Date
July 8, 2025, 4:38 p.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 18.193463] ================================================================== [ 18.193585] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 18.193656] Read of size 4 at addr fff00000c6385340 by task swapper/1/0 [ 18.193704] [ 18.193744] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.193828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.193855] Hardware name: linux,dummy-virt (DT) [ 18.193888] Call trace: [ 18.193911] show_stack+0x20/0x38 (C) [ 18.193963] dump_stack_lvl+0x8c/0xd0 [ 18.194012] print_report+0x118/0x608 [ 18.194058] kasan_report+0xdc/0x128 [ 18.194100] __asan_report_load4_noabort+0x20/0x30 [ 18.194151] rcu_uaf_reclaim+0x64/0x70 [ 18.194198] rcu_core+0x9f4/0x1e20 [ 18.194246] rcu_core_si+0x18/0x30 [ 18.194289] handle_softirqs+0x374/0xb28 [ 18.194349] __do_softirq+0x1c/0x28 [ 18.194390] ____do_softirq+0x18/0x30 [ 18.194437] call_on_irq_stack+0x24/0x30 [ 18.194482] do_softirq_own_stack+0x24/0x38 [ 18.194528] __irq_exit_rcu+0x1fc/0x318 [ 18.194573] irq_exit_rcu+0x1c/0x80 [ 18.194617] el1_interrupt+0x38/0x58 [ 18.194659] el1h_64_irq_handler+0x18/0x28 [ 18.194705] el1h_64_irq+0x6c/0x70 [ 18.194790] arch_local_irq_enable+0x4/0x8 (P) [ 18.194845] do_idle+0x384/0x4e8 [ 18.194888] cpu_startup_entry+0x64/0x80 [ 18.194931] secondary_start_kernel+0x288/0x340 [ 18.194982] __secondary_switched+0xc0/0xc8 [ 18.195034] [ 18.195052] Allocated by task 200: [ 18.195081] kasan_save_stack+0x3c/0x68 [ 18.195121] kasan_save_track+0x20/0x40 [ 18.195158] kasan_save_alloc_info+0x40/0x58 [ 18.195195] __kasan_kmalloc+0xd4/0xd8 [ 18.195233] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.195270] rcu_uaf+0xb0/0x2d8 [ 18.195305] kunit_try_run_case+0x170/0x3f0 [ 18.195509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.195572] kthread+0x328/0x630 [ 18.195681] ret_from_fork+0x10/0x20 [ 18.195957] [ 18.195977] Freed by task 0: [ 18.196005] kasan_save_stack+0x3c/0x68 [ 18.196042] kasan_save_track+0x20/0x40 [ 18.196079] kasan_save_free_info+0x4c/0x78 [ 18.196116] __kasan_slab_free+0x6c/0x98 [ 18.196154] kfree+0x214/0x3c8 [ 18.197028] rcu_uaf_reclaim+0x28/0x70 [ 18.197081] rcu_core+0x9f4/0x1e20 [ 18.197118] rcu_core_si+0x18/0x30 [ 18.197317] handle_softirqs+0x374/0xb28 [ 18.197368] __do_softirq+0x1c/0x28 [ 18.197403] [ 18.197434] Last potentially related work creation: [ 18.197469] kasan_save_stack+0x3c/0x68 [ 18.197866] kasan_record_aux_stack+0xb4/0xc8 [ 18.197910] __call_rcu_common.constprop.0+0x74/0x8c8 [ 18.197951] call_rcu+0x18/0x30 [ 18.197983] rcu_uaf+0x14c/0x2d8 [ 18.198020] kunit_try_run_case+0x170/0x3f0 [ 18.199350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.199405] kthread+0x328/0x630 [ 18.199443] ret_from_fork+0x10/0x20 [ 18.199488] [ 18.199515] The buggy address belongs to the object at fff00000c6385340 [ 18.199515] which belongs to the cache kmalloc-32 of size 32 [ 18.199573] The buggy address is located 0 bytes inside of [ 18.199573] freed 32-byte region [fff00000c6385340, fff00000c6385360) [ 18.199633] [ 18.199656] The buggy address belongs to the physical page: [ 18.199687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106385 [ 18.199741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.199793] page_type: f5(slab) [ 18.199835] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.199884] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.199924] page dumped because: kasan: bad access detected [ 18.199958] [ 18.199976] Memory state around the buggy address: [ 18.200023] fff00000c6385200: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 18.200067] fff00000c6385280: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 18.200121] >fff00000c6385300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.200158] ^ [ 18.200192] fff00000c6385380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.200235] fff00000c6385400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.200284] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 18.052688] ================================================================== [ 18.052744] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 18.052798] Read of size 1 at addr fff00000c63d6800 by task kunit_try_catch/198 [ 18.052848] [ 18.052896] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.052987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.053016] Hardware name: linux,dummy-virt (DT) [ 18.053047] Call trace: [ 18.053068] show_stack+0x20/0x38 (C) [ 18.053116] dump_stack_lvl+0x8c/0xd0 [ 18.053163] print_report+0x118/0x608 [ 18.053216] kasan_report+0xdc/0x128 [ 18.053260] __kasan_check_byte+0x54/0x70 [ 18.053306] ksize+0x30/0x88 [ 18.053358] ksize_uaf+0x168/0x5f8 [ 18.053448] kunit_try_run_case+0x170/0x3f0 [ 18.053613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.053799] kthread+0x328/0x630 [ 18.054061] ret_from_fork+0x10/0x20 [ 18.054143] [ 18.054167] Allocated by task 198: [ 18.054197] kasan_save_stack+0x3c/0x68 [ 18.054237] kasan_save_track+0x20/0x40 [ 18.054276] kasan_save_alloc_info+0x40/0x58 [ 18.054364] __kasan_kmalloc+0xd4/0xd8 [ 18.054424] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.054463] ksize_uaf+0xb8/0x5f8 [ 18.054500] kunit_try_run_case+0x170/0x3f0 [ 18.054541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.054587] kthread+0x328/0x630 [ 18.054727] ret_from_fork+0x10/0x20 [ 18.054856] [ 18.054915] Freed by task 198: [ 18.054973] kasan_save_stack+0x3c/0x68 [ 18.055097] kasan_save_track+0x20/0x40 [ 18.055183] kasan_save_free_info+0x4c/0x78 [ 18.055283] __kasan_slab_free+0x6c/0x98 [ 18.055369] kfree+0x214/0x3c8 [ 18.055417] ksize_uaf+0x11c/0x5f8 [ 18.055480] kunit_try_run_case+0x170/0x3f0 [ 18.055557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.055617] kthread+0x328/0x630 [ 18.055695] ret_from_fork+0x10/0x20 [ 18.055760] [ 18.055780] The buggy address belongs to the object at fff00000c63d6800 [ 18.055780] which belongs to the cache kmalloc-128 of size 128 [ 18.055839] The buggy address is located 0 bytes inside of [ 18.055839] freed 128-byte region [fff00000c63d6800, fff00000c63d6880) [ 18.055897] [ 18.056062] The buggy address belongs to the physical page: [ 18.056121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 18.056183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.056237] page_type: f5(slab) [ 18.056293] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.056359] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.056450] page dumped because: kasan: bad access detected [ 18.056524] [ 18.056576] Memory state around the buggy address: [ 18.056690] fff00000c63d6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.056786] fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.056841] >fff00000c63d6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.056879] ^ [ 18.056905] fff00000c63d6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.057081] fff00000c63d6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.057119] ================================================================== [ 18.057908] ================================================================== [ 18.057959] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 18.058027] Read of size 1 at addr fff00000c63d6800 by task kunit_try_catch/198 [ 18.058076] [ 18.058103] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.058185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.058216] Hardware name: linux,dummy-virt (DT) [ 18.058248] Call trace: [ 18.058269] show_stack+0x20/0x38 (C) [ 18.058314] dump_stack_lvl+0x8c/0xd0 [ 18.058505] print_report+0x118/0x608 [ 18.058552] kasan_report+0xdc/0x128 [ 18.058602] __asan_report_load1_noabort+0x20/0x30 [ 18.058654] ksize_uaf+0x598/0x5f8 [ 18.058845] kunit_try_run_case+0x170/0x3f0 [ 18.058921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.059008] kthread+0x328/0x630 [ 18.059081] ret_from_fork+0x10/0x20 [ 18.059186] [ 18.059235] Allocated by task 198: [ 18.059283] kasan_save_stack+0x3c/0x68 [ 18.059324] kasan_save_track+0x20/0x40 [ 18.059438] kasan_save_alloc_info+0x40/0x58 [ 18.059481] __kasan_kmalloc+0xd4/0xd8 [ 18.059517] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.059575] ksize_uaf+0xb8/0x5f8 [ 18.059630] kunit_try_run_case+0x170/0x3f0 [ 18.059788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.059841] kthread+0x328/0x630 [ 18.059970] ret_from_fork+0x10/0x20 [ 18.060075] [ 18.060180] Freed by task 198: [ 18.060241] kasan_save_stack+0x3c/0x68 [ 18.060294] kasan_save_track+0x20/0x40 [ 18.060400] kasan_save_free_info+0x4c/0x78 [ 18.060528] __kasan_slab_free+0x6c/0x98 [ 18.060605] kfree+0x214/0x3c8 [ 18.060799] ksize_uaf+0x11c/0x5f8 [ 18.060835] kunit_try_run_case+0x170/0x3f0 [ 18.060874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.060918] kthread+0x328/0x630 [ 18.060953] ret_from_fork+0x10/0x20 [ 18.060988] [ 18.061694] The buggy address belongs to the object at fff00000c63d6800 [ 18.061694] which belongs to the cache kmalloc-128 of size 128 [ 18.061952] The buggy address is located 0 bytes inside of [ 18.061952] freed 128-byte region [fff00000c63d6800, fff00000c63d6880) [ 18.062067] [ 18.062143] The buggy address belongs to the physical page: [ 18.062238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 18.062314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.062396] page_type: f5(slab) [ 18.062435] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.062639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.062777] page dumped because: kasan: bad access detected [ 18.062853] [ 18.062933] Memory state around the buggy address: [ 18.063011] fff00000c63d6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.063084] fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.063504] >fff00000c63d6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.063572] ^ [ 18.063620] fff00000c63d6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.063684] fff00000c63d6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.063767] ================================================================== [ 18.065495] ================================================================== [ 18.065727] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 18.065777] Read of size 1 at addr fff00000c63d6878 by task kunit_try_catch/198 [ 18.065932] [ 18.065969] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.066113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.066161] Hardware name: linux,dummy-virt (DT) [ 18.066196] Call trace: [ 18.066218] show_stack+0x20/0x38 (C) [ 18.066277] dump_stack_lvl+0x8c/0xd0 [ 18.066342] print_report+0x118/0x608 [ 18.066395] kasan_report+0xdc/0x128 [ 18.066448] __asan_report_load1_noabort+0x20/0x30 [ 18.066507] ksize_uaf+0x544/0x5f8 [ 18.066553] kunit_try_run_case+0x170/0x3f0 [ 18.066602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.066656] kthread+0x328/0x630 [ 18.066701] ret_from_fork+0x10/0x20 [ 18.066748] [ 18.066770] Allocated by task 198: [ 18.066799] kasan_save_stack+0x3c/0x68 [ 18.066843] kasan_save_track+0x20/0x40 [ 18.066881] kasan_save_alloc_info+0x40/0x58 [ 18.066923] __kasan_kmalloc+0xd4/0xd8 [ 18.066960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.067007] ksize_uaf+0xb8/0x5f8 [ 18.067044] kunit_try_run_case+0x170/0x3f0 [ 18.067084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.067129] kthread+0x328/0x630 [ 18.067166] ret_from_fork+0x10/0x20 [ 18.067202] [ 18.067220] Freed by task 198: [ 18.067254] kasan_save_stack+0x3c/0x68 [ 18.067291] kasan_save_track+0x20/0x40 [ 18.067327] kasan_save_free_info+0x4c/0x78 [ 18.067375] __kasan_slab_free+0x6c/0x98 [ 18.067411] kfree+0x214/0x3c8 [ 18.067443] ksize_uaf+0x11c/0x5f8 [ 18.067479] kunit_try_run_case+0x170/0x3f0 [ 18.067516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.067561] kthread+0x328/0x630 [ 18.067843] ret_from_fork+0x10/0x20 [ 18.067918] [ 18.067957] The buggy address belongs to the object at fff00000c63d6800 [ 18.067957] which belongs to the cache kmalloc-128 of size 128 [ 18.068044] The buggy address is located 120 bytes inside of [ 18.068044] freed 128-byte region [fff00000c63d6800, fff00000c63d6880) [ 18.068115] [ 18.068137] The buggy address belongs to the physical page: [ 18.068167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 18.068345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.068499] page_type: f5(slab) [ 18.068544] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.068625] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.068681] page dumped because: kasan: bad access detected [ 18.068769] [ 18.068819] Memory state around the buggy address: [ 18.068859] fff00000c63d6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.068904] fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.068946] >fff00000c63d6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.068991] ^ [ 18.069034] fff00000c63d6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.069075] fff00000c63d6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.069223] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 18.034708] ================================================================== [ 18.034783] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.034889] Read of size 1 at addr fff00000c63d6773 by task kunit_try_catch/196 [ 18.034942] [ 18.034971] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.035072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.035119] Hardware name: linux,dummy-virt (DT) [ 18.035167] Call trace: [ 18.035217] show_stack+0x20/0x38 (C) [ 18.035266] dump_stack_lvl+0x8c/0xd0 [ 18.035314] print_report+0x118/0x608 [ 18.035371] kasan_report+0xdc/0x128 [ 18.035507] __asan_report_load1_noabort+0x20/0x30 [ 18.035593] ksize_unpoisons_memory+0x628/0x740 [ 18.035680] kunit_try_run_case+0x170/0x3f0 [ 18.035745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.035818] kthread+0x328/0x630 [ 18.035886] ret_from_fork+0x10/0x20 [ 18.035951] [ 18.035989] Allocated by task 196: [ 18.036055] kasan_save_stack+0x3c/0x68 [ 18.036122] kasan_save_track+0x20/0x40 [ 18.036178] kasan_save_alloc_info+0x40/0x58 [ 18.036243] __kasan_kmalloc+0xd4/0xd8 [ 18.036329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.036431] ksize_unpoisons_memory+0xc0/0x740 [ 18.036471] kunit_try_run_case+0x170/0x3f0 [ 18.036511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.036555] kthread+0x328/0x630 [ 18.036591] ret_from_fork+0x10/0x20 [ 18.036627] [ 18.036645] The buggy address belongs to the object at fff00000c63d6700 [ 18.036645] which belongs to the cache kmalloc-128 of size 128 [ 18.036704] The buggy address is located 0 bytes to the right of [ 18.036704] allocated 115-byte region [fff00000c63d6700, fff00000c63d6773) [ 18.036896] [ 18.036958] The buggy address belongs to the physical page: [ 18.037007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 18.037108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.037156] page_type: f5(slab) [ 18.037454] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.037532] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.037631] page dumped because: kasan: bad access detected [ 18.037734] [ 18.037796] Memory state around the buggy address: [ 18.037849] fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.037910] fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.037970] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.038075] ^ [ 18.038134] fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.038187] fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.038226] ================================================================== [ 18.038864] ================================================================== [ 18.038914] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.038989] Read of size 1 at addr fff00000c63d6778 by task kunit_try_catch/196 [ 18.039057] [ 18.039095] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.039199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.039247] Hardware name: linux,dummy-virt (DT) [ 18.039295] Call trace: [ 18.039353] show_stack+0x20/0x38 (C) [ 18.039430] dump_stack_lvl+0x8c/0xd0 [ 18.039496] print_report+0x118/0x608 [ 18.039541] kasan_report+0xdc/0x128 [ 18.039626] __asan_report_load1_noabort+0x20/0x30 [ 18.039677] ksize_unpoisons_memory+0x618/0x740 [ 18.039745] kunit_try_run_case+0x170/0x3f0 [ 18.039987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.040051] kthread+0x328/0x630 [ 18.040096] ret_from_fork+0x10/0x20 [ 18.040234] [ 18.040270] Allocated by task 196: [ 18.040320] kasan_save_stack+0x3c/0x68 [ 18.040405] kasan_save_track+0x20/0x40 [ 18.040481] kasan_save_alloc_info+0x40/0x58 [ 18.040588] __kasan_kmalloc+0xd4/0xd8 [ 18.040646] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.040775] ksize_unpoisons_memory+0xc0/0x740 [ 18.040863] kunit_try_run_case+0x170/0x3f0 [ 18.040975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.041028] kthread+0x328/0x630 [ 18.041063] ret_from_fork+0x10/0x20 [ 18.041099] [ 18.041119] The buggy address belongs to the object at fff00000c63d6700 [ 18.041119] which belongs to the cache kmalloc-128 of size 128 [ 18.041175] The buggy address is located 5 bytes to the right of [ 18.041175] allocated 115-byte region [fff00000c63d6700, fff00000c63d6773) [ 18.041239] [ 18.041259] The buggy address belongs to the physical page: [ 18.041329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 18.041392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.041440] page_type: f5(slab) [ 18.041567] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.041652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.041711] page dumped because: kasan: bad access detected [ 18.041803] [ 18.041907] Memory state around the buggy address: [ 18.041975] fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.042040] fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.042139] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.042225] ^ [ 18.042308] fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.042436] fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.042484] ================================================================== [ 18.043653] ================================================================== [ 18.043731] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.043782] Read of size 1 at addr fff00000c63d677f by task kunit_try_catch/196 [ 18.043852] [ 18.043901] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.044008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.044056] Hardware name: linux,dummy-virt (DT) [ 18.044101] Call trace: [ 18.044141] show_stack+0x20/0x38 (C) [ 18.044207] dump_stack_lvl+0x8c/0xd0 [ 18.044256] print_report+0x118/0x608 [ 18.044364] kasan_report+0xdc/0x128 [ 18.044440] __asan_report_load1_noabort+0x20/0x30 [ 18.044517] ksize_unpoisons_memory+0x690/0x740 [ 18.044567] kunit_try_run_case+0x170/0x3f0 [ 18.044615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.044670] kthread+0x328/0x630 [ 18.044714] ret_from_fork+0x10/0x20 [ 18.044760] [ 18.044777] Allocated by task 196: [ 18.044805] kasan_save_stack+0x3c/0x68 [ 18.044844] kasan_save_track+0x20/0x40 [ 18.045004] kasan_save_alloc_info+0x40/0x58 [ 18.045075] __kasan_kmalloc+0xd4/0xd8 [ 18.045180] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.045248] ksize_unpoisons_memory+0xc0/0x740 [ 18.045331] kunit_try_run_case+0x170/0x3f0 [ 18.045434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.045520] kthread+0x328/0x630 [ 18.045633] ret_from_fork+0x10/0x20 [ 18.045701] [ 18.045774] The buggy address belongs to the object at fff00000c63d6700 [ 18.045774] which belongs to the cache kmalloc-128 of size 128 [ 18.045893] The buggy address is located 12 bytes to the right of [ 18.045893] allocated 115-byte region [fff00000c63d6700, fff00000c63d6773) [ 18.045997] [ 18.046016] The buggy address belongs to the physical page: [ 18.046045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 18.046283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.046417] page_type: f5(slab) [ 18.046496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.046603] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.046688] page dumped because: kasan: bad access detected [ 18.046747] [ 18.046792] Memory state around the buggy address: [ 18.046908] fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.046972] fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047014] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.047102] ^ [ 18.047170] fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047254] fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047370] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 20.334709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 20.260094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 20.253277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 20.175505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 20.134040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 20.150084] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 20.119878] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 20.066521] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.097818] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 20.090683] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 28.692920] ================================================================== [ 28.693024] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.693024] [ 28.693125] Out-of-bounds read at 0x00000000aedaf3e6 (105B right of kfence-#152): [ 28.693188] test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.693237] kunit_try_run_case+0x170/0x3f0 [ 28.693285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.693346] kthread+0x328/0x630 [ 28.693390] ret_from_fork+0x10/0x20 [ 28.693432] [ 28.693456] kfence-#152: 0x0000000099bcd66d-0x0000000040f38361, size=73, cache=kmalloc-96 [ 28.693456] [ 28.693509] allocated by task 325 on cpu 0 at 28.692673s (0.000832s ago): [ 28.693580] test_alloc+0x29c/0x628 [ 28.693621] test_kmalloc_aligned_oob_read+0x100/0x468 [ 28.693664] kunit_try_run_case+0x170/0x3f0 [ 28.693707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.693752] kthread+0x328/0x630 [ 28.693792] ret_from_fork+0x10/0x20 [ 28.693831] [ 28.693878] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 28.693958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.693988] Hardware name: linux,dummy-virt (DT) [ 28.694024] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 23.180716] ================================================================== [ 23.180802] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 23.180802] [ 23.180863] Corrupted memory at 0x000000006488ceb2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#99): [ 23.181172] test_corruption+0x120/0x378 [ 23.181218] kunit_try_run_case+0x170/0x3f0 [ 23.181263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.181308] kthread+0x328/0x630 [ 23.181365] ret_from_fork+0x10/0x20 [ 23.181406] [ 23.181431] kfence-#99: 0x00000000a554197e-0x00000000fa346432, size=32, cache=test [ 23.181431] [ 23.181484] allocated by task 315 on cpu 0 at 23.180586s (0.000894s ago): [ 23.181545] test_alloc+0x230/0x628 [ 23.181585] test_corruption+0xdc/0x378 [ 23.181624] kunit_try_run_case+0x170/0x3f0 [ 23.181666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.181711] kthread+0x328/0x630 [ 23.181750] ret_from_fork+0x10/0x20 [ 23.181789] [ 23.181813] freed by task 315 on cpu 0 at 23.180639s (0.001170s ago): [ 23.181873] test_corruption+0x120/0x378 [ 23.181912] kunit_try_run_case+0x170/0x3f0 [ 23.181953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.181997] kthread+0x328/0x630 [ 23.182038] ret_from_fork+0x10/0x20 [ 23.182077] [ 23.182117] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 23.182192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.182221] Hardware name: linux,dummy-virt (DT) [ 23.182254] ================================================================== [ 23.284780] ================================================================== [ 23.284861] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 23.284861] [ 23.284918] Corrupted memory at 0x000000001d323dea [ ! ] (in kfence-#100): [ 23.285030] test_corruption+0x1d8/0x378 [ 23.285076] kunit_try_run_case+0x170/0x3f0 [ 23.285120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.285166] kthread+0x328/0x630 [ 23.285209] ret_from_fork+0x10/0x20 [ 23.285248] [ 23.285271] kfence-#100: 0x00000000cffc47e5-0x00000000dd1e58a6, size=32, cache=test [ 23.285271] [ 23.285325] allocated by task 315 on cpu 0 at 23.284655s (0.000666s ago): [ 23.285399] test_alloc+0x230/0x628 [ 23.285439] test_corruption+0x198/0x378 [ 23.285479] kunit_try_run_case+0x170/0x3f0 [ 23.285519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.285564] kthread+0x328/0x630 [ 23.285602] ret_from_fork+0x10/0x20 [ 23.285641] [ 23.285664] freed by task 315 on cpu 0 at 23.284707s (0.000953s ago): [ 23.285723] test_corruption+0x1d8/0x378 [ 23.285762] kunit_try_run_case+0x170/0x3f0 [ 23.285802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.285846] kthread+0x328/0x630 [ 23.285884] ret_from_fork+0x10/0x20 [ 23.285924] [ 23.285961] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 23.286035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.286064] Hardware name: linux,dummy-virt (DT) [ 23.286097] ================================================================== [ 22.973085] ================================================================== [ 22.973193] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 22.973193] [ 22.973258] Corrupted memory at 0x000000009cb05031 [ ! . . . . . . . . . . . . . . . ] (in kfence-#97): [ 22.974392] test_corruption+0x278/0x378 [ 22.974445] kunit_try_run_case+0x170/0x3f0 [ 22.974492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.974539] kthread+0x328/0x630 [ 22.974581] ret_from_fork+0x10/0x20 [ 22.974620] [ 22.974646] kfence-#97: 0x000000008183efa2-0x0000000097b7f504, size=32, cache=kmalloc-32 [ 22.974646] [ 22.974703] allocated by task 313 on cpu 0 at 22.972793s (0.001906s ago): [ 22.974767] test_alloc+0x29c/0x628 [ 22.974807] test_corruption+0xdc/0x378 [ 22.974853] kunit_try_run_case+0x170/0x3f0 [ 22.974895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.974940] kthread+0x328/0x630 [ 22.974979] ret_from_fork+0x10/0x20 [ 22.975019] [ 22.975042] freed by task 313 on cpu 0 at 22.972891s (0.002148s ago): [ 22.975100] test_corruption+0x278/0x378 [ 22.975140] kunit_try_run_case+0x170/0x3f0 [ 22.975181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.975226] kthread+0x328/0x630 [ 22.975266] ret_from_fork+0x10/0x20 [ 22.975306] [ 22.975361] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 22.975442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.975472] Hardware name: linux,dummy-virt (DT) [ 22.975508] ================================================================== [ 23.076933] ================================================================== [ 23.077014] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 23.077014] [ 23.077076] Corrupted memory at 0x000000006b3f10f4 [ ! ] (in kfence-#98): [ 23.077199] test_corruption+0x284/0x378 [ 23.077247] kunit_try_run_case+0x170/0x3f0 [ 23.077292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.077352] kthread+0x328/0x630 [ 23.077396] ret_from_fork+0x10/0x20 [ 23.077435] [ 23.077459] kfence-#98: 0x00000000cc89e796-0x00000000133de5d9, size=32, cache=kmalloc-32 [ 23.077459] [ 23.077515] allocated by task 313 on cpu 0 at 23.076673s (0.000838s ago): [ 23.077576] test_alloc+0x29c/0x628 [ 23.077614] test_corruption+0x198/0x378 [ 23.077654] kunit_try_run_case+0x170/0x3f0 [ 23.077696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.077741] kthread+0x328/0x630 [ 23.077781] ret_from_fork+0x10/0x20 [ 23.077819] [ 23.077843] freed by task 313 on cpu 0 at 23.076773s (0.001066s ago): [ 23.077901] test_corruption+0x284/0x378 [ 23.077941] kunit_try_run_case+0x170/0x3f0 [ 23.077981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.078026] kthread+0x328/0x630 [ 23.078065] ret_from_fork+0x10/0x20 [ 23.078103] [ 23.078146] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 23.078221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.078251] Hardware name: linux,dummy-virt (DT) [ 23.078283] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 51.785199] ================================================================== [ 51.785259] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 51.785259] [ 51.785355] Use-after-free read at 0x0000000018d671a8 (in kfence-#158): [ 51.785408] test_krealloc+0x51c/0x830 [ 51.785452] kunit_try_run_case+0x170/0x3f0 [ 51.785499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.785546] kthread+0x328/0x630 [ 51.785589] ret_from_fork+0x10/0x20 [ 51.785631] [ 51.785654] kfence-#158: 0x0000000018d671a8-0x00000000861d2852, size=32, cache=kmalloc-32 [ 51.785654] [ 51.785707] allocated by task 339 on cpu 1 at 51.784579s (0.001125s ago): [ 51.785776] test_alloc+0x29c/0x628 [ 51.785814] test_krealloc+0xc0/0x830 [ 51.785852] kunit_try_run_case+0x170/0x3f0 [ 51.785894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.785939] kthread+0x328/0x630 [ 51.785980] ret_from_fork+0x10/0x20 [ 51.786019] [ 51.786044] freed by task 339 on cpu 1 at 51.784826s (0.001215s ago): [ 51.786104] krealloc_noprof+0x148/0x360 [ 51.786145] test_krealloc+0x1dc/0x830 [ 51.786184] kunit_try_run_case+0x170/0x3f0 [ 51.786226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.786271] kthread+0x328/0x630 [ 51.786311] ret_from_fork+0x10/0x20 [ 51.786361] [ 51.786405] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 51.786485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.786516] Hardware name: linux,dummy-virt (DT) [ 51.786552] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 51.704730] ================================================================== [ 51.704829] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.704829] [ 51.704926] Use-after-free read at 0x0000000007347dfe (in kfence-#157): [ 51.704982] test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.705030] kunit_try_run_case+0x170/0x3f0 [ 51.705077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.705125] kthread+0x328/0x630 [ 51.705167] ret_from_fork+0x10/0x20 [ 51.705209] [ 51.705236] kfence-#157: 0x0000000007347dfe-0x00000000e145badc, size=32, cache=test [ 51.705236] [ 51.705288] allocated by task 337 on cpu 0 at 51.684740s (0.020544s ago): [ 51.705379] test_alloc+0x230/0x628 [ 51.705426] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 51.705469] kunit_try_run_case+0x170/0x3f0 [ 51.705511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.705559] kthread+0x328/0x630 [ 51.705597] ret_from_fork+0x10/0x20 [ 51.705635] [ 51.705660] freed by task 337 on cpu 0 at 51.684858s (0.020798s ago): [ 51.705717] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 51.705759] kunit_try_run_case+0x170/0x3f0 [ 51.705801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.705844] kthread+0x328/0x630 [ 51.705884] ret_from_fork+0x10/0x20 [ 51.705924] [ 51.705967] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 51.706044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.706075] Hardware name: linux,dummy-virt (DT) [ 51.706110] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 29.024036] ================================================================== [ 29.024174] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 29.024174] [ 29.024292] Invalid read at 0x000000000f01d158: [ 29.024370] test_invalid_access+0xdc/0x1f0 [ 29.024426] kunit_try_run_case+0x170/0x3f0 [ 29.024480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.024531] kthread+0x328/0x630 [ 29.024579] ret_from_fork+0x10/0x20 [ 29.024631] [ 29.024681] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 29.025061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.027240] Hardware name: linux,dummy-virt (DT) [ 29.027294] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 28.796849] ================================================================== [ 28.796936] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.796936] [ 28.796998] Corrupted memory at 0x000000000dfe8886 [ ! . . . . . . . . . . . . . . . ] (in kfence-#153): [ 28.797316] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.797383] kunit_try_run_case+0x170/0x3f0 [ 28.797427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.797473] kthread+0x328/0x630 [ 28.797514] ret_from_fork+0x10/0x20 [ 28.797555] [ 28.797579] kfence-#153: 0x0000000012fdb41a-0x000000004bf1b3dc, size=73, cache=kmalloc-96 [ 28.797579] [ 28.797635] allocated by task 327 on cpu 0 at 28.796629s (0.001002s ago): [ 28.797695] test_alloc+0x29c/0x628 [ 28.797736] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 28.797779] kunit_try_run_case+0x170/0x3f0 [ 28.797820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.797865] kthread+0x328/0x630 [ 28.797906] ret_from_fork+0x10/0x20 [ 28.797945] [ 28.797968] freed by task 327 on cpu 0 at 28.796762s (0.001202s ago): [ 28.798028] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.798071] kunit_try_run_case+0x170/0x3f0 [ 28.798113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.798157] kthread+0x328/0x630 [ 28.798197] ret_from_fork+0x10/0x20 [ 28.798235] [ 28.798275] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 28.798364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.798392] Hardware name: linux,dummy-virt (DT) [ 28.798425] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 22.764708] ================================================================== [ 22.764798] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 22.764798] [ 22.764857] Invalid free of 0x00000000bb6aeeca (in kfence-#95): [ 22.764908] test_invalid_addr_free+0xec/0x238 [ 22.764952] kunit_try_run_case+0x170/0x3f0 [ 22.764995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.765042] kthread+0x328/0x630 [ 22.765083] ret_from_fork+0x10/0x20 [ 22.765124] [ 22.765147] kfence-#95: 0x00000000c749b1e8-0x000000004ef4c69d, size=32, cache=test [ 22.765147] [ 22.765199] allocated by task 311 on cpu 0 at 22.764587s (0.000608s ago): [ 22.765261] test_alloc+0x230/0x628 [ 22.765300] test_invalid_addr_free+0xd4/0x238 [ 22.765354] kunit_try_run_case+0x170/0x3f0 [ 22.765395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.765441] kthread+0x328/0x630 [ 22.765481] ret_from_fork+0x10/0x20 [ 22.765523] [ 22.765563] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 22.765642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.765670] Hardware name: linux,dummy-virt (DT) [ 22.765704] ================================================================== [ 22.660772] ================================================================== [ 22.660860] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 22.660860] [ 22.660922] Invalid free of 0x000000001dcd3964 (in kfence-#94): [ 22.660973] test_invalid_addr_free+0x1ac/0x238 [ 22.661020] kunit_try_run_case+0x170/0x3f0 [ 22.661063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.661110] kthread+0x328/0x630 [ 22.661152] ret_from_fork+0x10/0x20 [ 22.661192] [ 22.661217] kfence-#94: 0x00000000a98f2ae9-0x0000000091a8b0fa, size=32, cache=kmalloc-32 [ 22.661217] [ 22.661273] allocated by task 309 on cpu 0 at 22.660644s (0.000625s ago): [ 22.661350] test_alloc+0x29c/0x628 [ 22.661391] test_invalid_addr_free+0xd4/0x238 [ 22.661433] kunit_try_run_case+0x170/0x3f0 [ 22.661475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.661521] kthread+0x328/0x630 [ 22.661561] ret_from_fork+0x10/0x20 [ 22.661602] [ 22.661643] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 22.661723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.661754] Hardware name: linux,dummy-virt (DT) [ 22.661787] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 22.456328] ================================================================== [ 22.456500] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 22.456500] [ 22.456905] Invalid free of 0x000000006b149176 (in kfence-#92): [ 22.457529] test_double_free+0x1bc/0x238 [ 22.457700] kunit_try_run_case+0x170/0x3f0 [ 22.458297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.458649] kthread+0x328/0x630 [ 22.458806] ret_from_fork+0x10/0x20 [ 22.458859] [ 22.459095] kfence-#92: 0x000000006b149176-0x0000000021dc2362, size=32, cache=kmalloc-32 [ 22.459095] [ 22.459435] allocated by task 305 on cpu 0 at 22.454769s (0.004532s ago): [ 22.460037] test_alloc+0x29c/0x628 [ 22.460216] test_double_free+0xd4/0x238 [ 22.460328] kunit_try_run_case+0x170/0x3f0 [ 22.460543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.460829] kthread+0x328/0x630 [ 22.460960] ret_from_fork+0x10/0x20 [ 22.461063] [ 22.461090] freed by task 305 on cpu 0 at 22.454853s (0.006233s ago): [ 22.461355] test_double_free+0x1ac/0x238 [ 22.461544] kunit_try_run_case+0x170/0x3f0 [ 22.461687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.461764] kthread+0x328/0x630 [ 22.461883] ret_from_fork+0x10/0x20 [ 22.462015] [ 22.462346] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 22.462448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.462495] Hardware name: linux,dummy-virt (DT) [ 22.462574] ================================================================== [ 22.556792] ================================================================== [ 22.556883] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 22.556883] [ 22.556942] Invalid free of 0x00000000fb037203 (in kfence-#93): [ 22.556997] test_double_free+0x100/0x238 [ 22.557043] kunit_try_run_case+0x170/0x3f0 [ 22.557088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.557134] kthread+0x328/0x630 [ 22.557175] ret_from_fork+0x10/0x20 [ 22.557215] [ 22.557238] kfence-#93: 0x00000000fb037203-0x00000000e8abe1c3, size=32, cache=test [ 22.557238] [ 22.557292] allocated by task 307 on cpu 1 at 22.556586s (0.000702s ago): [ 22.557369] test_alloc+0x230/0x628 [ 22.557408] test_double_free+0xd4/0x238 [ 22.557448] kunit_try_run_case+0x170/0x3f0 [ 22.557490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.557536] kthread+0x328/0x630 [ 22.557575] ret_from_fork+0x10/0x20 [ 22.557615] [ 22.557638] freed by task 307 on cpu 1 at 22.556638s (0.000996s ago): [ 22.557699] test_double_free+0xf0/0x238 [ 22.557737] kunit_try_run_case+0x170/0x3f0 [ 22.557779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.557824] kthread+0x328/0x630 [ 22.557863] ret_from_fork+0x10/0x20 [ 22.557902] [ 22.557946] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 22.558025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.558055] Hardware name: linux,dummy-virt (DT) [ 22.558090] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 22.039604] ================================================================== [ 22.039715] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.039715] [ 22.039813] Use-after-free read at 0x00000000e61fd231 (in kfence-#88): [ 22.039916] test_use_after_free_read+0x114/0x248 [ 22.039970] kunit_try_run_case+0x170/0x3f0 [ 22.040038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.040445] kthread+0x328/0x630 [ 22.040551] ret_from_fork+0x10/0x20 [ 22.040599] [ 22.040625] kfence-#88: 0x00000000e61fd231-0x00000000c873faf0, size=32, cache=kmalloc-32 [ 22.040625] [ 22.041025] allocated by task 297 on cpu 0 at 22.038761s (0.002226s ago): [ 22.041134] test_alloc+0x29c/0x628 [ 22.041271] test_use_after_free_read+0xd0/0x248 [ 22.041318] kunit_try_run_case+0x170/0x3f0 [ 22.041898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.041998] kthread+0x328/0x630 [ 22.042110] ret_from_fork+0x10/0x20 [ 22.042151] [ 22.042186] freed by task 297 on cpu 0 at 22.039239s (0.002941s ago): [ 22.042310] test_use_after_free_read+0x1c0/0x248 [ 22.042398] kunit_try_run_case+0x170/0x3f0 [ 22.042440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.042504] kthread+0x328/0x630 [ 22.042553] ret_from_fork+0x10/0x20 [ 22.042592] [ 22.042642] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 22.042723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.042771] Hardware name: linux,dummy-virt (DT) [ 22.042814] ================================================================== [ 22.142913] ================================================================== [ 22.143023] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.143023] [ 22.143153] Use-after-free read at 0x00000000108af4e4 (in kfence-#89): [ 22.143579] test_use_after_free_read+0x114/0x248 [ 22.143649] kunit_try_run_case+0x170/0x3f0 [ 22.143777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.143828] kthread+0x328/0x630 [ 22.143872] ret_from_fork+0x10/0x20 [ 22.144170] [ 22.144216] kfence-#89: 0x00000000108af4e4-0x00000000b32968d4, size=32, cache=test [ 22.144216] [ 22.144360] allocated by task 299 on cpu 0 at 22.142408s (0.001914s ago): [ 22.144652] test_alloc+0x230/0x628 [ 22.144820] test_use_after_free_read+0xd0/0x248 [ 22.144968] kunit_try_run_case+0x170/0x3f0 [ 22.145053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.145295] kthread+0x328/0x630 [ 22.145587] ret_from_fork+0x10/0x20 [ 22.145797] [ 22.146036] freed by task 299 on cpu 0 at 22.142503s (0.003519s ago): [ 22.146242] test_use_after_free_read+0xf0/0x248 [ 22.146331] kunit_try_run_case+0x170/0x3f0 [ 22.146674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.147112] kthread+0x328/0x630 [ 22.147266] ret_from_fork+0x10/0x20 [ 22.147371] [ 22.147624] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 22.147869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.147942] Hardware name: linux,dummy-virt (DT) [ 22.147987] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 21.829680] ================================================================== [ 21.829741] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 21.829741] [ 21.829826] Out-of-bounds write at 0x000000003c5ff46e (1B left of kfence-#86): [ 21.829882] test_out_of_bounds_write+0x100/0x240 [ 21.829982] kunit_try_run_case+0x170/0x3f0 [ 21.830035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.830089] kthread+0x328/0x630 [ 21.830134] ret_from_fork+0x10/0x20 [ 21.830173] [ 21.830199] kfence-#86: 0x00000000678b480e-0x00000000416a7623, size=32, cache=kmalloc-32 [ 21.830199] [ 21.830261] allocated by task 293 on cpu 0 at 21.829273s (0.000976s ago): [ 21.830346] test_alloc+0x29c/0x628 [ 21.830397] test_out_of_bounds_write+0xc8/0x240 [ 21.830439] kunit_try_run_case+0x170/0x3f0 [ 21.830481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.830526] kthread+0x328/0x630 [ 21.830564] ret_from_fork+0x10/0x20 [ 21.830611] [ 21.830664] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 21.830744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.830774] Hardware name: linux,dummy-virt (DT) [ 21.830816] ================================================================== [ 21.933077] ================================================================== [ 21.933170] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 21.933170] [ 21.933269] Out-of-bounds write at 0x00000000c7eaa656 (1B left of kfence-#87): [ 21.933352] test_out_of_bounds_write+0x100/0x240 [ 21.933420] kunit_try_run_case+0x170/0x3f0 [ 21.933466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.933528] kthread+0x328/0x630 [ 21.933582] ret_from_fork+0x10/0x20 [ 21.933623] [ 21.933649] kfence-#87: 0x000000002694d68b-0x00000000b9c1e956, size=32, cache=test [ 21.933649] [ 21.933723] allocated by task 295 on cpu 0 at 21.932931s (0.000781s ago): [ 21.934042] test_alloc+0x230/0x628 [ 21.934102] test_out_of_bounds_write+0xc8/0x240 [ 21.934161] kunit_try_run_case+0x170/0x3f0 [ 21.934206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.934264] kthread+0x328/0x630 [ 21.934322] ret_from_fork+0x10/0x20 [ 21.934377] [ 21.934450] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 21.934551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.934599] Hardware name: linux,dummy-virt (DT) [ 21.934633] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 21.726212] ================================================================== [ 21.726378] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.726378] [ 21.726462] Out-of-bounds read at 0x00000000bd96c18d (32B right of kfence-#85): [ 21.726892] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.726987] kunit_try_run_case+0x170/0x3f0 [ 21.727103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.727184] kthread+0x328/0x630 [ 21.727260] ret_from_fork+0x10/0x20 [ 21.727304] [ 21.727399] kfence-#85: 0x000000004217ff4d-0x00000000a25a77bd, size=32, cache=test [ 21.727399] [ 21.727455] allocated by task 291 on cpu 0 at 21.726026s (0.001425s ago): [ 21.727548] test_alloc+0x230/0x628 [ 21.727859] test_out_of_bounds_read+0x198/0x3e0 [ 21.728011] kunit_try_run_case+0x170/0x3f0 [ 21.728114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.728180] kthread+0x328/0x630 [ 21.728389] ret_from_fork+0x10/0x20 [ 21.728435] [ 21.728886] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 21.729082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.729131] Hardware name: linux,dummy-virt (DT) [ 21.729165] ================================================================== [ 20.999692] ================================================================== [ 20.999827] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 20.999827] [ 21.000897] Out-of-bounds read at 0x00000000f19ac7d2 (1B left of kfence-#78): [ 21.001020] test_out_of_bounds_read+0x114/0x3e0 [ 21.001459] kunit_try_run_case+0x170/0x3f0 [ 21.001567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.001765] kthread+0x328/0x630 [ 21.001988] ret_from_fork+0x10/0x20 [ 21.002048] [ 21.002402] kfence-#78: 0x00000000c638e464-0x00000000c30a8c16, size=32, cache=kmalloc-32 [ 21.002402] [ 21.002591] allocated by task 289 on cpu 0 at 20.998280s (0.004273s ago): [ 21.002836] test_alloc+0x29c/0x628 [ 21.002927] test_out_of_bounds_read+0xdc/0x3e0 [ 21.003191] kunit_try_run_case+0x170/0x3f0 [ 21.003364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.003452] kthread+0x328/0x630 [ 21.003491] ret_from_fork+0x10/0x20 [ 21.003601] [ 21.003683] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 21.003961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.004297] Hardware name: linux,dummy-virt (DT) [ 21.004385] ================================================================== [ 21.621253] ================================================================== [ 21.621350] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 21.621350] [ 21.621452] Out-of-bounds read at 0x00000000bf54791c (1B left of kfence-#84): [ 21.621521] test_out_of_bounds_read+0x114/0x3e0 [ 21.621569] kunit_try_run_case+0x170/0x3f0 [ 21.621860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.621906] kthread+0x328/0x630 [ 21.621972] ret_from_fork+0x10/0x20 [ 21.622020] [ 21.622046] kfence-#84: 0x000000003a8d88b9-0x00000000018e4988, size=32, cache=test [ 21.622046] [ 21.622129] allocated by task 291 on cpu 0 at 21.621142s (0.000969s ago): [ 21.622306] test_alloc+0x230/0x628 [ 21.622362] test_out_of_bounds_read+0xdc/0x3e0 [ 21.622423] kunit_try_run_case+0x170/0x3f0 [ 21.622466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.622510] kthread+0x328/0x630 [ 21.622550] ret_from_fork+0x10/0x20 [ 21.622608] [ 21.622933] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 21.623013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.623061] Hardware name: linux,dummy-virt (DT) [ 21.623111] ================================================================== [ 21.310356] ================================================================== [ 21.310478] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.310478] [ 21.310644] Out-of-bounds read at 0x00000000564ae55f (32B right of kfence-#81): [ 21.310980] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.311051] kunit_try_run_case+0x170/0x3f0 [ 21.311097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.311167] kthread+0x328/0x630 [ 21.311224] ret_from_fork+0x10/0x20 [ 21.311269] [ 21.311294] kfence-#81: 0x000000006d9dd898-0x0000000088deea86, size=32, cache=kmalloc-32 [ 21.311294] [ 21.311371] allocated by task 289 on cpu 0 at 21.309754s (0.001601s ago): [ 21.311441] test_alloc+0x29c/0x628 [ 21.311489] test_out_of_bounds_read+0x198/0x3e0 [ 21.311532] kunit_try_run_case+0x170/0x3f0 [ 21.311575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.311633] kthread+0x328/0x630 [ 21.311681] ret_from_fork+0x10/0x20 [ 21.311970] [ 21.312043] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 21.312125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.312177] Hardware name: linux,dummy-virt (DT) [ 21.312229] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-kmalloc_uaf
