933] Write of size 16 at addr fff00000c7811569 by task kunit_try_catch/181 [ 15.645158] [ 15.645368] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.645499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.645664] Hardware name: linux,dummy-virt (DT) [ 15.645699] Call trace: [ 15.645729] show_stack+0x20/0x38 (C) [ 15.645781] dump_stack_lvl+0x8c/0xd0 [ 15.645837] print_report+0x118/0x608 [ 15.646055] kasan_report+0xdc/0x128 [ 15.646177] kasan_check_range+0x100/0x1a8 [ 15.646433] __asan_memset+0x34/0x78 [ 15.646552] kmalloc_oob_memset_16+0x150/0x2f8 [ 15.646719] kunit_try_run_case+0x170/0x3f0 [ 15.646790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.646842] kthread+0x328/0x630 [ 15.646893] ret_from_fork+0x10/0x20 [ 15.646940] [ 15.646968] Allocated by task 181: [ 15.646997] kasan_save_stack+0x3c/0x68 [ 15.647035] kasan_save_track+0x20/0x40 [ 15.647539] kasan_save_alloc_info+0x40/0x58 [ 15.647615] __kasan_kmalloc+0xd4/0xd8 [ 15.647877] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.648097] kmalloc_oob_memset_16+0xb0/0x2f8 [ 15.648324] kunit_try_run_case+0x170/0x3f0 [ 15.648430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.648613] kthread+0x328/0x630 [ 15.648871] ret_from_fork+0x10/0x20 [ 15.649082] [ 15.649199] The buggy address belongs to the object at fff00000c7811500 [ 15.649199] which belongs to the cache kmalloc-128 of size 128 [ 15.649409] The buggy address is located 105 bytes inside of [ 15.649409] allocated 120-byte region [fff00000c7811500, fff00000c7811578) [ 15.649494] [ 15.649519] The buggy address belongs to the physical page: [ 15.649774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.649930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.650115] page_type: f5(slab) [ 15.650283] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.650382] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.650448] page dumped because: kasan: bad access detected [ 15.650627] [ 15.650784] Memory state around the buggy address: [ 15.650820] fff00000c7811400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.650864] fff00000c7811480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.650905] >fff00000c7811500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.651098] ^ [ 15.651142] fff00000c7811580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.651208] fff00000c7811600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.651245] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 15.628174] ================================================================== [ 15.628347] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 15.628414] Write of size 8 at addr fff00000c7811471 by task kunit_try_catch/179 [ 15.628462] [ 15.628493] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.628573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.628598] Hardware name: linux,dummy-virt (DT) [ 15.628629] Call trace: [ 15.628651] show_stack+0x20/0x38 (C) [ 15.628719] dump_stack_lvl+0x8c/0xd0 [ 15.628769] print_report+0x118/0x608 [ 15.628813] kasan_report+0xdc/0x128 [ 15.628866] kasan_check_range+0x100/0x1a8 [ 15.628911] __asan_memset+0x34/0x78 [ 15.629133] kmalloc_oob_memset_8+0x150/0x2f8 [ 15.629190] kunit_try_run_case+0x170/0x3f0 [ 15.629250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.629317] kthread+0x328/0x630 [ 15.629374] ret_from_fork+0x10/0x20 [ 15.629420] [ 15.629439] Allocated by task 179: [ 15.629467] kasan_save_stack+0x3c/0x68 [ 15.629510] kasan_save_track+0x20/0x40 [ 15.629545] kasan_save_alloc_info+0x40/0x58 [ 15.629582] __kasan_kmalloc+0xd4/0xd8 [ 15.629626] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.629664] kmalloc_oob_memset_8+0xb0/0x2f8 [ 15.629701] kunit_try_run_case+0x170/0x3f0 [ 15.629738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.629781] kthread+0x328/0x630 [ 15.629821] ret_from_fork+0x10/0x20 [ 15.629856] [ 15.629875] The buggy address belongs to the object at fff00000c7811400 [ 15.629875] which belongs to the cache kmalloc-128 of size 128 [ 15.629937] The buggy address is located 113 bytes inside of [ 15.629937] allocated 120-byte region [fff00000c7811400, fff00000c7811478) [ 15.630659] [ 15.631153] The buggy address belongs to the physical page: [ 15.631463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.631822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.632447] page_type: f5(slab) [ 15.632541] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.632637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.632893] page dumped because: kasan: bad access detected [ 15.632936] [ 15.632964] Memory state around the buggy address: [ 15.633412] fff00000c7811300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.633661] fff00000c7811380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.633861] >fff00000c7811400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.634093] ^ [ 15.634313] fff00000c7811480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.634393] fff00000c7811500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.634552] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 15.610307] ================================================================== [ 15.610445] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 15.610607] Write of size 4 at addr fff00000c7811375 by task kunit_try_catch/177 [ 15.610679] [ 15.610719] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.610799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.610825] Hardware name: linux,dummy-virt (DT) [ 15.610855] Call trace: [ 15.611051] show_stack+0x20/0x38 (C) [ 15.611444] dump_stack_lvl+0x8c/0xd0 [ 15.611586] print_report+0x118/0x608 [ 15.611710] kasan_report+0xdc/0x128 [ 15.611874] kasan_check_range+0x100/0x1a8 [ 15.612185] __asan_memset+0x34/0x78 [ 15.612287] kmalloc_oob_memset_4+0x150/0x300 [ 15.612408] kunit_try_run_case+0x170/0x3f0 [ 15.612579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.612634] kthread+0x328/0x630 [ 15.613019] ret_from_fork+0x10/0x20 [ 15.613135] [ 15.613232] Allocated by task 177: [ 15.613320] kasan_save_stack+0x3c/0x68 [ 15.613503] kasan_save_track+0x20/0x40 [ 15.613581] kasan_save_alloc_info+0x40/0x58 [ 15.613639] __kasan_kmalloc+0xd4/0xd8 [ 15.613860] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.614068] kmalloc_oob_memset_4+0xb0/0x300 [ 15.614131] kunit_try_run_case+0x170/0x3f0 [ 15.614233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.614416] kthread+0x328/0x630 [ 15.614514] ret_from_fork+0x10/0x20 [ 15.614550] [ 15.614569] The buggy address belongs to the object at fff00000c7811300 [ 15.614569] which belongs to the cache kmalloc-128 of size 128 [ 15.614623] The buggy address is located 117 bytes inside of [ 15.614623] allocated 120-byte region [fff00000c7811300, fff00000c7811378) [ 15.615129] [ 15.615195] The buggy address belongs to the physical page: [ 15.615229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.615605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.615701] page_type: f5(slab) [ 15.615800] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.615901] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.615990] page dumped because: kasan: bad access detected [ 15.616240] [ 15.616433] Memory state around the buggy address: [ 15.616689] fff00000c7811200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.617124] fff00000c7811280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.617180] >fff00000c7811300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.617565] ^ [ 15.617836] fff00000c7811380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.617911] fff00000c7811400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.618016] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 15.336502] ================================================================== [ 15.336572] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 15.336961] Read of size 1 at addr fff00000c7850000 by task kunit_try_catch/157 [ 15.337058] [ 15.337165] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.337289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.337315] Hardware name: linux,dummy-virt (DT) [ 15.337778] Call trace: [ 15.337854] show_stack+0x20/0x38 (C) [ 15.338078] dump_stack_lvl+0x8c/0xd0 [ 15.338153] print_report+0x118/0x608 [ 15.338473] kasan_report+0xdc/0x128 [ 15.338602] __asan_report_load1_noabort+0x20/0x30 [ 15.338653] page_alloc_uaf+0x328/0x350 [ 15.338698] kunit_try_run_case+0x170/0x3f0 [ 15.339092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.339287] kthread+0x328/0x630 [ 15.339508] ret_from_fork+0x10/0x20 [ 15.339699] [ 15.339722] The buggy address belongs to the physical page: [ 15.339963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850 [ 15.340189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.340422] page_type: f0(buddy) [ 15.340725] raw: 0bfffe0000000000 fff00000ff616020 fff00000ff616020 0000000000000000 [ 15.341133] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 15.341329] page dumped because: kasan: bad access detected [ 15.341585] [ 15.341624] Memory state around the buggy address: [ 15.341814] fff00000c784ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.341893] fff00000c784ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.342102] >fff00000c7850000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.342258] ^ [ 15.342307] fff00000c7850080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.342436] fff00000c7850100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.342701] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 15.593855] ================================================================== [ 15.593916] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 15.593991] Write of size 2 at addr fff00000c7811277 by task kunit_try_catch/175 [ 15.594038] [ 15.594072] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.594152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.594530] Hardware name: linux,dummy-virt (DT) [ 15.594868] Call trace: [ 15.594925] show_stack+0x20/0x38 (C) [ 15.595148] dump_stack_lvl+0x8c/0xd0 [ 15.595477] print_report+0x118/0x608 [ 15.595625] kasan_report+0xdc/0x128 [ 15.595699] kasan_check_range+0x100/0x1a8 [ 15.595886] __asan_memset+0x34/0x78 [ 15.596205] kmalloc_oob_memset_2+0x150/0x2f8 [ 15.596365] kunit_try_run_case+0x170/0x3f0 [ 15.596544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.596678] kthread+0x328/0x630 [ 15.596966] ret_from_fork+0x10/0x20 [ 15.597194] [ 15.597310] Allocated by task 175: [ 15.597582] kasan_save_stack+0x3c/0x68 [ 15.597892] kasan_save_track+0x20/0x40 [ 15.598124] kasan_save_alloc_info+0x40/0x58 [ 15.598301] __kasan_kmalloc+0xd4/0xd8 [ 15.598462] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.598504] kmalloc_oob_memset_2+0xb0/0x2f8 [ 15.598549] kunit_try_run_case+0x170/0x3f0 [ 15.598587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.598791] kthread+0x328/0x630 [ 15.599006] ret_from_fork+0x10/0x20 [ 15.599153] [ 15.599196] The buggy address belongs to the object at fff00000c7811200 [ 15.599196] which belongs to the cache kmalloc-128 of size 128 [ 15.599310] The buggy address is located 119 bytes inside of [ 15.599310] allocated 120-byte region [fff00000c7811200, fff00000c7811278) [ 15.599511] [ 15.599578] The buggy address belongs to the physical page: [ 15.599778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.600072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.600184] page_type: f5(slab) [ 15.600253] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.600420] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.600525] page dumped because: kasan: bad access detected [ 15.600712] [ 15.600845] Memory state around the buggy address: [ 15.601078] fff00000c7811100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.601196] fff00000c7811180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.601382] >fff00000c7811200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.601469] ^ [ 15.601681] fff00000c7811280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.601931] fff00000c7811300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.602156] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 15.573247] ================================================================== [ 15.573317] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 15.573464] Write of size 128 at addr fff00000c7811100 by task kunit_try_catch/173 [ 15.573557] [ 15.573908] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.574174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.574235] Hardware name: linux,dummy-virt (DT) [ 15.574353] Call trace: [ 15.574403] show_stack+0x20/0x38 (C) [ 15.574705] dump_stack_lvl+0x8c/0xd0 [ 15.574775] print_report+0x118/0x608 [ 15.575055] kasan_report+0xdc/0x128 [ 15.575163] kasan_check_range+0x100/0x1a8 [ 15.575464] __asan_memset+0x34/0x78 [ 15.575603] kmalloc_oob_in_memset+0x144/0x2d0 [ 15.575656] kunit_try_run_case+0x170/0x3f0 [ 15.576054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.576215] kthread+0x328/0x630 [ 15.576440] ret_from_fork+0x10/0x20 [ 15.576562] [ 15.576581] Allocated by task 173: [ 15.576792] kasan_save_stack+0x3c/0x68 [ 15.577131] kasan_save_track+0x20/0x40 [ 15.577340] kasan_save_alloc_info+0x40/0x58 [ 15.577895] __kasan_kmalloc+0xd4/0xd8 [ 15.578144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.578500] kmalloc_oob_in_memset+0xb0/0x2d0 [ 15.578583] kunit_try_run_case+0x170/0x3f0 [ 15.578623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.578692] kthread+0x328/0x630 [ 15.579080] ret_from_fork+0x10/0x20 [ 15.579442] [ 15.579539] The buggy address belongs to the object at fff00000c7811100 [ 15.579539] which belongs to the cache kmalloc-128 of size 128 [ 15.579645] The buggy address is located 0 bytes inside of [ 15.579645] allocated 120-byte region [fff00000c7811100, fff00000c7811178) [ 15.579767] [ 15.579914] The buggy address belongs to the physical page: [ 15.580028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.580163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.580260] page_type: f5(slab) [ 15.580477] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.580547] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.580657] page dumped because: kasan: bad access detected [ 15.580814] [ 15.580863] Memory state around the buggy address: [ 15.580908] fff00000c7811000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.580996] fff00000c7811080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.581037] >fff00000c7811100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.581075] ^ [ 15.581123] fff00000c7811180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.581171] fff00000c7811200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.581208] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 15.548924] ================================================================== [ 15.548998] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 15.549495] Read of size 16 at addr fff00000c55f0900 by task kunit_try_catch/171 [ 15.549565] [ 15.549929] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.550086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.550140] Hardware name: linux,dummy-virt (DT) [ 15.550643] Call trace: [ 15.550750] show_stack+0x20/0x38 (C) [ 15.550821] dump_stack_lvl+0x8c/0xd0 [ 15.550979] print_report+0x118/0x608 [ 15.551400] kasan_report+0xdc/0x128 [ 15.551479] __asan_report_load16_noabort+0x20/0x30 [ 15.551593] kmalloc_uaf_16+0x3bc/0x438 [ 15.551827] kunit_try_run_case+0x170/0x3f0 [ 15.552245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.552339] kthread+0x328/0x630 [ 15.552479] ret_from_fork+0x10/0x20 [ 15.553052] [ 15.553112] Allocated by task 171: [ 15.553209] kasan_save_stack+0x3c/0x68 [ 15.553326] kasan_save_track+0x20/0x40 [ 15.553448] kasan_save_alloc_info+0x40/0x58 [ 15.553650] __kasan_kmalloc+0xd4/0xd8 [ 15.553873] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.554195] kmalloc_uaf_16+0x140/0x438 [ 15.554358] kunit_try_run_case+0x170/0x3f0 [ 15.554415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.554668] kthread+0x328/0x630 [ 15.554729] ret_from_fork+0x10/0x20 [ 15.555108] [ 15.555224] Freed by task 171: [ 15.555319] kasan_save_stack+0x3c/0x68 [ 15.555417] kasan_save_track+0x20/0x40 [ 15.555717] kasan_save_free_info+0x4c/0x78 [ 15.555965] __kasan_slab_free+0x6c/0x98 [ 15.556117] kfree+0x214/0x3c8 [ 15.556293] kmalloc_uaf_16+0x190/0x438 [ 15.556334] kunit_try_run_case+0x170/0x3f0 [ 15.556659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.556864] kthread+0x328/0x630 [ 15.557437] ret_from_fork+0x10/0x20 [ 15.557697] [ 15.557887] The buggy address belongs to the object at fff00000c55f0900 [ 15.557887] which belongs to the cache kmalloc-16 of size 16 [ 15.557970] The buggy address is located 0 bytes inside of [ 15.557970] freed 16-byte region [fff00000c55f0900, fff00000c55f0910) [ 15.558231] [ 15.558263] The buggy address belongs to the physical page: [ 15.558295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0 [ 15.558351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.558399] page_type: f5(slab) [ 15.558445] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 15.558990] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.559063] page dumped because: kasan: bad access detected [ 15.559188] [ 15.559370] Memory state around the buggy address: [ 15.559561] fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.559762] fff00000c55f0880: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 15.559840] >fff00000c55f0900: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.560053] ^ [ 15.560223] fff00000c55f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.560274] fff00000c55f0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.560354] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 15.529745] ================================================================== [ 15.529849] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 15.530129] Write of size 16 at addr fff00000c55f08a0 by task kunit_try_catch/169 [ 15.530215] [ 15.530335] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.530417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.530718] Hardware name: linux,dummy-virt (DT) [ 15.530777] Call trace: [ 15.531012] show_stack+0x20/0x38 (C) [ 15.531144] dump_stack_lvl+0x8c/0xd0 [ 15.531276] print_report+0x118/0x608 [ 15.531418] kasan_report+0xdc/0x128 [ 15.531466] __asan_report_store16_noabort+0x20/0x30 [ 15.531913] kmalloc_oob_16+0x3a0/0x3f8 [ 15.531996] kunit_try_run_case+0x170/0x3f0 [ 15.532132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.532238] kthread+0x328/0x630 [ 15.532381] ret_from_fork+0x10/0x20 [ 15.532441] [ 15.532458] Allocated by task 169: [ 15.532791] kasan_save_stack+0x3c/0x68 [ 15.532914] kasan_save_track+0x20/0x40 [ 15.532964] kasan_save_alloc_info+0x40/0x58 [ 15.533376] __kasan_kmalloc+0xd4/0xd8 [ 15.533605] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.533703] kmalloc_oob_16+0xb4/0x3f8 [ 15.533832] kunit_try_run_case+0x170/0x3f0 [ 15.533882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.534234] kthread+0x328/0x630 [ 15.534488] ret_from_fork+0x10/0x20 [ 15.534610] [ 15.534663] The buggy address belongs to the object at fff00000c55f08a0 [ 15.534663] which belongs to the cache kmalloc-16 of size 16 [ 15.534760] The buggy address is located 0 bytes inside of [ 15.534760] allocated 13-byte region [fff00000c55f08a0, fff00000c55f08ad) [ 15.535016] [ 15.535166] The buggy address belongs to the physical page: [ 15.535228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0 [ 15.535367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.535559] page_type: f5(slab) [ 15.535647] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 15.535838] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.535906] page dumped because: kasan: bad access detected [ 15.536113] [ 15.536298] Memory state around the buggy address: [ 15.536808] fff00000c55f0780: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 15.537119] fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.537217] >fff00000c55f0880: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 15.537313] ^ [ 15.537361] fff00000c55f0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.537403] fff00000c55f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.537618] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 15.513103] ================================================================== [ 15.513151] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 15.513195] Read of size 1 at addr fff00000c4601000 by task kunit_try_catch/167 [ 15.513242] [ 15.513271] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.513380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.513408] Hardware name: linux,dummy-virt (DT) [ 15.513438] Call trace: [ 15.513459] show_stack+0x20/0x38 (C) [ 15.513504] dump_stack_lvl+0x8c/0xd0 [ 15.513551] print_report+0x118/0x608 [ 15.513594] kasan_report+0xdc/0x128 [ 15.513636] __asan_report_load1_noabort+0x20/0x30 [ 15.513698] krealloc_uaf+0x4c8/0x520 [ 15.513740] kunit_try_run_case+0x170/0x3f0 [ 15.513785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.513836] kthread+0x328/0x630 [ 15.513879] ret_from_fork+0x10/0x20 [ 15.513923] [ 15.513968] Allocated by task 167: [ 15.513997] kasan_save_stack+0x3c/0x68 [ 15.514033] kasan_save_track+0x20/0x40 [ 15.514067] kasan_save_alloc_info+0x40/0x58 [ 15.514102] __kasan_kmalloc+0xd4/0xd8 [ 15.514135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.515031] krealloc_uaf+0xc8/0x520 [ 15.515112] kunit_try_run_case+0x170/0x3f0 [ 15.515425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.515577] kthread+0x328/0x630 [ 15.515647] ret_from_fork+0x10/0x20 [ 15.515724] [ 15.515860] Freed by task 167: [ 15.516043] kasan_save_stack+0x3c/0x68 [ 15.516148] kasan_save_track+0x20/0x40 [ 15.516190] kasan_save_free_info+0x4c/0x78 [ 15.516479] __kasan_slab_free+0x6c/0x98 [ 15.516574] kfree+0x214/0x3c8 [ 15.516739] krealloc_uaf+0x12c/0x520 [ 15.516775] kunit_try_run_case+0x170/0x3f0 [ 15.517049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.517146] kthread+0x328/0x630 [ 15.517319] ret_from_fork+0x10/0x20 [ 15.517421] [ 15.517758] The buggy address belongs to the object at fff00000c4601000 [ 15.517758] which belongs to the cache kmalloc-256 of size 256 [ 15.517821] The buggy address is located 0 bytes inside of [ 15.517821] freed 256-byte region [fff00000c4601000, fff00000c4601100) [ 15.518184] [ 15.518337] The buggy address belongs to the physical page: [ 15.518369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.518427] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.518813] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.518934] page_type: f5(slab) [ 15.519059] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.519350] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.519469] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.519585] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.519668] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.520049] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.520371] page dumped because: kasan: bad access detected [ 15.520488] [ 15.520615] Memory state around the buggy address: [ 15.520762] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.521016] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.521138] >fff00000c4601000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.521284] ^ [ 15.521323] fff00000c4601080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.521725] fff00000c4601100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.521810] ================================================================== [ 15.501789] ================================================================== [ 15.502098] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 