Date
July 15, 2025, 2:09 p.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 19.893374] ================================================================== [ 19.893435] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.893489] Read of size 1 at addr fff00000c5996240 by task kunit_try_catch/233 [ 19.893541] [ 19.893570] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.893655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.893683] Hardware name: linux,dummy-virt (DT) [ 19.894325] Call trace: [ 19.894449] show_stack+0x20/0x38 (C) [ 19.894610] dump_stack_lvl+0x8c/0xd0 [ 19.894789] print_report+0x118/0x5d0 [ 19.894908] kasan_report+0xdc/0x128 [ 19.894959] __asan_report_load1_noabort+0x20/0x30 [ 19.895011] mempool_uaf_helper+0x314/0x340 [ 19.895059] mempool_slab_uaf+0xc0/0x118 [ 19.895105] kunit_try_run_case+0x170/0x3f0 [ 19.895339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.895534] kthread+0x328/0x630 [ 19.895633] ret_from_fork+0x10/0x20 [ 19.895826] [ 19.895893] Allocated by task 233: [ 19.896080] kasan_save_stack+0x3c/0x68 [ 19.896157] kasan_save_track+0x20/0x40 [ 19.896195] kasan_save_alloc_info+0x40/0x58 [ 19.896529] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.896713] remove_element+0x16c/0x1f8 [ 19.896786] mempool_alloc_preallocated+0x58/0xc0 [ 19.896962] mempool_uaf_helper+0xa4/0x340 [ 19.897053] mempool_slab_uaf+0xc0/0x118 [ 19.897217] kunit_try_run_case+0x170/0x3f0 [ 19.897269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.897521] kthread+0x328/0x630 [ 19.897568] ret_from_fork+0x10/0x20 [ 19.897611] [ 19.897651] Freed by task 233: [ 19.897706] kasan_save_stack+0x3c/0x68 [ 19.898406] kasan_save_track+0x20/0x40 [ 19.898474] kasan_save_free_info+0x4c/0x78 [ 19.898607] __kasan_mempool_poison_object+0xc0/0x150 [ 19.898738] mempool_free+0x28c/0x328 [ 19.898891] mempool_uaf_helper+0x104/0x340 [ 19.898998] mempool_slab_uaf+0xc0/0x118 [ 19.899138] kunit_try_run_case+0x170/0x3f0 [ 19.899264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.899334] kthread+0x328/0x630 [ 19.899610] ret_from_fork+0x10/0x20 [ 19.899752] [ 19.899794] The buggy address belongs to the object at fff00000c5996240 [ 19.899794] which belongs to the cache test_cache of size 123 [ 19.899917] The buggy address is located 0 bytes inside of [ 19.899917] freed 123-byte region [fff00000c5996240, fff00000c59962bb) [ 19.899993] [ 19.900042] The buggy address belongs to the physical page: [ 19.900306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105996 [ 19.900384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.900480] page_type: f5(slab) [ 19.900583] raw: 0bfffe0000000000 fff00000c1c3adc0 dead000000000122 0000000000000000 [ 19.900636] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.900821] page dumped because: kasan: bad access detected [ 19.900863] [ 19.900881] Memory state around the buggy address: [ 19.900943] fff00000c5996100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.901021] fff00000c5996180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.901130] >fff00000c5996200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 19.901267] ^ [ 19.901362] fff00000c5996280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.901467] fff00000c5996300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.901538] ================================================================== [ 19.856833] ================================================================== [ 19.857147] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.857230] Read of size 1 at addr fff00000c59e4a00 by task kunit_try_catch/229 [ 19.857283] [ 19.857783] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.857982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.858074] Hardware name: linux,dummy-virt (DT) [ 19.858148] Call trace: [ 19.858196] show_stack+0x20/0x38 (C) [ 19.858308] dump_stack_lvl+0x8c/0xd0 [ 19.858377] print_report+0x118/0x5d0 [ 19.858447] kasan_report+0xdc/0x128 [ 19.858493] __asan_report_load1_noabort+0x20/0x30 [ 19.858544] mempool_uaf_helper+0x314/0x340 [ 19.858858] mempool_kmalloc_uaf+0xc4/0x120 [ 19.858937] kunit_try_run_case+0x170/0x3f0 [ 19.859002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.859073] kthread+0x328/0x630 [ 19.859164] ret_from_fork+0x10/0x20 [ 19.859238] [ 19.859276] Allocated by task 229: [ 19.859326] kasan_save_stack+0x3c/0x68 [ 19.859405] kasan_save_track+0x20/0x40 [ 19.859494] kasan_save_alloc_info+0x40/0x58 [ 19.859571] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.859639] remove_element+0x130/0x1f8 [ 19.859696] mempool_alloc_preallocated+0x58/0xc0 [ 19.859886] mempool_uaf_helper+0xa4/0x340 [ 19.860417] mempool_kmalloc_uaf+0xc4/0x120 [ 19.860556] kunit_try_run_case+0x170/0x3f0 [ 19.860668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.861006] kthread+0x328/0x630 [ 19.861192] ret_from_fork+0x10/0x20 [ 19.861252] [ 19.861417] Freed by task 229: [ 19.861510] kasan_save_stack+0x3c/0x68 [ 19.861739] kasan_save_track+0x20/0x40 [ 19.861818] kasan_save_free_info+0x4c/0x78 [ 19.861959] __kasan_mempool_poison_object+0xc0/0x150 [ 19.862058] mempool_free+0x28c/0x328 [ 19.862136] mempool_uaf_helper+0x104/0x340 [ 19.862708] mempool_kmalloc_uaf+0xc4/0x120 [ 19.863174] kunit_try_run_case+0x170/0x3f0 [ 19.863323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.863476] kthread+0x328/0x630 [ 19.863588] ret_from_fork+0x10/0x20 [ 19.863719] [ 19.863772] The buggy address belongs to the object at fff00000c59e4a00 [ 19.863772] which belongs to the cache kmalloc-128 of size 128 [ 19.863860] The buggy address is located 0 bytes inside of [ 19.863860] freed 128-byte region [fff00000c59e4a00, fff00000c59e4a80) [ 19.864254] [ 19.864322] The buggy address belongs to the physical page: [ 19.864434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 19.864714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.864922] page_type: f5(slab) [ 19.865032] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.865086] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.865332] page dumped because: kasan: bad access detected [ 19.865542] [ 19.865576] Memory state around the buggy address: [ 19.865850] fff00000c59e4900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.866038] fff00000c59e4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.866098] >fff00000c59e4a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.866467] ^ [ 19.866583] fff00000c59e4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.866639] fff00000c59e4b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.866842] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 19.837067] ================================================================== [ 19.837141] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.837199] Read of size 1 at addr fff00000c59912bb by task kunit_try_catch/227 [ 19.837281] [ 19.837319] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.837412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.837437] Hardware name: linux,dummy-virt (DT) [ 19.837466] Call trace: [ 19.837487] show_stack+0x20/0x38 (C) [ 19.837755] dump_stack_lvl+0x8c/0xd0 [ 19.837818] print_report+0x118/0x5d0 [ 19.837865] kasan_report+0xdc/0x128 [ 19.837908] __asan_report_load1_noabort+0x20/0x30 [ 19.837976] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.838067] mempool_slab_oob_right+0xc0/0x118 [ 19.838143] kunit_try_run_case+0x170/0x3f0 [ 19.838253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.838327] kthread+0x328/0x630 [ 19.838406] ret_from_fork+0x10/0x20 [ 19.838493] [ 19.838511] Allocated by task 227: [ 19.838563] kasan_save_stack+0x3c/0x68 [ 19.838631] kasan_save_track+0x20/0x40 [ 19.838679] kasan_save_alloc_info+0x40/0x58 [ 19.838740] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.838792] remove_element+0x16c/0x1f8 [ 19.838830] mempool_alloc_preallocated+0x58/0xc0 [ 19.838872] mempool_oob_right_helper+0x98/0x2f0 [ 19.838913] mempool_slab_oob_right+0xc0/0x118 [ 19.838951] kunit_try_run_case+0x170/0x3f0 [ 19.839241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.839330] kthread+0x328/0x630 [ 19.839418] ret_from_fork+0x10/0x20 [ 19.839499] [ 19.839569] The buggy address belongs to the object at fff00000c5991240 [ 19.839569] which belongs to the cache test_cache of size 123 [ 19.839686] The buggy address is located 0 bytes to the right of [ 19.839686] allocated 123-byte region [fff00000c5991240, fff00000c59912bb) [ 19.839787] [ 19.839859] The buggy address belongs to the physical page: [ 19.839906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105991 [ 19.839976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.840042] page_type: f5(slab) [ 19.840122] raw: 0bfffe0000000000 fff00000c1c3ac80 dead000000000122 0000000000000000 [ 19.840198] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.840287] page dumped because: kasan: bad access detected [ 19.840321] [ 19.840338] Memory state around the buggy address: [ 19.840613] fff00000c5991180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.840689] fff00000c5991200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 19.840745] >fff00000c5991280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 19.840876] ^ [ 19.840925] fff00000c5991300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.841027] fff00000c5991380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.841106] ================================================================== [ 19.808413] ================================================================== [ 19.808477] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.808533] Read of size 1 at addr fff00000c7932001 by task kunit_try_catch/225 [ 19.808583] [ 19.808614] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.808696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.808723] Hardware name: linux,dummy-virt (DT) [ 19.808754] Call trace: [ 19.809471] show_stack+0x20/0x38 (C) [ 19.809557] dump_stack_lvl+0x8c/0xd0 [ 19.809655] print_report+0x118/0x5d0 [ 19.809719] kasan_report+0xdc/0x128 [ 19.809775] __asan_report_load1_noabort+0x20/0x30 [ 19.809826] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.810014] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 19.810530] kunit_try_run_case+0x170/0x3f0 [ 19.810673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.810883] kthread+0x328/0x630 [ 19.810932] ret_from_fork+0x10/0x20 [ 19.811326] [ 19.811363] The buggy address belongs to the physical page: [ 19.811478] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107930 [ 19.811721] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.811802] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.812188] page_type: f8(unknown) [ 19.812282] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.812341] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.812460] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.812698] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.813165] head: 0bfffe0000000002 ffffc1ffc31e4c01 00000000ffffffff 00000000ffffffff [ 19.813440] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.813489] page dumped because: kasan: bad access detected [ 19.813521] [ 19.813541] Memory state around the buggy address: [ 19.813792] fff00000c7931f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.813854] fff00000c7931f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.814048] >fff00000c7932000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.814090] ^ [ 19.814119] fff00000c7932080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.814684] fff00000c7932100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.814873] ================================================================== [ 19.791389] ================================================================== [ 19.791468] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.791540] Read of size 1 at addr fff00000c59e4673 by task kunit_try_catch/223 [ 19.791591] [ 19.791632] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.791720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.791748] Hardware name: linux,dummy-virt (DT) [ 19.791782] Call trace: [ 19.791805] show_stack+0x20/0x38 (C) [ 19.791856] dump_stack_lvl+0x8c/0xd0 [ 19.791906] print_report+0x118/0x5d0 [ 19.791951] kasan_report+0xdc/0x128 [ 19.791996] __asan_report_load1_noabort+0x20/0x30 [ 19.792045] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.792097] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.792147] kunit_try_run_case+0x170/0x3f0 [ 19.792197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.792271] kthread+0x328/0x630 [ 19.792318] ret_from_fork+0x10/0x20 [ 19.792372] [ 19.792393] Allocated by task 223: [ 19.792424] kasan_save_stack+0x3c/0x68 [ 19.792464] kasan_save_track+0x20/0x40 [ 19.792501] kasan_save_alloc_info+0x40/0x58 [ 19.792540] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.792584] remove_element+0x130/0x1f8 [ 19.792624] mempool_alloc_preallocated+0x58/0xc0 [ 19.792665] mempool_oob_right_helper+0x98/0x2f0 [ 19.792707] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.792749] kunit_try_run_case+0x170/0x3f0 [ 19.792790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.792835] kthread+0x328/0x630 [ 19.792872] ret_from_fork+0x10/0x20 [ 19.792908] [ 19.792927] The buggy address belongs to the object at fff00000c59e4600 [ 19.792927] which belongs to the cache kmalloc-128 of size 128 [ 19.792988] The buggy address is located 0 bytes to the right of [ 19.792988] allocated 115-byte region [fff00000c59e4600, fff00000c59e4673) [ 19.793055] [ 19.793077] The buggy address belongs to the physical page: [ 19.793111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 19.793168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.793233] page_type: f5(slab) [ 19.793276] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.793348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.793394] page dumped because: kasan: bad access detected [ 19.793440] [ 19.793463] Memory state around the buggy address: [ 19.793498] fff00000c59e4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.793544] fff00000c59e4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.793587] >fff00000c59e4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.793627] ^ [ 19.793668] fff00000c59e4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.793712] fff00000c59e4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.793752] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 20.435090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 20.522308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 20.516771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 20.456228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 20.259392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 20.215001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 51.534327] ================================================================== [ 51.534405] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 51.534405] [ 51.534488] Use-after-free read at 0x0000000008442b72 (in kfence-#152): [ 51.534540] test_krealloc+0x51c/0x830 [ 51.534585] kunit_try_run_case+0x170/0x3f0 [ 51.534628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.534675] kthread+0x328/0x630 [ 51.534716] ret_from_fork+0x10/0x20 [ 51.534756] [ 51.534780] kfence-#152: 0x0000000008442b72-0x000000002418ac05, size=32, cache=kmalloc-32 [ 51.534780] [ 51.534835] allocated by task 339 on cpu 1 at 51.533680s (0.001152s ago): [ 51.534903] test_alloc+0x29c/0x628 [ 51.534942] test_krealloc+0xc0/0x830 [ 51.534981] kunit_try_run_case+0x170/0x3f0 [ 51.535022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.535068] kthread+0x328/0x630 [ 51.535107] ret_from_fork+0x10/0x20 [ 51.535145] [ 51.535168] freed by task 339 on cpu 1 at 51.533936s (0.001228s ago): [ 51.535240] krealloc_noprof+0x148/0x360 [ 51.535280] test_krealloc+0x1dc/0x830 [ 51.535318] kunit_try_run_case+0x170/0x3f0 [ 51.535358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.535403] kthread+0x328/0x630 [ 51.535442] ret_from_fork+0x10/0x20 [ 51.535480] [ 51.535523] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 51.535602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.535632] Hardware name: linux,dummy-virt (DT) [ 51.535667] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 51.441834] ================================================================== [ 51.441931] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.441931] [ 51.442028] Use-after-free read at 0x000000003da52c74 (in kfence-#151): [ 51.442084] test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.442133] kunit_try_run_case+0x170/0x3f0 [ 51.442181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.442250] kthread+0x328/0x630 [ 51.442293] ret_from_fork+0x10/0x20 [ 51.442334] [ 51.442357] kfence-#151: 0x000000003da52c74-0x000000001f7f9cd0, size=32, cache=test [ 51.442357] [ 51.442412] allocated by task 337 on cpu 0 at 51.429741s (0.012667s ago): [ 51.442482] test_alloc+0x230/0x628 [ 51.442521] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 51.442564] kunit_try_run_case+0x170/0x3f0 [ 51.442604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.442649] kthread+0x328/0x630 [ 51.442688] ret_from_fork+0x10/0x20 [ 51.442727] [ 51.442750] freed by task 337 on cpu 0 at 51.429852s (0.012895s ago): [ 51.442805] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 51.442845] kunit_try_run_case+0x170/0x3f0 [ 51.442887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.442931] kthread+0x328/0x630 [ 51.442970] ret_from_fork+0x10/0x20 [ 51.443008] [ 51.443055] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 51.443134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.443163] Hardware name: linux,dummy-virt (DT) [ 51.443198] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 28.673239] ================================================================== [ 28.673400] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 28.673400] [ 28.673502] Invalid read at 0x00000000d3f92f65: [ 28.673974] test_invalid_access+0xdc/0x1f0 [ 28.674069] kunit_try_run_case+0x170/0x3f0 [ 28.674124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.674430] kthread+0x328/0x630 [ 28.674488] ret_from_fork+0x10/0x20 [ 28.674544] [ 28.674876] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 28.674969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.675006] Hardware name: linux,dummy-virt (DT) [ 28.675592] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 28.445953] ================================================================== [ 28.446046] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.446046] [ 28.446108] Corrupted memory at 0x00000000d208c000 [ ! . . . . . . . . . . . . . . . ] (in kfence-#147): [ 28.446437] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.446485] kunit_try_run_case+0x170/0x3f0 [ 28.446529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.446573] kthread+0x328/0x630 [ 28.446615] ret_from_fork+0x10/0x20 [ 28.446654] [ 28.446678] kfence-#147: 0x0000000029e18e68-0x00000000a96e3cc9, size=73, cache=kmalloc-96 [ 28.446678] [ 28.446734] allocated by task 327 on cpu 1 at 28.445719s (0.001011s ago): [ 28.446796] test_alloc+0x29c/0x628 [ 28.446835] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 28.446877] kunit_try_run_case+0x170/0x3f0 [ 28.446918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.446964] kthread+0x328/0x630 [ 28.447003] ret_from_fork+0x10/0x20 [ 28.447041] [ 28.447065] freed by task 327 on cpu 1 at 28.445870s (0.001191s ago): [ 28.447125] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 28.447167] kunit_try_run_case+0x170/0x3f0 [ 28.447218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.447262] kthread+0x328/0x630 [ 28.447302] ret_from_fork+0x10/0x20 [ 28.447342] [ 28.447383] CPU: 1 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 28.447462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.447490] Hardware name: linux,dummy-virt (DT) [ 28.447521] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 28.341885] ================================================================== [ 28.341960] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.341960] [ 28.342052] Out-of-bounds read at 0x0000000060d169f8 (105B right of kfence-#146): [ 28.342114] test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.342162] kunit_try_run_case+0x170/0x3f0 [ 28.342224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.342270] kthread+0x328/0x630 [ 28.342314] ret_from_fork+0x10/0x20 [ 28.342357] [ 28.342381] kfence-#146: 0x00000000fe61792c-0x000000007aac11cf, size=73, cache=kmalloc-96 [ 28.342381] [ 28.342436] allocated by task 325 on cpu 1 at 28.341665s (0.000767s ago): [ 28.342507] test_alloc+0x29c/0x628 [ 28.342547] test_kmalloc_aligned_oob_read+0x100/0x468 [ 28.342590] kunit_try_run_case+0x170/0x3f0 [ 28.342632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.342677] kthread+0x328/0x630 [ 28.342716] ret_from_fork+0x10/0x20 [ 28.342755] [ 28.342801] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 28.342881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.342912] Hardware name: linux,dummy-virt (DT) [ 28.342947] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 24.181887] ================================================================== [ 24.181985] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 24.181985] [ 24.182046] Corrupted memory at 0x000000001fa14298 [ ! ] (in kfence-#106): [ 24.182163] test_corruption+0x1d8/0x378 [ 24.182225] kunit_try_run_case+0x170/0x3f0 [ 24.182270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.182316] kthread+0x328/0x630 [ 24.182358] ret_from_fork+0x10/0x20 [ 24.182398] [ 24.182424] kfence-#106: 0x00000000adb18180-0x00000000d365b346, size=32, cache=test [ 24.182424] [ 24.182480] allocated by task 315 on cpu 1 at 24.181738s (0.000738s ago): [ 24.182539] test_alloc+0x230/0x628 [ 24.182579] test_corruption+0x198/0x378 [ 24.182616] kunit_try_run_case+0x170/0x3f0 [ 24.182658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.182703] kthread+0x328/0x630 [ 24.182741] ret_from_fork+0x10/0x20 [ 24.182780] [ 24.182803] freed by task 315 on cpu 1 at 24.181802s (0.000998s ago): [ 24.182862] test_corruption+0x1d8/0x378 [ 24.182901] kunit_try_run_case+0x170/0x3f0 [ 24.182940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.182985] kthread+0x328/0x630 [ 24.183022] ret_from_fork+0x10/0x20 [ 24.183062] [ 24.183105] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 24.183183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.183222] Hardware name: linux,dummy-virt (DT) [ 24.183257] ================================================================== [ 23.869871] ================================================================== [ 23.869964] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 23.869964] [ 23.870029] Corrupted memory at 0x000000000e8c30b0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#103): [ 23.870361] test_corruption+0x120/0x378 [ 23.870409] kunit_try_run_case+0x170/0x3f0 [ 23.870453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.870498] kthread+0x328/0x630 [ 23.870541] ret_from_fork+0x10/0x20 [ 23.870582] [ 23.870605] kfence-#103: 0x00000000b58a8111-0x00000000e9710fac, size=32, cache=test [ 23.870605] [ 23.870661] allocated by task 315 on cpu 1 at 23.869730s (0.000928s ago): [ 23.870722] test_alloc+0x230/0x628 [ 23.870761] test_corruption+0xdc/0x378 [ 23.870800] kunit_try_run_case+0x170/0x3f0 [ 23.870842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.870886] kthread+0x328/0x630 [ 23.870925] ret_from_fork+0x10/0x20 [ 23.870964] [ 23.870987] freed by task 315 on cpu 1 at 23.869790s (0.001193s ago): [ 23.871047] test_corruption+0x120/0x378 [ 23.871087] kunit_try_run_case+0x170/0x3f0 [ 23.871128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.871172] kthread+0x328/0x630 [ 23.871221] ret_from_fork+0x10/0x20 [ 23.871261] [ 23.871306] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 23.871383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.871413] Hardware name: linux,dummy-virt (DT) [ 23.871445] ================================================================== [ 23.662074] ================================================================== [ 23.662171] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 23.662171] [ 23.662247] Corrupted memory at 0x00000000d1d07bd7 [ ! ] (in kfence-#101): [ 23.662376] test_corruption+0x284/0x378 [ 23.662420] kunit_try_run_case+0x170/0x3f0 [ 23.662465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.662510] kthread+0x328/0x630 [ 23.662552] ret_from_fork+0x10/0x20 [ 23.662591] [ 23.662614] kfence-#101: 0x00000000d77cd55f-0x0000000076d77c81, size=32, cache=kmalloc-32 [ 23.662614] [ 23.662671] allocated by task 313 on cpu 1 at 23.661800s (0.000867s ago): [ 23.662733] test_alloc+0x29c/0x628 [ 23.662770] test_corruption+0x198/0x378 [ 23.662811] kunit_try_run_case+0x170/0x3f0 [ 23.662851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.662895] kthread+0x328/0x630 [ 23.662936] ret_from_fork+0x10/0x20 [ 23.662974] [ 23.662997] freed by task 313 on cpu 1 at 23.661907s (0.001086s ago): [ 23.663055] test_corruption+0x284/0x378 [ 23.663094] kunit_try_run_case+0x170/0x3f0 [ 23.663134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.663179] kthread+0x328/0x630 [ 23.663230] ret_from_fork+0x10/0x20 [ 23.663268] [ 23.663312] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 23.663390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.663421] Hardware name: linux,dummy-virt (DT) [ 23.663453] ================================================================== [ 23.557954] ================================================================== [ 23.558047] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 23.558047] [ 23.558109] Corrupted memory at 0x00000000d50d6e38 [ ! . . . . . . . . . . . . . . . ] (in kfence-#100): [ 23.558435] test_corruption+0x278/0x378 [ 23.558481] kunit_try_run_case+0x170/0x3f0 [ 23.558527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.558573] kthread+0x328/0x630 [ 23.558615] ret_from_fork+0x10/0x20 [ 23.558657] [ 23.558680] kfence-#100: 0x00000000891cf55c-0x0000000011ab3e63, size=32, cache=kmalloc-32 [ 23.558680] [ 23.558736] allocated by task 313 on cpu 1 at 23.557764s (0.000968s ago): [ 23.558796] test_alloc+0x29c/0x628 [ 23.558837] test_corruption+0xdc/0x378 [ 23.558875] kunit_try_run_case+0x170/0x3f0 [ 23.558916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.558961] kthread+0x328/0x630 [ 23.559000] ret_from_fork+0x10/0x20 [ 23.559039] [ 23.559062] freed by task 313 on cpu 1 at 23.557866s (0.001192s ago): [ 23.559121] test_corruption+0x278/0x378 [ 23.559159] kunit_try_run_case+0x170/0x3f0 [ 23.559199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.559255] kthread+0x328/0x630 [ 23.559294] ret_from_fork+0x10/0x20 [ 23.559334] [ 23.559383] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 23.559462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.559491] Hardware name: linux,dummy-virt (DT) [ 23.559526] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 23.241885] ================================================================== [ 23.241973] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 23.241973] [ 23.242033] Invalid free of 0x000000002da13f39 (in kfence-#97): [ 23.242087] test_invalid_addr_free+0x1ac/0x238 [ 23.242133] kunit_try_run_case+0x170/0x3f0 [ 23.242180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.242241] kthread+0x328/0x630 [ 23.242283] ret_from_fork+0x10/0x20 [ 23.242324] [ 23.242347] kfence-#97: 0x00000000f1fd5b59-0x00000000f4ba7209, size=32, cache=kmalloc-32 [ 23.242347] [ 23.242404] allocated by task 309 on cpu 0 at 23.241744s (0.000656s ago): [ 23.242467] test_alloc+0x29c/0x628 [ 23.242506] test_invalid_addr_free+0xd4/0x238 [ 23.242547] kunit_try_run_case+0x170/0x3f0 [ 23.242589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.242635] kthread+0x328/0x630 [ 23.242673] ret_from_fork+0x10/0x20 [ 23.242712] [ 23.242761] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 23.242840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.242869] Hardware name: linux,dummy-virt (DT) [ 23.242905] ================================================================== [ 23.350659] ================================================================== [ 23.350755] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 23.350755] [ 23.350815] Invalid free of 0x00000000c6cd1d47 (in kfence-#98): [ 23.350869] test_invalid_addr_free+0xec/0x238 [ 23.350912] kunit_try_run_case+0x170/0x3f0 [ 23.350957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.351002] kthread+0x328/0x630 [ 23.351043] ret_from_fork+0x10/0x20 [ 23.351084] [ 23.351108] kfence-#98: 0x0000000064563c51-0x0000000024f6ce94, size=32, cache=test [ 23.351108] [ 23.351161] allocated by task 311 on cpu 0 at 23.350530s (0.000628s ago): [ 23.351238] test_alloc+0x230/0x628 [ 23.351278] test_invalid_addr_free+0xd4/0x238 [ 23.351319] kunit_try_run_case+0x170/0x3f0 [ 23.351359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.351404] kthread+0x328/0x630 [ 23.351442] ret_from_fork+0x10/0x20 [ 23.351482] [ 23.351523] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 23.351603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.351630] Hardware name: linux,dummy-virt (DT) [ 23.351663] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 23.137921] ================================================================== [ 23.138014] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 23.138014] [ 23.138073] Invalid free of 0x000000006fb98c8e (in kfence-#96): [ 23.138126] test_double_free+0x100/0x238 [ 23.138173] kunit_try_run_case+0x170/0x3f0 [ 23.138234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.138280] kthread+0x328/0x630 [ 23.138321] ret_from_fork+0x10/0x20 [ 23.138361] [ 23.138386] kfence-#96: 0x000000006fb98c8e-0x00000000270dc602, size=32, cache=test [ 23.138386] [ 23.138437] allocated by task 307 on cpu 1 at 23.137705s (0.000729s ago): [ 23.138500] test_alloc+0x230/0x628 [ 23.138540] test_double_free+0xd4/0x238 [ 23.138578] kunit_try_run_case+0x170/0x3f0 [ 23.138619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.138663] kthread+0x328/0x630 [ 23.138702] ret_from_fork+0x10/0x20 [ 23.138741] [ 23.138764] freed by task 307 on cpu 1 at 23.137765s (0.000996s ago): [ 23.138824] test_double_free+0xf0/0x238 [ 23.138862] kunit_try_run_case+0x170/0x3f0 [ 23.138903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.138949] kthread+0x328/0x630 [ 23.138987] ret_from_fork+0x10/0x20 [ 23.139026] [ 23.139069] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 23.139146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.139176] Hardware name: linux,dummy-virt (DT) [ 23.139221] ================================================================== [ 23.034050] ================================================================== [ 23.034175] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 23.034175] [ 23.034262] Invalid free of 0x0000000058bd1c1c (in kfence-#95): [ 23.034328] test_double_free+0x1bc/0x238 [ 23.034374] kunit_try_run_case+0x170/0x3f0 [ 23.034421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.034468] kthread+0x328/0x630 [ 23.034509] ret_from_fork+0x10/0x20 [ 23.034549] [ 23.034574] kfence-#95: 0x0000000058bd1c1c-0x00000000ada53306, size=32, cache=kmalloc-32 [ 23.034574] [ 23.034629] allocated by task 305 on cpu 1 at 23.033791s (0.000834s ago): [ 23.034691] test_alloc+0x29c/0x628 [ 23.034729] test_double_free+0xd4/0x238 [ 23.034768] kunit_try_run_case+0x170/0x3f0 [ 23.034808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.034855] kthread+0x328/0x630 [ 23.034893] ret_from_fork+0x10/0x20 [ 23.034931] [ 23.034954] freed by task 305 on cpu 1 at 23.033868s (0.001082s ago): [ 23.035016] test_double_free+0x1ac/0x238 [ 23.035055] kunit_try_run_case+0x170/0x3f0 [ 23.035096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.035143] kthread+0x328/0x630 [ 23.035182] ret_from_fork+0x10/0x20 [ 23.035233] [ 23.035282] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 23.035361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.035396] Hardware name: linux,dummy-virt (DT) [ 23.035431] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 22.714636] ================================================================== [ 22.714997] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.714997] [ 22.715104] Use-after-free read at 0x0000000091d925ae (in kfence-#92): [ 22.715158] test_use_after_free_read+0x114/0x248 [ 22.715408] kunit_try_run_case+0x170/0x3f0 [ 22.715590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.715650] kthread+0x328/0x630 [ 22.715752] ret_from_fork+0x10/0x20 [ 22.715793] [ 22.715816] kfence-#92: 0x0000000091d925ae-0x00000000f8321f6c, size=32, cache=test [ 22.715816] [ 22.716079] allocated by task 299 on cpu 0 at 22.714301s (0.001746s ago): [ 22.716267] test_alloc+0x230/0x628 [ 22.716407] test_use_after_free_read+0xd0/0x248 [ 22.716594] kunit_try_run_case+0x170/0x3f0 [ 22.716858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.716906] kthread+0x328/0x630 [ 22.716944] ret_from_fork+0x10/0x20 [ 22.716983] [ 22.717007] freed by task 299 on cpu 0 at 22.714513s (0.002491s ago): [ 22.717502] test_use_after_free_read+0xf0/0x248 [ 22.717560] kunit_try_run_case+0x170/0x3f0 [ 22.717625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.717671] kthread+0x328/0x630 [ 22.717711] ret_from_fork+0x10/0x20 [ 22.717776] [ 22.717861] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 22.718148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.718183] Hardware name: linux,dummy-virt (DT) [ 22.718228] ================================================================== [ 22.607504] ================================================================== [ 22.607601] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.607601] [ 22.607693] Use-after-free read at 0x000000002ea02368 (in kfence-#91): [ 22.607745] test_use_after_free_read+0x114/0x248 [ 22.607790] kunit_try_run_case+0x170/0x3f0 [ 22.607834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.607881] kthread+0x328/0x630 [ 22.608437] ret_from_fork+0x10/0x20 [ 22.608516] [ 22.608974] kfence-#91: 0x000000002ea02368-0x0000000070e729a0, size=32, cache=kmalloc-32 [ 22.608974] [ 22.609097] allocated by task 297 on cpu 0 at 22.606974s (0.002098s ago): [ 22.609562] test_alloc+0x29c/0x628 [ 22.609628] test_use_after_free_read+0xd0/0x248 [ 22.609768] kunit_try_run_case+0x170/0x3f0 [ 22.609980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.610570] kthread+0x328/0x630 [ 22.610746] ret_from_fork+0x10/0x20 [ 22.611083] [ 22.611121] freed by task 297 on cpu 0 at 22.607079s (0.004037s ago): [ 22.611656] test_use_after_free_read+0x1c0/0x248 [ 22.611811] kunit_try_run_case+0x170/0x3f0 [ 22.611960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.612009] kthread+0x328/0x630 [ 22.612047] ret_from_fork+0x10/0x20 [ 22.612679] [ 22.612737] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 22.612955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.612995] Hardware name: linux,dummy-virt (DT) [ 22.613045] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 22.498433] ================================================================== [ 22.498554] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 22.498554] [ 22.498755] Out-of-bounds write at 0x00000000f5e7ec1e (1B left of kfence-#90): [ 22.498827] test_out_of_bounds_write+0x100/0x240 [ 22.498874] kunit_try_run_case+0x170/0x3f0 [ 22.499061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.499340] kthread+0x328/0x630 [ 22.499675] ret_from_fork+0x10/0x20 [ 22.499914] [ 22.499940] kfence-#90: 0x000000000770588e-0x000000002e0a4175, size=32, cache=test [ 22.499940] [ 22.500322] allocated by task 295 on cpu 0 at 22.498099s (0.002215s ago): [ 22.500406] test_alloc+0x230/0x628 [ 22.500468] test_out_of_bounds_write+0xc8/0x240 [ 22.500510] kunit_try_run_case+0x170/0x3f0 [ 22.500786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.501023] kthread+0x328/0x630 [ 22.501062] ret_from_fork+0x10/0x20 [ 22.501102] [ 22.501148] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 22.501240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.501270] Hardware name: linux,dummy-virt (DT) [ 22.501302] ================================================================== [ 22.290366] ================================================================== [ 22.290450] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 22.290450] [ 22.290535] Out-of-bounds write at 0x00000000e11094f6 (1B left of kfence-#88): [ 22.290593] test_out_of_bounds_write+0x100/0x240 [ 22.290639] kunit_try_run_case+0x170/0x3f0 [ 22.290727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.290784] kthread+0x328/0x630 [ 22.290845] ret_from_fork+0x10/0x20 [ 22.290901] [ 22.290942] kfence-#88: 0x000000001fb7efbb-0x00000000ad4e2db5, size=32, cache=kmalloc-32 [ 22.290942] [ 22.291033] allocated by task 293 on cpu 0 at 22.290201s (0.000792s ago): [ 22.291103] test_alloc+0x29c/0x628 [ 22.291162] test_out_of_bounds_write+0xc8/0x240 [ 22.291235] kunit_try_run_case+0x170/0x3f0 [ 22.291278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.291322] kthread+0x328/0x630 [ 22.291379] ret_from_fork+0x10/0x20 [ 22.291572] [ 22.291641] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 22.291751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.291806] Hardware name: linux,dummy-virt (DT) [ 22.291867] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 21.870292] ================================================================== [ 21.870374] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 21.870374] [ 21.870495] Out-of-bounds read at 0x00000000e2116ad3 (1B left of kfence-#84): [ 21.870569] test_out_of_bounds_read+0x114/0x3e0 [ 21.870641] kunit_try_run_case+0x170/0x3f0 [ 21.870712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.870760] kthread+0x328/0x630 [ 21.870818] ret_from_fork+0x10/0x20 [ 21.870863] [ 21.871110] kfence-#84: 0x0000000020e349ec-0x000000000085d0e1, size=32, cache=test [ 21.871110] [ 21.871231] allocated by task 291 on cpu 0 at 21.869929s (0.001249s ago): [ 21.871344] test_alloc+0x230/0x628 [ 21.871431] test_out_of_bounds_read+0xdc/0x3e0 [ 21.871643] kunit_try_run_case+0x170/0x3f0 [ 21.871698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.871744] kthread+0x328/0x630 [ 21.871843] ret_from_fork+0x10/0x20 [ 21.871900] [ 21.871966] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.872049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.872119] Hardware name: linux,dummy-virt (DT) [ 21.872168] ================================================================== [ 21.331696] ================================================================== [ 21.331810] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 21.331810] [ 21.331942] Out-of-bounds read at 0x000000007e5279be (1B left of kfence-#79): [ 21.332025] test_out_of_bounds_read+0x114/0x3e0 [ 21.332077] kunit_try_run_case+0x170/0x3f0 [ 21.332122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.332168] kthread+0x328/0x630 [ 21.332229] ret_from_fork+0x10/0x20 [ 21.332271] [ 21.332297] kfence-#79: 0x0000000096c878e4-0x00000000f689520e, size=32, cache=kmalloc-32 [ 21.332297] [ 21.332353] allocated by task 289 on cpu 0 at 21.330486s (0.001863s ago): [ 21.332423] test_alloc+0x29c/0x628 [ 21.332461] test_out_of_bounds_read+0xdc/0x3e0 [ 21.332501] kunit_try_run_case+0x170/0x3f0 [ 21.332542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.332585] kthread+0x328/0x630 [ 21.332644] ret_from_fork+0x10/0x20 [ 21.332700] [ 21.332746] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.332824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.332863] Hardware name: linux,dummy-virt (DT) [ 21.332897] ================================================================== [ 21.438299] ================================================================== [ 21.438379] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.438379] [ 21.438478] Out-of-bounds read at 0x00000000dae5f7c0 (32B right of kfence-#80): [ 21.438554] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.438635] kunit_try_run_case+0x170/0x3f0 [ 21.438700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.438765] kthread+0x328/0x630 [ 21.438905] ret_from_fork+0x10/0x20 [ 21.439069] [ 21.439095] kfence-#80: 0x000000009fd747b2-0x00000000507a81d7, size=32, cache=kmalloc-32 [ 21.439095] [ 21.439258] allocated by task 289 on cpu 0 at 21.437866s (0.001319s ago): [ 21.439330] test_alloc+0x29c/0x628 [ 21.439531] test_out_of_bounds_read+0x198/0x3e0 [ 21.439732] kunit_try_run_case+0x170/0x3f0 [ 21.439777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.439921] kthread+0x328/0x630 [ 21.440001] ret_from_fork+0x10/0x20 [ 21.440062] [ 21.440143] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.440242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.440271] Hardware name: linux,dummy-virt (DT) [ 21.440303] ================================================================== [ 21.974093] ================================================================== [ 21.974176] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.974176] [ 21.974593] Out-of-bounds read at 0x00000000e378db27 (32B right of kfence-#85): [ 21.974704] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.974755] kunit_try_run_case+0x170/0x3f0 [ 21.974799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.974845] kthread+0x328/0x630 [ 21.974927] ret_from_fork+0x10/0x20 [ 21.974968] [ 21.974994] kfence-#85: 0x00000000ff92fff2-0x000000008f0c264f, size=32, cache=test [ 21.974994] [ 21.975083] allocated by task 291 on cpu 0 at 21.973959s (0.001102s ago): [ 21.975170] test_alloc+0x230/0x628 [ 21.975279] test_out_of_bounds_read+0x198/0x3e0 [ 21.975322] kunit_try_run_case+0x170/0x3f0 [ 21.975392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.975456] kthread+0x328/0x630 [ 21.975497] ret_from_fork+0x10/0x20 [ 21.975808] [ 21.975904] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.976007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.976061] Hardware name: linux,dummy-virt (DT) [ 21.976144] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_oob_memset_8
[ 17.944243] ================================================================== [ 17.944698] BUG: KFENCE: memory corruption in kmalloc_oob_memset_8+0x170/0x2f8 [ 17.944698] [ 17.945317] Corrupted memory at 0x000000002576805e [ ! . . . . . . . . . . . . . . . ] (in kfence-#56): [ 17.946529] kmalloc_oob_memset_8+0x170/0x2f8 [ 17.946954] kunit_try_run_case+0x170/0x3f0 [ 17.947343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.947503] kthread+0x328/0x630 [ 17.947573] ret_from_fork+0x10/0x20 [ 17.947881] [ 17.948042] kfence-#56: 0x000000008cc826dd-0x000000001791213f, size=120, cache=kmalloc-128 [ 17.948042] [ 17.948238] allocated by task 178 on cpu 0 at 17.940428s (0.007761s ago): [ 17.948640] kmalloc_oob_memset_8+0xb0/0x2f8 [ 17.948738] kunit_try_run_case+0x170/0x3f0 [ 17.948780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.949013] kthread+0x328/0x630 [ 17.949139] ret_from_fork+0x10/0x20 [ 17.949303] [ 17.949333] freed by task 178 on cpu 0 at 17.944131s (0.005188s ago): [ 17.949571] kmalloc_oob_memset_8+0x170/0x2f8 [ 17.949852] kunit_try_run_case+0x170/0x3f0 [ 17.949938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.950104] kthread+0x328/0x630 [ 17.950241] ret_from_fork+0x10/0x20 [ 17.950439] [ 17.950502] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.950982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.951029] Hardware name: linux,dummy-virt (DT) [ 17.951466] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_oob_16
[ 17.839625] ================================================================== [ 17.839756] BUG: KFENCE: memory corruption in kmalloc_oob_16+0x1f0/0x3f8 [ 17.839756] [ 17.839821] Corrupted memory at 0x000000008a2a8b16 [ ! ! ! ] (in kfence-#55): [ 17.845105] kmalloc_oob_16+0x1f0/0x3f8 [ 17.845611] kunit_try_run_case+0x170/0x3f0 [ 17.846171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.846272] kthread+0x328/0x630 [ 17.846671] ret_from_fork+0x10/0x20 [ 17.847159] [ 17.847926] kfence-#55: 0x0000000063b392e4-0x0000000069a94259, size=13, cache=kmalloc-16 [ 17.847926] [ 17.849105] allocated by task 168 on cpu 0 at 17.838129s (0.010383s ago): [ 17.850140] kmalloc_oob_16+0xb4/0x3f8 [ 17.851045] kunit_try_run_case+0x170/0x3f0 [ 17.851185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.851625] kthread+0x328/0x630 [ 17.851714] ret_from_fork+0x10/0x20 [ 17.852083] [ 17.852428] freed by task 168 on cpu 0 at 17.838865s (0.013419s ago): [ 17.852779] kmalloc_oob_16+0x1f0/0x3f8 [ 17.853163] kunit_try_run_case+0x170/0x3f0 [ 17.853415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.853560] kthread+0x328/0x630 [ 17.853870] ret_from_fork+0x10/0x20 [ 17.854141] [ 17.854366] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.854565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.854632] Hardware name: linux,dummy-virt (DT) [ 17.854688] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 21.168287] ================================================================== [ 21.168483] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 21.168566] Write of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287 [ 21.168735] [ 21.168769] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.169024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.169070] Hardware name: linux,dummy-virt (DT) [ 21.169353] Call trace: [ 21.169513] show_stack+0x20/0x38 (C) [ 21.169697] dump_stack_lvl+0x8c/0xd0 [ 21.170034] print_report+0x118/0x5d0 [ 21.170523] kasan_report+0xdc/0x128 [ 21.170974] kasan_check_range+0x100/0x1a8 [ 21.171149] __kasan_check_write+0x20/0x30 [ 21.171258] strncpy_from_user+0x3c/0x2a0 [ 21.171377] copy_user_test_oob+0x5c0/0xec8 [ 21.171684] kunit_try_run_case+0x170/0x3f0 [ 21.171832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.172253] kthread+0x328/0x630 [ 21.172404] ret_from_fork+0x10/0x20 [ 21.172581] [ 21.172739] Allocated by task 287: [ 21.172935] kasan_save_stack+0x3c/0x68 [ 21.173237] kasan_save_track+0x20/0x40 [ 21.173508] kasan_save_alloc_info+0x40/0x58 [ 21.173794] __kasan_kmalloc+0xd4/0xd8 [ 21.174154] __kmalloc_noprof+0x198/0x4c8 [ 21.174250] kunit_kmalloc_array+0x34/0x88 [ 21.174393] copy_user_test_oob+0xac/0xec8 [ 21.174477] kunit_try_run_case+0x170/0x3f0 [ 21.174521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.174567] kthread+0x328/0x630 [ 21.174746] ret_from_fork+0x10/0x20 [ 21.174858] [ 21.175006] The buggy address belongs to the object at fff00000c59cb700 [ 21.175006] which belongs to the cache kmalloc-128 of size 128 [ 21.175253] The buggy address is located 0 bytes inside of [ 21.175253] allocated 120-byte region [fff00000c59cb700, fff00000c59cb778) [ 21.175521] [ 21.175564] The buggy address belongs to the physical page: [ 21.175679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 21.175787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.175972] page_type: f5(slab) [ 21.176027] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.176081] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.176324] page dumped because: kasan: bad access detected [ 21.176444] [ 21.176797] Memory state around the buggy address: [ 21.177356] fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.177720] fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.177782] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.177979] ^ [ 21.178285] fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.178629] fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.178678] ================================================================== [ 21.180828] ================================================================== [ 21.180891] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 21.181240] Write of size 1 at addr fff00000c59cb778 by task kunit_try_catch/287 [ 21.181321] [ 21.181355] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.181522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.181762] Hardware name: linux,dummy-virt (DT) [ 21.181873] Call trace: [ 21.182062] show_stack+0x20/0x38 (C) [ 21.182182] dump_stack_lvl+0x8c/0xd0 [ 21.182281] print_report+0x118/0x5d0 [ 21.182629] kasan_report+0xdc/0x128 [ 21.182693] __asan_report_store1_noabort+0x20/0x30 [ 21.182816] strncpy_from_user+0x270/0x2a0 [ 21.182889] copy_user_test_oob+0x5c0/0xec8 [ 21.182940] kunit_try_run_case+0x170/0x3f0 [ 21.183005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.183061] kthread+0x328/0x630 [ 21.183108] ret_from_fork+0x10/0x20 [ 21.183166] [ 21.183191] Allocated by task 287: [ 21.183235] kasan_save_stack+0x3c/0x68 [ 21.183287] kasan_save_track+0x20/0x40 [ 21.183336] kasan_save_alloc_info+0x40/0x58 [ 21.183376] __kasan_kmalloc+0xd4/0xd8 [ 21.183422] __kmalloc_noprof+0x198/0x4c8 [ 21.183460] kunit_kmalloc_array+0x34/0x88 [ 21.183502] copy_user_test_oob+0xac/0xec8 [ 21.183542] kunit_try_run_case+0x170/0x3f0 [ 21.183582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.183645] kthread+0x328/0x630 [ 21.183682] ret_from_fork+0x10/0x20 [ 21.183720] [ 21.183750] The buggy address belongs to the object at fff00000c59cb700 [ 21.183750] which belongs to the cache kmalloc-128 of size 128 [ 21.183813] The buggy address is located 0 bytes to the right of [ 21.183813] allocated 120-byte region [fff00000c59cb700, fff00000c59cb778) [ 21.183888] [ 21.183926] The buggy address belongs to the physical page: [ 21.183960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 21.184015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.184093] page_type: f5(slab) [ 21.184132] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.184187] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.184274] page dumped because: kasan: bad access detected [ 21.184482] [ 21.184820] Memory state around the buggy address: [ 21.185221] fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.185698] fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.186132] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.186230] ^ [ 21.186300] fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.186369] fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.186435] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 21.152197] ================================================================== [ 21.152663] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 21.152964] Write of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287 [ 21.153166] [ 21.153250] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.153511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.153758] Hardware name: linux,dummy-virt (DT) [ 21.153814] Call trace: [ 21.153994] show_stack+0x20/0x38 (C) [ 21.154148] dump_stack_lvl+0x8c/0xd0 [ 21.154340] print_report+0x118/0x5d0 [ 21.154712] kasan_report+0xdc/0x128 [ 21.154876] kasan_check_range+0x100/0x1a8 [ 21.154944] __kasan_check_write+0x20/0x30 [ 21.154993] copy_user_test_oob+0x434/0xec8 [ 21.155051] kunit_try_run_case+0x170/0x3f0 [ 21.155101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.155158] kthread+0x328/0x630 [ 21.155225] ret_from_fork+0x10/0x20 [ 21.155277] [ 21.155298] Allocated by task 287: [ 21.155344] kasan_save_stack+0x3c/0x68 [ 21.155386] kasan_save_track+0x20/0x40 [ 21.155438] kasan_save_alloc_info+0x40/0x58 [ 21.155480] __kasan_kmalloc+0xd4/0xd8 [ 21.155528] __kmalloc_noprof+0x198/0x4c8 [ 21.155582] kunit_kmalloc_array+0x34/0x88 [ 21.155624] copy_user_test_oob+0xac/0xec8 [ 21.155661] kunit_try_run_case+0x170/0x3f0 [ 21.155710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.155758] kthread+0x328/0x630 [ 21.155795] ret_from_fork+0x10/0x20 [ 21.155832] [ 21.155864] The buggy address belongs to the object at fff00000c59cb700 [ 21.155864] which belongs to the cache kmalloc-128 of size 128 [ 21.155927] The buggy address is located 0 bytes inside of [ 21.155927] allocated 120-byte region [fff00000c59cb700, fff00000c59cb778) [ 21.156005] [ 21.156048] The buggy address belongs to the physical page: [ 21.156090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 21.156156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.156222] page_type: f5(slab) [ 21.156262] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.156316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.156371] page dumped because: kasan: bad access detected [ 21.156416] [ 21.156437] Memory state around the buggy address: [ 21.156471] fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.156518] fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.156565] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.156607] ^ [ 21.156659] fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.156706] fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.156750] ================================================================== [ 21.157958] ================================================================== [ 21.158013] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 21.158241] Read of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287 [ 21.158318] [ 21.158349] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.158435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.158463] Hardware name: linux,dummy-virt (DT) [ 21.158494] Call trace: [ 21.158733] show_stack+0x20/0x38 (C) [ 21.158802] dump_stack_lvl+0x8c/0xd0 [ 21.159270] print_report+0x118/0x5d0 [ 21.159323] kasan_report+0xdc/0x128 [ 21.159490] kasan_check_range+0x100/0x1a8 [ 21.159835] __kasan_check_read+0x20/0x30 [ 21.159918] copy_user_test_oob+0x4a0/0xec8 [ 21.160049] kunit_try_run_case+0x170/0x3f0 [ 21.160102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.160166] kthread+0x328/0x630 [ 21.160230] ret_from_fork+0x10/0x20 [ 21.160283] [ 21.160304] Allocated by task 287: [ 21.160332] kasan_save_stack+0x3c/0x68 [ 21.160376] kasan_save_track+0x20/0x40 [ 21.160413] kasan_save_alloc_info+0x40/0x58 [ 21.160456] __kasan_kmalloc+0xd4/0xd8 [ 21.160494] __kmalloc_noprof+0x198/0x4c8 [ 21.160530] kunit_kmalloc_array+0x34/0x88 [ 21.161241] copy_user_test_oob+0xac/0xec8 [ 21.161305] kunit_try_run_case+0x170/0x3f0 [ 21.161699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.162029] kthread+0x328/0x630 [ 21.162181] ret_from_fork+0x10/0x20 [ 21.162280] [ 21.162303] The buggy address belongs to the object at fff00000c59cb700 [ 21.162303] which belongs to the cache kmalloc-128 of size 128 [ 21.162375] The buggy address is located 0 bytes inside of [ 21.162375] allocated 120-byte region [fff00000c59cb700, fff00000c59cb778) [ 21.162794] [ 21.162843] The buggy address belongs to the physical page: [ 21.163043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 21.163174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.163362] page_type: f5(slab) [ 21.163451] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.163631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.163681] page dumped because: kasan: bad access detected [ 21.163875] [ 21.164121] Memory state around the buggy address: [ 21.164193] fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.164522] fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.164816] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.165185] ^ [ 21.165519] fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.165754] fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.165984] ================================================================== [ 21.102335] ================================================================== [ 21.103029] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 21.103427] Write of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287 [ 21.103493] [ 21.103836] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.104013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.104058] Hardware name: linux,dummy-virt (DT) [ 21.104093] Call trace: [ 21.104458] show_stack+0x20/0x38 (C) [ 21.104771] dump_stack_lvl+0x8c/0xd0 [ 21.104950] print_report+0x118/0x5d0 [ 21.105331] kasan_report+0xdc/0x128 [ 21.105413] kasan_check_range+0x100/0x1a8 [ 21.105543] __kasan_check_write+0x20/0x30 [ 21.105687] copy_user_test_oob+0x234/0xec8 [ 21.105764] kunit_try_run_case+0x170/0x3f0 [ 21.105831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.105889] kthread+0x328/0x630 [ 21.106283] ret_from_fork+0x10/0x20 [ 21.106395] [ 21.106719] Allocated by task 287: [ 21.106797] kasan_save_stack+0x3c/0x68 [ 21.107223] kasan_save_track+0x20/0x40 [ 21.107414] kasan_save_alloc_info+0x40/0x58 [ 21.107491] __kasan_kmalloc+0xd4/0xd8 [ 21.107531] __kmalloc_noprof+0x198/0x4c8 [ 21.107573] kunit_kmalloc_array+0x34/0x88 [ 21.107626] copy_user_test_oob+0xac/0xec8 [ 21.107670] kunit_try_run_case+0x170/0x3f0 [ 21.107713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.107767] kthread+0x328/0x630 [ 21.107822] ret_from_fork+0x10/0x20 [ 21.107867] [ 21.107890] The buggy address belongs to the object at fff00000c59cb700 [ 21.107890] which belongs to the cache kmalloc-128 of size 128 [ 21.107964] The buggy address is located 0 bytes inside of [ 21.107964] allocated 120-byte region [fff00000c59cb700, fff00000c59cb778) [ 21.108039] [ 21.108073] The buggy address belongs to the physical page: [ 21.108131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 21.108229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.108286] page_type: f5(slab) [ 21.108351] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.108411] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.108456] page dumped because: kasan: bad access detected [ 21.108490] [ 21.108518] Memory state around the buggy address: [ 21.108569] fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.108621] fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.108668] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.108710] ^ [ 21.108753] fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.108804] fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.108857] ================================================================== [ 21.134625] ================================================================== [ 21.134690] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 21.135015] Write of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287 [ 21.135403] [ 21.135482] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.135670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.135701] Hardware name: linux,dummy-virt (DT) [ 21.135736] Call trace: [ 21.135762] show_stack+0x20/0x38 (C) [ 21.135886] dump_stack_lvl+0x8c/0xd0 [ 21.135937] print_report+0x118/0x5d0 [ 21.135983] kasan_report+0xdc/0x128 [ 21.136030] kasan_check_range+0x100/0x1a8 [ 21.136077] __kasan_check_write+0x20/0x30 [ 21.136137] copy_user_test_oob+0x35c/0xec8 [ 21.136186] kunit_try_run_case+0x170/0x3f0 [ 21.136261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.136319] kthread+0x328/0x630 [ 21.136365] ret_from_fork+0x10/0x20 [ 21.136412] [ 21.136442] Allocated by task 287: [ 21.136472] kasan_save_stack+0x3c/0x68 [ 21.136525] kasan_save_track+0x20/0x40 [ 21.136563] kasan_save_alloc_info+0x40/0x58 [ 21.136604] __kasan_kmalloc+0xd4/0xd8 [ 21.136640] __kmalloc_noprof+0x198/0x4c8 [ 21.136678] kunit_kmalloc_array+0x34/0x88 [ 21.136725] copy_user_test_oob+0xac/0xec8 [ 21.136764] kunit_try_run_case+0x170/0x3f0 [ 21.136805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.136859] kthread+0x328/0x630 [ 21.136898] ret_from_fork+0x10/0x20 [ 21.136935] [ 21.136957] The buggy address belongs to the object at fff00000c59cb700 [ 21.136957] which belongs to the cache kmalloc-128 of size 128 [ 21.137024] The buggy address is located 0 bytes inside of [ 21.137024] allocated 120-byte region [fff00000c59cb700, fff00000c59cb778) [ 21.137099] [ 21.137130] The buggy address belongs to the physical page: [ 21.137167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 21.137240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.137291] page_type: f5(slab) [ 21.137329] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.137921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.138439] page dumped because: kasan: bad access detected [ 21.138737] [ 21.139022] Memory state around the buggy address: [ 21.139509] fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.139695] fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.139779] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.139989] ^ [ 21.140149] fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.140216] fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.140889] ================================================================== [ 21.115694] ================================================================== [ 21.115756] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 21.115835] Read of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287 [ 21.115898] [ 21.115933] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.116369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.116421] Hardware name: linux,dummy-virt (DT) [ 21.116459] Call trace: [ 21.116485] show_stack+0x20/0x38 (C) [ 21.116596] dump_stack_lvl+0x8c/0xd0 [ 21.116651] print_report+0x118/0x5d0 [ 21.116697] kasan_report+0xdc/0x128 [ 21.116795] kasan_check_range+0x100/0x1a8 [ 21.116849] __kasan_check_read+0x20/0x30 [ 21.116906] copy_user_test_oob+0x728/0xec8 [ 21.116972] kunit_try_run_case+0x170/0x3f0 [ 21.117025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.117082] kthread+0x328/0x630 [ 21.117127] ret_from_fork+0x10/0x20 [ 21.117542] [ 21.117596] Allocated by task 287: [ 21.117703] kasan_save_stack+0x3c/0x68 [ 21.117793] kasan_save_track+0x20/0x40 [ 21.118154] kasan_save_alloc_info+0x40/0x58 [ 21.118314] __kasan_kmalloc+0xd4/0xd8 [ 21.118474] __kmalloc_noprof+0x198/0x4c8 [ 21.118561] kunit_kmalloc_array+0x34/0x88 [ 21.118602] copy_user_test_oob+0xac/0xec8 [ 21.118674] kunit_try_run_case+0x170/0x3f0 [ 21.118977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.119176] kthread+0x328/0x630 [ 21.119343] ret_from_fork+0x10/0x20 [ 21.119432] [ 21.119490] The buggy address belongs to the object at fff00000c59cb700 [ 21.119490] which belongs to the cache kmalloc-128 of size 128 [ 21.119722] The buggy address is located 0 bytes inside of [ 21.119722] allocated 120-byte region [fff00000c59cb700, fff00000c59cb778) [ 21.119993] [ 21.120064] The buggy address belongs to the physical page: [ 21.120232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 21.120346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.120403] page_type: f5(slab) [ 21.120952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.121182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.121288] page dumped because: kasan: bad access detected [ 21.121428] [ 21.121480] Memory state around the buggy address: [ 21.121554] fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.121604] fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.121651] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.121693] ^ [ 21.121739] fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.122413] fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.122519] ================================================================== [ 21.142005] ================================================================== [ 21.142421] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 21.142490] Read of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287 [ 21.142546] [ 21.142579] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.143232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.143287] Hardware name: linux,dummy-virt (DT) [ 21.143323] Call trace: [ 21.143347] show_stack+0x20/0x38 (C) [ 21.143400] dump_stack_lvl+0x8c/0xd0 [ 21.143991] print_report+0x118/0x5d0 [ 21.144064] kasan_report+0xdc/0x128 [ 21.144286] kasan_check_range+0x100/0x1a8 [ 21.144350] __kasan_check_read+0x20/0x30 [ 21.144402] copy_user_test_oob+0x3c8/0xec8 [ 21.144674] kunit_try_run_case+0x170/0x3f0 [ 21.144904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.145073] kthread+0x328/0x630 [ 21.145184] ret_from_fork+0x10/0x20 [ 21.145252] [ 21.145273] Allocated by task 287: [ 21.145308] kasan_save_stack+0x3c/0x68 [ 21.145688] kasan_save_track+0x20/0x40 [ 21.145988] kasan_save_alloc_info+0x40/0x58 [ 21.146185] __kasan_kmalloc+0xd4/0xd8 [ 21.146374] __kmalloc_noprof+0x198/0x4c8 [ 21.146455] kunit_kmalloc_array+0x34/0x88 [ 21.146544] copy_user_test_oob+0xac/0xec8 [ 21.146586] kunit_try_run_case+0x170/0x3f0 [ 21.146991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.147312] kthread+0x328/0x630 [ 21.147394] ret_from_fork+0x10/0x20 [ 21.147504] [ 21.147674] The buggy address belongs to the object at fff00000c59cb700 [ 21.147674] which belongs to the cache kmalloc-128 of size 128 [ 21.147897] The buggy address is located 0 bytes inside of [ 21.147897] allocated 120-byte region [fff00000c59cb700, fff00000c59cb778) [ 21.148174] [ 21.148225] The buggy address belongs to the physical page: [ 21.148318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 21.148497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.148894] page_type: f5(slab) [ 21.148952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.149050] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.149129] page dumped because: kasan: bad access detected [ 21.149165] [ 21.149234] Memory state around the buggy address: [ 21.149809] fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.149871] fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.149917] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.149960] ^ [ 21.150342] fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.150423] fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.150486] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 21.051113] ================================================================== [ 21.051189] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 21.051509] Read of size 8 at addr fff00000c59cb678 by task kunit_try_catch/283 [ 21.051641] [ 21.051737] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.051829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.051870] Hardware name: linux,dummy-virt (DT) [ 21.051906] Call trace: [ 21.051931] show_stack+0x20/0x38 (C) [ 21.051989] dump_stack_lvl+0x8c/0xd0 [ 21.052040] print_report+0x118/0x5d0 [ 21.052090] kasan_report+0xdc/0x128 [ 21.052138] __asan_report_load8_noabort+0x20/0x30 [ 21.052191] copy_to_kernel_nofault+0x204/0x250 [ 21.052260] copy_to_kernel_nofault_oob+0x158/0x418 [ 21.052311] kunit_try_run_case+0x170/0x3f0 [ 21.052361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.052417] kthread+0x328/0x630 [ 21.052486] ret_from_fork+0x10/0x20 [ 21.052538] [ 21.052560] Allocated by task 283: [ 21.052588] kasan_save_stack+0x3c/0x68 [ 21.052640] kasan_save_track+0x20/0x40 [ 21.052678] kasan_save_alloc_info+0x40/0x58 [ 21.052720] __kasan_kmalloc+0xd4/0xd8 [ 21.052756] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.052799] copy_to_kernel_nofault_oob+0xc8/0x418 [ 21.052850] kunit_try_run_case+0x170/0x3f0 [ 21.052892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.052938] kthread+0x328/0x630 [ 21.052977] ret_from_fork+0x10/0x20 [ 21.053013] [ 21.053035] The buggy address belongs to the object at fff00000c59cb600 [ 21.053035] which belongs to the cache kmalloc-128 of size 128 [ 21.053098] The buggy address is located 0 bytes to the right of [ 21.053098] allocated 120-byte region [fff00000c59cb600, fff00000c59cb678) [ 21.053173] [ 21.053196] The buggy address belongs to the physical page: [ 21.053608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 21.053910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.053968] page_type: f5(slab) [ 21.054314] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.054400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.054591] page dumped because: kasan: bad access detected [ 21.054779] [ 21.055022] Memory state around the buggy address: [ 21.055083] fff00000c59cb500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.055250] fff00000c59cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.055433] >fff00000c59cb600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.055500] ^ [ 21.055874] fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.056043] fff00000c59cb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.056133] ================================================================== [ 21.058712] ================================================================== [ 21.058816] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 21.058910] Write of size 8 at addr fff00000c59cb678 by task kunit_try_catch/283 [ 21.059104] [ 21.059142] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 21.059247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.059493] Hardware name: linux,dummy-virt (DT) [ 21.059547] Call trace: [ 21.059572] show_stack+0x20/0x38 (C) [ 21.059627] dump_stack_lvl+0x8c/0xd0 [ 21.059722] print_report+0x118/0x5d0 [ 21.059809] kasan_report+0xdc/0x128 [ 21.059858] kasan_check_range+0x100/0x1a8 [ 21.060344] __kasan_check_write+0x20/0x30 [ 21.060433] copy_to_kernel_nofault+0x8c/0x250 [ 21.060486] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 21.060539] kunit_try_run_case+0x170/0x3f0 [ 21.060687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.060763] kthread+0x328/0x630 [ 21.060988] ret_from_fork+0x10/0x20 [ 21.061231] [ 21.061286] Allocated by task 283: [ 21.061540] kasan_save_stack+0x3c/0x68 [ 21.061610] kasan_save_track+0x20/0x40 [ 21.062034] kasan_save_alloc_info+0x40/0x58 [ 21.062358] __kasan_kmalloc+0xd4/0xd8 [ 21.062428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.062496] copy_to_kernel_nofault_oob+0xc8/0x418 [ 21.062585] kunit_try_run_case+0x170/0x3f0 [ 21.062675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.063166] kthread+0x328/0x630 [ 21.063355] ret_from_fork+0x10/0x20 [ 21.063671] [ 21.063865] The buggy address belongs to the object at fff00000c59cb600 [ 21.063865] which belongs to the cache kmalloc-128 of size 128 [ 21.064198] The buggy address is located 0 bytes to the right of [ 21.064198] allocated 120-byte region [fff00000c59cb600, fff00000c59cb678) [ 21.064366] [ 21.064435] The buggy address belongs to the physical page: [ 21.064549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 21.064674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.064820] page_type: f5(slab) [ 21.064910] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.065319] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.065445] page dumped because: kasan: bad access detected [ 21.065501] [ 21.065521] Memory state around the buggy address: [ 21.065558] fff00000c59cb500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.065895] fff00000c59cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.066068] >fff00000c59cb600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.066219] ^ [ 21.066269] fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.066615] fff00000c59cb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.067053] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 20.994330] ================================================================== [ 20.994391] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 20.994445] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271 [ 20.994732] [ 20.994772] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.994886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.995058] Hardware name: linux,dummy-virt (DT) [ 20.995139] Call trace: [ 20.995166] show_stack+0x20/0x38 (C) [ 20.995460] dump_stack_lvl+0x8c/0xd0 [ 20.995675] print_report+0x310/0x5d0 [ 20.995724] kasan_report+0xdc/0x128 [ 20.996050] __asan_report_load1_noabort+0x20/0x30 [ 20.996526] vmalloc_oob+0x51c/0x5d0 [ 20.996599] kunit_try_run_case+0x170/0x3f0 [ 20.996874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.996954] kthread+0x328/0x630 [ 20.997194] ret_from_fork+0x10/0x20 [ 20.997345] [ 20.997378] The buggy address ffff80008010b7f8 belongs to a vmalloc virtual mapping [ 20.997481] The buggy address belongs to the physical page: [ 20.997560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066a3 [ 20.997633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.998061] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.998175] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.998384] page dumped because: kasan: bad access detected [ 20.998510] [ 20.998735] Memory state around the buggy address: [ 20.998820] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.998952] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.999002] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.999057] ^ [ 20.999319] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.999846] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.999936] ================================================================== [ 20.988685] ================================================================== [ 20.988758] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 20.989325] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271 [ 20.989487] [ 20.989543] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.989637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.989668] Hardware name: linux,dummy-virt (DT) [ 20.990042] Call trace: [ 20.990102] show_stack+0x20/0x38 (C) [ 20.990442] dump_stack_lvl+0x8c/0xd0 [ 20.990563] print_report+0x310/0x5d0 [ 20.990627] kasan_report+0xdc/0x128 [ 20.990672] __asan_report_load1_noabort+0x20/0x30 [ 20.990745] vmalloc_oob+0x578/0x5d0 [ 20.990792] kunit_try_run_case+0x170/0x3f0 [ 20.990849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.990915] kthread+0x328/0x630 [ 20.990981] ret_from_fork+0x10/0x20 [ 20.991041] [ 20.991072] The buggy address ffff80008010b7f3 belongs to a vmalloc virtual mapping [ 20.991128] The buggy address belongs to the physical page: [ 20.991165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066a3 [ 20.991241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.991313] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.991373] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.991418] page dumped because: kasan: bad access detected [ 20.991474] [ 20.991503] Memory state around the buggy address: [ 20.991557] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.991611] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.991659] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.991701] ^ [ 20.991747] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.991794] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.991847] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 20.700994] ================================================================== [ 20.701051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.701101] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.701642] [ 20.701709] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.701821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.701852] Hardware name: linux,dummy-virt (DT) [ 20.701886] Call trace: [ 20.702108] show_stack+0x20/0x38 (C) [ 20.702201] dump_stack_lvl+0x8c/0xd0 [ 20.702308] print_report+0x118/0x5d0 [ 20.702428] kasan_report+0xdc/0x128 [ 20.702474] __asan_report_load8_noabort+0x20/0x30 [ 20.702527] kasan_atomics_helper+0x3f58/0x4858 [ 20.702624] kasan_atomics+0x198/0x2e0 [ 20.702857] kunit_try_run_case+0x170/0x3f0 [ 20.702942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.703000] kthread+0x328/0x630 [ 20.703046] ret_from_fork+0x10/0x20 [ 20.703095] [ 20.703115] Allocated by task 267: [ 20.703145] kasan_save_stack+0x3c/0x68 [ 20.703211] kasan_save_track+0x20/0x40 [ 20.703251] kasan_save_alloc_info+0x40/0x58 [ 20.703389] __kasan_kmalloc+0xd4/0xd8 [ 20.703568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.703609] kasan_atomics+0xb8/0x2e0 [ 20.703666] kunit_try_run_case+0x170/0x3f0 [ 20.703832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.703900] kthread+0x328/0x630 [ 20.703992] ret_from_fork+0x10/0x20 [ 20.704105] [ 20.704183] The buggy address belongs to the object at fff00000c59c9e00 [ 20.704183] which belongs to the cache kmalloc-64 of size 64 [ 20.704261] The buggy address is located 0 bytes to the right of [ 20.704261] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.704331] [ 20.704354] The buggy address belongs to the physical page: [ 20.704387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.704444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.704494] page_type: f5(slab) [ 20.705023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.705184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.705569] page dumped because: kasan: bad access detected [ 20.705616] [ 20.705711] Memory state around the buggy address: [ 20.705961] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.706013] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.706057] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.706100] ^ [ 20.706134] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.706181] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.706232] ================================================================== [ 20.830159] ================================================================== [ 20.830233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.830413] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.830478] [ 20.830510] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.830814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.830857] Hardware name: linux,dummy-virt (DT) [ 20.830892] Call trace: [ 20.831269] show_stack+0x20/0x38 (C) [ 20.831471] dump_stack_lvl+0x8c/0xd0 [ 20.831634] print_report+0x118/0x5d0 [ 20.831695] kasan_report+0xdc/0x128 [ 20.831742] kasan_check_range+0x100/0x1a8 [ 20.831792] __kasan_check_write+0x20/0x30 [ 20.832171] kasan_atomics_helper+0x1384/0x4858 [ 20.832262] kasan_atomics+0x198/0x2e0 [ 20.832668] kunit_try_run_case+0x170/0x3f0 [ 20.832747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.833071] kthread+0x328/0x630 [ 20.833142] ret_from_fork+0x10/0x20 [ 20.834042] [ 20.834588] Allocated by task 267: [ 20.834883] kasan_save_stack+0x3c/0x68 [ 20.835065] kasan_save_track+0x20/0x40 [ 20.835285] kasan_save_alloc_info+0x40/0x58 [ 20.835403] __kasan_kmalloc+0xd4/0xd8 [ 20.835645] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.835841] kasan_atomics+0xb8/0x2e0 [ 20.836028] kunit_try_run_case+0x170/0x3f0 [ 20.836180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.836336] kthread+0x328/0x630 [ 20.836398] ret_from_fork+0x10/0x20 [ 20.836440] [ 20.836462] The buggy address belongs to the object at fff00000c59c9e00 [ 20.836462] which belongs to the cache kmalloc-64 of size 64 [ 20.836529] The buggy address is located 0 bytes to the right of [ 20.836529] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.836600] [ 20.836640] The buggy address belongs to the physical page: [ 20.836674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.836730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.836781] page_type: f5(slab) [ 20.836821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.836885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.836932] page dumped because: kasan: bad access detected [ 20.836976] [ 20.837015] Memory state around the buggy address: [ 20.837060] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.837107] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.837153] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.837214] ^ [ 20.837248] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.837307] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.837742] ================================================================== [ 20.963144] ================================================================== [ 20.963199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.963267] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.963320] [ 20.963351] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.963562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.963602] Hardware name: linux,dummy-virt (DT) [ 20.963659] Call trace: [ 20.963686] show_stack+0x20/0x38 (C) [ 20.963737] dump_stack_lvl+0x8c/0xd0 [ 20.963798] print_report+0x118/0x5d0 [ 20.963845] kasan_report+0xdc/0x128 [ 20.963902] kasan_check_range+0x100/0x1a8 [ 20.963952] __kasan_check_write+0x20/0x30 [ 20.964000] kasan_atomics_helper+0x17ec/0x4858 [ 20.964051] kasan_atomics+0x198/0x2e0 [ 20.964103] kunit_try_run_case+0x170/0x3f0 [ 20.964154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.964225] kthread+0x328/0x630 [ 20.964272] ret_from_fork+0x10/0x20 [ 20.964321] [ 20.964351] Allocated by task 267: [ 20.964382] kasan_save_stack+0x3c/0x68 [ 20.964431] kasan_save_track+0x20/0x40 [ 20.964472] kasan_save_alloc_info+0x40/0x58 [ 20.964520] __kasan_kmalloc+0xd4/0xd8 [ 20.964559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.964603] kasan_atomics+0xb8/0x2e0 [ 20.964649] kunit_try_run_case+0x170/0x3f0 [ 20.964690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.964737] kthread+0x328/0x630 [ 20.964795] ret_from_fork+0x10/0x20 [ 20.964841] [ 20.964867] The buggy address belongs to the object at fff00000c59c9e00 [ 20.964867] which belongs to the cache kmalloc-64 of size 64 [ 20.964929] The buggy address is located 0 bytes to the right of [ 20.964929] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.965003] [ 20.965024] The buggy address belongs to the physical page: [ 20.965068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.965140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.965191] page_type: f5(slab) [ 20.965240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.965293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.965841] page dumped because: kasan: bad access detected [ 20.966100] [ 20.966129] Memory state around the buggy address: [ 20.966740] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.967225] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.967322] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.967396] ^ [ 20.967492] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967569] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967924] ================================================================== [ 20.896888] ================================================================== [ 20.897444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.897525] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.897650] [ 20.897719] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.898244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.898630] Hardware name: linux,dummy-virt (DT) [ 20.898709] Call trace: [ 20.898950] show_stack+0x20/0x38 (C) [ 20.899391] dump_stack_lvl+0x8c/0xd0 [ 20.899620] print_report+0x118/0x5d0 [ 20.899737] kasan_report+0xdc/0x128 [ 20.899990] __asan_report_load8_noabort+0x20/0x30 [ 20.900137] kasan_atomics_helper+0x3db0/0x4858 [ 20.900296] kasan_atomics+0x198/0x2e0 [ 20.900349] kunit_try_run_case+0x170/0x3f0 [ 20.900906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.901171] kthread+0x328/0x630 [ 20.901394] ret_from_fork+0x10/0x20 [ 20.901691] [ 20.901859] Allocated by task 267: [ 20.902083] kasan_save_stack+0x3c/0x68 [ 20.902318] kasan_save_track+0x20/0x40 [ 20.902702] kasan_save_alloc_info+0x40/0x58 [ 20.902831] __kasan_kmalloc+0xd4/0xd8 [ 20.902931] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.902972] kasan_atomics+0xb8/0x2e0 [ 20.903061] kunit_try_run_case+0x170/0x3f0 [ 20.903269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.903661] kthread+0x328/0x630 [ 20.903833] ret_from_fork+0x10/0x20 [ 20.904116] [ 20.904334] The buggy address belongs to the object at fff00000c59c9e00 [ 20.904334] which belongs to the cache kmalloc-64 of size 64 [ 20.904419] The buggy address is located 0 bytes to the right of [ 20.904419] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.904491] [ 20.904748] The buggy address belongs to the physical page: [ 20.904860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.904921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.905005] page_type: f5(slab) [ 20.905052] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.905119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.905165] page dumped because: kasan: bad access detected [ 20.905220] [ 20.905240] Memory state around the buggy address: [ 20.905295] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.905597] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.905944] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.906016] ^ [ 20.906067] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.906122] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.906303] ================================================================== [ 20.952623] ================================================================== [ 20.952788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.953311] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.953399] [ 20.953432] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.953516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.953544] Hardware name: linux,dummy-virt (DT) [ 20.953953] Call trace: [ 20.954313] show_stack+0x20/0x38 (C) [ 20.954397] dump_stack_lvl+0x8c/0xd0 [ 20.954558] print_report+0x118/0x5d0 [ 20.954744] kasan_report+0xdc/0x128 [ 20.954813] __asan_report_load8_noabort+0x20/0x30 [ 20.955085] kasan_atomics_helper+0x3e20/0x4858 [ 20.955309] kasan_atomics+0x198/0x2e0 [ 20.955585] kunit_try_run_case+0x170/0x3f0 [ 20.955800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.955927] kthread+0x328/0x630 [ 20.956318] ret_from_fork+0x10/0x20 [ 20.956427] [ 20.956637] Allocated by task 267: [ 20.956847] kasan_save_stack+0x3c/0x68 [ 20.956918] kasan_save_track+0x20/0x40 [ 20.957110] kasan_save_alloc_info+0x40/0x58 [ 20.957189] __kasan_kmalloc+0xd4/0xd8 [ 20.957245] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.957469] kasan_atomics+0xb8/0x2e0 [ 20.957679] kunit_try_run_case+0x170/0x3f0 [ 20.957920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.958080] kthread+0x328/0x630 [ 20.958562] ret_from_fork+0x10/0x20 [ 20.958876] [ 20.958938] The buggy address belongs to the object at fff00000c59c9e00 [ 20.958938] which belongs to the cache kmalloc-64 of size 64 [ 20.959020] The buggy address is located 0 bytes to the right of [ 20.959020] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.959333] [ 20.959398] The buggy address belongs to the physical page: [ 20.959643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.959848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.959995] page_type: f5(slab) [ 20.960291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.960652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.960731] page dumped because: kasan: bad access detected [ 20.961106] [ 20.961473] Memory state around the buggy address: [ 20.961632] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.961724] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.961780] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.961822] ^ [ 20.962031] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.962440] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.962631] ================================================================== [ 20.761599] ================================================================== [ 20.761740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.761787] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.761857] [ 20.761925] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.762038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.762107] Hardware name: linux,dummy-virt (DT) [ 20.762141] Call trace: [ 20.762184] show_stack+0x20/0x38 (C) [ 20.762247] dump_stack_lvl+0x8c/0xd0 [ 20.762294] print_report+0x118/0x5d0 [ 20.762341] kasan_report+0xdc/0x128 [ 20.762386] kasan_check_range+0x100/0x1a8 [ 20.762435] __kasan_check_write+0x20/0x30 [ 20.762516] kasan_atomics_helper+0xff0/0x4858 [ 20.762573] kasan_atomics+0x198/0x2e0 [ 20.762618] kunit_try_run_case+0x170/0x3f0 [ 20.762698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.762782] kthread+0x328/0x630 [ 20.762843] ret_from_fork+0x10/0x20 [ 20.762909] [ 20.762967] Allocated by task 267: [ 20.762996] kasan_save_stack+0x3c/0x68 [ 20.763054] kasan_save_track+0x20/0x40 [ 20.763111] kasan_save_alloc_info+0x40/0x58 [ 20.763166] __kasan_kmalloc+0xd4/0xd8 [ 20.763211] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.763252] kasan_atomics+0xb8/0x2e0 [ 20.763289] kunit_try_run_case+0x170/0x3f0 [ 20.763328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.763375] kthread+0x328/0x630 [ 20.763463] ret_from_fork+0x10/0x20 [ 20.763523] [ 20.763562] The buggy address belongs to the object at fff00000c59c9e00 [ 20.763562] which belongs to the cache kmalloc-64 of size 64 [ 20.763675] The buggy address is located 0 bytes to the right of [ 20.763675] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.763791] [ 20.763815] The buggy address belongs to the physical page: [ 20.763855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.763919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.763971] page_type: f5(slab) [ 20.764010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.764063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.764409] page dumped because: kasan: bad access detected [ 20.764449] [ 20.764468] Memory state around the buggy address: [ 20.764503] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.764549] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.764596] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.764709] ^ [ 20.764750] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.764805] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.764846] ================================================================== [ 20.778689] ================================================================== [ 20.778745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.778795] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.778848] [ 20.778880] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.778991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.779022] Hardware name: linux,dummy-virt (DT) [ 20.779055] Call trace: [ 20.779080] show_stack+0x20/0x38 (C) [ 20.779128] dump_stack_lvl+0x8c/0xd0 [ 20.779186] print_report+0x118/0x5d0 [ 20.779245] kasan_report+0xdc/0x128 [ 20.779291] kasan_check_range+0x100/0x1a8 [ 20.779341] __kasan_check_write+0x20/0x30 [ 20.779389] kasan_atomics_helper+0x1128/0x4858 [ 20.779437] kasan_atomics+0x198/0x2e0 [ 20.779482] kunit_try_run_case+0x170/0x3f0 [ 20.779531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.779586] kthread+0x328/0x630 [ 20.779643] ret_from_fork+0x10/0x20 [ 20.779690] [ 20.779711] Allocated by task 267: [ 20.779751] kasan_save_stack+0x3c/0x68 [ 20.779803] kasan_save_track+0x20/0x40 [ 20.779841] kasan_save_alloc_info+0x40/0x58 [ 20.779882] __kasan_kmalloc+0xd4/0xd8 [ 20.779918] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.779958] kasan_atomics+0xb8/0x2e0 [ 20.780002] kunit_try_run_case+0x170/0x3f0 [ 20.780044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.780093] kthread+0x328/0x630 [ 20.780131] ret_from_fork+0x10/0x20 [ 20.780167] [ 20.780187] The buggy address belongs to the object at fff00000c59c9e00 [ 20.780187] which belongs to the cache kmalloc-64 of size 64 [ 20.780607] The buggy address is located 0 bytes to the right of [ 20.780607] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.780694] [ 20.780961] The buggy address belongs to the physical page: [ 20.781044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.781105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.781434] page_type: f5(slab) [ 20.781550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.781795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.781861] page dumped because: kasan: bad access detected [ 20.782103] [ 20.782174] Memory state around the buggy address: [ 20.782519] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.782662] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.782719] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.782994] ^ [ 20.783103] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.783335] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.783587] ================================================================== [ 20.545195] ================================================================== [ 20.545263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 20.545339] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.545457] [ 20.545488] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.545572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.545602] Hardware name: linux,dummy-virt (DT) [ 20.546239] kasan_report+0xdc/0x128 [ 20.547081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.547257] kthread+0x328/0x630 [ 20.547384] ret_from_fork+0x10/0x20 [ 20.547620] [ 20.547641] Allocated by task 267: [ 20.547691] kasan_save_stack+0x3c/0x68 [ 20.547735] kasan_save_track+0x20/0x40 [ 20.547821] kasan_save_alloc_info+0x40/0x58 [ 20.547911] __kasan_kmalloc+0xd4/0xd8 [ 20.547948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.547989] kasan_atomics+0xb8/0x2e0 [ 20.548026] kunit_try_run_case+0x170/0x3f0 [ 20.548088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.548241] kthread+0x328/0x630 [ 20.548278] ret_from_fork+0x10/0x20 [ 20.548317] [ 20.548338] The buggy address belongs to the object at fff00000c59c9e00 [ 20.548338] which belongs to the cache kmalloc-64 of size 64 [ 20.548408] The buggy address is located 0 bytes to the right of [ 20.548408] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.548525] [ 20.548547] The buggy address belongs to the physical page: [ 20.548580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.548633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.549136] page_type: f5(slab) [ 20.549184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.549251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.549551] page dumped because: kasan: bad access detected [ 20.549588] [ 20.549626] Memory state around the buggy address: [ 20.549692] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.549740] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.549804] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.549847] ^ [ 20.549882] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.549928] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.549969] ================================================================== [ 20.745848] ================================================================== [ 20.746056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.746252] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.746306] [ 20.746338] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.746423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.746453] Hardware name: linux,dummy-virt (DT) [ 20.746487] Call trace: [ 20.746509] show_stack+0x20/0x38 (C) [ 20.746556] dump_stack_lvl+0x8c/0xd0 [ 20.746606] print_report+0x118/0x5d0 [ 20.746653] kasan_report+0xdc/0x128 [ 20.746699] kasan_check_range+0x100/0x1a8 [ 20.749361] __kasan_check_write+0x20/0x30 [ 20.750157] kasan_atomics_helper+0xf20/0x4858 [ 20.750406] kasan_atomics+0x198/0x2e0 [ 20.750708] kunit_try_run_case+0x170/0x3f0 [ 20.751553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.752381] kthread+0x328/0x630 [ 20.752641] ret_from_fork+0x10/0x20 [ 20.752830] [ 20.752853] Allocated by task 267: [ 20.752963] kasan_save_stack+0x3c/0x68 [ 20.753008] kasan_save_track+0x20/0x40 [ 20.753046] kasan_save_alloc_info+0x40/0x58 [ 20.753088] __kasan_kmalloc+0xd4/0xd8 [ 20.754558] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.755029] kasan_atomics+0xb8/0x2e0 [ 20.755082] kunit_try_run_case+0x170/0x3f0 [ 20.756241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.756304] kthread+0x328/0x630 [ 20.756345] ret_from_fork+0x10/0x20 [ 20.756384] [ 20.756406] The buggy address belongs to the object at fff00000c59c9e00 [ 20.756406] which belongs to the cache kmalloc-64 of size 64 [ 20.756471] The buggy address is located 0 bytes to the right of [ 20.756471] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.756539] [ 20.756561] The buggy address belongs to the physical page: [ 20.756595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.756650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.756702] page_type: f5(slab) [ 20.756742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.756796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.756841] page dumped because: kasan: bad access detected [ 20.756877] [ 20.756897] Memory state around the buggy address: [ 20.756933] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.756982] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.757029] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.757116] ^ [ 20.757246] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.757364] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.757470] ================================================================== [ 20.784752] ================================================================== [ 20.784809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.785062] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.785224] [ 20.785268] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.786988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.787139] Hardware name: linux,dummy-virt (DT) [ 20.787312] Call trace: [ 20.787397] show_stack+0x20/0x38 (C) [ 20.789351] dump_stack_lvl+0x8c/0xd0 [ 20.789425] print_report+0x118/0x5d0 [ 20.789472] kasan_report+0xdc/0x128 [ 20.789521] kasan_check_range+0x100/0x1a8 [ 20.790312] __kasan_check_write+0x20/0x30 [ 20.790384] kasan_atomics_helper+0x1190/0x4858 [ 20.791254] kasan_atomics+0x198/0x2e0 [ 20.791754] kunit_try_run_case+0x170/0x3f0 [ 20.791843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.791904] kthread+0x328/0x630 [ 20.792100] ret_from_fork+0x10/0x20 [ 20.792369] [ 20.792677] Allocated by task 267: [ 20.792730] kasan_save_stack+0x3c/0x68 [ 20.792931] kasan_save_track+0x20/0x40 [ 20.793013] kasan_save_alloc_info+0x40/0x58 [ 20.793128] __kasan_kmalloc+0xd4/0xd8 [ 20.793185] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.793467] kasan_atomics+0xb8/0x2e0 [ 20.793757] kunit_try_run_case+0x170/0x3f0 [ 20.794025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.794133] kthread+0x328/0x630 [ 20.794331] ret_from_fork+0x10/0x20 [ 20.794388] [ 20.794411] The buggy address belongs to the object at fff00000c59c9e00 [ 20.794411] which belongs to the cache kmalloc-64 of size 64 [ 20.794476] The buggy address is located 0 bytes to the right of [ 20.794476] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.794546] [ 20.794568] The buggy address belongs to the physical page: [ 20.795265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.795357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.795411] page_type: f5(slab) [ 20.795477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.795544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.795598] page dumped because: kasan: bad access detected [ 20.795648] [ 20.795678] Memory state around the buggy address: [ 20.795733] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.795782] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.795828] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.795872] ^ [ 20.795909] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.795962] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.796004] ================================================================== [ 20.808935] ================================================================== [ 20.809086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.809138] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.809213] [ 20.809248] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.809638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.810021] Hardware name: linux,dummy-virt (DT) [ 20.810225] Call trace: [ 20.810467] show_stack+0x20/0x38 (C) [ 20.810606] dump_stack_lvl+0x8c/0xd0 [ 20.810784] print_report+0x118/0x5d0 [ 20.811117] kasan_report+0xdc/0x128 [ 20.811482] kasan_check_range+0x100/0x1a8 [ 20.811665] __kasan_check_write+0x20/0x30 [ 20.811839] kasan_atomics_helper+0x126c/0x4858 [ 20.811931] kasan_atomics+0x198/0x2e0 [ 20.811980] kunit_try_run_case+0x170/0x3f0 [ 20.812286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.812771] kthread+0x328/0x630 [ 20.812836] ret_from_fork+0x10/0x20 [ 20.812969] [ 20.812999] Allocated by task 267: [ 20.813061] kasan_save_stack+0x3c/0x68 [ 20.813107] kasan_save_track+0x20/0x40 [ 20.813145] kasan_save_alloc_info+0x40/0x58 [ 20.813195] __kasan_kmalloc+0xd4/0xd8 [ 20.813251] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.813293] kasan_atomics+0xb8/0x2e0 [ 20.813435] kunit_try_run_case+0x170/0x3f0 [ 20.813873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.813944] kthread+0x328/0x630 [ 20.813983] ret_from_fork+0x10/0x20 [ 20.814023] [ 20.814044] The buggy address belongs to the object at fff00000c59c9e00 [ 20.814044] which belongs to the cache kmalloc-64 of size 64 [ 20.814616] The buggy address is located 0 bytes to the right of [ 20.814616] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.815632] [ 20.815682] The buggy address belongs to the physical page: [ 20.815730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.815799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.815871] page_type: f5(slab) [ 20.815944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.816187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.816343] page dumped because: kasan: bad access detected [ 20.816585] [ 20.816613] Memory state around the buggy address: [ 20.816802] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.817249] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.817309] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.817465] ^ [ 20.817511] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.817558] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.817909] ================================================================== [ 20.945599] ================================================================== [ 20.945654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.945705] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.945758] [ 20.946161] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.946278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.946314] Hardware name: linux,dummy-virt (DT) [ 20.946542] Call trace: [ 20.946577] show_stack+0x20/0x38 (C) [ 20.946631] dump_stack_lvl+0x8c/0xd0 [ 20.946847] print_report+0x118/0x5d0 [ 20.947078] kasan_report+0xdc/0x128 [ 20.947141] kasan_check_range+0x100/0x1a8 [ 20.947191] __kasan_check_write+0x20/0x30 [ 20.947458] kasan_atomics_helper+0x175c/0x4858 [ 20.947694] kasan_atomics+0x198/0x2e0 [ 20.947957] kunit_try_run_case+0x170/0x3f0 [ 20.948038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.948221] kthread+0x328/0x630 [ 20.948282] ret_from_fork+0x10/0x20 [ 20.948332] [ 20.948621] Allocated by task 267: [ 20.948863] kasan_save_stack+0x3c/0x68 [ 20.948933] kasan_save_track+0x20/0x40 [ 20.949062] kasan_save_alloc_info+0x40/0x58 [ 20.949115] __kasan_kmalloc+0xd4/0xd8 [ 20.949151] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.949391] kasan_atomics+0xb8/0x2e0 [ 20.949652] kunit_try_run_case+0x170/0x3f0 [ 20.949854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.949949] kthread+0x328/0x630 [ 20.950351] ret_from_fork+0x10/0x20 [ 20.950479] [ 20.950569] The buggy address belongs to the object at