[ 17.958743] ================================================================== [ 17.958857] BUG: KFENCE: use-after-free read in kmalloc_uaf+0x184/0x338 [ 17.958857] [ 17.958957] Use-after-free read at 0x00000000c4449e63 (in kfence-#57): [ 17.959300] kmalloc_uaf+0x184/0x338 [ 17.959374] kunit_try_run_case+0x170/0x3f0 [ 17.959417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.959461] kthread+0x328/0x630 [ 17.959737] ret_from_fork+0x10/0x20 [ 17.959830] [ 17.960001] kfence-#57: 0x0000000088461a91-0x0000000084b154c5, size=10, cache=kmalloc-16 [ 17.960001] [ 17.960219] allocated by task 186 on cpu 1 at 17.957289s (0.002844s ago): [ 17.961484] kmalloc_uaf+0xb8/0x338 [ 17.961567] kunit_try_run_case+0x170/0x3f0 [ 17.961608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.961657] kthread+0x328/0x630 [ 17.961693] ret_from_fork+0x10/0x20 [ 17.962004] [ 17.962386] freed by task 186 on cpu 1 at 17.957367s (0.004864s ago): [ 17.962721] kmalloc_uaf+0x11c/0x338 [ 17.962816] kunit_try_run_case+0x170/0x3f0 [ 17.962866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.963244] kthread+0x328/0x630 [ 17.963319] ret_from_fork+0x10/0x20 [ 17.963531] [ 17.963682] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.963784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.963840] Hardware name: linux,dummy-virt (DT) [ 17.963971] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 20.711325] ================================================================== [ 20.711389] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 20.711677] Write of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287 [ 20.711783] [ 20.711833] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.711941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.712026] Hardware name: linux,dummy-virt (DT) [ 20.712086] Call trace: [ 20.712112] show_stack+0x20/0x38 (C) [ 20.712163] dump_stack_lvl+0x8c/0xd0 [ 20.712221] print_report+0x118/0x608 [ 20.712573] kasan_report+0xdc/0x128 [ 20.712669] kasan_check_range+0x100/0x1a8 [ 20.712746] __kasan_check_write+0x20/0x30 [ 20.712847] strncpy_from_user+0x3c/0x2a0 [ 20.713201] copy_user_test_oob+0x5c0/0xec8 [ 20.713310] kunit_try_run_case+0x170/0x3f0 [ 20.713485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.713598] kthread+0x328/0x630 [ 20.713771] ret_from_fork+0x10/0x20 [ 20.713912] [ 20.714046] Allocated by task 287: [ 20.714115] kasan_save_stack+0x3c/0x68 [ 20.714158] kasan_save_track+0x20/0x40 [ 20.714222] kasan_save_alloc_info+0x40/0x58 [ 20.714264] __kasan_kmalloc+0xd4/0xd8 [ 20.714301] __kmalloc_noprof+0x198/0x4c8 [ 20.714637] kunit_kmalloc_array+0x34/0x88 [ 20.714755] copy_user_test_oob+0xac/0xec8 [ 20.714814] kunit_try_run_case+0x170/0x3f0 [ 20.714939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.715008] kthread+0x328/0x630 [ 20.715076] ret_from_fork+0x10/0x20 [ 20.715115] [ 20.715136] The buggy address belongs to the object at fff00000c6e6ca00 [ 20.715136] which belongs to the cache kmalloc-128 of size 128 [ 20.715206] The buggy address is located 0 bytes inside of [ 20.715206] allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78) [ 20.715271] [ 20.715293] The buggy address belongs to the physical page: [ 20.715324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.715406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.715466] page_type: f5(slab) [ 20.715507] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.715575] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.715618] page dumped because: kasan: bad access detected [ 20.715661] [ 20.715682] Memory state around the buggy address: [ 20.715715] fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.715760] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.715806] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.715856] ^ [ 20.715898] fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.715944] fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.715985] ================================================================== [ 20.716929] ================================================================== [ 20.716983] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 20.717032] Write of size 1 at addr fff00000c6e6ca78 by task kunit_try_catch/287 [ 20.717084] [ 20.717114] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.717473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.717552] Hardware name: linux,dummy-virt (DT) [ 20.717586] Call trace: [ 20.717610] show_stack+0x20/0x38 (C) [ 20.717702] dump_stack_lvl+0x8c/0xd0 [ 20.717803] print_report+0x118/0x608 [ 20.718050] kasan_report+0xdc/0x128 [ 20.718151] __asan_report_store1_noabort+0x20/0x30 [ 20.718243] strncpy_from_user+0x270/0x2a0 [ 20.718317] copy_user_test_oob+0x5c0/0xec8 [ 20.718455] kunit_try_run_case+0x170/0x3f0 [ 20.718554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.718648] kthread+0x328/0x630 [ 20.718788] ret_from_fork+0x10/0x20 [ 20.718905] [ 20.719017] Allocated by task 287: [ 20.719085] kasan_save_stack+0x3c/0x68 [ 20.719177] kasan_save_track+0x20/0x40 [ 20.719219] kasan_save_alloc_info+0x40/0x58 [ 20.719260] __kasan_kmalloc+0xd4/0xd8 [ 20.719553] __kmalloc_noprof+0x198/0x4c8 [ 20.719635] kunit_kmalloc_array+0x34/0x88 [ 20.719725] copy_user_test_oob+0xac/0xec8 [ 20.719858] kunit_try_run_case+0x170/0x3f0 [ 20.719942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.720047] kthread+0x328/0x630 [ 20.720215] ret_from_fork+0x10/0x20 [ 20.720421] [ 20.720492] The buggy address belongs to the object at fff00000c6e6ca00 [ 20.720492] which belongs to the cache kmalloc-128 of size 128 [ 20.720684] The buggy address is located 0 bytes to the right of [ 20.720684] allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78) [ 20.720769] [ 20.720791] The buggy address belongs to the physical page: [ 20.720833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.720892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.721065] page_type: f5(slab) [ 20.721215] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.721501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.721588] page dumped because: kasan: bad access detected [ 20.721656] [ 20.721679] Memory state around the buggy address: [ 20.721713] fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.721758] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.722005] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.722083] ^ [ 20.722192] fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.722256] fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.722326] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 20.670174] ================================================================== [ 20.670267] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 20.670585] Write of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287 [ 20.670729] [ 20.670810] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.670930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.671005] Hardware name: linux,dummy-virt (DT) [ 20.671061] Call trace: [ 20.671087] show_stack+0x20/0x38 (C) [ 20.671142] dump_stack_lvl+0x8c/0xd0 [ 20.671194] print_report+0x118/0x608 [ 20.671311] kasan_report+0xdc/0x128 [ 20.671373] kasan_check_range+0x100/0x1a8 [ 20.671440] __kasan_check_write+0x20/0x30 [ 20.671492] copy_user_test_oob+0x234/0xec8 [ 20.671777] kunit_try_run_case+0x170/0x3f0 [ 20.671888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.671985] kthread+0x328/0x630 [ 20.672102] ret_from_fork+0x10/0x20 [ 20.672154] [ 20.672204] Allocated by task 287: [ 20.672249] kasan_save_stack+0x3c/0x68 [ 20.672311] kasan_save_track+0x20/0x40 [ 20.672397] kasan_save_alloc_info+0x40/0x58 [ 20.672544] __kasan_kmalloc+0xd4/0xd8 [ 20.672612] __kmalloc_noprof+0x198/0x4c8 [ 20.672654] kunit_kmalloc_array+0x34/0x88 [ 20.672694] copy_user_test_oob+0xac/0xec8 [ 20.672733] kunit_try_run_case+0x170/0x3f0 [ 20.672773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.673060] kthread+0x328/0x630 [ 20.673178] ret_from_fork+0x10/0x20 [ 20.673265] [ 20.673405] The buggy address belongs to the object at fff00000c6e6ca00 [ 20.673405] which belongs to the cache kmalloc-128 of size 128 [ 20.673489] The buggy address is located 0 bytes inside of [ 20.673489] allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78) [ 20.673555] [ 20.673600] The buggy address belongs to the physical page: [ 20.673644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.673711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.673771] page_type: f5(slab) [ 20.673822] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.673874] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.673917] page dumped because: kasan: bad access detected [ 20.673950] [ 20.673974] Memory state around the buggy address: [ 20.674009] fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.674054] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.674115] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.674156] ^ [ 20.674209] fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.674268] fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.674315] ================================================================== [ 20.701634] ================================================================== [ 20.701783] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 20.701836] Write of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287 [ 20.701889] [ 20.701955] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.702171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.702201] Hardware name: linux,dummy-virt (DT) [ 20.702307] Call trace: [ 20.702374] show_stack+0x20/0x38 (C) [ 20.702428] dump_stack_lvl+0x8c/0xd0 [ 20.702477] print_report+0x118/0x608 [ 20.702525] kasan_report+0xdc/0x128 [ 20.702862] kasan_check_range+0x100/0x1a8 [ 20.702952] __kasan_check_write+0x20/0x30 [ 20.703005] copy_user_test_oob+0x434/0xec8 [ 20.703076] kunit_try_run_case+0x170/0x3f0 [ 20.703162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.703225] kthread+0x328/0x630 [ 20.703280] ret_from_fork+0x10/0x20 [ 20.703374] [ 20.703542] Allocated by task 287: [ 20.703576] kasan_save_stack+0x3c/0x68 [ 20.703747] kasan_save_track+0x20/0x40 [ 20.703813] kasan_save_alloc_info+0x40/0x58 [ 20.703866] __kasan_kmalloc+0xd4/0xd8 [ 20.703904] __kmalloc_noprof+0x198/0x4c8 [ 20.703950] kunit_kmalloc_array+0x34/0x88 [ 20.703990] copy_user_test_oob+0xac/0xec8 [ 20.704029] kunit_try_run_case+0x170/0x3f0 [ 20.704069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.704116] kthread+0x328/0x630 [ 20.704155] ret_from_fork+0x10/0x20 [ 20.704206] [ 20.704239] The buggy address belongs to the object at fff00000c6e6ca00 [ 20.704239] which belongs to the cache kmalloc-128 of size 128 [ 20.704299] The buggy address is located 0 bytes inside of [ 20.704299] allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78) [ 20.704372] [ 20.704634] The buggy address belongs to the physical page: [ 20.704693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.704782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.704835] page_type: f5(slab) [ 20.704876] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.705035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.705117] page dumped because: kasan: bad access detected [ 20.705232] [ 20.705310] Memory state around the buggy address: [ 20.705387] fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.705514] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.705579] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.705684] ^ [ 20.705821] fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.705902] fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.705980] ================================================================== [ 20.678884] ================================================================== [ 20.679170] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 20.679286] Read of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287 [ 20.679405] [ 20.679446] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.679548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.679580] Hardware name: linux,dummy-virt (DT) [ 20.679612] Call trace: [ 20.679637] show_stack+0x20/0x38 (C) [ 20.679932] dump_stack_lvl+0x8c/0xd0 [ 20.680017] print_report+0x118/0x608 [ 20.680083] kasan_report+0xdc/0x128 [ 20.680146] kasan_check_range+0x100/0x1a8 [ 20.680219] __kasan_check_read+0x20/0x30 [ 20.680499] copy_user_test_oob+0x728/0xec8 [ 20.680568] kunit_try_run_case+0x170/0x3f0 [ 20.680665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.680797] kthread+0x328/0x630 [ 20.680892] ret_from_fork+0x10/0x20 [ 20.680995] [ 20.681108] Allocated by task 287: [ 20.681186] kasan_save_stack+0x3c/0x68 [ 20.681275] kasan_save_track+0x20/0x40 [ 20.681626] kasan_save_alloc_info+0x40/0x58 [ 20.681727] __kasan_kmalloc+0xd4/0xd8 [ 20.681830] __kmalloc_noprof+0x198/0x4c8 [ 20.681969] kunit_kmalloc_array+0x34/0x88 [ 20.682055] copy_user_test_oob+0xac/0xec8 [ 20.682118] kunit_try_run_case+0x170/0x3f0 [ 20.682171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.682217] kthread+0x328/0x630 [ 20.682257] ret_from_fork+0x10/0x20 [ 20.682294] [ 20.682574] The buggy address belongs to the object at fff00000c6e6ca00 [ 20.682574] which belongs to the cache kmalloc-128 of size 128 [ 20.682752] The buggy address is located 0 bytes inside of [ 20.682752] allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78) [ 20.682870] [ 20.682913] The buggy address belongs to the physical page: [ 20.683029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.683093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.683170] page_type: f5(slab) [ 20.683243] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.683636] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.683751] page dumped because: kasan: bad access detected [ 20.683899] [ 20.683959] Memory state around the buggy address: [ 20.684016] fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.684090] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.684145] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.684186] ^ [ 20.684237] fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.684283] fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.684324] ================================================================== [ 20.706517] ================================================================== [ 20.706599] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 20.706650] Read of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287 [ 20.706734] [ 20.706794] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.706916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.706963] Hardware name: linux,dummy-virt (DT) [ 20.707001] Call trace: [ 20.707025] show_stack+0x20/0x38 (C) [ 20.707082] dump_stack_lvl+0x8c/0xd0 [ 20.707446] print_report+0x118/0x608 [ 20.707507] kasan_report+0xdc/0x128 [ 20.707555] kasan_check_range+0x100/0x1a8 [ 20.707613] __kasan_check_read+0x20/0x30 [ 20.707664] copy_user_test_oob+0x4a0/0xec8 [ 20.707713] kunit_try_run_case+0x170/0x3f0 [ 20.707766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.707830] kthread+0x328/0x630 [ 20.707879] ret_from_fork+0x10/0x20 [ 20.707927] [ 20.707949] Allocated by task 287: [ 20.707979] kasan_save_stack+0x3c/0x68 [ 20.708022] kasan_save_track+0x20/0x40 [ 20.708060] kasan_save_alloc_info+0x40/0x58 [ 20.708102] __kasan_kmalloc+0xd4/0xd8 [ 20.708138] __kmalloc_noprof+0x198/0x4c8 [ 20.708178] kunit_kmalloc_array+0x34/0x88 [ 20.708224] copy_user_test_oob+0xac/0xec8 [ 20.708265] kunit_try_run_case+0x170/0x3f0 [ 20.708307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.708364] kthread+0x328/0x630 [ 20.708403] ret_from_fork+0x10/0x20 [ 20.708440] [ 20.708461] The buggy address belongs to the object at fff00000c6e6ca00 [ 20.708461] which belongs to the cache kmalloc-128 of size 128 [ 20.708758] The buggy address is located 0 bytes inside of [ 20.708758] allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78) [ 20.708925] [ 20.709003] The buggy address belongs to the physical page: [ 20.709135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.709190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.709239] page_type: f5(slab) [ 20.709279] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.709344] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.709388] page dumped because: kasan: bad access detected [ 20.709422] [ 20.709469] Memory state around the buggy address: [ 20.709503] fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.709648] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.709746] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.709893] ^ [ 20.709961] fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.710063] fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.710368] ================================================================== [ 20.695589] ================================================================== [ 20.695652] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 20.695704] Read of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287 [ 20.695780] [ 20.695934] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.696094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.696126] Hardware name: linux,dummy-virt (DT) [ 20.696187] Call trace: [ 20.696294] show_stack+0x20/0x38 (C) [ 20.696404] dump_stack_lvl+0x8c/0xd0 [ 20.696528] print_report+0x118/0x608 [ 20.696613] kasan_report+0xdc/0x128 [ 20.696672] kasan_check_range+0x100/0x1a8 [ 20.696721] __kasan_check_read+0x20/0x30 [ 20.696768] copy_user_test_oob+0x3c8/0xec8 [ 20.696928] kunit_try_run_case+0x170/0x3f0 [ 20.697060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.697161] kthread+0x328/0x630 [ 20.697289] ret_from_fork+0x10/0x20 [ 20.697483] [ 20.697542] Allocated by task 287: [ 20.697602] kasan_save_stack+0x3c/0x68 [ 20.697645] kasan_save_track+0x20/0x40 [ 20.697696] kasan_save_alloc_info+0x40/0x58 [ 20.697771] __kasan_kmalloc+0xd4/0xd8 [ 20.698099] __kmalloc_noprof+0x198/0x4c8 [ 20.698188] kunit_kmalloc_array+0x34/0x88 [ 20.698260] copy_user_test_oob+0xac/0xec8 [ 20.698432] kunit_try_run_case+0x170/0x3f0 [ 20.698504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.698666] kthread+0x328/0x630 [ 20.698753] ret_from_fork+0x10/0x20 [ 20.698827] [ 20.698958] The buggy address belongs to the object at fff00000c6e6ca00 [ 20.698958] which belongs to the cache kmalloc-128 of size 128 [ 20.699019] The buggy address is located 0 bytes inside of [ 20.699019] allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78) [ 20.699082] [ 20.699104] The buggy address belongs to the physical page: [ 20.699138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.699451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.699562] page_type: f5(slab) [ 20.699641] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.699789] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.699866] page dumped because: kasan: bad access detected [ 20.699928] [ 20.699979] Memory state around the buggy address: [ 20.700223] fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.700388] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.700475] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.700619] ^ [ 20.700688] fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.700769] fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.700836] ================================================================== [ 20.689760] ================================================================== [ 20.689875] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 20.689929] Write of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287 [ 20.689999] [ 20.690032] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.690505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.690549] Hardware name: linux,dummy-virt (DT) [ 20.690688] Call trace: [ 20.690737] show_stack+0x20/0x38 (C) [ 20.690801] dump_stack_lvl+0x8c/0xd0 [ 20.690891] print_report+0x118/0x608 [ 20.690956] kasan_report+0xdc/0x128 [ 20.691022] kasan_check_range+0x100/0x1a8 [ 20.691073] __kasan_check_write+0x20/0x30 [ 20.691128] copy_user_test_oob+0x35c/0xec8 [ 20.691210] kunit_try_run_case+0x170/0x3f0 [ 20.691267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.691361] kthread+0x328/0x630 [ 20.691412] ret_from_fork+0x10/0x20 [ 20.691660] [ 20.691711] Allocated by task 287: [ 20.691760] kasan_save_stack+0x3c/0x68 [ 20.691804] kasan_save_track+0x20/0x40 [ 20.691861] kasan_save_alloc_info+0x40/0x58 [ 20.691924] __kasan_kmalloc+0xd4/0xd8 [ 20.692008] __kmalloc_noprof+0x198/0x4c8 [ 20.692065] kunit_kmalloc_array+0x34/0x88 [ 20.692109] copy_user_test_oob+0xac/0xec8 [ 20.692146] kunit_try_run_case+0x170/0x3f0 [ 20.692188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.692360] kthread+0x328/0x630 [ 20.692419] ret_from_fork+0x10/0x20 [ 20.692458] [ 20.692480] The buggy address belongs to the object at fff00000c6e6ca00 [ 20.692480] which belongs to the cache kmalloc-128 of size 128 [ 20.692539] The buggy address is located 0 bytes inside of [ 20.692539] allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78) [ 20.692602] [ 20.692967] The buggy address belongs to the physical page: [ 20.693044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.693193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.693287] page_type: f5(slab) [ 20.693645] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.693741] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.693810] page dumped because: kasan: bad access detected [ 20.693872] [ 20.693969] Memory state around the buggy address: [ 20.694025] fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.694090] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.694157] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.694276] ^ [ 20.694349] fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.694420] fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.694462] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 20.645885] ================================================================== [ 20.645935] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 20.645988] Write of size 8 at addr fff00000c6e6c978 by task kunit_try_catch/283 [ 20.646043] [ 20.646076] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.646157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.646329] Hardware name: linux,dummy-virt (DT) [ 20.646407] Call trace: [ 20.646432] show_stack+0x20/0x38 (C) [ 20.646483] dump_stack_lvl+0x8c/0xd0 [ 20.646570] print_report+0x118/0x608 [ 20.646623] kasan_report+0xdc/0x128 [ 20.646689] kasan_check_range+0x100/0x1a8 [ 20.646764] __kasan_check_write+0x20/0x30 [ 20.647036] copy_to_kernel_nofault+0x8c/0x250 [ 20.647151] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 20.647207] kunit_try_run_case+0x170/0x3f0 [ 20.647258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.647314] kthread+0x328/0x630 [ 20.647571] ret_from_fork+0x10/0x20 [ 20.647629] [ 20.647671] Allocated by task 283: [ 20.647721] kasan_save_stack+0x3c/0x68 [ 20.647764] kasan_save_track+0x20/0x40 [ 20.647803] kasan_save_alloc_info+0x40/0x58 [ 20.647842] __kasan_kmalloc+0xd4/0xd8 [ 20.647890] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.647931] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.647975] kunit_try_run_case+0x170/0x3f0 [ 20.648016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.648070] kthread+0x328/0x630 [ 20.648109] ret_from_fork+0x10/0x20 [ 20.648146] [ 20.648168] The buggy address belongs to the object at fff00000c6e6c900 [ 20.648168] which belongs to the cache kmalloc-128 of size 128 [ 20.648226] The buggy address is located 0 bytes to the right of [ 20.648226] allocated 120-byte region [fff00000c6e6c900, fff00000c6e6c978) [ 20.648291] [ 20.648324] The buggy address belongs to the physical page: [ 20.648579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.648842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.648977] page_type: f5(slab) [ 20.649179] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.649356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.649432] page dumped because: kasan: bad access detected [ 20.649507] [ 20.649654] Memory state around the buggy address: [ 20.649754] fff00000c6e6c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.649838] fff00000c6e6c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.649952] >fff00000c6e6c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.650020] ^ [ 20.650124] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.650238] fff00000c6e6ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.650278] ================================================================== [ 20.641068] ================================================================== [ 20.641144] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 20.641234] Read of size 8 at addr fff00000c6e6c978 by task kunit_try_catch/283 [ 20.641287] [ 20.641361] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.641466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.641504] Hardware name: linux,dummy-virt (DT) [ 20.641538] Call trace: [ 20.641588] show_stack+0x20/0x38 (C) [ 20.641639] dump_stack_lvl+0x8c/0xd0 [ 20.641732] print_report+0x118/0x608 [ 20.641809] kasan_report+0xdc/0x128 [ 20.641876] __asan_report_load8_noabort+0x20/0x30 [ 20.641927] copy_to_kernel_nofault+0x204/0x250 [ 20.642134] copy_to_kernel_nofault_oob+0x158/0x418 [ 20.642272] kunit_try_run_case+0x170/0x3f0 [ 20.642364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.642425] kthread+0x328/0x630 [ 20.642474] ret_from_fork+0x10/0x20 [ 20.642524] [ 20.642545] Allocated by task 283: [ 20.642581] kasan_save_stack+0x3c/0x68 [ 20.642780] kasan_save_track+0x20/0x40 [ 20.642826] kasan_save_alloc_info+0x40/0x58 [ 20.642886] __kasan_kmalloc+0xd4/0xd8 [ 20.642924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.642966] copy_to_kernel_nofault_oob+0xc8/0x418 [ 20.643009] kunit_try_run_case+0x170/0x3f0 [ 20.643050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.643104] kthread+0x328/0x630 [ 20.643280] ret_from_fork+0x10/0x20 [ 20.643561] [ 20.643728] The buggy address belongs to the object at fff00000c6e6c900 [ 20.643728] which belongs to the cache kmalloc-128 of size 128 [ 20.644033] The buggy address is located 0 bytes to the right of [ 20.644033] allocated 120-byte region [fff00000c6e6c900, fff00000c6e6c978) [ 20.644109] [ 20.644133] The buggy address belongs to the physical page: [ 20.644166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 20.644311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.644496] page_type: f5(slab) [ 20.644621] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.644673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.644783] page dumped because: kasan: bad access detected [ 20.645097] [ 20.645230] Memory state around the buggy address: [ 20.645310] fff00000c6e6c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.645369] fff00000c6e6c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.645415] >fff00000c6e6c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.645492] ^ [ 20.645535] fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.645579] fff00000c6e6ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.645620] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 20.609898] ================================================================== [ 20.609965] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 20.610025] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271 [ 20.610077] [ 20.610115] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.610198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.610226] Hardware name: linux,dummy-virt (DT) [ 20.610285] Call trace: [ 20.610311] show_stack+0x20/0x38 (C) [ 20.610379] dump_stack_lvl+0x8c/0xd0 [ 20.610431] print_report+0x310/0x608 [ 20.610477] kasan_report+0xdc/0x128 [ 20.610523] __asan_report_load1_noabort+0x20/0x30 [ 20.610573] vmalloc_oob+0x578/0x5d0 [ 20.610620] kunit_try_run_case+0x170/0x3f0 [ 20.610669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.610723] kthread+0x328/0x630 [ 20.610771] ret_from_fork+0x10/0x20 [ 20.610819] [ 20.610852] The buggy address belongs to the virtual mapping at [ 20.610852] [ffff80008010b000, ffff80008010d000) created by: [ 20.610852] vmalloc_oob+0x98/0x5d0 [ 20.610928] [ 20.610953] The buggy address belongs to the physical page: [ 20.611013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65 [ 20.611067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.611130] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.611181] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.611241] page dumped because: kasan: bad access detected [ 20.611276] [ 20.611295] Memory state around the buggy address: [ 20.611330] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.611424] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.611469] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.611515] ^ [ 20.611842] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.611917] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.611975] ================================================================== [ 20.612109] ================================================================== [ 20.612166] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 20.612279] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271 [ 20.612373] [ 20.612436] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.612547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.612608] Hardware name: linux,dummy-virt (DT) [ 20.612702] Call trace: [ 20.612762] show_stack+0x20/0x38 (C) [ 20.612831] dump_stack_lvl+0x8c/0xd0 [ 20.612878] print_report+0x310/0x608 [ 20.612924] kasan_report+0xdc/0x128 [ 20.612970] __asan_report_load1_noabort+0x20/0x30 [ 20.613445] vmalloc_oob+0x51c/0x5d0 [ 20.613533] kunit_try_run_case+0x170/0x3f0 [ 20.613638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.614007] kthread+0x328/0x630 [ 20.614104] ret_from_fork+0x10/0x20 [ 20.614253] [ 20.614299] The buggy address belongs to the virtual mapping at [ 20.614299] [ffff80008010b000, ffff80008010d000) created by: [ 20.614299] vmalloc_oob+0x98/0x5d0 [ 20.614450] [ 20.614498] The buggy address belongs to the physical page: [ 20.614578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65 [ 20.614643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.614705] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.615033] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.615160] page dumped because: kasan: bad access detected [ 20.615208] [ 20.615285] Memory state around the buggy address: [ 20.615364] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.615624] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.615729] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.615803] ^ [ 20.615926] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.616004] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.616133] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 20.566452] ================================================================== [ 20.566507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.566747] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.566864] [ 20.566925] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.567011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.567039] Hardware name: linux,dummy-virt (DT) [ 20.567099] Call trace: [ 20.567124] show_stack+0x20/0x38 (C) [ 20.567181] dump_stack_lvl+0x8c/0xd0 [ 20.567231] print_report+0x118/0x608 [ 20.567280] kasan_report+0xdc/0x128 [ 20.567325] kasan_check_range+0x100/0x1a8 [ 20.567386] __kasan_check_write+0x20/0x30 [ 20.567442] kasan_atomics_helper+0x16d0/0x4858 [ 20.567491] kasan_atomics+0x198/0x2e0 [ 20.567537] kunit_try_run_case+0x170/0x3f0 [ 20.567587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.567643] kthread+0x328/0x630 [ 20.567692] ret_from_fork+0x10/0x20 [ 20.567741] [ 20.567763] Allocated by task 267: [ 20.567802] kasan_save_stack+0x3c/0x68 [ 20.567854] kasan_save_track+0x20/0x40 [ 20.567893] kasan_save_alloc_info+0x40/0x58 [ 20.567935] __kasan_kmalloc+0xd4/0xd8 [ 20.567972] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.568014] kasan_atomics+0xb8/0x2e0 [ 20.568051] kunit_try_run_case+0x170/0x3f0 [ 20.568093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.568149] kthread+0x328/0x630 [ 20.568198] ret_from_fork+0x10/0x20 [ 20.568643] [ 20.568745] The buggy address belongs to the object at fff00000c6e72400 [ 20.568745] which belongs to the cache kmalloc-64 of size 64 [ 20.569120] The buggy address is located 0 bytes to the right of [ 20.569120] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.569234] [ 20.569312] The buggy address belongs to the physical page: [ 20.569388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.569535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.569588] page_type: f5(slab) [ 20.569659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.569714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.569758] page dumped because: kasan: bad access detected [ 20.569923] [ 20.569998] Memory state around the buggy address: [ 20.570065] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.570118] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.570181] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.570256] ^ [ 20.570537] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.570621] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.570707] ================================================================== [ 20.456762] ================================================================== [ 20.456813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.456909] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.457088] [ 20.457144] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.457257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.457305] Hardware name: linux,dummy-virt (DT) [ 20.457350] Call trace: [ 20.457374] show_stack+0x20/0x38 (C) [ 20.457427] dump_stack_lvl+0x8c/0xd0 [ 20.457496] print_report+0x118/0x608 [ 20.457563] kasan_report+0xdc/0x128 [ 20.457628] __asan_report_store8_noabort+0x20/0x30 [ 20.457719] kasan_atomics_helper+0x3e5c/0x4858 [ 20.457768] kasan_atomics+0x198/0x2e0 [ 20.457814] kunit_try_run_case+0x170/0x3f0 [ 20.457864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.457919] kthread+0x328/0x630 [ 20.458082] ret_from_fork+0x10/0x20 [ 20.458142] [ 20.458181] Allocated by task 267: [ 20.458229] kasan_save_stack+0x3c/0x68 [ 20.458272] kasan_save_track+0x20/0x40 [ 20.460638] kasan_save_alloc_info+0x40/0x58 [ 20.460702] __kasan_kmalloc+0xd4/0xd8 [ 20.460741] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.460785] kasan_atomics+0xb8/0x2e0 [ 20.460821] kunit_try_run_case+0x170/0x3f0 [ 20.460864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.460911] kthread+0x328/0x630 [ 20.460950] ret_from_fork+0x10/0x20 [ 20.460988] [ 20.461010] The buggy address belongs to the object at fff00000c6e72400 [ 20.461010] which belongs to the cache kmalloc-64 of size 64 [ 20.461071] The buggy address is located 0 bytes to the right of [ 20.461071] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.461137] [ 20.461158] The buggy address belongs to the physical page: [ 20.461191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.461247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.461297] page_type: f5(slab) [ 20.461350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.461431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.461507] page dumped because: kasan: bad access detected [ 20.461617] [ 20.461685] Memory state around the buggy address: [ 20.461738] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.461804] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.461901] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.461942] ^ [ 20.461975] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.462019] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.462060] ================================================================== [ 20.467414] ================================================================== [ 20.467702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.467768] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.467820] [ 20.467851] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.467952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.468029] Hardware name: linux,dummy-virt (DT) [ 20.468064] Call trace: [ 20.468104] show_stack+0x20/0x38 (C) [ 20.468175] dump_stack_lvl+0x8c/0xd0 [ 20.468236] print_report+0x118/0x608 [ 20.468314] kasan_report+0xdc/0x128 [ 20.468424] kasan_check_range+0x100/0x1a8 [ 20.468507] __kasan_check_write+0x20/0x30 [ 20.468581] kasan_atomics_helper+0xf20/0x4858 [ 20.468632] kasan_atomics+0x198/0x2e0 [ 20.468677] kunit_try_run_case+0x170/0x3f0 [ 20.468727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.468783] kthread+0x328/0x630 [ 20.468948] ret_from_fork+0x10/0x20 [ 20.469094] [ 20.469152] Allocated by task 267: [ 20.469234] kasan_save_stack+0x3c/0x68 [ 20.469540] kasan_save_track+0x20/0x40 [ 20.469645] kasan_save_alloc_info+0x40/0x58 [ 20.469714] __kasan_kmalloc+0xd4/0xd8 [ 20.469818] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.469895] kasan_atomics+0xb8/0x2e0 [ 20.469963] kunit_try_run_case+0x170/0x3f0 [ 20.470050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.470134] kthread+0x328/0x630 [ 20.470228] ret_from_fork+0x10/0x20 [ 20.470306] [ 20.470358] The buggy address belongs to the object at fff00000c6e72400 [ 20.470358] which belongs to the cache kmalloc-64 of size 64 [ 20.470420] The buggy address is located 0 bytes to the right of [ 20.470420] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.470698] [ 20.470933] The buggy address belongs to the physical page: [ 20.471184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.471606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.471679] page_type: f5(slab) [ 20.471794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.471894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.471938] page dumped because: kasan: bad access detected [ 20.471972] [ 20.471993] Memory state around the buggy address: [ 20.472036] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.472296] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.472362] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.472404] ^ [ 20.472464] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.472527] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.472571] ================================================================== [ 20.487009] ================================================================== [ 20.487063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.487142] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.487223] [ 20.487255] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.487351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.487380] Hardware name: linux,dummy-virt (DT) [ 20.487413] Call trace: [ 20.487473] show_stack+0x20/0x38 (C) [ 20.487616] dump_stack_lvl+0x8c/0xd0 [ 20.487692] print_report+0x118/0x608 [ 20.487749] kasan_report+0xdc/0x128 [ 20.487814] kasan_check_range+0x100/0x1a8 [ 20.487866] __kasan_check_write+0x20/0x30 [ 20.487991] kasan_atomics_helper+0x10c0/0x4858 [ 20.488118] kasan_atomics+0x198/0x2e0 [ 20.488194] kunit_try_run_case+0x170/0x3f0 [ 20.488296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.488396] kthread+0x328/0x630 [ 20.488474] ret_from_fork+0x10/0x20 [ 20.488581] [ 20.488677] Allocated by task 267: [ 20.488738] kasan_save_stack+0x3c/0x68 [ 20.488782] kasan_save_track+0x20/0x40 [ 20.488969] kasan_save_alloc_info+0x40/0x58 [ 20.489015] __kasan_kmalloc+0xd4/0xd8 [ 20.489052] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.489205] kasan_atomics+0xb8/0x2e0 [ 20.489290] kunit_try_run_case+0x170/0x3f0 [ 20.489378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.489501] kthread+0x328/0x630 [ 20.489587] ret_from_fork+0x10/0x20 [ 20.489863] [ 20.489947] The buggy address belongs to the object at fff00000c6e72400 [ 20.489947] which belongs to the cache kmalloc-64 of size 64 [ 20.490043] The buggy address is located 0 bytes to the right of [ 20.490043] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.490160] [ 20.490229] The buggy address belongs to the physical page: [ 20.490296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.490369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.490499] page_type: f5(slab) [ 20.490577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.490663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.490707] page dumped because: kasan: bad access detected [ 20.490741] [ 20.490761] Memory state around the buggy address: [ 20.490796] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.490845] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.490890] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.491092] ^ [ 20.491172] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.491279] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.491352] ================================================================== [ 20.441922] ================================================================== [ 20.442173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.442295] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.442362] [ 20.442394] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.442487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.442515] Hardware name: linux,dummy-virt (DT) [ 20.442595] Call trace: [ 20.442620] show_stack+0x20/0x38 (C) [ 20.442688] dump_stack_lvl+0x8c/0xd0 [ 20.442758] print_report+0x118/0x608 [ 20.442824] kasan_report+0xdc/0x128 [ 20.442881] kasan_check_range+0x100/0x1a8 [ 20.442929] __kasan_check_read+0x20/0x30 [ 20.442980] kasan_atomics_helper+0xdd4/0x4858 [ 20.443066] kasan_atomics+0x198/0x2e0 [ 20.443113] kunit_try_run_case+0x170/0x3f0 [ 20.443250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.443314] kthread+0x328/0x630 [ 20.443433] ret_from_fork+0x10/0x20 [ 20.443499] [ 20.443528] Allocated by task 267: [ 20.443575] kasan_save_stack+0x3c/0x68 [ 20.443847] kasan_save_track+0x20/0x40 [ 20.443919] kasan_save_alloc_info+0x40/0x58 [ 20.443970] __kasan_kmalloc+0xd4/0xd8 [ 20.444008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.444051] kasan_atomics+0xb8/0x2e0 [ 20.444088] kunit_try_run_case+0x170/0x3f0 [ 20.444130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.444177] kthread+0x328/0x630 [ 20.444220] ret_from_fork+0x10/0x20 [ 20.444260] [ 20.444283] The buggy address belongs to the object at fff00000c6e72400 [ 20.444283] which belongs to the cache kmalloc-64 of size 64 [ 20.444354] The buggy address is located 0 bytes to the right of [ 20.444354] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.444420] [ 20.444442] The buggy address belongs to the physical page: [ 20.444589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.444647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.444729] page_type: f5(slab) [ 20.444771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.444823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.445104] page dumped because: kasan: bad access detected [ 20.445172] [ 20.445452] Memory state around the buggy address: [ 20.445550] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.445627] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.445719] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.445797] ^ [ 20.445845] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.445890] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.446108] ================================================================== [ 20.537552] ================================================================== [ 20.537607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.537695] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.537974] [ 20.538019] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.538104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.538134] Hardware name: linux,dummy-virt (DT) [ 20.538185] Call trace: [ 20.538210] show_stack+0x20/0x38 (C) [ 20.538303] dump_stack_lvl+0x8c/0xd0 [ 20.538365] print_report+0x118/0x608 [ 20.538432] kasan_report+0xdc/0x128 [ 20.538485] kasan_check_range+0x100/0x1a8 [ 20.538535] __kasan_check_write+0x20/0x30 [ 20.538585] kasan_atomics_helper+0x14e4/0x4858 [ 20.538632] kasan_atomics+0x198/0x2e0 [ 20.538678] kunit_try_run_case+0x170/0x3f0 [ 20.538728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.538846] kthread+0x328/0x630 [ 20.538987] ret_from_fork+0x10/0x20 [ 20.539062] [ 20.539091] Allocated by task 267: [ 20.539121] kasan_save_stack+0x3c/0x68 [ 20.539354] kasan_save_track+0x20/0x40 [ 20.539411] kasan_save_alloc_info+0x40/0x58 [ 20.539492] __kasan_kmalloc+0xd4/0xd8 [ 20.539566] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.539611] kasan_atomics+0xb8/0x2e0 [ 20.539648] kunit_try_run_case+0x170/0x3f0 [ 20.539691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.539736] kthread+0x328/0x630 [ 20.539793] ret_from_fork+0x10/0x20 [ 20.539849] [ 20.539883] The buggy address belongs to the object at fff00000c6e72400 [ 20.539883] which belongs to the cache kmalloc-64 of size 64 [ 20.539945] The buggy address is located 0 bytes to the right of [ 20.539945] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.540052] [ 20.540074] The buggy address belongs to the physical page: [ 20.540241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.540312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.540442] page_type: f5(slab) [ 20.540509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.540580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.540857] page dumped because: kasan: bad access detected [ 20.540920] [ 20.540989] Memory state around the buggy address: [ 20.541081] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.541157] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.541220] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.541260] ^ [ 20.541678] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.541730] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.541771] ================================================================== [ 20.544451] ================================================================== [ 20.544492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.544550] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.544958] [ 20.544991] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.545076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.545104] Hardware name: linux,dummy-virt (DT) [ 20.545136] Call trace: [ 20.545159] show_stack+0x20/0x38 (C) [ 20.545239] dump_stack_lvl+0x8c/0xd0 [ 20.545288] print_report+0x118/0x608 [ 20.545347] kasan_report+0xdc/0x128 [ 20.545498] kasan_check_range+0x100/0x1a8 [ 20.545628] __kasan_check_write+0x20/0x30 [ 20.545726] kasan_atomics_helper+0x15b4/0x4858 [ 20.545847] kasan_atomics+0x198/0x2e0 [ 20.546129] kunit_try_run_case+0x170/0x3f0 [ 20.546283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.546387] kthread+0x328/0x630 [ 20.546471] ret_from_fork+0x10/0x20 [ 20.546585] [ 20.546609] Allocated by task 267: [ 20.546676] kasan_save_stack+0x3c/0x68 [ 20.546776] kasan_save_track+0x20/0x40 [ 20.546859] kasan_save_alloc_info+0x40/0x58 [ 20.546936] __kasan_kmalloc+0xd4/0xd8 [ 20.547029] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.547071] kasan_atomics+0xb8/0x2e0 [ 20.547123] kunit_try_run_case+0x170/0x3f0 [ 20.547452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.547569] kthread+0x328/0x630 [ 20.547689] ret_from_fork+0x10/0x20 [ 20.547775] [ 20.547843] The buggy address belongs to the object at fff00000c6e72400 [ 20.547843] which belongs to the cache kmalloc-64 of size 64 [ 20.548046] The buggy address is located 0 bytes to the right of [ 20.548046] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.548112] [ 20.548134] The buggy address belongs to the physical page: [ 20.548167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.548395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.548529] page_type: f5(slab) [ 20.548600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.548876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.548964] page dumped because: kasan: bad access detected [ 20.549038] [ 20.549112] Memory state around the buggy address: [ 20.549189] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.549261] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.549306] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.549373] ^ [ 20.549410] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.549452] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.549764] ================================================================== [ 20.550646] ================================================================== [ 20.550696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.550764] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.550817] [ 20.550891] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.550991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.551045] Hardware name: linux,dummy-virt (DT) [ 20.551079] Call trace: [ 20.551120] show_stack+0x20/0x38 (C) [ 20.551346] dump_stack_lvl+0x8c/0xd0 [ 20.551502] print_report+0x118/0x608 [ 20.551577] kasan_report+0xdc/0x128 [ 20.551680] __asan_report_load8_noabort+0x20/0x30 [ 20.551734] kasan_atomics_helper+0x3db0/0x4858 [ 20.551812] kasan_atomics+0x198/0x2e0 [ 20.551865] kunit_try_run_case+0x170/0x3f0 [ 20.551931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.551995] kthread+0x328/0x630 [ 20.552060] ret_from_fork+0x10/0x20 [ 20.552111] [ 20.552131] Allocated by task 267: [ 20.552162] kasan_save_stack+0x3c/0x68 [ 20.552351] kasan_save_track+0x20/0x40 [ 20.552497] kasan_save_alloc_info+0x40/0x58 [ 20.552572] __kasan_kmalloc+0xd4/0xd8 [ 20.552697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.552783] kasan_atomics+0xb8/0x2e0 [ 20.553070] kunit_try_run_case+0x170/0x3f0 [ 20.553162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.553248] kthread+0x328/0x630 [ 20.553369] ret_from_fork+0x10/0x20 [ 20.553455] [ 20.553523] The buggy address belongs to the object at fff00000c6e72400 [ 20.553523] which belongs to the cache kmalloc-64 of size 64 [ 20.553670] The buggy address is located 0 bytes to the right of [ 20.553670] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.553760] [ 20.553883] The buggy address belongs to the physical page: [ 20.553942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.553998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.554170] page_type: f5(slab) [ 20.554211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.554264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.554422] page dumped because: kasan: bad access detected [ 20.554494] [ 20.554527] Memory state around the buggy address: [ 20.554561] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.554608] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.554793] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.555120] ^ [ 20.555429] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.555549] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.555703] ================================================================== [ 20.577443] ================================================================== [ 20.577517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.577569] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.577731] [ 20.577790] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.577877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.577907] Hardware name: linux,dummy-virt (DT) [ 20.577953] Call trace: [ 20.577979] show_stack+0x20/0x38 (C) [ 20.578046] dump_stack_lvl+0x8c/0xd0 [ 20.578310] print_report+0x118/0x608 [ 20.578383] kasan_report+0xdc/0x128 [ 20.578448] kasan_check_range+0x100/0x1a8 [ 20.578504] __kasan_check_write+0x20/0x30 [ 20.578553] kasan_atomics_helper+0x175c/0x4858 [ 20.578602] kasan_atomics+0x198/0x2e0 [ 20.578655] kunit_try_run_case+0x170/0x3f0 [ 20.578723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.578808] kthread+0x328/0x630 [ 20.578862] ret_from_fork+0x10/0x20 [ 20.578912] [ 20.578932] Allocated by task 267: [ 20.578962] kasan_save_stack+0x3c/0x68 [ 20.579003] kasan_save_track+0x20/0x40 [ 20.579042] kasan_save_alloc_info+0x40/0x58 [ 20.579174] __kasan_kmalloc+0xd4/0xd8 [ 20.579223] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.579289] kasan_atomics+0xb8/0x2e0 [ 20.579374] kunit_try_run_case+0x170/0x3f0 [ 20.579422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.579475] kthread+0x328/0x630 [ 20.579644] ret_from_fork+0x10/0x20 [ 20.579686] [ 20.579805] The buggy address belongs to the object at fff00000c6e72400 [ 20.579805] which belongs to the cache kmalloc-64 of size 64 [ 20.579880] The buggy address is located 0 bytes to the right of [ 20.579880] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.579965] [ 20.579995] The buggy address belongs to the physical page: [ 20.580031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.580106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.580155] page_type: f5(slab) [ 20.580233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.580326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.580401] page dumped because: kasan: bad access detected [ 20.580436] [ 20.580458] Memory state around the buggy address: [ 20.580491] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.580537] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.580597] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.580637] ^ [ 20.580672] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.580923] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.581113] ================================================================== [ 20.451898] ================================================================== [ 20.451968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.452030] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.452083] [ 20.452300] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.452412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.452515] Hardware name: linux,dummy-virt (DT) [ 20.452589] Call trace: [ 20.452622] show_stack+0x20/0x38 (C) [ 20.452845] dump_stack_lvl+0x8c/0xd0 [ 20.452940] print_report+0x118/0x608 [ 20.453028] kasan_report+0xdc/0x128 [ 20.453124] kasan_check_range+0x100/0x1a8 [ 20.453222] __kasan_check_write+0x20/0x30 [ 20.453319] kasan_atomics_helper+0xe44/0x4858 [ 20.453417] kasan_atomics+0x198/0x2e0 [ 20.453462] kunit_try_run_case+0x170/0x3f0 [ 20.453541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.453597] kthread+0x328/0x630 [ 20.453643] ret_from_fork+0x10/0x20 [ 20.453692] [ 20.453713] Allocated by task 267: [ 20.453876] kasan_save_stack+0x3c/0x68 [ 20.453963] kasan_save_track+0x20/0x40 [ 20.454024] kasan_save_alloc_info+0x40/0x58 [ 20.454089] __kasan_kmalloc+0xd4/0xd8 [ 20.454317] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.454414] kasan_atomics+0xb8/0x2e0 [ 20.454538] kunit_try_run_case+0x170/0x3f0 [ 20.454603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.454710] kthread+0x328/0x630 [ 20.454788] ret_from_fork+0x10/0x20 [ 20.454890] [ 20.454939] The buggy address belongs to the object at fff00000c6e72400 [ 20.454939] which belongs to the cache kmalloc-64 of size 64 [ 20.455011] The buggy address is located 0 bytes to the right of [ 20.455011] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.455076] [ 20.455099] The buggy address belongs to the physical page: [ 20.455133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.455194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.455254] page_type: f5(slab) [ 20.455294] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.455365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.455407] page dumped because: kasan: bad access detected [ 20.455442] [ 20.455472] Memory state around the buggy address: [ 20.455507] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.455553] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.455598] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.455653] ^ [ 20.455696] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.455749] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.455791] ================================================================== [ 20.561326] ================================================================== [ 20.561746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.561962] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.562043] [ 20.562077] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.562173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.562218] Hardware name: linux,dummy-virt (DT) [ 20.562251] Call trace: [ 20.562277] show_stack+0x20/0x38 (C) [ 20.562328] dump_stack_lvl+0x8c/0xd0 [ 20.562516] print_report+0x118/0x608 [ 20.562585] kasan_report+0xdc/0x128 [ 20.562652] __asan_report_load8_noabort+0x20/0x30 [ 20.562706] kasan_atomics_helper+0x3df4/0x4858 [ 20.562764] kasan_atomics+0x198/0x2e0 [ 20.562821] kunit_try_run_case+0x170/0x3f0 [ 20.562879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.562964] kthread+0x328/0x630 [ 20.563031] ret_from_fork+0x10/0x20 [ 20.563098] [ 20.563122] Allocated by task 267: [ 20.563165] kasan_save_stack+0x3c/0x68 [ 20.563224] kasan_save_track+0x20/0x40 [ 20.563281] kasan_save_alloc_info+0x40/0x58 [ 20.563375] __kasan_kmalloc+0xd4/0xd8 [ 20.563431] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.563475] kasan_atomics+0xb8/0x2e0 [ 20.563511] kunit_try_run_case+0x170/0x3f0 [ 20.563667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.563816] kthread+0x328/0x630 [ 20.563871] ret_from_fork+0x10/0x20 [ 20.563936] [ 20.563958] The buggy address belongs to the object at fff00000c6e72400 [ 20.563958] which belongs to the cache kmalloc-64 of size 64 [ 20.564034] The buggy address is located 0 bytes to the right of [ 20.564034] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.564103] [ 20.564142] The buggy address belongs to the physical page: [ 20.564187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.564494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.564597] page_type: f5(slab) [ 20.564698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.564774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.564924] page dumped because: kasan: bad access detected [ 20.564992] [ 20.565049] Memory state around the buggy address: [ 20.565136] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.565206] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.565253] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.565457] ^ [ 20.565498] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.565544] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.565584] ================================================================== [ 20.429090] ================================================================== [ 20.429166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.429235] Read of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.429287] [ 20.429353] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.429591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.429649] Hardware name: linux,dummy-virt (DT) [ 20.429683] Call trace: [ 20.429723] show_stack+0x20/0x38 (C) [ 20.429777] dump_stack_lvl+0x8c/0xd0 [ 20.429844] print_report+0x118/0x608 [ 20.429947] kasan_report+0xdc/0x128 [ 20.430013] __asan_report_load4_noabort+0x20/0x30 [ 20.430065] kasan_atomics_helper+0x3dd8/0x4858 [ 20.430129] kasan_atomics+0x198/0x2e0 [ 20.430174] kunit_try_run_case+0x170/0x3f0 [ 20.430242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.430312] kthread+0x328/0x630 [ 20.430398] ret_from_fork+0x10/0x20 [ 20.430449] [ 20.430469] Allocated by task 267: [ 20.430498] kasan_save_stack+0x3c/0x68 [ 20.430540] kasan_save_track+0x20/0x40 [ 20.430612] kasan_save_alloc_info+0x40/0x58 [ 20.430652] __kasan_kmalloc+0xd4/0xd8 [ 20.430775] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.430844] kasan_atomics+0xb8/0x2e0 [ 20.430893] kunit_try_run_case+0x170/0x3f0 [ 20.430937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.431004] kthread+0x328/0x630 [ 20.431059] ret_from_fork+0x10/0x20 [ 20.431187] [ 20.431283] The buggy address belongs to the object at fff00000c6e72400 [ 20.431283] which belongs to the cache kmalloc-64 of size 64 [ 20.431389] The buggy address is located 0 bytes to the right of [ 20.431389] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.431474] [ 20.431547] The buggy address belongs to the physical page: [ 20.431582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.431656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.431728] page_type: f5(slab) [ 20.431776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.431829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.431872] page dumped because: kasan: bad access detected [ 20.431905] [ 20.431926] Memory state around the buggy address: [ 20.431959] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.432115] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.432229] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.432307] ^ [ 20.432435] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.432520] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.432616] ================================================================== [ 20.491965] ================================================================== [ 20.492018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.492385] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.492480] [ 20.492531] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.492645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.492726] Hardware name: linux,dummy-virt (DT) [ 20.492902] Call trace: [ 20.493066] show_stack+0x20/0x38 (C) [ 20.493173] dump_stack_lvl+0x8c/0xd0 [ 20.493258] print_report+0x118/0x608 [ 20.493397] kasan_report+0xdc/0x128 [ 20.493494] kasan_check_range+0x100/0x1a8 [ 20.493613] __kasan_check_write+0x20/0x30 [ 20.493665] kasan_atomics_helper+0x1128/0x4858 [ 20.493729] kasan_atomics+0x198/0x2e0 [ 20.493777] kunit_try_run_case+0x170/0x3f0 [ 20.494100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.494228] kthread+0x328/0x630 [ 20.494354] ret_from_fork+0x10/0x20 [ 20.494616] [ 20.494681] Allocated by task 267: [ 20.494723] kasan_save_stack+0x3c/0x68 [ 20.494830] kasan_save_track+0x20/0x40 [ 20.494920] kasan_save_alloc_info+0x40/0x58 [ 20.495031] __kasan_kmalloc+0xd4/0xd8 [ 20.495110] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.495220] kasan_atomics+0xb8/0x2e0 [ 20.495315] kunit_try_run_case+0x170/0x3f0 [ 20.495419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.495468] kthread+0x328/0x630 [ 20.495505] ret_from_fork+0x10/0x20 [ 20.495587] [ 20.495777] The buggy address belongs to the object at fff00000c6e72400 [ 20.495777] which belongs to the cache kmalloc-64 of size 64 [ 20.495952] The buggy address is located 0 bytes to the right of [ 20.495952] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.496237] [ 20.496312] The buggy address belongs to the physical page: [ 20.496385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.496577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.496633] page_type: f5(slab) [ 20.496674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.496875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.496971] page dumped because: kasan: bad access detected [ 20.497078] [ 20.497136] Memory state around the buggy address: [ 20.497202] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.497488] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.497559] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.497636] ^ [ 20.497722] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.497812] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.497926] ================================================================== [ 20.477737] ================================================================== [ 20.477793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.477843] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.477992] [ 20.478080] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.478189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.478243] Hardware name: linux,dummy-virt (DT) [ 20.478436] Call trace: [ 20.478472] show_stack+0x20/0x38 (C) [ 20.478525] dump_stack_lvl+0x8c/0xd0 [ 20.478637] print_report+0x118/0x608 [ 20.478702] kasan_report+0xdc/0x128 [ 20.478808] kasan_check_range+0x100/0x1a8 [ 20.478865] __kasan_check_write+0x20/0x30 [ 20.478931] kasan_atomics_helper+0xff0/0x4858 [ 20.479000] kasan_atomics+0x198/0x2e0 [ 20.479066] kunit_try_run_case+0x170/0x3f0 [ 20.479121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.479178] kthread+0x328/0x630 [ 20.479243] ret_from_fork+0x10/0x20 [ 20.479293] [ 20.479313] Allocated by task 267: [ 20.479356] kasan_save_stack+0x3c/0x68 [ 20.479471] kasan_save_track+0x20/0x40 [ 20.479628] kasan_save_alloc_info+0x40/0x58 [ 20.479686] __kasan_kmalloc+0xd4/0xd8 [ 20.479734] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.479791] kasan_atomics+0xb8/0x2e0 [ 20.479852] kunit_try_run_case+0x170/0x3f0 [ 20.480051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.480154] kthread+0x328/0x630 [ 20.480218] ret_from_fork+0x10/0x20 [ 20.480297] [ 20.480379] The buggy address belongs to the object at fff00000c6e72400 [ 20.480379] which belongs to the cache kmalloc-64 of size 64 [ 20.480478] The buggy address is located 0 bytes to the right of [ 20.480478] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.480603] [ 20.480668] The buggy address belongs to the physical page: [ 20.480725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.480807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.480910] page_type: f5(slab) [ 20.480969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.481024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.481249] page dumped because: kasan: bad access detected [ 20.481288] [ 20.481309] Memory state around the buggy address: [ 20.481844] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.481939] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.482035] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.482112] ^ [ 20.482160] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.482213] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.482262] ================================================================== [ 20.524177] ================================================================== [ 20.524237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.524287] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.524509] [ 20.524545] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.524630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.524691] Hardware name: linux,dummy-virt (DT) [ 20.524770] Call trace: [ 20.524805] show_stack+0x20/0x38 (C) [ 20.525028] dump_stack_lvl+0x8c/0xd0 [ 20.525143] print_report+0x118/0x608 [ 20.525221] kasan_report+0xdc/0x128 [ 20.525288] __asan_report_load8_noabort+0x20/0x30 [ 20.525352] kasan_atomics_helper+0x3f04/0x4858 [ 20.525402] kasan_atomics+0x198/0x2e0 [ 20.525447] kunit_try_run_case+0x170/0x3f0 [ 20.525602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.525659] kthread+0x328/0x630 [ 20.525705] ret_from_fork+0x10/0x20 [ 20.525755] [ 20.525775] Allocated by task 267: [ 20.525931] kasan_save_stack+0x3c/0x68 [ 20.526027] kasan_save_track+0x20/0x40 [ 20.526115] kasan_save_alloc_info+0x40/0x58 [ 20.526165] __kasan_kmalloc+0xd4/0xd8 [ 20.526224] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.526292] kasan_atomics+0xb8/0x2e0 [ 20.526555] kunit_try_run_case+0x170/0x3f0 [ 20.526682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.526778] kthread+0x328/0x630 [ 20.526866] ret_from_fork+0x10/0x20 [ 20.526943] [ 20.526992] The buggy address belongs to the object at fff00000c6e72400 [ 20.526992] which belongs to the cache kmalloc-64 of size 64 [ 20.527097] The buggy address is located 0 bytes to the right of [ 20.527097] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.527190] [ 20.527211] The buggy address belongs to the physical page: [ 20.527244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.527301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.527377] page_type: f5(slab) [ 20.527418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.527471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.527531] page dumped because: kasan: bad access detected [ 20.527575] [ 20.527598] Memory state around the buggy address: [ 20.527632] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.527678] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.527731] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.527772] ^ [ 20.527808] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.527851] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.527901] ================================================================== [ 20.503806] ================================================================== [ 20.503857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.503905] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.503967] [ 20.503999] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.504082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.504119] Hardware name: linux,dummy-virt (DT) [ 20.504151] Call trace: [ 20.504176] show_stack+0x20/0x38 (C) [ 20.504224] dump_stack_lvl+0x8c/0xd0 [ 20.504274] print_report+0x118/0x608 [ 20.504319] kasan_report+0xdc/0x128 [ 20.504378] kasan_check_range+0x100/0x1a8 [ 20.504427] __kasan_check_write+0x20/0x30 [ 20.504474] kasan_atomics_helper+0x11f8/0x4858 [ 20.505107] kasan_atomics+0x198/0x2e0 [ 20.505195] kunit_try_run_case+0x170/0x3f0 [ 20.505278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.505394] kthread+0x328/0x630 [ 20.505452] ret_from_fork+0x10/0x20 [ 20.505555] [ 20.505605] Allocated by task 267: [ 20.505635] kasan_save_stack+0x3c/0x68 [ 20.505701] kasan_save_track+0x20/0x40 [ 20.505788] kasan_save_alloc_info+0x40/0x58 [ 20.505913] __kasan_kmalloc+0xd4/0xd8 [ 20.505956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.505998] kasan_atomics+0xb8/0x2e0 [ 20.506037] kunit_try_run_case+0x170/0x3f0 [ 20.506077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.506250] kthread+0x328/0x630 [ 20.506386] ret_from_fork+0x10/0x20 [ 20.506473] [ 20.506574] The buggy address belongs to the object at fff00000c6e72400 [ 20.506574] which belongs to the cache kmalloc-64 of size 64 [ 20.506686] The buggy address is located 0 bytes to the right of [ 20.506686] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.506791] [ 20.506847] The buggy address belongs to the physical page: [ 20.506943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.507229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.507352] page_type: f5(slab) [ 20.507477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.507529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.507728] page dumped because: kasan: bad access detected [ 20.507878] [ 20.507928] Memory state around the buggy address: [ 20.507984] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.508106] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.508219] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.508420] ^ [ 20.508556] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.508609] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.508649] ================================================================== [ 20.595012] ================================================================== [ 20.595083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.595136] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.595188] [ 20.595240] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.595345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.595384] Hardware name: linux,dummy-virt (DT) [ 20.595418] Call trace: [ 20.595468] show_stack+0x20/0x38 (C) [ 20.595649] dump_stack_lvl+0x8c/0xd0 [ 20.595769] print_report+0x118/0x608 [ 20.595846] kasan_report+0xdc/0x128 [ 20.595911] kasan_check_range+0x100/0x1a8 [ 20.595988] __kasan_check_write+0x20/0x30 [ 20.596054] kasan_atomics_helper+0x17ec/0x4858 [ 20.596128] kasan_atomics+0x198/0x2e0 [ 20.596195] kunit_try_run_case+0x170/0x3f0 [ 20.596273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.596413] kthread+0x328/0x630 [ 20.596524] ret_from_fork+0x10/0x20 [ 20.596901] [ 20.596937] Allocated by task 267: [ 20.597053] kasan_save_stack+0x3c/0x68 [ 20.597119] kasan_save_track+0x20/0x40 [ 20.597222] kasan_save_alloc_info+0x40/0x58 [ 20.597311] __kasan_kmalloc+0xd4/0xd8 [ 20.597383] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.597425] kasan_atomics+0xb8/0x2e0 [ 20.597462] kunit_try_run_case+0x170/0x3f0 [ 20.597504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.597575] kthread+0x328/0x630 [ 20.597613] ret_from_fork+0x10/0x20 [ 20.597651] [ 20.597674] The buggy address belongs to the object at fff00000c6e72400 [ 20.597674] which belongs to the cache kmalloc-64 of size 64 [ 20.597732] The buggy address is located 0 bytes to the right of [ 20.597732] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.597797] [ 20.597819] The buggy address belongs to the physical page: [ 20.597854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.597907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.597957] page_type: f5(slab) [ 20.597995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.598124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.598205] page dumped because: kasan: bad access detected [ 20.598269] [ 20.598291] Memory state around the buggy address: [ 20.598355] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.598418] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.598534] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.598621] ^ [ 20.599005] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.599091] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.599219] ================================================================== [ 20.514072] ================================================================== [ 20.514307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.514383] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.514434] [ 20.514553] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.514654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.514708] Hardware name: linux,dummy-virt (DT) [ 20.514756] Call trace: [ 20.514809] show_stack+0x20/0x38 (C) [ 20.514881] dump_stack_lvl+0x8c/0xd0 [ 20.514933] print_report+0x118/0x608 [ 20.515005] kasan_report+0xdc/0x128 [ 20.515143] kasan_check_range+0x100/0x1a8 [ 20.515282] __kasan_check_write+0x20/0x30 [ 20.515351] kasan_atomics_helper+0x12d8/0x4858 [ 20.515427] kasan_atomics+0x198/0x2e0 [ 20.515486] kunit_try_run_case+0x170/0x3f0 [ 20.515563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.515643] kthread+0x328/0x630 [ 20.515743] ret_from_fork+0x10/0x20 [ 20.515809] [ 20.515848] Allocated by task 267: [ 20.515886] kasan_save_stack+0x3c/0x68 [ 20.515927] kasan_save_track+0x20/0x40 [ 20.515966] kasan_save_alloc_info+0x40/0x58 [ 20.516006] __kasan_kmalloc+0xd4/0xd8 [ 20.516044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.516247] kasan_atomics+0xb8/0x2e0 [ 20.516393] kunit_try_run_case+0x170/0x3f0 [ 20.516464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.516514] kthread+0x328/0x630 [ 20.516599] ret_from_fork+0x10/0x20 [ 20.516675] [ 20.516917] The buggy address belongs to the object at fff00000c6e72400 [ 20.516917] which belongs to the cache kmalloc-64 of size 64 [ 20.517029] The buggy address is located 0 bytes to the right of [ 20.517029] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.517135] [ 20.517166] The buggy address belongs to the physical page: [ 20.517209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.517278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.517354] page_type: f5(slab) [ 20.517395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.517614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.517659] page dumped because: kasan: bad access detected [ 20.517695] [ 20.517717] Memory state around the buggy address: [ 20.517751] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.517796] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.517841] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.517881] ^ [ 20.517917] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.518224] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.518299] ================================================================== [ 20.541972] ================================================================== [ 20.542021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.542071] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.542123] [ 20.542152] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.542236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.542263] Hardware name: linux,dummy-virt (DT) [ 20.542296] Call trace: [ 20.542319] show_stack+0x20/0x38 (C) [ 20.542429] dump_stack_lvl+0x8c/0xd0 [ 20.542505] print_report+0x118/0x608 [ 20.542582] kasan_report+0xdc/0x128 [ 20.542634] kasan_check_range+0x100/0x1a8 [ 20.542685] __kasan_check_write+0x20/0x30 [ 20.542734] kasan_atomics_helper+0x154c/0x4858 [ 20.542782] kasan_atomics+0x198/0x2e0 [ 20.542828] kunit_try_run_case+0x170/0x3f0 [ 20.542884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.542947] kthread+0x328/0x630 [ 20.542995] ret_from_fork+0x10/0x20 [ 20.543042] [ 20.543072] Allocated by task 267: [ 20.543101] kasan_save_stack+0x3c/0x68 [ 20.543143] kasan_save_track+0x20/0x40 [ 20.543181] kasan_save_alloc_info+0x40/0x58 [ 20.543222] __kasan_kmalloc+0xd4/0xd8 [ 20.543260] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.543307] kasan_atomics+0xb8/0x2e0 [ 20.543363] kunit_try_run_case+0x170/0x3f0 [ 20.543408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.543454] kthread+0x328/0x630 [ 20.543491] ret_from_fork+0x10/0x20 [ 20.543539] [ 20.543569] The buggy address belongs to the object at fff00000c6e72400 [ 20.543569] which belongs to the cache kmalloc-64 of size 64 [ 20.543630] The buggy address is located 0 bytes to the right of [ 20.543630] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.543701] [ 20.543723] The buggy address belongs to the physical page: [ 20.543756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.543809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.543864] page_type: f5(slab) [ 20.543902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.543955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.543998] page dumped because: kasan: bad access detected [ 20.544031] [ 20.544052] Memory state around the buggy address: [ 20.544087] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.544133] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.544178] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.544219] ^ [ 