15.502288] Read of size 1 at addr fff00000c4601000 by task kunit_try_catch/167 [ 15.502463] [ 15.502538] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.502994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.503080] Hardware name: linux,dummy-virt (DT) [ 15.503255] Call trace: [ 15.503421] show_stack+0x20/0x38 (C) [ 15.503512] dump_stack_lvl+0x8c/0xd0 [ 15.503655] print_report+0x118/0x608 [ 15.503701] kasan_report+0xdc/0x128 [ 15.503767] __kasan_check_byte+0x54/0x70 [ 15.504110] krealloc_noprof+0x44/0x360 [ 15.504224] krealloc_uaf+0x180/0x520 [ 15.504391] kunit_try_run_case+0x170/0x3f0 [ 15.504443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.504715] kthread+0x328/0x630 [ 15.505126] ret_from_fork+0x10/0x20 [ 15.505259] [ 15.505292] Allocated by task 167: [ 15.505323] kasan_save_stack+0x3c/0x68 [ 15.505416] kasan_save_track+0x20/0x40 [ 15.505462] kasan_save_alloc_info+0x40/0x58 [ 15.505499] __kasan_kmalloc+0xd4/0xd8 [ 15.505541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.505577] krealloc_uaf+0xc8/0x520 [ 15.505609] kunit_try_run_case+0x170/0x3f0 [ 15.505646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.505687] kthread+0x328/0x630 [ 15.505728] ret_from_fork+0x10/0x20 [ 15.505763] [ 15.505781] Freed by task 167: [ 15.505812] kasan_save_stack+0x3c/0x68 [ 15.505846] kasan_save_track+0x20/0x40 [ 15.505879] kasan_save_free_info+0x4c/0x78 [ 15.505915] __kasan_slab_free+0x6c/0x98 [ 15.506180] kfree+0x214/0x3c8 [ 15.506447] krealloc_uaf+0x12c/0x520 [ 15.506512] kunit_try_run_case+0x170/0x3f0 [ 15.506573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.506716] kthread+0x328/0x630 [ 15.506777] ret_from_fork+0x10/0x20 [ 15.507052] [ 15.507099] The buggy address belongs to the object at fff00000c4601000 [ 15.507099] which belongs to the cache kmalloc-256 of size 256 [ 15.507499] The buggy address is located 0 bytes inside of [ 15.507499] freed 256-byte region [fff00000c4601000, fff00000c4601100) [ 15.507697] [ 15.507717] The buggy address belongs to the physical page: [ 15.507966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.508176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.508464] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.508653] page_type: f5(slab) [ 15.508752] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.508934] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.509445] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.509588] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.509694] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.509915] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.510100] page dumped because: kasan: bad access detected [ 15.510131] [ 15.510156] Memory state around the buggy address: [ 15.510565] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.510741] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.510944] >fff00000c4601000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.511310] ^ [ 15.511376] fff00000c4601080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.512070] fff00000c4601100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.512138] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 15.424051] ================================================================== [ 15.424174] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 15.424221] Write of size 1 at addr fff00000c4600eeb by task kunit_try_catch/161 [ 15.424509] [ 15.424590] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.424676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.424703] Hardware name: linux,dummy-virt (DT) [ 15.424778] Call trace: [ 15.424803] show_stack+0x20/0x38 (C) [ 15.424992] dump_stack_lvl+0x8c/0xd0 [ 15.425047] print_report+0x118/0x608 [ 15.425091] kasan_report+0xdc/0x128 [ 15.425173] __asan_report_store1_noabort+0x20/0x30 [ 15.425224] krealloc_less_oob_helper+0xa58/0xc50 [ 15.425270] krealloc_less_oob+0x20/0x38 [ 15.425312] kunit_try_run_case+0x170/0x3f0 [ 15.425780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.425857] kthread+0x328/0x630 [ 15.425903] ret_from_fork+0x10/0x20 [ 15.426177] [ 15.426369] Allocated by task 161: [ 15.426415] kasan_save_stack+0x3c/0x68 [ 15.426476] kasan_save_track+0x20/0x40 [ 15.426523] kasan_save_alloc_info+0x40/0x58 [ 15.426580] __kasan_krealloc+0x118/0x178 [ 15.426901] krealloc_noprof+0x128/0x360 [ 15.427147] krealloc_less_oob_helper+0x168/0xc50 [ 15.427308] krealloc_less_oob+0x20/0x38 [ 15.427426] kunit_try_run_case+0x170/0x3f0 [ 15.427472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.427897] kthread+0x328/0x630 [ 15.428177] ret_from_fork+0x10/0x20 [ 15.428312] [ 15.428352] The buggy address belongs to the object at fff00000c4600e00 [ 15.428352] which belongs to the cache kmalloc-256 of size 256 [ 15.428407] The buggy address is located 34 bytes to the right of [ 15.428407] allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9) [ 15.428479] [ 15.428499] The buggy address belongs to the physical page: [ 15.428535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.428588] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.428644] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.428694] page_type: f5(slab) [ 15.428731] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.428779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.428836] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.428892] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.428939] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.429006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.429049] page dumped because: kasan: bad access detected [ 15.429089] [ 15.429106] Memory state around the buggy address: [ 15.429142] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.429193] fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.429238] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.429280] ^ [ 15.429333] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.429394] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.429439] ================================================================== [ 15.464810] ================================================================== [ 15.464895] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 15.465263] Write of size 1 at addr fff00000c786e0c9 by task kunit_try_catch/165 [ 15.465331] [ 15.465367] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.465447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.465474] Hardware name: linux,dummy-virt (DT) [ 15.465505] Call trace: [ 15.465527] show_stack+0x20/0x38 (C) [ 15.465601] dump_stack_lvl+0x8c/0xd0 [ 15.465660] print_report+0x118/0x608 [ 15.465705] kasan_report+0xdc/0x128 [ 15.465747] __asan_report_store1_noabort+0x20/0x30 [ 15.465812] krealloc_less_oob_helper+0xa48/0xc50 [ 15.465858] krealloc_large_less_oob+0x20/0x38 [ 15.465903] kunit_try_run_case+0x170/0x3f0 [ 15.465989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.466051] kthread+0x328/0x630 [ 15.466097] ret_from_fork+0x10/0x20 [ 15.466364] [ 15.466401] The buggy address belongs to the physical page: [ 15.466638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 15.466697] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.466744] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.467228] page_type: f8(unknown) [ 15.467323] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.467574] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.467904] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.468065] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.468453] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 15.468552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.468816] page dumped because: kasan: bad access detected [ 15.468880] [ 15.468980] Memory state around the buggy address: [ 15.469072] fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.469399] fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.469487] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.469571] ^ [ 15.469894] fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.470099] fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.470144] ================================================================== [ 15.472049] ================================================================== [ 15.472114] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 15.472162] Write of size 1 at addr fff00000c786e0d0 by task kunit_try_catch/165 [ 15.472209] [ 15.472239] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.472583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.472741] Hardware name: linux,dummy-virt (DT) [ 15.472859] Call trace: [ 15.472884] show_stack+0x20/0x38 (C) [ 15.472961] dump_stack_lvl+0x8c/0xd0 [ 15.473040] print_report+0x118/0x608 [ 15.473112] kasan_report+0xdc/0x128 [ 15.473158] __asan_report_store1_noabort+0x20/0x30 [ 15.473251] krealloc_less_oob_helper+0xb9c/0xc50 [ 15.473441] krealloc_large_less_oob+0x20/0x38 [ 15.473599] kunit_try_run_case+0x170/0x3f0 [ 15.473722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.474001] kthread+0x328/0x630 [ 15.474064] ret_from_fork+0x10/0x20 [ 15.474112] [ 15.474131] The buggy address belongs to the physical page: [ 15.474173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 15.474516] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.474597] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.474697] page_type: f8(unknown) [ 15.474736] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.474881] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.475091] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.475460] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.475566] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 15.476016] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.476104] page dumped because: kasan: bad access detected [ 15.476156] [ 15.476326] Memory state around the buggy address: [ 15.476544] fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.476694] fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.476741] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.476778] ^ [ 15.476813] fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.477233] fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.477403] ================================================================== [ 15.392742] ================================================================== [ 15.393058] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 15.393185] Write of size 1 at addr fff00000c4600ed0 by task kunit_try_catch/161 [ 15.393279] [ 15.393317] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.393433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.393460] Hardware name: linux,dummy-virt (DT) [ 15.393489] Call trace: [ 15.393516] show_stack+0x20/0x38 (C) [ 15.393661] dump_stack_lvl+0x8c/0xd0 [ 15.393713] print_report+0x118/0x608 [ 15.393782] kasan_report+0xdc/0x128 [ 15.394147] __asan_report_store1_noabort+0x20/0x30 [ 15.394306] krealloc_less_oob_helper+0xb9c/0xc50 [ 15.394412] krealloc_less_oob+0x20/0x38 [ 15.394743] kunit_try_run_case+0x170/0x3f0 [ 15.394895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.395482] kthread+0x328/0x630 [ 15.395554] ret_from_fork+0x10/0x20 [ 15.395856] [ 15.395956] Allocated by task 161: [ 15.396102] kasan_save_stack+0x3c/0x68 [ 15.396329] kasan_save_track+0x20/0x40 [ 15.396523] kasan_save_alloc_info+0x40/0x58 [ 15.396586] __kasan_krealloc+0x118/0x178 [ 15.396621] krealloc_noprof+0x128/0x360 [ 15.396903] krealloc_less_oob_helper+0x168/0xc50 [ 15.397172] krealloc_less_oob+0x20/0x38 [ 15.397686] kunit_try_run_case+0x170/0x3f0 [ 15.397811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.398019] kthread+0x328/0x630 [ 15.398208] ret_from_fork+0x10/0x20 [ 15.398336] [ 15.398370] The buggy address belongs to the object at fff00000c4600e00 [ 15.398370] which belongs to the cache kmalloc-256 of size 256 [ 15.398433] The