Date
July 4, 2025, 3:11 p.m.
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 20.050708] ================================================================== [ 20.074186] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x288/0x520 [ 20.074186] [ 20.083755] Corrupted memory at 0x00000000963ab715 [ ! . . . . . . . . . . . . . . . ] (in kfence-#67): [ 20.093182] kmalloc_track_caller_oob_right+0x288/0x520 [ 20.098410] kunit_try_run_case+0x1a2/0x480 [ 20.102603] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.108004] kthread+0x334/0x6f0 [ 20.111236] ret_from_fork+0x3e/0x80 [ 20.114814] ret_from_fork_asm+0x1a/0x30 [ 20.118742] [ 20.120240] kfence-#67: 0x000000005ac0b4d5-0x000000001558ad24, size=120, cache=kmalloc-128 [ 20.120240] [ 20.129983] allocated by task 185 on cpu 1 at 20.050649s (0.079333s ago): [ 20.136777] kmalloc_track_caller_oob_right+0x19a/0x520 [ 20.142010] kunit_try_run_case+0x1a2/0x480 [ 20.146195] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.151595] kthread+0x334/0x6f0 [ 20.154830] ret_from_fork+0x3e/0x80 [ 20.158410] ret_from_fork_asm+0x1a/0x30 [ 20.162334] [ 20.163834] freed by task 185 on cpu 1 at 20.050703s (0.113131s ago): [ 20.170283] kmalloc_track_caller_oob_right+0x288/0x520 [ 20.175515] kunit_try_run_case+0x1a2/0x480 [ 20.179704] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.185111] kthread+0x334/0x6f0 [ 20.188341] ret_from_fork+0x3e/0x80 [ 20.191929] ret_from_fork_asm+0x1a/0x30 [ 20.195882] [ 20.197385] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 20.208261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.212454] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 20.219848] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 29.671730] ================================================================== [ 29.683061] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330 [ 29.690288] Write of size 4 at addr ffff8881049b7275 by task kunit_try_catch/217 [ 29.697689] [ 29.699189] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 29.699197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.699199] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 29.699202] Call Trace: [ 29.699204] <TASK> [ 29.699205] dump_stack_lvl+0x73/0xb0 [ 29.699209] print_report+0xd1/0x650 [ 29.699213] ? __virt_addr_valid+0x1db/0x2d0 [ 29.699217] ? kmalloc_oob_memset_4+0x166/0x330 [ 29.699222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.699226] ? kmalloc_oob_memset_4+0x166/0x330 [ 29.699230] kasan_report+0x141/0x180 [ 29.699235] ? kmalloc_oob_memset_4+0x166/0x330 [ 29.699240] kasan_check_range+0x10c/0x1c0 [ 29.699243] __asan_memset+0x27/0x50 [ 29.699247] kmalloc_oob_memset_4+0x166/0x330 [ 29.699252] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 29.699256] ? __schedule+0x10cc/0x2b60 [ 29.699261] ? ktime_get_ts64+0x83/0x230 [ 29.699265] kunit_try_run_case+0x1a2/0x480 [ 29.699270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.699274] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.699279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.699283] ? __kthread_parkme+0x82/0x180 [ 29.699287] ? preempt_count_sub+0x50/0x80 [ 29.699292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.699297] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.699301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.699305] kthread+0x334/0x6f0 [ 29.699308] ? trace_preempt_on+0x20/0xc0 [ 29.699312] ? __pfx_kthread+0x10/0x10 [ 29.699315] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.699320] ? calculate_sigpending+0x7b/0xa0 [ 29.699323] ? __pfx_kthread+0x10/0x10 [ 29.699327] ret_from_fork+0x3e/0x80 [ 29.699331] ? __pfx_kthread+0x10/0x10 [ 29.699334] ret_from_fork_asm+0x1a/0x30 [ 29.699339] </TASK> [ 29.699341] [ 29.866316] Allocated by task 217: [ 29.869721] kasan_save_stack+0x45/0x70 [ 29.873559] kasan_save_track+0x18/0x40 [ 29.877400] kasan_save_alloc_info+0x3b/0x50 [ 29.881672] __kasan_kmalloc+0xb7/0xc0 [ 29.885425] __kmalloc_cache_noprof+0x189/0x420 [ 29.889956] kmalloc_oob_memset_4+0xac/0x330 [ 29.894229] kunit_try_run_case+0x1a2/0x480 [ 29.898415] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.903815] kthread+0x334/0x6f0 [ 29.907047] ret_from_fork+0x3e/0x80 [ 29.910628] ret_from_fork_asm+0x1a/0x30 [ 29.914553] [ 29.916052] The buggy address belongs to the object at ffff8881049b7200 [ 29.916052] which belongs to the cache kmalloc-128 of size 128 [ 29.928569] The buggy address is located 117 bytes inside of [ 29.928569] allocated 120-byte region [ffff8881049b7200, ffff8881049b7278) [ 29.941169] [ 29.942669] The buggy address belongs to the physical page: [ 29.948240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049b7 [ 29.956241] flags: 0x200000000000000(node=0|zone=2) [ 29.961119] page_type: f5(slab) [ 29.964266] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 29.972007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.979751] page dumped because: kasan: bad access detected [ 29.985327] [ 29.986824] Memory state around the buggy address: [ 29.991617] ffff8881049b7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.998837] ffff8881049b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.006058] >ffff8881049b7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.013275] ^ [ 30.020407] ffff8881049b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.027626] ffff8881049b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.034845] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 29.300910] ================================================================== [ 29.312352] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 29.319571] Write of size 2 at addr ffff8881049b7177 by task kunit_try_catch/215 [ 29.326966] [ 29.328464] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 29.328472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.328474] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 29.328477] Call Trace: [ 29.328478] <TASK> [ 29.328480] dump_stack_lvl+0x73/0xb0 [ 29.328484] print_report+0xd1/0x650 [ 29.328488] ? __virt_addr_valid+0x1db/0x2d0 [ 29.328492] ? kmalloc_oob_memset_2+0x166/0x330 [ 29.328496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.328500] ? kmalloc_oob_memset_2+0x166/0x330 [ 29.328505] kasan_report+0x141/0x180 [ 29.328509] ? kmalloc_oob_memset_2+0x166/0x330 [ 29.328514] kasan_check_range+0x10c/0x1c0 [ 29.328518] __asan_memset+0x27/0x50 [ 29.328521] kmalloc_oob_memset_2+0x166/0x330 [ 29.328526] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 29.328530] ? __schedule+0x10cc/0x2b60 [ 29.328535] ? ktime_get_ts64+0x83/0x230 [ 29.328539] kunit_try_run_case+0x1a2/0x480 [ 29.328544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.328548] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.328553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.328557] ? __kthread_parkme+0x82/0x180 [ 29.328561] ? preempt_count_sub+0x50/0x80 [ 29.328566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.328571] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.328575] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.328579] kthread+0x334/0x6f0 [ 29.328582] ? trace_preempt_on+0x20/0xc0 [ 29.328586] ? __pfx_kthread+0x10/0x10 [ 29.328589] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.328594] ? calculate_sigpending+0x7b/0xa0 [ 29.328598] ? __pfx_kthread+0x10/0x10 [ 29.328601] ret_from_fork+0x3e/0x80 [ 29.328605] ? __pfx_kthread+0x10/0x10 [ 29.328608] ret_from_fork_asm+0x1a/0x30 [ 29.328613] </TASK> [ 29.328615] [ 29.495582] Allocated by task 215: [ 29.498988] kasan_save_stack+0x45/0x70 [ 29.502826] kasan_save_track+0x18/0x40 [ 29.506667] kasan_save_alloc_info+0x3b/0x50 [ 29.510952] __kasan_kmalloc+0xb7/0xc0 [ 29.514709] __kmalloc_cache_noprof+0x189/0x420 [ 29.519241] kmalloc_oob_memset_2+0xac/0x330 [ 29.523516] kunit_try_run_case+0x1a2/0x480 [ 29.527710] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.533108] kthread+0x334/0x6f0 [ 29.536340] ret_from_fork+0x3e/0x80 [ 29.539922] ret_from_fork_asm+0x1a/0x30 [ 29.543872] [ 29.545363] The buggy address belongs to the object at ffff8881049b7100 [ 29.545363] which belongs to the cache kmalloc-128 of size 128 [ 29.557879] The buggy address is located 119 bytes inside of [ 29.557879] allocated 120-byte region [ffff8881049b7100, ffff8881049b7178) [ 29.570496] [ 29.571997] The buggy address belongs to the physical page: [ 29.577570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049b7 [ 29.585578] flags: 0x200000000000000(node=0|zone=2) [ 29.590457] page_type: f5(slab) [ 29.593605] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 29.601350] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.609089] page dumped because: kasan: bad access detected [ 29.614663] [ 29.616162] Memory state around the buggy address: [ 29.620955] ffff8881049b7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.628182] ffff8881049b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.635402] >ffff8881049b7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.642620] ^ [ 29.649752] ffff8881049b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.656996] ffff8881049b7200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.664219] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 28.930167] ================================================================== [ 28.940987] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 28.948293] Write of size 128 at addr ffff8881049b7000 by task kunit_try_catch/213 [ 28.955861] [ 28.957361] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 28.957369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.957371] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 28.957374] Call Trace: [ 28.957375] <TASK> [ 28.957377] dump_stack_lvl+0x73/0xb0 [ 28.957381] print_report+0xd1/0x650 [ 28.957385] ? __virt_addr_valid+0x1db/0x2d0 [ 28.957389] ? kmalloc_oob_in_memset+0x15f/0x320 [ 28.957393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.957398] ? kmalloc_oob_in_memset+0x15f/0x320 [ 28.957402] kasan_report+0x141/0x180 [ 28.957407] ? kmalloc_oob_in_memset+0x15f/0x320 [ 28.957412] kasan_check_range+0x10c/0x1c0 [ 28.957415] __asan_memset+0x27/0x50 [ 28.957419] kmalloc_oob_in_memset+0x15f/0x320 [ 28.957424] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 28.957428] ? __schedule+0x10cc/0x2b60 [ 28.957433] ? ktime_get_ts64+0x83/0x230 [ 28.957437] kunit_try_run_case+0x1a2/0x480 [ 28.957442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.957447] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.957451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.957456] ? __kthread_parkme+0x82/0x180 [ 28.957460] ? preempt_count_sub+0x50/0x80 [ 28.957465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.957469] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.957474] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.957478] kthread+0x334/0x6f0 [ 28.957481] ? trace_preempt_on+0x20/0xc0 [ 28.957485] ? __pfx_kthread+0x10/0x10 [ 28.957489] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.957493] ? calculate_sigpending+0x7b/0xa0 [ 28.957497] ? __pfx_kthread+0x10/0x10 [ 28.957500] ret_from_fork+0x3e/0x80 [ 28.957504] ? __pfx_kthread+0x10/0x10 [ 28.957507] ret_from_fork_asm+0x1a/0x30 [ 28.957513] </TASK> [ 28.957514] [ 29.124950] Allocated by task 213: [ 29.128361] kasan_save_stack+0x45/0x70 [ 29.132199] kasan_save_track+0x18/0x40 [ 29.136038] kasan_save_alloc_info+0x3b/0x50 [ 29.140313] __kasan_kmalloc+0xb7/0xc0 [ 29.144063] __kmalloc_cache_noprof+0x189/0x420 [ 29.148595] kmalloc_oob_in_memset+0xac/0x320 [ 29.152956] kunit_try_run_case+0x1a2/0x480 [ 29.157141] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.162541] kthread+0x334/0x6f0 [ 29.165775] ret_from_fork+0x3e/0x80 [ 29.169353] ret_from_fork_asm+0x1a/0x30 [ 29.173280] [ 29.174778] The buggy address belongs to the object at ffff8881049b7000 [ 29.174778] which belongs to the cache kmalloc-128 of size 128 [ 29.187284] The buggy address is located 0 bytes inside of [ 29.187284] allocated 120-byte region [ffff8881049b7000, ffff8881049b7078) [ 29.199713] [ 29.201210] The buggy address belongs to the physical page: [ 29.206784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049b7 [ 29.214783] flags: 0x200000000000000(node=0|zone=2) [ 29.219662] page_type: f5(slab) [ 29.222812] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 29.230558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.238297] page dumped because: kasan: bad access detected [ 29.243868] [ 29.245360] Memory state around the buggy address: [ 29.250153] ffff8881049b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.257374] ffff8881049b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.264593] >ffff8881049b7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.271819] ^ [ 29.278953] ffff8881049b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.286172] ffff8881049b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.293390] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 28.522203] ================================================================== [ 28.533024] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 28.539820] Read of size 16 at addr ffff888104962a20 by task kunit_try_catch/211 [ 28.547218] [ 28.548721] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 28.548729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.548731] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 28.548735] Call Trace: [ 28.548736] <TASK> [ 28.548738] dump_stack_lvl+0x73/0xb0 [ 28.548742] print_report+0xd1/0x650 [ 28.548746] ? __virt_addr_valid+0x1db/0x2d0 [ 28.548750] ? kmalloc_uaf_16+0x47b/0x4c0 [ 28.548754] ? kasan_complete_mode_report_info+0x64/0x200 [ 28.548758] ? kmalloc_uaf_16+0x47b/0x4c0 [ 28.548762] kasan_report+0x141/0x180 [ 28.548767] ? kmalloc_uaf_16+0x47b/0x4c0 [ 28.548772] __asan_report_load16_noabort+0x18/0x20 [ 28.548776] kmalloc_uaf_16+0x47b/0x4c0 [ 28.548780] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 28.548784] ? __schedule+0x10cc/0x2b60 [ 28.548789] ? ktime_get_ts64+0x83/0x230 [ 28.548793] kunit_try_run_case+0x1a2/0x480 [ 28.548798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.548802] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.548807] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.548812] ? __kthread_parkme+0x82/0x180 [ 28.548816] ? preempt_count_sub+0x50/0x80 [ 28.548820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.548825] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.548829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.548834] kthread+0x334/0x6f0 [ 28.548837] ? trace_preempt_on+0x20/0xc0 [ 28.548841] ? __pfx_kthread+0x10/0x10 [ 28.548844] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.548848] ? calculate_sigpending+0x7b/0xa0 [ 28.548852] ? __pfx_kthread+0x10/0x10 [ 28.548855] ret_from_fork+0x3e/0x80 [ 28.548859] ? __pfx_kthread+0x10/0x10 [ 28.548862] ret_from_fork_asm+0x1a/0x30 [ 28.548868] </TASK> [ 28.548869] [ 28.710482] Allocated by task 211: [ 28.713902] kasan_save_stack+0x45/0x70 [ 28.717753] kasan_save_track+0x18/0x40 [ 28.721591] kasan_save_alloc_info+0x3b/0x50 [ 28.725864] __kasan_kmalloc+0xb7/0xc0 [ 28.729616] __kmalloc_cache_noprof+0x189/0x420 [ 28.734151] kmalloc_uaf_16+0x15b/0x4c0 [ 28.737998] kunit_try_run_case+0x1a2/0x480 [ 28.742184] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.747583] kthread+0x334/0x6f0 [ 28.750816] ret_from_fork+0x3e/0x80 [ 28.754394] ret_from_fork_asm+0x1a/0x30 [ 28.758320] [ 28.759820] Freed by task 211: [ 28.762881] kasan_save_stack+0x45/0x70 [ 28.766747] kasan_save_track+0x18/0x40 [ 28.770585] kasan_save_free_info+0x3f/0x60 [ 28.774771] __kasan_slab_free+0x56/0x70 [ 28.778698] kfree+0x222/0x3f0 [ 28.781756] kmalloc_uaf_16+0x1d6/0x4c0 [ 28.785594] kunit_try_run_case+0x1a2/0x480 [ 28.789782] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.795182] kthread+0x334/0x6f0 [ 28.798412] ret_from_fork+0x3e/0x80 [ 28.801991] ret_from_fork_asm+0x1a/0x30 [ 28.805917] [ 28.807435] The buggy address belongs to the object at ffff888104962a20 [ 28.807435] which belongs to the cache kmalloc-16 of size 16 [ 28.819776] The buggy address is located 0 bytes inside of [ 28.819776] freed 16-byte region [ffff888104962a20, ffff888104962a30) [ 28.831771] [ 28.833270] The buggy address belongs to the physical page: [ 28.838845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104962 [ 28.846850] flags: 0x200000000000000(node=0|zone=2) [ 28.851731] page_type: f5(slab) [ 28.854876] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 28.862641] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.870381] page dumped because: kasan: bad access detected [ 28.875953] [ 28.877452] Memory state around the buggy address: [ 28.882245] ffff888104962900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.889466] ffff888104962980: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.896685] >ffff888104962a00: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 28.903918] ^ [ 28.908209] ffff888104962a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.915430] ffff888104962b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.922650] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 28.160251] ================================================================== [ 28.170881] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0 [ 28.177614] Write of size 16 at addr ffff8881049629c0 by task kunit_try_catch/209 [ 28.185103] [ 28.186604] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 28.186612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.186614] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 28.186618] Call Trace: [ 28.186619] <TASK> [ 28.186621] dump_stack_lvl+0x73/0xb0 [ 28.186625] print_report+0xd1/0x650 [ 28.186630] ? __virt_addr_valid+0x1db/0x2d0 [ 28.186634] ? kmalloc_oob_16+0x452/0x4a0 [ 28.186638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.186642] ? kmalloc_oob_16+0x452/0x4a0 [ 28.186646] kasan_report+0x141/0x180 [ 28.186651] ? kmalloc_oob_16+0x452/0x4a0 [ 28.186655] __asan_report_store16_noabort+0x1b/0x30 [ 28.186660] kmalloc_oob_16+0x452/0x4a0 [ 28.186664] ? __pfx_kmalloc_oob_16+0x10/0x10 [ 28.186668] ? __schedule+0x10cc/0x2b60 [ 28.186673] ? ktime_get_ts64+0x83/0x230 [ 28.186677] kunit_try_run_case+0x1a2/0x480 [ 28.186682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.186686] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.186691] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.186696] ? __kthread_parkme+0x82/0x180 [ 28.186700] ? preempt_count_sub+0x50/0x80 [ 28.186704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.186709] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.186713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.186718] kthread+0x334/0x6f0 [ 28.186721] ? trace_preempt_on+0x20/0xc0 [ 28.186725] ? __pfx_kthread+0x10/0x10 [ 28.186728] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.186732] ? calculate_sigpending+0x7b/0xa0 [ 28.186736] ? __pfx_kthread+0x10/0x10 [ 28.186739] ret_from_fork+0x3e/0x80 [ 28.186743] ? __pfx_kthread+0x10/0x10 [ 28.186746] ret_from_fork_asm+0x1a/0x30 [ 28.186752] </TASK> [ 28.186754] [ 28.348424] Allocated by task 209: [ 28.351831] kasan_save_stack+0x45/0x70 [ 28.355669] kasan_save_track+0x18/0x40 [ 28.359509] kasan_save_alloc_info+0x3b/0x50 [ 28.363782] __kasan_kmalloc+0xb7/0xc0 [ 28.367535] __kmalloc_cache_noprof+0x189/0x420 [ 28.372067] kmalloc_oob_16+0xa8/0x4a0 [ 28.375821] kunit_try_run_case+0x1a2/0x480 [ 28.380013] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.385415] kthread+0x334/0x6f0 [ 28.388648] ret_from_fork+0x3e/0x80 [ 28.392224] ret_from_fork_asm+0x1a/0x30 [ 28.396150] [ 28.397650] The buggy address belongs to the object at ffff8881049629c0 [ 28.397650] which belongs to the cache kmalloc-16 of size 16 [ 28.409984] The buggy address is located 0 bytes inside of [ 28.409984] allocated 13-byte region [ffff8881049629c0, ffff8881049629cd) [ 28.422325] [ 28.423824] The buggy address belongs to the physical page: [ 28.429397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104962 [ 28.437405] flags: 0x200000000000000(node=0|zone=2) [ 28.442284] page_type: f5(slab) [ 28.445431] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 28.453180] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.460944] page dumped because: kasan: bad access detected [ 28.466549] [ 28.468048] Memory state around the buggy address: [ 28.472844] ffff888104962880: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 28.480061] ffff888104962900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.487281] >ffff888104962980: 00 05 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 28.494499] ^ [ 28.500072] ffff888104962a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.507292] ffff888104962a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.514511] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 27.240527] ================================================================== [ 27.252157] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 27.258777] Read of size 1 at addr ffff8881041c0000 by task kunit_try_catch/207 [ 27.266084] [ 27.267585] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 27.267593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.267595] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 27.267599] Call Trace: [ 27.267601] <TASK> [ 27.267602] dump_stack_lvl+0x73/0xb0 [ 27.267606] print_report+0xd1/0x650 [ 27.267611] ? __virt_addr_valid+0x1db/0x2d0 [ 27.267615] ? krealloc_uaf+0x1b8/0x5e0 [ 27.267618] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.267622] ? krealloc_uaf+0x1b8/0x5e0 [ 27.267625] kasan_report+0x141/0x180 [ 27.267630] ? krealloc_uaf+0x1b8/0x5e0 [ 27.267633] ? krealloc_uaf+0x1b8/0x5e0 [ 27.267636] __kasan_check_byte+0x3d/0x50 [ 27.267641] krealloc_noprof+0x3f/0x340 [ 27.267645] krealloc_uaf+0x1b8/0x5e0 [ 27.267648] ? __pfx_krealloc_uaf+0x10/0x10 [ 27.267651] ? finish_task_switch.isra.0+0x153/0x700 [ 27.267656] ? __switch_to+0x5d9/0xf60 [ 27.267660] ? dequeue_task_fair+0x166/0x4e0 [ 27.267664] ? __schedule+0x10cc/0x2b60 [ 27.267669] ? ktime_get_ts64+0x83/0x230 [ 27.267673] kunit_try_run_case+0x1a2/0x480 [ 27.267678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.267683] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.267687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.267692] ? __kthread_parkme+0x82/0x180 [ 27.267696] ? preempt_count_sub+0x50/0x80 [ 27.267700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.267705] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.267710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.267714] kthread+0x334/0x6f0 [ 27.267717] ? trace_preempt_on+0x20/0xc0 [ 27.267721] ? __pfx_kthread+0x10/0x10 [ 27.267724] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.267729] ? calculate_sigpending+0x7b/0xa0 [ 27.267732] ? __pfx_kthread+0x10/0x10 [ 27.267736] ret_from_fork+0x3e/0x80 [ 27.267740] ? __pfx_kthread+0x10/0x10 [ 27.267743] ret_from_fork_asm+0x1a/0x30 [ 27.267748] </TASK> [ 27.267750] [ 27.448327] Allocated by task 207: [ 27.451732] kasan_save_stack+0x45/0x70 [ 27.455571] kasan_save_track+0x18/0x40 [ 27.459409] kasan_save_alloc_info+0x3b/0x50 [ 27.463682] __kasan_kmalloc+0xb7/0xc0 [ 27.467437] __kmalloc_cache_noprof+0x189/0x420 [ 27.471976] krealloc_uaf+0xbb/0x5e0 [ 27.475555] kunit_try_run_case+0x1a2/0x480 [ 27.479743] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.485142] kthread+0x334/0x6f0 [ 27.488373] ret_from_fork+0x3e/0x80 [ 27.491958] ret_from_fork_asm+0x1a/0x30 [ 27.495879] [ 27.497379] Freed by task 207: [ 27.500437] kasan_save_stack+0x45/0x70 [ 27.504277] kasan_save_track+0x18/0x40 [ 27.508116] kasan_save_free_info+0x3f/0x60 [ 27.512302] __kasan_slab_free+0x56/0x70 [ 27.516227] kfree+0x222/0x3f0 [ 27.519288] krealloc_uaf+0x13d/0x5e0 [ 27.522964] kunit_try_run_case+0x1a2/0x480 [ 27.527157] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.532557] kthread+0x334/0x6f0 [ 27.535791] ret_from_fork+0x3e/0x80 [ 27.539378] ret_from_fork_asm+0x1a/0x30 [ 27.543305] [ 27.544804] The buggy address belongs to the object at ffff8881041c0000 [ 27.544804] which belongs to the cache kmalloc-256 of size 256 [ 27.557316] The buggy address is located 0 bytes inside of [ 27.557316] freed 256-byte region [ffff8881041c0000, ffff8881041c0100) [ 27.569398] [ 27.570914] The buggy address belongs to the physical page: [ 27.576515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041c0 [ 27.584521] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.592174] flags: 0x200000000000040(head|node=0|zone=2) [ 27.597487] page_type: f5(slab) [ 27.600633] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 27.608372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.616113] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 27.623971] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.631799] head: 0200000000000001 ffffea0004107001 00000000ffffffff 00000000ffffffff [ 27.639625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.647450] page dumped because: kasan: bad access detected [ 27.653022] [ 27.654523] Memory state around the buggy address: [ 27.659315] ffff8881041bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.666533] ffff8881041bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.673755] >ffff8881041c0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.680982] ^ [ 27.684213] ffff8881041c0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.691434] ffff8881041c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.698651] ================================================================== [ 27.705909] ================================================================== [ 27.713161] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 27.719774] Read of size 1 at addr ffff8881041c0000 by task kunit_try_catch/207 [ 27.727089] [ 27.728588] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 27.728596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.728598] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 27.728601] Call Trace: [ 27.728603] <TASK> [ 27.728604] dump_stack_lvl+0x73/0xb0 [ 27.728608] print_report+0xd1/0x650 [ 27.728612] ? __virt_addr_valid+0x1db/0x2d0 [ 27.728616] ? krealloc_uaf+0x53c/0x5e0 [ 27.728619] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.728623] ? krealloc_uaf+0x53c/0x5e0 [ 27.728627] kasan_report+0x141/0x180 [ 27.728631] ? krealloc_uaf+0x53c/0x5e0 [ 27.728635] __asan_report_load1_noabort+0x18/0x20 [ 27.728639] krealloc_uaf+0x53c/0x5e0 [ 27.728642] ? __pfx_krealloc_uaf+0x10/0x10 [ 27.728645] ? finish_task_switch.isra.0+0x153/0x700 [ 27.728649] ? __switch_to+0x5d9/0xf60 [ 27.728653] ? dequeue_task_fair+0x166/0x4e0 [ 27.728657] ? __schedule+0x10cc/0x2b60 [ 27.728662] ? ktime_get_ts64+0x83/0x230 [ 27.728667] kunit_try_run_case+0x1a2/0x480 [ 27.728671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.728676] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.728680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.728685] ? __kthread_parkme+0x82/0x180 [ 27.728689] ? preempt_count_sub+0x50/0x80 [ 27.728693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.728698] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.728702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.728707] kthread+0x334/0x6f0 [ 27.728710] ? trace_preempt_on+0x20/0xc0 [ 27.728714] ? __pfx_kthread+0x10/0x10 [ 27.728717] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.728721] ? calculate_sigpending+0x7b/0xa0 [ 27.728725] ? __pfx_kthread+0x10/0x10 [ 27.728728] ret_from_fork+0x3e/0x80 [ 27.728732] ? __pfx_kthread+0x10/0x10 [ 27.728735] ret_from_fork_asm+0x1a/0x30 [ 27.728741] </TASK> [ 27.728742] [ 27.902334] Allocated by task 207: [ 27.905743] kasan_save_stack+0x45/0x70 [ 27.909589] kasan_save_track+0x18/0x40 [ 27.913430] kasan_save_alloc_info+0x3b/0x50 [ 27.917703] __kasan_kmalloc+0xb7/0xc0 [ 27.921455] __kmalloc_cache_noprof+0x189/0x420 [ 27.925993] krealloc_uaf+0xbb/0x5e0 [ 27.929576] kunit_try_run_case+0x1a2/0x480 [ 27.933768] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.939170] kthread+0x334/0x6f0 [ 27.942401] ret_from_fork+0x3e/0x80 [ 27.945982] ret_from_fork_asm+0x1a/0x30 [ 27.949931] [ 27.951449] Freed by task 207: [ 27.954509] kasan_save_stack+0x45/0x70 [ 27.958349] kasan_save_track+0x18/0x40 [ 27.962195] kasan_save_free_info+0x3f/0x60 [ 27.966381] __kasan_slab_free+0x56/0x70 [ 27.970309] kfree+0x222/0x3f0 [ 27.973368] krealloc_uaf+0x13d/0x5e0 [ 27.977032] kunit_try_run_case+0x1a2/0x480 [ 27.981219] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.986617] kthread+0x334/0x6f0 [ 27.989852] ret_from_fork+0x3e/0x80 [ 27.993430] ret_from_fork_asm+0x1a/0x30 [ 27.997357] [ 27.998856] The buggy address belongs to the object at ffff8881041c0000 [ 27.998856] which belongs to the cache kmalloc-256 of size 256 [ 28.011369] The buggy address is located 0 bytes inside of [ 28.011369] freed 256-byte region [ffff8881041c0000, ffff8881041c0100) [ 28.023452] [ 28.024961] The buggy address belongs to the physical page: [ 28.030533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041c0 [ 28.038542] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.046203] flags: 0x200000000000040(head|node=0|zone=2) [ 28.051523] page_type: f5(slab) [ 28.054672] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 28.062418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.070167] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 28.078001] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.085834] head: 0200000000000001 ffffea0004107001 00000000ffffffff 00000000ffffffff [ 28.093662] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.101495] page dumped because: kasan: bad access detected [ 28.107067] [ 28.108568] Memory state around the buggy address: [ 28.113358] ffff8881041bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.120579] ffff8881041bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.127797] >ffff8881041c0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.135018] ^ [ 28.138249] ffff8881041c0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.145470] ffff8881041c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.152690] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 22.717557] ================================================================== [ 22.728627] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 22.736280] Write of size 1 at addr ffff88810314fac9 by task kunit_try_catch/201 [ 22.743682] [ 22.745183] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 22.745192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.745194] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 22.745197] Call Trace: [ 22.745199] <TASK> [ 