20.544254] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.544297] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.544347] ================================================================== [ 20.498466] ================================================================== [ 20.498518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.498885] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.498951] [ 20.499202] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.499315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.499374] Hardware name: linux,dummy-virt (DT) [ 20.499408] Call trace: [ 20.499456] show_stack+0x20/0x38 (C) [ 20.499684] dump_stack_lvl+0x8c/0xd0 [ 20.499769] print_report+0x118/0x608 [ 20.499846] kasan_report+0xdc/0x128 [ 20.499901] kasan_check_range+0x100/0x1a8 [ 20.499956] __kasan_check_write+0x20/0x30 [ 20.500007] kasan_atomics_helper+0x1190/0x4858 [ 20.500054] kasan_atomics+0x198/0x2e0 [ 20.500272] kunit_try_run_case+0x170/0x3f0 [ 20.500389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.500510] kthread+0x328/0x630 [ 20.500625] ret_from_fork+0x10/0x20 [ 20.500880] [ 20.500942] Allocated by task 267: [ 20.501002] kasan_save_stack+0x3c/0x68 [ 20.501123] kasan_save_track+0x20/0x40 [ 20.501224] kasan_save_alloc_info+0x40/0x58 [ 20.501365] __kasan_kmalloc+0xd4/0xd8 [ 20.501434] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.501517] kasan_atomics+0xb8/0x2e0 [ 20.501627] kunit_try_run_case+0x170/0x3f0 [ 20.501685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.501737] kthread+0x328/0x630 [ 20.501802] ret_from_fork+0x10/0x20 [ 20.501840] [ 20.501862] The buggy address belongs to the object at fff00000c6e72400 [ 20.501862] which belongs to the cache kmalloc-64 of size 64 [ 20.502169] The buggy address is located 0 bytes to the right of [ 20.502169] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.502273] [ 20.502342] The buggy address belongs to the physical page: [ 20.502414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.502698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.502795] page_type: f5(slab) [ 20.502918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.503021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.503135] page dumped because: kasan: bad access detected [ 20.503171] [ 20.503193] Memory state around the buggy address: [ 20.503227] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.503284] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.503330] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.503381] ^ [ 20.503418] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.503463] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.503514] ================================================================== [ 20.473249] ================================================================== [ 20.473300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.473366] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.473418] [ 20.473494] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.473597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.473628] Hardware name: linux,dummy-virt (DT) [ 20.473942] Call trace: [ 20.473984] show_stack+0x20/0x38 (C) [ 20.474055] dump_stack_lvl+0x8c/0xd0 [ 20.474106] print_report+0x118/0x608 [ 20.474152] kasan_report+0xdc/0x128 [ 20.474223] kasan_check_range+0x100/0x1a8 [ 20.474274] __kasan_check_write+0x20/0x30 [ 20.474351] kasan_atomics_helper+0xf88/0x4858 [ 20.474419] kasan_atomics+0x198/0x2e0 [ 20.474493] kunit_try_run_case+0x170/0x3f0 [ 20.474572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.474647] kthread+0x328/0x630 [ 20.474703] ret_from_fork+0x10/0x20 [ 20.474774] [ 20.474795] Allocated by task 267: [ 20.474827] kasan_save_stack+0x3c/0x68 [ 20.474874] kasan_save_track+0x20/0x40 [ 20.474913] kasan_save_alloc_info+0x40/0x58 [ 20.475055] __kasan_kmalloc+0xd4/0xd8 [ 20.475098] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.475142] kasan_atomics+0xb8/0x2e0 [ 20.475180] kunit_try_run_case+0x170/0x3f0 [ 20.475222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.475380] kthread+0x328/0x630 [ 20.475564] ret_from_fork+0x10/0x20 [ 20.475616] [ 20.475638] The buggy address belongs to the object at fff00000c6e72400 [ 20.475638] which belongs to the cache kmalloc-64 of size 64 [ 20.475699] The buggy address is located 0 bytes to the right of [ 20.475699] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.475764] [ 20.475798] The buggy address belongs to the physical page: [ 20.475831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.475886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.475938] page_type: f5(slab) [ 20.475977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.476030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.476074] page dumped because: kasan: bad access detected [ 20.476108] [ 20.476128] Memory state around the buggy address: [ 20.476163] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.476207] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.476252] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.476293] ^ [ 20.476698] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.476910] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.477018] ================================================================== [ 20.433151] ================================================================== [ 20.433200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.433369] Write of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.433426] [ 20.433547] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.433676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.433723] Hardware name: linux,dummy-virt (DT) [ 20.433758] Call trace: [ 20.433809] show_stack+0x20/0x38 (C) [ 20.433860] dump_stack_lvl+0x8c/0xd0 [ 20.434036] print_report+0x118/0x608 [ 20.434114] kasan_report+0xdc/0x128 [ 20.434190] kasan_check_range+0x100/0x1a8 [ 20.434280] __kasan_check_write+0x20/0x30 [ 20.434353] kasan_atomics_helper+0xd3c/0x4858 [ 20.434421] kasan_atomics+0x198/0x2e0 [ 20.434485] kunit_try_run_case+0x170/0x3f0 [ 20.434536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.434592] kthread+0x328/0x630 [ 20.434638] ret_from_fork+0x10/0x20 [ 20.434686] [ 20.434706] Allocated by task 267: [ 20.434737] kasan_save_stack+0x3c/0x68 [ 20.434778] kasan_save_track+0x20/0x40 [ 20.434914] kasan_save_alloc_info+0x40/0x58 [ 20.434960] __kasan_kmalloc+0xd4/0xd8 [ 20.435116] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.435170] kasan_atomics+0xb8/0x2e0 [ 20.435237] kunit_try_run_case+0x170/0x3f0 [ 20.435403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.435525] kthread+0x328/0x630 [ 20.435571] ret_from_fork+0x10/0x20 [ 20.435649] [ 20.435710] The buggy address belongs to the object at fff00000c6e72400 [ 20.435710] which belongs to the cache kmalloc-64 of size 64 [ 20.435771] The buggy address is located 0 bytes to the right of [ 20.435771] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.435835] [ 20.435858] The buggy address belongs to the physical page: [ 20.435939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.436013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.436065] page_type: f5(slab) [ 20.436121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.436191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.436240] page dumped because: kasan: bad access detected [ 20.436319] [ 20.436707] Memory state around the buggy address: [ 20.436774] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.436819] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.436930] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.437005] ^ [ 20.437043] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.437227] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.437274] ================================================================== [ 20.482744] ================================================================== [ 20.482797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.482854] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.482905] [ 20.482936] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.483027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.483055] Hardware name: linux,dummy-virt (DT) [ 20.483088] Call trace: [ 20.483111] show_stack+0x20/0x38 (C) [ 20.483161] dump_stack_lvl+0x8c/0xd0 [ 20.483209] print_report+0x118/0x608 [ 20.483256] kasan_report+0xdc/0x128 [ 20.483302] kasan_check_range+0x100/0x1a8 [ 20.483364] __kasan_check_write+0x20/0x30 [ 20.483422] kasan_atomics_helper+0x1058/0x4858 [ 20.483470] kasan_atomics+0x198/0x2e0 [ 20.483516] kunit_try_run_case+0x170/0x3f0 [ 20.483567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.483632] kthread+0x328/0x630 [ 20.483680] ret_from_fork+0x10/0x20 [ 20.483738] [ 20.483759] Allocated by task 267: [ 20.483788] kasan_save_stack+0x3c/0x68 [ 20.483829] kasan_save_track+0x20/0x40 [ 20.483867] kasan_save_alloc_info+0x40/0x58 [ 20.483908] __kasan_kmalloc+0xd4/0xd8 [ 20.483945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.483995] kasan_atomics+0xb8/0x2e0 [ 20.484032] kunit_try_run_case+0x170/0x3f0 [ 20.484075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.484128] kthread+0x328/0x630 [ 20.484166] ret_from_fork+0x10/0x20 [ 20.484803] [ 20.484875] The buggy address belongs to the object at fff00000c6e72400 [ 20.484875] which belongs to the cache kmalloc-64 of size 64 [ 20.485023] The buggy address is located 0 bytes to the right of [ 20.485023] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.485224] [ 20.485363] The buggy address belongs to the physical page: [ 20.485443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.485518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.485606] page_type: f5(slab) [ 20.485691] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.485755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.485817] page dumped because: kasan: bad access detected [ 20.485851] [ 20.485872] Memory state around the buggy address: [ 20.486017] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.486137] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.486216] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.486326] ^ [ 20.486460] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.486547] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.486605] ================================================================== [ 20.582072] ================================================================== [ 20.582120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.582257] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.582420] [ 20.582476] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.582562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.582608] Hardware name: linux,dummy-virt (DT) [ 20.582658] Call trace: [ 20.582769] show_stack+0x20/0x38 (C) [ 20.582938] dump_stack_lvl+0x8c/0xd0 [ 20.583001] print_report+0x118/0x608 [ 20.584712] kasan_report+0xdc/0x128 [ 20.584799] __asan_report_load8_noabort+0x20/0x30 [ 20.584854] kasan_atomics_helper+0x3e20/0x4858 [ 20.585372] kasan_atomics+0x198/0x2e0 [ 20.585430] kunit_try_run_case+0x170/0x3f0 [ 20.586167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.587159] kthread+0x328/0x630 [ 20.587231] ret_from_fork+0x10/0x20 [ 20.587283] [ 20.587326] Allocated by task 267: [ 20.587802] kasan_save_stack+0x3c/0x68 [ 20.587858] kasan_save_track+0x20/0x40 [ 20.589074] kasan_save_alloc_info+0x40/0x58 [ 20.589189] __kasan_kmalloc+0xd4/0xd8 [ 20.589874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.589930] kasan_atomics+0xb8/0x2e0 [ 20.589967] kunit_try_run_case+0x170/0x3f0 [ 20.590008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.590057] kthread+0x328/0x630 [ 20.590096] ret_from_fork+0x10/0x20 [ 20.590133] [ 20.590157] The buggy address belongs to the object at fff00000c6e72400 [ 20.590157] which belongs to the cache kmalloc-64 of size 64 [ 20.590217] The buggy address is located 0 bytes to the right of [ 20.590217] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.591538] [ 20.591567] The buggy address belongs to the physical page: [ 20.591605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.593027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.593093] page_type: f5(slab) [ 20.593147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.593202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.593564] page dumped because: kasan: bad access detected [ 20.593681] [ 20.593759] Memory state around the buggy address: [ 20.593898] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.593993] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.594046] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.594099] ^ [ 20.594135] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.594188] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.594231] ================================================================== [ 20.509847] ================================================================== [ 20.509941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.509995] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.510047] [ 20.510122] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.510224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.510278] Hardware name: linux,dummy-virt (DT) [ 20.510326] Call trace: [ 20.510386] show_stack+0x20/0x38 (C) [ 20.510442] dump_stack_lvl+0x8c/0xd0 [ 20.510494] print_report+0x118/0x608 [ 20.510540] kasan_report+0xdc/0x128 [ 20.510716] kasan_check_range+0x100/0x1a8 [ 20.510771] __kasan_check_write+0x20/0x30 [ 20.510819] kasan_atomics_helper+0x126c/0x4858 [ 20.510982] kasan_atomics+0x198/0x2e0 [ 20.511047] kunit_try_run_case+0x170/0x3f0 [ 20.511120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.511200] kthread+0x328/0x630 [ 20.511444] ret_from_fork+0x10/0x20 [ 20.511511] [ 20.511563] Allocated by task 267: [ 20.511600] kasan_save_stack+0x3c/0x68 [ 20.511658] kasan_save_track+0x20/0x40 [ 20.511713] kasan_save_alloc_info+0x40/0x58 [ 20.511781] __kasan_kmalloc+0xd4/0xd8 [ 20.511847] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.511910] kasan_atomics+0xb8/0x2e0 [ 20.511962] kunit_try_run_case+0x170/0x3f0 [ 20.512009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.512074] kthread+0x328/0x630 [ 20.512136] ret_from_fork+0x10/0x20 [ 20.512175] [ 20.512198] The buggy address belongs to the object at fff00000c6e72400 [ 20.512198] which belongs to the cache kmalloc-64 of size 64 [ 20.512268] The buggy address is located 0 bytes to the right of [ 20.512268] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.512481] [ 20.512574] The buggy address belongs to the physical page: [ 20.512642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.512710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.512768] page_type: f5(slab) [ 20.512809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.512862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.512905] page dumped because: kasan: bad access detected [ 20.512939] [ 20.512982] Memory state around the buggy address: [ 20.513016] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.513062] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.513293] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.513349] ^ [ 20.513386] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.513429] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.513468] ================================================================== [ 20.446721] ================================================================== [ 20.446789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.446847] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.446898] [ 20.447089] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.447200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.447242] Hardware name: linux,dummy-virt (DT) [ 20.447281] Call trace: [ 20.447306] show_stack+0x20/0x38 (C) [ 20.447394] dump_stack_lvl+0x8c/0xd0 [ 20.447471] print_report+0x118/0x608 [ 20.447521] kasan_report+0xdc/0x128 [ 20.447586] __asan_report_load8_noabort+0x20/0x30 [ 20.447641] kasan_atomics_helper+0x3f58/0x4858 [ 20.447689] kasan_atomics+0x198/0x2e0 [ 20.447756] kunit_try_run_case+0x170/0x3f0 [ 20.447813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.447871] kthread+0x328/0x630 [ 20.447917] ret_from_fork+0x10/0x20 [ 20.448098] [ 20.448139] Allocated by task 267: [ 20.448187] kasan_save_stack+0x3c/0x68 [ 20.448329] kasan_save_track+0x20/0x40 [ 20.448409] kasan_save_alloc_info+0x40/0x58 [ 20.448452] __kasan_kmalloc+0xd4/0xd8 [ 20.448488] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.448661] kasan_atomics+0xb8/0x2e0 [ 20.448734] kunit_try_run_case+0x170/0x3f0 [ 20.448812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.448876] kthread+0x328/0x630 [ 20.448916] ret_from_fork+0x10/0x20 [ 20.448954] [ 20.448975] The buggy address belongs to the object at fff00000c6e72400 [ 20.448975] which belongs to the cache kmalloc-64 of size 64 [ 20.449035] The buggy address is located 0 bytes to the right of [ 20.449035] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.449101] [ 20.449145] The buggy address belongs to the physical page: [ 20.449193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.449249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.449620] page_type: f5(slab) [ 20.449669] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.449723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.449766] page dumped because: kasan: bad access detected [ 20.449800] [ 20.449820] Memory state around the buggy address: [ 20.449854] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.449900] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.450188] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.450273] ^ [ 20.450371] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.450451] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.450727] ================================================================== [ 20.437838] ================================================================== [ 20.437919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.438205] Read of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.438289] [ 20.438323] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.438456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.438505] Hardware name: linux,dummy-virt (DT) [ 20.438538] Call trace: [ 20.438562] show_stack+0x20/0x38 (C) [ 20.438629] dump_stack_lvl+0x8c/0xd0 [ 20.438680] print_report+0x118/0x608 [ 20.438748] kasan_report+0xdc/0x128 [ 20.438824] __asan_report_load4_noabort+0x20/0x30 [ 20.438893] kasan_atomics_helper+0x3e04/0x4858 [ 20.438960] kasan_atomics+0x198/0x2e0 [ 20.439007] kunit_try_run_case+0x170/0x3f0 [ 20.439058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.439112] kthread+0x328/0x630 [ 20.439162] ret_from_fork+0x10/0x20 [ 20.439383] [ 20.439444] Allocated by task 267: [ 20.439479] kasan_save_stack+0x3c/0x68 [ 20.439557] kasan_save_track+0x20/0x40 [ 20.439614] kasan_save_alloc_info+0x40/0x58 [ 20.439655] __kasan_kmalloc+0xd4/0xd8 [ 20.439692] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.439885] kasan_atomics+0xb8/0x2e0 [ 20.439994] kunit_try_run_case+0x170/0x3f0 [ 20.440060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.440125] kthread+0x328/0x630 [ 20.440183] ret_from_fork+0x10/0x20 [ 20.440259] [ 20.440379] The buggy address belongs to the object at fff00000c6e72400 [ 20.440379] which belongs to the cache kmalloc-64 of size 64 [ 20.440485] The buggy address is located 0 bytes to the right of [ 20.440485] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.440574] [ 20.440643] The buggy address belongs to the physical page: [ 20.440713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.440775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.440864] page_type: f5(slab) [ 20.440969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.441021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.441064] page dumped because: kasan: bad access detected [ 20.441105] [ 20.441125] Memory state around the buggy address: [ 20.441159] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.441206] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.441250] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.441291] ^ [ 20.441325] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.441380] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.441609] ================================================================== [ 20.556962] ================================================================== [ 20.557015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.557090] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.557227] [ 20.557383] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.557512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.557561] Hardware name: linux,dummy-virt (DT) [ 20.557609] Call trace: [ 20.557635] show_stack+0x20/0x38 (C) [ 20.557692] dump_stack_lvl+0x8c/0xd0 [ 20.557763] print_report+0x118/0x608 [ 20.557828] kasan_report+0xdc/0x128 [ 20.557894] kasan_check_range+0x100/0x1a8 [ 20.557954] __kasan_check_write+0x20/0x30 [ 20.558020] kasan_atomics_helper+0x1644/0x4858 [ 20.558095] kasan_atomics+0x198/0x2e0 [ 20.558142] kunit_try_run_case+0x170/0x3f0 [ 20.558195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.558252] kthread+0x328/0x630 [ 20.558300] ret_from_fork+0x10/0x20 [ 20.558362] [ 20.558383] Allocated by task 267: [ 20.558414] kasan_save_stack+0x3c/0x68 [ 20.558663] kasan_save_track+0x20/0x40 [ 20.558758] kasan_save_alloc_info+0x40/0x58 [ 20.558878] __kasan_kmalloc+0xd4/0xd8 [ 20.558954] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.559201] kasan_atomics+0xb8/0x2e0 [ 20.559267] kunit_try_run_case+0x170/0x3f0 [ 20.559357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.559409] kthread+0x328/0x630 [ 20.559447] ret_from_fork+0x10/0x20 [ 20.559503] [ 20.559573] The buggy address belongs to the object at fff00000c6e72400 [ 20.559573] which belongs to the cache kmalloc-64 of size 64 [ 20.559645] The buggy address is located 0 bytes to the right of [ 20.559645] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.559758] [ 20.559843] The buggy address belongs to the physical page: [ 20.559931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.559987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.560036] page_type: f5(slab) [ 20.560293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.560377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.560472] page dumped because: kasan: bad access detected [ 20.560541] [ 20.560620] Memory state around the buggy address: [ 20.560656] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.560702] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.560747] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.560797] ^ [ 20.560834] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.560888] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.560936] ================================================================== [ 20.528807] ================================================================== [ 20.528861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.528917] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.528969] [ 20.529019] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.529121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.529167] Hardware name: linux,dummy-virt (DT) [ 20.529205] Call trace: [ 20.529232] show_stack+0x20/0x38 (C) [ 20.529371] dump_stack_lvl+0x8c/0xd0 [ 20.529430] print_report+0x118/0x608 [ 20.529476] kasan_report+0xdc/0x128 [ 20.529655] kasan_check_range+0x100/0x1a8 [ 20.529752] __kasan_check_write+0x20/0x30 [ 20.529819] kasan_atomics_helper+0x1414/0x4858 [ 20.529875] kasan_atomics+0x198/0x2e0 [ 20.529939] kunit_try_run_case+0x170/0x3f0 [ 20.530007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.530064] kthread+0x328/0x630 [ 20.530110] ret_from_fork+0x10/0x20 [ 20.530160] [ 20.530180] Allocated by task 267: [ 20.530211] kasan_save_stack+0x3c/0x68 [ 20.530294] kasan_save_track+0x20/0x40 [ 20.530347] kasan_save_alloc_info+0x40/0x58 [ 20.530387] __kasan_kmalloc+0xd4/0xd8 [ 20.530427] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.530469] kasan_atomics+0xb8/0x2e0 [ 20.530601] kunit_try_run_case+0x170/0x3f0 [ 20.530657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.530706] kthread+0x328/0x630 [ 20.530743] ret_from_fork+0x10/0x20 [ 20.530799] [ 20.530823] The buggy address belongs to the object at fff00000c6e72400 [ 20.530823] which belongs to the cache kmalloc-64 of size 64 [ 20.530904] The buggy address is located 0 bytes to the right of [ 20.530904] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.530987] [ 20.531196] The buggy address belongs to the physical page: [ 20.531265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.531377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.531434] page_type: f5(slab) [ 20.531490] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.531585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.531630] page dumped because: kasan: bad access detected [ 20.531664] [ 20.531685] Memory state around the buggy address: [ 20.531719] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.531796] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.531840] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.531887] ^ [ 20.531931] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.531974] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.532013] ================================================================== [ 20.571463] ================================================================== [ 20.571675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.571741] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.571795] [ 20.572052] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.572159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.572222] Hardware name: linux,dummy-virt (DT) [ 20.572429] Call trace: [ 20.572508] show_stack+0x20/0x38 (C) [ 20.572603] dump_stack_lvl+0x8c/0xd0 [ 20.572694] print_report+0x118/0x608 [ 20.572780] kasan_report+0xdc/0x128 [ 20.572870] __asan_report_load8_noabort+0x20/0x30 [ 20.572970] kasan_atomics_helper+0x3e10/0x4858 [ 20.573058] kasan_atomics+0x198/0x2e0 [ 20.573165] kunit_try_run_case+0x170/0x3f0 [ 20.573218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.573275] kthread+0x328/0x630 [ 20.573322] ret_from_fork+0x10/0x20 [ 20.573384] [ 20.573713] Allocated by task 267: [ 20.573800] kasan_save_stack+0x3c/0x68 [ 20.573888] kasan_save_track+0x20/0x40 [ 20.573964] kasan_save_alloc_info+0x40/0x58 [ 20.574045] __kasan_kmalloc+0xd4/0xd8 [ 20.574287] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.574418] kasan_atomics+0xb8/0x2e0 [ 20.574486] kunit_try_run_case+0x170/0x3f0 [ 20.574563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.574642] kthread+0x328/0x630 [ 20.574728] ret_from_fork+0x10/0x20 [ 20.574818] [ 20.574871] The buggy address belongs to the object at fff00000c6e72400 [ 20.574871] which belongs to the cache kmalloc-64 of size 64 [ 20.574961] The buggy address is located 0 bytes to the right of [ 20.574961] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.575028] [ 20.575235] The buggy address belongs to the physical page: [ 20.575279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.575408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.575506] page_type: f5(slab) [ 20.575581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.575662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.575866] page dumped because: kasan: bad access detected [ 20.575965] [ 20.576047] Memory state around the buggy address: [ 20.576113] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.576160] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.576213] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.576481] ^ [ 20.576550] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.576615] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.576697] ================================================================== [ 20.519234] ================================================================== [ 20.519288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.519454] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.519549] [ 20.519595] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.519709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.519801] Hardware name: linux,dummy-virt (DT) [ 20.519833] Call trace: [ 20.519859] show_stack+0x20/0x38 (C) [ 20.519908] dump_stack_lvl+0x8c/0xd0 [ 20.519959] print_report+0x118/0x608 [ 20.520005] kasan_report+0xdc/0x128 [ 20.520285] kasan_check_range+0x100/0x1a8 [ 20.520443] __kasan_check_write+0x20/0x30 [ 20.520539] kasan_atomics_helper+0x1384/0x4858 [ 20.520784] kasan_atomics+0x198/0x2e0 [ 20.520851] kunit_try_run_case+0x170/0x3f0 [ 20.520924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.520980] kthread+0x328/0x630 [ 20.521028] ret_from_fork+0x10/0x20 [ 20.521078] [ 20.521099] Allocated by task 267: [ 20.521130] kasan_save_stack+0x3c/0x68 [ 20.521308] kasan_save_track+0x20/0x40 [ 20.521363] kasan_save_alloc_info+0x40/0x58 [ 20.521403] __kasan_kmalloc+0xd4/0xd8 [ 20.521568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.521675] kasan_atomics+0xb8/0x2e0 [ 20.521752] kunit_try_run_case+0x170/0x3f0 [ 20.521840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.521941] kthread+0x328/0x630 [ 20.521980] ret_from_fork+0x10/0x20 [ 20.522149] [ 20.522223] The buggy address belongs to the object at fff00000c6e72400 [ 20.522223] which belongs to the cache kmalloc-64 of size 64 [ 20.522319] The buggy address is located 0 bytes to the right of [ 20.522319] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.522424] [ 20.522492] The buggy address belongs to the physical page: [ 20.522556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.522640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.522761] page_type: f5(slab) [ 20.522842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.522897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.522941] page dumped because: kasan: bad access detected [ 20.522974] [ 20.522995] Memory state around the buggy address: [ 20.523253] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.523311] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.523388] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.523466] ^ [ 20.523616] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.523837] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.523919] ================================================================== [ 20.532306] ================================================================== [ 20.532377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.532482] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.532571] [ 20.532638] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.532869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.532963] Hardware name: linux,dummy-virt (DT) [ 20.533028] Call trace: [ 20.533083] show_stack+0x20/0x38 (C) [ 20.533165] dump_stack_lvl+0x8c/0xd0 [ 20.533250] print_report+0x118/0x608 [ 20.533364] kasan_report+0xdc/0x128 [ 20.533461] kasan_check_range+0x100/0x1a8 [ 20.533523] __kasan_check_write+0x20/0x30 [ 20.533573] kasan_atomics_helper+0x147c/0x4858 [ 20.533620] kasan_atomics+0x198/0x2e0 [ 20.533909] kunit_try_run_case+0x170/0x3f0 [ 20.534051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.534156] kthread+0x328/0x630 [ 20.534496] ret_from_fork+0x10/0x20 [ 20.534605] [ 20.534681] Allocated by task 267: [ 20.534758] kasan_save_stack+0x3c/0x68 [ 20.534831] kasan_save_track+0x20/0x40 [ 20.534948] kasan_save_alloc_info+0x40/0x58 [ 20.535001] __kasan_kmalloc+0xd4/0xd8 [ 20.535038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.535291] kasan_atomics+0xb8/0x2e0 [ 20.535386] kunit_try_run_case+0x170/0x3f0 [ 20.535442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.535488] kthread+0x328/0x630 [ 20.535526] ret_from_fork+0x10/0x20 [ 20.535574] [ 20.535605] The buggy address belongs to the object at fff00000c6e72400 [ 20.535605] which belongs to the cache kmalloc-64 of size 64 [ 20.535681] The buggy address is located 0 bytes to the right of [ 20.535681] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.535747] [ 20.535784] The buggy address belongs to the physical page: [ 20.535816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.535878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.535926] page_type: f5(slab) [ 20.535964] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.536017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.536061] page dumped because: kasan: bad access detected [ 20.536094] [ 20.536137] Memory state around the buggy address: [ 20.536181] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.536629] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.536717] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.536801] ^ [ 20.536858] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.536901] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.536941] ================================================================== [ 20.462558] ================================================================== [ 20.462608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.462675] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.462729] [ 20.462759] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.462865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.462893] Hardware name: linux,dummy-virt (DT) [ 20.462926] Call trace: [ 20.462949] show_stack+0x20/0x38 (C) [ 20.462999] dump_stack_lvl+0x8c/0xd0 [ 20.463047] print_report+0x118/0x608 [ 20.463094] kasan_report+0xdc/0x128 [ 20.463149] kasan_check_range+0x100/0x1a8 [ 20.463208] __kasan_check_write+0x20/0x30 [ 20.463261] kasan_atomics_helper+0xeb8/0x4858 [ 20.463317] kasan_atomics+0x198/0x2e0 [ 20.463672] kunit_try_run_case+0x170/0x3f0 [ 20.463744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.463868] kthread+0x328/0x630 [ 20.463934] ret_from_fork+0x10/0x20 [ 20.464000] [ 20.464035] Allocated by task 267: [ 20.464070] kasan_save_stack+0x3c/0x68 [ 20.464113] kasan_save_track+0x20/0x40 [ 20.464151] kasan_save_alloc_info+0x40/0x58 [ 20.464382] __kasan_kmalloc+0xd4/0xd8 [ 20.464501] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.464567] kasan_atomics+0xb8/0x2e0 [ 20.464662] kunit_try_run_case+0x170/0x3f0 [ 20.464725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.464995] kthread+0x328/0x630 [ 20.465065] ret_from_fork+0x10/0x20 [ 20.465144] [ 20.465235] The buggy address belongs to the object at fff00000c6e72400 [ 20.465235] which belongs to the cache kmalloc-64 of size 64 [ 20.465330] The buggy address is located 0 bytes to the right of [ 20.465330] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.465473] [ 20.465581] The buggy address belongs to the physical page: [ 20.465650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.465733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.465784] page_type: f5(slab) [ 20.465824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.465877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.465919] page dumped because: kasan: bad access detected [ 20.465954] [ 20.465974] Memory state around the buggy address: [ 20.466007] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.466053] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.466098] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.466377] ^ [ 20.466474] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.466632] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.466701] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 20.011088] ================================================================== [ 20.011279] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 20.011379] Read of size 1 at addr fff00000c6e54a50 by task kunit_try_catch/261 [ 20.011485] [ 20.011521] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.011612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.011641] Hardware name: linux,dummy-virt (DT) [ 20.011675] Call trace: [ 20.011822] show_stack+0x20/0x38 (C) [ 20.012048] dump_stack_lvl+0x8c/0xd0 [ 20.012235] print_report+0x118/0x608 [ 20.012328] kasan_report+0xdc/0x128 [ 20.012526] __asan_report_load1_noabort+0x20/0x30 [ 20.012582] strcmp+0xc0/0xc8 [ 20.012931] kasan_strings+0x340/0xb00 [ 20.013026] kunit_try_run_case+0x170/0x3f0 [ 20.013101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.013344] kthread+0x328/0x630 [ 20.013586] ret_from_fork+0x10/0x20 [ 20.013769] [ 20.013854] Allocated by task 261: [ 20.013942] kasan_save_stack+0x3c/0x68 [ 20.014363] kasan_save_track+0x20/0x40 [ 20.014457] kasan_save_alloc_info+0x40/0x58 [ 20.014600] __kasan_kmalloc+0xd4/0xd8 [ 20.014688] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.014811] kasan_strings+0xc8/0xb00 [ 20.014883] kunit_try_run_case+0x170/0x3f0 [ 20.014972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.015161] kthread+0x328/0x630 [ 20.015387] ret_from_fork+0x10/0x20 [ 20.015540] [ 20.015592] Freed by task 261: [ 20.015706] kasan_save_stack+0x3c/0x68 [ 20.015786] kasan_save_track+0x20/0x40 [ 20.016006] kasan_save_free_info+0x4c/0x78 [ 20.016222] __kasan_slab_free+0x6c/0x98 [ 20.016302] kfree+0x214/0x3c8 [ 20.016705] kasan_strings+0x24c/0xb00 [ 20.016793] kunit_try_run_case+0x170/0x3f0 [ 20.017172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.017303] kthread+0x328/0x630 [ 20.017438] ret_from_fork+0x10/0x20 [ 20.017488] [ 20.017510] The buggy address belongs to the object at fff00000c6e54a40 [ 20.017510] which belongs to the cache kmalloc-32 of size 32 [ 20.017763] The buggy address is located 16 bytes inside of [ 20.017763] freed 32-byte region [fff00000c6e54a40, fff00000c6e54a60) [ 20.017969] [ 20.018068] The buggy address belongs to the physical page: [ 20.018284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e54 [ 20.018553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.018845] page_type: f5(slab) [ 20.018900] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.019200] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.019514] page dumped because: kasan: bad access detected [ 20.020327] fff00000c6e54b00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.022861] print_report+0x118/0x608 [ 20.024175] kthread+0x328/0x630 [ 20.025000] __kasan_kmalloc+0xd4/0xd8 [ 20.025803] kthread+0x328/0x630 [ 20.026474] kasan_save_free_info+0x4c/0x78 [ 20.026943] The buggy address is located 16 bytes inside of [ 20.026943] freed 32-byte region [fff00000c6e54a40, fff00000c6e54a60) [ 20.027574] >fff00000c6e54a00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.029974] [ 20.030011] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.031669] kunit_try_run_case+0x170/0x3f0 [ 20.032935] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.033657] ret_from_fork+0x10/0x20 [ 20.036100] [ 20.036344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e54 [ 20.037877] >fff00000c6e54a00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.040147] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 20.041816] kasan_report+0xdc/0x128 [ 20.043407] [ 20.043789] __kasan_kmalloc+0xd4/0xd8 [ 20.044557] kthread+0x328/0x630 [ 20.044864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e54 [ 20.045168] [ 20.045222] fff00000c6e54900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.045324] >fff00000c6e54a00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.053257] not ok 62 kasan_strings [ 20.058355] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 19.987999] ================================================================== [ 19.988061] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 19.988121] Read of size 1 at addr fff00000c6e54858 by task kunit_try_catch/259 [ 19.988550] [ 19.988617] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.988753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.988848] Hardware name: linux,dummy-virt (DT) [ 19.988894] Call trace: [ 19.988918] show_stack+0x20/0x38 (C) [ 19.988977] dump_stack_lvl+0x8c/0xd0 [ 19.989029] print_report+0x118/0x608 [ 19.989197] kasan_report+0xdc/0x128 [ 19.989423] __asan_report_load1_noabort+0x20/0x30 [ 19.989616] memcmp+0x198/0x1d8 [ 19.989714] kasan_memcmp+0x16c/0x300 [ 19.990014] kunit_try_run_case+0x170/0x3f0 [ 19.990188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.990313] kthread+0x328/0x630 [ 19.990500] ret_from_fork+0x10/0x20 [ 19.990662] [ 19.990685] Allocated by task 259: [ 19.991044] kasan_save_stack+0x3c/0x68 [ 19.991128] kasan_save_track+0x20/0x40 [ 19.991261] kasan_save_alloc_info+0x40/0x58 [ 19.991318] __kasan_kmalloc+0xd4/0xd8 [ 19.991386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.991431] kasan_memcmp+0xbc/0x300 [ 19.991470] kunit_try_run_case+0x170/0x3f0 [ 19.991561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.991615] kthread+0x328/0x630 [ 19.991670] ret_from_fork+0x10/0x20 [ 19.991708] [ 19.991752] The buggy address belongs to the object at fff00000c6e54840 [ 19.991752] which belongs to the cache kmalloc-32 of size 32 [ 19.991813] The buggy address is located 0 bytes to the right of [ 19.991813] allocated 24-byte region [fff00000c6e54840, fff00000c6e54858) [ 19.991890] [ 19.991914] The buggy address belongs to the physical page: [ 19.991948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e54 [ 19.992021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.992075] page_type: f5(slab) [ 19.992115] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.992169] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.992347] page dumped because: kasan: bad access detected [ 19.992775] [ 19.992862] Memory state around the buggy address: [ 19.992942] fff00000c6e54700: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.993543] fff00000c6e54780: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 19.993844] >fff00000c6e54800: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.993922] ^ [ 19.993979] fff00000c6e54880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.994040] fff00000c6e54900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.994107] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 19.966531] ================================================================== [ 19.966592] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 19.966650] Read of size 1 at addr ffff8000809a7b4a by task kunit_try_catch/255 [ 19.966712] [ 19.966745] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.966844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.966883] Hardware name: linux,dummy-virt (DT) [ 