buggy address is located 7 bytes to the right of [ 15.398433] allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9) [ 15.398651] [ 15.398797] The buggy address belongs to the physical page: [ 15.399070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.399127] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.399229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.399537] page_type: f5(slab) [ 15.399698] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.400053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.400363] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.400444] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.400909] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.400987] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.401355] page dumped because: kasan: bad access detected [ 15.401441] [ 15.401459] Memory state around the buggy address: [ 15.401733] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402011] fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.402162] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.402203] ^ [ 15.402238] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402440] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402686] ================================================================== [ 15.479030] ================================================================== [ 15.479083] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 15.479128] Write of size 1 at addr fff00000c786e0da by task kunit_try_catch/165 [ 15.479478] [ 15.479545] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.479729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.479802] Hardware name: linux,dummy-virt (DT) [ 15.479835] Call trace: [ 15.479861] show_stack+0x20/0x38 (C) [ 15.479909] dump_stack_lvl+0x8c/0xd0 [ 15.479966] print_report+0x118/0x608 [ 15.480009] kasan_report+0xdc/0x128 [ 15.480052] __asan_report_store1_noabort+0x20/0x30 [ 15.480100] krealloc_less_oob_helper+0xa80/0xc50 [ 15.480145] krealloc_large_less_oob+0x20/0x38 [ 15.480189] kunit_try_run_case+0x170/0x3f0 [ 15.480236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.480296] kthread+0x328/0x630 [ 15.480340] ret_from_fork+0x10/0x20 [ 15.480394] [ 15.480414] The buggy address belongs to the physical page: [ 15.480448] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 15.480499] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.480546] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.480606] page_type: f8(unknown) [ 15.480648] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.480696] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.480748] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.480796] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.480843] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 15.480889] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.480936] page dumped because: kasan: bad access detected [ 15.480984] [ 15.481002] Memory state around the buggy address: [ 15.481146] fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.481199] fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.481854] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.481920] ^ [ 15.482194] fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.482255] fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.482293] ================================================================== [ 15.413370] ================================================================== [ 15.413488] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 15.413741] Write of size 1 at addr fff00000c4600eea by task kunit_try_catch/161 [ 15.413803] [ 15.413900] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.414006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.414032] Hardware name: linux,dummy-virt (DT) [ 15.414196] Call trace: [ 15.414375] show_stack+0x20/0x38 (C) [ 15.414438] dump_stack_lvl+0x8c/0xd0 [ 15.414485] print_report+0x118/0x608 [ 15.415000] kasan_report+0xdc/0x128 [ 15.415482] __asan_report_store1_noabort+0x20/0x30 [ 15.415834] krealloc_less_oob_helper+0xae4/0xc50 [ 15.416012] krealloc_less_oob+0x20/0x38 [ 15.416059] kunit_try_run_case+0x170/0x3f0 [ 15.416443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.416643] kthread+0x328/0x630 [ 15.416931] ret_from_fork+0x10/0x20 [ 15.417041] [ 15.417060] Allocated by task 161: [ 15.417575] kasan_save_stack+0x3c/0x68 [ 15.417748] kasan_save_track+0x20/0x40 [ 15.417980] kasan_save_alloc_info+0x40/0x58 [ 15.418377] __kasan_krealloc+0x118/0x178 [ 15.418585] krealloc_noprof+0x128/0x360 [ 15.418865] krealloc_less_oob_helper+0x168/0xc50 [ 15.419085] krealloc_less_oob+0x20/0x38 [ 15.419128] kunit_try_run_case+0x170/0x3f0 [ 15.419166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.419208] kthread+0x328/0x630 [ 15.419241] ret_from_fork+0x10/0x20 [ 15.419457] [ 15.419731] The buggy address belongs to the object at fff00000c4600e00 [ 15.419731] which belongs to the cache kmalloc-256 of size 256 [ 15.419893] The buggy address is located 33 bytes to the right of [ 15.419893] allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9) [ 15.420028] [ 15.420183] The buggy address belongs to the physical page: [ 15.420215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.420513] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.420701] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.421101] page_type: f5(slab) [ 15.421213] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.421684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.421768] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.422078] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.422142] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.422189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.422227] page dumped because: kasan: bad access detected [ 15.422257] [ 15.422275] Memory state around the buggy address: [ 15.422315] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.422358] fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.422399] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.422440] ^ [ 15.422480] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.422522] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.422558] ================================================================== [ 15.490717] ================================================================== [ 15.490770] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 15.490981] Write of size 1 at addr fff00000c786e0eb by task kunit_try_catch/165 [ 15.491169] [ 15.491223] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.491353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.491624] Hardware name: linux,dummy-virt (DT) [ 15.491672] Call trace: [ 15.491716] show_stack+0x20/0x38 (C) [ 15.491928] dump_stack_lvl+0x8c/0xd0 [ 15.492272] print_report+0x118/0x608 [ 15.492360] kasan_report+0xdc/0x128 [ 15.492405] __asan_report_store1_noabort+0x20/0x30 [ 15.492456] krealloc_less_oob_helper+0xa58/0xc50 [ 15.492503] krealloc_large_less_oob+0x20/0x38 [ 15.492547] kunit_try_run_case+0x170/0x3f0 [ 15.492593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.492647] kthread+0x328/0x630 [ 15.492694] ret_from_fork+0x10/0x20 [ 15.492739] [ 15.492874] The buggy address belongs to the physical page: [ 15.492913] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 15.492976] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.493022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.493070] page_type: f8(unknown) [ 15.493107] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.493154] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.493201] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.493256] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.493303] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 15.493349] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.493387] page dumped because: kasan: bad access detected [ 15.493416] [ 15.493433] Memory state around the buggy address: [ 15.493462] fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.493503] fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.493542] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.493578] ^ [ 15.493615] fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.493655] fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.493690] ================================================================== [ 15.404631] ================================================================== [ 15.404686] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 15.404926] Write of size 1 at addr fff00000c4600eda by task kunit_try_catch/161 [ 15.404988] [ 15.405018] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.405219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.405493] Hardware name: linux,dummy-virt (DT) [ 15.405537] Call trace: [ 15.405797] show_stack+0x20/0x38 (C) [ 15.406004] dump_stack_lvl+0x8c/0xd0 [ 15.406134] print_report+0x118/0x608 [ 15.406197] kasan_report+0xdc/0x128 [ 15.406270] __asan_report_store1_noabort+0x20/0x30 [ 15.406613] krealloc_less_oob_helper+0xa80/0xc50 [ 15.406794] krealloc_less_oob+0x20/0x38 [ 15.407060] kunit_try_run_case+0x170/0x3f0 [ 15.407150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.407323] kthread+0x328/0x630 [ 15.407577] ret_from_fork+0x10/0x20 [ 15.407807] [ 15.407912] Allocated by task 161: [ 15.408126] kasan_save_stack+0x3c/0x68 [ 15.408312] kasan_save_track+0x20/0x40 [ 15.408379] kasan_save_alloc_info+0x40/0x58 [ 15.408772] __kasan_krealloc+0x118/0x178 [ 15.408854] krealloc_noprof+0x128/0x360 [ 15.409042] krealloc_less_oob_helper+0x168/0xc50 [ 15.409083] krealloc_less_oob+0x20/0x38 [ 15.409188] kunit_try_run_case+0x170/0x3f0 [ 15.409228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.409280] kthread+0x328/0x630 [ 15.409315] ret_from_fork+0x10/0x20 [ 15.409359] [ 15.409392] The buggy address belongs to the object at fff00000c4600e00 [ 15.409392] which belongs to the cache kmalloc-256 of size 256 [ 15.409449] The buggy address is located 17 bytes to the right of [ 15.409449] allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9) [ 15.409510] [ 15.409529] The buggy address belongs to the physical page: [ 15.409561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.409632] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.409684] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.409734] page_type: f5(slab) [ 15.409777] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.409834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.409881] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.409935] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.410002] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.410057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.410109] page dumped because: kasan: bad access detected [ 15.410423] [ 15.410465] Memory state around the buggy address: [ 15.410703] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.410766] fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.410807] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.411162] ^ [ 15.411282] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.411553] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.411911] ================================================================== [ 15.483500] ================================================================== [ 15.483552] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 15.483834] Write of size 1 at addr fff00000c786e0ea by task kunit_try_catch/165 [ 15.483909] [ 15.483940] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.484400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.484443] Hardware name: linux,dummy-virt (DT) [ 15.484672] Call trace: [ 15.484720] show_stack+0x20/0x38 (C) [ 15.484889] dump_stack_lvl+0x8c/0xd0 [ 15.484941] print_report+0x118/0x608 [ 15.485059] kasan_report+0xdc/0x128 [ 15.485104] __asan_report_store1_noabort+0x20/0x30 [ 15.485191] krealloc_less_oob_helper+0xae4/0xc50 [ 15.485329] krealloc_large_less_oob+0x20/0x38 [ 15.485394] kunit_try_run_case+0x170/0x3f0 [ 15.485650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.485722] kthread+0x328/0x630 [ 15.485804] ret_from_fork+0x10/0x20 [ 15.485919] [ 15.486162] The buggy address belongs to the physical page: [ 15.486233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 15.486319] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.486413] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.486593] page_type: f8(unknown) [ 15.487050] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.487282] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.487506] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.487614] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.488032] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 15.488130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.488337] page dumped because: kasan: bad access detected [ 15.488384] [ 15.488412] Memory state around the buggy address: [ 15.488625] fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.488757] fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.488880] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 15.489377] ^ [ 15.489470] fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.489569] fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.489679] ================================================================== [ 15.384584] ================================================================== [ 15.384644] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 15.384905] Write of size 1 at addr fff00000c4600ec9 by task kunit_try_catch/161 [ 15.385203] [ 15.385258] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.385423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.385500] Hardware name: linux,dummy-virt (DT) [ 15.385532] Call trace: [ 15.385553] show_stack+0x20/0x38 (C) [ 15.385782] dump_stack_lvl+0x8c/0xd0 [ 15.386101] print_report+0x118/0x608 [ 15.386192] kasan_report+0xdc/0x128 [ 15.386402] __asan_report_store1_noabort+0x20/0x30 [ 15.386645] krealloc_less_oob_helper+0xa48/0xc50 [ 15.386895] krealloc_less_oob+0x20/0x38 [ 15.387124] kunit_try_run_case+0x170/0x3f0 [ 15.387255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.387310] kthread+0x328/0x630 [ 15.387355] ret_from_fork+0x10/0x20 [ 15.387403] [ 15.387421] Allocated by task 161: [ 15.387450] kasan_save_stack+0x3c/0x68 [ 15.387505] kasan_save_track+0x20/0x40 [ 15.387549] kasan_save_alloc_info+0x40/0x58 [ 15.387592] __kasan_krealloc+0x118/0x178 [ 15.387643] krealloc_noprof+0x128/0x360 [ 15.387680] krealloc_less_oob_helper+0x168/0xc50 [ 15.387716] krealloc_less_oob+0x20/0x38 [ 15.387749] kunit_try_run_case+0x170/0x3f0 [ 15.387797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.387840] kthread+0x328/0x630 [ 15.387874] ret_from_fork+0x10/0x20 [ 15.387918] [ 15.387937] The buggy address belongs to the object at fff00000c4600e00 [ 15.387937] which belongs to the cache kmalloc-256 of size 256 [ 15.388002] The buggy address is located 0 bytes to the right of [ 15.388002] allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9) [ 15.388072] [ 15.388092] The buggy address belongs to the physical page: [ 15.388124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.388185] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.388242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.388295] page_type: f5(slab) [ 15.388332] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.388391] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.388454] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.388506] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.388563] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.388609] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.388666] page dumped because: kasan: bad access detected [ 15.388708] [ 15.388726] Memory state around the buggy address: [ 15.388766] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.388814] fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.388854] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 15.388890] ^ [ 15.388934] fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.389239] fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.389289] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 15.349892] ================================================================== [ 15.349977] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 15.350029] Write of size 1 at addr fff00000c4600ceb by task kunit_try_catch/159 [ 15.350251] [ 15.350358] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.350467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.350494] Hardware name: linux,dummy-virt (DT) [ 15.350524] Call trace: [ 15.350547] show_stack+0x20/0x38 (C) [ 15.350597] dump_stack_lvl+0x8c/0xd0 [ 15.350644] print_report+0x118/0x608 [ 15.350688] kasan_report+0xdc/0x128 [ 15.351020] __asan_report_store1_noabort+0x20/0x30 [ 15.351246] krealloc_more_oob_helper+0x60c/0x678 [ 15.351546] krealloc_more_oob+0x20/0x38 [ 15.351603] kunit_try_run_case+0x170/0x3f0 [ 15.351879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.352027] kthread+0x328/0x630 [ 15.352236] ret_from_fork+0x10/0x20 [ 15.352371] [ 15.352483] Allocated by task 159: [ 15.352517] kasan_save_stack+0x3c/0x68 [ 15.352958] kasan_save_track+0x20/0x40 [ 15.353286] kasan_save_alloc_info+0x40/0x58 [ 15.353405] __kasan_krealloc+0x118/0x178 [ 15.353444] krealloc_noprof+0x128/0x360 [ 15.353683] krealloc_more_oob_helper+0x168/0x678 [ 15.353750] krealloc_more_oob+0x20/0x38 [ 15.354115] kunit_try_run_case+0x170/0x3f0 [ 15.354375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.354427] kthread+0x328/0x630 [ 15.354463] ret_from_fork+0x10/0x20 [ 15.354497] [ 15.354519] The buggy address belongs to the object at fff00000c4600c00 [ 15.354519] which belongs to the cache kmalloc-256 of size 256 [ 15.354876] The buggy address is located 0 bytes to the right of [ 15.354876] allocated 235-byte region [fff00000c4600c00, fff00000c4600ceb) [ 15.355060] [ 15.355186] The buggy address belongs to the physical page: [ 15.355303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.355620] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.355827] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.356593] page_type: f5(slab) [ 15.356652] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.356722] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.357141] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.357268] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.357873] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.358122] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.358293] page dumped because: kasan: bad access detected [ 15.358462] [ 15.358590] Memory state around the buggy address: [ 15.358625] fff00000c4600b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359038] fff00000c4600c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.359238] >fff00000c4600c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 15.359356] ^ [ 15.359445] fff00000c4600d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359549] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359776] ================================================================== [ 15.444869] ================================================================== [ 15.444913] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 15.444969] Write of size 1 at addr fff00000c786a0f0 by task kunit_try_catch/163 [ 15.445419] [ 15.445466] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.445672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.445893] Hardware name: linux,dummy-virt (DT) [ 15.445930] Call trace: [ 15.446118] show_stack+0x20/0x38 (C) [ 15.446230] dump_stack_lvl+0x8c/0xd0 [ 15.446411] print_report+0x118/0x608 [ 15.446730] kasan_report+0xdc/0x128 [ 15.446986] __asan_report_store1_noabort+0x20/0x30 [ 15.447107] krealloc_more_oob_helper+0x5c0/0x678 [ 15.447278] krealloc_large_more_oob+0x20/0x38 [ 15.447545] kunit_try_run_case+0x170/0x3f0 [ 15.447654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.447890] kthread+0x328/0x630 [ 15.448082] ret_from_fork+0x10/0x20 [ 15.448297] [ 15.448418] The buggy address belongs to the physical page: [ 15.448455] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868 [ 15.448528] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.448909] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.449042] page_type: f8(unknown) [ 15.449144] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.449573] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.449909] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.450175] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.450406] head: 0bfffe0000000002 ffffc1ffc31e1a01 00000000ffffffff 00000000ffffffff [ 15.450572] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.450923] page dumped because: kasan: bad access detected [ 15.451247] [ 15.451374] Memory state around the buggy address: [ 15.451407] fff00000c7869f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.451514] fff00000c786a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.451836] >fff00000c786a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 15.452036] ^ [ 15.452190] fff00000c786a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.452304] fff00000c786a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.452566] ================================================================== [ 15.440970] ================================================================== [ 15.441029] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 15.441463] Write of size 1 at addr fff00000c786a0eb by task kunit_try_catch/163 [ 15.441587] [ 15.441688] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.441778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.441864] Hardware name: linux,dummy-virt (DT) [ 15.441897] Call trace: [ 15.441918] show_stack+0x20/0x38 (C) [ 15.441980] dump_stack_lvl+0x8c/0xd0 [ 15.442029] print_report+0x118/0x608 [ 15.442468] kasan_report+0xdc/0x128 [ 15.442635] __asan_report_store1_noabort+0x20/0x30 [ 15.442816] krealloc_more_oob_helper+0x60c/0x678 [ 15.442867] krealloc_large_more_oob+0x20/0x38 [ 15.442914] kunit_try_run_case+0x170/0x3f0 [ 15.442981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.443149] kthread+0x328/0x630 [ 15.443233] ret_from_fork+0x10/0x20 [ 15.443296] [ 15.443322] The buggy address belongs to the physical page: [ 15.443359] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868 [ 15.443431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.443478] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.443530] page_type: f8(unknown) [ 15.443569] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.443642] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.443690] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.443736] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.443798] head: 0bfffe0000000002 ffffc1ffc31e1a01 00000000ffffffff 00000000ffffffff [ 15.443844] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.443882] page dumped because: kasan: bad access detected [ 15.443928] [ 15.443957] Memory state around the buggy address: [ 15.443996] fff00000c7869f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.444048] fff00000c786a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.444088] >fff00000c786a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 15.444132] ^ [ 15.444169] fff00000c786a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.444209] fff00000c786a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.444245] ================================================================== [ 15.361840] ================================================================== [ 