22.745201] dump_stack_lvl+0x73/0xb0 [ 22.745205] print_report+0xd1/0x650 [ 22.745209] ? __virt_addr_valid+0x1db/0x2d0 [ 22.745213] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.745217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.745221] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.745225] kasan_report+0x141/0x180 [ 22.745229] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 22.745234] __asan_report_store1_noabort+0x1b/0x30 [ 22.745238] krealloc_less_oob_helper+0xd70/0x11d0 [ 22.745242] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.745245] ? finish_task_switch.isra.0+0x153/0x700 [ 22.745250] ? __switch_to+0x5d9/0xf60 [ 22.745253] ? dequeue_task_fair+0x166/0x4e0 [ 22.745258] ? __schedule+0x10cc/0x2b60 [ 22.745263] krealloc_less_oob+0x1c/0x30 [ 22.745266] kunit_try_run_case+0x1a2/0x480 [ 22.745271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.745275] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.745280] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.745284] ? __kthread_parkme+0x82/0x180 [ 22.745288] ? preempt_count_sub+0x50/0x80 [ 22.745293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.745298] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.745302] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.745306] kthread+0x334/0x6f0 [ 22.745309] ? trace_preempt_on+0x20/0xc0 [ 22.745314] ? __pfx_kthread+0x10/0x10 [ 22.745317] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.745321] ? calculate_sigpending+0x7b/0xa0 [ 22.745325] ? __pfx_kthread+0x10/0x10 [ 22.745328] ret_from_fork+0x3e/0x80 [ 22.745332] ? __pfx_kthread+0x10/0x10 [ 22.745335] ret_from_fork_asm+0x1a/0x30 [ 22.745341] </TASK> [ 22.745342] [ 22.924526] Allocated by task 201: [ 22.927933] kasan_save_stack+0x45/0x70 [ 22.931798] kasan_save_track+0x18/0x40 [ 22.935639] kasan_save_alloc_info+0x3b/0x50 [ 22.939945] __kasan_krealloc+0x190/0x1f0 [ 22.943993] krealloc_noprof+0xf3/0x340 [ 22.947831] krealloc_less_oob_helper+0x1aa/0x11d0 [ 22.952626] krealloc_less_oob+0x1c/0x30 [ 22.956549] kunit_try_run_case+0x1a2/0x480 [ 22.960737] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.966134] kthread+0x334/0x6f0 [ 22.969368] ret_from_fork+0x3e/0x80 [ 22.972969] ret_from_fork_asm+0x1a/0x30 [ 22.976926] [ 22.978452] The buggy address belongs to the object at ffff88810314fa00 [ 22.978452] which belongs to the cache kmalloc-256 of size 256 [ 22.990971] The buggy address is located 0 bytes to the right of [ 22.990971] allocated 201-byte region [ffff88810314fa00, ffff88810314fac9) [ 23.003929] [ 23.005449] The buggy address belongs to the physical page: [ 23.011021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e [ 23.019027] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.026681] flags: 0x200000000000040(head|node=0|zone=2) [ 23.031994] page_type: f5(slab) [ 23.035142] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.042889] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.050662] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.058489] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.066313] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff [ 23.074139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.081982] page dumped because: kasan: bad access detected [ 23.087557] [ 23.089056] Memory state around the buggy address: [ 23.093847] ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.101069] ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.108294] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.115513] ^ [ 23.121086] ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.128306] ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.135525] ================================================================== [ 23.564314] ================================================================== [ 23.571545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 23.579205] Write of size 1 at addr ffff88810314fada by task kunit_try_catch/201 [ 23.586596] [ 23.588099] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 23.588107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.588109] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 23.588112] Call Trace: [ 23.588113] <TASK> [ 23.588115] dump_stack_lvl+0x73/0xb0 [ 23.588119] print_report+0xd1/0x650 [ 23.588123] ? __virt_addr_valid+0x1db/0x2d0 [ 23.588127] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.588131] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.588135] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.588139] kasan_report+0x141/0x180 [ 23.588143] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 23.588148] __asan_report_store1_noabort+0x1b/0x30 [ 23.588152] krealloc_less_oob_helper+0xec6/0x11d0 [ 23.588156] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.588159] ? finish_task_switch.isra.0+0x153/0x700 [ 23.588164] ? __switch_to+0x5d9/0xf60 [ 23.588168] ? dequeue_task_fair+0x166/0x4e0 [ 23.588172] ? __schedule+0x10cc/0x2b60 [ 23.588177] krealloc_less_oob+0x1c/0x30 [ 23.588180] kunit_try_run_case+0x1a2/0x480 [ 23.588185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.588189] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.588194] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.588199] ? __kthread_parkme+0x82/0x180 [ 23.588203] ? preempt_count_sub+0x50/0x80 [ 23.588207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.588212] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.588216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.588221] kthread+0x334/0x6f0 [ 23.588223] ? trace_preempt_on+0x20/0xc0 [ 23.588228] ? __pfx_kthread+0x10/0x10 [ 23.588231] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.588235] ? calculate_sigpending+0x7b/0xa0 [ 23.588239] ? __pfx_kthread+0x10/0x10 [ 23.588242] ret_from_fork+0x3e/0x80 [ 23.588246] ? __pfx_kthread+0x10/0x10 [ 23.588249] ret_from_fork_asm+0x1a/0x30 [ 23.588255] </TASK> [ 23.588257] [ 23.767478] Allocated by task 201: [ 23.770884] kasan_save_stack+0x45/0x70 [ 23.774759] kasan_save_track+0x18/0x40 [ 23.778605] kasan_save_alloc_info+0x3b/0x50 [ 23.782880] __kasan_krealloc+0x190/0x1f0 [ 23.786891] krealloc_noprof+0xf3/0x340 [ 23.790756] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.795549] krealloc_less_oob+0x1c/0x30 [ 23.799475] kunit_try_run_case+0x1a2/0x480 [ 23.803660] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.809060] kthread+0x334/0x6f0 [ 23.812293] ret_from_fork+0x3e/0x80 [ 23.815874] ret_from_fork_asm+0x1a/0x30 [ 23.819799] [ 23.821298] The buggy address belongs to the object at ffff88810314fa00 [ 23.821298] which belongs to the cache kmalloc-256 of size 256 [ 23.833812] The buggy address is located 17 bytes to the right of [ 23.833812] allocated 201-byte region [ffff88810314fa00, ffff88810314fac9) [ 23.846848] [ 23.848348] The buggy address belongs to the physical page: [ 23.853929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e [ 23.861935] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.869588] flags: 0x200000000000040(head|node=0|zone=2) [ 23.874930] page_type: f5(slab) [ 23.878073] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.885813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.893552] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.901379] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.909206] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff [ 23.917039] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.924863] page dumped because: kasan: bad access detected [ 23.930437] [ 23.931937] Memory state around the buggy address: [ 23.936748] ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.943973] ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.951193] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.958413] ^ [ 23.964507] ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.971726] ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.978955] ================================================================== [ 26.558086] ================================================================== [ 26.565317] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 26.572970] Write of size 1 at addr ffff888102a320ea by task kunit_try_catch/205 [ 26.580363] [ 26.581862] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 26.581869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.581871] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.581874] Call Trace: [ 26.581876] <TASK> [ 26.581877] dump_stack_lvl+0x73/0xb0 [ 26.581881] print_report+0xd1/0x650 [ 26.581885] ? __virt_addr_valid+0x1db/0x2d0 [ 26.581889] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 26.581892] ? kasan_addr_to_slab+0x11/0xa0 [ 26.581896] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 26.581917] kasan_report+0x141/0x180 [ 26.581921] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 26.581926] __asan_report_store1_noabort+0x1b/0x30 [ 26.581930] krealloc_less_oob_helper+0xe90/0x11d0 [ 26.581934] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 26.581938] ? finish_task_switch.isra.0+0x153/0x700 [ 26.581943] ? __switch_to+0x5d9/0xf60 [ 26.581959] ? dequeue_task_fair+0x166/0x4e0 [ 26.581963] ? __schedule+0x10cc/0x2b60 [ 26.581968] krealloc_large_less_oob+0x1c/0x30 [ 26.581971] kunit_try_run_case+0x1a2/0x480 [ 26.581976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.581980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.581985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.581989] ? __kthread_parkme+0x82/0x180 [ 26.581993] ? preempt_count_sub+0x50/0x80 [ 26.581998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.582003] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.582007] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.582011] kthread+0x334/0x6f0 [ 26.582014] ? trace_preempt_on+0x20/0xc0 [ 26.582018] ? __pfx_kthread+0x10/0x10 [ 26.582022] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.582026] ? calculate_sigpending+0x7b/0xa0 [ 26.582030] ? __pfx_kthread+0x10/0x10 [ 26.582033] ret_from_fork+0x3e/0x80 [ 26.582037] ? __pfx_kthread+0x10/0x10 [ 26.582040] ret_from_fork_asm+0x1a/0x30 [ 26.582045] </TASK> [ 26.582047] [ 26.760654] The buggy address belongs to the physical page: [ 26.766229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 26.774235] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.781888] flags: 0x200000000000040(head|node=0|zone=2) [ 26.787227] page_type: f8(unknown) [ 26.790632] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.798372] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.806111] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.813938] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.821790] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 26.829615] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.837440] page dumped because: kasan: bad access detected [ 26.843014] [ 26.844512] Memory state around the buggy address: [ 26.849305] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.856524] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.863743] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.870973] ^ [ 26.877584] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.884804] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.892024] ================================================================== [ 26.217515] ================================================================== [ 26.224753] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 26.232406] Write of size 1 at addr ffff888102a320da by task kunit_try_catch/205 [ 26.239799] [ 26.241300] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 26.241307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.241309] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.241312] Call Trace: [ 26.241314] <TASK> [ 26.241315] dump_stack_lvl+0x73/0xb0 [ 26.241319] print_report+0xd1/0x650 [ 26.241323] ? __virt_addr_valid+0x1db/0x2d0 [ 26.241327] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 26.241330] ? kasan_addr_to_slab+0x11/0xa0 [ 26.241334] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 26.241338] kasan_report+0x141/0x180 [ 26.241342] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 26.241347] __asan_report_store1_noabort+0x1b/0x30 [ 26.241351] krealloc_less_oob_helper+0xec6/0x11d0 [ 26.241355] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 26.241359] ? finish_task_switch.isra.0+0x153/0x700 [ 26.241363] ? __switch_to+0x5d9/0xf60 [ 26.241367] ? dequeue_task_fair+0x166/0x4e0 [ 26.241371] ? __schedule+0x10cc/0x2b60 [ 26.241376] krealloc_large_less_oob+0x1c/0x30 [ 26.241380] kunit_try_run_case+0x1a2/0x480 [ 26.241384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.241389] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.241393] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.241398] ? __kthread_parkme+0x82/0x180 [ 26.241402] ? preempt_count_sub+0x50/0x80 [ 26.241406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.241411] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.241415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.241420] kthread+0x334/0x6f0 [ 26.241423] ? trace_preempt_on+0x20/0xc0 [ 26.241427] ? __pfx_kthread+0x10/0x10 [ 26.241430] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.241434] ? calculate_sigpending+0x7b/0xa0 [ 26.241438] ? __pfx_kthread+0x10/0x10 [ 26.241441] ret_from_fork+0x3e/0x80 [ 26.241445] ? __pfx_kthread+0x10/0x10 [ 26.241449] ret_from_fork_asm+0x1a/0x30 [ 26.241454] </TASK> [ 26.241456] [ 26.419987] The buggy address belongs to the physical page: [ 26.425560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 26.433568] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.441222] flags: 0x200000000000040(head|node=0|zone=2) [ 26.446531] page_type: f8(unknown) [ 26.449939] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.457706] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.465443] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.473269] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.481097] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 26.488931] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.496781] page dumped because: kasan: bad access detected [ 26.502354] [ 26.503853] Memory state around the buggy address: [ 26.508647] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.515868] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.523093] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.530314] ^ [ 26.536405] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.543626] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.550843] ================================================================== [ 24.408641] ================================================================== [ 24.415872] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 24.423526] Write of size 1 at addr ffff88810314faeb by task kunit_try_catch/201 [ 24.430929] [ 24.432426] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 24.432434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.432436] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.432439] Call Trace: [ 24.432440] <TASK> [ 24.432442] dump_stack_lvl+0x73/0xb0 [ 24.432446] print_report+0xd1/0x650 [ 24.432450] ? __virt_addr_valid+0x1db/0x2d0 [ 