19.966916] Call trace: [ 19.966940] show_stack+0x20/0x38 (C) [ 19.966991] dump_stack_lvl+0x8c/0xd0 [ 19.967042] print_report+0x310/0x608 [ 19.967090] kasan_report+0xdc/0x128 [ 19.967136] __asan_report_load1_noabort+0x20/0x30 [ 19.967194] kasan_alloca_oob_right+0x2dc/0x340 [ 19.967248] kunit_try_run_case+0x170/0x3f0 [ 19.967297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.967374] kthread+0x328/0x630 [ 19.967421] ret_from_fork+0x10/0x20 [ 19.967478] [ 19.967503] The buggy address belongs to stack of task kunit_try_catch/255 [ 19.967559] [ 19.967584] The buggy address belongs to the virtual mapping at [ 19.967584] [ffff8000809a0000, ffff8000809a9000) created by: [ 19.967584] kernel_clone+0x150/0x7a8 [ 19.967664] [ 19.967695] The buggy address belongs to the physical page: [ 19.967729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de [ 19.967790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.967855] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.967905] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.967947] page dumped because: kasan: bad access detected [ 19.967980] [ 19.968002] Memory state around the buggy address: [ 19.968035] ffff8000809a7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.968079] ffff8000809a7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.968125] >ffff8000809a7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 19.968166] ^ [ 19.969121] ffff8000809a7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 19.969218] ffff8000809a7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 19.969262] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 19.950495] ================================================================== [ 19.950576] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 19.950647] Read of size 1 at addr ffff8000808f7b5f by task kunit_try_catch/253 [ 19.950701] [ 19.950824] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.951019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.951082] Hardware name: linux,dummy-virt (DT) [ 19.951117] Call trace: [ 19.951146] show_stack+0x20/0x38 (C) [ 19.951227] dump_stack_lvl+0x8c/0xd0 [ 19.951299] print_report+0x310/0x608 [ 19.951362] kasan_report+0xdc/0x128 [ 19.951434] __asan_report_load1_noabort+0x20/0x30 [ 19.951508] kasan_alloca_oob_left+0x2b8/0x310 [ 19.951562] kunit_try_run_case+0x170/0x3f0 [ 19.951614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.951687] kthread+0x328/0x630 [ 19.951741] ret_from_fork+0x10/0x20 [ 19.951792] [ 19.951925] The buggy address belongs to stack of task kunit_try_catch/253 [ 19.952002] [ 19.952118] The buggy address belongs to the virtual mapping at [ 19.952118] [ffff8000808f0000, ffff8000808f9000) created by: [ 19.952118] kernel_clone+0x150/0x7a8 [ 19.952240] [ 19.952287] The buggy address belongs to the physical page: [ 19.952351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a8 [ 19.952727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.952914] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.953021] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.953082] page dumped because: kasan: bad access detected [ 19.953117] [ 19.953162] Memory state around the buggy address: [ 19.953195] ffff8000808f7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.953240] ffff8000808f7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.953419] >ffff8000808f7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 19.953631] ^ [ 19.953750] ffff8000808f7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 19.953836] ffff8000808f7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 19.953951] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 19.938670] ================================================================== [ 19.938781] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 19.938866] Read of size 1 at addr ffff8000809a7c2a by task kunit_try_catch/251 [ 19.938955] [ 19.938995] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.939094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.939121] Hardware name: linux,dummy-virt (DT) [ 19.939169] Call trace: [ 19.939214] show_stack+0x20/0x38 (C) [ 19.939266] dump_stack_lvl+0x8c/0xd0 [ 19.939381] print_report+0x310/0x608 [ 19.939429] kasan_report+0xdc/0x128 [ 19.939490] __asan_report_load1_noabort+0x20/0x30 [ 19.939541] kasan_stack_oob+0x238/0x270 [ 19.939587] kunit_try_run_case+0x170/0x3f0 [ 19.939798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.939868] kthread+0x328/0x630 [ 19.939915] ret_from_fork+0x10/0x20 [ 19.939980] [ 19.940063] The buggy address belongs to stack of task kunit_try_catch/251 [ 19.940171] and is located at offset 138 in frame: [ 19.940240] kasan_stack_oob+0x0/0x270 [ 19.940566] [ 19.940646] This frame has 4 objects: [ 19.940750] [48, 49) '__assertion' [ 19.940785] [64, 72) 'array' [ 19.940817] [96, 112) '__assertion' [ 19.940992] [128, 138) 'stack_array' [ 19.941054] [ 19.941087] The buggy address belongs to the virtual mapping at [ 19.941087] [ffff8000809a0000, ffff8000809a9000) created by: [ 19.941087] kernel_clone+0x150/0x7a8 [ 19.941217] [ 19.941343] The buggy address belongs to the physical page: [ 19.941422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de [ 19.941493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.941582] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.941669] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.941787] page dumped because: kasan: bad access detected [ 19.941864] [ 19.941912] Memory state around the buggy address: [ 19.941946] ffff8000809a7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.942584] ffff8000809a7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 19.942815] >ffff8000809a7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 19.942962] ^ [ 19.943057] ffff8000809a7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 19.943153] ffff8000809a7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 19.943211] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 19.925764] ================================================================== [ 19.925840] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 19.925905] Read of size 1 at addr ffffaee417e035ad by task kunit_try_catch/247 [ 19.925972] [ 19.926047] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.926141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.926189] Hardware name: linux,dummy-virt (DT) [ 19.926220] Call trace: [ 19.926241] show_stack+0x20/0x38 (C) [ 19.926466] dump_stack_lvl+0x8c/0xd0 [ 19.926532] print_report+0x310/0x608 [ 19.926580] kasan_report+0xdc/0x128 [ 19.926651] __asan_report_load1_noabort+0x20/0x30 [ 19.926708] kasan_global_oob_right+0x230/0x270 [ 19.926792] kunit_try_run_case+0x170/0x3f0 [ 19.926850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.926904] kthread+0x328/0x630 [ 19.926968] ret_from_fork+0x10/0x20 [ 19.927029] [ 19.927080] The buggy address belongs to the variable: [ 19.927313] global_array+0xd/0x40 [ 19.927447] [ 19.927527] The buggy address belongs to the virtual mapping at [ 19.927527] [ffffaee416020000, ffffaee417ec1000) created by: [ 19.927527] paging_init+0x66c/0x7d0 [ 19.927639] [ 19.927903] The buggy address belongs to the physical page: [ 19.927995] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c03 [ 19.928069] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 19.928152] raw: 03fffe0000002000 ffffc1ffc01f00c8 ffffc1ffc01f00c8 0000000000000000 [ 19.928224] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.928290] page dumped because: kasan: bad access detected [ 19.928372] [ 19.928393] Memory state around the buggy address: [ 19.928424] ffffaee417e03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.928469] ffffaee417e03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 19.928511] >ffffaee417e03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 19.928549] ^ [ 19.928582] ffffaee417e03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 19.928911] ffffaee417e03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.928976] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 19.906264] ================================================================== [ 19.906351] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.906409] Free of addr fff00000c6e6c501 by task kunit_try_catch/243 [ 19.906451] [ 19.906481] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.906561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.906589] Hardware name: linux,dummy-virt (DT) [ 19.906620] Call trace: [ 19.906641] show_stack+0x20/0x38 (C) [ 19.906689] dump_stack_lvl+0x8c/0xd0 [ 19.906738] print_report+0x118/0x608 [ 19.906785] kasan_report_invalid_free+0xc0/0xe8 [ 19.906831] check_slab_allocation+0xfc/0x108 [ 19.906886] __kasan_mempool_poison_object+0x78/0x150 [ 19.906935] mempool_free+0x28c/0x328 [ 19.906981] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.907052] mempool_kmalloc_invalid_free+0xc0/0x118 [ 19.907103] kunit_try_run_case+0x170/0x3f0 [ 19.907152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.907204] kthread+0x328/0x630 [ 19.907250] ret_from_fork+0x10/0x20 [ 19.907296] [ 19.907314] Allocated by task 243: [ 19.907859] kasan_save_stack+0x3c/0x68 [ 19.907920] kasan_save_track+0x20/0x40 [ 19.907958] kasan_save_alloc_info+0x40/0x58 [ 19.908151] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.908205] remove_element+0x130/0x1f8 [ 19.908245] mempool_alloc_preallocated+0x58/0xc0 [ 19.908300] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 19.908434] mempool_kmalloc_invalid_free+0xc0/0x118 [ 19.908478] kunit_try_run_case+0x170/0x3f0 [ 19.908518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.908585] kthread+0x328/0x630 [ 19.908635] ret_from_fork+0x10/0x20 [ 19.908671] [ 19.908692] The buggy address belongs to the object at fff00000c6e6c500 [ 19.908692] which belongs to the cache kmalloc-128 of size 128 [ 19.908751] The buggy address is located 1 bytes inside of [ 19.908751] 128-byte region [fff00000c6e6c500, fff00000c6e6c580) [ 19.908853] [ 19.908874] The buggy address belongs to the physical page: [ 19.908908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 19.908962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.909010] page_type: f5(slab) [ 19.909051] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.909218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.909343] page dumped because: kasan: bad access detected [ 19.909424] [ 19.909533] Memory state around the buggy address: [ 19.909600] fff00000c6e6c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.909763] fff00000c6e6c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.909836] >fff00000c6e6c500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.909881] ^ [ 19.909908] fff00000c6e6c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.910010] fff00000c6e6c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.910087] ================================================================== [ 19.915818] ================================================================== [ 19.915923] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.915991] Free of addr fff00000c78e4001 by task kunit_try_catch/245 [ 19.916034] [ 19.916195] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.916346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.916421] Hardware name: linux,dummy-virt (DT) [ 19.916508] Call trace: [ 19.916568] show_stack+0x20/0x38 (C) [ 19.916684] dump_stack_lvl+0x8c/0xd0 [ 19.916774] print_report+0x118/0x608 [ 19.916838] kasan_report_invalid_free+0xc0/0xe8 [ 19.916964] __kasan_mempool_poison_object+0xfc/0x150 [ 19.917052] mempool_free+0x28c/0x328 [ 19.917197] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.917273] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 19.917383] kunit_try_run_case+0x170/0x3f0 [ 19.917482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.917540] kthread+0x328/0x630 [ 19.917592] ret_from_fork+0x10/0x20 [ 19.917641] [ 19.917665] The buggy address belongs to the physical page: [ 19.917738] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e4 [ 19.917795] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.918006] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.918119] page_type: f8(unknown) [ 19.918187] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.918287] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.918401] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.918468] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.918724] head: 0bfffe0000000002 ffffc1ffc31e3901 00000000ffffffff 00000000ffffffff [ 19.918790] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.918907] page dumped because: kasan: bad access detected [ 19.918986] [ 19.919045] Memory state around the buggy address: [ 19.919125] fff00000c78e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.919198] fff00000c78e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.919272] >fff00000c78e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.919310] ^ [ 19.919372] fff00000c78e4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.919668] fff00000c78e4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.919754] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 19.898711] ================================================================== [ 19.898765] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.898839] Free of addr fff00000c78e4000 by task kunit_try_catch/241 [ 19.899046] [ 19.899084] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.899276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.899368] Hardware name: linux,dummy-virt (DT) [ 19.899409] Call trace: [ 19.899448] show_stack+0x20/0x38 (C) [ 19.899512] dump_stack_lvl+0x8c/0xd0 [ 19.899564] print_report+0x118/0x608 [ 19.899618] kasan_report_invalid_free+0xc0/0xe8 [ 19.899671] __kasan_mempool_poison_pages+0xe0/0xe8 [ 19.899721] mempool_free+0x24c/0x328 [ 19.899770] mempool_double_free_helper+0x150/0x2e8 [ 19.899822] mempool_page_alloc_double_free+0xbc/0x118 [ 19.899871] kunit_try_run_case+0x170/0x3f0 [ 19.899920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.899973] kthread+0x328/0x630 [ 19.900193] ret_from_fork+0x10/0x20 [ 19.900322] [ 19.900391] The buggy address belongs to the physical page: [ 19.900423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e4 [ 19.900479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.900787] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.900900] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.900954] page dumped because: kasan: bad access detected [ 19.900985] [ 19.901018] Memory state around the buggy address: [ 19.901056] fff00000c78e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.901099] fff00000c78e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.901141] >fff00000c78e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.901178] ^ [ 19.901205] fff00000c78e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.901246] fff00000c78e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.901285] ================================================================== [ 19.875830] ================================================================== [ 19.875886] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.875940] Free of addr fff00000c6e6c100 by task kunit_try_catch/237 [ 19.875983] [ 19.876014] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.876095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.876123] Hardware name: linux,dummy-virt (DT) [ 19.876152] Call trace: [ 19.876382] show_stack+0x20/0x38 (C) [ 19.876540] dump_stack_lvl+0x8c/0xd0 [ 19.876619] print_report+0x118/0x608 [ 19.876743] kasan_report_invalid_free+0xc0/0xe8 [ 19.876830] check_slab_allocation+0xd4/0x108 [ 19.876904] __kasan_mempool_poison_object+0x78/0x150 [ 19.876957] mempool_free+0x28c/0x328 [ 19.877032] mempool_double_free_helper+0x150/0x2e8 [ 19.877084] mempool_kmalloc_double_free+0xc0/0x118 [ 19.877137] kunit_try_run_case+0x170/0x3f0 [ 19.877397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.877471] kthread+0x328/0x630 [ 19.877562] ret_from_fork+0x10/0x20 [ 19.877658] [ 19.877707] Allocated by task 237: [ 19.877777] kasan_save_stack+0x3c/0x68 [ 19.877866] kasan_save_track+0x20/0x40 [ 19.877903] kasan_save_alloc_info+0x40/0x58 [ 19.877959] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.878023] remove_element+0x130/0x1f8 [ 19.878311] mempool_alloc_preallocated+0x58/0xc0 [ 19.878418] mempool_double_free_helper+0x94/0x2e8 [ 19.878551] mempool_kmalloc_double_free+0xc0/0x118 [ 19.878606] kunit_try_run_case+0x170/0x3f0 [ 19.878644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.878920] kthread+0x328/0x630 [ 19.879001] ret_from_fork+0x10/0x20 [ 19.879105] [ 19.879163] Freed by task 237: [ 19.879237] kasan_save_stack+0x3c/0x68 [ 19.879325] kasan_save_track+0x20/0x40 [ 19.879395] kasan_save_free_info+0x4c/0x78 [ 19.879432] __kasan_mempool_poison_object+0xc0/0x150 [ 19.879607] mempool_free+0x28c/0x328 [ 19.879788] mempool_double_free_helper+0x100/0x2e8 [ 19.879865] mempool_kmalloc_double_free+0xc0/0x118 [ 19.879968] kunit_try_run_case+0x170/0x3f0 [ 19.880045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.880188] kthread+0x328/0x630 [ 19.880244] ret_from_fork+0x10/0x20 [ 19.880302] [ 19.880321] The buggy address belongs to the object at fff00000c6e6c100 [ 19.880321] which belongs to the cache kmalloc-128 of size 128 [ 19.880394] The buggy address is located 0 bytes inside of [ 19.880394] 128-byte region [fff00000c6e6c100, fff00000c6e6c180) [ 19.880466] [ 19.880499] The buggy address belongs to the physical page: [ 19.880529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 19.880581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.880627] page_type: f5(slab) [ 19.880805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.880874] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.880991] page dumped because: kasan: bad access detected [ 19.881082] [ 19.881129] Memory state around the buggy address: [ 19.881223] fff00000c6e6c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.881272] fff00000c6e6c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.881469] >fff00000c6e6c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.881644] ^ [ 19.881706] fff00000c6e6c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.881769] fff00000c6e6c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.881808] ================================================================== [ 19.887845] ================================================================== [ 19.887908] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.887982] Free of addr fff00000c78e4000 by task kunit_try_catch/239 [ 19.888053] [ 19.888101] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.888183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.888208] Hardware name: linux,dummy-virt (DT) [ 19.888242] Call trace: [ 19.888263] show_stack+0x20/0x38 (C) [ 19.888312] dump_stack_lvl+0x8c/0xd0 [ 19.888494] print_report+0x118/0x608 [ 19.888541] kasan_report_invalid_free+0xc0/0xe8 [ 19.888590] __kasan_mempool_poison_object+0x14c/0x150 [ 19.888639] mempool_free+0x28c/0x328 [ 19.888806] mempool_double_free_helper+0x150/0x2e8 [ 19.888942] mempool_kmalloc_large_double_free+0xc0/0x118 [ 19.889033] kunit_try_run_case+0x170/0x3f0 [ 19.889141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.889274] kthread+0x328/0x630 [ 19.889352] ret_from_fork+0x10/0x20 [ 19.889432] [ 19.889730] The buggy address belongs to the physical page: [ 19.889808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e4 [ 19.889878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.889935] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.889988] page_type: f8(unknown) [ 19.890050] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.890115] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.890171] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.890228] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.890292] head: 0bfffe0000000002 ffffc1ffc31e3901 00000000ffffffff 00000000ffffffff [ 19.890357] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.890397] page dumped because: kasan: bad access detected [ 19.890428] [ 19.890454] Memory state around the buggy address: [ 19.890496] fff00000c78e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.890537] fff00000c78e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.890581] >fff00000c78e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.890619] ^ [ 19.890648] fff00000c78e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.890690] fff00000c78e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.890729] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 18.247462] ================================================================== [ 18.247527] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 18.247587] Read of size 1 at addr fff00000c637d0c8 by task kunit_try_catch/209 [ 18.247638] [ 18.247669] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.247750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.247776] Hardware name: linux,dummy-virt (DT) [ 18.247809] Call trace: [ 18.247830] show_stack+0x20/0x38 (C) [ 18.247880] dump_stack_lvl+0x8c/0xd0 [ 18.247927] print_report+0x118/0x608 [ 18.247973] kasan_report+0xdc/0x128 [ 18.248016] __asan_report_load1_noabort+0x20/0x30 [ 18.248066] kmem_cache_oob+0x344/0x430 [ 18.248112] kunit_try_run_case+0x170/0x3f0 [ 18.252151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.252214] kthread+0x328/0x630 [ 18.252263] ret_from_fork+0x10/0x20 [ 18.252314] [ 18.252346] Allocated by task 209: [ 18.252375] kasan_save_stack+0x3c/0x68 [ 18.252415] kasan_save_track+0x20/0x40 [ 18.252451] kasan_save_alloc_info+0x40/0x58 [ 18.252488] __kasan_slab_alloc+0xa8/0xb0 [ 18.252526] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.252564] kmem_cache_oob+0x12c/0x430 [ 18.252600] kunit_try_run_case+0x170/0x3f0 [ 18.252639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.252684] kthread+0x328/0x630 [ 18.252722] ret_from_fork+0x10/0x20 [ 18.252759] [ 18.252779] The buggy address belongs to the object at fff00000c637d000 [ 18.252779] which belongs to the cache test_cache of size 200 [ 18.252837] The buggy address is located 0 bytes to the right of [ 18.252837] allocated 200-byte region [fff00000c637d000, fff00000c637d0c8) [ 18.252900] [ 18.252921] The buggy address belongs to the physical page: [ 18.252952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637d [ 18.253008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.253058] page_type: f5(slab) [ 18.253097] raw: 0bfffe0000000000 fff00000c5b8bb40 dead000000000122 0000000000000000 [ 18.253147] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.253188] page dumped because: kasan: bad access detected [ 18.253219] [ 18.253236] Memory state around the buggy address: [ 18.253268] fff00000c637cf80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 18.253313] fff00000c637d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.253396] >fff00000c637d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 18.253436] ^ [ 18.253470] fff00000c637d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.253513] fff00000c637d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.253609] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 18.211099] ================================================================== [ 18.211183] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 18.211251] Read of size 8 at addr fff00000c6385540 by task kunit_try_catch/202 [ 18.211312] [ 18.211633] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.211741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.211787] Hardware name: linux,dummy-virt (DT) [ 18.211841] Call trace: [ 18.211866] show_stack+0x20/0x38 (C) [ 18.211926] dump_stack_lvl+0x8c/0xd0 [ 18.212009] print_report+0x118/0x608 [ 18.212056] kasan_report+0xdc/0x128 [ 18.212102] __asan_report_load8_noabort+0x20/0x30 [ 18.212181] workqueue_uaf+0x480/0x4a8 [ 18.212438] kunit_try_run_case+0x170/0x3f0 [ 18.212535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.212724] kthread+0x328/0x630 [ 18.212800] ret_from_fork+0x10/0x20 [ 18.212886] [ 18.212906] Allocated by task 202: [ 18.212961] kasan_save_stack+0x3c/0x68 [ 18.213084] kasan_save_track+0x20/0x40 [ 18.213154] kasan_save_alloc_info+0x40/0x58 [ 18.213291] __kasan_kmalloc+0xd4/0xd8 [ 18.213612] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.213691] workqueue_uaf+0x13c/0x4a8 [ 18.213857] kunit_try_run_case+0x170/0x3f0 [ 18.213993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.214070] kthread+0x328/0x630 [ 18.214143] ret_from_fork+0x10/0x20 [ 18.214279] [ 18.214380] Freed by task 51: [ 18.214458] kasan_save_stack+0x3c/0x68 [ 18.214497] kasan_save_track+0x20/0x40 [ 18.214756] kasan_save_free_info+0x4c/0x78 [ 18.214841] __kasan_slab_free+0x6c/0x98 [ 18.214905] kfree+0x214/0x3c8 [ 18.215016] workqueue_uaf_work+0x18/0x30 [ 18.215103] process_one_work+0x530/0xf98 [ 18.215219] worker_thread+0x618/0xf38 [ 18.215303] kthread+0x328/0x630 [ 18.215402] ret_from_fork+0x10/0x20 [ 18.215480] [ 18.215537] Last potentially related work creation: [ 18.215566] kasan_save_stack+0x3c/0x68 [ 18.215603] kasan_record_aux_stack+0xb4/0xc8 [ 18.215761] __queue_work+0x65c/0x1008 [ 18.215807] queue_work_on+0xbc/0xf8 [ 18.215841] workqueue_uaf+0x210/0x4a8 [ 18.215985] kunit_try_run_case+0x170/0x3f0 [ 18.216065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.216201] kthread+0x328/0x630 [ 18.216327] ret_from_fork+0x10/0x20 [ 18.216454] [ 18.216533] The buggy address belongs to the object at fff00000c6385540 [ 18.216533] which belongs to the cache kmalloc-32 of size 32 [ 18.216683] The buggy address is located 0 bytes inside of [ 18.216683] freed 32-byte region [fff00000c6385540, fff00000c6385560) [ 18.216745] [ 18.216775] The buggy address belongs to the physical page: [ 18.216950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106385 [ 18.217017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.217094] page_type: f5(slab) [ 18.217143] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.217260] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.217403] page dumped because: kasan: bad access detected [ 18.217502] [ 18.217574] Memory state around the buggy address: [ 18.217685] fff00000c6385400: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 18.217751] fff00000c6385480: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.217810] >fff00000c6385500: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 18.218073] ^ [ 18.218211] fff00000c6385580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.218287] fff00000c6385600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.218362] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 19.867542] ================================================================== [ 19.867640] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.867703] Read of size 1 at addr fff00000c78e0000 by task kunit_try_catch/235 [ 19.867775] [ 19.867829] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.867914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.867941] Hardware name: linux,dummy-virt (DT) [ 19.867974] Call trace: [ 19.867997] show_stack+0x20/0x38 (C) [ 19.868044] dump_stack_lvl+0x8c/0xd0 [ 19.868130] print_report+0x118/0x608 [ 19.868179] kasan_report+0xdc/0x128 [ 19.868322] __asan_report_load1_noabort+0x20/0x30 [ 19.868411] mempool_uaf_helper+0x314/0x340 [ 19.868484] mempool_page_alloc_uaf+0xc0/0x118 [ 19.868531] kunit_try_run_case+0x170/0x3f0 [ 19.868590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.868644] kthread+0x328/0x630 [ 19.868805] ret_from_fork+0x10/0x20 [ 19.868855] [ 19.868876] The buggy address belongs to the physical page: [ 19.868907] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 19.868961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.869153] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.869258] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.869347] page dumped because: kasan: bad access detected [ 19.869400] [ 19.869448] Memory state around the buggy address: [ 19.869546] fff00000c78dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.869619] fff00000c78dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.869664] >fff00000c78e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.869924] ^ [ 19.869994] fff00000c78e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.870083] fff00000c78e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.870233] ================================================================== [ 19.835816] ================================================================== [ 19.835872] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.835926] Read of size 1 at addr fff00000c78e0000 by task kunit_try_catch/231 [ 19.835976] [ 19.836005] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.836086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.836113] Hardware name: linux,dummy-virt (DT) [ 19.836142] Call trace: [ 19.836163] show_stack+0x20/0x38 (C) [ 19.836210] dump_stack_lvl+0x8c/0xd0 [ 19.836814] print_report+0x118/0x608 [ 19.836927] kasan_report+0xdc/0x128 [ 19.837005] __asan_report_load1_noabort+0x20/0x30 [ 19.837115] mempool_uaf_helper+0x314/0x340 [ 19.837416] mempool_kmalloc_large_uaf+0xc4/0x120 [ 19.837478] kunit_try_run_case+0x170/0x3f0 [ 19.837527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.837842] kthread+0x328/0x630 [ 19.837951] ret_from_fork+0x10/0x20 [ 19.838071] [ 19.838130] The buggy address belongs to the physical page: [ 19.838190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 19.838283] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.838413] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.838515] page_type: f8(unknown) [ 19.838639] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.838722] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.839001] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.839105] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.839244] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff [ 19.839364] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.839475] page dumped because: kasan: bad access detected [ 19.839553] [ 19.839590] Memory state around the buggy address: [ 19.839759] fff00000c78dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.839804] fff00000c78dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.839978] >fff00000c78e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.840080] ^ [ 19.840109] fff00000c78e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.840159] fff00000c78e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.840399] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 19.847495] ================================================================== [ 19.847556] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.847610] Read of size 1 at addr fff00000c6e6c240 by task kunit_try_catch/233 [ 19.847676] [ 19.847710] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.847790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.847817] Hardware name: linux,dummy-virt (DT) [ 19.847847] Call trace: [ 19.847870] show_stack+0x20/0x38 (C) [ 19.847918] dump_stack_lvl+0x8c/0xd0 [ 19.847984] print_report+0x118/0x608 [ 19.848030] kasan_report+0xdc/0x128 [ 19.848072] __asan_report_load1_noabort+0x20/0x30 [ 19.848127] mempool_uaf_helper+0x314/0x340 [ 19.848174] mempool_slab_uaf+0xc0/0x118 [ 19.848225] kunit_try_run_case+0x170/0x3f0 [ 19.848274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.848329] kthread+0x328/0x630 [ 19.848388] ret_from_fork+0x10/0x20 [ 19.848450] [ 19.848469] Allocated by task 233: [ 19.848497] kasan_save_stack+0x3c/0x68 [ 19.848534] kasan_save_track+0x20/0x40 [ 19.848571] kasan_save_alloc_info+0x40/0x58 [ 19.848616] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.848659] remove_element+0x16c/0x1f8 [ 19.848705] mempool_alloc_preallocated+0x58/0xc0 [ 19.848747] mempool_uaf_helper+0xa4/0x340 [ 19.848785] mempool_slab_uaf+0xc0/0x118 [ 19.848820] kunit_try_run_case+0x170/0x3f0 [ 19.848857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.848909] kthread+0x328/0x630 [ 19.848944] ret_from_fork+0x10/0x20 [ 19.848980] [ 19.849006] Freed by task 233: [ 19.849031] kasan_save_stack+0x3c/0x68 [ 19.849067] kasan_save_track+0x20/0x40 [ 19.849101] kasan_save_free_info+0x4c/0x78 [ 19.849139] __kasan_mempool_poison_object+0xc0/0x150 [ 19.849177] mempool_free+0x28c/0x328 [ 19.849215] mempool_uaf_helper+0x104/0x340 [ 19.849254] mempool_slab_uaf+0xc0/0x118 [ 19.849288] kunit_try_run_case+0x170/0x3f0 [ 19.849347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.849391] kthread+0x328/0x630 [ 19.849426] ret_from_fork+0x10/0x20 [ 19.849889] [ 19.849926] The buggy address belongs to the object at fff00000c6e6c240 [ 19.849926] which belongs to the cache test_cache of size 123 [ 19.850048] The buggy address is located 0 bytes inside of [ 19.850048] freed 123-byte region [fff00000c6e6c240, fff00000c6e6c2bb) [ 19.850153] [ 19.850181] The buggy address belongs to the physical page: [ 19.850212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c [ 19.850281] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.850396] page_type: f5(slab) [ 19.850458] raw: 0bfffe0000000000 fff00000ffe8e000 dead000000000122 0000000000000000 [ 19.850508] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.850547] page dumped because: kasan: bad access detected [ 19.850578] [ 19.850595] Memory state around the buggy address: [ 19.850627] fff00000c6e6c100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.850790] fff00000c6e6c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.850925] >fff00000c6e6c200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 19.850994] ^ [ 19.851098] fff00000c6e6c280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.851186] fff00000c6e6c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.851255] ================================================================== [ 19.825412] ================================================================== [ 19.825493] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.825575] Read of size 1 at addr fff00000c6369d00 by task kunit_try_catch/229 [ 19.825627] [ 19.825679] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.825925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.825991] Hardware name: linux,dummy-virt (DT) [ 19.826025] Call trace: [ 19.826048] show_stack+0x20/0x38 (C) [ 19.826102] dump_stack_lvl+0x8c/0xd0 [ 19.826379] print_report+0x118/0x608 [ 19.826455] kasan_report+0xdc/0x128 [ 19.826520] __asan_report_load1_noabort+0x20/0x30 [ 19.826587] mempool_uaf_helper+0x314/0x340 [ 19.826653] mempool_kmalloc_uaf+0xc4/0x120 [ 19.826701] kunit_try_run_case+0x170/0x3f0 [ 19.826754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.826807] kthread+0x328/0x630 [ 19.826994] ret_from_fork+0x10/0x20 [ 19.827076] [ 19.827115] Allocated by task 229: [ 19.827178] kasan_save_stack+0x3c/0x68 [ 19.827226] kasan_save_track+0x20/0x40 [ 19.827262] kasan_save_alloc_info+0x40/0x58 [ 19.827318] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.827393] remove_element+0x130/0x1f8 [ 19.827433] mempool_alloc_preallocated+0x58/0xc0 [ 19.827475] mempool_uaf_helper+0xa4/0x340 [ 19.827512] mempool_kmalloc_uaf+0xc4/0x120 [ 19.827639] kunit_try_run_case+0x170/0x3f0 [ 19.827753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.827834] kthread+0x328/0x630 [ 19.827890] ret_from_fork+0x10/0x20 [ 19.827926] [ 19.827988] Freed by task 229: [ 19.828036] kasan_save_stack+0x3c/0x68 [ 19.828103] kasan_save_track+0x20/0x40 [ 19.828144] kasan_save_free_info+0x4c/0x78 [ 19.828182] __kasan_mempool_poison_object+0xc0/0x150 [ 19.828312] mempool_free+0x28c/0x328 [ 19.828531] mempool_uaf_helper+0x104/0x340 [ 19.828618] mempool_kmalloc_uaf+0xc4/0x120 [ 19.828696] kunit_try_run_case+0x170/0x3f0 [ 19.828771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.828861] kthread+0x328/0x630 [ 19.828938] ret_from_fork+0x10/0x20 [ 19.828975] [ 19.828998] The buggy address belongs to the object at fff00000c6369d00 [ 19.828998] which belongs to the cache kmalloc-128 of size 128 [ 19.829058] The buggy address is located 0 bytes inside of [ 19.829058] freed 128-byte region [fff00000c6369d00, fff00000c6369d80) [ 19.829307] [ 19.829466] The buggy address belongs to the physical page: [ 19.829565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106369 [ 19.829659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.829718] page_type: f5(slab) [ 19.829757] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.829845] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.829943] page dumped because: kasan: bad access detected [ 19.830010] [ 19.830028] Memory state around the buggy address: [ 19.830061] fff00000c6369c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.830318] fff00000c6369c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.830450] >fff00000c6369d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.830551] ^ [ 19.830631] fff00000c6369d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.830714] fff00000c6369e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.830753] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 19.751072] ================================================================== [ 19.751156] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.751239] Read of size 1 at addr fff00000c6369973 by task kunit_try_catch/223 [ 19.751291] [ 19.751352] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.751440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.751469] Hardware name: linux,dummy-virt (DT) [ 19.751501] Call trace: [ 19.751528] show_stack+0x20/0x38 (C) [ 19.751580] dump_stack_lvl+0x8c/0xd0 [ 19.751634] print_report+0x118/0x608 [ 19.751679] kasan_report+0xdc/0x128 [ 19.751722] __asan_report_load1_noabort+0x20/0x30 [ 19.751773] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.751824] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.751875] kunit_try_run_case+0x170/0x3f0 [ 19.751927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.751981] kthread+0x328/0x630 [ 19.752029] ret_from_fork+0x10/0x20 [ 19.752079] [ 19.752098] Allocated by task 223: [ 19.752128] kasan_save_stack+0x3c/0x68 [ 19.752170] kasan_save_track+0x20/0x40 [ 19.752217] kasan_save_alloc_info+0x40/0x58 [ 19.752270] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.752313] remove_element+0x130/0x1f8 [ 19.752366] mempool_alloc_preallocated+0x58/0xc0 [ 19.752410] mempool_oob_right_helper+0x98/0x2f0 [ 19.752452] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.752495] kunit_try_run_case+0x170/0x3f0 [ 19.752535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.752580] kthread+0x328/0x630 [ 19.752617] ret_from_fork+0x10/0x20 [ 19.752653] [ 19.752673] The buggy address belongs to the object at fff00000c6369900 [ 19.752673] which belongs to the cache kmalloc-128 of size 128 [ 19.752733] The buggy address is located 0 bytes to the right of [ 19.752733] allocated 115-byte region [fff00000c6369900, fff00000c6369973) [ 19.752799] [ 19.752821] The buggy address belongs to the physical page: [ 19.752852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106369 [ 19.752908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.752960] page_type: f5(slab) [ 19.753003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.753053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.753095] page dumped because: kasan: bad access detected [ 19.753127] [ 19.753147] Memory state around the buggy address: [ 19.753181] fff00000c6369800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.753225] fff00000c6369880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.753267] >fff00000c6369900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.753306] ^ [ 19.753354] fff00000c6369980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.753396] fff00000c6369a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.753434] ================================================================== [ 19.769355] ================================================================== [ 19.769419] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.769478] Read of size 1 at addr fff00000c65ba001 by task kunit_try_catch/225 [ 19.769536] [ 19.769681] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.770009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.770042] Hardware name: linux,dummy-virt (DT) [ 19.770137] Call trace: [ 19.770162] show_stack+0x20/0x38 (C) [ 19.770216] dump_stack_lvl+0x8c/0xd0 [ 19.770987] print_report+0x118/0x608 [ 19.771218] kasan_report+0xdc/0x128 [ 19.771315] __asan_report_load1_noabort+0x20/0x30 [ 19.771380] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.771432] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 19.771833] kunit_try_run_case+0x170/0x3f0 [ 19.771953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.772023] kthread+0x328/0x630 [ 19.772074] ret_from_fork+0x10/0x20 [ 19.772169] [ 19.772191] The buggy address belongs to the physical page: [ 19.772747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b8 [ 19.772848] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.773004] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.773189] page_type: f8(unknown) [ 19.773258] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.774055] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.774129] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.774180] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.774231] head: 0bfffe0000000002 ffffc1ffc3196e01 00000000ffffffff 00000000ffffffff [ 19.774280] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.774322] page dumped because: kasan: bad access detected [ 19.774367] [ 19.775050] Memory state around the buggy address: [ 19.775585] fff00000c65b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.775648] fff00000c65b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.775750] >fff00000c65ba000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.776060] ^ [ 19.776112] fff00000c65ba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.776161] fff00000c65ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.776714] ================================================================== [ 19.787714] ================================================================== [ 19.788127] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.788200] Read of size 1 at addr fff00000c63952bb by task kunit_try_catch/227 [ 19.788265] [ 19.788298] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.788393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.788421] Hardware