fff00000c59c9e00 [ 20.950569] which belongs to the cache kmalloc-64 of size 64 [ 20.950676] The buggy address is located 0 bytes to the right of [ 20.950676] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.950861] [ 20.950886] The buggy address belongs to the physical page: [ 20.950921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.951170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.951333] page_type: f5(slab) [ 20.951498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.951569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.951616] page dumped because: kasan: bad access detected [ 20.951652] [ 20.951673] Memory state around the buggy address: [ 20.951718] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.951775] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.951831] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.951873] ^ [ 20.951910] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.951956] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.951997] ================================================================== [ 20.850618] ================================================================== [ 20.850776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.850980] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.851261] [ 20.851305] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.851394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.851431] Hardware name: linux,dummy-virt (DT) [ 20.851464] Call trace: [ 20.851728] show_stack+0x20/0x38 (C) [ 20.851808] dump_stack_lvl+0x8c/0xd0 [ 20.852036] print_report+0x118/0x5d0 [ 20.852101] kasan_report+0xdc/0x128 [ 20.852513] kasan_check_range+0x100/0x1a8 [ 20.852742] __kasan_check_write+0x20/0x30 [ 20.852805] kasan_atomics_helper+0x1414/0x4858 [ 20.852923] kasan_atomics+0x198/0x2e0 [ 20.852980] kunit_try_run_case+0x170/0x3f0 [ 20.853308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.853389] kthread+0x328/0x630 [ 20.853694] ret_from_fork+0x10/0x20 [ 20.853759] [ 20.853790] Allocated by task 267: [ 20.853819] kasan_save_stack+0x3c/0x68 [ 20.854020] kasan_save_track+0x20/0x40 [ 20.854307] kasan_save_alloc_info+0x40/0x58 [ 20.854485] __kasan_kmalloc+0xd4/0xd8 [ 20.854872] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.855021] kasan_atomics+0xb8/0x2e0 [ 20.855187] kunit_try_run_case+0x170/0x3f0 [ 20.855873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.855960] kthread+0x328/0x630 [ 20.856027] ret_from_fork+0x10/0x20 [ 20.856100] [ 20.856169] The buggy address belongs to the object at fff00000c59c9e00 [ 20.856169] which belongs to the cache kmalloc-64 of size 64 [ 20.856780] The buggy address is located 0 bytes to the right of [ 20.856780] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.856905] [ 20.857067] The buggy address belongs to the physical page: [ 20.857727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.857811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.857865] page_type: f5(slab) [ 20.858078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.858425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.858478] page dumped because: kasan: bad access detected [ 20.858514] [ 20.858535] Memory state around the buggy address: [ 20.858771] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.858845] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.858913] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.858965] ^ [ 20.859001] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.859057] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.859100] ================================================================== [ 20.770575] ================================================================== [ 20.770631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.770868] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.770942] [ 20.771003] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.771094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.771141] Hardware name: linux,dummy-virt (DT) [ 20.771175] Call trace: [ 20.771228] show_stack+0x20/0x38 (C) [ 20.771289] dump_stack_lvl+0x8c/0xd0 [ 20.771366] print_report+0x118/0x5d0 [ 20.771446] kasan_report+0xdc/0x128 [ 20.771513] kasan_check_range+0x100/0x1a8 [ 20.771562] __kasan_check_write+0x20/0x30 [ 20.771610] kasan_atomics_helper+0x10c0/0x4858 [ 20.771659] kasan_atomics+0x198/0x2e0 [ 20.771842] kunit_try_run_case+0x170/0x3f0 [ 20.771896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.772063] kthread+0x328/0x630 [ 20.772333] ret_from_fork+0x10/0x20 [ 20.772468] [ 20.772545] Allocated by task 267: [ 20.772579] kasan_save_stack+0x3c/0x68 [ 20.772638] kasan_save_track+0x20/0x40 [ 20.772679] kasan_save_alloc_info+0x40/0x58 [ 20.772720] __kasan_kmalloc+0xd4/0xd8 [ 20.772769] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.772817] kasan_atomics+0xb8/0x2e0 [ 20.772856] kunit_try_run_case+0x170/0x3f0 [ 20.772898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.772945] kthread+0x328/0x630 [ 20.772983] ret_from_fork+0x10/0x20 [ 20.773319] [ 20.773362] The buggy address belongs to the object at fff00000c59c9e00 [ 20.773362] which belongs to the cache kmalloc-64 of size 64 [ 20.773608] The buggy address is located 0 bytes to the right of [ 20.773608] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.773703] [ 20.773728] The buggy address belongs to the physical page: [ 20.773761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.774192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.774546] page_type: f5(slab) [ 20.774830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.775123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.775389] page dumped because: kasan: bad access detected [ 20.775677] [ 20.775721] Memory state around the buggy address: [ 20.775787] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.776358] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.776477] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.776651] ^ [ 20.776996] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.777252] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.777322] ================================================================== [ 20.877559] ================================================================== [ 20.877614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.877663] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.877717] [ 20.878215] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.878639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.878682] Hardware name: linux,dummy-virt (DT) [ 20.878753] Call trace: [ 20.878779] show_stack+0x20/0x38 (C) [ 20.878919] dump_stack_lvl+0x8c/0xd0 [ 20.878978] print_report+0x118/0x5d0 [ 20.879350] kasan_report+0xdc/0x128 [ 20.879744] kasan_check_range+0x100/0x1a8 [ 20.880003] __kasan_check_write+0x20/0x30 [ 20.880087] kasan_atomics_helper+0x154c/0x4858 [ 20.880147] kasan_atomics+0x198/0x2e0 [ 20.880194] kunit_try_run_case+0x170/0x3f0 [ 20.880529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.880771] kthread+0x328/0x630 [ 20.881027] ret_from_fork+0x10/0x20 [ 20.881095] [ 20.881217] Allocated by task 267: [ 20.881253] kasan_save_stack+0x3c/0x68 [ 20.881295] kasan_save_track+0x20/0x40 [ 20.881386] kasan_save_alloc_info+0x40/0x58 [ 20.881451] __kasan_kmalloc+0xd4/0xd8 [ 20.881491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.881548] kasan_atomics+0xb8/0x2e0 [ 20.881587] kunit_try_run_case+0x170/0x3f0 [ 20.882333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.882486] kthread+0x328/0x630 [ 20.882550] ret_from_fork+0x10/0x20 [ 20.883025] [ 20.883095] The buggy address belongs to the object at fff00000c59c9e00 [ 20.883095] which belongs to the cache kmalloc-64 of size 64 [ 20.883173] The buggy address is located 0 bytes to the right of [ 20.883173] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.883433] [ 20.883459] The buggy address belongs to the physical page: [ 20.883598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.884192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.884337] page_type: f5(slab) [ 20.884378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.884607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.884727] page dumped because: kasan: bad access detected [ 20.884939] [ 20.885119] Memory state around the buggy address: [ 20.885696] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.885966] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.886160] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.886343] ^ [ 20.886470] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.886852] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.886956] ================================================================== [ 20.690434] ================================================================== [ 20.690497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.690546] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.690598] [ 20.690632] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.690717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.690747] Hardware name: linux,dummy-virt (DT) [ 20.690778] Call trace: [ 20.690803] show_stack+0x20/0x38 (C) [ 20.690850] dump_stack_lvl+0x8c/0xd0 [ 20.690899] print_report+0x118/0x5d0 [ 20.690946] kasan_report+0xdc/0x128 [ 20.690992] kasan_check_range+0x100/0x1a8 [ 20.691042] __kasan_check_read+0x20/0x30 [ 20.691089] kasan_atomics_helper+0xdd4/0x4858 [ 20.691137] kasan_atomics+0x198/0x2e0 [ 20.691181] kunit_try_run_case+0x170/0x3f0 [ 20.691240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.693247] kthread+0x328/0x630 [ 20.694164] ret_from_fork+0x10/0x20 [ 20.694368] [ 20.695059] Allocated by task 267: [ 20.695097] kasan_save_stack+0x3c/0x68 [ 20.695328] kasan_save_track+0x20/0x40 [ 20.695445] kasan_save_alloc_info+0x40/0x58 [ 20.695546] __kasan_kmalloc+0xd4/0xd8 [ 20.695624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.695713] kasan_atomics+0xb8/0x2e0 [ 20.695764] kunit_try_run_case+0x170/0x3f0 [ 20.695817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.695913] kthread+0x328/0x630 [ 20.695950] ret_from_fork+0x10/0x20 [ 20.695989] [ 20.696012] The buggy address belongs to the object at fff00000c59c9e00 [ 20.696012] which belongs to the cache kmalloc-64 of size 64 [ 20.696073] The buggy address is located 0 bytes to the right of [ 20.696073] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.696175] [ 20.696964] The buggy address belongs to the physical page: [ 20.697068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.697126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.697180] page_type: f5(slab) [ 20.697917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.698101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.698151] page dumped because: kasan: bad access detected [ 20.698186] [ 20.698250] Memory state around the buggy address: [ 20.698354] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.698762] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.698813] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.698854] ^ [ 20.698892] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.698941] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.698984] ================================================================== [ 20.871681] ================================================================== [ 20.871765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.871817] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.871908] [ 20.871942] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.872025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.872443] Hardware name: linux,dummy-virt (DT) [ 20.872615] Call trace: [ 20.872651] show_stack+0x20/0x38 (C) [ 20.872850] dump_stack_lvl+0x8c/0xd0 [ 20.872903] print_report+0x118/0x5d0 [ 20.872949] kasan_report+0xdc/0x128 [ 20.873014] kasan_check_range+0x100/0x1a8 [ 20.873068] __kasan_check_write+0x20/0x30 [ 20.873141] kasan_atomics_helper+0x14e4/0x4858 [ 20.873624] kasan_atomics+0x198/0x2e0 [ 20.873816] kunit_try_run_case+0x170/0x3f0 [ 20.874057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.874124] kthread+0x328/0x630 [ 20.874170] ret_from_fork+0x10/0x20 [ 20.874232] [ 20.874253] Allocated by task 267: [ 20.874285] kasan_save_stack+0x3c/0x68 [ 20.874489] kasan_save_track+0x20/0x40 [ 20.874660] kasan_save_alloc_info+0x40/0x58 [ 20.874727] __kasan_kmalloc+0xd4/0xd8 [ 20.874775] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.874841] kasan_atomics+0xb8/0x2e0 [ 20.874880] kunit_try_run_case+0x170/0x3f0 [ 20.874926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.874972] kthread+0x328/0x630 [ 20.875021] ret_from_fork+0x10/0x20 [ 20.875060] [ 20.875082] The buggy address belongs to the object at fff00000c59c9e00 [ 20.875082] which belongs to the cache kmalloc-64 of size 64 [ 20.875156] The buggy address is located 0 bytes to the right of [ 20.875156] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.875254] [ 20.875277] The buggy address belongs to the physical page: [ 20.875319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.875375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.875427] page_type: f5(slab) [ 20.875468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.875523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.875570] page dumped because: kasan: bad access detected [ 20.875624] [ 20.875653] Memory state around the buggy address: [ 20.875697] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.875743] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.875790] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.875840] ^ [ 20.875883] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.875929] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.875978] ================================================================== [ 20.860189] ================================================================== [ 20.860553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.860635] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.860823] [ 20.861012] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.861110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.861276] Hardware name: linux,dummy-virt (DT) [ 20.861525] Call trace: [ 20.861585] show_stack+0x20/0x38 (C) [ 20.861700] dump_stack_lvl+0x8c/0xd0 [ 20.861768] print_report+0x118/0x5d0 [ 20.862037] kasan_report+0xdc/0x128 [ 20.862412] kasan_check_range+0x100/0x1a8 [ 20.862537] __kasan_check_write+0x20/0x30 [ 20.862712] kasan_atomics_helper+0x147c/0x4858 [ 20.862975] kasan_atomics+0x198/0x2e0 [ 20.863141] kunit_try_run_case+0x170/0x3f0 [ 20.863358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.863752] kthread+0x328/0x630 [ 20.863823] ret_from_fork+0x10/0x20 [ 20.864176] [ 20.864296] Allocated by task 267: [ 20.864463] kasan_save_stack+0x3c/0x68 [ 20.864599] kasan_save_track+0x20/0x40 [ 20.864640] kasan_save_alloc_info+0x40/0x58 [ 20.864681] __kasan_kmalloc+0xd4/0xd8 [ 20.864891] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.865394] kasan_atomics+0xb8/0x2e0 [ 20.865587] kunit_try_run_case+0x170/0x3f0 [ 20.866183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.866540] kthread+0x328/0x630 [ 20.866737] ret_from_fork+0x10/0x20 [ 20.866854] [ 20.866905] The buggy address belongs to the object at fff00000c59c9e00 [ 20.866905] which belongs to the cache kmalloc-64 of size 64 [ 20.867327] The buggy address is located 0 bytes to the right of [ 20.867327] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.867585] [ 20.867834] The buggy address belongs to the physical page: [ 20.868131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.868427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.868516] page_type: f5(slab) [ 20.868855] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.869200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.869466] page dumped because: kasan: bad access detected [ 20.869619] [ 20.869695] Memory state around the buggy address: [ 20.869742] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.869805] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.869852] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.869895] ^ [ 20.869929] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869976] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.870016] ================================================================== [ 20.539346] ================================================================== [ 20.539581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.539829] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.539890] [ 20.539955] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.540196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.540292] Hardware name: linux,dummy-virt (DT) [ 20.540340] Call trace: [ 20.540460] show_stack+0x20/0x38 (C) [ 20.540514] dump_stack_lvl+0x8c/0xd0 [ 20.540572] print_report+0x118/0x5d0 [ 20.540687] kasan_report+0xdc/0x128 [ 20.540919] kasan_check_range+0x100/0x1a8 [ 20.541230] __kasan_check_write+0x20/0x30 [ 20.541284] kasan_atomics_helper+0x99c/0x4858 [ 20.541399] kasan_atomics+0x198/0x2e0 [ 20.541447] kunit_try_run_case+0x170/0x3f0 [ 20.541496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.541570] kthread+0x328/0x630 [ 20.541619] ret_from_fork+0x10/0x20 [ 20.541666] [ 20.541686] Allocated by task 267: [ 20.541715] kasan_save_stack+0x3c/0x68 [ 20.541837] kasan_save_track+0x20/0x40 [ 20.541878] kasan_save_alloc_info+0x40/0x58 [ 20.541918] __kasan_kmalloc+0xd4/0xd8 [ 20.541957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.541996] kasan_atomics+0xb8/0x2e0 [ 20.542034] kunit_try_run_case+0x170/0x3f0 [ 20.542074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.542122] kthread+0x328/0x630 [ 20.542420] ret_from_fork+0x10/0x20 [ 20.542479] [ 20.542501] The buggy address belongs to the object at fff00000c59c9e00 [ 20.542501] which belongs to the cache kmalloc-64 of size 64 [ 20.542563] The buggy address is located 0 bytes to the right of [ 20.542563] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.542684] [ 20.542739] The buggy address belongs to the physical page: [ 20.542778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.542874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.542923] page_type: f5(slab) [ 20.542963] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.543073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.543303] page dumped because: kasan: bad access detected [ 20.543450] [ 20.543470] Memory state around the buggy address: [ 20.543530] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.543578] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.543624] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.543699] ^ [ 20.543794] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.543840] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.543902] ================================================================== [ 20.907298] ================================================================== [ 20.907489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.907560] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.907614] [ 20.908081] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.908189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.908235] Hardware name: linux,dummy-virt (DT) [ 20.908628] Call trace: [ 20.908688] show_stack+0x20/0x38 (C) [ 20.908775] dump_stack_lvl+0x8c/0xd0 [ 20.908830] print_report+0x118/0x5d0 [ 20.908936] kasan_report+0xdc/0x128 [ 20.908982] kasan_check_range+0x100/0x1a8 [ 20.909046] __kasan_check_write+0x20/0x30 [ 20.909097] kasan_atomics_helper+0x1644/0x4858 [ 20.909281] kasan_atomics+0x198/0x2e0 [ 20.909697] kunit_try_run_case+0x170/0x3f0 [ 20.909813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.909985] kthread+0x328/0x630 [ 20.910136] ret_from_fork+0x10/0x20 [ 20.910198] [ 20.910234] Allocated by task 267: [ 20.910263] kasan_save_stack+0x3c/0x68 [ 20.910661] kasan_save_track+0x20/0x40 [ 20.910967] kasan_save_alloc_info+0x40/0x58 [ 20.911238] __kasan_kmalloc+0xd4/0xd8 [ 20.911427] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.911523] kasan_atomics+0xb8/0x2e0 [ 20.911561] kunit_try_run_case+0x170/0x3f0 [ 20.911827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.912283] kthread+0x328/0x630 [ 20.912535] ret_from_fork+0x10/0x20 [ 20.912635] [ 20.912691] The buggy address belongs to the object at fff00000c59c9e00 [ 20.912691] which belongs to the cache kmalloc-64 of size 64 [ 20.912983] The buggy address is located 0 bytes to the right of [ 20.912983] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.913061] [ 20.913457] The buggy address belongs to the physical page: [ 20.913768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.913956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.914012] page_type: f5(slab) [ 20.914050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.914835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.915226] page dumped because: kasan: bad access detected [ 20.915293] [ 20.915471] Memory state around the buggy address: [ 20.915682] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.915736] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.916145] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.916196] ^ [ 20.916256] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.916301] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.916354] ================================================================== [ 20.887756] ================================================================== [ 20.887817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.887872] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.887981] [ 20.888016] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.888114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.888278] Hardware name: linux,dummy-virt (DT) [ 20.888316] Call trace: [ 20.888343] show_stack+0x20/0x38 (C) [ 20.888561] dump_stack_lvl+0x8c/0xd0 [ 20.888652] print_report+0x118/0x5d0 [ 20.888904] kasan_report+0xdc/0x128 [ 20.889168] kasan_check_range+0x100/0x1a8 [ 20.889252] __kasan_check_write+0x20/0x30 [ 20.889303] kasan_atomics_helper+0x15b4/0x4858 [ 20.889926] kasan_atomics+0x198/0x2e0 [ 20.890094] kunit_try_run_case+0x170/0x3f0 [ 20.890170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.890243] kthread+0x328/0x630 [ 20.890289] ret_from_fork+0x10/0x20 [ 20.890953] [ 20.891002] Allocated by task 267: [ 20.891192] kasan_save_stack+0x3c/0x68 [ 20.891358] kasan_save_track+0x20/0x40 [ 20.891455] kasan_save_alloc_info+0x40/0x58 [ 20.891588] __kasan_kmalloc+0xd4/0xd8 [ 20.891819] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.892225] kasan_atomics+0xb8/0x2e0 [ 20.892416] kunit_try_run_case+0x170/0x3f0 [ 20.892697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.893195] kthread+0x328/0x630 [ 20.893781] ret_from_fork+0x10/0x20 [ 20.893845] [ 20.894003] The buggy address belongs to the object at fff00000c59c9e00 [ 20.894003] which belongs to the cache kmalloc-64 of size 64 [ 20.894184] The buggy address is located 0 bytes to the right of [ 20.894184] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.894404] [ 20.894432] The buggy address belongs to the physical page: [ 20.894925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.895174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.895443] page_type: f5(slab) [ 20.895617] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.895702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.895860] page dumped because: kasan: bad access detected [ 20.895906] [ 20.895926] Memory state around the buggy address: [ 20.895964] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.896011] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.896059] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.896103] ^ [ 20.896338] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.896418] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.896469] ================================================================== [ 20.527881] ================================================================== [ 20.527928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.527993] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.528259] [ 20.528407] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.528597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.528633] Hardware name: linux,dummy-virt (DT) [ 20.528667] Call trace: [ 20.528688] show_stack+0x20/0x38 (C) [ 20.528746] dump_stack_lvl+0x8c/0xd0 [ 20.528989] print_report+0x118/0x5d0 [ 20.529043] kasan_report+0xdc/0x128 [ 20.529192] __asan_report_load4_noabort+0x20/0x30 [ 20.529282] kasan_atomics_helper+0x42d8/0x4858 [ 20.529402] kasan_atomics+0x198/0x2e0 [ 20.529448] kunit_try_run_case+0x170/0x3f0 [ 20.529499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.529557] kthread+0x328/0x630 [ 20.529644] ret_from_fork+0x10/0x20 [ 20.529692] [ 20.529940] Allocated by task 267: [ 20.530089] kasan_save_track+0x20/0x40 [ 20.530348] kasan_save_alloc_info+0x40/0x58 [ 20.530400] __kasan_kmalloc+0xd4/0xd8 [ 20.530439] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.530723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.531236] [ 20.531335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.532286] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.533689] ================================================================== [ 20.757918] ================================================================== [ 20.758000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.758076] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.758129] [ 20.758191] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.758290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.758343] Hardware name: linux,dummy-virt (DT) [ 20.758378] Call trace: [ 20.758401] show_stack+0x20/0x38 (C) [ 20.758450] dump_stack_lvl+0x8c/0xd0 [ 20.758515] print_report+0x118/0x5d0 [ 20.758590] kasan_report+0xdc/0x128 [ 20.758777] kasan_check_range+0x100/0x1a8 [ 20.758856] __kasan_check_write+0x20/0x30 [ 20.758955] kasan_atomics_helper+0xf88/0x4858 [ 20.759051] kasan_atomics+0x198/0x2e0 [ 20.759097] kunit_try_run_case+0x170/0x3f0 [ 20.759192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.759275] kthread+0x328/0x630 [ 20.759321] ret_from_fork+0x10/0x20 [ 20.759396] [ 20.759436] Allocated by task 267: [ 20.759483] kasan_save_stack+0x3c/0x68 [ 20.759525] kasan_save_track+0x20/0x40 [ 20.759562] kasan_save_alloc_info+0x40/0x58 [ 20.759603] __kasan_kmalloc+0xd4/0xd8 [ 20.759914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.759963] kasan_atomics+0xb8/0x2e0 [ 20.760000] kunit_try_run_case+0x170/0x3f0 [ 20.760096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.760154] kthread+0x328/0x630 [ 20.760193] ret_from_fork+0x10/0x20 [ 20.760244] [ 20.760264] The buggy address belongs to the object at fff00000c59c9e00 [ 20.760264] which belongs to the cache kmalloc-64 of size 64 [ 20.760494] The buggy address is located 0 bytes to the right of [ 20.760494] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.760562] [ 20.760621] The buggy address belongs to the physical page: [ 20.760678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.760753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.760821] page_type: f5(slab) [ 20.760890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.760974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.761029] page dumped because: kasan: bad access detected [ 20.761075] [ 20.761095] Memory state around the buggy address: [ 20.761129] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.761176] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.761232] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.761274] ^ [ 20.761307] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.761364] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.761406] ================================================================== [ 20.652631] ================================================================== [ 20.652690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.652740] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.652795] [ 20.652826] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.653720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.653984] Hardware name: linux,dummy-virt (DT) [ 20.654152] Call trace: [ 20.654326] show_stack+0x20/0x38 (C) [ 20.654805] dump_stack_lvl+0x8c/0xd0 [ 20.654863] print_report+0x118/0x5d0 [ 20.655801] kasan_report+0xdc/0x128 [ 20.656161] __asan_report_load4_noabort+0x20/0x30 [ 20.656300] kasan_atomics_helper+0x3dd8/0x4858 [ 20.656350] kasan_atomics+0x198/0x2e0 [ 20.656398] kunit_try_run_case+0x170/0x3f0 [ 20.656449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.656505] kthread+0x328/0x630 [ 20.656553] ret_from_fork+0x10/0x20 [ 20.656951] [ 20.657264] Allocated by task 267: [ 20.657302] kasan_save_stack+0x3c/0x68 [ 20.657347] kasan_save_track+0x20/0x40 [ 20.657384] kasan_save_alloc_info+0x40/0x58 [ 20.657433] __kasan_kmalloc+0xd4/0xd8 [ 20.657471] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.657511] kasan_atomics+0xb8/0x2e0 [ 20.658421] kunit_try_run_case+0x170/0x3f0 [ 20.658494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.658651] kthread+0x328/0x630 [ 20.658721] ret_from_fork+0x10/0x20 [ 20.659046] [ 20.659072] The buggy address belongs to the object at fff00000c59c9e00 [ 20.659072] which belongs to the cache kmalloc-64 of size 64 [ 20.659400] The buggy address is located 0 bytes to the right of [ 20.659400] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.659563] [ 20.659587] The buggy address belongs to the physical page: [ 20.659780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.660030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.660502] page_type: f5(slab) [ 20.660699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.660953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.661077] page dumped because: kasan: bad access detected [ 20.661395] [ 20.661574] Memory state around the buggy address: [ 20.661617] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.661732] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.661781] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.661824] ^ [ 20.662252] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.662355] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.662397] ================================================================== [ 20.818699] ================================================================== [ 20.818762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.819056] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.819295] [ 20.819340] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.819428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.819586] Hardware name: linux,dummy-virt (DT) [ 20.819623] Call trace: [ 20.819698] show_stack+0x20/0x38 (C) [ 20.819887] dump_stack_lvl+0x8c/0xd0 [ 20.820099] print_report+0x118/0x5d0 [ 20.820310] kasan_report+0xdc/0x128 [ 20.820372] kasan_check_range+0x100/0x1a8 [ 20.820568] __kasan_check_write+0x20/0x30 [ 20.820695] kasan_atomics_helper+0x12d8/0x4858 [ 20.820859] kasan_atomics+0x198/0x2e0 [ 20.820913] kunit_try_run_case+0x170/0x3f0 [ 20.820964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.821019] kthread+0x328/0x630 [ 20.821066] ret_from_fork+0x10/0x20 [ 20.821113] [ 20.821136] Allocated by task 267: [ 20.821165] kasan_save_stack+0x3c/0x68 [ 20.821573] kasan_save_track+0x20/0x40 [ 20.821867] kasan_save_alloc_info+0x40/0x58 [ 20.821984] __kasan_kmalloc+0xd4/0xd8 [ 20.822254] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.822352] kasan_atomics+0xb8/0x2e0 [ 20.822451] kunit_try_run_case+0x170/0x3f0 [ 20.822498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.822544] kthread+0x328/0x630 [ 20.822603] ret_from_fork+0x10/0x20 [ 20.823128] [ 20.823199] The buggy address belongs to the object at fff00000c59c9e00 [ 20.823199] which belongs to the cache kmalloc-64 of size 64 [ 20.823439] The buggy address is located 0 bytes to the right of [ 20.823439] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.823517] [ 20.823739] The buggy address belongs to the physical page: [ 20.824035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.824164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.824353] page_type: f5(slab) [ 20.824703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.824947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.825272] page dumped because: kasan: bad access detected [ 20.825810] [ 20.827223] Memory state around the buggy address: [ 20.827762] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.827964] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.828156] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.828351] ^ [ 20.828397] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.828871] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.829169] ================================================================== [ 20.715515] ================================================================== [ 20.715696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.715751] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.715805] [ 20.715837] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.715921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.716265] Hardware name: linux,dummy-virt (DT) [ 20.716506] Call trace: [ 20.716606] show_stack+0x20/0x38 (C) [ 20.716658] dump_stack_lvl+0x8c/0xd0 [ 20.716815] print_report+0x118/0x5d0 [ 20.717048] kasan_report+0xdc/0x128 [ 20.717191] __asan_report_store8_noabort+0x20/0x30 [ 20.717255] kasan_atomics_helper+0x3e5c/0x4858 [ 20.717306] kasan_atomics+0x198/0x2e0 [ 20.717389] kunit_try_run_case+0x170/0x3f0 [ 20.717719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.717916] kthread+0x328/0x630 [ 20.717971] ret_from_fork+0x10/0x20 [ 20.718239] [ 20.718665] Allocated by task 267: [ 20.718765] kasan_save_stack+0x3c/0x68 [ 20.719098] kasan_save_track+0x20/0x40 [ 20.719366] kasan_save_alloc_info+0x40/0x58 [ 20.719601] __kasan_kmalloc+0xd4/0xd8 [ 20.719725] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.720016] kasan_atomics+0xb8/0x2e0 [ 20.720305] kunit_try_run_case+0x170/0x3f0 [ 20.720509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.720598] kthread+0x328/0x630 [ 20.720638] ret_from_fork+0x10/0x20 [ 20.720677] [ 20.720744] The buggy address belongs to the object at fff00000c59c9e00 [ 20.720744] which belongs to the cache kmalloc-64 of size 64 [ 20.721018] The buggy address is located 0 bytes