24.432454] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.432457] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.432461] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.432465] kasan_report+0x141/0x180 [ 24.432469] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 24.432474] __asan_report_store1_noabort+0x1b/0x30 [ 24.432478] krealloc_less_oob_helper+0xd47/0x11d0 [ 24.432482] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.432486] ? finish_task_switch.isra.0+0x153/0x700 [ 24.432490] ? __switch_to+0x5d9/0xf60 [ 24.432494] ? dequeue_task_fair+0x166/0x4e0 [ 24.432498] ? __schedule+0x10cc/0x2b60 [ 24.432503] krealloc_less_oob+0x1c/0x30 [ 24.432506] kunit_try_run_case+0x1a2/0x480 [ 24.432511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.432515] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.432520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.432524] ? __kthread_parkme+0x82/0x180 [ 24.432528] ? preempt_count_sub+0x50/0x80 [ 24.432533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.432537] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.432542] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.432546] kthread+0x334/0x6f0 [ 24.432549] ? trace_preempt_on+0x20/0xc0 [ 24.432553] ? __pfx_kthread+0x10/0x10 [ 24.432556] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.432560] ? calculate_sigpending+0x7b/0xa0 [ 24.432564] ? __pfx_kthread+0x10/0x10 [ 24.432567] ret_from_fork+0x3e/0x80 [ 24.432571] ? __pfx_kthread+0x10/0x10 [ 24.432574] ret_from_fork_asm+0x1a/0x30 [ 24.432580] </TASK> [ 24.432581] [ 24.611782] Allocated by task 201: [ 24.615188] kasan_save_stack+0x45/0x70 [ 24.619036] kasan_save_track+0x18/0x40 [ 24.622874] kasan_save_alloc_info+0x3b/0x50 [ 24.627146] __kasan_krealloc+0x190/0x1f0 [ 24.631160] krealloc_noprof+0xf3/0x340 [ 24.634998] krealloc_less_oob_helper+0x1aa/0x11d0 [ 24.639792] krealloc_less_oob+0x1c/0x30 [ 24.643718] kunit_try_run_case+0x1a2/0x480 [ 24.647932] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.653354] kthread+0x334/0x6f0 [ 24.656587] ret_from_fork+0x3e/0x80 [ 24.660168] ret_from_fork_asm+0x1a/0x30 [ 24.664093] [ 24.665593] The buggy address belongs to the object at ffff88810314fa00 [ 24.665593] which belongs to the cache kmalloc-256 of size 256 [ 24.678109] The buggy address is located 34 bytes to the right of [ 24.678109] allocated 201-byte region [ffff88810314fa00, ffff88810314fac9) [ 24.691143] [ 24.692640] The buggy address belongs to the physical page: [ 24.698214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e [ 24.706221] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.713875] flags: 0x200000000000040(head|node=0|zone=2) [ 24.719186] page_type: f5(slab) [ 24.722335] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 24.730082] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.737830] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 24.745664] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.753490] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff [ 24.761316] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.769141] page dumped because: kasan: bad access detected [ 24.774713] [ 24.776214] Memory state around the buggy address: [ 24.781007] ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.788225] ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.795446] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.802673] ^ [ 24.809285] ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.816505] ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.823724] ================================================================== [ 23.986186] ================================================================== [ 23.993425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 24.001079] Write of size 1 at addr ffff88810314faea by task kunit_try_catch/201 [ 24.008470] [ 24.009982] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 24.009989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.009991] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.009995] Call Trace: [ 24.009996] <TASK> [ 24.009998] dump_stack_lvl+0x73/0xb0 [ 24.010001] print_report+0xd1/0x650 [ 24.010005] ? __virt_addr_valid+0x1db/0x2d0 [ 24.010009] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.010013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.010017] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.010021] kasan_report+0x141/0x180 [ 24.010025] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 24.010030] __asan_report_store1_noabort+0x1b/0x30 [ 24.010034] krealloc_less_oob_helper+0xe90/0x11d0 [ 24.010038] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 24.010041] ? finish_task_switch.isra.0+0x153/0x700 [ 24.010046] ? __switch_to+0x5d9/0xf60 [ 24.010049] ? dequeue_task_fair+0x166/0x4e0 [ 24.010054] ? __schedule+0x10cc/0x2b60 [ 24.010059] krealloc_less_oob+0x1c/0x30 [ 24.010062] kunit_try_run_case+0x1a2/0x480 [ 24.010067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.010071] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.010076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.010080] ? __kthread_parkme+0x82/0x180 [ 24.010084] ? preempt_count_sub+0x50/0x80 [ 24.010089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.010093] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.010097] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.010102] kthread+0x334/0x6f0 [ 24.010105] ? trace_preempt_on+0x20/0xc0 [ 24.010109] ? __pfx_kthread+0x10/0x10 [ 24.010112] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.010116] ? calculate_sigpending+0x7b/0xa0 [ 24.010120] ? __pfx_kthread+0x10/0x10 [ 24.010123] ret_from_fork+0x3e/0x80 [ 24.010127] ? __pfx_kthread+0x10/0x10 [ 24.010130] ret_from_fork_asm+0x1a/0x30 [ 24.010136] </TASK> [ 24.010137] [ 24.189473] Allocated by task 201: [ 24.192879] kasan_save_stack+0x45/0x70 [ 24.196719] kasan_save_track+0x18/0x40 [ 24.200558] kasan_save_alloc_info+0x3b/0x50 [ 24.204830] __kasan_krealloc+0x190/0x1f0 [ 24.208842] krealloc_noprof+0xf3/0x340 [ 24.212683] krealloc_less_oob_helper+0x1aa/0x11d0 [ 24.217476] krealloc_less_oob+0x1c/0x30 [ 24.221401] kunit_try_run_case+0x1a2/0x480 [ 24.225588] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.230987] kthread+0x334/0x6f0 [ 24.234218] ret_from_fork+0x3e/0x80 [ 24.237800] ret_from_fork_asm+0x1a/0x30 [ 24.241724] [ 24.243225] The buggy address belongs to the object at ffff88810314fa00 [ 24.243225] which belongs to the cache kmalloc-256 of size 256 [ 24.255741] The buggy address is located 33 bytes to the right of [ 24.255741] allocated 201-byte region [ffff88810314fa00, ffff88810314fac9) [ 24.268782] [ 24.270280] The buggy address belongs to the physical page: [ 24.275856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e [ 24.283863] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.291515] flags: 0x200000000000040(head|node=0|zone=2) [ 24.296829] page_type: f5(slab) [ 24.299975] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 24.307712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.315454] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 24.323288] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.331112] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff [ 24.338940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.346791] page dumped because: kasan: bad access detected [ 24.352362] [ 24.353864] Memory state around the buggy address: [ 24.358656] ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.365874] ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.373094] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.380314] ^ [ 24.386934] ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.394181] ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.401398] ================================================================== [ 25.532823] ================================================================== [ 25.544416] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 25.552077] Write of size 1 at addr ffff888102a320c9 by task kunit_try_catch/205 [ 25.559479] [ 25.560977] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 25.560984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.560986] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.560990] Call Trace: [ 25.560991] <TASK> [ 25.560993] dump_stack_lvl+0x73/0xb0 [ 25.560997] print_report+0xd1/0x650 [ 25.561001] ? __virt_addr_valid+0x1db/0x2d0 [ 25.561005] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 25.561008] ? kasan_addr_to_slab+0x11/0xa0 [ 25.561013] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 25.561016] kasan_report+0x141/0x180 [ 25.561021] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 25.561025] __asan_report_store1_noabort+0x1b/0x30 [ 25.561029] krealloc_less_oob_helper+0xd70/0x11d0 [ 25.561033] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 25.561037] ? finish_task_switch.isra.0+0x153/0x700 [ 25.561041] ? __switch_to+0x5d9/0xf60 [ 25.561045] ? dequeue_task_fair+0x166/0x4e0 [ 25.561049] ? __schedule+0x10cc/0x2b60 [ 25.561054] krealloc_large_less_oob+0x1c/0x30 [ 25.561058] kunit_try_run_case+0x1a2/0x480 [ 25.561062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.561067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.561071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.561076] ? __kthread_parkme+0x82/0x180 [ 25.561080] ? preempt_count_sub+0x50/0x80 [ 25.561085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.561089] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.561094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.561098] kthread+0x334/0x6f0 [ 25.561101] ? trace_preempt_on+0x20/0xc0 [ 25.561105] ? __pfx_kthread+0x10/0x10 [ 25.561108] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.561112] ? calculate_sigpending+0x7b/0xa0 [ 25.561116] ? __pfx_kthread+0x10/0x10 [ 25.561119] ret_from_fork+0x3e/0x80 [ 25.561123] ? __pfx_kthread+0x10/0x10 [ 25.561126] ret_from_fork_asm+0x1a/0x30 [ 25.561132] </TASK> [ 25.561133] [ 25.739682] The buggy address belongs to the physical page: [ 25.745256] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 25.753262] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.760931] flags: 0x200000000000040(head|node=0|zone=2) [ 25.766271] page_type: f8(unknown) [ 25.769678] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.777416] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.785158] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.792983] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.800809] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 25.808637] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.816470] page dumped because: kasan: bad access detected [ 25.822040] [ 25.823532] Memory state around the buggy address: [ 25.828324] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.835545] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.842764] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.849984] ^ [ 25.855557] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.862774] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.869994] ================================================================== [ 26.899249] ================================================================== [ 26.906489] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 26.914141] Write of size 1 at addr ffff888102a320eb by task kunit_try_catch/205 [ 26.921533] [ 26.923034] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 26.923042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.923044] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.923047] Call Trace: [ 26.923048] <TASK> [ 26.923050] dump_stack_lvl+0x73/0xb0 [ 26.923053] print_report+0xd1/0x650 [ 26.923057] ? __virt_addr_valid+0x1db/0x2d0 [ 26.923061] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 26.923064] ? kasan_addr_to_slab+0x11/0xa0 [ 26.923068] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 26.923072] kasan_report+0x141/0x180 [ 26.923076] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 26.923081] __asan_report_store1_noabort+0x1b/0x30 [ 26.923085] krealloc_less_oob_helper+0xd47/0x11d0 [ 26.923089] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 26.923093] ? finish_task_switch.isra.0+0x153/0x700 [ 26.923097] ? __switch_to+0x5d9/0xf60 [ 26.923101] ? dequeue_task_fair+0x166/0x4e0 [ 26.923105] ? __schedule+0x10cc/0x2b60 [ 26.923110] krealloc_large_less_oob+0x1c/0x30 [ 26.923113] kunit_try_run_case+0x1a2/0x480 [ 26.923118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.923122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.923127] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.923131] ? __kthread_parkme+0x82/0x180 [ 26.923135] ? preempt_count_sub+0x50/0x80 [ 26.923140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.923145] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.923149] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.923153] kthread+0x334/0x6f0 [ 26.923156] ? trace_preempt_on+0x20/0xc0 [ 26.923160] ? __pfx_kthread+0x10/0x10 [ 26.923163] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.923168] ? calculate_sigpending+0x7b/0xa0 [ 26.923171] ? __pfx_kthread+0x10/0x10 [ 26.923175] ret_from_fork+0x3e/0x80 [ 26.923179] ? __pfx_kthread+0x10/0x10 [ 26.923182] ret_from_fork_asm+0x1a/0x30 [ 26.923187] </TASK> [ 26.923189] [ 27.101661] The buggy address belongs to the physical page: [ 27.107235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 27.115241] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.122895] flags: 0x200000000000040(head|node=0|zone=2) [ 27.128234] page_type: f8(unknown) [ 27.131640] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.139388] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.147127] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.154973] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.162804] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 27.170630] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 27.178455] page dumped because: kasan: bad access detected [ 27.184029] [ 27.185529] Memory state around the buggy address: [ 27.190321] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.197541] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.204769] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 27.211997] ^ [ 27.218610] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.225837] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.233056] ================================================================== [ 23.142771] ================================================================== [ 23.149998] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 23.157651] Write of size 1 at addr ffff88810314fad0 by task kunit_try_catch/201 [ 23.165044] [ 23.166545] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 23.166553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.166555] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 23.166558] Call Trace: [ 23.166560] <TASK> [ 23.166561] dump_stack_lvl+0x73/0xb0 [ 23.166565] print_report+0xd1/0x650 [ 23.166570] ? __virt_addr_valid+0x1db/0x2d0 [ 23.166573] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.166577] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.166581] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.166585] kasan_report+0x141/0x180 [ 23.166589] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 23.166594] __asan_report_store1_noabort+0x1b/0x30 [ 23.166598] krealloc_less_oob_helper+0xe23/0x11d0 [ 23.166602] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 23.166606] ? finish_task_switch.isra.0+0x153/0x700 [ 23.166610] ? __switch_to+0x5d9/0xf60 [ 23.166614] ? dequeue_task_fair+0x166/0x4e0 [ 23.166618] ? __schedule+0x10cc/0x2b60 [ 23.166623] krealloc_less_oob+0x1c/0x30 [ 23.166626] kunit_try_run_case+0x1a2/0x480 [ 23.166631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.166635] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.166640] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.166645] ? __kthread_parkme+0x82/0x180 [ 23.166649] ? preempt_count_sub+0x50/0x80 [ 23.166653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.166658] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.166662] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.166666] kthread+0x334/0x6f0 [ 23.166669] ? trace_preempt_on+0x20/0xc0 [ 23.166674] ? __pfx_kthread+0x10/0x10 [ 23.166677] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.166681] ? calculate_sigpending+0x7b/0xa0 [ 23.166685] ? __pfx_kthread+0x10/0x10 [ 23.166688] ret_from_fork+0x3e/0x80 [ 23.166692] ? __pfx_kthread+0x10/0x10 [ 23.166695] ret_from_fork_asm+0x1a/0x30 [ 23.166700] </TASK> [ 23.166702] [ 23.345950] Allocated by task 201: [ 23.349373] kasan_save_stack+0x45/0x70 [ 23.353214] kasan_save_track+0x18/0x40 [ 23.357052] kasan_save_alloc_info+0x3b/0x50 [ 23.361327] __kasan_krealloc+0x190/0x1f0 [ 23.365346] krealloc_noprof+0xf3/0x340 [ 23.369185] krealloc_less_oob_helper+0x1aa/0x11d0 [ 23.373980] krealloc_less_oob+0x1c/0x30 [ 23.377931] kunit_try_run_case+0x1a2/0x480 [ 23.382116] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.387517] kthread+0x334/0x6f0 [ 23.390748] ret_from_fork+0x3e/0x80 [ 23.394329] ret_from_fork_asm+0x1a/0x30 [ 23.398254] [ 23.399754] The buggy address belongs to the object at ffff88810314fa00 [ 23.399754] which belongs to the cache kmalloc-256 of size 256 [ 23.412267] The buggy address is located 7 bytes to the right of [ 23.412267] allocated 201-byte region [ffff88810314fa00, ffff88810314fac9) [ 23.425215] [ 23.426715] The buggy address belongs to the physical page: [ 23.432287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e [ 23.440287] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.447961] flags: 0x200000000000040(head|node=0|zone=2) [ 23.453280] page_type: f5(slab) [ 23.456425] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.464164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.471930] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.479782] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.487608] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff [ 23.495442] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.503269] page dumped because: kasan: bad access detected [ 23.508839] [ 23.510331] Memory state around the buggy address: [ 23.515123] ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.522345] ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.529570] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.536791] ^ [ 23.542625] ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.549850] ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.557071] ================================================================== [ 25.877258] ================================================================== [ 25.884504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 25.892163] Write of size 1 at addr ffff888102a320d0 by task kunit_try_catch/205 [ 25.899557] [ 25.901055] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 25.901063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.901065] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.901068] Call Trace: [ 25.901069] <TASK> [ 25.901071] dump_stack_lvl+0x73/0xb0 [ 25.901075] print_report+0xd1/0x650 [ 25.901079] ? __virt_addr_valid+0x1db/0x2d0 [ 25.901083] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 25.901086] ? kasan_addr_to_slab+0x11/0xa0 [ 25.901090] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 25.901094] kasan_report+0x141/0x180 [ 25.901098] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 25.901103] __asan_report_store1_noabort+0x1b/0x30 [ 25.901107] krealloc_less_oob_helper+0xe23/0x11d0 [ 25.901111] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 25.901115] ? finish_task_switch.isra.0+0x153/0x700 [ 25.901119] ? __switch_to+0x5d9/0xf60 [ 25.901123] ? dequeue_task_fair+0x166/0x4e0 [ 25.901127] ? __schedule+0x10cc/0x2b60 [ 25.901132] krealloc_large_less_oob+0x1c/0x30 [ 25.901135] kunit_try_run_case+0x1a2/0x480 [ 25.901140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.901144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.901149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.901154] ? __kthread_parkme+0x82/0x180 [ 25.901158] ? preempt_count_sub+0x50/0x80 [ 25.901162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.901167] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.901171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.901176] kthread+0x334/0x6f0 [ 25.901178] ? trace_preempt_on+0x20/0xc0 [ 25.901183] ? __pfx_kthread+0x10/0x10 [ 25.901186] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.901190] ? calculate_sigpending+0x7b/0xa0 [ 25.901194] ? __pfx_kthread+0x10/0x10 [ 25.901197] ret_from_fork+0x3e/0x80 [ 25.901201] ? __pfx_kthread+0x10/0x10 [ 25.901204] ret_from_fork_asm+0x1a/0x30 [ 25.901210] </TASK> [ 25.901211] [ 26.079708] The buggy address belongs to the physical page: [ 26.085282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 26.093291] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.100972] flags: 0x200000000000040(head|node=0|zone=2) [ 26.106290] page_type: f8(unknown) [ 26.109695] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.117436] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.125175] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.133000] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.140829] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 26.148662] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.156494] page dumped because: kasan: bad access detected [ 26.162069] [ 26.163568] Memory state around the buggy address: [ 26.168360] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.175580] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.182800] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.190019] ^ [ 26.195851] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.203070] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.210288] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 24.839494] ================================================================== [ 24.850565] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 24.858138] Write of size 1 at addr ffff888102a320eb by task kunit_try_catch/203 [ 24.865532] [ 24.867033] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 24.867041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.867044] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.867047] Call Trace: [ 24.867049] <TASK> [ 24.867051] dump_stack_lvl+0x73/0xb0 [ 24.867055] print_report+0xd1/0x650 [ 24.867059] ? __virt_addr_valid+0x1db/0x2d0 [ 24.867063] ? krealloc_more_oob_helper+0x821/0x930 [ 24.867067] ? kasan_addr_to_slab+0x11/0xa0 [ 24.867071] ? krealloc_more_oob_helper+0x821/0x930 [ 24.867074] kasan_report+0x141/0x180 [ 24.867079] ? krealloc_more_oob_helper+0x821/0x930 [ 24.867083] __asan_report_store1_noabort+0x1b/0x30 [ 24.867087] krealloc_more_oob_helper+0x821/0x930 [ 24.867091] ? __schedule+0x10cc/0x2b60 [ 24.867095] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 24.867099] ? finish_task_switch.isra.0+0x153/0x700 [ 24.867103] ? __switch_to+0x5d9/0xf60 [ 24.867107] ? dequeue_task_fair+0x166/0x4e0 [ 24.867111] ? __schedule+0x10cc/0x2b60 [ 24.867116] krealloc_large_more_oob+0x1c/0x30 [ 24.867120] kunit_try_run_case+0x1a2/0x480 [ 24.867124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.867129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.867133] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.867138] ? __kthread_parkme+0x82/0x180 [ 24.867142] ? preempt_count_sub+0x50/0x80 [ 24.867146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.867151] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.867155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.867160] kthread+0x334/0x6f0 [ 24.867163] ? trace_preempt_on+0x20/0xc0 [ 24.867167] ? __pfx_kthread+0x10/0x10 [ 24.867170] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.867174] ? calculate_sigpending+0x7b/0xa0 [ 24.867178] ? __pfx_kthread+0x10/0x10 [ 24.867181] ret_from_fork+0x3e/0x80 [ 24.867185] ? __pfx_kthread+0x10/0x10 [ 24.867188] ret_from_fork_asm+0x1a/0x30 [ 24.867194] </TASK> [ 24.867195] [ 25.049194] The buggy address belongs to the physical page: [ 25.054767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 25.062766] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.070419] flags: 0x200000000000040(head|node=0|zone=2) [ 25.075731] page_type: f8(unknown) [ 25.079141] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.086887] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.094662] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.102496] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.110323] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 25.118157] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.125991] page dumped because: kasan: bad access detected [ 25.131561] [ 25.133061] Memory state around the buggy address: [ 25.137857] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.145083] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.152301] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 25.159521] ^ [ 25.166133] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.173355] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.180581] ================================================================== [ 21.861861] ================================================================== [ 21.872660] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 21.880233] Write of size 1 at addr ffff8881041b9eeb by task kunit_try_catch/199 [ 21.887627] [ 21.889127] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 21.889135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.889138] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.889141] Call Trace: [ 21.889143] <TASK> [ 21.889144] dump_stack_lvl+0x73/0xb0 [ 21.889148] print_report+0xd1/0x650 [ 21.889153] ? __virt_addr_valid+0x1db/0x2d0 [ 21.889157] ? krealloc_more_oob_helper+0x821/0x930 [ 21.889161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.889165] ? krealloc_more_oob_helper+0x821/0x930 [ 21.889169] kasan_report+0x141/0x180 [ 21.889173] ? krealloc_more_oob_helper+0x821/0x930 [ 21.889178] __asan_report_store1_noabort+0x1b/0x30 [ 21.889182] krealloc_more_oob_helper+0x821/0x930 [ 21.889185] ? __schedule+0x10cc/0x2b60 [ 21.889189] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 21.889193] ? finish_task_switch.isra.0+0x153/0x700 [ 21.889198] ? __switch_to+0x5d9/0xf60 [ 21.889202] ? dequeue_task_fair+0x166/0x4e0 [ 21.889207] ? __schedule+0x10cc/0x2b60 [ 21.889212] krealloc_more_oob+0x1c/0x30 [ 21.889215] kunit_try_run_case+0x1a2/0x480 [ 21.889220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.889224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.889229] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.889233] ? __kthread_parkme+0x82/0x180 [ 21.889237] ? preempt_count_sub+0x50/0x80 [ 21.889242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.889247] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.889251] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.889255] kthread+0x334/0x6f0 [ 21.889258] ? trace_preempt_on+0x20/0xc0 [ 21.889263] ? __pfx_kthread+0x10/0x10 [ 21.889266] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.889270] ? calculate_sigpending+0x7b/0xa0 [ 21.889274] ? __pfx_kthread+0x10/0x10 [ 21.889277] ret_from_fork+0x3e/0x80 [ 21.889281] ? __pfx_kthread+0x10/0x10 [ 21.889284] ret_from_fork_asm+0x1a/0x30 [ 21.889290] </TASK> [ 21.889291] [ 22.072007] Allocated by task 199: [ 22.075415] kasan_save_stack+0x45/0x70 [ 22.079252] kasan_save_track+0x18/0x40 [ 22.083094] kasan_save_alloc_info+0x3b/0x50 [ 22.087366] __kasan_krealloc+0x190/0x1f0 [ 22.091377] krealloc_noprof+0xf3/0x340 [ 22.095217] krealloc_more_oob_helper+0x1a9/0x930 [ 22.099929] krealloc_more_oob+0x1c/0x30 [ 22.103942] kunit_try_run_case+0x1a2/0x480 [ 22.108157] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.113555] kthread+0x334/0x6f0 [ 22.116790] ret_from_fork+0x3e/0x80 [ 22.120369] ret_from_fork_asm+0x1a/0x30 [ 22.124294] [ 22.125793] The buggy address belongs to the object at ffff8881041b9e00 [ 22.125793] which belongs to the cache kmalloc-256 of size 256 [ 22.138299] The buggy address is located 0 bytes to the right of [ 22.138299] allocated 235-byte region [ffff8881041b9e00, ffff8881041b9eeb) [ 22.151249] [ 22.152748] The buggy address belongs to the physical page: [ 22.158321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b8 [ 22.166327] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.173983] flags: 0x200000000000040(head|node=0|zone=2) [ 22.179303] page_type: f5(slab) [ 22.182449] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 22.190198] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.197978] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 22.205803] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.213632] head: 0200000000000001 ffffea0004106e01 00000000ffffffff 00000000ffffffff [ 22.221465] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.229290] page dumped because: kasan: bad access detected [ 22.234862] [ 22.236362] Memory state around the buggy address: [ 22.241155] ffff8881041b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.248374] ffff8881041b9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.255595] >ffff8881041b9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.262821] ^ [ 22.269436] ffff8881041b9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.276664] ffff8881041b9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.283881] ================================================================== [ 22.291197] ================================================================== [ 22.298425] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 22.305999] Write of size 1 at addr ffff8881041b9ef0 by task kunit_try_catch/199 [ 22.313393] [ 22.314914] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 22.314922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.314925] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 22.314928] Call Trace: [ 22.314930] <TASK> [ 22.314931] dump_stack_lvl+0x73/0xb0 [ 22.314948] print_report+0xd1/0x650 [ 22.314952] ? __virt_addr_valid+0x1db/0x2d0 [ 22.314968] ? krealloc_more_oob_helper+0x7eb/0x930 [ 22.314972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.314976] ? krealloc_more_oob_helper+0x7eb/0x930 [ 22.314980] kasan_report+0x141/0x180 [ 22.314984] ? krealloc_more_oob_helper+0x7eb/0x930 [ 22.314989] __asan_report_store1_noabort+0x1b/0x30 [ 22.314993] krealloc_more_oob_helper+0x7eb/0x930 [ 22.314996] ? __schedule+0x10cc/0x2b60 [ 22.315001] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 