name: linux,dummy-virt (DT) [ 19.788450] Call trace: [ 19.788474] show_stack+0x20/0x38 (C) [ 19.788522] dump_stack_lvl+0x8c/0xd0 [ 19.788701] print_report+0x118/0x608 [ 19.788932] kasan_report+0xdc/0x128 [ 19.789033] __asan_report_load1_noabort+0x20/0x30 [ 19.789135] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.789186] mempool_slab_oob_right+0xc0/0x118 [ 19.789233] kunit_try_run_case+0x170/0x3f0 [ 19.789644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.789711] kthread+0x328/0x630 [ 19.789759] ret_from_fork+0x10/0x20 [ 19.790107] [ 19.790129] Allocated by task 227: [ 19.790159] kasan_save_stack+0x3c/0x68 [ 19.790199] kasan_save_track+0x20/0x40 [ 19.790236] kasan_save_alloc_info+0x40/0x58 [ 19.790887] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.790943] remove_element+0x16c/0x1f8 [ 19.791352] mempool_alloc_preallocated+0x58/0xc0 [ 19.791424] mempool_oob_right_helper+0x98/0x2f0 [ 19.791739] mempool_slab_oob_right+0xc0/0x118 [ 19.791994] kunit_try_run_case+0x170/0x3f0 [ 19.792106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.792155] kthread+0x328/0x630 [ 19.792191] ret_from_fork+0x10/0x20 [ 19.792228] [ 19.792373] The buggy address belongs to the object at fff00000c6395240 [ 19.792373] which belongs to the cache test_cache of size 123 [ 19.792453] The buggy address is located 0 bytes to the right of [ 19.792453] allocated 123-byte region [fff00000c6395240, fff00000c63952bb) [ 19.792522] [ 19.792542] The buggy address belongs to the physical page: [ 19.792576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106395 [ 19.793102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.793158] page_type: f5(slab) [ 19.793225] raw: 0bfffe0000000000 fff00000c1bc0b40 dead000000000122 0000000000000000 [ 19.793308] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.793652] page dumped because: kasan: bad access detected [ 19.793693] [ 19.793712] Memory state around the buggy address: [ 19.793876] fff00000c6395180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.794205] fff00000c6395200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 19.794252] >fff00000c6395280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 19.794290] ^ [ 19.794456] fff00000c6395300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.794544] fff00000c6395380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.794845] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 19.197115] ================================================================== [ 19.197190] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 19.197266] Read of size 1 at addr fff00000c6e5a140 by task kunit_try_catch/217 [ 19.197927] [ 19.197977] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.198065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.198094] Hardware name: linux,dummy-virt (DT) [ 19.198134] Call trace: [ 19.198249] show_stack+0x20/0x38 (C) [ 19.198472] dump_stack_lvl+0x8c/0xd0 [ 19.198598] print_report+0x118/0x608 [ 19.198645] kasan_report+0xdc/0x128 [ 19.198689] __kasan_check_byte+0x54/0x70 [ 19.198736] kmem_cache_destroy+0x34/0x218 [ 19.198782] kmem_cache_double_destroy+0x174/0x300 [ 19.198833] kunit_try_run_case+0x170/0x3f0 [ 19.198895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.199147] kthread+0x328/0x630 [ 19.199272] ret_from_fork+0x10/0x20 [ 19.199363] [ 19.199382] Allocated by task 217: [ 19.199410] kasan_save_stack+0x3c/0x68 [ 19.199451] kasan_save_track+0x20/0x40 [ 19.199488] kasan_save_alloc_info+0x40/0x58 [ 19.199527] __kasan_slab_alloc+0xa8/0xb0 [ 19.199564] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.199671] __kmem_cache_create_args+0x178/0x280 [ 19.199714] kmem_cache_double_destroy+0xc0/0x300 [ 19.199757] kunit_try_run_case+0x170/0x3f0 [ 19.199795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.199840] kthread+0x328/0x630 [ 19.199878] ret_from_fork+0x10/0x20 [ 19.199914] [ 19.199933] Freed by task 217: [ 19.200044] kasan_save_stack+0x3c/0x68 [ 19.200191] kasan_save_track+0x20/0x40 [ 19.200259] kasan_save_free_info+0x4c/0x78 [ 19.200452] __kasan_slab_free+0x6c/0x98 [ 19.200493] kmem_cache_free+0x260/0x468 [ 19.200530] slab_kmem_cache_release+0x38/0x50 [ 19.200643] kmem_cache_release+0x1c/0x30 [ 19.200684] kobject_put+0x17c/0x420 [ 19.200722] sysfs_slab_release+0x1c/0x30 [ 19.200760] kmem_cache_destroy+0x118/0x218 [ 19.200798] kmem_cache_double_destroy+0x128/0x300 [ 19.200849] kunit_try_run_case+0x170/0x3f0 [ 19.200937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.200982] kthread+0x328/0x630 [ 19.201036] ret_from_fork+0x10/0x20 [ 19.201073] [ 19.201095] The buggy address belongs to the object at fff00000c6e5a140 [ 19.201095] which belongs to the cache kmem_cache of size 208 [ 19.201153] The buggy address is located 0 bytes inside of [ 19.201153] freed 208-byte region [fff00000c6e5a140, fff00000c6e5a210) [ 19.201289] [ 19.201314] The buggy address belongs to the physical page: [ 19.201356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e5a [ 19.201409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.201579] page_type: f5(slab) [ 19.201622] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 19.201671] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 19.201710] page dumped because: kasan: bad access detected [ 19.201742] [ 19.201759] Memory state around the buggy address: [ 19.201832] fff00000c6e5a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.201877] fff00000c6e5a080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 19.201940] >fff00000c6e5a100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 19.202065] ^ [ 19.202098] fff00000c6e5a180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.202211] fff00000c6e5a200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.202349] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 18.984191] ================================================================== [ 18.984289] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 18.986139] Read of size 1 at addr fff00000c6e5c000 by task kunit_try_catch/215 [ 18.986391] [ 18.986689] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.986783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.986812] Hardware name: linux,dummy-virt (DT) [ 18.987551] Call trace: [ 18.987932] show_stack+0x20/0x38 (C) [ 18.988604] dump_stack_lvl+0x8c/0xd0 [ 18.988672] print_report+0x118/0x608 [ 18.989221] kasan_report+0xdc/0x128 [ 18.989739] __asan_report_load1_noabort+0x20/0x30 [ 18.990393] kmem_cache_rcu_uaf+0x388/0x468 [ 18.990455] kunit_try_run_case+0x170/0x3f0 [ 18.990512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.990565] kthread+0x328/0x630 [ 18.990615] ret_from_fork+0x10/0x20 [ 18.991937] [ 18.992511] Allocated by task 215: [ 18.992558] kasan_save_stack+0x3c/0x68 [ 18.992972] kasan_save_track+0x20/0x40 [ 18.993314] kasan_save_alloc_info+0x40/0x58 [ 18.994055] __kasan_slab_alloc+0xa8/0xb0 [ 18.994343] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.994876] kmem_cache_rcu_uaf+0x12c/0x468 [ 18.995545] kunit_try_run_case+0x170/0x3f0 [ 18.995601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.995649] kthread+0x328/0x630 [ 18.996625] ret_from_fork+0x10/0x20 [ 18.996689] [ 18.996714] Freed by task 0: [ 18.996743] kasan_save_stack+0x3c/0x68 [ 18.997192] kasan_save_track+0x20/0x40 [ 18.997243] kasan_save_free_info+0x4c/0x78 [ 18.997660] __kasan_slab_free+0x6c/0x98 [ 18.998017] slab_free_after_rcu_debug+0xd4/0x2f8 [ 18.998499] rcu_core+0x9f4/0x1e20 [ 18.998571] rcu_core_si+0x18/0x30 [ 18.998608] handle_softirqs+0x374/0xb28 [ 18.999510] __do_softirq+0x1c/0x28 [ 18.999811] [ 18.999837] Last potentially related work creation: [ 19.000166] kasan_save_stack+0x3c/0x68 [ 19.000712] kasan_record_aux_stack+0xb4/0xc8 [ 19.000769] kmem_cache_free+0x120/0x468 [ 19.001356] kmem_cache_rcu_uaf+0x16c/0x468 [ 19.001434] kunit_try_run_case+0x170/0x3f0 [ 19.001477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.001523] kthread+0x328/0x630 [ 19.001561] ret_from_fork+0x10/0x20 [ 19.002676] [ 19.002706] The buggy address belongs to the object at fff00000c6e5c000 [ 19.002706] which belongs to the cache test_cache of size 200 [ 19.003080] The buggy address is located 0 bytes inside of [ 19.003080] freed 200-byte region [fff00000c6e5c000, fff00000c6e5c0c8) [ 19.003670] [ 19.003955] The buggy address belongs to the physical page: [ 19.004535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e5c [ 19.005101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.005172] page_type: f5(slab) [ 19.005219] raw: 0bfffe0000000000 fff00000c6e5a000 dead000000000122 0000000000000000 [ 19.005272] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.005315] page dumped because: kasan: bad access detected [ 19.006502] [ 19.006981] Memory state around the buggy address: [ 19.007130] fff00000c6e5bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.007298] fff00000c6e5bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.007370] >fff00000c6e5c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.008211] ^ [ 19.008244] fff00000c6e5c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 19.008289] fff00000c6e5c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.008331] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 18.554702] ================================================================== [ 18.554831] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 18.554906] Free of addr fff00000c6e5a001 by task kunit_try_catch/213 [ 18.554951] [ 18.555153] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.555388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.555450] Hardware name: linux,dummy-virt (DT) [ 18.555487] Call trace: [ 18.555682] show_stack+0x20/0x38 (C) [ 18.555837] dump_stack_lvl+0x8c/0xd0 [ 18.556021] print_report+0x118/0x608 [ 18.556081] kasan_report_invalid_free+0xc0/0xe8 [ 18.556129] check_slab_allocation+0xfc/0x108 [ 18.556238] __kasan_slab_pre_free+0x2c/0x48 [ 18.556572] kmem_cache_free+0xf0/0x468 [ 18.556772] kmem_cache_invalid_free+0x184/0x3c8 [ 18.557134] kunit_try_run_case+0x170/0x3f0 [ 18.557817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.558065] kthread+0x328/0x630 [ 18.558474] ret_from_fork+0x10/0x20 [ 18.558597] [ 18.558619] Allocated by task 213: [ 18.558826] kasan_save_stack+0x3c/0x68 [ 18.559052] kasan_save_track+0x20/0x40 [ 18.559165] kasan_save_alloc_info+0x40/0x58 [ 18.559433] __kasan_slab_alloc+0xa8/0xb0 [ 18.559508] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.559748] kmem_cache_invalid_free+0x12c/0x3c8 [ 18.559820] kunit_try_run_case+0x170/0x3f0 [ 18.559988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.560093] kthread+0x328/0x630 [ 18.560231] ret_from_fork+0x10/0x20 [ 18.560487] [ 18.560659] The buggy address belongs to the object at fff00000c6e5a000 [ 18.560659] which belongs to the cache test_cache of size 200 [ 18.560829] The buggy address is located 1 bytes inside of [ 18.560829] 200-byte region [fff00000c6e5a000, fff00000c6e5a0c8) [ 18.560942] [ 18.561093] The buggy address belongs to the physical page: [ 18.561301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e5a [ 18.561444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.561565] page_type: f5(slab) [ 18.561727] raw: 0bfffe0000000000 fff00000c5b8bdc0 dead000000000122 0000000000000000 [ 18.561823] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.562010] page dumped because: kasan: bad access detected [ 18.562246] [ 18.562358] Memory state around the buggy address: [ 18.562441] fff00000c6e59f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.562577] fff00000c6e59f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.562653] >fff00000c6e5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.562693] ^ [ 18.562745] fff00000c6e5a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 18.563032] fff00000c6e5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.563247] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 18.518571] ================================================================== [ 18.518652] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 18.518791] Free of addr fff00000c6e57000 by task kunit_try_catch/211 [ 18.518871] [ 18.518913] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.519284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.519392] Hardware name: linux,dummy-virt (DT) [ 18.519429] Call trace: [ 18.519454] show_stack+0x20/0x38 (C) [ 18.519511] dump_stack_lvl+0x8c/0xd0 [ 18.519566] print_report+0x118/0x608 [ 18.519875] kasan_report_invalid_free+0xc0/0xe8 [ 18.519959] check_slab_allocation+0xd4/0x108 [ 18.520017] __kasan_slab_pre_free+0x2c/0x48 [ 18.520068] kmem_cache_free+0xf0/0x468 [ 18.520117] kmem_cache_double_free+0x190/0x3c8 [ 18.520167] kunit_try_run_case+0x170/0x3f0 [ 18.520249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.520305] kthread+0x328/0x630 [ 18.520509] ret_from_fork+0x10/0x20 [ 18.520635] [ 18.520745] Allocated by task 211: [ 18.520780] kasan_save_stack+0x3c/0x68 [ 18.520821] kasan_save_track+0x20/0x40 [ 18.520859] kasan_save_alloc_info+0x40/0x58 [ 18.520897] __kasan_slab_alloc+0xa8/0xb0 [ 18.521270] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.521378] kmem_cache_double_free+0x12c/0x3c8 [ 18.521453] kunit_try_run_case+0x170/0x3f0 [ 18.521537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.521622] kthread+0x328/0x630 [ 18.521677] ret_from_fork+0x10/0x20 [ 18.522042] [ 18.522121] Freed by task 211: [ 18.522190] kasan_save_stack+0x3c/0x68 [ 18.522308] kasan_save_track+0x20/0x40 [ 18.522397] kasan_save_free_info+0x4c/0x78 [ 18.522448] __kasan_slab_free+0x6c/0x98 [ 18.522486] kmem_cache_free+0x260/0x468 [ 18.522712] kmem_cache_double_free+0x140/0x3c8 [ 18.522834] kunit_try_run_case+0x170/0x3f0 [ 18.522905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.522952] kthread+0x328/0x630 [ 18.522997] ret_from_fork+0x10/0x20 [ 18.523034] [ 18.523064] The buggy address belongs to the object at fff00000c6e57000 [ 18.523064] which belongs to the cache test_cache of size 200 [ 18.523187] The buggy address is located 0 bytes inside of [ 18.523187] 200-byte region [fff00000c6e57000, fff00000c6e570c8) [ 18.523252] [ 18.523275] The buggy address belongs to the physical page: [ 18.523308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e57 [ 18.523389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.523746] page_type: f5(slab) [ 18.524014] raw: 0bfffe0000000000 fff00000c5b8bc80 dead000000000122 0000000000000000 [ 18.524126] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.524225] page dumped because: kasan: bad access detected [ 18.524295] [ 18.524315] Memory state around the buggy address: [ 18.524365] fff00000c6e56f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.524409] fff00000c6e56f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.525066] >fff00000c6e57000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.525131] ^ [ 18.525190] fff00000c6e57080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 18.525280] fff00000c6e57100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.525392] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 18.024136] ================================================================== [ 18.024201] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 18.024264] Free of addr fff00000c5cff700 by task kunit_try_catch/194 [ 18.024306] [ 18.024347] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.024790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.024890] Hardware name: linux,dummy-virt (DT) [ 18.024958] Call trace: [ 18.025009] show_stack+0x20/0x38 (C) [ 18.025059] dump_stack_lvl+0x8c/0xd0 [ 18.025108] print_report+0x118/0x608 [ 18.025152] kasan_report_invalid_free+0xc0/0xe8 [ 18.025201] check_slab_allocation+0xd4/0x108 [ 18.025377] __kasan_slab_pre_free+0x2c/0x48 [ 18.025452] kfree+0xe8/0x3c8 [ 18.025506] kfree_sensitive+0x3c/0xb0 [ 18.025553] kmalloc_double_kzfree+0x168/0x308 [ 18.025601] kunit_try_run_case+0x170/0x3f0 [ 18.025650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.025703] kthread+0x328/0x630 [ 18.025815] ret_from_fork+0x10/0x20 [ 18.025912] [ 18.025970] Allocated by task 194: [ 18.025999] kasan_save_stack+0x3c/0x68 [ 18.026066] kasan_save_track+0x20/0x40 [ 18.026145] kasan_save_alloc_info+0x40/0x58 [ 18.026212] __kasan_kmalloc+0xd4/0xd8 [ 18.026247] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.026517] kmalloc_double_kzfree+0xb8/0x308 [ 18.026598] kunit_try_run_case+0x170/0x3f0 [ 18.026639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.026710] kthread+0x328/0x630 [ 18.026787] ret_from_fork+0x10/0x20 [ 18.026875] [ 18.026925] Freed by task 194: [ 18.026971] kasan_save_stack+0x3c/0x68 [ 18.027008] kasan_save_track+0x20/0x40 [ 18.027045] kasan_save_free_info+0x4c/0x78 [ 18.027081] __kasan_slab_free+0x6c/0x98 [ 18.027118] kfree+0x214/0x3c8 [ 18.027149] kfree_sensitive+0x80/0xb0 [ 18.027265] kmalloc_double_kzfree+0x11c/0x308 [ 18.027358] kunit_try_run_case+0x170/0x3f0 [ 18.027469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.027538] kthread+0x328/0x630 [ 18.027606] ret_from_fork+0x10/0x20 [ 18.027710] [ 18.027758] The buggy address belongs to the object at fff00000c5cff700 [ 18.027758] which belongs to the cache kmalloc-16 of size 16 [ 18.027823] The buggy address is located 0 bytes inside of [ 18.027823] 16-byte region [fff00000c5cff700, fff00000c5cff710) [ 18.028063] [ 18.028141] The buggy address belongs to the physical page: [ 18.028193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff [ 18.028284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.028391] page_type: f5(slab) [ 18.028488] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.028772] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.028817] page dumped because: kasan: bad access detected [ 18.028850] [ 18.029952] Memory state around the buggy address: [ 18.030012] fff00000c5cff600: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.030068] fff00000c5cff680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.030127] >fff00000c5cff700: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.030165] ^ [ 18.030191] fff00000c5cff780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.030242] fff00000c5cff800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.030282] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 18.019078] ================================================================== [ 18.019135] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 18.019194] Read of size 1 at addr fff00000c5cff700 by task kunit_try_catch/194 [ 18.019252] [ 18.019284] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.019498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.019639] Hardware name: linux,dummy-virt (DT) [ 18.019677] Call trace: [ 18.019973] show_stack+0x20/0x38 (C) [ 18.020039] dump_stack_lvl+0x8c/0xd0 [ 18.020117] print_report+0x118/0x608 [ 18.020182] kasan_report+0xdc/0x128 [ 18.020252] __kasan_check_byte+0x54/0x70 [ 18.020360] kfree_sensitive+0x30/0xb0 [ 18.020411] kmalloc_double_kzfree+0x168/0x308 [ 18.020463] kunit_try_run_case+0x170/0x3f0 [ 18.020514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.020568] kthread+0x328/0x630 [ 18.020612] ret_from_fork+0x10/0x20 [ 18.020754] [ 18.020775] Allocated by task 194: [ 18.020874] kasan_save_stack+0x3c/0x68 [ 18.020950] kasan_save_track+0x20/0x40 [ 18.021025] kasan_save_alloc_info+0x40/0x58 [ 18.021096] __kasan_kmalloc+0xd4/0xd8 [ 18.021153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.021228] kmalloc_double_kzfree+0xb8/0x308 [ 18.021313] kunit_try_run_case+0x170/0x3f0 [ 18.021364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.021545] kthread+0x328/0x630 [ 18.021729] ret_from_fork+0x10/0x20 [ 18.021792] [ 18.021870] Freed by task 194: [ 18.021919] kasan_save_stack+0x3c/0x68 [ 18.021995] kasan_save_track+0x20/0x40 [ 18.022114] kasan_save_free_info+0x4c/0x78 [ 18.022181] __kasan_slab_free+0x6c/0x98 [ 18.022220] kfree+0x214/0x3c8 [ 18.022390] kfree_sensitive+0x80/0xb0 [ 18.022439] kmalloc_double_kzfree+0x11c/0x308 [ 18.022481] kunit_try_run_case+0x170/0x3f0 [ 18.022537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.022585] kthread+0x328/0x630 [ 18.022622] ret_from_fork+0x10/0x20 [ 18.022657] [ 18.022678] The buggy address belongs to the object at fff00000c5cff700 [ 18.022678] which belongs to the cache kmalloc-16 of size 16 [ 18.022735] The buggy address is located 0 bytes inside of [ 18.022735] freed 16-byte region [fff00000c5cff700, fff00000c5cff710) [ 18.022797] [ 18.022832] The buggy address belongs to the physical page: [ 18.022871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff [ 18.022934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.022983] page_type: f5(slab) [ 18.023024] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.023084] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.023123] page dumped because: kasan: bad access detected [ 18.023155] [ 18.023174] Memory state around the buggy address: [ 18.023214] fff00000c5cff600: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.023268] fff00000c5cff680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.023310] >fff00000c5cff700: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.023364] ^ [ 18.023406] fff00000c5cff780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.023456] fff00000c5cff800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.023494] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 17.997987] ================================================================== [ 17.998118] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 17.998203] Read of size 1 at addr fff00000c638a728 by task kunit_try_catch/190 [ 17.998255] [ 17.998353] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.998472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.998546] Hardware name: linux,dummy-virt (DT) [ 17.998594] Call trace: [ 17.998634] show_stack+0x20/0x38 (C) [ 17.998687] dump_stack_lvl+0x8c/0xd0 [ 17.998743] print_report+0x118/0x608 [ 17.998991] kasan_report+0xdc/0x128 [ 17.999149] __asan_report_load1_noabort+0x20/0x30 [ 17.999214] kmalloc_uaf2+0x3f4/0x468 [ 17.999279] kunit_try_run_case+0x170/0x3f0 [ 17.999348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.999454] kthread+0x328/0x630 [ 17.999521] ret_from_fork+0x10/0x20 [ 17.999587] [ 17.999672] Allocated by task 190: [ 17.999709] kasan_save_stack+0x3c/0x68 [ 17.999767] kasan_save_track+0x20/0x40 [ 17.999958] kasan_save_alloc_info+0x40/0x58 [ 18.000004] __kasan_kmalloc+0xd4/0xd8 [ 18.000142] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.000185] kmalloc_uaf2+0xc4/0x468 [ 18.000230] kunit_try_run_case+0x170/0x3f0 [ 18.000360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.000456] kthread+0x328/0x630 [ 18.000537] ret_from_fork+0x10/0x20 [ 18.000623] [ 18.000681] Freed by task 190: [ 18.000756] kasan_save_stack+0x3c/0x68 [ 18.000880] kasan_save_track+0x20/0x40 [ 18.000963] kasan_save_free_info+0x4c/0x78 [ 18.001002] __kasan_slab_free+0x6c/0x98 [ 18.001169] kfree+0x214/0x3c8 [ 18.001441] kmalloc_uaf2+0x134/0x468 [ 18.001632] kunit_try_run_case+0x170/0x3f0 [ 18.001719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.001865] kthread+0x328/0x630 [ 18.001942] ret_from_fork+0x10/0x20 [ 18.002022] [ 18.002110] The buggy address belongs to the object at fff00000c638a700 [ 18.002110] which belongs to the cache kmalloc-64 of size 64 [ 18.002212] The buggy address is located 40 bytes inside of [ 18.002212] freed 64-byte region [fff00000c638a700, fff00000c638a740) [ 18.002277] [ 18.002298] The buggy address belongs to the physical page: [ 18.002561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a [ 18.002687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.002756] page_type: f5(slab) [ 18.002795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.002914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.002957] page dumped because: kasan: bad access detected [ 18.002988] [ 18.003021] Memory state around the buggy address: [ 18.003064] fff00000c638a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.003108] fff00000c638a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.003150] >fff00000c638a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.003189] ^ [ 18.003222] fff00000c638a780: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 18.003275] fff00000c638a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.003313] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 17.977304] ================================================================== [ 17.977569] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 17.977664] Write of size 33 at addr fff00000c638a580 by task kunit_try_catch/188 [ 17.978010] [ 17.978106] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.978363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.978576] Hardware name: linux,dummy-virt (DT) [ 17.978692] Call trace: [ 17.978953] show_stack+0x20/0x38 (C) [ 17.979120] dump_stack_lvl+0x8c/0xd0 [ 17.979401] print_report+0x118/0x608 [ 17.979573] kasan_report+0xdc/0x128 [ 17.979630] kasan_check_range+0x100/0x1a8 [ 17.979879] __asan_memset+0x34/0x78 [ 17.980112] kmalloc_uaf_memset+0x170/0x310 [ 17.980169] kunit_try_run_case+0x170/0x3f0 [ 17.980581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.980643] kthread+0x328/0x630 [ 17.980694] ret_from_fork+0x10/0x20 [ 17.980741] [ 17.980760] Allocated by task 188: [ 17.980821] kasan_save_stack+0x3c/0x68 [ 17.980861] kasan_save_track+0x20/0x40 [ 17.981040] kasan_save_alloc_info+0x40/0x58 [ 17.981348] __kasan_kmalloc+0xd4/0xd8 [ 17.981407] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.981449] kmalloc_uaf_memset+0xb8/0x310 [ 17.981636] kunit_try_run_case+0x170/0x3f0 [ 17.981864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.981946] kthread+0x328/0x630 [ 17.981983] ret_from_fork+0x10/0x20 [ 17.982020] [ 17.982039] Freed by task 188: [ 17.982068] kasan_save_stack+0x3c/0x68 [ 17.982114] kasan_save_track+0x20/0x40 [ 17.982150] kasan_save_free_info+0x4c/0x78 [ 17.982358] __kasan_slab_free+0x6c/0x98 [ 17.982574] kfree+0x214/0x3c8 [ 17.982638] kmalloc_uaf_memset+0x11c/0x310 [ 17.982940] kunit_try_run_case+0x170/0x3f0 [ 17.983115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.983163] kthread+0x328/0x630 [ 17.983351] ret_from_fork+0x10/0x20 [ 17.983621] [ 17.983702] The buggy address belongs to the object at fff00000c638a580 [ 17.983702] which belongs to the cache kmalloc-64 of size 64 [ 17.983779] The buggy address is located 0 bytes inside of [ 17.983779] freed 64-byte region [fff00000c638a580, fff00000c638a5c0) [ 17.983841] [ 17.983861] The buggy address belongs to the physical page: [ 17.983897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a [ 17.984034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.984198] page_type: f5(slab) [ 17.984287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.984346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.984388] page dumped because: kasan: bad access detected [ 17.984732] [ 17.984756] Memory state around the buggy address: [ 17.984789] fff00000c638a480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.985029] fff00000c638a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.985085] >fff00000c638a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.985312] ^ [ 17.985517] fff00000c638a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.985597] fff00000c638a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.986456] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 17.947328] ================================================================== [ 17.947457] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 17.947688] Read of size 64 at addr fff00000c638a104 by task kunit_try_catch/184 [ 17.947914] [ 17.948064] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.948232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.948259] Hardware name: linux,dummy-virt (DT) [ 17.948290] Call trace: [ 17.948673] show_stack+0x20/0x38 (C) [ 17.948759] dump_stack_lvl+0x8c/0xd0 [ 17.948904] print_report+0x118/0x608 [ 17.949054] kasan_report+0xdc/0x128 [ 17.949151] kasan_check_range+0x100/0x1a8 [ 17.949259] __asan_memmove+0x3c/0x98 [ 17.949403] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 17.949478] kunit_try_run_case+0x170/0x3f0 [ 17.949550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.949603] kthread+0x328/0x630 [ 17.949650] ret_from_fork+0x10/0x20 [ 17.949827] [ 17.949853] Allocated by task 184: [ 17.949883] kasan_save_stack+0x3c/0x68 [ 17.949924] kasan_save_track+0x20/0x40 [ 17.949960] kasan_save_alloc_info+0x40/0x58 [ 17.950000] __kasan_kmalloc+0xd4/0xd8 [ 17.950037] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.950134] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 17.950210] kunit_try_run_case+0x170/0x3f0 [ 17.950261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.950352] kthread+0x328/0x630 [ 17.950481] ret_from_fork+0x10/0x20 [ 17.950571] [ 17.950591] The buggy address belongs to the object at fff00000c638a100 [ 17.950591] which belongs to the cache kmalloc-64 of size 64 [ 17.950649] The buggy address is located 4 bytes inside of [ 17.950649] allocated 64-byte region [fff00000c638a100, fff00000c638a140) [ 17.950711] [ 17.950731] The buggy address belongs to the physical page: [ 17.950817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a [ 17.950990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.951043] page_type: f5(slab) [ 17.951082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.951139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.951225] page dumped because: kasan: bad access detected [ 17.951275] [ 17.951293] Memory state around the buggy address: [ 17.951325] fff00000c638a000: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.951400] fff00000c638a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.951461] >fff00000c638a100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 17.951557] ^ [ 17.951610] fff00000c638a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.951731] fff00000c638a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.951770] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 17.930752] ================================================================== [ 17.930824] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.931012] Read of size 18446744073709551614 at addr fff00000c63d1f04 by task kunit_try_catch/182 [ 17.931287] [ 17.931668] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.931909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.932161] Hardware name: linux,dummy-virt (DT) [ 17.932192] Call trace: [ 17.932215] show_stack+0x20/0x38 (C) [ 17.932269] dump_stack_lvl+0x8c/0xd0 [ 17.933100] print_report+0x118/0x608 [ 17.933303] kasan_report+0xdc/0x128 [ 17.933405] kasan_check_range+0x100/0x1a8 [ 17.933580] __asan_memmove+0x3c/0x98 [ 17.933661] kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.933722] kunit_try_run_case+0x170/0x3f0 [ 17.933770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.933918] kthread+0x328/0x630 [ 17.934169] ret_from_fork+0x10/0x20 [ 17.934472] [ 17.934987] Allocated by task 182: [ 17.935281] kasan_save_stack+0x3c/0x68 [ 17.935376] kasan_save_track+0x20/0x40 [ 17.935650] kasan_save_alloc_info+0x40/0x58 [ 17.935825] __kasan_kmalloc+0xd4/0xd8 [ 17.935865] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.935905] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 17.935967] kunit_try_run_case+0x170/0x3f0 [ 17.936365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.936414] kthread+0x328/0x630 [ 17.936580] ret_from_fork+0x10/0x20 [ 17.936625] [ 17.936780] The buggy address belongs to the object at fff00000c63d1f00 [ 17.936780] which belongs to the cache kmalloc-64 of size 64 [ 17.936901] The buggy address is located 4 bytes inside of [ 17.936901] 64-byte region [fff00000c63d1f00, fff00000c63d1f40) [ 17.936962] [ 17.937176] The buggy address belongs to the physical page: [ 17.937218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1 [ 17.937274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.937536] page_type: f5(slab) [ 17.937722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.937843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.938183] page dumped because: kasan: bad access detected [ 17.938297] [ 17.938316] Memory state around the buggy address: [ 17.938359] fff00000c63d1e00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 17.938405] fff00000c63d1e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.938654] >fff00000c63d1f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 17.938707] ^ [ 17.938736] fff00000c63d1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.938896] fff00000c63d2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.938942] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 17.919638] ================================================================== [ 17.919910] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 17.919966] Write of size 16 at addr fff00000c63d6569 by task kunit_try_catch/180 [ 17.920154] [ 17.920489] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.920826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.920853] Hardware name: linux,dummy-virt (DT) [ 17.920910] Call trace: [ 17.920933] show_stack+0x20/0x38 (C) [ 17.920984] dump_stack_lvl+0x8c/0xd0 [ 17.921030] print_report+0x118/0x608 [ 17.921113] kasan_report+0xdc/0x128 [ 17.921182] kasan_check_range+0x100/0x1a8 [ 17.921489] __asan_memset+0x34/0x78 [ 17.921573] kmalloc_oob_memset_16+0x150/0x2f8 [ 17.921645] kunit_try_run_case+0x170/0x3f0 [ 17.921693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.921744] kthread+0x328/0x630 [ 17.922018] ret_from_fork+0x10/0x20 [ 17.922098] [ 17.922116] Allocated by task 180: [ 17.922182] kasan_save_stack+0x3c/0x68 [ 17.922275] kasan_save_track+0x20/0x40 [ 17.922329] kasan_save_alloc_info+0x40/0x58 [ 17.922385] __kasan_kmalloc+0xd4/0xd8 [ 17.922455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.922493] kmalloc_oob_memset_16+0xb0/0x2f8 [ 17.922810] kunit_try_run_case+0x170/0x3f0 [ 17.923010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.923149] kthread+0x328/0x630 [ 17.923204] ret_from_fork+0x10/0x20 [ 17.923258] [ 17.923285] The buggy address belongs to the object at fff00000c63d6500 [ 17.923285] which belongs to the cache kmalloc-128 of size 128 [ 17.923380] The buggy address is located 105 bytes inside of [ 17.923380] allocated 120-byte region [fff00000c63d6500, fff00000c63d6578) [ 17.923493] [ 17.923587] The buggy address belongs to the physical page: [ 17.923670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 17.923726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.923875] page_type: f5(slab) [ 17.923971] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.924040] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.924078] page dumped because: kasan: bad access detected [ 17.924154] [ 17.924173] Memory state around the buggy address: [ 17.924203] fff00000c63d6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.924292] fff00000c63d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.924341] >fff00000c63d6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.924377] ^ [ 17.924414] fff00000c63d6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.924454] fff00000c63d6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.924490] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 17.906364] ================================================================== [ 17.906517] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 17.906649] Write of size 8 at addr fff00000c63d6471 by task kunit_try_catch/178 [ 17.906861] [ 17.906903] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.907190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.907255] Hardware name: linux,dummy-virt (DT) [ 17.907285] Call trace: [ 17.907308] show_stack+0x20/0x38 (C) [ 17.907372] dump_stack_lvl+0x8c/0xd0 [ 17.907562] print_report+0x118/0x608 [ 17.907640] kasan_report+0xdc/0x128 [ 17.907692] kasan_check_range+0x100/0x1a8 [ 17.907830] __asan_memset+0x34/0x78 [ 17.907874] kmalloc_oob_memset_8+0x150/0x2f8 [ 17.907924] kunit_try_run_case+0x170/0x3f0 [ 17.907971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.908152] kthread+0x328/0x630 [ 17.908285] ret_from_fork+0x10/0x20 [ 17.908485] [ 17.908510] Allocated by task 178: [ 17.908800] kasan_save_stack+0x3c/0x68 [ 17.908869] kasan_save_track+0x20/0x40 [ 17.908905] kasan_save_alloc_info+0x40/0x58 [ 17.908943] __kasan_kmalloc+0xd4/0xd8 [ 17.909403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.909453] kmalloc_oob_memset_8+0xb0/0x2f8 [ 17.909705] kunit_try_run_case+0x170/0x3f0 [ 17.909893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.910019] kthread+0x328/0x630 [ 17.910061] ret_from_fork+0x10/0x20 [ 17.910130] [ 17.910188] The buggy address belongs to the object at fff00000c63d6400 [ 17.910188] which belongs to the cache kmalloc-128 of size 128 [ 17.910256] The buggy address is located 113 bytes inside of [ 17.910256] allocated 120-byte region [fff00000c63d6400, fff00000c63d6478) [ 17.910543] [ 17.910567] The buggy address belongs to the physical page: [ 17.910610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 17.910708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.910883] page_type: f5(slab) [ 17.910962] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.911143] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.911240] page dumped because: kasan: bad access detected [ 17.911271] [ 17.911289] Memory state around the buggy address: [ 17.911448] fff00000c63d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.911561] fff00000c63d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.911697] >fff00000c63d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.911737] ^ [ 17.911776] fff00000c63d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.911939] fff00000c63d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.912064] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 17.890258] ================================================================== [ 17.890546] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 17.890614] Write of size 4 at addr fff00000c63d6375 by task kunit_try_catch/176 [ 17.890662] [ 17.890691] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.890770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.890795] Hardware name: linux,dummy-virt (DT) [ 17.890824] Call trace: [ 17.890853] show_stack+0x20/0x38 (C) [ 17.890900] dump_stack_lvl+0x8c/0xd0 [ 17.890946] print_report+0x118/0x608 [ 17.890990] kasan_report+0xdc/0x128 [ 17.891033] kasan_check_range+0x100/0x1a8 [ 17.891078] __asan_memset+0x34/0x78 [ 17.891122] kmalloc_oob_memset_4+0x150/0x300 [ 17.891182] kunit_try_run_case+0x170/0x3f0 [ 17.891230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.891555] kthread+0x328/0x630 [ 17.891734] ret_from_fork+0x10/0x20 [ 17.892273] [ 17.892302] Allocated by task 176: [ 17.892331] kasan_save_stack+0x3c/0x68 [ 17.892387] kasan_save_track+0x20/0x40 [ 17.892562] kasan_save_alloc_info+0x40/0x58 [ 17.892606] __kasan_kmalloc+0xd4/0xd8 [ 17.892641] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.892701] kmalloc_oob_memset_4+0xb0/0x300 [ 17.892741] kunit_try_run_case+0x170/0x3f0 [ 17.892813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.892857] kthread+0x328/0x630 [ 17.892892] ret_from_fork+0x10/0x20 [ 17.892927] [ 17.892946] The buggy address belongs to the object at fff00000c63d6300 [ 17.892946] which belongs to the cache kmalloc-128 of size 128 [ 17.893135] The buggy address is located 117 bytes inside of [ 17.893135] allocated 120-byte region [fff00000c63d6300, fff00000c63d6378) [ 17.893355] [ 17.893422] The buggy address belongs to the physical page: [ 17.893487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 17.893610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.893752] page_type: f5(slab) [ 17.893849] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.893919] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.893958] page dumped because: kasan: bad access detected [ 17.894007] [ 17.894080] Memory state around the buggy address: [ 17.894110] fff00000c63d6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.894242] fff00000c63d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.894284] >fff00000c63d6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.894639] ^ [ 17.894889] fff00000c63d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.894969] fff00000c63d6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.895006] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 17.876137] ================================================================== [ 17.876408] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 17.876463] Write of size 2 at addr fff00000c63d6277 by task kunit_try_catch/174 [ 17.876511] [ 17.876564] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.876646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.876671] Hardware name: linux,dummy-virt (DT) [ 17.876701] Call trace: [ 17.876723] show_stack+0x20/0x38 (C) [ 17.876901] dump_stack_lvl+0x8c/0xd0 [ 17.877143] print_report+0x118/0x608 [ 17.877194] kasan_report+0xdc/0x128 [ 17.877238] kasan_check_range+0x100/0x1a8 [ 17.877283] __asan_memset+0x34/0x78 [ 17.877328] kmalloc_oob_memset_2+0x150/0x2f8 [ 17.877399] kunit_try_run_case+0x170/0x3f0 [ 17.877446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.877787] kthread+0x328/0x630 [ 17.877839] ret_from_fork+0x10/0x20 [ 17.877887] [ 17.878171] Allocated by task 174: [ 17.878215] kasan_save_stack+0x3c/0x68 [ 17.878256] kasan_save_track+0x20/0x40 [ 17.878293] kasan_save_alloc_info+0x40/0x58 [ 17.878330] __kasan_kmalloc+0xd4/0xd8 [ 17.878387] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.878426] kmalloc_oob_memset_2+0xb0/0x2f8 [ 17.878624] kunit_try_run_case+0x170/0x3f0 [ 17.878826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.879188] kthread+0x328/0x630 [ 17.879297] ret_from_fork+0x10/0x20 [ 17.879346] [ 17.879376] The buggy address belongs to the object at fff00000c63d6200 [ 17.879376] which belongs to the cache kmalloc-128 of size 128 [ 17.879516] The buggy address is located 119 bytes inside of [ 17.879516] allocated 120-byte region [fff00000c63d6200, fff00000c63d6278) [ 17.879576] [ 17.879596] The buggy address belongs to the physical page: [ 17.879660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 17.879992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.880085] page_type: f5(slab) [ 17.880129] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.880177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.880223] page