to the right of [ 20.721018] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.721092] [ 20.721119] The buggy address belongs to the physical page: [ 20.721186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.721275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.721377] page_type: f5(slab) [ 20.721419] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.721529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.722072] page dumped because: kasan: bad access detected [ 20.722113] [ 20.722133] Memory state around the buggy address: [ 20.722169] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.722227] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.722633] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.722696] ^ [ 20.722799] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.722846] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.723146] ================================================================== [ 20.707652] ================================================================== [ 20.707807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.708043] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.708195] [ 20.708290] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.708375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.708411] Hardware name: linux,dummy-virt (DT) [ 20.708580] Call trace: [ 20.708687] show_stack+0x20/0x38 (C) [ 20.708865] dump_stack_lvl+0x8c/0xd0 [ 20.708948] print_report+0x118/0x5d0 [ 20.708993] kasan_report+0xdc/0x128 [ 20.709039] kasan_check_range+0x100/0x1a8 [ 20.709088] __kasan_check_write+0x20/0x30 [ 20.709137] kasan_atomics_helper+0xe44/0x4858 [ 20.709190] kasan_atomics+0x198/0x2e0 [ 20.709619] kunit_try_run_case+0x170/0x3f0 [ 20.709825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.709885] kthread+0x328/0x630 [ 20.710430] ret_from_fork+0x10/0x20 [ 20.710629] [ 20.710650] Allocated by task 267: [ 20.710679] kasan_save_stack+0x3c/0x68 [ 20.710723] kasan_save_track+0x20/0x40 [ 20.710761] kasan_save_alloc_info+0x40/0x58 [ 20.711083] __kasan_kmalloc+0xd4/0xd8 [ 20.711129] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.711349] kasan_atomics+0xb8/0x2e0 [ 20.711393] kunit_try_run_case+0x170/0x3f0 [ 20.711436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.711485] kthread+0x328/0x630 [ 20.711802] ret_from_fork+0x10/0x20 [ 20.711845] [ 20.711867] The buggy address belongs to the object at fff00000c59c9e00 [ 20.711867] which belongs to the cache kmalloc-64 of size 64 [ 20.712214] The buggy address is located 0 bytes to the right of [ 20.712214] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.712285] [ 20.712309] The buggy address belongs to the physical page: [ 20.712354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.712411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.712824] page_type: f5(slab) [ 20.712866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.713299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.713377] page dumped because: kasan: bad access detected [ 20.713413] [ 20.713435] Memory state around the buggy address: [ 20.713470] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.713665] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.713854] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.713898] ^ [ 20.713944] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.714236] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.714513] ================================================================== [ 20.924361] ================================================================== [ 20.924412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.924459] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.924519] [ 20.924549] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.924633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.924673] Hardware name: linux,dummy-virt (DT) [ 20.924716] Call trace: [ 20.924748] show_stack+0x20/0x38 (C) [ 20.924797] dump_stack_lvl+0x8c/0xd0 [ 20.924848] print_report+0x118/0x5d0 [ 20.924898] kasan_report+0xdc/0x128 [ 20.924945] kasan_check_range+0x100/0x1a8 [ 20.924994] __kasan_check_write+0x20/0x30 [ 20.925041] kasan_atomics_helper+0x16d0/0x4858 [ 20.925095] kasan_atomics+0x198/0x2e0 [ 20.925139] kunit_try_run_case+0x170/0x3f0 [ 20.925189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.925728] kthread+0x328/0x630 [ 20.925830] ret_from_fork+0x10/0x20 [ 20.925894] [ 20.925914] Allocated by task 267: [ 20.925945] kasan_save_stack+0x3c/0x68 [ 20.925985] kasan_save_track+0x20/0x40 [ 20.926515] kasan_save_alloc_info+0x40/0x58 [ 20.926593] __kasan_kmalloc+0xd4/0xd8 [ 20.926670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.926983] kasan_atomics+0xb8/0x2e0 [ 20.927106] kunit_try_run_case+0x170/0x3f0 [ 20.927176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.927236] kthread+0x328/0x630 [ 20.927586] ret_from_fork+0x10/0x20 [ 20.927960] [ 20.928079] The buggy address belongs to the object at fff00000c59c9e00 [ 20.928079] which belongs to the cache kmalloc-64 of size 64 [ 20.928556] The buggy address is located 0 bytes to the right of [ 20.928556] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.928983] [ 20.929359] The buggy address belongs to the physical page: [ 20.929436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.929514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.929849] page_type: f5(slab) [ 20.929901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.930094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.930309] page dumped because: kasan: bad access detected [ 20.930429] [ 20.930621] Memory state around the buggy address: [ 20.930715] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.930766] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.931198] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.931449] ^ [ 20.931604] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.931934] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.932194] ================================================================== [ 20.764952] ================================================================== [ 20.765063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.765176] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.765242] [ 20.765271] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.765364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.765394] Hardware name: linux,dummy-virt (DT) [ 20.765426] Call trace: [ 20.765450] show_stack+0x20/0x38 (C) [ 20.765497] dump_stack_lvl+0x8c/0xd0 [ 20.765581] print_report+0x118/0x5d0 [ 20.765689] kasan_report+0xdc/0x128 [ 20.765765] kasan_check_range+0x100/0x1a8 [ 20.765852] __kasan_check_write+0x20/0x30 [ 20.765951] kasan_atomics_helper+0x1058/0x4858 [ 20.766002] kasan_atomics+0x198/0x2e0 [ 20.766071] kunit_try_run_case+0x170/0x3f0 [ 20.766120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.766175] kthread+0x328/0x630 [ 20.766232] ret_from_fork+0x10/0x20 [ 20.766279] [ 20.766300] Allocated by task 267: [ 20.766329] kasan_save_stack+0x3c/0x68 [ 20.766368] kasan_save_track+0x20/0x40 [ 20.766406] kasan_save_alloc_info+0x40/0x58 [ 20.766669] __kasan_kmalloc+0xd4/0xd8 [ 20.766782] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.766894] kasan_atomics+0xb8/0x2e0 [ 20.766971] kunit_try_run_case+0x170/0x3f0 [ 20.767101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.767498] kthread+0x328/0x630 [ 20.767574] ret_from_fork+0x10/0x20 [ 20.767723] [ 20.767752] The buggy address belongs to the object at fff00000c59c9e00 [ 20.767752] which belongs to the cache kmalloc-64 of size 64 [ 20.767815] The buggy address is located 0 bytes to the right of [ 20.767815] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.767916] [ 20.767949] The buggy address belongs to the physical page: [ 20.767996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.768060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.768110] page_type: f5(slab) [ 20.768148] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.768364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.768660] page dumped because: kasan: bad access detected [ 20.768697] [ 20.768764] Memory state around the buggy address: [ 20.768839] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.768950] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.769016] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.769419] ^ [ 20.769498] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.769607] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.769648] ================================================================== [ 20.664370] ================================================================== [ 20.664425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.664476] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.664529] [ 20.664561] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.664646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.666105] Hardware name: linux,dummy-virt (DT) [ 20.666297] Call trace: [ 20.666328] show_stack+0x20/0x38 (C) [ 20.666798] dump_stack_lvl+0x8c/0xd0 [ 20.666865] print_report+0x118/0x5d0 [ 20.667282] kasan_report+0xdc/0x128 [ 20.667343] kasan_check_range+0x100/0x1a8 [ 20.667392] __kasan_check_write+0x20/0x30 [ 20.667997] kasan_atomics_helper+0xd3c/0x4858 [ 20.668219] kasan_atomics+0x198/0x2e0 [ 20.668270] kunit_try_run_case+0x170/0x3f0 [ 20.668823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.669425] kthread+0x328/0x630 [ 20.670002] ret_from_fork+0x10/0x20 [ 20.670072] [ 20.670146] Allocated by task 267: [ 20.670235] kasan_save_stack+0x3c/0x68 [ 20.670309] kasan_save_track+0x20/0x40 [ 20.670648] kasan_save_alloc_info+0x40/0x58 [ 20.670736] __kasan_kmalloc+0xd4/0xd8 [ 20.671321] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.671378] kasan_atomics+0xb8/0x2e0 [ 20.671418] kunit_try_run_case+0x170/0x3f0 [ 20.671798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.672161] kthread+0x328/0x630 [ 20.672496] ret_from_fork+0x10/0x20 [ 20.672615] [ 20.672819] The buggy address belongs to the object at fff00000c59c9e00 [ 20.672819] which belongs to the cache kmalloc-64 of size 64 [ 20.673301] The buggy address is located 0 bytes to the right of [ 20.673301] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.673698] [ 20.673727] The buggy address belongs to the physical page: [ 20.673880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.673940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.674263] page_type: f5(slab) [ 20.674311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.674365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.674932] page dumped because: kasan: bad access detected [ 20.674982] [ 20.675003] Memory state around the buggy address: [ 20.675040] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.675086] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.675133] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.675175] ^ [ 20.676154] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.676447] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.677023] ================================================================== [ 20.550984] ================================================================== [ 20.551101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.551148] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.551214] [ 20.551250] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.551606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.551639] Hardware name: linux,dummy-virt (DT) [ 20.551673] Call trace: [ 20.551696] show_stack+0x20/0x38 (C) [ 20.551747] dump_stack_lvl+0x8c/0xd0 [ 20.551807] print_report+0x118/0x5d0 [ 20.551855] kasan_report+0xdc/0x128 [ 20.551901] kasan_check_range+0x100/0x1a8 [ 20.552056] __kasan_check_write+0x20/0x30 [ 20.552313] kasan_atomics_helper+0xa6c/0x4858 [ 20.552408] kasan_atomics+0x198/0x2e0 [ 20.552455] kunit_try_run_case+0x170/0x3f0 [ 20.552505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.552801] kthread+0x328/0x630 [ 20.552856] ret_from_fork+0x10/0x20 [ 20.553016] [ 20.553036] Allocated by task 267: [ 20.553124] kasan_save_stack+0x3c/0x68 [ 20.553172] kasan_save_track+0x20/0x40 [ 20.553227] kasan_save_alloc_info+0x40/0x58 [ 20.553358] __kasan_kmalloc+0xd4/0xd8 [ 20.553397] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.553439] kasan_atomics+0xb8/0x2e0 [ 20.553475] kunit_try_run_case+0x170/0x3f0 [ 20.553517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.553762] kthread+0x328/0x630 [ 20.553941] ret_from_fork+0x10/0x20 [ 20.553987] [ 20.554008] The buggy address belongs to the object at fff00000c59c9e00 [ 20.554008] which belongs to the cache kmalloc-64 of size 64 [ 20.554071] The buggy address is located 0 bytes to the right of [ 20.554071] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.554143] [ 20.554165] The buggy address belongs to the physical page: [ 20.554197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.554423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.554492] page_type: f5(slab) [ 20.554532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.554586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.554630] page dumped because: kasan: bad access detected [ 20.554666] [ 20.554696] Memory state around the buggy address: [ 20.554730] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.554776] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.554949] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.555005] ^ [ 20.555040] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.555086] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.555697] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.556993] kasan_atomics+0x198/0x2e0 [ 20.557256] [ 20.557278] Allocated by task 267: [ 20.557306] kasan_save_stack+0x3c/0x68 [ 20.557463] kasan_save_track+0x20/0x40 [ 20.557539] kasan_save_alloc_info+0x40/0x58 [ 20.557699] __kasan_kmalloc+0xd4/0xd8 [ 20.557951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.557999] kasan_atomics+0xb8/0x2e0 [ 20.558062] kunit_try_run_case+0x170/0x3f0 [ 20.558105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.558156] kthread+0x328/0x630 [ 20.558193] ret_from_fork+0x10/0x20 [ 20.558242] [ 20.558265] The buggy address belongs to the object at fff00000c59c9e00 [ 20.558265] which belongs to the cache kmalloc-64 of size 64 [ 20.558327] The buggy address is located 0 bytes to the right of [ 20.558327] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.558697] [ 20.558718] The buggy address belongs to the physical page: [ 20.558780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.559155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.559222] page_type: f5(slab) [ 20.559296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.559383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.559585] page dumped because: kasan: bad access detected [ 20.559713] [ 20.559812] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.561922] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.562264] show_stack+0x20/0x38 (C) [ 20.563801] kthread+0x328/0x630 [ 20.564150] kasan_save_stack+0x3c/0x68 [ 20.564539] kasan_save_track+0x20/0x40 [ 20.565824] kunit_try_run_case+0x170/0x3f0 [ 20.567114] The buggy address is located 0 bytes to the right of [ 20.567114] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.570122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.572456] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.575587] ================================================================== [ 20.724134] ================================================================== [ 20.724188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.724256] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.724770] [ 20.724892] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.724980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.725011] Hardware name: linux,dummy-virt (DT) [ 20.725045] Call trace: [ 20.725693] show_stack+0x20/0x38 (C) [ 20.725958] dump_stack_lvl+0x8c/0xd0 [ 20.726412] print_report+0x118/0x5d0 [ 20.726513] kasan_report+0xdc/0x128 [ 20.726651] kasan_check_range+0x100/0x1a8 [ 20.726718] __kasan_check_write+0x20/0x30 [ 20.726828] kasan_atomics_helper+0xeb8/0x4858 [ 20.727275] kasan_atomics+0x198/0x2e0 [ 20.727325] kunit_try_run_case+0x170/0x3f0 [ 20.728112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.728932] kthread+0x328/0x630 [ 20.729616] ret_from_fork+0x10/0x20 [ 20.730221] [ 20.730296] Allocated by task 267: [ 20.730884] kasan_save_stack+0x3c/0x68 [ 20.731097] kasan_save_track+0x20/0x40 [ 20.731421] kasan_save_alloc_info+0x40/0x58 [ 20.732145] __kasan_kmalloc+0xd4/0xd8 [ 20.732910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.733094] kasan_atomics+0xb8/0x2e0 [ 20.733166] kunit_try_run_case+0x170/0x3f0 [ 20.734028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.734388] kthread+0x328/0x630 [ 20.734516] ret_from_fork+0x10/0x20 [ 20.734862] [ 20.735115] The buggy address belongs to the object at fff00000c59c9e00 [ 20.735115] which belongs to the cache kmalloc-64 of size 64 [ 20.735660] The buggy address is located 0 bytes to the right of [ 20.735660] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.736433] [ 20.736488] The buggy address belongs to the physical page: [ 20.737112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.737624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.737983] page_type: f5(slab) [ 20.738050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.738579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.739101] page dumped because: kasan: bad access detected [ 20.739148] [ 20.739415] Memory state around the buggy address: [ 20.740087] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.740393] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.741484] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.741582] ^ [ 20.741650] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.741697] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.741739] ================================================================== [ 20.797125] ================================================================== [ 20.797214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.797692] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.797843] [ 20.797907] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.798033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.798326] Hardware name: linux,dummy-virt (DT) [ 20.798560] Call trace: [ 20.798708] show_stack+0x20/0x38 (C) [ 20.799139] dump_stack_lvl+0x8c/0xd0 [ 20.799315] print_report+0x118/0x5d0 [ 20.799395] kasan_report+0xdc/0x128 [ 20.799632] kasan_check_range+0x100/0x1a8 [ 20.799810] __kasan_check_write+0x20/0x30 [ 20.800012] kasan_atomics_helper+0x11f8/0x4858 [ 20.800300] kasan_atomics+0x198/0x2e0 [ 20.800445] kunit_try_run_case+0x170/0x3f0 [ 20.800500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.800909] kthread+0x328/0x630 [ 20.801354] ret_from_fork+0x10/0x20 [ 20.801516] [ 20.801566] Allocated by task 267: [ 20.801636] kasan_save_stack+0x3c/0x68 [ 20.801868] kasan_save_track+0x20/0x40 [ 20.802111] kasan_save_alloc_info+0x40/0x58 [ 20.802224] __kasan_kmalloc+0xd4/0xd8 [ 20.802469] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.802650] kasan_atomics+0xb8/0x2e0 [ 20.802848] kunit_try_run_case+0x170/0x3f0 [ 20.802929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.803089] kthread+0x328/0x630 [ 20.803129] ret_from_fork+0x10/0x20 [ 20.803527] [ 20.803572] The buggy address belongs to the object at fff00000c59c9e00 [ 20.803572] which belongs to the cache kmalloc-64 of size 64 [ 20.804001] The buggy address is located 0 bytes to the right of [ 20.804001] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.804438] [ 20.804498] The buggy address belongs to the physical page: [ 20.804546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.804843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.805228] page_type: f5(slab) [ 20.805642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.805717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.805765] page dumped because: kasan: bad access detected [ 20.805801] [ 20.806066] Memory state around the buggy address: [ 20.806449] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.806612] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.806688] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.806734] ^ [ 20.806803] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.806859] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.806913] ================================================================== [ 20.933393] ================================================================== [ 20.933492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.933554] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.933607] [ 20.933638] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.934102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.934162] Hardware name: linux,dummy-virt (DT) [ 20.934427] Call trace: [ 20.934454] show_stack+0x20/0x38 (C) [ 20.934825] dump_stack_lvl+0x8c/0xd0 [ 20.935095] print_report+0x118/0x5d0 [ 20.935414] kasan_report+0xdc/0x128 [ 20.935698] __asan_report_load8_noabort+0x20/0x30 [ 20.936152] kasan_atomics_helper+0x3e10/0x4858 [ 20.936245] kasan_atomics+0x198/0x2e0 [ 20.936514] kunit_try_run_case+0x170/0x3f0 [ 20.936682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.937129] kthread+0x328/0x630 [ 20.937282] ret_from_fork+0x10/0x20 [ 20.937552] [ 20.937609] Allocated by task 267: [ 20.937799] kasan_save_stack+0x3c/0x68 [ 20.938010] kasan_save_track+0x20/0x40 [ 20.938089] kasan_save_alloc_info+0x40/0x58 [ 20.938366] __kasan_kmalloc+0xd4/0xd8 [ 20.938507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.938748] kasan_atomics+0xb8/0x2e0 [ 20.938819] kunit_try_run_case+0x170/0x3f0 [ 20.938890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.939135] kthread+0x328/0x630 [ 20.939418] ret_from_fork+0x10/0x20 [ 20.939685] [ 20.940013] The buggy address belongs to the object at fff00000c59c9e00 [ 20.940013] which belongs to the cache kmalloc-64 of size 64 [ 20.940150] The buggy address is located 0 bytes to the right of [ 20.940150] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.940681] [ 20.940838] The buggy address belongs to the physical page: [ 20.941075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.941374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.941565] page_type: f5(slab) [ 20.941826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.942103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.942167] page dumped because: kasan: bad access detected [ 20.942482] [ 20.942789] Memory state around the buggy address: [ 20.942855] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.943018] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.943088] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.943375] ^ [ 20.943663] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.943914] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.944006] ================================================================== [ 20.918237] ================================================================== [ 20.918295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.918669] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.918739] [ 20.919082] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.919186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.919226] Hardware name: linux,dummy-virt (DT) [ 20.919261] Call trace: [ 20.919530] show_stack+0x20/0x38 (C) [ 20.919603] dump_stack_lvl+0x8c/0xd0 [ 20.919703] print_report+0x118/0x5d0 [ 20.919811] kasan_report+0xdc/0x128 [ 20.919908] __asan_report_load8_noabort+0x20/0x30 [ 20.919970] kasan_atomics_helper+0x3df4/0x4858 [ 20.920312] kasan_atomics+0x198/0x2e0 [ 20.920503] kunit_try_run_case+0x170/0x3f0 [ 20.920573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.920787] kthread+0x328/0x630 [ 20.921154] ret_from_fork+0x10/0x20 [ 20.921233] [ 20.921568] Allocated by task 267: [ 20.921641] kasan_save_stack+0x3c/0x68 [ 20.921807] kasan_save_track+0x20/0x40 [ 20.921876] kasan_save_alloc_info+0x40/0x58 [ 20.922092] __kasan_kmalloc+0xd4/0xd8 [ 20.922153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.922535] kasan_atomics+0xb8/0x2e0 [ 20.922761] kunit_try_run_case+0x170/0x3f0 [ 20.922979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.923115] kthread+0x328/0x630 [ 20.923156] ret_from_fork+0x10/0x20 [ 20.923193] [ 20.923237] The buggy address belongs to the object at fff00000c59c9e00 [ 20.923237] which belongs to the cache kmalloc-64 of size 64 [ 20.923302] The buggy address is located 0 bytes to the right of [ 20.923302] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.923371] [ 20.923402] The buggy address belongs to the physical page: [ 20.923445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.923502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.923554] page_type: f5(slab) [ 20.923594] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.923674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.923728] page dumped because: kasan: bad access detected [ 20.923762] [ 20.923784] Memory state around the buggy address: [ 20.923826] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.923891] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.923939] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.923983] ^ [ 20.924020] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.924066] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.924108] ================================================================== [ 20.838358] ================================================================== [ 20.838412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.838667] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.838754] [ 20.838856] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.838944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.839189] Hardware name: linux,dummy-virt (DT) [ 20.839249] Call trace: [ 20.839274] show_stack+0x20/0x38 (C) [ 20.839571] dump_stack_lvl+0x8c/0xd0 [ 20.839795] print_report+0x118/0x5d0 [ 20.839857] kasan_report+0xdc/0x128 [ 20.839965] __asan_report_load8_noabort+0x20/0x30 [ 20.840282] kasan_atomics_helper+0x3f04/0x4858 [ 20.840347] kasan_atomics+0x198/0x2e0 [ 20.840648] kunit_try_run_case+0x170/0x3f0 [ 20.840866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.840950] kthread+0x328/0x630 [ 20.841002] ret_from_fork+0x10/0x20 [ 20.841268] [ 20.841303] Allocated by task 267: [ 20.841767] kasan_save_stack+0x3c/0x68 [ 20.841891] kasan_save_track+0x20/0x40 [ 20.841955] kasan_save_alloc_info+0x40/0x58 [ 20.842258] __kasan_kmalloc+0xd4/0xd8 [ 20.842301] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.842350] kasan_atomics+0xb8/0x2e0 [ 20.842387] kunit_try_run_case+0x170/0x3f0 [ 20.843073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.843371] kthread+0x328/0x630 [ 20.843819] ret_from_fork+0x10/0x20 [ 20.844098] [ 20.844167] The buggy address belongs to the object at fff00000c59c9e00 [ 20.844167] which belongs to the cache kmalloc-64 of size 64 [ 20.844445] The buggy address is located 0 bytes to the right of [ 20.844445] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.844804] [ 20.845258] The buggy address belongs to the physical page: [ 20.845426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.845489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.845689] page_type: f5(slab) [ 20.846284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.846731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.846838] page dumped because: kasan: bad access detected [ 20.847019] [ 20.847197] Memory state around the buggy address: [ 20.847459] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.847539] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.847950] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.848288] ^ [ 20.848715] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.848768] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.849404] ================================================================== [ 20.678591] ================================================================== [ 20.678654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.678716] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.678771] [ 20.678804] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.678889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.678917] Hardware name: linux,dummy-virt (DT) [ 20.679849] Call trace: [ 20.679888] show_stack+0x20/0x38 (C) [ 20.680048] dump_stack_lvl+0x8c/0xd0 [ 20.680134] print_report+0x118/0x5d0 [ 20.680342] kasan_report+0xdc/0x128 [ 20.680697] __asan_report_load4_noabort+0x20/0x30 [ 20.680857] kasan_atomics_helper+0x3e04/0x4858 [ 20.680909] kasan_atomics+0x198/0x2e0 [ 20.681375] kunit_try_run_case+0x170/0x3f0 [ 20.681938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.682359] kthread+0x328/0x630 [ 20.682789] ret_from_fork+0x10/0x20 [ 20.682996] [ 20.683019] Allocated by task 267: [ 20.683049] kasan_save_stack+0x3c/0x68 [ 20.683458] kasan_save_track+0x20/0x40 [ 20.683538] kasan_save_alloc_info+0x40/0x58 [ 20.683877] __kasan_kmalloc+0xd4/0xd8 [ 20.683919] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.683960] kasan_atomics+0xb8/0x2e0 [ 20.683998] kunit_try_run_case+0x170/0x3f0 [ 20.684461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.684525] kthread+0x328/0x630 [ 20.684804] ret_from_fork+0x10/0x20 [ 20.685123] [ 20.685214] The buggy address belongs to the object at fff00000c59c9e00 [ 20.685214] which belongs to the cache kmalloc-64 of size 64 [ 20.685283] The buggy address is located 0 bytes to the right of [ 20.685283] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.685362] [ 20.685974] The buggy address belongs to the physical page: [ 20.686017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.686079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.686133] page_type: f5(slab) [ 20.686173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.686808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.687320] page dumped because: kasan: bad access detected [ 20.687365] [ 20.687697] Memory state around the buggy address: [ 20.687737] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.688082] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.688330] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.688494] ^ [ 20.688597] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.689019] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.689071] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 20.279733] ================================================================== [ 20.279788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 20.279843] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.279896] [ 20.279929] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.280012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.280040] Hardware name: linux,dummy-virt (DT) [ 20.280073] Call trace: [ 20.280098] show_stack+0x20/0x38 (C) [ 20.280145] dump_stack_lvl+0x8c/0xd0 [ 20.280196] print_report+0x118/0x5d0 [ 20.280259] kasan_report+0xdc/0x128 [ 20.280306] kasan_check_range+0x100/0x1a8 [ 20.280355] __kasan_check_write+0x20/0x30 [ 20.281818] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 20.281948] kasan_bitops_generic+0x11c/0x1c8 [ 20.282002] kunit_try_run_case+0x170/0x3f0 [ 20.282053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.285947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.295648] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.303678] The buggy address is located 8 bytes inside of [ 20.303678] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.316020] ret_from_fork+0x10/0x20 [ 20.322718] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 20.327042] kasan_save_stack+0x3c/0x68 [ 20.328924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.330427] ^ [ 20.332177] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.333027] kunit_try_run_case+0x170/0x3f0 [ 20.333249] [ 20.333853] __kasan_kmalloc+0xd4/0xd8 [ 20.334157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.335507] [ 20.335669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.336530] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.337531] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.352809] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.358487] kasan_save_track+0x20/0x40 [ 20.361964] ret_from_fork+0x10/0x20 [ 20.363194] [ 20.363272] The buggy address belongs to the physical page: [ 20.363750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.364514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.364715] [ 20.365109] Memory state around the buggy address: [ 20.365158] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.365453] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.365509] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.365553] ^ [ 20.365835] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.369482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 20.372340] __asan_report_store4_noabort+0x20/0x30 [ 20.373361] kthread+0x328/0x630 [ 20.374986] kthread+0x328/0x630 [ 20.375912] The buggy address belongs to the physical page: [ 20.376453] page_type: f5(slab) [ 20.376693] page dumped because: kasan: bad access detected [ 20.377532] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.377762] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.378854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 20.379574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.380958] print_report+0x118/0x5d0 [ 20.381888] kthread+0x328/0x630 [ 20.382449] kasan_save_alloc_info+0x40/0x58 [ 20.383482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.384700] The buggy address belongs to the physical page: [ 20.384864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.386544] page dumped because: kasan: bad access detected [ 20.386813] [ 20.387300] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.388486] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.389229] ================================================================== [ 20.270828] ================================================================== [ 20.270882] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 20.270934] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.270987] [ 20.271019] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.271101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.271135] Hardware