22.315005] ? finish_task_switch.isra.0+0x153/0x700 [ 22.315009] ? __switch_to+0x5d9/0xf60 [ 22.315013] ? dequeue_task_fair+0x166/0x4e0 [ 22.315017] ? __schedule+0x10cc/0x2b60 [ 22.315022] krealloc_more_oob+0x1c/0x30 [ 22.315025] kunit_try_run_case+0x1a2/0x480 [ 22.315030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.315034] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.315039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.315043] ? __kthread_parkme+0x82/0x180 [ 22.315048] ? preempt_count_sub+0x50/0x80 [ 22.315052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.315057] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.315061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.315066] kthread+0x334/0x6f0 [ 22.315068] ? trace_preempt_on+0x20/0xc0 [ 22.315073] ? __pfx_kthread+0x10/0x10 [ 22.315076] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.315080] ? calculate_sigpending+0x7b/0xa0 [ 22.315084] ? __pfx_kthread+0x10/0x10 [ 22.315087] ret_from_fork+0x3e/0x80 [ 22.315091] ? __pfx_kthread+0x10/0x10 [ 22.315094] ret_from_fork_asm+0x1a/0x30 [ 22.315100] </TASK> [ 22.315101] [ 22.497931] Allocated by task 199: [ 22.501380] kasan_save_stack+0x45/0x70 [ 22.505217] kasan_save_track+0x18/0x40 [ 22.509057] kasan_save_alloc_info+0x3b/0x50 [ 22.513332] __kasan_krealloc+0x190/0x1f0 [ 22.517343] krealloc_noprof+0xf3/0x340 [ 22.521183] krealloc_more_oob_helper+0x1a9/0x930 [ 22.525889] krealloc_more_oob+0x1c/0x30 [ 22.529839] kunit_try_run_case+0x1a2/0x480 [ 22.534027] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.539425] kthread+0x334/0x6f0 [ 22.542659] ret_from_fork+0x3e/0x80 [ 22.546238] ret_from_fork_asm+0x1a/0x30 [ 22.550164] [ 22.551662] The buggy address belongs to the object at ffff8881041b9e00 [ 22.551662] which belongs to the cache kmalloc-256 of size 256 [ 22.564170] The buggy address is located 5 bytes to the right of [ 22.564170] allocated 235-byte region [ffff8881041b9e00, ffff8881041b9eeb) [ 22.577117] [ 22.578615] The buggy address belongs to the physical page: [ 22.584190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b8 [ 22.592196] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.599848] flags: 0x200000000000040(head|node=0|zone=2) [ 22.605164] page_type: f5(slab) [ 22.608308] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 22.616049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.623796] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 22.631622] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.639449] head: 0200000000000001 ffffea0004106e01 00000000ffffffff 00000000ffffffff [ 22.647275] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.655108] page dumped because: kasan: bad access detected [ 22.660680] [ 22.662180] Memory state around the buggy address: [ 22.666983] ffff8881041b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.674202] ffff8881041b9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.681420] >ffff8881041b9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.688640] ^ [ 22.695513] ffff8881041b9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.702733] ffff8881041b9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.709961] ================================================================== [ 25.187825] ================================================================== [ 25.195055] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 25.202630] Write of size 1 at addr ffff888102a320f0 by task kunit_try_catch/203 [ 25.210030] [ 25.211530] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 25.211538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.211540] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.211543] Call Trace: [ 25.211545] <TASK> [ 25.211546] dump_stack_lvl+0x73/0xb0 [ 25.211550] print_report+0xd1/0x650 [ 25.211554] ? __virt_addr_valid+0x1db/0x2d0 [ 25.211558] ? krealloc_more_oob_helper+0x7eb/0x930 [ 25.211562] ? kasan_addr_to_slab+0x11/0xa0 [ 25.211566] ? krealloc_more_oob_helper+0x7eb/0x930 [ 25.211570] kasan_report+0x141/0x180 [ 25.211574] ? krealloc_more_oob_helper+0x7eb/0x930 [ 25.211579] __asan_report_store1_noabort+0x1b/0x30 [ 25.211583] krealloc_more_oob_helper+0x7eb/0x930 [ 25.211586] ? __schedule+0x10cc/0x2b60 [ 25.211590] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 25.211594] ? finish_task_switch.isra.0+0x153/0x700 [ 25.211599] ? __switch_to+0x5d9/0xf60 [ 25.211602] ? dequeue_task_fair+0x166/0x4e0 [ 25.211607] ? __schedule+0x10cc/0x2b60 [ 25.211612] krealloc_large_more_oob+0x1c/0x30 [ 25.211615] kunit_try_run_case+0x1a2/0x480 [ 25.211620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.211624] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.211629] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.211633] ? __kthread_parkme+0x82/0x180 [ 25.211638] ? preempt_count_sub+0x50/0x80 [ 25.211642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.211647] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.211651] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.211656] kthread+0x334/0x6f0 [ 25.211659] ? trace_preempt_on+0x20/0xc0 [ 25.211663] ? __pfx_kthread+0x10/0x10 [ 25.211666] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.211670] ? calculate_sigpending+0x7b/0xa0 [ 25.211674] ? __pfx_kthread+0x10/0x10 [ 25.211677] ret_from_fork+0x3e/0x80 [ 25.211681] ? __pfx_kthread+0x10/0x10 [ 25.211685] ret_from_fork_asm+0x1a/0x30 [ 25.211690] </TASK> [ 25.211692] [ 25.393720] The buggy address belongs to the physical page: [ 25.399291] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 25.407292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.414961] flags: 0x200000000000040(head|node=0|zone=2) [ 25.420274] page_type: f8(unknown) [ 25.423681] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.431420] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.439168] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.447003] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.454839] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 25.462671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.470496] page dumped because: kasan: bad access detected [ 25.476069] [ 25.477569] Memory state around the buggy address: [ 25.482362] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.489582] ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.496800] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 25.504019] ^ [ 25.510913] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.518190] ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.525407] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 21.575208] ================================================================== [ 21.590265] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0 [ 21.596619] Read of size 1 at addr ffff888107240000 by task kunit_try_catch/197 [ 21.603930] [ 21.605451] CPU: 3 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 21.605459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.605461] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.605465] Call Trace: [ 21.605466] <TASK> [ 21.605468] dump_stack_lvl+0x73/0xb0 [ 21.605472] print_report+0xd1/0x650 [ 21.605477] ? __virt_addr_valid+0x1db/0x2d0 [ 21.605481] ? page_alloc_uaf+0x356/0x3d0 [ 21.605484] ? kasan_addr_to_slab+0x11/0xa0 [ 21.605488] ? page_alloc_uaf+0x356/0x3d0 [ 21.605491] kasan_report+0x141/0x180 [ 21.605495] ? page_alloc_uaf+0x356/0x3d0 [ 21.605500] __asan_report_load1_noabort+0x18/0x20 [ 21.605503] page_alloc_uaf+0x356/0x3d0 [ 21.605507] ? __pfx_page_alloc_uaf+0x10/0x10 [ 21.605510] ? __schedule+0x10cc/0x2b60 [ 21.605515] ? ktime_get_ts64+0x83/0x230 [ 21.605519] kunit_try_run_case+0x1a2/0x480 [ 21.605524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.605528] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.605533] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.605538] ? __kthread_parkme+0x82/0x180 [ 21.605542] ? preempt_count_sub+0x50/0x80 [ 21.605546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.605551] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.605555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.605560] kthread+0x334/0x6f0 [ 21.605563] ? trace_preempt_on+0x20/0xc0 [ 21.605567] ? __pfx_kthread+0x10/0x10 [ 21.605570] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.605574] ? calculate_sigpending+0x7b/0xa0 [ 21.605578] ? __pfx_kthread+0x10/0x10 [ 21.605581] ret_from_fork+0x3e/0x80 [ 21.605585] ? __pfx_kthread+0x10/0x10 [ 21.605588] ret_from_fork_asm+0x1a/0x30 [ 21.605594] </TASK> [ 21.605596] [ 21.765990] The buggy address belongs to the physical page: [ 21.771562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107240 [ 21.779561] flags: 0x200000000000000(node=0|zone=2) [ 21.784440] page_type: f0(buddy) [ 21.787674] raw: 0200000000000000 ffffea00041c7808 ffff888277bfd3e0 0000000000000000 [ 21.795416] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 21.803161] page dumped because: kasan: bad access detected [ 21.808735] [ 21.810233] Memory state around the buggy address: [ 21.815025] ffff88810723ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.822246] ffff88810723ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.829464] >ffff888107240000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.836684] ^ [ 21.839934] ffff888107240080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.847181] ffff888107240100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.854407] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 21.242637] ================================================================== [ 21.253618] BUG: KASAN: invalid-free in kfree+0x274/0x3f0 [ 21.259019] Free of addr ffff888102a1c001 by task kunit_try_catch/193 [ 21.265466] [ 21.266995] CPU: 3 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 21.267003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.267006] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.267009] Call Trace: [ 21.267011] <TASK> [ 21.267013] dump_stack_lvl+0x73/0xb0 [ 21.267017] print_report+0xd1/0x650 [ 21.267021] ? __virt_addr_valid+0x1db/0x2d0 [ 21.267025] ? kasan_addr_to_slab+0x11/0xa0 [ 21.267029] ? kfree+0x274/0x3f0 [ 21.267033] kasan_report_invalid_free+0x10a/0x130 [ 21.267038] ? kfree+0x274/0x3f0 [ 21.267041] ? kfree+0x274/0x3f0 [ 21.267044] __kasan_kfree_large+0x86/0xd0 [ 21.267048] free_large_kmalloc+0x4b/0x110 [ 21.267052] kfree+0x274/0x3f0 [ 21.267056] kmalloc_large_invalid_free+0x120/0x2b0 [ 21.267060] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 21.267065] ? __schedule+0x10cc/0x2b60 [ 21.267070] ? ktime_get_ts64+0x83/0x230 [ 21.267074] kunit_try_run_case+0x1a2/0x480 [ 21.267079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.267084] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.267088] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.267093] ? __kthread_parkme+0x82/0x180 [ 21.267097] ? preempt_count_sub+0x50/0x80 [ 21.267102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.267106] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.267111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.267115] kthread+0x334/0x6f0 [ 21.267118] ? trace_preempt_on+0x20/0xc0 [ 21.267122] ? __pfx_kthread+0x10/0x10 [ 21.267125] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.267129] ? calculate_sigpending+0x7b/0xa0 [ 21.267133] ? __pfx_kthread+0x10/0x10 [ 21.267136] ret_from_fork+0x3e/0x80 [ 21.267140] ? __pfx_kthread+0x10/0x10 [ 21.267143] ret_from_fork_asm+0x1a/0x30 [ 21.267149] </TASK> [ 21.267151] [ 21.434779] The buggy address belongs to the physical page: [ 21.440352] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1c [ 21.448358] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.456011] flags: 0x200000000000040(head|node=0|zone=2) [ 21.461323] page_type: f8(unknown) [ 21.464730] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.472471] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.480218] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.488051] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.495877] head: 0200000000000002 ffffea00040a8701 00000000ffffffff 00000000ffffffff [ 21.503737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.511563] page dumped because: kasan: bad access detected [ 21.517137] [ 21.518635] Memory state around the buggy address: [ 21.523429] ffff888102a1bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.530649] ffff888102a1bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.537877] >ffff888102a1c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.545128] ^ [ 21.548362] ffff888102a1c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.555582] ffff888102a1c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.562801] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 20.961202] ================================================================== [ 20.972715] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340 [ 20.979328] Read of size 1 at addr ffff888102a30000 by task kunit_try_catch/191 [ 20.986634] [ 20.988136] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 20.988144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.988146] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 20.988149] Call Trace: [ 20.988150] <TASK> [ 20.988152] dump_stack_lvl+0x73/0xb0 [ 20.988156] print_report+0xd1/0x650 [ 20.988160] ? __virt_addr_valid+0x1db/0x2d0 [ 20.988164] ? kmalloc_large_uaf+0x2f1/0x340 [ 20.988168] ? kasan_addr_to_slab+0x11/0xa0 [ 20.988172] ? kmalloc_large_uaf+0x2f1/0x340 [ 20.988176] kasan_report+0x141/0x180 [ 20.988180] ? kmalloc_large_uaf+0x2f1/0x340 [ 20.988185] __asan_report_load1_noabort+0x18/0x20 [ 20.988189] kmalloc_large_uaf+0x2f1/0x340 [ 20.988193] ? __pfx_kmalloc_large_uaf+0x10/0x10 [ 20.988197] ? __schedule+0x10cc/0x2b60 [ 20.988202] ? ktime_get_ts64+0x83/0x230 [ 20.988206] kunit_try_run_case+0x1a2/0x480 [ 20.988211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.988216] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.988220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.988225] ? __kthread_parkme+0x82/0x180 [ 20.988229] ? preempt_count_sub+0x50/0x80 [ 20.988233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.988238] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.988242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.988247] kthread+0x334/0x6f0 [ 20.988249] ? trace_preempt_on+0x20/0xc0 [ 20.988254] ? __pfx_kthread+0x10/0x10 [ 20.988257] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.988261] ? calculate_sigpending+0x7b/0xa0 [ 20.988265] ? __pfx_kthread+0x10/0x10 [ 20.988268] ret_from_fork+0x3e/0x80 [ 20.988272] ? __pfx_kthread+0x10/0x10 [ 20.988275] ret_from_fork_asm+0x1a/0x30 [ 20.988281] </TASK> [ 20.988282] [ 21.149913] The buggy address belongs to the physical page: [ 21.155487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 21.163486] flags: 0x200000000000000(node=0|zone=2) [ 21.168367] raw: 0200000000000000 ffffea0004168608 ffff8882304b9a80 0000000000000000 [ 21.176113] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 21.183853] page dumped because: kasan: bad access detected [ 21.189426] [ 21.190924] Memory state around the buggy address: [ 21.195735] ffff888102a2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.202953] ffff888102a2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.210173] >ffff888102a30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.217393] ^ [ 21.220624] ffff888102a30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.227844] ffff888102a30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.235065] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 20.633119] ================================================================== [ 20.644442] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330 [ 20.651929] Write of size 1 at addr ffff888102a3200a by task kunit_try_catch/189 [ 20.659347] [ 20.660847] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 20.660855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.660857] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 20.660860] Call Trace: [ 20.660862] <TASK> [ 20.660864] dump_stack_lvl+0x73/0xb0 [ 20.660867] print_report+0xd1/0x650 [ 20.660872] ? __virt_addr_valid+0x1db/0x2d0 [ 20.660875] ? kmalloc_large_oob_right+0x2e9/0x330 [ 20.660880] ? kasan_addr_to_slab+0x11/0xa0 [ 20.660884] ? kmalloc_large_oob_right+0x2e9/0x330 [ 20.660888] kasan_report+0x141/0x180 [ 20.660892] ? kmalloc_large_oob_right+0x2e9/0x330 [ 20.660914] __asan_report_store1_noabort+0x1b/0x30 [ 20.660919] kmalloc_large_oob_right+0x2e9/0x330 [ 20.660923] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 20.660942] ? __schedule+0x10cc/0x2b60 [ 20.660947] ? ktime_get_ts64+0x83/0x230 [ 20.660964] kunit_try_run_case+0x1a2/0x480 [ 20.660969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.660974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.660978] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.660995] ? __kthread_parkme+0x82/0x180 [ 20.660999] ? preempt_count_sub+0x50/0x80 [ 20.661004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.661009] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.661013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.661017] kthread+0x334/0x6f0 [ 20.661020] ? trace_preempt_on+0x20/0xc0 [ 20.661025] ? __pfx_kthread+0x10/0x10 [ 20.661028] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.661032] ? calculate_sigpending+0x7b/0xa0 [ 20.661036] ? __pfx_kthread+0x10/0x10 [ 20.661039] ret_from_fork+0x3e/0x80 [ 20.661043] ? __pfx_kthread+0x10/0x10 [ 20.661046] ret_from_fork_asm+0x1a/0x30 [ 20.661051] </TASK> [ 20.661053] [ 20.825340] The buggy address belongs to the physical page: [ 20.830929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 20.838975] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.846633] flags: 0x200000000000040(head|node=0|zone=2) [ 20.851970] page_type: f8(unknown) [ 20.855380] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.863126] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.870868] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.878701] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.886527] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff [ 20.894352] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.902178] page dumped because: kasan: bad access detected [ 20.907751] [ 20.909251] Memory state around the buggy address: [ 20.914043] ffff888102a31f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.921264] ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.928492] >ffff888102a32000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.935710] ^ [ 20.939203] ffff888102a32080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.946422] ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.953641] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 20.227402] ================================================================== [ 20.239849] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370 [ 20.247162] Write of size 1 at addr ffff888107201f00 by task kunit_try_catch/187 [ 20.254555] [ 20.256058] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 20.256065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.256067] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 20.256071] Call Trace: [ 20.256072] <TASK> [ 20.256074] dump_stack_lvl+0x73/0xb0 [ 20.256078] print_report+0xd1/0x650 [ 20.256082] ? __virt_addr_valid+0x1db/0x2d0 [ 20.256086] ? kmalloc_big_oob_right+0x316/0x370 [ 20.256090] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.256095] ? kmalloc_big_oob_right+0x316/0x370 [ 20.256099] kasan_report+0x141/0x180 [ 20.256104] ? kmalloc_big_oob_right+0x316/0x370 [ 20.256109] __asan_report_store1_noabort+0x1b/0x30 [ 20.256113] kmalloc_big_oob_right+0x316/0x370 [ 20.256117] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [ 20.256122] ? __schedule+0x10cc/0x2b60 [ 20.256126] ? ktime_get_ts64+0x83/0x230 [ 20.256131] kunit_try_run_case+0x1a2/0x480 [ 20.256136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.256140] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.256145] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.256149] ? __kthread_parkme+0x82/0x180 [ 20.256153] ? preempt_count_sub+0x50/0x80 [ 20.256158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.256163] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.256167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.256172] kthread+0x334/0x6f0 [ 20.256174] ? trace_preempt_on+0x20/0xc0 [ 20.256179] ? __pfx_kthread+0x10/0x10 [ 20.256182] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.256186] ? calculate_sigpending+0x7b/0xa0 [ 20.256190] ? __pfx_kthread+0x10/0x10 [ 20.256193] ret_from_fork+0x3e/0x80 [ 20.256197] ? __pfx_kthread+0x10/0x10 [ 20.256200] ret_from_fork_asm+0x1a/0x30 [ 20.256206] </TASK> [ 20.256207] [ 20.420885] Allocated by task 187: [ 20.424291] kasan_save_stack+0x45/0x70 [ 20.428131] kasan_save_track+0x18/0x40 [ 20.431973] kasan_save_alloc_info+0x3b/0x50 [ 20.436251] __kasan_kmalloc+0xb7/0xc0 [ 20.440003] __kmalloc_cache_noprof+0x189/0x420 [ 20.444537] kmalloc_big_oob_right+0xa9/0x370 [ 20.448897] kunit_try_run_case+0x1a2/0x480 [ 20.453108] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.458508] kthread+0x334/0x6f0 [ 20.461739] ret_from_fork+0x3e/0x80 [ 20.465321] ret_from_fork_asm+0x1a/0x30 [ 20.469247] [ 20.470745] The buggy address belongs to the object at ffff888107200000 [ 20.470745] which belongs to the cache kmalloc-8k of size 8192 [ 20.483260] The buggy address is located 0 bytes to the right of [ 20.483260] allocated 7936-byte region [ffff888107200000, ffff888107201f00) [ 20.496293] [ 20.497792] The buggy address belongs to the physical page: [ 20.503367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107200 [ 20.511375] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.519036] flags: 0x200000000000040(head|node=0|zone=2) [ 20.524348] page_type: f5(slab) [ 20.527494] raw: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000 [ 20.535235] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 20.542984] head: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000 [ 20.550834] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 20.558669] head: 0200000000000003 ffffea00041c8001 00000000ffffffff 00000000ffffffff [ 20.566494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 20.574319] page dumped because: kasan: bad access detected [ 20.579892] [ 20.581417] Memory state around the buggy address: [ 20.586212] ffff888107201e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.593431] ffff888107201e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.600651] >ffff888107201f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.607878] ^ [ 20.611109] ffff888107201f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.618330] ffff888107202000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.625547] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 19.675394] ================================================================== [ 19.686805] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 19.694890] Write of size 1 at addr ffff8881043d8e78 by task kunit_try_catch/185 [ 19.702308] [ 19.703809] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.703817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.703819] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 19.703823] Call Trace: [ 19.703824] <TASK> [ 19.703826] dump_stack_lvl+0x73/0xb0 [ 19.703830] print_report+0xd1/0x650 [ 19.703834] ? __virt_addr_valid+0x1db/0x2d0 [ 19.703838] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 19.703842] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.703846] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 19.703850] kasan_report+0x141/0x180 [ 19.703855] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 19.703860] __asan_report_store1_noabort+0x1b/0x30 [ 19.703864] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 19.703868] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 19.703872] ? __schedule+0x10cc/0x2b60 [ 19.703876] ? ktime_get_ts64+0x83/0x230 [ 19.703881] kunit_try_run_case+0x1a2/0x480 [ 19.703886] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.703890] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.703895] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.703916] ? __kthread_parkme+0x82/0x180 [ 19.703920] ? preempt_count_sub+0x50/0x80 [ 19.703925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.703930] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.703934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.703939] kthread+0x334/0x6f0 [ 19.703954] ? trace_preempt_on+0x20/0xc0 [ 19.703959] ? __pfx_kthread+0x10/0x10 [ 19.703962] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.703966] ? calculate_sigpending+0x7b/0xa0 [ 19.703970] ? __pfx_kthread+0x10/0x10 [ 19.703973] ret_from_fork+0x3e/0x80 [ 19.703977] ? __pfx_kthread+0x10/0x10 [ 19.703980] ret_from_fork_asm+0x1a/0x30 [ 19.703986] </TASK> [ 19.703987] [ 19.872529] Allocated by task 185: [ 19.875937] kasan_save_stack+0x45/0x70 [ 19.879802] kasan_save_track+0x18/0x40 [ 19.883640] kasan_save_alloc_info+0x3b/0x50 [ 19.887933] __kasan_kmalloc+0xb7/0xc0 [ 19.891683] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 19.897256] kmalloc_track_caller_oob_right+0x99/0x520 [ 19.902397] kunit_try_run_case+0x1a2/0x480 [ 19.906590] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.911989] kthread+0x334/0x6f0 [ 19.915224] ret_from_fork+0x3e/0x80 [ 19.918809] ret_from_fork_asm+0x1a/0x30 [ 19.922737] [ 19.924236] The buggy address belongs to the object at ffff8881043d8e00 [ 19.924236] which belongs to the cache kmalloc-128 of size 128 [ 19.936741] The buggy address is located 0 bytes to the right of [ 19.936741] allocated 120-byte region [ffff8881043d8e00, ffff8881043d8e78) [ 19.949690] [ 19.951189] The buggy address belongs to the physical page: [ 19.956762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043d8 [ 19.964768] flags: 0x200000000000000(node=0|zone=2) [ 19.969651] page_type: f5(slab) [ 19.972797] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 19.980545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.988292] page dumped because: kasan: bad access detected [ 19.993864] [ 19.995362] Memory state around the buggy address: [ 20.000156] ffff8881043d8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.007375] ffff8881043d8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.014594] >ffff8881043d8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.021812] ^ [ 20.028958] ffff8881043d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.036182] ffff8881043d8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.043403] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 19.270235] ================================================================== [ 19.281190] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0 [ 19.288590] Read of size 1 at addr ffff888105f47000 by task kunit_try_catch/183 [ 19.295927] [ 19.297477] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.297485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.297487] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 19.297491] Call Trace: [ 19.297492] <TASK> [ 19.297494] dump_stack_lvl+0x73/0xb0 [ 19.297498] print_report+0xd1/0x650 [ 19.297503] ? __virt_addr_valid+0x1db/0x2d0 [ 19.297507] ? kmalloc_node_oob_right+0x369/0x3c0 [ 19.297510] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.297515] ? kmalloc_node_oob_right+0x369/0x3c0 [ 19.297519] kasan_report+0x141/0x180 [ 19.297523] ? kmalloc_node_oob_right+0x369/0x3c0 [ 19.297528] __asan_report_load1_noabort+0x18/0x20 [ 19.297532] kmalloc_node_oob_right+0x369/0x3c0 [ 19.297535] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [ 19.297539] ? __schedule+0x10cc/0x2b60 [ 19.297544] ? ktime_get_ts64+0x83/0x230 [ 19.297549] kunit_try_run_case+0x1a2/0x480 [ 19.297553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.297558] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.297563] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.297567] ? __kthread_parkme+0x82/0x180 [ 19.297571] ? preempt_count_sub+0x50/0x80 [ 19.297576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.297581] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.297585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.297590] kthread+0x334/0x6f0 [ 19.297593] ? trace_preempt_on+0x20/0xc0 [ 19.297597] ? __pfx_kthread+0x10/0x10 [ 19.297600] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.297605] ? calculate_sigpending+0x7b/0xa0 [ 19.297609] ? __pfx_kthread+0x10/0x10 [ 19.297612] ret_from_fork+0x3e/0x80 [ 19.297616] ? __pfx_kthread+0x10/0x10 [ 19.297619] ret_from_fork_asm+0x1a/0x30 [ 19.297625] </TASK> [ 19.297626] [ 19.462694] Allocated by task 183: [ 19.466101] kasan_save_stack+0x45/0x70 [ 19.469956] kasan_save_track+0x18/0x40 [ 19.473813] kasan_save_alloc_info+0x3b/0x50 [ 19.478087] __kasan_kmalloc+0xb7/0xc0 [ 19.481838] __kmalloc_cache_node_noprof+0x188/0x420 [ 19.486806] kmalloc_node_oob_right+0xab/0x3c0 [ 19.491251] kunit_try_run_case+0x1a2/0x480 [ 19.495438] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.500845] kthread+0x334/0x6f0 [ 19.504077] ret_from_fork+0x3e/0x80 [ 19.507657] ret_from_fork_asm+0x1a/0x30 [ 19.511584] [ 19.513082] The buggy address belongs to the object at ffff888105f46000 [ 19.513082] which belongs to the cache kmalloc-4k of size 4096 [ 19.525597] The buggy address is located 0 bytes to the right of [ 19.525597] allocated 4096-byte region [ffff888105f46000, ffff888105f47000) [ 19.538631] [ 19.540130] The buggy address belongs to the physical page: [ 19.545705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f40 [ 19.553711] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.561364] flags: 0x200000000000040(head|node=0|zone=2) [ 19.566678] page_type: f5(slab) [ 19.569825] raw: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000 [ 19.577573] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 19.585319] head: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000 [ 19.593161] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 19.600995] head: 0200000000000003 ffffea000417d001 00000000ffffffff 00000000ffffffff [ 19.608824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 19.616649] page dumped because: kasan: bad access detected [ 19.622220] [ 19.623712] Memory state around the buggy address: [ 19.628505] ffff888105f46f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.635725] ffff888105f46f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.642977] >ffff888105f47000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.650198] ^ [ 