dumped because: kasan: bad access detected [ 17.880375] [ 17.880609] Memory state around the buggy address: [ 17.880669] fff00000c63d6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.880735] fff00000c63d6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.880779] >fff00000c63d6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.880839] ^ [ 17.880879] fff00000c63d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.880951] fff00000c63d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.880989] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 17.861775] ================================================================== [ 17.861998] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 17.862052] Write of size 128 at addr fff00000c63d6100 by task kunit_try_catch/172 [ 17.862294] [ 17.862430] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.862624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.862687] Hardware name: linux,dummy-virt (DT) [ 17.862720] Call trace: [ 17.862744] show_stack+0x20/0x38 (C) [ 17.862824] dump_stack_lvl+0x8c/0xd0 [ 17.862881] print_report+0x118/0x608 [ 17.862925] kasan_report+0xdc/0x128 [ 17.863113] kasan_check_range+0x100/0x1a8 [ 17.863378] __asan_memset+0x34/0x78 [ 17.863473] kmalloc_oob_in_memset+0x144/0x2d0 [ 17.863521] kunit_try_run_case+0x170/0x3f0 [ 17.863576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.863651] kthread+0x328/0x630 [ 17.863844] ret_from_fork+0x10/0x20 [ 17.863976] [ 17.863995] Allocated by task 172: [ 17.864253] kasan_save_stack+0x3c/0x68 [ 17.864304] kasan_save_track+0x20/0x40 [ 17.864455] kasan_save_alloc_info+0x40/0x58 [ 17.864594] __kasan_kmalloc+0xd4/0xd8 [ 17.864635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.864674] kmalloc_oob_in_memset+0xb0/0x2d0 [ 17.864713] kunit_try_run_case+0x170/0x3f0 [ 17.864751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.864794] kthread+0x328/0x630 [ 17.864830] ret_from_fork+0x10/0x20 [ 17.864866] [ 17.864886] The buggy address belongs to the object at fff00000c63d6100 [ 17.864886] which belongs to the cache kmalloc-128 of size 128 [ 17.864941] The buggy address is located 0 bytes inside of [ 17.864941] allocated 120-byte region [fff00000c63d6100, fff00000c63d6178) [ 17.865294] [ 17.865319] The buggy address belongs to the physical page: [ 17.865396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 17.865453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.865580] page_type: f5(slab) [ 17.865642] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.865708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.865776] page dumped because: kasan: bad access detected [ 17.865860] [ 17.865878] Memory state around the buggy address: [ 17.865915] fff00000c63d6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.866086] fff00000c63d6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.866144] >fff00000c63d6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.866237] ^ [ 17.866277] fff00000c63d6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.866323] fff00000c63d6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.866469] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 17.843969] ================================================================== [ 17.844023] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 17.844074] Read of size 16 at addr fff00000c5cff6e0 by task kunit_try_catch/170 [ 17.844122] [ 17.844161] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.844318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.844357] Hardware name: linux,dummy-virt (DT) [ 17.844387] Call trace: [ 17.844500] show_stack+0x20/0x38 (C) [ 17.844596] dump_stack_lvl+0x8c/0xd0 [ 17.844914] print_report+0x118/0x608 [ 17.844962] kasan_report+0xdc/0x128 [ 17.845007] __asan_report_load16_noabort+0x20/0x30 [ 17.845059] kmalloc_uaf_16+0x3bc/0x438 [ 17.845106] kunit_try_run_case+0x170/0x3f0 [ 17.845450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.845560] kthread+0x328/0x630 [ 17.845767] ret_from_fork+0x10/0x20 [ 17.845821] [ 17.845952] Allocated by task 170: [ 17.845981] kasan_save_stack+0x3c/0x68 [ 17.846068] kasan_save_track+0x20/0x40 [ 17.846472] kasan_save_alloc_info+0x40/0x58 [ 17.846522] __kasan_kmalloc+0xd4/0xd8 [ 17.846559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.846608] kmalloc_uaf_16+0x140/0x438 [ 17.846745] kunit_try_run_case+0x170/0x3f0 [ 17.846783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.846825] kthread+0x328/0x630 [ 17.846892] ret_from_fork+0x10/0x20 [ 17.846927] [ 17.846946] Freed by task 170: [ 17.847028] kasan_save_stack+0x3c/0x68 [ 17.847065] kasan_save_track+0x20/0x40 [ 17.847099] kasan_save_free_info+0x4c/0x78 [ 17.847136] __kasan_slab_free+0x6c/0x98 [ 17.847171] kfree+0x214/0x3c8 [ 17.847202] kmalloc_uaf_16+0x190/0x438 [ 17.847239] kunit_try_run_case+0x170/0x3f0 [ 17.847276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.847318] kthread+0x328/0x630 [ 17.847365] ret_from_fork+0x10/0x20 [ 17.847740] [ 17.847798] The buggy address belongs to the object at fff00000c5cff6e0 [ 17.847798] which belongs to the cache kmalloc-16 of size 16 [ 17.847855] The buggy address is located 0 bytes inside of [ 17.847855] freed 16-byte region [fff00000c5cff6e0, fff00000c5cff6f0) [ 17.847913] [ 17.847933] The buggy address belongs to the physical page: [ 17.847968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff [ 17.848194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.848270] page_type: f5(slab) [ 17.848358] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.848555] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.849155] page dumped because: kasan: bad access detected [ 17.849198] [ 17.849230] Memory state around the buggy address: [ 17.849263] fff00000c5cff580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.849327] fff00000c5cff600: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.849380] >fff00000c5cff680: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 17.849614] ^ [ 17.849692] fff00000c5cff700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.849810] fff00000c5cff780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.849858] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 17.831179] ================================================================== [ 17.831241] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 17.831292] Write of size 16 at addr fff00000c5cff680 by task kunit_try_catch/168 [ 17.831354] [ 17.831384] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.832031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.832085] Hardware name: linux,dummy-virt (DT) [ 17.832319] Call trace: [ 17.832595] show_stack+0x20/0x38 (C) [ 17.833016] dump_stack_lvl+0x8c/0xd0 [ 17.833114] print_report+0x118/0x608 [ 17.833160] kasan_report+0xdc/0x128 [ 17.833314] __asan_report_store16_noabort+0x20/0x30 [ 17.833385] kmalloc_oob_16+0x3a0/0x3f8 [ 17.833634] kunit_try_run_case+0x170/0x3f0 [ 17.833707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.833850] kthread+0x328/0x630 [ 17.833927] ret_from_fork+0x10/0x20 [ 17.834005] [ 17.834025] Allocated by task 168: [ 17.834069] kasan_save_stack+0x3c/0x68 [ 17.834109] kasan_save_track+0x20/0x40 [ 17.834144] kasan_save_alloc_info+0x40/0x58 [ 17.834181] __kasan_kmalloc+0xd4/0xd8 [ 17.834215] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.834635] kmalloc_oob_16+0xb4/0x3f8 [ 17.834693] kunit_try_run_case+0x170/0x3f0 [ 17.835000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.835056] kthread+0x328/0x630 [ 17.835129] ret_from_fork+0x10/0x20 [ 17.835165] [ 17.835185] The buggy address belongs to the object at fff00000c5cff680 [ 17.835185] which belongs to the cache kmalloc-16 of size 16 [ 17.835240] The buggy address is located 0 bytes inside of [ 17.835240] allocated 13-byte region [fff00000c5cff680, fff00000c5cff68d) [ 17.835310] [ 17.835418] The buggy address belongs to the physical page: [ 17.835448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff [ 17.835499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.835547] page_type: f5(slab) [ 17.835671] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.835940] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.836168] page dumped because: kasan: bad access detected [ 17.836309] [ 17.836329] Memory state around the buggy address: [ 17.836400] fff00000c5cff580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.836442] fff00000c5cff600: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.836483] >fff00000c5cff680: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.836665] ^ [ 17.836702] fff00000c5cff700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.836818] fff00000c5cff780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.836855] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 17.816702] ================================================================== [ 17.816749] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 17.816793] Read of size 1 at addr fff00000c4480e00 by task kunit_try_catch/166 [ 17.816841] [ 17.816869] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.816946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.816972] Hardware name: linux,dummy-virt (DT) [ 17.817002] Call trace: [ 17.817024] show_stack+0x20/0x38 (C) [ 17.817070] dump_stack_lvl+0x8c/0xd0 [ 17.817116] print_report+0x118/0x608 [ 17.817160] kasan_report+0xdc/0x128 [ 17.817205] __asan_report_load1_noabort+0x20/0x30 [ 17.817281] krealloc_uaf+0x4c8/0x520 [ 17.817516] kunit_try_run_case+0x170/0x3f0 [ 17.817726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.817974] kthread+0x328/0x630 [ 17.818143] ret_from_fork+0x10/0x20 [ 17.818241] [ 17.818331] Allocated by task 166: [ 17.818369] kasan_save_stack+0x3c/0x68 [ 17.818407] kasan_save_track+0x20/0x40 [ 17.818635] kasan_save_alloc_info+0x40/0x58 [ 17.818701] __kasan_kmalloc+0xd4/0xd8 [ 17.818736] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.818772] krealloc_uaf+0xc8/0x520 [ 17.818804] kunit_try_run_case+0x170/0x3f0 [ 17.818847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.818889] kthread+0x328/0x630 [ 17.818924] ret_from_fork+0x10/0x20 [ 17.819435] [ 17.819470] Freed by task 166: [ 17.819693] kasan_save_stack+0x3c/0x68 [ 17.819735] kasan_save_track+0x20/0x40 [ 17.819778] kasan_save_free_info+0x4c/0x78 [ 17.819994] __kasan_slab_free+0x6c/0x98 [ 17.820240] kfree+0x214/0x3c8 [ 17.820410] krealloc_uaf+0x12c/0x520 [ 17.820475] kunit_try_run_case+0x170/0x3f0 [ 17.820620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.820685] kthread+0x328/0x630 [ 17.820737] ret_from_fork+0x10/0x20 [ 17.820771] [ 17.820790] The buggy address belongs to the object at fff00000c4480e00 [ 17.820790] which belongs to the cache kmalloc-256 of size 256 [ 17.820861] The buggy address is located 0 bytes inside of [ 17.820861] freed 256-byte region [fff00000c4480e00, fff00000c4480f00) [ 17.820986] [ 17.821050] The buggy address belongs to the physical page: [ 17.821152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.821222] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.821267] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.821353] page_type: f5(slab) [ 17.821458] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.821522] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.821569] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.821616] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.821663] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.821709] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.821747] page dumped because: kasan: bad access detected [ 17.821776] [ 17.821794] Memory state around the buggy address: [ 17.821823] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.821919] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.821982] >fff00000c4480e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.822111] ^ [ 17.822159] fff00000c4480e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.822227] fff00000c4480f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.822309] ================================================================== [ 17.809781] ================================================================== [ 17.809842] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 17.809892] Read of size 1 at addr fff00000c4480e00 by task kunit_try_catch/166 [ 17.809939] [ 17.809969] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.810049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.810251] Hardware name: linux,dummy-virt (DT) [ 17.810475] Call trace: [ 17.810506] show_stack+0x20/0x38 (C) [ 17.810821] dump_stack_lvl+0x8c/0xd0 [ 17.810881] print_report+0x118/0x608 [ 17.810924] kasan_report+0xdc/0x128 [ 17.810967] __kasan_check_byte+0x54/0x70 [ 17.811010] krealloc_noprof+0x44/0x360 [ 17.811065] krealloc_uaf+0x180/0x520 [ 17.811226] kunit_try_run_case+0x170/0x3f0 [ 17.811274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.811382] kthread+0x328/0x630 [ 17.811595] ret_from_fork+0x10/0x20 [ 17.811903] [ 17.811923] Allocated by task 166: [ 17.811972] kasan_save_stack+0x3c/0x68 [ 17.812088] kasan_save_track+0x20/0x40 [ 17.812125] kasan_save_alloc_info+0x40/0x58 [ 17.812162] __kasan_kmalloc+0xd4/0xd8 [ 17.812197] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.812270] krealloc_uaf+0xc8/0x520 [ 17.812517] kunit_try_run_case+0x170/0x3f0 [ 17.812606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.812650] kthread+0x328/0x630 [ 17.812685] ret_from_fork+0x10/0x20 [ 17.812721] [ 17.812740] Freed by task 166: [ 17.812766] kasan_save_stack+0x3c/0x68 [ 17.812856] kasan_save_track+0x20/0x40 [ 17.812892] kasan_save_free_info+0x4c/0x78 [ 17.812930] __kasan_slab_free+0x6c/0x98 [ 17.812966] kfree+0x214/0x3c8 [ 17.812997] krealloc_uaf+0x12c/0x520 [ 17.813348] kunit_try_run_case+0x170/0x3f0 [ 17.813438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.813488] kthread+0x328/0x630 [ 17.813524] ret_from_fork+0x10/0x20 [ 17.813560] [ 17.813579] The buggy address belongs to the object at fff00000c4480e00 [ 17.813579] which belongs to the cache kmalloc-256 of size 256 [ 17.813672] The buggy address is located 0 bytes inside of [ 17.813672] freed 256-byte region [fff00000c4480e00, fff00000c4480f00) [ 17.813733] [ 17.813752] The buggy address belongs to the physical page: [ 17.813785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.813833] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.813891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.813940] page_type: f5(slab) [ 17.814276] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.814426] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.814475] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.814522] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.814569] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.814849] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.815221] page dumped because: kasan: bad access detected [ 17.815316] [ 17.815345] Memory state around the buggy address: [ 17.815376] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.815427] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.815519] >fff00000c4480e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.815556] ^ [ 17.815593] fff00000c4480e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.815633] fff00000c4480f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.815669] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 17.752830] ================================================================== [ 17.753015] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.753090] Write of size 1 at addr fff00000c4480ceb by task kunit_try_catch/160 [ 17.753157] [ 17.753205] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.753282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.753357] Hardware name: linux,dummy-virt (DT) [ 17.753433] Call trace: [ 17.753462] show_stack+0x20/0x38 (C) [ 17.753526] dump_stack_lvl+0x8c/0xd0 [ 17.753573] print_report+0x118/0x608 [ 17.753617] kasan_report+0xdc/0x128 [ 17.753660] __asan_report_store1_noabort+0x20/0x30 [ 17.753709] krealloc_less_oob_helper+0xa58/0xc50 [ 17.753754] krealloc_less_oob+0x20/0x38 [ 17.754394] kunit_try_run_case+0x170/0x3f0 [ 17.754457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.754527] kthread+0x328/0x630 [ 17.754599] ret_from_fork+0x10/0x20 [ 17.754666] [ 17.754685] Allocated by task 160: [ 17.754711] kasan_save_stack+0x3c/0x68 [ 17.754749] kasan_save_track+0x20/0x40 [ 17.754783] kasan_save_alloc_info+0x40/0x58 [ 17.754855] __kasan_krealloc+0x118/0x178 [ 17.754890] krealloc_noprof+0x128/0x360 [ 17.754924] krealloc_less_oob_helper+0x168/0xc50 [ 17.754962] krealloc_less_oob+0x20/0x38 [ 17.755076] kunit_try_run_case+0x170/0x3f0 [ 17.755121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.755203] kthread+0x328/0x630 [ 17.755240] ret_from_fork+0x10/0x20 [ 17.755274] [ 17.755293] The buggy address belongs to the object at fff00000c4480c00 [ 17.755293] which belongs to the cache kmalloc-256 of size 256 [ 17.755427] The buggy address is located 34 bytes to the right of [ 17.755427] allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9) [ 17.755570] [ 17.755630] The buggy address belongs to the physical page: [ 17.755678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.755747] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.755792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.755858] page_type: f5(slab) [ 17.755974] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.756024] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.756071] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.756194] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.756355] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.756433] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.756530] page dumped because: kasan: bad access detected [ 17.756605] [ 17.756676] Memory state around the buggy address: [ 17.756718] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.756759] fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.756815] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.756851] ^ [ 17.756889] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.756928] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.756965] ================================================================== [ 17.789767] ================================================================== [ 17.789935] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.790184] Write of size 1 at addr fff00000c784a0da by task kunit_try_catch/164 [ 17.790531] [ 17.790622] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.790701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.790727] Hardware name: linux,dummy-virt (DT) [ 17.790766] Call trace: [ 17.790875] show_stack+0x20/0x38 (C) [ 17.790930] dump_stack_lvl+0x8c/0xd0 [ 17.791000] print_report+0x118/0x608 [ 17.791130] kasan_report+0xdc/0x128 [ 17.791173] __asan_report_store1_noabort+0x20/0x30 [ 17.791221] krealloc_less_oob_helper+0xa80/0xc50 [ 17.791267] krealloc_large_less_oob+0x20/0x38 [ 17.791311] kunit_try_run_case+0x170/0x3f0 [ 17.791368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.791420] kthread+0x328/0x630 [ 17.791464] ret_from_fork+0x10/0x20 [ 17.791510] [ 17.791659] The buggy address belongs to the physical page: [ 17.791697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.792085] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.792305] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.792366] page_type: f8(unknown) [ 17.792404] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.792452] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.792499] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.792973] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.793045] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.793135] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.793174] page dumped because: kasan: bad access detected [ 17.793204] [ 17.793222] Memory state around the buggy address: [ 17.793531] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.793623] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.793786] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.793847] ^ [ 17.793896] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.794017] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.794053] ================================================================== [ 17.736086] ================================================================== [ 17.736146] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.736406] Write of size 1 at addr fff00000c4480cd0 by task kunit_try_catch/160 [ 17.736541] [ 17.736833] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.736981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.737086] Hardware name: linux,dummy-virt (DT) [ 17.737148] Call trace: [ 17.737307] show_stack+0x20/0x38 (C) [ 17.737538] dump_stack_lvl+0x8c/0xd0 [ 17.737701] print_report+0x118/0x608 [ 17.737799] kasan_report+0xdc/0x128 [ 17.737950] __asan_report_store1_noabort+0x20/0x30 [ 17.738071] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.738204] krealloc_less_oob+0x20/0x38 [ 17.738279] kunit_try_run_case+0x170/0x3f0 [ 17.738371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.738682] kthread+0x328/0x630 [ 17.738760] ret_from_fork+0x10/0x20 [ 17.738931] [ 17.739028] Allocated by task 160: [ 17.739131] kasan_save_stack+0x3c/0x68 [ 17.739221] kasan_save_track+0x20/0x40 [ 17.739275] kasan_save_alloc_info+0x40/0x58 [ 17.739621] __kasan_krealloc+0x118/0x178 [ 17.739691] krealloc_noprof+0x128/0x360 [ 17.739744] krealloc_less_oob_helper+0x168/0xc50 [ 17.739858] krealloc_less_oob+0x20/0x38 [ 17.739913] kunit_try_run_case+0x170/0x3f0 [ 17.739957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.740008] kthread+0x328/0x630 [ 17.740045] ret_from_fork+0x10/0x20 [ 17.740126] [ 17.740146] The buggy address belongs to the object at fff00000c4480c00 [ 17.740146] which belongs to the cache kmalloc-256 of size 256 [ 17.740201] The buggy address is located 7 bytes to the right of [ 17.740201] allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9) [ 17.740418] [ 17.740439] The buggy address belongs to the physical page: [ 17.740469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.740551] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.740607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.740658] page_type: f5(slab) [ 17.740715] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.740762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.740811] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.740857] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.740905] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.740968] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.741006] page dumped because: kasan: bad access detected [ 17.741041] [ 17.741059] Memory state around the buggy address: [ 17.741088] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.741130] fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.741170] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.741215] ^ [ 17.741258] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.741307] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.741369] ================================================================== [ 17.777889] ================================================================== [ 17.778109] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.778328] Write of size 1 at addr fff00000c784a0c9 by task kunit_try_catch/164 [ 17.778457] [ 17.778486] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.778568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.778699] Hardware name: linux,dummy-virt (DT) [ 17.778736] Call trace: [ 17.778847] show_stack+0x20/0x38 (C) [ 17.778900] dump_stack_lvl+0x8c/0xd0 [ 17.778948] print_report+0x118/0x608 [ 17.778992] kasan_report+0xdc/0x128 [ 17.779041] __asan_report_store1_noabort+0x20/0x30 [ 17.779261] krealloc_less_oob_helper+0xa48/0xc50 [ 17.779372] krealloc_large_less_oob+0x20/0x38 [ 17.779417] kunit_try_run_case+0x170/0x3f0 [ 17.779798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.780408] kthread+0x328/0x630 [ 17.780465] ret_from_fork+0x10/0x20 [ 17.780570] [ 17.780597] The buggy address belongs to the physical page: [ 17.780672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.780722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.780767] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.780815] page_type: f8(unknown) [ 17.780877] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.780926] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.781268] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.781370] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.781451] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.781497] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.781683] page dumped because: kasan: bad access detected [ 17.781921] [ 17.781941] Memory state around the buggy address: [ 17.781973] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.782015] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.782057] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.782104] ^ [ 17.782139] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.782479] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.782738] ================================================================== [ 17.749254] ================================================================== [ 17.749362] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.749427] Write of size 1 at addr fff00000c4480cea by task kunit_try_catch/160 [ 17.749476] [ 17.749504] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.749599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.749625] Hardware name: linux,dummy-virt (DT) [ 17.749673] Call trace: [ 17.749699] show_stack+0x20/0x38 (C) [ 17.749745] dump_stack_lvl+0x8c/0xd0 [ 17.749791] print_report+0x118/0x608 [ 17.749855] kasan_report+0xdc/0x128 [ 17.749899] __asan_report_store1_noabort+0x20/0x30 [ 17.749949] krealloc_less_oob_helper+0xae4/0xc50 [ 17.749996] krealloc_less_oob+0x20/0x38 [ 17.750039] kunit_try_run_case+0x170/0x3f0 [ 17.750087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.750267] kthread+0x328/0x630 [ 17.750322] ret_from_fork+0x10/0x20 [ 17.750400] [ 17.750419] Allocated by task 160: [ 17.750445] kasan_save_stack+0x3c/0x68 [ 17.750502] kasan_save_track+0x20/0x40 [ 17.750548] kasan_save_alloc_info+0x40/0x58 [ 17.750586] __kasan_krealloc+0x118/0x178 [ 17.750621] krealloc_noprof+0x128/0x360 [ 17.750656] krealloc_less_oob_helper+0x168/0xc50 [ 17.750721] krealloc_less_oob+0x20/0x38 [ 17.750755] kunit_try_run_case+0x170/0x3f0 [ 17.750793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.750842] kthread+0x328/0x630 [ 17.750877] ret_from_fork+0x10/0x20 [ 17.750911] [ 17.750931] The buggy address belongs to the object at fff00000c4480c00 [ 17.750931] which belongs to the cache kmalloc-256 of size 256 [ 17.751007] The buggy address is located 33 bytes to the right of [ 17.751007] allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9) [ 17.751078] [ 17.751171] The buggy address belongs to the physical page: [ 17.751221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.751277] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.751331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.751414] page_type: f5(slab) [ 17.751450] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.751507] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.751572] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.751646] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.751695] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.751765] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.751804] page dumped because: kasan: bad access detected [ 17.751833] [ 17.751850] Memory state around the buggy address: [ 17.751879] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.752014] fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.752061] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.752098] ^ [ 17.752155] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.752218] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.752303] ================================================================== [ 17.783805] ================================================================== [ 17.783850] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.784347] Write of size 1 at addr fff00000c784a0d0 by task kunit_try_catch/164 [ 17.784424] [ 17.784454] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.784815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.784923] Hardware name: linux,dummy-virt (DT) [ 17.784960] Call trace: [ 17.785010] show_stack+0x20/0x38 (C) [ 17.785060] dump_stack_lvl+0x8c/0xd0 [ 17.785254] print_report+0x118/0x608 [ 17.785305] kasan_report+0xdc/0x128 [ 17.785500] __asan_report_store1_noabort+0x20/0x30 [ 17.785644] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.785691] krealloc_large_less_oob+0x20/0x38 [ 17.785736] kunit_try_run_case+0x170/0x3f0 [ 17.785783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.786093] kthread+0x328/0x630 [ 17.786553] ret_from_fork+0x10/0x20 [ 17.786611] [ 17.786631] The buggy address belongs to the physical page: [ 17.786667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.786866] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.787183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.787237] page_type: f8(unknown) [ 17.787288] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.787360] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.787764] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.787816] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.787864] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.787911] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.787949] page dumped because: kasan: bad access detected [ 17.788241] [ 17.788263] Memory state around the buggy address: [ 17.788294] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.788348] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.788388] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.788424] ^ [ 17.788459] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.788499] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.788977] ================================================================== [ 17.743431] ================================================================== [ 17.744064] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.744127] Write of size 1 at addr fff00000c4480cda by task kunit_try_catch/160 [ 17.744487] [ 17.744526] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.744606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.744657] Hardware name: linux,dummy-virt (DT) [ 17.744688] Call trace: [ 17.744710] show_stack+0x20/0x38 (C) [ 17.744759] dump_stack_lvl+0x8c/0xd0 [ 17.744969] print_report+0x118/0x608 [ 17.745046] kasan_report+0xdc/0x128 [ 17.745168] __asan_report_store1_noabort+0x20/0x30 [ 17.745231] krealloc_less_oob_helper+0xa80/0xc50 [ 17.745277] krealloc_less_oob+0x20/0x38 [ 17.745320] kunit_try_run_case+0x170/0x3f0 [ 17.745403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.745456] kthread+0x328/0x630 [ 17.745504] ret_from_fork+0x10/0x20 [ 17.745681] [ 17.745768] Allocated by task 160: [ 17.745845] kasan_save_stack+0x3c/0x68 [ 17.745950] kasan_save_track+0x20/0x40 [ 17.745986] kasan_save_alloc_info+0x40/0x58 [ 17.746051] __kasan_krealloc+0x118/0x178 [ 17.746373] krealloc_noprof+0x128/0x360 [ 17.746452] krealloc_less_oob_helper+0x168/0xc50 [ 17.746567] krealloc_less_oob+0x20/0x38 [ 17.746637] kunit_try_run_case+0x170/0x3f0 [ 17.746686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.746729] kthread+0x328/0x630 [ 17.746764] ret_from_fork+0x10/0x20 [ 17.746798] [ 17.746818] The buggy address belongs to the object at fff00000c4480c00 [ 17.746818] which belongs to the cache kmalloc-256 of size 256 [ 17.747025] The buggy address is located 17 bytes to the right of [ 17.747025] allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9) [ 17.747146] [ 17.747184] The buggy address belongs to the physical page: [ 17.747248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.747367] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.747425] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.747474] page_type: f5(slab) [ 17.747510] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.747583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.747792] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.747915] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.748011] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.748094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.748170] page dumped because: kasan: bad access detected [ 17.748201] [ 17.748243] Memory state around the buggy address: [ 17.748297] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.748352] fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.748495] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.748563] ^ [ 17.748680] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.748768] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.748866] ================================================================== [ 17.794283] ================================================================== [ 17.794323] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.794563] Write of size 1 at addr fff00000c784a0ea by task kunit_try_catch/164 [ 17.794615] [ 17.794642] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.794719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.794744] Hardware name: linux,dummy-virt (DT) [ 17.794773] Call trace: [ 17.794842] show_stack+0x20/0x38 (C) [ 17.795130] dump_stack_lvl+0x8c/0xd0 [ 17.795253] print_report+0x118/0x608 [ 17.795385] kasan_report+0xdc/0x128 [ 17.795429] __asan_report_store1_noabort+0x20/0x30 [ 17.795480] krealloc_less_oob_helper+0xae4/0xc50 [ 17.795813] krealloc_large_less_oob+0x20/0x38 [ 17.795901] kunit_try_run_case+0x170/0x3f0 [ 17.795955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.796007] kthread+0x328/0x630 [ 17.796051] ret_from_fork+0x10/0x20 [ 17.796096] [ 17.796125] The buggy address belongs to the physical page: [ 17.796259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.796585] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.796637] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.796686] page_type: f8(unknown) [ 17.796882] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.796933] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.796981] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.797092] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.797140] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.797186] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.797225] page dumped because: kasan: bad access detected [ 17.797303] [ 17.797327] Memory state around the buggy address: [ 17.797369] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.797410] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.797451] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.797486] ^ [ 17.797523] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.797573] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.797609] ================================================================== [ 17.798562] ================================================================== [ 17.798607] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.798835] Write of size 1 at addr fff00000c784a0eb by task kunit_try_catch/164 [ 17.798969] [ 17.799115] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.799455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.799484] Hardware name: linux,dummy-virt (DT) [ 17.799514] Call trace: [ 17.799540] show_stack+0x20/0x38 (C) [ 17.799629] dump_stack_lvl+0x8c/0xd0 [ 17.799676] print_report+0x118/0x608 [ 17.799926] kasan_report+0xdc/0x128 [ 17.799972] __asan_report_store1_noabort+0x20/0x30 [ 17.800023] krealloc_less_oob_helper+0xa58/0xc50 [ 17.800070] krealloc_large_less_oob+0x20/0x38 [ 17.800115] kunit_try_run_case+0x170/0x3f0 [ 17.800163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.800224] kthread+0x328/0x630 [ 17.800271] ret_from_fork+0x10/0x20 [ 17.800383] [ 17.800410] The buggy address belongs to the physical page: [ 17.800690] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.800809] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.800856] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.800925] page_type: f8(unknown) [ 17.800969] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.801017] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.801306] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.801482] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.801563] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.801696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.801735] page dumped because: kasan: bad access detected [ 17.801765] [ 17.801783] Memory state around the buggy address: [ 17.801812] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.801854] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.801894] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.802083] ^ [ 17.802192] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.802240] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.802276] ================================================================== [ 17.729819] ================================================================== [ 17.729873] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.729921] Write of size 1 at addr fff00000c4480cc9 by task kunit_try_catch/160 [ 17.729969] [ 17.729997] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.730074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.730100] Hardware name: linux,dummy-virt (DT) [ 17.730129] Call trace: [ 17.730150] show_stack+0x20/0x38 (C) [ 17.730196] dump_stack_lvl+0x8c/0xd0 [ 17.730244] print_report+0x118/0x608 [ 17.730290] kasan_report+0xdc/0x128 [ 17.730352] __asan_report_store1_noabort+0x20/0x30 [ 17.730402] krealloc_less_oob_helper+0xa48/0xc50 [ 17.730449] krealloc_less_oob+0x20/0x38 [ 17.730493] kunit_try_run_case+0x170/0x3f0 [ 17.730541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.730593] kthread+0x328/0x630 [ 17.730639] ret_from_fork+0x10/0x20 [ 17.730685] [ 17.730703] Allocated by task 160: [ 17.730729] kasan_save_stack+0x3c/0x68 [ 17.730766] kasan_save_track+0x20/0x40 [ 17.730801] kasan_save_alloc_info+0x40/0x58 [ 17.730843] __kasan_krealloc+0x118/0x178 [ 17.730878] krealloc_noprof+0x128/0x360 [ 17.730913] krealloc_less_oob_helper+0x168/0xc50 [ 17.730950] krealloc_less_oob+0x20/0x38 [ 17.733712] kunit_try_run_case+0x170/0x3f0 [ 17.733767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.733811] kthread+0x328/0x630 [ 17.733855] ret_from_fork+0x10/0x20 [ 17.733890] [ 17.733909] The buggy address belongs to the object at fff00000c4480c00 [ 17.733909] which belongs to the cache kmalloc-256 of size 256 [ 17.733967] The buggy address is located 0 bytes to the right of [ 17.733967] allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9) [ 17.734028] [ 17.734047] The buggy address belongs to the physical page: [ 17.734078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.734128] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.734175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.734224] page_type: f5(slab) [ 17.734261] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.734309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.734371] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.734418] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.734465] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.734512] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.734552] page dumped because: kasan: bad access detected [ 17.734582] [ 17.734600] Memory state around the buggy address: [ 17.734629] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.734670] fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.734711] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.734747] ^ [ 17.734780] fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.734820] fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.734862] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 17.707757] ================================================================== [ 17.708219] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.708390] Write of size 1 at addr fff00000c4480aeb by task kunit_try_catch/158 [ 17.708441] [ 17.708577] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.708718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.708747] Hardware name: linux,dummy-virt (DT) [ 17.708777] Call trace: [ 17.708817] show_stack+0x20/0x38 (C) [ 17.708953] dump_stack_lvl+0x8c/0xd0 [ 17.709001] print_report+0x118/0x608 [ 17.709045] kasan_report+0xdc/0x128 [ 17.709088] __asan_report_store1_noabort+0x20/0x30 [ 17.709889] krealloc_more_oob_helper+0x60c/0x678 [ 17.710016] krealloc_more_oob+0x20/0x38 [ 17.710119] kunit_try_run_case+0x170/0x3f0 [ 17.710167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.710260] kthread+0x328/0x630 [ 17.710488] ret_from_fork+0x10/0x20 [ 17.710628] [ 17.710647] Allocated by task 158: [ 17.710718] kasan_save_stack+0x3c/0x68 [ 17.710852] kasan_save_track+0x20/0x40 [ 17.710888] kasan_save_alloc_info+0x40/0x58 [ 17.710925] __kasan_krealloc+0x118/0x178 [ 17.710975] krealloc_noprof+0x128/0x360 [ 17.711013] krealloc_more_oob_helper+0x168/0x678 [ 17.711058] krealloc_more_oob+0x20/0x38 [ 17.711113] kunit_try_run_case+0x170/0x3f0 [ 17.711251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.711345] kthread+0x328/0x630 [ 17.711382] ret_from_fork+0x10/0x20 [ 17.711417] [ 17.711458] The buggy address belongs to the object at fff00000c4480a00 [ 17.711458] which belongs to the cache kmalloc-256 of size 256 [ 17.711516] The buggy address is located 0 bytes to the right of [ 17.711516] allocated 235-byte region [fff00000c4480a00, fff00000c4480aeb) [ 17.711577] [ 17.711850] The buggy address belongs to the physical page: [ 17.711968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.712162] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.712417] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.712508] page_type: f5(slab) [ 