name: linux,dummy-virt (DT) [ 20.271167] Call trace: [ 20.271190] show_stack+0x20/0x38 (C) [ 20.272123] dump_stack_lvl+0x8c/0xd0 [ 20.272220] print_report+0x118/0x5d0 [ 20.272530] kasan_report+0xdc/0x128 [ 20.272751] __asan_report_load8_noabort+0x20/0x30 [ 20.272808] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 20.272864] kasan_bitops_generic+0x11c/0x1c8 [ 20.272914] kunit_try_run_case+0x170/0x3f0 [ 20.272964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.273540] kthread+0x328/0x630 [ 20.273844] ret_from_fork+0x10/0x20 [ 20.273899] [ 20.273920] Allocated by task 263: [ 20.273949] kasan_save_stack+0x3c/0x68 [ 20.273999] kasan_save_track+0x20/0x40 [ 20.274037] kasan_save_alloc_info+0x40/0x58 [ 20.274079] __kasan_kmalloc+0xd4/0xd8 [ 20.274386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.274615] kasan_bitops_generic+0xa0/0x1c8 [ 20.274658] kunit_try_run_case+0x170/0x3f0 [ 20.274698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.274746] kthread+0x328/0x630 [ 20.274784] ret_from_fork+0x10/0x20 [ 20.274821] [ 20.275676] The buggy address is located 8 bytes inside of [ 20.275676] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.276306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.276513] page_type: f5(slab) [ 20.276826] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.277121] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.277273] page dumped because: kasan: bad access detected [ 20.277310] [ 20.277583] Memory state around the buggy address: [ 20.277740] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.277792] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.277980] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.278636] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.278772] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.278815] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 20.175159] ================================================================== [ 20.175353] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.175430] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.175492] [ 20.175617] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.175706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.175745] Hardware name: linux,dummy-virt (DT) [ 20.175842] Call trace: [ 20.175869] show_stack+0x20/0x38 (C) [ 20.175919] dump_stack_lvl+0x8c/0xd0 [ 20.176144] print_report+0x118/0x5d0 [ 20.176232] kasan_report+0xdc/0x128 [ 20.176437] kasan_check_range+0x100/0x1a8 [ 20.176505] __kasan_check_write+0x20/0x30 [ 20.176570] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.176741] kasan_bitops_generic+0x110/0x1c8 [ 20.176789] kunit_try_run_case+0x170/0x3f0 [ 20.176841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.177147] kthread+0x328/0x630 [ 20.177605] ret_from_fork+0x10/0x20 [ 20.177920] [ 20.177991] Allocated by task 263: [ 20.178057] kasan_save_stack+0x3c/0x68 [ 20.178234] kasan_save_track+0x20/0x40 [ 20.178410] kasan_save_alloc_info+0x40/0x58 [ 20.178512] __kasan_kmalloc+0xd4/0xd8 [ 20.178580] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.178623] kasan_bitops_generic+0xa0/0x1c8 [ 20.178984] kunit_try_run_case+0x170/0x3f0 [ 20.179232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.179610] kthread+0x328/0x630 [ 20.179738] ret_from_fork+0x10/0x20 [ 20.179845] [ 20.179969] The buggy address belongs to the object at fff00000c45d8b80 [ 20.179969] which belongs to the cache kmalloc-16 of size 16 [ 20.180161] The buggy address is located 8 bytes inside of [ 20.180161] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.180328] [ 20.180370] The buggy address belongs to the physical page: [ 20.180447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.180579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.180640] page_type: f5(slab) [ 20.180892] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.181339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.181405] page dumped because: kasan: bad access detected [ 20.181526] [ 20.181574] Memory state around the buggy address: [ 20.181667] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.181763] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.181829] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.181948] ^ [ 20.182006] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.182099] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.182143] ================================================================== [ 20.202661] ================================================================== [ 20.202714] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 20.202786] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.203277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.203610] print_report+0x118/0x5d0 [ 20.204095] kasan_bitops_generic+0x110/0x1c8 [ 20.204810] kasan_save_stack+0x3c/0x68 [ 20.205607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.205990] The buggy address is located 8 bytes inside of [ 20.205990] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.206925] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.207015] page dumped because: kasan: bad access detected [ 20.207530] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.207919] ^ [ 20.208072] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.208246] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.210111] ================================================================== [ 20.190003] ================================================================== [ 20.190058] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 20.190111] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.190166] [ 20.190196] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.190296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.190693] Hardware name: linux,dummy-virt (DT) [ 20.190746] Call trace: [ 20.190809] show_stack+0x20/0x38 (C) [ 20.190929] dump_stack_lvl+0x8c/0xd0 [ 20.190982] print_report+0x118/0x5d0 [ 20.191130] kasan_report+0xdc/0x128 [ 20.191189] kasan_check_range+0x100/0x1a8 [ 20.191250] __kasan_check_write+0x20/0x30 [ 20.191583] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 20.191651] kasan_bitops_generic+0x110/0x1c8 [ 20.191703] kunit_try_run_case+0x170/0x3f0 [ 20.191763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.191847] kthread+0x328/0x630 [ 20.191912] ret_from_fork+0x10/0x20 [ 20.191979] [ 20.192054] Allocated by task 263: [ 20.192092] kasan_save_stack+0x3c/0x68 [ 20.192136] kasan_save_track+0x20/0x40 [ 20.192330] kasan_save_alloc_info+0x40/0x58 [ 20.192391] __kasan_kmalloc+0xd4/0xd8 [ 20.192428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.192718] kasan_bitops_generic+0xa0/0x1c8 [ 20.192857] kunit_try_run_case+0x170/0x3f0 [ 20.192922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.192989] kthread+0x328/0x630 [ 20.193035] ret_from_fork+0x10/0x20 [ 20.193291] [ 20.193329] The buggy address belongs to the object at fff00000c45d8b80 [ 20.193329] which belongs to the cache kmalloc-16 of size 16 [ 20.193593] The buggy address is located 8 bytes inside of [ 20.193593] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.193721] [ 20.193779] The buggy address belongs to the physical page: [ 20.193878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.193962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.194162] page_type: f5(slab) [ 20.194219] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.194482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.194558] page dumped because: kasan: bad access detected [ 20.194736] [ 20.194895] Memory state around the buggy address: [ 20.194985] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.195112] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.195183] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.195304] ^ [ 20.196517] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.196574] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.197136] ================================================================== [ 20.160029] ================================================================== [ 20.160091] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.160146] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.160200] [ 20.160252] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.160430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.160477] Hardware name: linux,dummy-virt (DT) [ 20.160511] Call trace: [ 20.160536] show_stack+0x20/0x38 (C) [ 20.160853] dump_stack_lvl+0x8c/0xd0 [ 20.161312] print_report+0x118/0x5d0 [ 20.161397] kasan_report+0xdc/0x128 [ 20.161778] kasan_check_range+0x100/0x1a8 [ 20.161879] __kasan_check_write+0x20/0x30 [ 20.161955] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.162388] kasan_bitops_generic+0x110/0x1c8 [ 20.162570] kunit_try_run_case+0x170/0x3f0 [ 20.162648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.162789] kthread+0x328/0x630 [ 20.162873] ret_from_fork+0x10/0x20 [ 20.163339] [ 20.163415] Allocated by task 263: [ 20.163539] kasan_save_stack+0x3c/0x68 [ 20.163612] kasan_save_track+0x20/0x40 [ 20.163654] kasan_save_alloc_info+0x40/0x58 [ 20.163986] __kasan_kmalloc+0xd4/0xd8 [ 20.164063] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.164222] kasan_bitops_generic+0xa0/0x1c8 [ 20.164283] kunit_try_run_case+0x170/0x3f0 [ 20.164415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.164738] kthread+0x328/0x630 [ 20.164838] ret_from_fork+0x10/0x20 [ 20.164878] [ 20.164900] The buggy address belongs to the object at fff00000c45d8b80 [ 20.164900] which belongs to the cache kmalloc-16 of size 16 [ 20.164964] The buggy address is located 8 bytes inside of [ 20.164964] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.165053] [ 20.165075] The buggy address belongs to the physical page: [ 20.165112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.165176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.165241] page_type: f5(slab) [ 20.165295] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.165689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.165747] page dumped because: kasan: bad access detected [ 20.165782] [ 20.165936] Memory state around the buggy address: [ 20.166134] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.166305] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.166385] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.166509] ^ [ 20.166556] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.166611] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.166756] ================================================================== [ 20.167960] ================================================================== [ 20.168183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.168427] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.168482] [ 20.168678] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.168775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.168824] Hardware name: linux,dummy-virt (DT) [ 20.168883] Call trace: [ 20.168909] show_stack+0x20/0x38 (C) [ 20.168964] dump_stack_lvl+0x8c/0xd0 [ 20.169378] print_report+0x118/0x5d0 [ 20.169496] kasan_report+0xdc/0x128 [ 20.169575] __asan_report_load8_noabort+0x20/0x30 [ 20.169718] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.169795] kasan_bitops_generic+0x110/0x1c8 [ 20.169984] kunit_try_run_case+0x170/0x3f0 [ 20.170060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.170119] kthread+0x328/0x630 [ 20.170486] ret_from_fork+0x10/0x20 [ 20.170576] [ 20.170685] Allocated by task 263: [ 20.170767] kasan_save_stack+0x3c/0x68 [ 20.170871] kasan_save_track+0x20/0x40 [ 20.170912] kasan_save_alloc_info+0x40/0x58 [ 20.170953] __kasan_kmalloc+0xd4/0xd8 [ 20.170990] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.171029] kasan_bitops_generic+0xa0/0x1c8 [ 20.171079] kunit_try_run_case+0x170/0x3f0 [ 20.171129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.171188] kthread+0x328/0x630 [ 20.171238] ret_from_fork+0x10/0x20 [ 20.171287] [ 20.171332] The buggy address belongs to the object at fff00000c45d8b80 [ 20.171332] which belongs to the cache kmalloc-16 of size 16 [ 20.171431] The buggy address is located 8 bytes inside of [ 20.171431] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.171499] [ 20.171529] The buggy address belongs to the physical page: [ 20.171569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.171624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.171684] page_type: f5(slab) [ 20.171724] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.171780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.171835] page dumped because: kasan: bad access detected [ 20.171869] [ 20.171890] Memory state around the buggy address: [ 20.171934] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.171989] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.172045] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.172097] ^ [ 20.172128] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.172173] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.172250] ================================================================== [ 20.183876] ================================================================== [ 20.183941] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.184304] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.184375] [ 20.184425] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.184517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.184659] Hardware name: linux,dummy-virt (DT) [ 20.184787] Call trace: [ 20.184906] show_stack+0x20/0x38 (C) [ 20.184966] dump_stack_lvl+0x8c/0xd0 [ 20.185050] print_report+0x118/0x5d0 [ 20.185100] kasan_report+0xdc/0x128 [ 20.185148] __asan_report_load8_noabort+0x20/0x30 [ 20.185223] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.185278] kasan_bitops_generic+0x110/0x1c8 [ 20.185325] kunit_try_run_case+0x170/0x3f0 [ 20.185386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.185451] kthread+0x328/0x630 [ 20.185497] ret_from_fork+0x10/0x20 [ 20.185548] [ 20.185569] Allocated by task 263: [ 20.185598] kasan_save_stack+0x3c/0x68 [ 20.185648] kasan_save_track+0x20/0x40 [ 20.185686] kasan_save_alloc_info+0x40/0x58 [ 20.185727] __kasan_kmalloc+0xd4/0xd8 [ 20.185770] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.185809] kasan_bitops_generic+0xa0/0x1c8 [ 20.185854] kunit_try_run_case+0x170/0x3f0 [ 20.185905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.185951] kthread+0x328/0x630 [ 20.185997] ret_from_fork+0x10/0x20 [ 20.186046] [ 20.186069] The buggy address belongs to the object at fff00000c45d8b80 [ 20.186069] which belongs to the cache kmalloc-16 of size 16 [ 20.186140] The buggy address is located 8 bytes inside of [ 20.186140] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.186405] [ 20.186818] The buggy address belongs to the physical page: [ 20.186864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.186921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.187201] page_type: f5(slab) [ 20.187609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.187674] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.188016] page dumped because: kasan: bad access detected [ 20.188134] [ 20.188174] Memory state around the buggy address: [ 20.188288] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.188601] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.188776] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.188851] ^ [ 20.188966] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.189036] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.189314] ================================================================== [ 20.198253] ================================================================== [ 20.198337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 20.198472] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.198531] [ 20.198564] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.198690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.198721] Hardware name: linux,dummy-virt (DT) [ 20.198752] Call trace: [ 20.198788] show_stack+0x20/0x38 (C) [ 20.198840] dump_stack_lvl+0x8c/0xd0 [ 20.198891] print_report+0x118/0x5d0 [ 20.198943] kasan_report+0xdc/0x128 [ 20.199001] kasan_check_range+0x100/0x1a8 [ 20.199061] __kasan_check_write+0x20/0x30 [ 20.199111] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 20.199172] kasan_bitops_generic+0x110/0x1c8 [ 20.199232] kunit_try_run_case+0x170/0x3f0 [ 20.199282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.199353] kthread+0x328/0x630 [ 20.199430] ret_from_fork+0x10/0x20 [ 20.199482] [ 20.199502] Allocated by task 263: [ 20.199531] kasan_save_stack+0x3c/0x68 [ 20.199570] kasan_save_track+0x20/0x40 [ 20.199609] kasan_save_alloc_info+0x40/0x58 [ 20.199649] __kasan_kmalloc+0xd4/0xd8 [ 20.199685] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.199735] kasan_bitops_generic+0xa0/0x1c8 [ 20.199787] kunit_try_run_case+0x170/0x3f0 [ 20.199830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.199877] kthread+0x328/0x630 [ 20.199918] ret_from_fork+0x10/0x20 [ 20.199957] [ 20.199978] The buggy address belongs to the object at fff00000c45d8b80 [ 20.199978] which belongs to the cache kmalloc-16 of size 16 [ 20.200038] The buggy address is located 8 bytes inside of [ 20.200038] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.200102] [ 20.200138] The buggy address belongs to the physical page: [ 20.200173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.200240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.200541] page_type: f5(slab) [ 20.200601] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.200657] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.200702] page dumped because: kasan: bad access detected [ 20.200737] [ 20.201373] Memory state around the buggy address: [ 20.201440] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.201524] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.201756] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.201805] ^ [ 20.201976] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.202060] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.202188] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 20.146906] ================================================================== [ 20.146966] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 20.147016] Read of size 1 at addr fff00000c59caad0 by task kunit_try_catch/261 [ 20.147068] [ 20.147491] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.147806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.147879] Hardware name: linux,dummy-virt (DT) [ 20.147916] Call trace: [ 20.148079] show_stack+0x20/0x38 (C) [ 20.148143] dump_stack_lvl+0x8c/0xd0 [ 20.148195] print_report+0x118/0x5d0 [ 20.148504] kasan_report+0xdc/0x128 [ 20.148596] __asan_report_load1_noabort+0x20/0x30 [ 20.148732] strnlen+0x80/0x88 [ 20.148799] kasan_strings+0x478/0xb00 [ 20.148861] kunit_try_run_case+0x170/0x3f0 [ 20.148921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.148978] kthread+0x328/0x630 [ 20.149027] ret_from_fork+0x10/0x20 [ 20.149319] [ 20.149487] Allocated by task 261: [ 20.149789] kasan_save_stack+0x3c/0x68 [ 20.149857] kasan_save_track+0x20/0x40 [ 20.149987] kasan_save_alloc_info+0x40/0x58 [ 20.150066] __kasan_kmalloc+0xd4/0xd8 [ 20.150225] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.150291] kasan_strings+0xc8/0xb00 [ 20.150585] kunit_try_run_case+0x170/0x3f0 [ 20.150801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.150880] kthread+0x328/0x630 [ 20.150971] ret_from_fork+0x10/0x20 [ 20.151013] [ 20.151035] Freed by task 261: [ 20.151064] kasan_save_stack+0x3c/0x68 [ 20.151103] kasan_save_track+0x20/0x40 [ 20.151152] kasan_save_free_info+0x4c/0x78 [ 20.151199] __kasan_slab_free+0x6c/0x98 [ 20.151249] kfree+0x214/0x3c8 [ 20.151296] kasan_strings+0x24c/0xb00 [ 20.151335] kunit_try_run_case+0x170/0x3f0 [ 20.151377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.151433] kthread+0x328/0x630 [ 20.151479] ret_from_fork+0x10/0x20 [ 20.151532] [ 20.151554] The buggy address belongs to the object at fff00000c59caac0 [ 20.151554] which belongs to the cache kmalloc-32 of size 32 [ 20.151617] The buggy address is located 16 bytes inside of [ 20.151617] freed 32-byte region [fff00000c59caac0, fff00000c59caae0) [ 20.151689] [ 20.151736] The buggy address belongs to the physical page: [ 20.151789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca [ 20.151844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.151894] page_type: f5(slab) [ 20.151944] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.152006] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.152059] page dumped because: kasan: bad access detected [ 20.152094] [ 20.152124] Memory state around the buggy address: [ 20.152159] fff00000c59ca980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.152217] fff00000c59caa00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.152272] >fff00000c59caa80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.152314] ^ [ 20.152367] fff00000c59cab00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.152427] fff00000c59cab80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.152467] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 20.138359] ================================================================== [ 20.138434] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 20.138483] Read of size 1 at addr fff00000c59caad0 by task kunit_try_catch/261 [ 20.138698] [ 20.138872] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.138970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.139027] Hardware name: linux,dummy-virt (DT) [ 20.139100] Call trace: [ 20.139126] show_stack+0x20/0x38 (C) [ 20.139178] dump_stack_lvl+0x8c/0xd0 [ 20.139240] print_report+0x118/0x5d0 [ 20.139288] kasan_report+0xdc/0x128 [ 20.139335] __asan_report_load1_noabort+0x20/0x30 [ 20.139402] strlen+0xa8/0xb0 [ 20.139459] kasan_strings+0x418/0xb00 [ 20.139510] kunit_try_run_case+0x170/0x3f0 [ 20.139563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.139619] kthread+0x328/0x630 [ 20.139675] ret_from_fork+0x10/0x20 [ 20.139726] [ 20.139761] Allocated by task 261: [ 20.139800] kasan_save_stack+0x3c/0x68 [ 20.139843] kasan_save_track+0x20/0x40 [ 20.139881] kasan_save_alloc_info+0x40/0x58 [ 20.139924] __kasan_kmalloc+0xd4/0xd8 [ 20.139970] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.140011] kasan_strings+0xc8/0xb00 [ 20.140052] kunit_try_run_case+0x170/0x3f0 [ 20.140093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.140140] kthread+0x328/0x630 [ 20.140184] ret_from_fork+0x10/0x20 [ 20.140453] [ 20.140479] Freed by task 261: [ 20.140508] kasan_save_stack+0x3c/0x68 [ 20.140715] kasan_save_track+0x20/0x40 [ 20.141068] kasan_save_free_info+0x4c/0x78 [ 20.141180] __kasan_slab_free+0x6c/0x98 [ 20.141404] kfree+0x214/0x3c8 [ 20.141755] kasan_strings+0x24c/0xb00 [ 20.141810] kunit_try_run_case+0x170/0x3f0 [ 20.141853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.142245] kthread+0x328/0x630 [ 20.142799] ret_from_fork+0x10/0x20 [ 20.143185] [ 20.143242] The buggy address belongs to the object at fff00000c59caac0 [ 20.143242] which belongs to the cache kmalloc-32 of size 32 [ 20.143401] The buggy address is located 16 bytes inside of [ 20.143401] freed 32-byte region [fff00000c59caac0, fff00000c59caae0) [ 20.143716] [ 20.143883] The buggy address belongs to the physical page: [ 20.144014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca [ 20.144086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.144158] page_type: f5(slab) [ 20.144199] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.144531] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.144670] page dumped because: kasan: bad access detected [ 20.144747] [ 20.144780] Memory state around the buggy address: [ 20.145103] fff00000c59ca980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.145190] fff00000c59caa00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.145251] >fff00000c59caa80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.145565] ^ [ 20.145668] fff00000c59cab00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.145752] fff00000c59cab80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.145796] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 20.129168] ================================================================== [ 20.129237] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 20.129296] Read of size 1 at addr fff00000c59caad0 by task kunit_try_catch/261 [ 20.129538] [ 20.129576] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.129869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.129983] Hardware name: linux,dummy-virt (DT) [ 20.130029] Call trace: [ 20.130071] show_stack+0x20/0x38 (C) [ 20.130182] dump_stack_lvl+0x8c/0xd0 [ 20.130279] print_report+0x118/0x5d0 [ 20.130423] kasan_report+0xdc/0x128 [ 20.130489] __asan_report_load1_noabort+0x20/0x30 [ 20.130569] kasan_strings+0x95c/0xb00 [ 20.130953] kunit_try_run_case+0x170/0x3f0 [ 20.131068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.131164] kthread+0x328/0x630 [ 20.131332] ret_from_fork+0x10/0x20 [ 20.131442] [ 20.131601] Allocated by task 261: [ 20.131633] kasan_save_stack+0x3c/0x68 [ 20.131705] kasan_save_track+0x20/0x40 [ 20.132050] kasan_save_alloc_info+0x40/0x58 [ 20.132121] __kasan_kmalloc+0xd4/0xd8 [ 20.132249] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.132326] kasan_strings+0xc8/0xb00 [ 20.132384] kunit_try_run_case+0x170/0x3f0 [ 20.132685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.132771] kthread+0x328/0x630 [ 20.133097] ret_from_fork+0x10/0x20 [ 20.133173] [ 20.133396] Freed by task 261: [ 20.133541] kasan_save_stack+0x3c/0x68 [ 20.133614] kasan_save_track+0x20/0x40 [ 20.133715] kasan_save_free_info+0x4c/0x78 [ 20.133774] __kasan_slab_free+0x6c/0x98 [ 20.133814] kfree+0x214/0x3c8 [ 20.133849] kasan_strings+0x24c/0xb00 [ 20.133889] kunit_try_run_case+0x170/0x3f0 [ 20.133930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.133978] kthread+0x328/0x630 [ 20.134016] ret_from_fork+0x10/0x20 [ 20.134234] [ 20.134390] The buggy address belongs to the object at fff00000c59caac0 [ 20.134390] which belongs to the cache kmalloc-32 of size 32 [ 20.134543] The buggy address is located 16 bytes inside of [ 20.134543] freed 32-byte region [fff00000c59caac0, fff00000c59caae0) [ 20.134637] [ 20.134734] The buggy address belongs to the physical page: [ 20.134804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca [ 20.134968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.135058] page_type: f5(slab) [ 20.135100] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.135167] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.135367] page dumped because: kasan: bad access detected [ 20.135622] [ 20.135692] Memory state around the buggy address: [ 20.135759] fff00000c59ca980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.135914] fff00000c59caa00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.135981] >fff00000c59caa80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.136024] ^ [ 20.136073] fff00000c59cab00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.136489] fff00000c59cab80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.136551] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 20.119253] ================================================================== [ 20.119312] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 20.119366] Read of size 1 at addr fff00000c59caad0 by task kunit_try_catch/261 [ 20.119678] [ 20.119887] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.120118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.120496] Hardware name: linux,dummy-virt (DT) [ 20.120576] Call trace: [ 20.120651] show_stack+0x20/0x38 (C) [ 20.120729] dump_stack_lvl+0x8c/0xd0 [ 20.120795] print_report+0x118/0x5d0 [ 20.120850] kasan_report+0xdc/0x128 [ 20.120897] __asan_report_load1_noabort+0x20/0x30 [ 20.120950] strcmp+0xc0/0xc8 [ 20.120995] kasan_strings+0x340/0xb00 [ 20.121042] kunit_try_run_case+0x170/0x3f0 [ 20.121391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.121508] kthread+0x328/0x630 [ 20.122305] ret_from_fork+0x10/0x20 [ 20.122555] [ 20.122579] Allocated by task 261: [ 20.122732] kasan_save_stack+0x3c/0x68 [ 20.123088] kasan_save_track+0x20/0x40 [ 20.123311] kasan_save_alloc_info+0x40/0x58 [ 20.123428] __kasan_kmalloc+0xd4/0xd8 [ 20.123535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.123679] kasan_strings+0xc8/0xb00 [ 20.123734] kunit_try_run_case+0x170/0x3f0 [ 20.123786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.124098] kthread+0x328/0x630 [ 20.124171] ret_from_fork+0x10/0x20 [ 20.124302] [ 20.124364] Freed by task 261: [ 20.124421] kasan_save_stack+0x3c/0x68 [ 20.124465] kasan_save_track+0x20/0x40 [ 20.124824] kasan_save_free_info+0x4c/0x78 [ 20.124896] __kasan_slab_free+0x6c/0x98 [ 20.125040] kfree+0x214/0x3c8 [ 20.125096] kasan_strings+0x24c/0xb00 [ 20.125303] kunit_try_run_case+0x170/0x3f0 [ 20.125515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.125610] kthread+0x328/0x630 [ 20.125701] ret_from_fork+0x10/0x20 [ 20.125759] [ 20.125797] The buggy address belongs to the object at fff00000c59caac0 [ 20.125797] which belongs to the cache kmalloc-32 of size 32 [ 20.125905] The buggy address is located 16 bytes inside of [ 20.125905] freed 32-byte region [fff00000c59caac0, fff00000c59caae0) [ 20.125972] [ 20.125994] The buggy address belongs to the physical page: [ 20.126327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca [ 20.126426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.126643] page_type: f5(slab) [ 20.126827] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.126912] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.126986] page dumped because: kasan: bad access detected [ 20.127268] [ 20.127304] Memory state around the buggy address: [ 20.127502] fff00000c59ca980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.127679] fff00000c59caa00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.127813] >fff00000c59caa80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.127876] ^ [ 20.127987] fff00000c59cab00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.128039] fff00000c59cab80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.128106] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 20.099531] ================================================================== [ 20.099596] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 20.099735] Read of size 1 at addr fff00000c59ca918 by task kunit_try_catch/259 [ 20.099796] [ 20.099832] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.100316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.100360] Hardware name: linux,dummy-virt (DT) [ 20.100394] Call trace: [ 20.100468] show_stack+0x20/0x38 (C) [ 20.100555] dump_stack_lvl+0x8c/0xd0 [ 20.100608] print_report+0x118/0x5d0 [ 20.100808] kasan_report+0xdc/0x128 [ 20.101014] __asan_report_load1_noabort+0x20/0x30 [ 20.101122] memcmp+0x198/0x1d8 [ 20.101172] kasan_memcmp+0x16c/0x300 [ 20.101236] kunit_try_run_case+0x170/0x3f0 [ 20.101287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.101695] kthread+0x328/0x630 [ 20.101760] ret_from_fork+0x10/0x20 [ 20.101811] [ 20.101832] Allocated by task 259: [ 20.102339] kasan_save_stack+0x3c/0x68 [ 20.102461] kasan_save_track+0x20/0x40 [ 20.102551] kasan_save_alloc_info+0x40/0x58 [ 20.102641] __kasan_kmalloc+0xd4/0xd8 [ 20.102771] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.102838] kasan_memcmp+0xbc/0x300 [ 20.103030] kunit_try_run_case+0x170/0x3f0 [ 20.103261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.103401] kthread+0x328/0x630 [ 20.103534] ret_from_fork+0x10/0x20 [ 20.103658] [ 20.103690] The buggy address belongs to the object at fff00000c59ca900 [ 20.103690] which belongs to the cache kmalloc-32 of size 32 [ 20.103794] The buggy address is located 0 bytes to the right of [ 20.103794] allocated 24-byte region [fff00000c59ca900, fff00000c59ca918) [ 20.104356] [ 20.104415] The buggy address belongs to the physical page: [ 20.104510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca [ 20.104610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.104675] page_type: f5(slab) [ 20.104733] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.104789] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.104844] page dumped because: kasan: bad access detected [ 20.104887] [ 20.104914] Memory state around the buggy address: [ 20.104958] fff00000c59ca800: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 20.105014] fff00000c59ca880: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.105061] >fff00000c59ca900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.105106] ^ [ 20.105139] fff00000c59ca980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.105185] fff00000c59caa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.105236] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 20.075873] ================================================================== [ 20.075934] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 20.075991] Read of size 1 at addr ffff8000809d7b4a by task kunit_try_catch/255 [ 20.076052] [ 20.076084] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.076186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.076232] Hardware name: linux,dummy-virt (DT) [ 20.076265] Call trace: [ 20.076288] show_stack+0x20/0x38 (C) [ 20.076799] dump_stack_lvl+0x8c/0xd0 [ 20.076902] print_report+0x310/0x5d0 [ 20.077012] kasan_report+0xdc/0x128 [ 20.077065] __asan_report_load1_noabort+0x20/0x30 [ 20.077145] kasan_alloca_oob_right+0x2dc/0x340 [ 20.077273] kunit_try_run_case+0x170/0x3f0 [ 20.077403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.077480] kthread+0x328/0x630 [ 20.077599] ret_from_fork+0x10/0x20 [ 20.077651] [ 20.077697] The buggy address belongs to stack of task kunit_try_catch/255 [ 20.077763] [ 20.077783] The buggy address ffff8000809d7b4a belongs to a vmalloc virtual mapping [ 20.078007] The buggy address belongs to the physical page: [ 20.078080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106627 [ 20.078186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.078296] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.078435] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.078504] page dumped because: kasan: bad access detected [ 20.078616] [ 20.078655] Memory state around the buggy address: [ 