19.653429] ffff888105f47080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660648] ffff888105f47100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.667868] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 18.900421] ================================================================== [ 18.911392] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0 [ 18.918265] Read of size 1 at addr ffff88810496299f by task kunit_try_catch/181 [ 18.925570] [ 18.927072] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.927080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.927082] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 18.927085] Call Trace: [ 18.927087] <TASK> [ 18.927089] dump_stack_lvl+0x73/0xb0 [ 18.927093] print_report+0xd1/0x650 [ 18.927097] ? __virt_addr_valid+0x1db/0x2d0 [ 18.927101] ? kmalloc_oob_left+0x361/0x3c0 [ 18.927105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.927110] ? kmalloc_oob_left+0x361/0x3c0 [ 18.927114] kasan_report+0x141/0x180 [ 18.927118] ? kmalloc_oob_left+0x361/0x3c0 [ 18.927123] __asan_report_load1_noabort+0x18/0x20 [ 18.927127] kmalloc_oob_left+0x361/0x3c0 [ 18.927132] ? __pfx_kmalloc_oob_left+0x10/0x10 [ 18.927136] ? __schedule+0x10cc/0x2b60 [ 18.927140] ? ktime_get_ts64+0x83/0x230 [ 18.927145] kunit_try_run_case+0x1a2/0x480 [ 18.927150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.927154] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.927159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.927163] ? __kthread_parkme+0x82/0x180 [ 18.927168] ? preempt_count_sub+0x50/0x80 [ 18.927172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.927177] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.927181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.927186] kthread+0x334/0x6f0 [ 18.927189] ? trace_preempt_on+0x20/0xc0 [ 18.927193] ? __pfx_kthread+0x10/0x10 [ 18.927196] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.927200] ? calculate_sigpending+0x7b/0xa0 [ 18.927204] ? __pfx_kthread+0x10/0x10 [ 18.927207] ret_from_fork+0x3e/0x80 [ 18.927211] ? __pfx_kthread+0x10/0x10 [ 18.927214] ret_from_fork_asm+0x1a/0x30 [ 18.927220] </TASK> [ 18.927221] [ 19.089604] Allocated by task 25: [ 19.092926] kasan_save_stack+0x45/0x70 [ 19.096815] kasan_save_track+0x18/0x40 [ 19.100653] kasan_save_alloc_info+0x3b/0x50 [ 19.104927] __kasan_kmalloc+0xb7/0xc0 [ 19.108724] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 19.114303] kvasprintf+0xc5/0x150 [ 19.117712] __kthread_create_on_node+0x18b/0x3a0 [ 19.122416] kthread_create_on_node+0xab/0xe0 [ 19.126777] create_worker+0x3e5/0x7b0 [ 19.130528] worker_thread+0x992/0x1220 [ 19.134369] kthread+0x334/0x6f0 [ 19.137601] ret_from_fork+0x3e/0x80 [ 19.141181] ret_from_fork_asm+0x1a/0x30 [ 19.145105] [ 19.146605] The buggy address belongs to the object at ffff888104962980 [ 19.146605] which belongs to the cache kmalloc-16 of size 16 [ 19.158939] The buggy address is located 18 bytes to the right of [ 19.158939] allocated 13-byte region [ffff888104962980, ffff88810496298d) [ 19.171927] [ 19.173471] The buggy address belongs to the physical page: [ 19.179043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104962 [ 19.187045] flags: 0x200000000000000(node=0|zone=2) [ 19.191928] page_type: f5(slab) [ 19.195123] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 19.202871] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.210610] page dumped because: kasan: bad access detected [ 19.216181] [ 19.217682] Memory state around the buggy address: [ 19.222475] ffff888104962880: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 19.229701] ffff888104962900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.236930] >ffff888104962980: 00 05 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 19.244200] ^ [ 19.248212] ffff888104962a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.255432] ffff888104962a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.262651] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 18.179975] ================================================================== [ 18.187217] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 18.194176] Write of size 1 at addr ffff888102acc278 by task kunit_try_catch/179 [ 18.201570] [ 18.203071] CPU: 3 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.203080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.203082] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 18.203085] Call Trace: [ 18.203087] <TASK> [ 18.203088] dump_stack_lvl+0x73/0xb0 [ 18.203092] print_report+0xd1/0x650 [ 18.203096] ? __virt_addr_valid+0x1db/0x2d0 [ 18.203100] ? kmalloc_oob_right+0x6bd/0x7f0 [ 18.203104] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.203109] ? kmalloc_oob_right+0x6bd/0x7f0 [ 18.203113] kasan_report+0x141/0x180 [ 18.203117] ? kmalloc_oob_right+0x6bd/0x7f0 [ 18.203123] __asan_report_store1_noabort+0x1b/0x30 [ 18.203127] kmalloc_oob_right+0x6bd/0x7f0 [ 18.203131] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 18.203135] ? __schedule+0x10cc/0x2b60 [ 18.203140] ? ktime_get_ts64+0x83/0x230 [ 18.203145] kunit_try_run_case+0x1a2/0x480 [ 18.203149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.203154] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.203158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.203163] ? __kthread_parkme+0x82/0x180 [ 18.203167] ? preempt_count_sub+0x50/0x80 [ 18.203172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.203176] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.203181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.203185] kthread+0x334/0x6f0 [ 18.203188] ? trace_preempt_on+0x20/0xc0 [ 18.203192] ? __pfx_kthread+0x10/0x10 [ 18.203195] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.203199] ? calculate_sigpending+0x7b/0xa0 [ 18.203203] ? __pfx_kthread+0x10/0x10 [ 18.203206] ret_from_fork+0x3e/0x80 [ 18.203210] ? __pfx_kthread+0x10/0x10 [ 18.203213] ret_from_fork_asm+0x1a/0x30 [ 18.203219] </TASK> [ 18.203220] [ 18.366168] Allocated by task 179: [ 18.369572] kasan_save_stack+0x45/0x70 [ 18.373412] kasan_save_track+0x18/0x40 [ 18.377253] kasan_save_alloc_info+0x3b/0x50 [ 18.381524] __kasan_kmalloc+0xb7/0xc0 [ 18.385278] __kmalloc_cache_noprof+0x189/0x420 [ 18.389817] kmalloc_oob_right+0xa9/0x7f0 [ 18.393830] kunit_try_run_case+0x1a2/0x480 [ 18.398017] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.403417] kthread+0x334/0x6f0 [ 18.406649] ret_from_fork+0x3e/0x80 [ 18.410229] ret_from_fork_asm+0x1a/0x30 [ 18.414155] [ 18.415653] The buggy address belongs to the object at ffff888102acc200 [ 18.415653] which belongs to the cache kmalloc-128 of size 128 [ 18.428161] The buggy address is located 5 bytes to the right of [ 18.428161] allocated 115-byte region [ffff888102acc200, ffff888102acc273) [ 18.441107] [ 18.442606] The buggy address belongs to the physical page: [ 18.448178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc [ 18.456180] flags: 0x200000000000000(node=0|zone=2) [ 18.461056] page_type: f5(slab) [ 18.464205] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 18.471956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.479709] page dumped because: kasan: bad access detected [ 18.485281] [ 18.486781] Memory state around the buggy address: [ 18.491572] ffff888102acc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.498792] ffff888102acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.506011] >ffff888102acc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.513231] ^ [ 18.520364] ffff888102acc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.527583] ffff888102acc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.534802] ================================================================== [ 17.813831] ================================================================== [ 17.821062] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 17.828038] Write of size 1 at addr ffff888102acc273 by task kunit_try_catch/179 [ 17.835439] [ 17.836965] CPU: 3 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.836973] Tainted: [N]=TEST [ 17.836975] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 17.836979] Call Trace: [ 17.836980] <TASK> [ 17.836983] dump_stack_lvl+0x73/0xb0 [ 17.836988] print_report+0xd1/0x650 [ 17.836993] ? __virt_addr_valid+0x1db/0x2d0 [ 17.836997] ? kmalloc_oob_right+0x6f0/0x7f0 [ 17.837001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.837006] ? kmalloc_oob_right+0x6f0/0x7f0 [ 17.837010] kasan_report+0x141/0x180 [ 17.837015] ? kmalloc_oob_right+0x6f0/0x7f0 [ 17.837020] __asan_report_store1_noabort+0x1b/0x30 [ 17.837024] kmalloc_oob_right+0x6f0/0x7f0 [ 17.837028] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 17.837033] ? __schedule+0x10cc/0x2b60 [ 17.837038] ? ktime_get_ts64+0x83/0x230 [ 17.837043] kunit_try_run_case+0x1a2/0x480 [ 17.837049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.837054] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.837059] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.837064] ? __kthread_parkme+0x82/0x180 [ 17.837068] ? preempt_count_sub+0x50/0x80 [ 17.837074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.837078] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.837083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.837087] kthread+0x334/0x6f0 [ 17.837090] ? trace_preempt_on+0x20/0xc0 [ 17.837095] ? __pfx_kthread+0x10/0x10 [ 17.837098] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.837102] ? calculate_sigpending+0x7b/0xa0 [ 17.837107] ? __pfx_kthread+0x10/0x10 [ 17.837110] ret_from_fork+0x3e/0x80 [ 17.837115] ? __pfx_kthread+0x10/0x10 [ 17.837118] ret_from_fork_asm+0x1a/0x30 [ 17.837124] </TASK> [ 17.837126] [ 17.998806] Allocated by task 179: [ 18.002213] kasan_save_stack+0x45/0x70 [ 18.006061] kasan_save_track+0x18/0x40 [ 18.009918] kasan_save_alloc_info+0x3b/0x50 [ 18.014197] __kasan_kmalloc+0xb7/0xc0 [ 18.017971] __kmalloc_cache_noprof+0x189/0x420 [ 18.022510] kmalloc_oob_right+0xa9/0x7f0 [ 18.026529] kunit_try_run_case+0x1a2/0x480 [ 18.030716] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.036115] kthread+0x334/0x6f0 [ 18.039348] ret_from_fork+0x3e/0x80 [ 18.042929] ret_from_fork_asm+0x1a/0x30 [ 18.046880] [ 18.048380] The buggy address belongs to the object at ffff888102acc200 [ 18.048380] which belongs to the cache kmalloc-128 of size 128 [ 18.060895] The buggy address is located 0 bytes to the right of [ 18.060895] allocated 115-byte region [ffff888102acc200, ffff888102acc273) [ 18.073867] [ 18.075367] The buggy address belongs to the physical page: [ 18.080939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc [ 18.088979] flags: 0x200000000000000(node=0|zone=2) [ 18.093862] page_type: f5(slab) [ 18.097011] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 18.104757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.112504] page dumped because: kasan: bad access detected [ 18.118076] [ 18.119576] Memory state around the buggy address: [ 18.124369] ffff888102acc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.131587] ffff888102acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.138806] >ffff888102acc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.146027] ^ [ 18.152915] ffff888102acc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.160146] ffff888102acc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.167372] ================================================================== [ 18.542045] ================================================================== [ 18.549275] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 18.556235] Read of size 1 at addr ffff888102acc280 by task kunit_try_catch/179 [ 18.563550] [ 18.565049] CPU: 3 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.565057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.565059] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 18.565062] Call Trace: [ 18.565064] <TASK> [ 18.565065] dump_stack_lvl+0x73/0xb0 [ 18.565069] print_report+0xd1/0x650 [ 18.565073] ? __virt_addr_valid+0x1db/0x2d0 [ 18.565077] ? kmalloc_oob_right+0x68a/0x7f0 [ 18.565081] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.565085] ? kmalloc_oob_right+0x68a/0x7f0 [ 18.565090] kasan_report+0x141/0x180 [ 18.565094] ? kmalloc_oob_right+0x68a/0x7f0 [ 18.565099] __asan_report_load1_noabort+0x18/0x20 [ 18.565103] kmalloc_oob_right+0x68a/0x7f0 [ 18.565107] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 18.565112] ? __schedule+0x10cc/0x2b60 [ 18.565116] ? ktime_get_ts64+0x83/0x230 [ 18.565121] kunit_try_run_case+0x1a2/0x480 [ 18.565125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.565130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.565134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.565139] ? __kthread_parkme+0x82/0x180 [ 18.565143] ? preempt_count_sub+0x50/0x80 [ 18.565148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.565152] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.565157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.565161] kthread+0x334/0x6f0 [ 18.565164] ? trace_preempt_on+0x20/0xc0 [ 18.565168] ? __pfx_kthread+0x10/0x10 [ 18.565171] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.565175] ? calculate_sigpending+0x7b/0xa0 [ 18.565179] ? __pfx_kthread+0x10/0x10 [ 18.565182] ret_from_fork+0x3e/0x80 [ 18.565186] ? __pfx_kthread+0x10/0x10 [ 18.565189] ret_from_fork_asm+0x1a/0x30 [ 18.565195] </TASK> [ 18.565196] [ 18.727971] Allocated by task 179: [ 18.731378] kasan_save_stack+0x45/0x70 [ 18.735219] kasan_save_track+0x18/0x40 [ 18.739057] kasan_save_alloc_info+0x3b/0x50 [ 18.743331] __kasan_kmalloc+0xb7/0xc0 [ 18.747083] __kmalloc_cache_noprof+0x189/0x420 [ 18.751615] kmalloc_oob_right+0xa9/0x7f0 [ 18.755629] kunit_try_run_case+0x1a2/0x480 [ 18.759823] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.765231] kthread+0x334/0x6f0 [ 18.768462] ret_from_fork+0x3e/0x80 [ 18.772041] ret_from_fork_asm+0x1a/0x30 [ 18.775970] [ 18.777468] The buggy address belongs to the object at ffff888102acc200 [ 18.777468] which belongs to the cache kmalloc-128 of size 128 [ 18.789982] The buggy address is located 13 bytes to the right of [ 18.789982] allocated 115-byte region [ffff888102acc200, ffff888102acc273) [ 18.803019] [ 18.804516] The buggy address belongs to the physical page: [ 18.810088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc [ 18.818087] flags: 0x200000000000000(node=0|zone=2) [ 18.822967] page_type: f5(slab) [ 18.826115] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 18.833863] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.841610] page dumped because: kasan: bad access detected [ 18.847183] [ 18.848681] Memory state around the buggy address: [ 18.853475] ffff888102acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.860704] ffff888102acc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.867932] >ffff888102acc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.875148] ^ [ 18.878383] ffff888102acc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.885602] ffff888102acc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.892820] ==================================================================
Failure - lava/job
(no logs available)
Failure - lava/read-feedback
(no logs available)
Failure - lava/bootloader-action
(no logs available)
Failure - lava/bootloader-retry
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)