15.361899] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 15.362128] Write of size 1 at addr fff00000c4600cf0 by task kunit_try_catch/159 [ 15.362228] [ 15.362262] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.362349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.362375] Hardware name: linux,dummy-virt (DT) [ 15.362404] Call trace: [ 15.362841] show_stack+0x20/0x38 (C) [ 15.362909] dump_stack_lvl+0x8c/0xd0 [ 15.363218] print_report+0x118/0x608 [ 15.363354] kasan_report+0xdc/0x128 [ 15.363445] __asan_report_store1_noabort+0x20/0x30 [ 15.363699] krealloc_more_oob_helper+0x5c0/0x678 [ 15.363925] krealloc_more_oob+0x20/0x38 [ 15.364455] kunit_try_run_case+0x170/0x3f0 [ 15.364596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.364822] kthread+0x328/0x630 [ 15.364900] ret_from_fork+0x10/0x20 [ 15.365242] [ 15.365285] Allocated by task 159: [ 15.365318] kasan_save_stack+0x3c/0x68 [ 15.365514] kasan_save_track+0x20/0x40 [ 15.365651] kasan_save_alloc_info+0x40/0x58 [ 15.365872] __kasan_krealloc+0x118/0x178 [ 15.366131] krealloc_noprof+0x128/0x360 [ 15.366342] krealloc_more_oob_helper+0x168/0x678 [ 15.366713] krealloc_more_oob+0x20/0x38 [ 15.366967] kunit_try_run_case+0x170/0x3f0 [ 15.367051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.367234] kthread+0x328/0x630 [ 15.367273] ret_from_fork+0x10/0x20 [ 15.367487] [ 15.367663] The buggy address belongs to the object at fff00000c4600c00 [ 15.367663] which belongs to the cache kmalloc-256 of size 256 [ 15.367731] The buggy address is located 5 bytes to the right of [ 15.367731] allocated 235-byte region [fff00000c4600c00, fff00000c4600ceb) [ 15.368001] [ 15.368027] The buggy address belongs to the physical page: [ 15.368271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600 [ 15.368427] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.368830] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.369088] page_type: f5(slab) [ 15.369450] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.369725] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.369910] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 15.369980] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.370028] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff [ 15.370092] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 15.370133] page dumped because: kasan: bad access detected [ 15.370324] [ 15.370357] Memory state around the buggy address: [ 15.370402] fff00000c4600b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.370450] fff00000c4600c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.370702] >fff00000c4600c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 15.370972] ^ [ 15.371109] fff00000c4600d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.371183] fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.371247] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 15.312420] ================================================================== [ 15.312511] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 15.312573] Free of addr fff00000c65c0001 by task kunit_try_catch/153 [ 15.312630] [ 15.312662] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.312747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.312773] Hardware name: linux,dummy-virt (DT) [ 15.312808] Call trace: [ 15.312830] show_stack+0x20/0x38 (C) [ 15.312887] dump_stack_lvl+0x8c/0xd0 [ 15.312935] print_report+0x118/0x608 [ 15.313164] kasan_report_invalid_free+0xc0/0xe8 [ 15.313225] __kasan_kfree_large+0x5c/0xa8 [ 15.313270] free_large_kmalloc+0x64/0x190 [ 15.313459] kfree+0x270/0x3c8 [ 15.313655] kmalloc_large_invalid_free+0x108/0x270 [ 15.313715] kunit_try_run_case+0x170/0x3f0 [ 15.313764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.313833] kthread+0x328/0x630 [ 15.313877] ret_from_fork+0x10/0x20 [ 15.313922] [ 15.314217] The buggy address belongs to the physical page: [ 15.314459] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0 [ 15.314516] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.314888] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.314962] page_type: f8(unknown) [ 15.315178] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.315473] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.315534] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.315590] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.315805] head: 0bfffe0000000002 ffffc1ffc3197001 00000000ffffffff 00000000ffffffff [ 15.315970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.316182] page dumped because: kasan: bad access detected [ 15.316345] [ 15.316477] Memory state around the buggy address: [ 15.316510] fff00000c65bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.316596] fff00000c65bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.316823] >fff00000c65c0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.317181] ^ [ 15.317391] fff00000c65c0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.317461] fff00000c65c0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.317794] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 15.292630] ================================================================== [ 15.292693] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 15.292745] Read of size 1 at addr fff00000c65bc000 by task kunit_try_catch/151 [ 15.292792] [ 15.292822] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.292901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.292926] Hardware name: linux,dummy-virt (DT) [ 15.293451] Call trace: [ 15.293745] show_stack+0x20/0x38 (C) [ 15.293835] dump_stack_lvl+0x8c/0xd0 [ 15.293894] print_report+0x118/0x608 [ 15.293937] kasan_report+0xdc/0x128 [ 15.294201] __asan_report_load1_noabort+0x20/0x30 [ 15.294330] kmalloc_large_uaf+0x2cc/0x2f8 [ 15.294380] kunit_try_run_case+0x170/0x3f0 [ 15.294432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.294483] kthread+0x328/0x630 [ 15.294931] ret_from_fork+0x10/0x20 [ 15.295210] [ 15.295507] The buggy address belongs to the physical page: [ 15.296051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bc [ 15.296283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.296384] raw: 0bfffe0000000000 ffffc1ffc3197008 fff00000da4a1e00 0000000000000000 [ 15.296616] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 15.296709] page dumped because: kasan: bad access detected [ 15.296980] [ 15.297054] Memory state around the buggy address: [ 15.297224] fff00000c65bbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.297608] fff00000c65bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.297727] >fff00000c65bc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.297796] ^ [ 15.297824] fff00000c65bc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.298081] fff00000c65bc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.298317] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 15.277540] ================================================================== [ 15.277696] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 15.277759] Write of size 1 at addr fff00000c65be00a by task kunit_try_catch/149 [ 15.277916] [ 15.277967] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.278057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.278083] Hardware name: linux,dummy-virt (DT) [ 15.278249] Call trace: [ 15.278343] show_stack+0x20/0x38 (C) [ 15.278689] dump_stack_lvl+0x8c/0xd0 [ 15.278911] print_report+0x118/0x608 [ 15.278978] kasan_report+0xdc/0x128 [ 15.279365] __asan_report_store1_noabort+0x20/0x30 [ 15.279512] kmalloc_large_oob_right+0x278/0x2b8 [ 15.279663] kunit_try_run_case+0x170/0x3f0 [ 15.279827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.280004] kthread+0x328/0x630 [ 15.280240] ret_from_fork+0x10/0x20 [ 15.280371] [ 15.280748] The buggy address belongs to the physical page: [ 15.280885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bc [ 15.281153] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.281368] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.281500] page_type: f8(unknown) [ 15.281635] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.281762] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.281879] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.282122] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.282245] head: 0bfffe0000000002 ffffc1ffc3196f01 00000000ffffffff 00000000ffffffff [ 15.282413] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.282588] page dumped because: kasan: bad access detected [ 15.282758] [ 15.282812] Memory state around the buggy address: [ 15.282845] fff00000c65bdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.282912] fff00000c65bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.282961] >fff00000c65be000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.283311] ^ [ 15.283407] fff00000c65be080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.283460] fff00000c65be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.283501] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 15.252243] ================================================================== [ 15.252308] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 15.252387] Write of size 1 at addr fff00000c7839f00 by task kunit_try_catch/147 [ 15.252441] [ 15.252475] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.252557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.252582] Hardware name: linux,dummy-virt (DT) [ 15.252628] Call trace: [ 15.252652] show_stack+0x20/0x38 (C) [ 15.252708] dump_stack_lvl+0x8c/0xd0 [ 15.252757] print_report+0x118/0x608 [ 15.252799] kasan_report+0xdc/0x128 [ 15.252841] __asan_report_store1_noabort+0x20/0x30 [ 15.252889] kmalloc_big_oob_right+0x2a4/0x2f0 [ 15.252957] kunit_try_run_case+0x170/0x3f0 [ 15.253280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.253333] kthread+0x328/0x630 [ 15.254205] ret_from_fork+0x10/0x20 [ 15.254281] [ 15.254302] Allocated by task 147: [ 15.254331] kasan_save_stack+0x3c/0x68 [ 15.254370] kasan_save_track+0x20/0x40 [ 15.254405] kasan_save_alloc_info+0x40/0x58 [ 15.254611] __kasan_kmalloc+0xd4/0xd8 [ 15.255027] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.255393] kmalloc_big_oob_right+0xb8/0x2f0 [ 15.255477] kunit_try_run_case+0x170/0x3f0 [ 15.255548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.255702] kthread+0x328/0x630 [ 15.255873] ret_from_fork+0x10/0x20 [ 15.256080] [ 15.256223] The buggy address belongs to the object at fff00000c7838000 [ 15.256223] which belongs to the cache kmalloc-8k of size 8192 [ 15.256322] The buggy address is located 0 bytes to the right of [ 15.256322] allocated 7936-byte region [fff00000c7838000, fff00000c7839f00) [ 15.256573] [ 15.256856] The buggy address belongs to the physical page: [ 15.257104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107838 [ 15.257376] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.257440] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.257492] page_type: f5(slab) [ 15.257743] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 15.258032] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 15.258387] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 15.258530] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 15.258598] head: 0bfffe0000000003 ffffc1ffc31e0e01 00000000ffffffff 00000000ffffffff [ 15.258645] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 15.258957] page dumped because: kasan: bad access detected [ 15.259102] [ 15.259172] Memory state around the buggy address: [ 15.259520] fff00000c7839e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.259660] fff00000c7839e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.259813] >fff00000c7839f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.259852] ^ [ 15.259880] fff00000c7839f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.260296] fff00000c783a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.260394] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 