17.712844] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.712965] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.713013] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.713262] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.713371] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.713655] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.713703] page dumped because: kasan: bad access detected [ 17.713734] [ 17.713752] Memory state around the buggy address: [ 17.713825] fff00000c4480980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.713867] fff00000c4480a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.713907] >fff00000c4480a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.714202] ^ [ 17.714244] fff00000c4480b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.714285] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.714321] ================================================================== [ 17.766884] ================================================================== [ 17.766930] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.766975] Write of size 1 at addr fff00000c784a0f0 by task kunit_try_catch/162 [ 17.767023] [ 17.767051] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.767128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.767154] Hardware name: linux,dummy-virt (DT) [ 17.767190] Call trace: [ 17.767285] show_stack+0x20/0x38 (C) [ 17.767637] dump_stack_lvl+0x8c/0xd0 [ 17.767827] print_report+0x118/0x608 [ 17.768002] kasan_report+0xdc/0x128 [ 17.768182] __asan_report_store1_noabort+0x20/0x30 [ 17.768514] krealloc_more_oob_helper+0x5c0/0x678 [ 17.768565] krealloc_large_more_oob+0x20/0x38 [ 17.768611] kunit_try_run_case+0x170/0x3f0 [ 17.768788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.768863] kthread+0x328/0x630 [ 17.768909] ret_from_fork+0x10/0x20 [ 17.768956] [ 17.769016] The buggy address belongs to the physical page: [ 17.769048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.769198] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.769246] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.769371] page_type: f8(unknown) [ 17.769797] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.769850] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.769899] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.769972] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.770018] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.770165] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.770392] page dumped because: kasan: bad access detected [ 17.770424] [ 17.770442] Memory state around the buggy address: [ 17.770473] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.770515] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.770763] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.770918] ^ [ 17.770961] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.771003] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.771040] ================================================================== [ 17.715567] ================================================================== [ 17.716160] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.716267] Write of size 1 at addr fff00000c4480af0 by task kunit_try_catch/158 [ 17.716482] [ 17.716513] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.716591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.716616] Hardware name: linux,dummy-virt (DT) [ 17.716646] Call trace: [ 17.716667] show_stack+0x20/0x38 (C) [ 17.716715] dump_stack_lvl+0x8c/0xd0 [ 17.716762] print_report+0x118/0x608 [ 17.716807] kasan_report+0xdc/0x128 [ 17.716863] __asan_report_store1_noabort+0x20/0x30 [ 17.716912] krealloc_more_oob_helper+0x5c0/0x678 [ 17.717213] krealloc_more_oob+0x20/0x38 [ 17.717358] kunit_try_run_case+0x170/0x3f0 [ 17.717408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.717461] kthread+0x328/0x630 [ 17.717505] ret_from_fork+0x10/0x20 [ 17.717552] [ 17.717580] Allocated by task 158: [ 17.717749] kasan_save_stack+0x3c/0x68 [ 17.717905] kasan_save_track+0x20/0x40 [ 17.717942] kasan_save_alloc_info+0x40/0x58 [ 17.717979] __kasan_krealloc+0x118/0x178 [ 17.718014] krealloc_noprof+0x128/0x360 [ 17.718049] krealloc_more_oob_helper+0x168/0x678 [ 17.718598] krealloc_more_oob+0x20/0x38 [ 17.718652] kunit_try_run_case+0x170/0x3f0 [ 17.718691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.718742] kthread+0x328/0x630 [ 17.718778] ret_from_fork+0x10/0x20 [ 17.718812] [ 17.719068] The buggy address belongs to the object at fff00000c4480a00 [ 17.719068] which belongs to the cache kmalloc-256 of size 256 [ 17.719189] The buggy address is located 5 bytes to the right of [ 17.719189] allocated 235-byte region [fff00000c4480a00, fff00000c4480aeb) [ 17.719252] [ 17.719562] The buggy address belongs to the physical page: [ 17.719597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480 [ 17.719747] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.719804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.719856] page_type: f5(slab) [ 17.719976] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.720095] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.720201] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.720712] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.720979] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff [ 17.721088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.721128] page dumped because: kasan: bad access detected [ 17.721158] [ 17.721176] Memory state around the buggy address: [ 17.721206] fff00000c4480980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.721250] fff00000c4480a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.721525] >fff00000c4480a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.721635] ^ [ 17.721710] fff00000c4480b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.721762] fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.721831] ================================================================== [ 17.762068] ================================================================== [ 17.762121] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.762248] Write of size 1 at addr fff00000c784a0eb by task kunit_try_catch/162 [ 17.762444] [ 17.762482] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.762582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.762625] Hardware name: linux,dummy-virt (DT) [ 17.762673] Call trace: [ 17.762701] show_stack+0x20/0x38 (C) [ 17.762753] dump_stack_lvl+0x8c/0xd0 [ 17.762819] print_report+0x118/0x608 [ 17.762871] kasan_report+0xdc/0x128 [ 17.762914] __asan_report_store1_noabort+0x20/0x30 [ 17.762979] krealloc_more_oob_helper+0x60c/0x678 [ 17.763026] krealloc_large_more_oob+0x20/0x38 [ 17.763187] kunit_try_run_case+0x170/0x3f0 [ 17.763284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.763460] kthread+0x328/0x630 [ 17.763521] ret_from_fork+0x10/0x20 [ 17.763568] [ 17.763588] The buggy address belongs to the physical page: [ 17.763619] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.763670] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.763715] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.763764] page_type: f8(unknown) [ 17.763801] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.763849] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.763897] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.763943] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.763990] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.764036] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.764085] page dumped because: kasan: bad access detected [ 17.764116] [ 17.764133] Memory state around the buggy address: [ 17.764180] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.764253] fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.764294] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.764330] ^ [ 17.764452] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.764586] fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.764688] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 17.689702] ================================================================== [ 17.689759] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 17.689810] Read of size 1 at addr fff00000c7850000 by task kunit_try_catch/156 [ 17.689859] [ 17.689890] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.690567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.690641] Hardware name: linux,dummy-virt (DT) [ 17.690672] Call trace: [ 17.690773] show_stack+0x20/0x38 (C) [ 17.691024] dump_stack_lvl+0x8c/0xd0 [ 17.691139] print_report+0x118/0x608 [ 17.691183] kasan_report+0xdc/0x128 [ 17.691227] __asan_report_load1_noabort+0x20/0x30 [ 17.691275] page_alloc_uaf+0x328/0x350 [ 17.691325] kunit_try_run_case+0x170/0x3f0 [ 17.691400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.691893] kthread+0x328/0x630 [ 17.691957] ret_from_fork+0x10/0x20 [ 17.692061] [ 17.692123] The buggy address belongs to the physical page: [ 17.692175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850 [ 17.692226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.692288] page_type: f0(buddy) [ 17.692481] raw: 0bfffe0000000000 fff00000ff616020 fff00000ff616020 0000000000000000 [ 17.692617] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 17.692683] page dumped because: kasan: bad access detected [ 17.692824] [ 17.692843] Memory state around the buggy address: [ 17.692876] fff00000c784ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.692917] fff00000c784ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.693013] >fff00000c7850000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.693105] ^ [ 17.693142] fff00000c7850080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.693319] fff00000c7850100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.693507] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 17.667006] ================================================================== [ 17.667095] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 17.667154] Free of addr fff00000c5d30001 by task kunit_try_catch/152 [ 17.667200] [ 17.667230] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.667310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.667349] Hardware name: linux,dummy-virt (DT) [ 17.667379] Call trace: [ 17.667401] show_stack+0x20/0x38 (C) [ 17.667461] dump_stack_lvl+0x8c/0xd0 [ 17.667508] print_report+0x118/0x608 [ 17.667576] kasan_report_invalid_free+0xc0/0xe8 [ 17.667958] __kasan_kfree_large+0x5c/0xa8 [ 17.668127] free_large_kmalloc+0x64/0x190 [ 17.668255] kfree+0x270/0x3c8 [ 17.668677] kmalloc_large_invalid_free+0x108/0x270 [ 17.668972] kunit_try_run_case+0x170/0x3f0 [ 17.669219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.669314] kthread+0x328/0x630 [ 17.669658] ret_from_fork+0x10/0x20 [ 17.670151] [ 17.670177] The buggy address belongs to the physical page: [ 17.670210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d30 [ 17.670261] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.670308] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.670371] page_type: f8(unknown) [ 17.670409] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.670456] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.670503] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.670549] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.670596] head: 0bfffe0000000002 ffffc1ffc3174c01 00000000ffffffff 00000000ffffffff [ 17.670643] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.670682] page dumped because: kasan: bad access detected [ 17.670723] [ 17.670742] Memory state around the buggy address: [ 17.670773] fff00000c5d2ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.671086] fff00000c5d2ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.671458] >fff00000c5d30000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.671497] ^ [ 17.671525] fff00000c5d30080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.671565] fff00000c5d30100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.672038] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 17.650992] ================================================================== [ 17.651370] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 17.651688] Read of size 1 at addr fff00000c5d30000 by task kunit_try_catch/150 [ 17.651915] [ 17.651952] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.652093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.652118] Hardware name: linux,dummy-virt (DT) [ 17.652154] Call trace: [ 17.652214] show_stack+0x20/0x38 (C) [ 17.652262] dump_stack_lvl+0x8c/0xd0 [ 17.652308] print_report+0x118/0x608 [ 17.652360] kasan_report+0xdc/0x128 [ 17.652403] __asan_report_load1_noabort+0x20/0x30 [ 17.652450] kmalloc_large_uaf+0x2cc/0x2f8 [ 17.653275] kunit_try_run_case+0x170/0x3f0 [ 17.653676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.653749] kthread+0x328/0x630 [ 17.653796] ret_from_fork+0x10/0x20 [ 17.653843] [ 17.653977] The buggy address belongs to the physical page: [ 17.654014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d30 [ 17.654231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.654317] raw: 0bfffe0000000000 fff00000da4a1e00 fff00000da4a1e00 0000000000000000 [ 17.654376] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 17.654534] page dumped because: kasan: bad access detected [ 17.654758] [ 17.654780] Memory state around the buggy address: [ 17.654855] fff00000c5d2ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.654897] fff00000c5d2ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.654950] >fff00000c5d30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.654985] ^ [ 17.655012] fff00000c5d30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.655103] fff00000c5d30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.655222] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 17.633555] ================================================================== [ 17.633659] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 17.633853] Write of size 1 at addr fff00000c5d3200a by task kunit_try_catch/148 [ 17.634170] [ 17.634204] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.634285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.634365] Hardware name: linux,dummy-virt (DT) [ 17.634604] Call trace: [ 17.634632] show_stack+0x20/0x38 (C) [ 17.635014] dump_stack_lvl+0x8c/0xd0 [ 17.635154] print_report+0x118/0x608 [ 17.635202] kasan_report+0xdc/0x128 [ 17.635445] __asan_report_store1_noabort+0x20/0x30 [ 17.635495] kmalloc_large_oob_right+0x278/0x2b8 [ 17.635544] kunit_try_run_case+0x170/0x3f0 [ 17.635591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.635643] kthread+0x328/0x630 [ 17.635739] ret_from_fork+0x10/0x20 [ 17.636078] [ 17.636142] The buggy address belongs to the physical page: [ 17.636173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d30 [ 17.636602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.636649] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.636710] page_type: f8(unknown) [ 17.636748] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.636796] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.636844] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.637241] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.637389] head: 0bfffe0000000002 ffffc1ffc3174c01 00000000ffffffff 00000000ffffffff [ 17.637437] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.637475] page dumped because: kasan: bad access detected [ 17.637507] [ 17.637525] Memory state around the buggy address: [ 17.637566] fff00000c5d31f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.637608] fff00000c5d31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.637933] >fff00000c5d32000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.637973] ^ [ 17.638281] fff00000c5d32080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.638331] fff00000c5d32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.638381] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 17.616542] ================================================================== [ 17.616616] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.616707] Write of size 1 at addr fff00000c7821f00 by task kunit_try_catch/146 [ 17.616830] [ 17.616860] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.616939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.617149] Hardware name: linux,dummy-virt (DT) [ 17.617426] Call trace: [ 17.617468] show_stack+0x20/0x38 (C) [ 17.617573] dump_stack_lvl+0x8c/0xd0 [ 17.617622] print_report+0x118/0x608 [ 17.617665] kasan_report+0xdc/0x128 [ 17.617708] __asan_report_store1_noabort+0x20/0x30 [ 17.617756] kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.617813] kunit_try_run_case+0x170/0x3f0 [ 17.617861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.618367] kthread+0x328/0x630 [ 17.618529] ret_from_fork+0x10/0x20 [ 17.618577] [ 17.618597] Allocated by task 146: [ 17.618624] kasan_save_stack+0x3c/0x68 [ 17.618919] kasan_save_track+0x20/0x40 [ 17.619040] kasan_save_alloc_info+0x40/0x58 [ 17.619083] __kasan_kmalloc+0xd4/0xd8 [ 17.619119] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.619171] kmalloc_big_oob_right+0xb8/0x2f0 [ 17.619233] kunit_try_run_case+0x170/0x3f0 [ 17.619278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.619357] kthread+0x328/0x630 [ 17.619395] ret_from_fork+0x10/0x20 [ 17.619430] [ 17.619700] The buggy address belongs to the object at fff00000c7820000 [ 17.619700] which belongs to the cache kmalloc-8k of size 8192 [ 17.619769] The buggy address is located 0 bytes to the right of [ 17.619769] allocated 7936-byte region [fff00000c7820000, fff00000c7821f00) [ 17.619949] [ 17.620030] The buggy address belongs to the physical page: [ 17.620117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107820 [ 17.620179] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.620441] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.620627] page_type: f5(slab) [ 17.620669] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.620718] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.620787] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.620834] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.620881] head: 0bfffe0000000003 ffffc1ffc31e0801 00000000ffffffff 00000000ffffffff [ 17.621218] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.621260] page dumped because: kasan: bad access detected [ 17.621312] [ 17.621341] Memory state around the buggy address: [ 17.621392] fff00000c7821e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.621580] fff00000c7821e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.621622] >fff00000c7821f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.621671] ^ [ 17.621698] fff00000c7821f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.621737] fff00000c7822000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.621773] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 17.602819] ================================================================== [ 17.602879] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 17.602930] Write of size 1 at addr fff00000c63d6078 by task kunit_try_catch/144 [ 17.602979] [ 17.603129] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.603298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.603326] Hardware name: linux,dummy-virt (DT) [ 17.603369] Call trace: [ 17.603399] show_stack+0x20/0x38 (C) [ 17.603595] dump_stack_lvl+0x8c/0xd0 [ 17.603649] print_report+0x118/0x608 [ 17.603705] kasan_report+0xdc/0x128 [ 17.603749] __asan_report_store1_noabort+0x20/0x30 [ 17.603804] kmalloc_track_caller_oob_right+0x418/0x488 [ 17.603909] kunit_try_run_case+0x170/0x3f0 [ 17.604091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.604204] kthread+0x328/0x630 [ 17.604256] ret_from_fork+0x10/0x20 [ 17.604303] [ 17.604321] Allocated by task 144: [ 17.604739] kasan_save_stack+0x3c/0x68 [ 17.604847] kasan_save_track+0x20/0x40 [ 17.604892] kasan_save_alloc_info+0x40/0x58 [ 17.605096] __kasan_kmalloc+0xd4/0xd8 [ 17.605163] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.605205] kmalloc_track_caller_oob_right+0x184/0x488 [ 17.605243] kunit_try_run_case+0x170/0x3f0 [ 17.605281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.605324] kthread+0x328/0x630 [ 17.605378] ret_from_fork+0x10/0x20 [ 17.605413] [ 17.605432] The buggy address belongs to the object at fff00000c63d6000 [ 17.605432] which belongs to the cache kmalloc-128 of size 128 [ 17.605883] The buggy address is located 0 bytes to the right of [ 17.605883] allocated 120-byte region [fff00000c63d6000, fff00000c63d6078) [ 17.606291] [ 17.606501] The buggy address belongs to the physical page: [ 17.606547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 17.606679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.606727] page_type: f5(slab) [ 17.607056] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.607109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.607148] page dumped because: kasan: bad access detected [ 17.607185] [ 17.607204] Memory state around the buggy address: [ 17.607235] fff00000c63d5f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.607397] fff00000c63d5f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.607647] >fff00000c63d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.607898] ^ [ 17.608123] fff00000c63d6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.608457] fff00000c63d6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.608502] ================================================================== [ 17.587130] ================================================================== [ 17.587183] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 17.587233] Write of size 1 at addr fff00000c5b9df78 by task kunit_try_catch/144 [ 17.587281] [ 17.587312] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.589199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.589242] Hardware name: linux,dummy-virt (DT) [ 17.589410] Call trace: [ 17.589461] show_stack+0x20/0x38 (C) [ 17.590461] dump_stack_lvl+0x8c/0xd0 [ 17.590519] print_report+0x118/0x608 [ 17.590564] kasan_report+0xdc/0x128 [ 17.590687] __asan_report_store1_noabort+0x20/0x30 [ 17.590845] kmalloc_track_caller_oob_right+0x40c/0x488 [ 17.590896] kunit_try_run_case+0x170/0x3f0 [ 17.591439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.591921] kthread+0x328/0x630 [ 17.592286] ret_from_fork+0x10/0x20 [ 17.592502] [ 17.592591] Allocated by task 144: [ 17.592620] kasan_save_stack+0x3c/0x68 [ 17.592660] kasan_save_track+0x20/0x40 [ 17.592698] kasan_save_alloc_info+0x40/0x58 [ 17.592736] __kasan_kmalloc+0xd4/0xd8 [ 17.592770] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.592975] kmalloc_track_caller_oob_right+0xa8/0x488 [ 17.593046] kunit_try_run_case+0x170/0x3f0 [ 17.593736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.594035] kthread+0x328/0x630 [ 17.594098] ret_from_fork+0x10/0x20 [ 17.594346] [ 17.594367] The buggy address belongs to the object at fff00000c5b9df00 [ 17.594367] which belongs to the cache kmalloc-128 of size 128 [ 17.594669] The buggy address is located 0 bytes to the right of [ 17.594669] allocated 120-byte region [fff00000c5b9df00, fff00000c5b9df78) [ 17.594932] [ 17.594955] The buggy address belongs to the physical page: [ 17.595150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d [ 17.595209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.595260] page_type: f5(slab) [ 17.595509] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.595732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.595948] page dumped because: kasan: bad access detected [ 17.595985] [ 17.596119] Memory state around the buggy address: [ 17.596317] fff00000c5b9de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.596391] fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.596627] >fff00000c5b9df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.596664] ^ [ 17.596703] fff00000c5b9df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.596994] fff00000c5b9e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.597242] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 17.567421] ================================================================== [ 17.568049] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 17.568272] Read of size 1 at addr fff00000c5e3f000 by task kunit_try_catch/142 [ 17.568373] [ 17.568472] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.568576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.568673] Hardware name: linux,dummy-virt (DT) [ 17.568740] Call trace: [ 17.568857] show_stack+0x20/0x38 (C) [ 17.568915] dump_stack_lvl+0x8c/0xd0 [ 17.568981] print_report+0x118/0x608 [ 17.569272] kasan_report+0xdc/0x128 [ 17.569513] __asan_report_load1_noabort+0x20/0x30 [ 17.569605] kmalloc_node_oob_right+0x2f4/0x330 [ 17.569996] kunit_try_run_case+0x170/0x3f0 [ 17.570091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.570353] kthread+0x328/0x630 [ 17.570491] ret_from_fork+0x10/0x20 [ 17.570881] [ 17.570908] Allocated by task 142: [ 17.570938] kasan_save_stack+0x3c/0x68 [ 17.571015] kasan_save_track+0x20/0x40 [ 17.571060] kasan_save_alloc_info+0x40/0x58 [ 17.571112] __kasan_kmalloc+0xd4/0xd8 [ 17.571147] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 17.571189] kmalloc_node_oob_right+0xbc/0x330 [ 17.571226] kunit_try_run_case+0x170/0x3f0 [ 17.571273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.571316] kthread+0x328/0x630 [ 17.571363] ret_from_fork+0x10/0x20 [ 17.571407] [ 17.571426] The buggy address belongs to the object at fff00000c5e3e000 [ 17.571426] which belongs to the cache kmalloc-4k of size 4096 [ 17.571481] The buggy address is located 0 bytes to the right of [ 17.571481] allocated 4096-byte region [fff00000c5e3e000, fff00000c5e3f000) [ 17.571542] [ 17.571570] The buggy address belongs to the physical page: [ 17.571670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e38 [ 17.571890] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.571939] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.572046] page_type: f5(slab) [ 17.572085] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.572143] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.572199] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.572833] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.573277] head: 0bfffe0000000003 ffffc1ffc3178e01 00000000ffffffff 00000000ffffffff [ 17.573375] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.573925] page dumped because: kasan: bad access detected [ 17.573962] [ 17.573980] Memory state around the buggy address: [ 17.574044] fff00000c5e3ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.574089] fff00000c5e3ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.574451] >fff00000c5e3f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.574530] ^ [ 17.574793] fff00000c5e3f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.575129] fff00000c5e3f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.575175] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 17.548793] ================================================================== [ 17.548884] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 17.549136] Read of size 1 at addr fff00000c5cff65f by task kunit_try_catch/140 [ 17.549635] [ 17.549973] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.550072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.550098] Hardware name: linux,dummy-virt (DT) [ 17.550172] Call trace: [ 17.550202] show_stack+0x20/0x38 (C) [ 17.550255] dump_stack_lvl+0x8c/0xd0 [ 17.550550] print_report+0x118/0x608 [ 17.550633] kasan_report+0xdc/0x128 [ 17.550680] __asan_report_load1_noabort+0x20/0x30 [ 17.550797] kmalloc_oob_left+0x2ec/0x320 [ 17.550855] kunit_try_run_case+0x170/0x3f0 [ 17.550965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.551046] kthread+0x328/0x630 [ 17.551179] ret_from_fork+0x10/0x20 [ 17.551266] [ 17.551318] Allocated by task 26: [ 17.551438] kasan_save_stack+0x3c/0x68 [ 17.551496] kasan_save_track+0x20/0x40 [ 17.551559] kasan_save_alloc_info+0x40/0x58 [ 17.551733] __kasan_kmalloc+0xd4/0xd8 [ 17.551970] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.552027] kstrdup+0x54/0xc8 [ 17.552065] devtmpfs_work_loop+0x6f8/0xa58 [ 17.552106] devtmpfsd+0x50/0x58 [ 17.552141] kthread+0x328/0x630 [ 17.552176] ret_from_fork+0x10/0x20 [ 17.552836] [ 17.552915] Freed by task 26: [ 17.553067] kasan_save_stack+0x3c/0x68 [ 17.553133] kasan_save_track+0x20/0x40 [ 17.553723] kasan_save_free_info+0x4c/0x78 [ 17.553786] __kasan_slab_free+0x6c/0x98 [ 17.553983] kfree+0x214/0x3c8 [ 17.554050] devtmpfs_work_loop+0x804/0xa58 [ 17.554176] devtmpfsd+0x50/0x58 [ 17.554214] kthread+0x328/0x630 [ 17.554529] ret_from_fork+0x10/0x20 [ 17.554645] [ 17.554724] The buggy address belongs to the object at fff00000c5cff640 [ 17.554724] which belongs to the cache kmalloc-16 of size 16 [ 17.554874] The buggy address is located 15 bytes to the right of [ 17.554874] allocated 16-byte region [fff00000c5cff640, fff00000c5cff650) [ 17.554974] [ 17.555001] The buggy address belongs to the physical page: [ 17.555192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff [ 17.555277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.555440] page_type: f5(slab) [ 17.555619] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.555992] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.556153] page dumped because: kasan: bad access detected [ 17.556196] [ 17.556388] Memory state around the buggy address: [ 17.556496] fff00000c5cff500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.556703] fff00000c5cff580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.556757] >fff00000c5cff600: 00 00 fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 17.556862] ^ [ 17.556949] fff00000c5cff680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.557006] fff00000c5cff700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.557104] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 17.531419] ================================================================== [ 17.531746] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.531978] Write of size 1 at addr fff00000c5b9de78 by task kunit_try_catch/138 [ 17.532028] [ 17.532057] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.532519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.533134] Hardware name: linux,dummy-virt (DT) [ 17.533170] Call trace: [ 17.533192] show_stack+0x20/0x38 (C) [ 17.533243] dump_stack_lvl+0x8c/0xd0 [ 17.533290] print_report+0x118/0x608 [ 17.533370] kasan_report+0xdc/0x128 [ 17.533426] __asan_report_store1_noabort+0x20/0x30 [ 17.533475] kmalloc_oob_right+0x538/0x660 [ 17.533522] kunit_try_run_case+0x170/0x3f0 [ 17.533569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.533622] kthread+0x328/0x630 [ 17.533667] ret_from_fork+0x10/0x20 [ 17.533714] [ 17.533732] Allocated by task 138: [ 17.533759] kasan_save_stack+0x3c/0x68 [ 17.533796] kasan_save_track+0x20/0x40 [ 17.533831] kasan_save_alloc_info+0x40/0x58 [ 17.533868] __kasan_kmalloc+0xd4/0xd8 [ 17.533901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.533938] kmalloc_oob_right+0xb0/0x660 [ 17.533975] kunit_try_run_case+0x170/0x3f0 [ 17.534012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.534054] kthread+0x328/0x630 [ 17.534089] ret_from_fork+0x10/0x20 [ 17.534122] [ 17.534140] The buggy address belongs to the object at fff00000c5b9de00 [ 17.534140] which belongs to the cache kmalloc-128 of size 128 [ 17.534195] The buggy address is located 5 bytes to the right of [ 17.534195] allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73) [ 17.534257] [ 17.534278] The buggy address belongs to the physical page: [ 17.534307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d [ 17.534368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.534413] page_type: f5(slab) [ 17.534450] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.534877] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.534940] page dumped because: kasan: bad access detected [ 17.535017] [ 17.535036] Memory state around the buggy address: [ 17.535211] fff00000c5b9dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.535620] fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.535667] >fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.535713] ^ [ 17.535790] fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.535831] fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.535867] ================================================================== [ 17.523268] ================================================================== [ 17.523637] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.524493] Write of size 1 at addr fff00000c5b9de73 by task kunit_try_catch/138 [ 17.524601] [ 17.525360] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.15.6-rc1 #1 PREEMPT [ 17.525519] Tainted: [N]=TEST [ 17.525554] Hardware name: linux,dummy-virt (DT) [ 17.525770] Call trace: [ 17.525935] show_stack+0x20/0x38 (C) [ 17.526066] dump_stack_lvl+0x8c/0xd0 [ 17.526129] print_report+0x118/0x608 [ 17.526175] kasan_report+0xdc/0x128 [ 17.526219] __asan_report_store1_noabort+0x20/0x30 [ 17.526269] kmalloc_oob_right+0x5a4/0x660 [ 17.526317] kunit_try_run_case+0x170/0x3f0 [ 17.526383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.526436] kthread+0x328/0x630 [ 17.526483] ret_from_fork+0x10/0x20 [ 17.526643] [ 17.526682] Allocated by task 138: [ 17.526818] kasan_save_stack+0x3c/0x68 [ 17.526890] kasan_save_track+0x20/0x40 [ 17.526927] kasan_save_alloc_info+0x40/0x58 [ 17.526965] __kasan_kmalloc+0xd4/0xd8 [ 17.526999] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.527038] kmalloc_oob_right+0xb0/0x660 [ 17.527077] kunit_try_run_case+0x170/0x3f0 [ 17.527116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.527161] kthread+0x328/0x630 [ 17.527199] ret_from_fork+0x10/0x20 [ 17.527253] [ 17.527311] The buggy address belongs to the object at fff00000c5b9de00 [ 17.527311] which belongs to the cache kmalloc-128 of size 128 [ 17.527417] The buggy address is located 0 bytes to the right of [ 17.527417] allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73) [ 17.527485] [ 17.527570] The buggy address belongs to the physical page: [ 17.527764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d [ 17.528030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.528349] page_type: f5(slab) [ 17.528652] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.528714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.528821] page dumped because: kasan: bad access detected [ 17.528860] [ 17.528885] Memory state around the buggy address: [ 17.529097] fff00000c5b9dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.529163] fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.529217] >fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.529270] ^ [ 17.529361] fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.529402] fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.529465] ================================================================== [ 17.536660] ================================================================== [ 17.536706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.536753] Read of size 1 at addr fff00000c5b9de80 by task kunit_try_catch/138 [ 17.536800] [ 17.536828] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 17.536904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.536929] Hardware name: linux,dummy-virt (DT) [ 17.536962] Call trace: [ 17.536982] show_stack+0x20/0x38 (C) [ 17.537028] dump_stack_lvl+0x8c/0xd0 [ 17.537074] print_report+0x118/0x608 [ 17.537118] kasan_report+0xdc/0x128 [ 17.537161] __asan_report_load1_noabort+0x20/0x30 [ 17.537209] kmalloc_oob_right+0x5d0/0x660 [ 17.537256] kunit_try_run_case+0x170/0x3f0 [ 17.537303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.537402] kthread+0x328/0x630 [ 17.537448] ret_from_fork+0x10/0x20 [ 17.537494] [ 17.537512] Allocated by task 138: [ 17.537538] kasan_save_stack+0x3c/0x68 [ 17.537575] kasan_save_track+0x20/0x40 [ 17.537610] kasan_save_alloc_info+0x40/0x58 [ 17.537648] __kasan_kmalloc+0xd4/0xd8 [ 17.537681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.537717] kmalloc_oob_right+0xb0/0x660 [ 17.537754] kunit_try_run_case+0x170/0x3f0 [ 17.537792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.537936] kthread+0x328/0x630 [ 17.537991] ret_from_fork+0x10/0x20 [ 17.538370] [ 17.538424] The buggy address belongs to the object at fff00000c5b9de00 [ 17.538424] which belongs to the cache kmalloc-128 of size 128 [ 17.539289] The buggy address is located 13 bytes to the right of [ 17.539289] allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73) [ 17.542027] [ 17.542508] The buggy address belongs to the physical page: [ 17.542575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d [ 17.542628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.542676] page_type: f5(slab) [ 17.542772] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.543027] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.543288] page dumped because: kasan: bad access detected [ 17.543322] [ 17.543351] Memory state around the buggy address: [ 17.543382] fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.543424] fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.543465] >fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.543502] ^ [ 17.543529] fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.544553] fff00000c5b9df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.544596] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 96.619702] WARNING: CPU: 1 PID: 658 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 96.622220] Modules linked in: [ 96.622452] CPU: 1 UID: 0 PID: 658 Comm: kunit_try_catch Tainted: G B D W N 6.15.6-rc1 #1 PREEMPT [ 96.622872] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 96.623501] Hardware name: linux,dummy-virt (DT) [ 96.623957] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 96.624739] pc : intlog10+0x38/0x48 [ 96.625155] lr : intlog10_test+0xe4/0x200 [ 96.625589] sp : ffff800082237c10 [ 96.625954] x29: ffff800082237c90 x28: 0000000000000000 x27: 0000000000000000 [ 96.626721] x26: 1ffe0000191e6e01 x25: 0000000000000000 x24: ffff800082237ce0 [ 96.627544] x23: ffff800082237d00 x22: 0000000000000000 x21: 1ffff00010446f82 [ 96.628260] x20: ffffaee414035200 x19: ffff800080087990 x18: 00000000cb37bdb9 [ 96.628631] x17: 000000006b64c51a x16: fff00000c096e03c x15: fff00000ff616b08 [ 96.628989] x14: 00000000f1f1f1f1 x13: 1ffe00001b48f81d x12: ffff75dc82fb9b71 [ 96.629329] x11: 1ffff5dc82fb9b70 x10: ffff75dc82fb9b70 x9 : ffffaee411615aa4 [ 96.629741] x8 : ffffaee417dcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 96.630170] x5 : ffff700010446f82 x4 : 1ffff00010010f3a x3 : 1ffff5dc82806a40 [ 96.630587] x2 : 1ffff5dc82806a40 x1 : 0000000000000003 x0 : 0000000000000000 [ 96.631008] Call trace: [ 96.631151] intlog10+0x38/0x48 (P) [ 96.631423] kunit_try_run_case+0x170/0x3f0 [ 96.631691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 96.632010] kthread+0x328/0x630 [ 96.632214] ret_from_fork+0x10/0x20 [ 96.632511] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 96.572650] WARNING: CPU: 1 PID: 640 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 96.575532] Modules linked in: [ 96.576102] CPU: 1 UID: 0 PID: 640 Comm: kunit_try_catch Tainted: G B D N 6.15.6-rc1 #1 PREEMPT [ 96.577446] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 96.578152] Hardware name: linux,dummy-virt (DT) [ 96.578678] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 96.579689] pc : intlog2+0xd8/0xf8 [ 96.580238] lr : intlog2_test+0xe4/0x200 [ 96.580704] sp : ffff800082167c10 [ 96.581297] x29: ffff800082167c90 x28: 0000000000000000 x27: 0000000000000000 [ 96.582195] x26: 1ffe000018f52fc1 x25: 0000000000000000 x24: ffff800082167ce0 [ 96.582578] x23: ffff800082167d00 x22: 0000000000000000 x21: 1ffff0001042cf82 [ 96.582932] x20: ffffaee414035100 x19: ffff800080087990 x18: 000000001204bc20 [ 96.583280] x17: 00000000559a84c6 x16: fff00000c096e03c x15: fff00000ff616b08 [ 96.584161] x14: 00000000f1f1f1f1 x13: 1ffe00001b48f81d x12: ffff75dc82fb9b71 [ 96.585086] x11: 1ffff5dc82fb9b70 x10: ffff75dc82fb9b70 x9 : ffffaee411615ca4 [ 96.585923] x8 : ffffaee417dcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 96.586740] x5 : ffff70001042cf82 x4 : 1ffff00010010f3a x3 : 1ffff5dc82806a20 [ 96.587517] x2 : 1ffff5dc82806a20 x1 : 0000000000000003 x0 : 0000000000000000 [ 96.588269] Call trace: [ 96.588580] intlog2+0xd8/0xf8 (P) [ 96.589050] kunit_try_run_case+0x170/0x3f0 [ 96.589575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 96.590165] kthread+0x328/0x630 [ 96.590597] ret_from_fork+0x10/0x20 [ 96.591052] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/internal-error-oops-oops-smp
KNOWN ISSUE - qemu-arm64: Internal error: Oops at kunit_test_null_dereference - kunit_generic_run_threadfn_adapter
[ 95.686295] Internal error: Oops: 0000000096000005 [#1] SMP [ 95.693662] Modules linked in: [ 95.694524] CPU: 1 UID: 0 PID: 534 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 95.695607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 95.696114] Hardware name: linux,dummy-virt (DT) [ 95.696891] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 95.697294] pc : kunit_test_null_dereference+0x70/0x170 [ 95.697859] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.698440] sp : ffff800080f97d30 [ 95.698629] x29: ffff800080f97d90 x28: 0000000000000000 x27: 0000000000000000 [ 95.699050] x26: 1ffe000018c78341 x25: 0000000000000000 x24: 0000000000000004 [ 95.699514] x23: fff00000c63c1a0c x22: ffffaee411603080 x21: fff00000c10d2b88 [ 95.700263] x20: 1ffff000101f2fa6 x19: ffff800080087990 x18: 00000000c6d6f7f4 [ 95.701166] x17: fff0511cc45d5000 x16: ffff800080010000 x15: 00000000cca2f16f [ 95.701923] x14: 000000007f7e8355 x13: 1ffe00001b493be0 x12: fffd800018f3f62c [ 95.702647] x11: 1ffe000018f3f62b x10: fffd800018f3f62b x9 : ffffaee4115fa4e8 [ 95.703442] x8 : ffff800080f97c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 95.704175] x5 : ffff7000101f2fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 95.705080] x2 : dfff800000000000 x1 : fff00000c79fa880 x0 : ffff800080087990 [ 95.705775] Call trace: [ 95.705940] kunit_test_null_dereference+0x70/0x170 (P) [ 95.706186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.706453] kthread+0x328/0x630 [ 95.706691] ret_from_fork+0x10/0x20 [ 95.707137] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 95.707654] ---[ end trace 0000000000000000 ]---