15.225895] ================================================================== [ 15.225965] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 15.226379] Write of size 1 at addr fff00000c3ec5f78 by task kunit_try_catch/145 [ 15.226455] [ 15.226577] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.226715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.226748] Hardware name: linux,dummy-virt (DT) [ 15.227104] Call trace: [ 15.227283] show_stack+0x20/0x38 (C) [ 15.227478] dump_stack_lvl+0x8c/0xd0 [ 15.227714] print_report+0x118/0x608 [ 15.227987] kasan_report+0xdc/0x128 [ 15.228499] __asan_report_store1_noabort+0x20/0x30 [ 15.228644] kmalloc_track_caller_oob_right+0x40c/0x488 [ 15.229167] kunit_try_run_case+0x170/0x3f0 [ 15.229242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.229753] kthread+0x328/0x630 [ 15.230012] ret_from_fork+0x10/0x20 [ 15.230076] [ 15.230472] Allocated by task 145: [ 15.230807] kasan_save_stack+0x3c/0x68 [ 15.230881] kasan_save_track+0x20/0x40 [ 15.231074] kasan_save_alloc_info+0x40/0x58 [ 15.231199] __kasan_kmalloc+0xd4/0xd8 [ 15.231263] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 15.231458] kmalloc_track_caller_oob_right+0xa8/0x488 [ 15.231591] kunit_try_run_case+0x170/0x3f0 [ 15.231671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.231856] kthread+0x328/0x630 [ 15.232093] ret_from_fork+0x10/0x20 [ 15.232204] [ 15.232342] The buggy address belongs to the object at fff00000c3ec5f00 [ 15.232342] which belongs to the cache kmalloc-128 of size 128 [ 15.232573] The buggy address is located 0 bytes to the right of [ 15.232573] allocated 120-byte region [fff00000c3ec5f00, fff00000c3ec5f78) [ 15.232685] [ 15.232732] The buggy address belongs to the physical page: [ 15.232915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5 [ 15.233111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.233165] page_type: f5(slab) [ 15.233249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.233300] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.233377] page dumped because: kasan: bad access detected [ 15.233408] [ 15.233425] Memory state around the buggy address: [ 15.233465] fff00000c3ec5e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.233507] fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.233557] >fff00000c3ec5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.233593] ^ [ 15.233641] fff00000c3ec5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.233688] fff00000c3ec6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.233723] ================================================================== [ 15.235376] ================================================================== [ 15.235433] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 15.235480] Write of size 1 at addr fff00000c7811078 by task kunit_try_catch/145 [ 15.235830] [ 15.235987] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.236284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.236327] Hardware name: linux,dummy-virt (DT) [ 15.236421] Call trace: [ 15.236446] show_stack+0x20/0x38 (C) [ 15.236533] dump_stack_lvl+0x8c/0xd0 [ 15.236703] print_report+0x118/0x608 [ 15.236764] kasan_report+0xdc/0x128 [ 15.237071] __asan_report_store1_noabort+0x20/0x30 [ 15.237311] kmalloc_track_caller_oob_right+0x418/0x488 [ 15.237383] kunit_try_run_case+0x170/0x3f0 [ 15.237470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.237523] kthread+0x328/0x630 [ 15.237653] ret_from_fork+0x10/0x20 [ 15.237702] [ 15.237720] Allocated by task 145: [ 15.238046] kasan_save_stack+0x3c/0x68 [ 15.238110] kasan_save_track+0x20/0x40 [ 15.238146] kasan_save_alloc_info+0x40/0x58 [ 15.238311] __kasan_kmalloc+0xd4/0xd8 [ 15.238392] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 15.238464] kmalloc_track_caller_oob_right+0x184/0x488 [ 15.238519] kunit_try_run_case+0x170/0x3f0 [ 15.238556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.238597] kthread+0x328/0x630 [ 15.238631] ret_from_fork+0x10/0x20 [ 15.238665] [ 15.238683] The buggy address belongs to the object at fff00000c7811000 [ 15.238683] which belongs to the cache kmalloc-128 of size 128 [ 15.238737] The buggy address is located 0 bytes to the right of [ 15.238737] allocated 120-byte region [fff00000c7811000, fff00000c7811078) [ 15.238797] [ 15.239304] The buggy address belongs to the physical page: [ 15.239459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811 [ 15.239553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.239679] page_type: f5(slab) [ 15.239718] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.240046] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.240182] page dumped because: kasan: bad access detected [ 15.240290] [ 15.240350] Memory state around the buggy address: [ 15.240483] fff00000c7810f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.240556] fff00000c7810f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.240607] >fff00000c7811000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.240644] ^ [ 15.240978] fff00000c7811080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.241134] fff00000c7811100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.241341] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 15.206739] ================================================================== [ 15.206829] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 15.206882] Read of size 1 at addr fff00000c4767000 by task kunit_try_catch/143 [ 15.206930] [ 15.207137] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.207387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.207514] Hardware name: linux,dummy-virt (DT) [ 15.207612] Call trace: [ 15.207728] show_stack+0x20/0x38 (C) [ 15.207902] dump_stack_lvl+0x8c/0xd0 [ 15.208298] print_report+0x118/0x608 [ 15.208381] kasan_report+0xdc/0x128 [ 15.208527] __asan_report_load1_noabort+0x20/0x30 [ 15.208753] kmalloc_node_oob_right+0x2f4/0x330 [ 15.208883] kunit_try_run_case+0x170/0x3f0 [ 15.209485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.209797] kthread+0x328/0x630 [ 15.209857] ret_from_fork+0x10/0x20 [ 15.210166] [ 15.210315] Allocated by task 143: [ 15.210510] kasan_save_stack+0x3c/0x68 [ 15.210723] kasan_save_track+0x20/0x40 [ 15.210973] kasan_save_alloc_info+0x40/0x58 [ 15.211210] __kasan_kmalloc+0xd4/0xd8 [ 15.211332] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 15.211565] kmalloc_node_oob_right+0xbc/0x330 [ 15.211690] kunit_try_run_case+0x170/0x3f0 [ 15.211804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.211876] kthread+0x328/0x630 [ 15.212271] ret_from_fork+0x10/0x20 [ 15.212445] [ 15.212533] The buggy address belongs to the object at fff00000c4766000 [ 15.212533] which belongs to the cache kmalloc-4k of size 4096 [ 15.212749] The buggy address is located 0 bytes to the right of [ 15.212749] allocated 4096-byte region [fff00000c4766000, fff00000c4767000) [ 15.212822] [ 15.213035] The buggy address belongs to the physical page: [ 15.213734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104760 [ 15.215324] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.215425] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 15.215724] page_type: f5(slab) [ 15.215803] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 15.215853] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 15.216149] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 15.216618] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 15.216729] head: 0bfffe0000000003 ffffc1ffc311d801 00000000ffffffff 00000000ffffffff [ 15.216853] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 15.216934] page dumped because: kasan: bad access detected [ 15.216999] [ 15.217016] Memory state around the buggy address: [ 15.217054] fff00000c4766f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.217097] fff00000c4766f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.217153] >fff00000c4767000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.217189] ^ [ 15.217216] fff00000c4767080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.217271] fff00000c4767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.217308] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 15.185888] ================================================================== [ 15.186382] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 15.186783] Read of size 1 at addr fff00000c55f087f by task kunit_try_catch/141 [ 15.186871] [ 15.186924] CPU: 1 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.187718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.187784] Hardware name: linux,dummy-virt (DT) [ 15.187825] Call trace: [ 15.187904] show_stack+0x20/0x38 (C) [ 15.188282] dump_stack_lvl+0x8c/0xd0 [ 15.188506] print_report+0x118/0x608 [ 15.188751] kasan_report+0xdc/0x128 [ 15.189061] __asan_report_load1_noabort+0x20/0x30 [ 15.189181] kmalloc_oob_left+0x2ec/0x320 [ 15.189530] kunit_try_run_case+0x170/0x3f0 [ 15.189590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.189642] kthread+0x328/0x630 [ 15.189687] ret_from_fork+0x10/0x20 [ 15.189801] [ 15.189826] Allocated by task 26: [ 15.189858] kasan_save_stack+0x3c/0x68 [ 15.189896] kasan_save_track+0x20/0x40 [ 15.189958] kasan_save_alloc_info+0x40/0x58 [ 15.189995] __kasan_kmalloc+0xd4/0xd8 [ 15.190028] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 15.190076] kstrdup+0x54/0xc8 [ 15.190111] devtmpfs_work_loop+0x6f8/0xa58 [ 15.190467] devtmpfsd+0x50/0x58 [ 15.190794] kthread+0x328/0x630 [ 15.190850] ret_from_fork+0x10/0x20 [ 15.190911] [ 15.190998] Freed by task 26: [ 15.191442] kasan_save_stack+0x3c/0x68 [ 15.191623] kasan_save_track+0x20/0x40 [ 15.192040] kasan_save_free_info+0x4c/0x78 [ 15.192090] __kasan_slab_free+0x6c/0x98 [ 15.192163] kfree+0x214/0x3c8 [ 15.192357] devtmpfs_work_loop+0x804/0xa58 [ 15.192659] devtmpfsd+0x50/0x58 [ 15.192713] kthread+0x328/0x630 [ 15.192904] ret_from_fork+0x10/0x20 [ 15.193182] [ 15.193247] The buggy address belongs to the object at fff00000c55f0860 [ 15.193247] which belongs to the cache kmalloc-16 of size 16 [ 15.193657] The buggy address is located 15 bytes to the right of [ 15.193657] allocated 16-byte region [fff00000c55f0860, fff00000c55f0870) [ 15.193846] [ 15.194127] The buggy address belongs to the physical page: [ 15.194367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0 [ 15.194607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.194766] page_type: f5(slab) [ 15.194911] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 15.195069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.195198] page dumped because: kasan: bad access detected [ 15.195537] [ 15.195697] Memory state around the buggy address: [ 15.195768] fff00000c55f0700: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 15.195929] fff00000c55f0780: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 15.196044] >fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.196395] ^ [ 15.196577] fff00000c55f0880: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.197009] fff00000c55f0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.197146] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 15.160690] ================================================================== [ 15.160769] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 15.161454] Read of size 1 at addr fff00000c3ec5e80 by task kunit_try_catch/139 [ 15.161504] [ 15.161537] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.161616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.161643] Hardware name: linux,dummy-virt (DT) [ 15.162278] Call trace: [ 15.162331] show_stack+0x20/0x38 (C) [ 15.162382] dump_stack_lvl+0x8c/0xd0 [ 15.162543] print_report+0x118/0x608 [ 15.163340] kasan_report+0xdc/0x128 [ 15.163567] __asan_report_load1_noabort+0x20/0x30 [ 15.163651] kmalloc_oob_right+0x5d0/0x660 [ 15.163698] kunit_try_run_case+0x170/0x3f0 [ 15.163749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.165994] kthread+0x328/0x630 [ 15.166058] ret_from_fork+0x10/0x20 [ 15.166111] [ 15.166130] Allocated by task 139: [ 15.166167] kasan_save_stack+0x3c/0x68 [ 15.166205] kasan_save_track+0x20/0x40 [ 15.166239] kasan_save_alloc_info+0x40/0x58 [ 15.166278] __kasan_kmalloc+0xd4/0xd8 [ 15.166311] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.166347] kmalloc_oob_right+0xb0/0x660 [ 15.166383] kunit_try_run_case+0x170/0x3f0 [ 15.166424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.166466] kthread+0x328/0x630 [ 15.166628] ret_from_fork+0x10/0x20 [ 15.166663] [ 15.166684] The buggy address belongs to the object at fff00000c3ec5e00 [ 15.166684] which belongs to the cache kmalloc-128 of size 128 [ 15.167062] The buggy address is located 13 bytes to the right of [ 15.167062] allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73) [ 15.167185] [ 15.167216] The buggy address belongs to the physical page: [ 15.167255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5 [ 15.167308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.167354] page_type: f5(slab) [ 15.167402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.167460] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.167498] page dumped because: kasan: bad access detected [ 15.167536] [ 15.167553] Memory state around the buggy address: [ 15.167589] fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167631] fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.167672] >fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167708] ^ [ 15.167734] fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167784] fff00000c3ec5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167820] ================================================================== [ 15.148518] ================================================================== [ 15.148554] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 15.148601] Write of size 1 at addr fff00000c3ec5e78 by task kunit_try_catch/139 [ 15.148647] [ 15.148677] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 15.149047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.149085] Hardware name: linux,dummy-virt (DT) [ 15.149357] Call trace: [ 15.149384] show_stack+0x20/0x38 (C) [ 15.149435] dump_stack_lvl+0x8c/0xd0 [ 15.149962] print_report+0x118/0x608 [ 15.150006] kasan_report+0xdc/0x128 [ 15.150087] __asan_report_store1_noabort+0x20/0x30 [ 15.150418] kmalloc_oob_right+0x538/0x660 [ 15.150480] kunit_try_run_case+0x170/0x3f0 [ 15.150530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.150582] kthread+0x328/0x630 [ 15.150626] ret_from_fork+0x10/0x20 [ 15.150735] [ 15.150842] Allocated by task 139: [ 15.150878] kasan_save_stack+0x3c/0x68 [ 15.150916] kasan_save_track+0x20/0x40 [ 15.150970] kasan_save_alloc_info+0x40/0x58 [ 15.151036] __kasan_kmalloc+0xd4/0xd8 [ 15.151162] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.151286] kmalloc_oob_right+0xb0/0x660 [ 15.151404] kunit_try_run_case+0x170/0x3f0 [ 15.151542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.151585] kthread+0x328/0x630 [ 15.151878] ret_from_fork+0x10/0x20 [ 15.151921] [ 15.151939] The buggy address belongs to the object at fff00000c3ec5e00 [ 15.151939] which belongs to the cache kmalloc-128 of size 128 [ 15.152005] The buggy address is located 5 bytes to the right of [ 15.152005] allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73) [ 15.152076] [ 15.152106] The buggy address belongs to the physical page: [ 15.152144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5 [ 15.152203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.152249] page_type: f5(slab) [ 15.152341] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.152392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.152447] page dumped because: kasan: bad access detected [ 15.152539] [ 15.152670] Memory state around the buggy address: [ 15.152935] fff00000c3ec5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.153322] fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.153568] >fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.153904] ^ [ 15.154739] fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.154789] fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.154826] ================================================================== [ 15.141037] ================================================================== [ 15.141379] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 15.142248] Write of size 1 at addr fff00000c3ec5e73 by task kunit_try_catch/139 [ 15.142381] [ 15.143138] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G N 6.15.5-rc1 #1 PREEMPT [ 15.143283] Tainted: [N]=TEST [ 15.143315] Hardware name: linux,dummy-virt (DT) [ 15.143533] Call trace: [ 15.143702] show_stack+0x20/0x38 (C) [ 15.143833] dump_stack_lvl+0x8c/0xd0 [ 15.143894] print_report+0x118/0x608 [ 15.143939] kasan_report+0xdc/0x128 [ 15.143995] __asan_report_store1_noabort+0x20/0x30 [ 15.144044] kmalloc_oob_right+0x5a4/0x660 [ 15.144090] kunit_try_run_case+0x170/0x3f0 [ 15.144147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.144199] kthread+0x328/0x630 [ 15.144245] ret_from_fork+0x10/0x20 [ 15.144401] [ 15.144439] Allocated by task 139: [ 15.144549] kasan_save_stack+0x3c/0x68 [ 15.144611] kasan_save_track+0x20/0x40 [ 15.144646] kasan_save_alloc_info+0x40/0x58 [ 15.144683] __kasan_kmalloc+0xd4/0xd8 [ 15.144717] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.144755] kmalloc_oob_right+0xb0/0x660 [ 15.144792] kunit_try_run_case+0x170/0x3f0 [ 15.144830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.144872] kthread+0x328/0x630 [ 15.144906] ret_from_fork+0x10/0x20 [ 15.144970] [ 15.145028] The buggy address belongs to the object at fff00000c3ec5e00 [ 15.145028] which belongs to the cache kmalloc-128 of size 128 [ 15.145118] The buggy address is located 0 bytes to the right of [ 15.145118] allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73) [ 15.145184] [ 15.145265] The buggy address belongs to the physical page: [ 15.145434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5 [ 15.145694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.145991] page_type: f5(slab) [ 15.146492] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.146558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.146667] page dumped because: kasan: bad access detected [ 15.146706] [ 15.146732] Memory state around the buggy address: [ 15.146974] fff00000c3ec5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.147043] fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.147097] >fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.147151] ^ [ 15.147233] fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.147274] fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.147336] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 94.765069] WARNING: CPU: 0 PID: 659 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 94.765840] Modules linked in: [ 94.766065] CPU: 0 UID: 0 PID: 659 Comm: kunit_try_catch Tainted: G B D W N 6.15.5-rc1 #1 PREEMPT [ 94.767759] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 94.768456] Hardware name: linux,dummy-virt (DT) [ 94.768961] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.769624] pc : intlog10+0x38/0x48 [ 94.770033] lr : intlog10_test+0xe4/0x200 [ 94.770555] sp : ffff8000822a7c10 [ 94.771003] x29: ffff8000822a7c90 x28: 0000000000000000 x27: 0000000000000000 [ 94.771470] x26: 1ffe000018c7c461 x25: 0000000000000000 x24: ffff8000822a7ce0 [ 94.771818] x23: ffff8000822a7d00 x22: 0000000000000000 x21: 1ffff00010454f82 [ 94.772221] x20: ffffa3b0e5035180 x19: ffff800080087990 x18: 00000000c1d0a322 [ 94.772642] x17: 0000000044a49506 x16: fff00000c096dc3c x15: 00000000a7707cbd [ 94.773073] x14: 00000000998c43b6 x13: 1ffe00001b493c1d x12: ffff74761d1b9b71 [ 94.773478] x11: 1ffff4761d1b9b70 x10: ffff74761d1b9b70 x9 : ffffa3b0e2614f04 [ 94.773889] x8 : ffffa3b0e8dcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 94.774342] x5 : ffff700010454f82 x4 : 1ffff00010010f3a x3 : 1ffff4761ca06a30 [ 94.774802] x2 : 1ffff4761ca06a30 x1 : 0000000000000003 x0 : 0000000000000000 [ 94.775289] Call trace: [ 94.775441] intlog10+0x38/0x48 (P) [ 94.775688] kunit_try_run_case+0x170/0x3f0 [ 94.775926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.776243] kthread+0x328/0x630 [ 94.776441] ret_from_fork+0x10/0x20 [ 94.776686] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 94.718526] WARNING: CPU: 0 PID: 641 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 94.720044] Modules linked in: [ 94.720474] CPU: 0 UID: 0 PID: 641 Comm: kunit_try_catch Tainted: G B D N 6.15.5-rc1 #1 PREEMPT [ 94.721024] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 94.721234] Hardware name: linux,dummy-virt (DT) [ 94.721433] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.721707] pc : intlog2+0xd8/0xf8 [ 94.721888] lr : intlog2_test+0xe4/0x200 [ 94.722370] sp : ffff8000822c7c10 [ 94.722742] x29: ffff8000822c7c90 x28: 0000000000000000 x27: 0000000000000000 [ 94.723532] x26: 1ffe000019009441 x25: 0000000000000000 x24: ffff8000822c7ce0 [ 94.724275] x23: ffff8000822c7d00 x22: 0000000000000000 x21: 1ffff00010458f82 [ 94.725026] x20: ffffa3b0e5035080 x19: ffff800080087990 x18: 000000008c4190de [ 94.725767] x17: 00000000374884cd x16: fff00000c096dc3c x15: 0000000090eb0b09 [ 94.726645] x14: 00000000ee3ed594 x13: 1ffe00001b493c1d x12: ffff74761d1b9b71 [ 94.727556] x11: 1ffff4761d1b9b70 x10: ffff74761d1b9b70 x9 : ffffa3b0e2615104 [ 94.728292] x8 : ffffa3b0e8dcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 94.729014] x5 : ffff700010458f82 x4 : 1ffff00010010f3a x3 : 1ffff4761ca06a10 [ 94.729732] x2 : 1ffff4761ca06a10 x1 : 0000000000000003 x0 : 0000000000000000 [ 94.730517] Call trace: [ 94.730694] intlog2+0xd8/0xf8 (P) [ 94.730888] kunit_try_run_case+0x170/0x3f0 [ 94.731107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.731345] kthread+0x328/0x630 [ 94.731525] ret_from_fork+0x10/0x20 [ 94.731734] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/internal-error-oops-oops-smp
KNOWN ISSUE - qemu-arm64: Internal error: Oops at kunit_test_null_dereference - kunit_generic_run_threadfn_adapter
[ 93.839399] Internal error: Oops: 0000000096000005 [#1] SMP [ 93.843571] Modules linked in: [ 93.844024] CPU: 0 UID: 0 PID: 535 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 93.844560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 93.844806] Hardware name: linux,dummy-virt (DT) [ 93.845154] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 93.845566] pc : kunit_test_null_dereference+0x70/0x170 [ 93.845915] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 93.846415] sp : ffff800080ab7d30 [ 93.846707] x29: ffff800080ab7d90 x28: 0000000000000000 x27: 0000000000000000 [ 93.847249] x26: 1ffe000018c09e61 x25: 0000000000000000 x24: 0000000000000004 [ 93.847706] x23: fff00000c604f30c x22: ffffa3b0e26024e0 x21: fff00000c1173c88 [ 93.848163] x20: 1ffff00010156fa6 x19: ffff800080087990 x18: 00000000da118399 [ 93.848617] x17: 0000000000000001 x16: fff00000da47bfe0 x15: 000000005622077f [ 93.849015] x14: 00000000f1f1f1f1 x13: 1ffe00001b48f7e0 x12: fffd80001901462c [ 93.849440] x11: 1ffe00001901462b x10: fffd80001901462b x9 : ffffa3b0e25f9948 [ 93.849882] x8 : ffff800080ab7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 93.850539] x5 : ffff700010156fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 93.851001] x2 : dfff800000000000 x1 : fff00000c80a2880 x0 : ffff800080087990 [ 93.851475] Call trace: [ 93.851669] kunit_test_null_dereference+0x70/0x170 (P) [ 93.851966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 93.852277] kthread+0x328/0x630 [ 93.852513] ret_from_fork+0x10/0x20 [ 93.852960] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 93.853494] ---[ end trace 0000000000000000 ]---