20.078741] ffff8000809d7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.078795] ffff8000809d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.079051] >ffff8000809d7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 20.079128] ^ [ 20.079229] ffff8000809d7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.079301] ffff8000809d7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.079531] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 20.064600] ================================================================== [ 20.064743] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 20.064806] Read of size 1 at addr ffff8000809d7b5f by task kunit_try_catch/253 [ 20.064858] [ 20.064968] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.065435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.065632] Hardware name: linux,dummy-virt (DT) [ 20.065671] Call trace: [ 20.065958] show_stack+0x20/0x38 (C) [ 20.066094] dump_stack_lvl+0x8c/0xd0 [ 20.066161] print_report+0x310/0x5d0 [ 20.066301] kasan_report+0xdc/0x128 [ 20.066400] __asan_report_load1_noabort+0x20/0x30 [ 20.066498] kasan_alloca_oob_left+0x2b8/0x310 [ 20.066669] kunit_try_run_case+0x170/0x3f0 [ 20.066742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.066956] kthread+0x328/0x630 [ 20.067114] ret_from_fork+0x10/0x20 [ 20.067337] [ 20.067408] The buggy address belongs to stack of task kunit_try_catch/253 [ 20.067510] [ 20.067680] The buggy address ffff8000809d7b5f belongs to a vmalloc virtual mapping [ 20.067849] The buggy address belongs to the physical page: [ 20.067906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106627 [ 20.068039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.068136] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.068455] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.068543] page dumped because: kasan: bad access detected [ 20.068673] [ 20.068714] Memory state around the buggy address: [ 20.068792] ffff8000809d7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.068901] ffff8000809d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.069015] >ffff8000809d7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 20.069067] ^ [ 20.069304] ffff8000809d7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.069609] ffff8000809d7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.069774] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 20.049103] ================================================================== [ 20.049297] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 20.049388] Read of size 1 at addr ffff8000809d7c2a by task kunit_try_catch/251 [ 20.049441] [ 20.049628] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.049817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.049898] Hardware name: linux,dummy-virt (DT) [ 20.050052] Call trace: [ 20.050131] show_stack+0x20/0x38 (C) [ 20.050213] dump_stack_lvl+0x8c/0xd0 [ 20.050288] print_report+0x310/0x5d0 [ 20.050570] kasan_report+0xdc/0x128 [ 20.050744] __asan_report_load1_noabort+0x20/0x30 [ 20.050822] kasan_stack_oob+0x238/0x270 [ 20.050925] kunit_try_run_case+0x170/0x3f0 [ 20.050996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.051300] kthread+0x328/0x630 [ 20.051438] ret_from_fork+0x10/0x20 [ 20.051559] [ 20.051699] The buggy address belongs to stack of task kunit_try_catch/251 [ 20.052090] and is located at offset 138 in frame: [ 20.052251] kasan_stack_oob+0x0/0x270 [ 20.054673] [ 20.054876] This frame has 4 objects: [ 20.055278] [48, 49) '__assertion' [ 20.055328] [64, 72) 'array' [ 20.055361] [96, 112) '__assertion' [ 20.055631] [128, 138) 'stack_array' [ 20.055803] [ 20.055866] The buggy address ffff8000809d7c2a belongs to a vmalloc virtual mapping [ 20.055988] The buggy address belongs to the physical page: [ 20.056036] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106627 [ 20.056094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.056526] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.056641] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.056730] page dumped because: kasan: bad access detected [ 20.056788] [ 20.056941] Memory state around the buggy address: [ 20.057082] ffff8000809d7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.057150] ffff8000809d7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 20.057254] >ffff8000809d7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 20.057324] ^ [ 20.057473] ffff8000809d7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 20.057553] ffff8000809d7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.057769] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 20.028930] ================================================================== [ 20.028999] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 20.029059] Read of size 1 at addr ffff977f49c035ad by task kunit_try_catch/247 [ 20.029112] [ 20.029169] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.029273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.029302] Hardware name: linux,dummy-virt (DT) [ 20.029333] Call trace: [ 20.029353] show_stack+0x20/0x38 (C) [ 20.029403] dump_stack_lvl+0x8c/0xd0 [ 20.029451] print_report+0x310/0x5d0 [ 20.029496] kasan_report+0xdc/0x128 [ 20.029541] __asan_report_load1_noabort+0x20/0x30 [ 20.029624] kasan_global_oob_right+0x230/0x270 [ 20.030185] kunit_try_run_case+0x170/0x3f0 [ 20.030396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.030453] kthread+0x328/0x630 [ 20.030821] ret_from_fork+0x10/0x20 [ 20.030977] [ 20.031116] The buggy address belongs to the variable: [ 20.031293] global_array+0xd/0x40 [ 20.031362] [ 20.031468] The buggy address ffff977f49c035ad belongs to a vmalloc virtual mapping [ 20.031667] The buggy address belongs to the physical page: [ 20.031723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c03 [ 20.031789] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 20.031857] raw: 03fffe0000002000 ffffc1ffc01f00c8 ffffc1ffc01f00c8 0000000000000000 [ 20.031908] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.031949] page dumped because: kasan: bad access detected [ 20.031982] [ 20.032000] Memory state around the buggy address: [ 20.032040] ffff977f49c03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.032085] ffff977f49c03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 20.032134] >ffff977f49c03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 20.032174] ^ [ 20.032224] ffff977f49c03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 20.032268] ffff977f49c03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.032307] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 19.997109] ================================================================== [ 19.997504] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.997721] Free of addr fff00000c59cb201 by task kunit_try_catch/243 [ 19.997765] [ 19.998247] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.998409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.998577] Hardware name: linux,dummy-virt (DT) [ 19.998613] Call trace: [ 19.998636] show_stack+0x20/0x38 (C) [ 19.998691] dump_stack_lvl+0x8c/0xd0 [ 19.998747] print_report+0x118/0x5d0 [ 19.998792] kasan_report_invalid_free+0xc0/0xe8 [ 19.998842] check_slab_allocation+0xfc/0x108 [ 19.998895] __kasan_mempool_poison_object+0x78/0x150 [ 19.998947] mempool_free+0x28c/0x328 [ 19.999004] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.999074] mempool_kmalloc_invalid_free+0xc0/0x118 [ 19.999141] kunit_try_run_case+0x170/0x3f0 [ 19.999191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.999259] kthread+0x328/0x630 [ 19.999305] ret_from_fork+0x10/0x20 [ 19.999353] [ 19.999387] Allocated by task 243: [ 19.999423] kasan_save_stack+0x3c/0x68 [ 19.999480] kasan_save_track+0x20/0x40 [ 19.999516] kasan_save_alloc_info+0x40/0x58 [ 19.999564] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.999617] remove_element+0x130/0x1f8 [ 19.999668] mempool_alloc_preallocated+0x58/0xc0 [ 19.999720] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 19.999766] mempool_kmalloc_invalid_free+0xc0/0x118 [ 19.999807] kunit_try_run_case+0x170/0x3f0 [ 19.999853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.999899] kthread+0x328/0x630 [ 19.999953] ret_from_fork+0x10/0x20 [ 19.999988] [ 20.000006] The buggy address belongs to the object at fff00000c59cb200 [ 20.000006] which belongs to the cache kmalloc-128 of size 128 [ 20.000066] The buggy address is located 1 bytes inside of [ 20.000066] 128-byte region [fff00000c59cb200, fff00000c59cb280) [ 20.000129] [ 20.000149] The buggy address belongs to the physical page: [ 20.000610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 20.000689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.001038] page_type: f5(slab) [ 20.001172] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.001259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.001488] page dumped because: kasan: bad access detected [ 20.001663] [ 20.001722] Memory state around the buggy address: [ 20.001826] fff00000c59cb100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.002021] fff00000c59cb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.002079] >fff00000c59cb200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.002363] ^ [ 20.002445] fff00000c59cb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.002744] fff00000c59cb300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.002914] ================================================================== [ 20.010921] ================================================================== [ 20.011159] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.011433] Free of addr fff00000c793c001 by task kunit_try_catch/245 [ 20.011499] [ 20.011883] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.011991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.012348] Hardware name: linux,dummy-virt (DT) [ 20.012438] Call trace: [ 20.012462] show_stack+0x20/0x38 (C) [ 20.012526] dump_stack_lvl+0x8c/0xd0 [ 20.012632] print_report+0x118/0x5d0 [ 20.012696] kasan_report_invalid_free+0xc0/0xe8 [ 20.012758] __kasan_mempool_poison_object+0xfc/0x150 [ 20.013052] mempool_free+0x28c/0x328 [ 20.013145] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.013216] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 20.013271] kunit_try_run_case+0x170/0x3f0 [ 20.013325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.013379] kthread+0x328/0x630 [ 20.013674] ret_from_fork+0x10/0x20 [ 20.013863] [ 20.013969] The buggy address belongs to the physical page: [ 20.014028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793c [ 20.014159] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.014240] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.014295] page_type: f8(unknown) [ 20.014510] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.014737] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.014854] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.014925] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.014992] head: 0bfffe0000000002 ffffc1ffc31e4f01 00000000ffffffff 00000000ffffffff [ 20.015416] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.015513] page dumped because: kasan: bad access detected [ 20.015813] [ 20.015857] Memory state around the buggy address: [ 20.015948] fff00000c793bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.016013] fff00000c793bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.016090] >fff00000c793c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.016476] ^ [ 20.016521] fff00000c793c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.016582] fff00000c793c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.016902] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 19.933026] ================================================================== [ 19.934252] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.934416] Free of addr fff00000c59e4e00 by task kunit_try_catch/237 [ 19.934467] [ 19.934499] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.934582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.935388] Hardware name: linux,dummy-virt (DT) [ 19.935821] Call trace: [ 19.935999] show_stack+0x20/0x38 (C) [ 19.936434] dump_stack_lvl+0x8c/0xd0 [ 19.936896] print_report+0x118/0x5d0 [ 19.936953] kasan_report_invalid_free+0xc0/0xe8 [ 19.937004] check_slab_allocation+0xd4/0x108 [ 19.937903] __kasan_mempool_poison_object+0x78/0x150 [ 19.937968] mempool_free+0x28c/0x328 [ 19.938545] mempool_double_free_helper+0x150/0x2e8 [ 19.939176] mempool_kmalloc_double_free+0xc0/0x118 [ 19.939505] kunit_try_run_case+0x170/0x3f0 [ 19.940064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.940567] kthread+0x328/0x630 [ 19.940921] ret_from_fork+0x10/0x20 [ 19.941221] [ 19.941240] Allocated by task 237: [ 19.941272] kasan_save_stack+0x3c/0x68 [ 19.942169] kasan_save_track+0x20/0x40 [ 19.942393] kasan_save_alloc_info+0x40/0x58 [ 19.942436] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.942480] remove_element+0x130/0x1f8 [ 19.943125] mempool_alloc_preallocated+0x58/0xc0 [ 19.943459] mempool_double_free_helper+0x94/0x2e8 [ 19.943998] mempool_kmalloc_double_free+0xc0/0x118 [ 19.944466] kunit_try_run_case+0x170/0x3f0 [ 19.944518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.945194] kthread+0x328/0x630 [ 19.945909] ret_from_fork+0x10/0x20 [ 19.946014] [ 19.946037] Freed by task 237: [ 19.946399] kasan_save_stack+0x3c/0x68 [ 19.946730] kasan_save_track+0x20/0x40 [ 19.946947] kasan_save_free_info+0x4c/0x78 [ 19.947808] __kasan_mempool_poison_object+0xc0/0x150 [ 19.948511] mempool_free+0x28c/0x328 [ 19.948747] mempool_double_free_helper+0x100/0x2e8 [ 19.948839] mempool_kmalloc_double_free+0xc0/0x118 [ 19.949038] kunit_try_run_case+0x170/0x3f0 [ 19.949078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.949879] kthread+0x328/0x630 [ 19.950033] ret_from_fork+0x10/0x20 [ 19.950088] [ 19.950110] The buggy address belongs to the object at fff00000c59e4e00 [ 19.950110] which belongs to the cache kmalloc-128 of size 128 [ 19.951175] The buggy address is located 0 bytes inside of [ 19.951175] 128-byte region [fff00000c59e4e00, fff00000c59e4e80) [ 19.951507] [ 19.951543] The buggy address belongs to the physical page: [ 19.951614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 19.951671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.951722] page_type: f5(slab) [ 19.952976] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.953967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.954328] page dumped because: kasan: bad access detected [ 19.954435] [ 19.954821] Memory state around the buggy address: [ 19.955047] fff00000c59e4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.955540] fff00000c59e4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.956200] >fff00000c59e4e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.956363] ^ [ 19.956752] fff00000c59e4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.958078] fff00000c59e4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.958633] ================================================================== [ 19.973039] ================================================================== [ 19.973099] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.973166] Free of addr fff00000c7938000 by task kunit_try_catch/239 [ 19.973630] [ 19.973963] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.974476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.974581] Hardware name: linux,dummy-virt (DT) [ 19.974679] Call trace: [ 19.974892] show_stack+0x20/0x38 (C) [ 19.974976] dump_stack_lvl+0x8c/0xd0 [ 19.975153] print_report+0x118/0x5d0 [ 19.975221] kasan_report_invalid_free+0xc0/0xe8 [ 19.975411] __kasan_mempool_poison_object+0x14c/0x150 [ 19.975610] mempool_free+0x28c/0x328 [ 19.975681] mempool_double_free_helper+0x150/0x2e8 [ 19.975974] mempool_kmalloc_large_double_free+0xc0/0x118 [ 19.976315] kunit_try_run_case+0x170/0x3f0 [ 19.976662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.976797] kthread+0x328/0x630 [ 19.976893] ret_from_fork+0x10/0x20 [ 19.977348] [ 19.977440] The buggy address belongs to the physical page: [ 19.977529] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107938 [ 19.977854] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.978022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.978218] page_type: f8(unknown) [ 19.978262] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.978624] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.978724] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.978797] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.979024] head: 0bfffe0000000002 ffffc1ffc31e4e01 00000000ffffffff 00000000ffffffff [ 19.979238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.979375] page dumped because: kasan: bad access detected [ 19.979460] [ 19.979487] Memory state around the buggy address: [ 19.979806] fff00000c7937f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.979887] fff00000c7937f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.980045] >fff00000c7938000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.980098] ^ [ 19.980151] fff00000c7938080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.980454] fff00000c7938100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.980618] ================================================================== [ 19.987098] ================================================================== [ 19.987156] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.987224] Free of addr fff00000c793c000 by task kunit_try_catch/241 [ 19.987319] [ 19.987353] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.987581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.987701] Hardware name: linux,dummy-virt (DT) [ 19.987739] Call trace: [ 19.987849] show_stack+0x20/0x38 (C) [ 19.987914] dump_stack_lvl+0x8c/0xd0 [ 19.987963] print_report+0x118/0x5d0 [ 19.988238] kasan_report_invalid_free+0xc0/0xe8 [ 19.988375] __kasan_mempool_poison_pages+0xe0/0xe8 [ 19.988443] mempool_free+0x24c/0x328 [ 19.988531] mempool_double_free_helper+0x150/0x2e8 [ 19.988585] mempool_page_alloc_double_free+0xbc/0x118 [ 19.988636] kunit_try_run_case+0x170/0x3f0 [ 19.988894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.988960] kthread+0x328/0x630 [ 19.989008] ret_from_fork+0x10/0x20 [ 19.989053] [ 19.989073] The buggy address belongs to the physical page: [ 19.989104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793c [ 19.989159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.989232] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.989283] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.989401] page dumped because: kasan: bad access detected [ 19.989441] [ 19.989459] Memory state around the buggy address: [ 19.989492] fff00000c793bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.989536] fff00000c793bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.989580] >fff00000c793c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.989646] ^ [ 19.989675] fff00000c793c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.989717] fff00000c793c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.989757] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 19.917614] ================================================================== [ 19.917678] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.917983] Read of size 1 at addr fff00000c7938000 by task kunit_try_catch/235 [ 19.918116] [ 19.918162] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.918391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.918421] Hardware name: linux,dummy-virt (DT) [ 19.918622] Call trace: [ 19.918797] show_stack+0x20/0x38 (C) [ 19.918913] dump_stack_lvl+0x8c/0xd0 [ 19.919086] print_report+0x118/0x5d0 [ 19.919194] kasan_report+0xdc/0x128 [ 19.919255] __asan_report_load1_noabort+0x20/0x30 [ 19.919330] mempool_uaf_helper+0x314/0x340 [ 19.919751] mempool_page_alloc_uaf+0xc0/0x118 [ 19.919815] kunit_try_run_case+0x170/0x3f0 [ 19.920087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.920289] kthread+0x328/0x630 [ 19.920393] ret_from_fork+0x10/0x20 [ 19.920471] [ 19.920663] The buggy address belongs to the physical page: [ 19.920705] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107938 [ 19.920762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.920967] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.921043] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.921130] page dumped because: kasan: bad access detected [ 19.921164] [ 19.921183] Memory state around the buggy address: [ 19.921235] fff00000c7937f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.921290] fff00000c7937f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.921659] >fff00000c7938000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.921716] ^ [ 19.921745] fff00000c7938080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.921924] fff00000c7938100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.922181] ================================================================== [ 19.879020] ================================================================== [ 19.879358] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.879548] Read of size 1 at addr fff00000c7938000 by task kunit_try_catch/231 [ 19.879622] [ 19.879687] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.880083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.880229] Hardware name: linux,dummy-virt (DT) [ 19.880294] Call trace: [ 19.880317] show_stack+0x20/0x38 (C) [ 19.880376] dump_stack_lvl+0x8c/0xd0 [ 19.880546] print_report+0x118/0x5d0 [ 19.880662] kasan_report+0xdc/0x128 [ 19.880800] __asan_report_load1_noabort+0x20/0x30 [ 19.880931] mempool_uaf_helper+0x314/0x340 [ 19.880983] mempool_kmalloc_large_uaf+0xc4/0x120 [ 19.881059] kunit_try_run_case+0x170/0x3f0 [ 19.881340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.881545] kthread+0x328/0x630 [ 19.881687] ret_from_fork+0x10/0x20 [ 19.881843] [ 19.881950] The buggy address belongs to the physical page: [ 19.882004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107938 [ 19.882261] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.882450] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.882549] page_type: f8(unknown) [ 19.882587] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.883017] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.883098] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.883259] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.883359] head: 0bfffe0000000002 ffffc1ffc31e4e01 00000000ffffffff 00000000ffffffff [ 19.883554] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.883663] page dumped because: kasan: bad access detected [ 19.883717] [ 19.883737] Memory state around the buggy address: [ 19.883770] fff00000c7937f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.883887] fff00000c7937f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.884068] >fff00000c7938000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.884157] ^ [ 19.884195] fff00000c7938080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.884317] fff00000c7938100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.884360] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 19.224275] ================================================================== [ 19.224359] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 19.224441] Read of size 1 at addr fff00000c664e000 by task kunit_try_catch/217 [ 19.224495] [ 19.224539] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.224626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.224653] Hardware name: linux,dummy-virt (DT) [ 19.224690] Call trace: [ 19.224714] show_stack+0x20/0x38 (C) [ 19.224765] dump_stack_lvl+0x8c/0xd0 [ 19.224819] print_report+0x118/0x5d0 [ 19.224863] kasan_report+0xdc/0x128 [ 19.224908] __kasan_check_byte+0x54/0x70 [ 19.224954] kmem_cache_destroy+0x34/0x218 [ 19.225001] kmem_cache_double_destroy+0x174/0x300 [ 19.225054] kunit_try_run_case+0x170/0x3f0 [ 19.225106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.225159] kthread+0x328/0x630 [ 19.225219] ret_from_fork+0x10/0x20 [ 19.225268] [ 19.225286] Allocated by task 217: [ 19.225317] kasan_save_stack+0x3c/0x68 [ 19.225360] kasan_save_track+0x20/0x40 [ 19.225396] kasan_save_alloc_info+0x40/0x58 [ 19.225436] __kasan_slab_alloc+0xa8/0xb0 [ 19.225473] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.225512] __kmem_cache_create_args+0x178/0x280 [ 19.225551] kmem_cache_double_destroy+0xc0/0x300 [ 19.225594] kunit_try_run_case+0x170/0x3f0 [ 19.225634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.225678] kthread+0x328/0x630 [ 19.225714] ret_from_fork+0x10/0x20 [ 19.225748] [ 19.225767] Freed by task 217: [ 19.225793] kasan_save_stack+0x3c/0x68 [ 19.225829] kasan_save_track+0x20/0x40 [ 19.225864] kasan_save_free_info+0x4c/0x78 [ 19.225903] __kasan_slab_free+0x6c/0x98 [ 19.225940] kmem_cache_free+0x260/0x468 [ 19.225974] slab_kmem_cache_release+0x38/0x50 [ 19.226014] kmem_cache_release+0x1c/0x30 [ 19.226054] kobject_put+0x17c/0x420 [ 19.226091] sysfs_slab_release+0x1c/0x30 [ 19.226129] kmem_cache_destroy+0x118/0x218 [ 19.226165] kmem_cache_double_destroy+0x128/0x300 [ 19.226221] kunit_try_run_case+0x170/0x3f0 [ 19.226260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.226305] kthread+0x328/0x630 [ 19.226341] ret_from_fork+0x10/0x20 [ 19.226375] [ 19.226396] The buggy address belongs to the object at fff00000c664e000 [ 19.226396] which belongs to the cache kmem_cache of size 208 [ 19.226458] The buggy address is located 0 bytes inside of [ 19.226458] freed 208-byte region [fff00000c664e000, fff00000c664e0d0) [ 19.226522] [ 19.226545] The buggy address belongs to the physical page: [ 19.226580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664e [ 19.226636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.226691] page_type: f5(slab) [ 19.226732] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 19.226785] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 19.226828] page dumped because: kasan: bad access detected [ 19.226860] [ 19.226878] Memory state around the buggy address: [ 19.226911] fff00000c664df00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 19.226956] fff00000c664df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.227000] >fff00000c664e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.227039] ^ [ 19.227066] fff00000c664e080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 19.227110] fff00000c664e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.227151] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 19.141912] ================================================================== [ 19.141997] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 19.142074] Read of size 1 at addr fff00000c6643000 by task kunit_try_catch/215 [ 19.142126] [ 19.142169] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.142277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.142305] Hardware name: linux,dummy-virt (DT) [ 19.142339] Call trace: [ 19.142363] show_stack+0x20/0x38 (C) [ 19.142414] dump_stack_lvl+0x8c/0xd0 [ 19.142465] print_report+0x118/0x5d0 [ 19.142511] kasan_report+0xdc/0x128 [ 19.142555] __asan_report_load1_noabort+0x20/0x30 [ 19.142606] kmem_cache_rcu_uaf+0x388/0x468 [ 19.142657] kunit_try_run_case+0x170/0x3f0 [ 19.142709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.142764] kthread+0x328/0x630 [ 19.142811] ret_from_fork+0x10/0x20 [ 19.142860] [ 19.142879] Allocated by task 215: [ 19.142909] kasan_save_stack+0x3c/0x68 [ 19.142949] kasan_save_track+0x20/0x40 [ 19.142985] kasan_save_alloc_info+0x40/0x58 [ 19.143024] __kasan_slab_alloc+0xa8/0xb0 [ 19.143059] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.143101] kmem_cache_rcu_uaf+0x12c/0x468 [ 19.143141] kunit_try_run_case+0x170/0x3f0 [ 19.143179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.143236] kthread+0x328/0x630 [ 19.143270] ret_from_fork+0x10/0x20 [ 19.143306] [ 19.143324] Freed by task 0: [ 19.143349] kasan_save_stack+0x3c/0x68 [ 19.143385] kasan_save_track+0x20/0x40 [ 19.143419] kasan_save_free_info+0x4c/0x78 [ 19.143458] __kasan_slab_free+0x6c/0x98 [ 19.143494] slab_free_after_rcu_debug+0xd4/0x2f8 [ 19.143531] rcu_core+0x9f4/0x1e20 [ 19.143568] rcu_core_si+0x18/0x30 [ 19.143600] handle_softirqs+0x374/0xb28 [ 19.143638] __do_softirq+0x1c/0x28 [ 19.143671] [ 19.143689] Last potentially related work creation: [ 19.143717] kasan_save_stack+0x3c/0x68 [ 19.143752] kasan_record_aux_stack+0xb4/0xc8 [ 19.143791] kmem_cache_free+0x120/0x468 [ 19.143826] kmem_cache_rcu_uaf+0x16c/0x468 [ 19.143866] kunit_try_run_case+0x170/0x3f0 [ 19.143903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.143948] kthread+0x328/0x630 [ 19.143984] ret_from_fork+0x10/0x20 [ 19.144020] [ 19.144037] The buggy address belongs to the object at fff00000c6643000 [ 19.144037] which belongs to the cache test_cache of size 200 [ 19.144098] The buggy address is located 0 bytes inside of [ 19.144098] freed 200-byte region [fff00000c6643000, fff00000c66430c8) [ 19.144162] [ 19.144183] The buggy address belongs to the physical page: [ 19.144231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643 [ 19.144287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.144340] page_type: f5(slab) [ 19.144382] raw: 0bfffe0000000000 fff00000c3e4fdc0 dead000000000122 0000000000000000 [ 19.144433] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.144476] page dumped because: kasan: bad access detected [ 19.144508] [ 19.144525] Memory state around the buggy address: [ 19.144559] fff00000c6642f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.144604] fff00000c6642f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.144646] >fff00000c6643000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.144687] ^ [ 19.144713] fff00000c6643080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 19.144758] fff00000c6643100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.144800] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 18.739074] ================================================================== [ 18.739472] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 18.739553] Free of addr fff00000c59ec001 by task kunit_try_catch/213 [ 18.739788] [ 18.739906] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.740114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.740149] Hardware name: linux,dummy-virt (DT) [ 18.740183] Call trace: [ 18.740219] show_stack+0x20/0x38 (C) [ 18.740274] dump_stack_lvl+0x8c/0xd0 [ 18.740475] print_report+0x118/0x5d0 [ 18.740536] kasan_report_invalid_free+0xc0/0xe8 [ 18.740785] check_slab_allocation+0xfc/0x108 [ 18.741309] __kasan_slab_pre_free+0x2c/0x48 [ 18.741429] kmem_cache_free+0xf0/0x468 [ 18.741732] kmem_cache_invalid_free+0x184/0x3c8 [ 18.741969] kunit_try_run_case+0x170/0x3f0 [ 18.742031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.742086] kthread+0x328/0x630 [ 18.742149] ret_from_fork+0x10/0x20 [ 18.742199] [ 18.742231] Allocated by task 213: [ 18.742258] kasan_save_stack+0x3c/0x68 [ 18.742300] kasan_save_track+0x20/0x40 [ 18.742336] kasan_save_alloc_info+0x40/0x58 [ 18.742374] __kasan_slab_alloc+0xa8/0xb0 [ 18.742412] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.742470] kmem_cache_invalid_free+0x12c/0x3c8 [ 18.742511] kunit_try_run_case+0x170/0x3f0 [ 18.742560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.742612] kthread+0x328/0x630 [ 18.742655] ret_from_fork+0x10/0x20 [ 18.742698] [ 18.742716] The buggy address belongs to the object at fff00000c59ec000 [ 18.742716] which belongs to the cache test_cache of size 200 [ 18.742787] The buggy address is located 1 bytes inside of [ 18.742787] 200-byte region [fff00000c59ec000, fff00000c59ec0c8) [ 18.742850] [ 18.742880] The buggy address belongs to the physical page: [ 18.742933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ec [ 18.743005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.743062] page_type: f5(slab) [ 18.743116] raw: 0bfffe0000000000 fff00000c1c3ab40 dead000000000122 0000000000000000 [ 18.743178] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.743241] page dumped because: kasan: bad access detected [ 18.743279] [ 18.743313] Memory state around the buggy address: [ 18.743355] fff00000c59ebf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.743411] fff00000c59ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.743455] >fff00000c59ec000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.743507] ^ [ 18.743541] fff00000c59ec080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 18.743593] fff00000c59ec100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.743642] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 18.707577] ================================================================== [ 18.707680] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 18.707773] Free of addr fff00000c59ea000 by task kunit_try_catch/211 [ 18.707856] [ 18.707935] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.708022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.708050] Hardware name: linux,dummy-virt (DT) [ 18.708116] Call trace: [ 18.708139] show_stack+0x20/0x38 (C) [ 18.708190] dump_stack_lvl+0x8c/0xd0 [ 18.708263] print_report+0x118/0x5d0 [ 18.708397] kasan_report_invalid_free+0xc0/0xe8 [ 18.708475] check_slab_allocation+0xd4/0x108 [ 18.708642] __kasan_slab_pre_free+0x2c/0x48 [ 18.708781] kmem_cache_free+0xf0/0x468 [ 18.708868] kmem_cache_double_free+0x190/0x3c8 [ 18.708921] kunit_try_run_case+0x170/0x3f0 [ 18.708972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.709035] kthread+0x328/0x630 [ 18.709101] ret_from_fork+0x10/0x20 [ 18.709168] [ 18.709270] Allocated by task 211: [ 18.709360] kasan_save_stack+0x3c/0x68 [ 18.709414] kasan_save_track+0x20/0x40 [ 18.709449] kasan_save_alloc_info+0x40/0x58 [ 18.709510] __kasan_slab_alloc+0xa8/0xb0 [ 18.709546] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.709585] kmem_cache_double_free+0x12c/0x3c8 [ 18.709666] kunit_try_run_case+0x170/0x3f0 [ 18.709851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.710010] kthread+0x328/0x630 [ 18.710068] ret_from_fork+0x10/0x20 [ 18.710194] [ 18.710294] Freed by task 211: [ 18.710359] kasan_save_stack+0x3c/0x68 [ 18.710492] kasan_save_track+0x20/0x40 [ 18.710566] kasan_save_free_info+0x4c/0x78 [ 18.710606] __kasan_slab_free+0x6c/0x98 [ 18.710993] kmem_cache_free+0x260/0x468 [ 18.711062] kmem_cache_double_free+0x140/0x3c8 [ 18.711313] kunit_try_run_case+0x170/0x3f0 [ 18.711392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.711462] kthread+0x328/0x630 [ 18.711498] ret_from_fork+0x10/0x20 [ 18.711534] [ 18.711554] The buggy address belongs to the object at fff00000c59ea000 [ 18.711554] which belongs to the cache test_cache of size 200 [ 18.711631] The buggy address is located 0 bytes inside of [ 18.711631] 200-byte region [fff00000c59ea000, fff00000c59ea0c8) [ 18.711702] [ 18.711724] The buggy address belongs to the physical page: [ 18.711757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ea [ 18.711959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.712176] page_type: f5(slab) [ 18.712252] raw: 0bfffe0000000000 fff00000c1c3aa00 dead000000000122 0000000000000000 [ 18.712464] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.712699] page dumped because: kasan: bad access detected [ 18.712798] [ 18.712867] Memory state around the buggy address: [ 18.712935] fff00000c59e9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.713108] fff00000c59e9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.713304] >fff00000c59ea000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.713478] ^ [ 18.713677] fff00000c59ea080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 18.713827] fff00000c59ea100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.713916] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 18.478772] ================================================================== [ 18.478834] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 18.478894] Read of size 1 at addr fff00000c59e80c8 by task kunit_try_catch/209 [ 18.478945] [ 18.478981] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.479065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.479092] Hardware name: linux,dummy-virt (DT) [ 18.479123] Call trace: [ 18.479147] show_stack+0x20/0x38 (C) [ 18.479572] dump_stack_lvl+0x8c/0xd0 [ 18.479642] print_report+0x118/0x5d0 [ 18.479690] kasan_report+0xdc/0x128 [ 18.480248] __asan_report_load1_noabort+0x20/0x30 [ 18.480302] kmem_cache_oob+0x344/0x430 [ 18.480384] kunit_try_run_case+0x170/0x3f0 [ 18.480435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.480491] kthread+0x328/0x630 [ 18.480563] ret_from_fork+0x10/0x20 [ 18.481739] [ 18.481770] Allocated by task 209: [ 18.481802] kasan_save_stack+0x3c/0x68 [ 18.481848] kasan_save_track+0x20/0x40 [ 18.481886] kasan_save_alloc_info+0x40/0x58 [ 18.481926] __kasan_slab_alloc+0xa8/0xb0 [ 18.481963] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.482002] kmem_cache_oob+0x12c/0x430 [ 18.482040] kunit_try_run_case+0x170/0x3f0 [ 18.482079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.482126] kthread+0x328/0x630 [ 18.482160] ret_from_fork+0x10/0x20 [ 18.482196] [ 18.482229] The buggy address belongs to the object at fff00000c59e8000 [ 18.482229] which belongs to the cache test_cache of size 200 [ 18.482290] The buggy address is located 0 bytes to the right of [ 18.482290] allocated 200-byte region [fff00000c59e8000, fff00000c59e80c8) [ 18.482369] [ 18.482388] The buggy address belongs to the physical page: [ 18.482523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e8 [ 18.482617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.482744] page_type: f5(slab) [ 18.482834] raw: 0bfffe0000000000 fff00000c1c3a8c0 dead000000000122 0000000000000000 [ 18.482922] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 18.483044] page dumped because: kasan: bad access detected [ 18.483124] [ 18.483228] Memory state around the buggy address: [ 18.483328] fff00000c59e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.483461] fff00000c59e8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.483536] >fff00000c59e8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 18.483578] ^ [ 18.483845] fff00000c59e8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.484000] fff00000c59e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.484102] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 18.424808] ================================================================== [ 18.425070] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 18.425138] Read of size 8 at addr fff00000c59da2c0 by task kunit_try_catch/202 [ 18.425690] [ 18.425983] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.426348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.426386] Hardware name: linux,dummy-virt (DT) [ 18.426454] Call trace: [ 18.426798] show_stack+0x20/0x38 (C) [ 18.427149] dump_stack_lvl+0x8c/0xd0 [ 18.427500] print_report+0x118/0x5d0 [ 18.427879] kasan_report+0xdc/0x128 [ 18.427982] __asan_report_load8_noabort+0x20/0x30 [ 18.428321] workqueue_uaf+0x480/0x4a8 [ 18.428549] kunit_try_run_case+0x170/0x3f0 [ 18.428862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.429142] kthread+0x328/0x630 [ 18.429391] ret_from_fork+0x10/0x20 [ 18.429784] [ 18.429807] Allocated by task 202: [ 18.429837] kasan_save_stack+0x3c/0x68 [ 18.429877] kasan_save_track+0x20/0x40 [ 18.429912] kasan_save_alloc_info+0x40/0x58 [ 18.429952] __kasan_kmalloc+0xd4/0xd8 [ 18.430673] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.431076] workqueue_uaf+0x13c/0x4a8 [ 18.431139] kunit_try_run_case+0x170/0x3f0 [ 18.431180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.431317] kthread+0x328/0x630 [ 18.431455] ret_from_fork+0x10/0x20 [ 18.431670] [ 18.431691] Freed by task 9: [ 18.431756] kasan_save_stack+0x3c/0x68 [ 18.431797] kasan_save_track+0x20/0x40 [ 18.431839] kasan_save_free_info+0x4c/0x78 [ 18.431876] __kasan_slab_free+0x6c/0x98 [ 18.431913] kfree+0x214/0x3c8 [ 18.431943] workqueue_uaf_work+0x18/0x30 [ 18.432433] process_one_work+0x530/0xf98 [ 18.432531] worker_thread+0x618/0xf38 [ 18.432881] kthread+0x328/0x630 [ 18.432994] ret_from_fork+0x10/0x20 [ 18.433225] [ 18.433265] Last potentially related work creation: [ 18.433294] kasan_save_stack+0x3c/0x68 [ 18.433338] kasan_record_aux_stack+0xb4/0xc8 [ 18.433386] __queue_work+0x65c/0x1008 [ 18.433445] queue_work_on+0xbc/0xf8 [ 18.433480] workqueue_uaf+0x210/0x4a8 [ 18.433707] kunit_try_run_case+0x170/0x3f0 [ 18.433884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.433977] kthread+0x328/0x630 [ 18.434021] ret_from_fork+0x10/0x20 [ 18.434273] [ 18.434444] The buggy address belongs to the object at fff00000c59da2c0 [ 18.434444] which belongs to the cache kmalloc-32 of size 32 [ 18.434791] The buggy address is located 0 bytes inside of [ 18.434791] freed 32-byte region [fff00000c59da2c0, fff00000c59da2e0) [ 18.434983] [ 18.435057] The buggy address belongs to the physical page: [ 18.435091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059da [ 18.435244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.435326] page_type: f5(slab) [ 18.435364] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.435417] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.435460] page dumped because: kasan: bad access detected [ 18.435492] [ 18.436419] Memory state around the buggy address: [ 18.436555] fff00000c59da180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.436768] fff00000c59da200: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 18.436939] >fff00000c59da280: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 18.437179] ^ [ 18.437302] fff00000c59da300: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.437349] fff00000c59da380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.437390] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 18.386869] ================================================================== [ 18.387008] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 18.387083] Read of size 4 at addr fff00000c59da0c0 by task swapper/0/0 [ 18.387131] [ 18.387169] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.388544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.388639] Hardware name: linux,dummy-virt (DT) [ 18.388673] Call trace: [ 18.388695] show_stack+0x20/0x38 (C) [ 18.388752] dump_stack_lvl+0x8c/0xd0 [ 18.388801] print_report+0x118/0x5d0 [ 18.388846] kasan_report+0xdc/0x128 [ 18.388888] __asan_report_load4_noabort+0x20/0x30 [ 18.388939] rcu_uaf_reclaim+0x64/0x70 [ 18.390234] rcu_core+0x9f4/0x1e20 [ 18.390300] rcu_core_si+0x18/0x30 [ 18.390345] handle_softirqs+0x374/0xb28 [ 18.390421] __do_softirq+0x1c/0x28 [ 18.390463] ____do_softirq+0x18/0x30 [ 18.390523] call_on_irq_stack+0x24/0x30 [ 18.390568] do_softirq_own_stack+0x24/0x38 [ 18.390615] __irq_exit_rcu+0x1fc/0x318 [ 18.390659] irq_exit_rcu+0x1c/0x80 [ 18.390702] el1_interrupt+0x38/0x58 [ 18.390747] el1h_64_irq_handler+0x18/0x28 [ 18.390792] el1h_64_irq+0x6c/0x70 [ 18.390888] arch_local_irq_enable+0x4/0x8 (P) [ 18.390941] do_idle+0x384/0x4e8 [ 18.390986] cpu_startup_entry+0x68/0x80 [ 18.391032] rest_init+0x160/0x188 [ 18.391559] start_kernel+0x308/0x3d0 [ 18.391703] __primary_switched+0x8c/0xa0 [ 18.391826] [ 18.391888] Allocated by task 200: [ 18.391976] kasan_save_stack+0x3c/0x68 [ 18.392046] kasan_save_track+0x20/0x40 [ 18.392086] kasan_save_alloc_info+0x40/0x58 [ 18.392125] __kasan_kmalloc+0xd4/0xd8 [ 18.392306] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.392353] rcu_uaf+0xb0/0x2d8 [ 18.392586] kunit_try_run_case+0x170/0x3f0 [ 18.392637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.392693] kthread+0x328/0x630 [ 18.392852] ret_from_fork+0x10/0x20 [ 18.393002] [ 18.393038] Freed by task 0: [ 18.393073] kasan_save_stack+0x3c/0x68 [ 18.393135] kasan_save_track+0x20/0x40 [ 18.393180] kasan_save_free_info+0x4c/0x78 [ 18.393237] __kasan_slab_free+0x6c/0x98 [ 18.393285] kfree+0x214/0x3c8 [ 18.393439] rcu_uaf_reclaim+0x28/0x70 [ 18.393493] rcu_core+0x9f4/0x1e20 [ 18.393533] rcu_core_si+0x18/0x30 [ 18.393566] handle_softirqs+0x374/0xb28 [ 18.393603] __do_softirq+0x1c/0x28 [ 18.394023] [ 18.394128] Last potentially related work creation: [ 18.394174] kasan_save_stack+0x3c/0x68 [ 18.394234] kasan_record_aux_stack+0xb4/0xc8 [ 18.394275] __call_rcu_common.constprop.0+0x74/0x8c8 [ 18.394316] call_rcu+0x18/0x30 [ 18.394349] rcu_uaf+0x14c/0x2d8 [ 18.395242] kunit_try_run_case+0x170/0x3f0 [ 18.395762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.396406] kthread+0x328/0x630 [ 18.396751] ret_from_fork+0x10/0x20 [ 18.397331] [ 18.397607] The buggy address belongs to the object at fff00000c59da0c0 [ 18.397607] which belongs to the cache kmalloc-32 of size 32 [ 18.397711] The buggy address is located 0 bytes inside of [ 18.397711] freed 32-byte region [fff00000c59da0c0, fff00000c59da0e0) [ 18.397775] [ 18.398050] The buggy address belongs to the physical page: [ 18.398142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059da [ 18.398216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.398418] page_type: f5(slab) [ 18.398910] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.399082] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.399414] page dumped because: kasan: bad access detected [ 18.399572] [ 18.399669] Memory state around the buggy address: [ 18.399705] fff00000c59d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.399973] fff00000c59da000: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 18.400030] >fff00000c59da080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.400071] ^ [ 18.400606] fff00000c59da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.400769] fff00000c59da180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.400876] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 18.152934] ================================================================== [ 18.152997] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 18.153169] Read of size 1 at addr fff00000c59e4300 by task kunit_try_catch/198 [ 18.153236] [ 18.153454] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.153592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.153825] Hardware name: linux,dummy-virt (DT) [ 18.153955] Call trace: [ 18.154026] show_stack+0x20/0x38 (C) [ 18.154094] dump_stack_lvl+0x8c/0xd0 [ 18.154365] print_report+0x118/0x5d0 [ 18.154576] kasan_report+0xdc/0x128 [ 18.154666] __asan_report_load1_noabort+0x20/0x30 [ 18.154827] ksize_uaf+0x598/0x5f8 [ 18.154916] kunit_try_run_case+0x170/0x3f0 [ 18.155052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.155105] kthread+0x328/0x630 [ 18.155311] ret_from_fork+0x10/0x20 [ 18.155477] [ 18.155626] Allocated by task 198: [ 18.155683] kasan_save_stack+0x3c/0x68 [ 18.155815] kasan_save_track+0x20/0x40 [ 18.155897] kasan_save_alloc_info+0x40/0x58 [ 18.156012] __kasan_kmalloc+0xd4/0xd8 [ 18.156169] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.156408] ksize_uaf+0xb8/0x5f8 [ 18.156531] kunit_try_run_case+0x170/0x3f0 [ 18.156637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.156732] kthread+0x328/0x630 [ 18.156869] ret_from_fork+0x10/0x20 [ 18.156931] [ 18.157120] Freed by task 198: [ 18.157217] kasan_save_stack+0x3c/0x68 [ 18.157438] kasan_save_track+0x20/0x40 [ 18.157566] kasan_save_free_info+0x4c/0x78 [ 18.157648] __kasan_slab_free+0x6c/0x98 [ 18.157825] kfree+0x214/0x3c8 [ 18.157858] ksize_uaf+0x11c/0x5f8 [ 18.157908] kunit_try_run_case+0x170/0x3f0 [ 18.157961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.158145] kthread+0x328/0x630 [ 18.158646] ret_from_fork+0x10/0x20 [ 18.158709] [ 18.158774] The buggy address belongs to the object at fff00000c59e4300 [ 18.158774] which belongs to the cache kmalloc-128 of size 128 [ 18.158840] The buggy address is located 0 bytes inside of [ 18.158840] freed 128-byte region [fff00000c59e4300, fff00000c59e4380) [ 18.159282] [ 18.159362] The buggy address belongs to the physical page: [ 18.159635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 18.159736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.159959] page_type: f5(slab) [ 18.160025] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.160446] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.160522] page dumped because: kasan: bad access detected [ 18.160619] [ 18.160721] Memory state around the buggy address: [ 18.160829] fff00000c59e4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.160905] fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.161050] >fff00000c59e4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.161139] ^ [ 18.161393] fff00000c59e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.161567] fff00000c59e4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.161703] ================================================================== [ 18.162925] ================================================================== [ 18.162997] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 18.163062] Read of size 1 at addr fff00000c59e4378 by task kunit_try_catch/198 [ 18.163115] [ 18.163152] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.163250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.163276] Hardware name: linux,dummy-virt (DT) [ 18.163316] Call trace: [ 18.163340] show_stack+0x20/0x38 (C) [ 18.163386] dump_stack_lvl+0x8c/0xd0 [ 18.163433] print_report+0x118/0x5d0 [ 18.163485] kasan_report+0xdc/0x128 [ 18.163537] __asan_report_load1_noabort+0x20/0x30 [ 18.163586] ksize_uaf+0x544/0x5f8 [ 18.163633] kunit_try_run_case+0x170/0x3f0 [ 18.163679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.163737] kthread+0x328/0x630 [ 18.163793] ret_from_fork+0x10/0x20 [ 18.163843] [ 18.163862] Allocated by task 198: [ 18.163891] kasan_save_stack+0x3c/0x68 [ 18.163929] kasan_save_track+0x20/0x40 [ 18.163966] kasan_save_alloc_info+0x40/0x58 [ 18.164005] __kasan_kmalloc+0xd4/0xd8 [ 18.164049] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.164097] ksize_uaf+0xb8/0x5f8 [ 18.164146] kunit_try_run_case+0x170/0x3f0 [ 18.164195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.164641] kthread+0x328/0x630 [ 18.164705] ret_from_fork+0x10/0x20 [ 18.164775] [ 18.164797] Freed by task 198: [ 18.165279] kasan_save_stack+0x3c/0x68 [ 18.165362] kasan_save_track+0x20/0x40 [ 18.165647] kasan_save_free_info+0x4c/0x78 [ 18.165819] __kasan_slab_free+0x6c/0x98 [ 18.166024] kfree+0x214/0x3c8 [ 18.166222] ksize_uaf+0x11c/0x5f8 [ 18.166474] kunit_try_run_case+0x170/0x3f0 [ 18.166569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.166768] kthread+0x328/0x630 [ 18.167075] ret_from_fork+0x10/0x20 [ 18.167373] [ 18.167512] The buggy address belongs to the object at fff00000c59e4300 [ 18.167512] which belongs to the cache kmalloc-128 of size 128 [ 18.167914] The buggy address is located 120 bytes inside of [ 18.167914] freed 128-byte region [fff00000c59e4300, fff00000c59e4380) [ 18.168154] [ 18.168252] The buggy address belongs to the physical page: [ 18.168424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 18.168620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.168796] page_type: f5(slab) [ 18.168892] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.169029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.169074] page dumped because: kasan: bad access detected [ 18.169153] [ 18.169351] Memory state around the buggy address: [ 18.169538] fff00000c59e4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.169771] fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.169902] >fff00000c59e4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.169988] ^ [ 18.170057] fff00000c59e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.170230] fff00000c59e4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.170447] ================================================================== [ 18.143533] ================================================================== [ 18.143892] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 18.143964] Read of size 1 at addr fff00000c59e4300 by task kunit_try_catch/198 [ 18.144399] [ 18.144495] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.144639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.144667] Hardware name: linux,dummy-virt (DT) [ 18.144726] Call trace: [ 18.144765] show_stack+0x20/0x38 (C) [ 18.145026] dump_stack_lvl+0x8c/0xd0 [ 18.145256] print_report+0x118/0x5d0 [ 18.145317] kasan_report+0xdc/0x128 [ 18.145401] __kasan_check_byte+0x54/0x70 [ 18.145520] ksize+0x30/0x88 [ 18.145596] ksize_uaf+0x168/0x5f8 [ 18.145653] kunit_try_run_case+0x170/0x3f0 [ 18.145703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.145755] kthread+0x328/0x630 [ 18.145915] ret_from_fork+0x10/0x20 [ 18.146291] [ 18.146378] Allocated by task 198: [ 18.146456] kasan_save_stack+0x3c/0x68 [ 18.146610] kasan_save_track+0x20/0x40 [ 18.146697] kasan_save_alloc_info+0x40/0x58 [ 18.146813] __kasan_kmalloc+0xd4/0xd8 [ 18.146885] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.146943] ksize_uaf+0xb8/0x5f8 [ 18.147141] kunit_try_run_case+0x170/0x3f0 [ 18.147470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.147605] kthread+0x328/0x630 [ 18.147701] ret_from_fork+0x10/0x20 [ 18.147821] [ 18.147887] Freed by task 198: [ 18.147933] kasan_save_stack+0x3c/0x68 [ 18.148002] kasan_save_track+0x20/0x40 [ 18.148242] kasan_save_free_info+0x4c/0x78 [ 18.148281] __kasan_slab_free+0x6c/0x98 [ 18.148465] kfree+0x214/0x3c8 [ 18.148509] ksize_uaf+0x11c/0x5f8 [ 18.148554] kunit_try_run_case+0x170/0x3f0 [ 18.148596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.148642] kthread+0x328/0x630 [ 18.148679] ret_from_fork+0x10/0x20 [ 18.148716] [ 18.148735] The buggy address belongs to the object at fff00000c59e4300 [ 18.148735] which belongs to the cache kmalloc-128 of size 128 [ 18.148807] The buggy address is located 0 bytes inside of [ 18.148807] freed 128-byte region [fff00000c59e4300, fff00000c59e4380) [ 18.148872] [ 18.148901] The buggy address belongs to the physical page: [ 18.148955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 18.149021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.149083] page_type: f5(slab) [ 18.149131] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.149193] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.149273] page dumped because: kasan: bad access detected [ 18.149318] [ 18.149551] Memory state around the buggy address: [ 18.149620] fff00000c59e4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.149869] fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.150070] >fff00000c59e4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.150386] ^ [ 18.150706] fff00000c59e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.151042] fff00000c59e4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.151157] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 18.118598] ================================================================== [ 18.118682] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.118736] Read of size 1 at addr fff00000c59e4278 by task kunit_try_catch/196 [ 18.118936] [ 18.119023] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.119120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.119251] Hardware name: linux,dummy-virt (DT) [ 18.119370] Call trace: [ 18.119397] show_stack+0x20/0x38 (C) [ 18.119474] dump_stack_lvl+0x8c/0xd0 [ 18.119583] print_report+0x118/0x5d0 [ 18.119641] kasan_report+0xdc/0x128 [ 18.119687] __asan_report_load1_noabort+0x20/0x30 [ 18.119756] ksize_unpoisons_memory+0x618/0x740 [ 18.119810] kunit_try_run_case+0x170/0x3f0 [ 18.120201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.120295] kthread+0x328/0x630 [ 18.120404] ret_from_fork+0x10/0x20 [ 18.120500] [ 18.120539] Allocated by task 196: [ 18.120764] kasan_save_stack+0x3c/0x68 [ 18.121012] kasan_save_track+0x20/0x40 [ 18.121085] kasan_save_alloc_info+0x40/0x58 [ 18.121138] __kasan_kmalloc+0xd4/0xd8 [ 18.121175] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.121383] ksize_unpoisons_memory+0xc0/0x740 [ 18.121543] kunit_try_run_case+0x170/0x3f0 [ 18.121589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.122104] kthread+0x328/0x630 [ 18.122221] ret_from_fork+0x10/0x20 [ 18.122308] [ 18.122327] The buggy address belongs to the object at fff00000c59e4200 [ 18.122327] which belongs to the cache kmalloc-128 of size 128 [ 18.122718] The buggy address is located 5 bytes to the right of [ 18.122718] allocated 115-byte region [fff00000c59e4200, fff00000c59e4273) [ 18.122923] [ 18.122982] The buggy address belongs to the physical page: [ 18.123116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 18.123192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.123427] page_type: f5(slab) [ 18.123530] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.123596] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.123772] page dumped because: kasan: bad access detected [ 18.123806] [ 18.123825] Memory state around the buggy address: [ 18.123858] fff00000c59e4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.123903] fff00000c59e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.123949] >fff00000c59e4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.124000] ^ [ 18.124042] fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.124094] fff00000c59e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.124144] ================================================================== [ 18.110283] ================================================================== [ 18.110508] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.110712] Read of size 1 at addr fff00000c59e4273 by task kunit_try_catch/196 [ 18.110779] [ 18.110987] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.111086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.111114] Hardware name: linux,dummy-virt (DT) [ 18.111150] Call trace: [ 18.111468] show_stack+0x20/0x38 (C) [ 18.111554] dump_stack_lvl+0x8c/0xd0 [ 18.111767] print_report+0x118/0x5d0 [ 18.111924] kasan_report+0xdc/0x128 [ 18.112009] __asan_report_load1_noabort+0x20/0x30 [ 18.112062] ksize_unpoisons_memory+0x628/0x740 [ 18.112164] kunit_try_run_case+0x170/0x3f0 [ 18.112249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.112473] kthread+0x328/0x630 [ 18.112537] ret_from_fork+0x10/0x20 [ 18.112794] [ 18.112827] Allocated by task 196: [ 18.112874] kasan_save_stack+0x3c/0x68 [ 18.112972] kasan_save_track+0x20/0x40 [ 18.113008] kasan_save_alloc_info+0x40/0x58 [ 18.113248] __kasan_kmalloc+0xd4/0xd8 [ 18.113302] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.113553] ksize_unpoisons_memory+0xc0/0x740 [ 18.113729] kunit_try_run_case+0x170/0x3f0 [ 18.113850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.113984] kthread+0x328/0x630 [ 18.114043] ret_from_fork+0x10/0x20 [ 18.114100] [ 18.114119] The buggy address belongs to the object at fff00000c59e4200 [ 18.114119] which belongs to the cache kmalloc-128 of size 128 [ 18.114181] The buggy address is located 0 bytes to the right of [ 18.114181] allocated 115-byte region [fff00000c59e4200, fff00000c59e4273) [ 18.114572] [ 18.114627] The buggy address belongs to the physical page: [ 18.114664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 18.115148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.115272] page_type: f5(slab) [ 18.115359] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.115466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.115589] page dumped because: kasan: bad access detected [ 18.115642] [ 18.115716] Memory state around the buggy address: [ 18.115882] fff00000c59e4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.115987] fff00000c59e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.116180] >fff00000c59e4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.116352] ^ [ 18.116533] fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.116582] fff00000c59e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.116805] ================================================================== [ 18.125049] ================================================================== [ 18.125284] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.125359] Read of size 1 at addr fff00000c59e427f by task kunit_try_catch/196 [ 18.125693] [ 18.125748] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.125866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.126013] Hardware name: linux,dummy-virt (DT) [ 18.126078] Call trace: [ 18.126099] show_stack+0x20/0x38 (C) [ 18.126367] dump_stack_lvl+0x8c/0xd0 [ 18.126541] print_report+0x118/0x5d0 [ 18.126703] kasan_report+0xdc/0x128 [ 18.126802] __asan_report_load1_noabort+0x20/0x30 [ 18.126956] ksize_unpoisons_memory+0x690/0x740 [ 18.127097] kunit_try_run_case+0x170/0x3f0 [ 18.127167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.127572] kthread+0x328/0x630 [ 18.127754] ret_from_fork+0x10/0x20 [ 18.127882] [ 18.128009] Allocated by task 196: [ 18.128036] kasan_save_stack+0x3c/0x68 [ 18.128262] kasan_save_track+0x20/0x40 [ 18.128516] kasan_save_alloc_info+0x40/0x58 [ 18.128596] __kasan_kmalloc+0xd4/0xd8 [ 18.128650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.129433] ksize_unpoisons_memory+0xc0/0x740 [ 18.129504] kunit_try_run_case+0x170/0x3f0 [ 18.129573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.129668] kthread+0x328/0x630 [ 18.129933] ret_from_fork+0x10/0x20 [ 18.130524] [ 18.130560] The buggy address belongs to the object at fff00000c59e4200 [ 18.130560] which belongs to the cache kmalloc-128 of size 128 [ 18.130954] The buggy address is located 12 bytes to the right of [ 18.130954] allocated 115-byte region [fff00000c59e4200, fff00000c59e4273) [ 18.131193] [ 18.131254] The buggy address belongs to the physical page: [ 18.131610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 18.131807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.132091] page_type: f5(slab) [ 18.132164] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.132253] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.132305] page dumped because: kasan: bad access detected [ 18.132339] [ 18.132356] Memory state around the buggy address: [ 18.132389] fff00000c59e4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.132434] fff00000c59e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.132481] >fff00000c59e4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.132527] ^ [ 18.132569] fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.132624] fff00000c59e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.132672] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 18.090882] ================================================================== [ 18.091370] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 18.091522] Free of addr fff00000c45d8b60 by task kunit_try_catch/194 [ 18.091718] [ 18.091761] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.092088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.092127] Hardware name: linux,dummy-virt (DT) [ 18.092404] Call trace: [ 18.092442] show_stack+0x20/0x38 (C) [ 18.092496] dump_stack_lvl+0x8c/0xd0 [ 18.092571] print_report+0x118/0x5d0 [ 18.092617] kasan_report_invalid_free+0xc0/0xe8 [ 18.092829] check_slab_allocation+0xd4/0x108 [ 18.092890] __kasan_slab_pre_free+0x2c/0x48 [ 18.092968] kfree+0xe8/0x3c8 [ 18.093094] kfree_sensitive+0x3c/0xb0 [ 18.093160] kmalloc_double_kzfree+0x168/0x308 [ 18.093247] kunit_try_run_case+0x170/0x3f0 [ 18.093487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.093673] kthread+0x328/0x630 [ 18.093837] ret_from_fork+0x10/0x20 [ 18.093886] [ 18.094081] Allocated by task 194: [ 18.094240] kasan_save_stack+0x3c/0x68 [ 18.094566] kasan_save_track+0x20/0x40 [ 18.094615] kasan_save_alloc_info+0x40/0x58 [ 18.095094] __kasan_kmalloc+0xd4/0xd8 [ 18.095198] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.095345] kmalloc_double_kzfree+0xb8/0x308 [ 18.095597] kunit_try_run_case+0x170/0x3f0 [ 18.095806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.095968] kthread+0x328/0x630 [ 18.096038] ret_from_fork+0x10/0x20 [ 18.096328] [ 18.096480] Freed by task 194: [ 18.096520] kasan_save_stack+0x3c/0x68 [ 18.096695] kasan_save_track+0x20/0x40 [ 18.096940] kasan_save_free_info+0x4c/0x78 [ 18.097031] __kasan_slab_free+0x6c/0x98 [ 18.097234] kfree+0x214/0x3c8 [ 18.097384] kfree_sensitive+0x80/0xb0 [ 18.097514] kmalloc_double_kzfree+0x11c/0x308 [ 18.097611] kunit_try_run_case+0x170/0x3f0 [ 18.097678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.097724] kthread+0x328/0x630 [ 18.098003] ret_from_fork+0x10/0x20 [ 18.098211] [ 18.098275] The buggy address belongs to the object at fff00000c45d8b60 [ 18.098275] which belongs to the cache kmalloc-16 of size 16 [ 18.098342] The buggy address is located 0 bytes inside of [ 18.098342] 16-byte region [fff00000c45d8b60, fff00000c45d8b70) [ 18.098620] [ 18.098669] The buggy address belongs to the physical page: [ 18.098814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 18.098873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.099248] page_type: f5(slab) [ 18.099553] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.099828] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.100038] page dumped because: kasan: bad access detected [ 18.100127] [ 18.100305] Memory state around the buggy address: [ 18.100576] fff00000c45d8a00: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc [ 18.100776] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.100977] >fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.101049] ^ [ 18.101321] fff00000c45d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.101519] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.101698] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 18.083258] ================================================================== [ 18.083427] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 18.083489] Read of size 1 at addr fff00000c45d8b60 by task kunit_try_catch/194 [ 18.083541] [ 18.083572] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.083686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.083716] Hardware name: linux,dummy-virt (DT) [ 18.083754] Call trace: [ 18.083777] show_stack+0x20/0x38 (C) [ 18.083835] dump_stack_lvl+0x8c/0xd0 [ 18.083883] print_report+0x118/0x5d0 [ 18.083928] kasan_report+0xdc/0x128 [ 18.083972] __kasan_check_byte+0x54/0x70 [ 18.084018] kfree_sensitive+0x30/0xb0 [ 18.084085] kmalloc_double_kzfree+0x168/0x308 [ 18.084134] kunit_try_run_case+0x170/0x3f0 [ 18.084190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.084269] kthread+0x328/0x630 [ 18.084315] ret_from_fork+0x10/0x20 [ 18.084361] [ 18.084380] Allocated by task 194: [ 18.084406] kasan_save_stack+0x3c/0x68 [ 18.084443] kasan_save_track+0x20/0x40 [ 18.084480] kasan_save_alloc_info+0x40/0x58 [ 18.084517] __kasan_kmalloc+0xd4/0xd8 [ 18.084564] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.084602] kmalloc_double_kzfree+0xb8/0x308 [ 18.084642] kunit_try_run_case+0x170/0x3f0 [ 18.084681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.084732] kthread+0x328/0x630 [ 18.084776] ret_from_fork+0x10/0x20 [ 18.084810] [ 18.084828] Freed by task 194: [ 18.084862] kasan_save_stack+0x3c/0x68 [ 18.084905] kasan_save_track+0x20/0x40 [ 18.084942] kasan_save_free_info+0x4c/0x78 [ 18.084986] __kasan_slab_free+0x6c/0x98 [ 18.085028] kfree+0x214/0x3c8 [ 18.085061] kfree_sensitive+0x80/0xb0 [ 18.085103] kmalloc_double_kzfree+0x11c/0x308 [ 18.085145] kunit_try_run_case+0x170/0x3f0 [ 18.085183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.085946] kthread+0x328/0x630 [ 18.086035] ret_from_fork+0x10/0x20 [ 18.086122] [ 18.086225] The buggy address belongs to the object at fff00000c45d8b60 [ 18.086225] which belongs to the cache kmalloc-16 of size 16 [ 18.086304] The buggy address is located 0 bytes inside of [ 18.086304] freed 16-byte region [fff00000c45d8b60, fff00000c45d8b70) [ 18.086677] [ 18.086872] The buggy address belongs to the physical page: [ 18.087010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 18.087194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.087258] page_type: f5(slab) [ 18.087635] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.087731] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.087881] page dumped because: kasan: bad access detected [ 18.087952] [ 18.088028] Memory state around the buggy address: [ 18.088355] fff00000c45d8a00: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc [ 18.088521] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.088597] >fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.088738] ^ [ 18.088827] fff00000c45d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.088925] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.089138] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 18.052987] ================================================================== [ 18.053226] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 18.053737] Read of size 1 at addr fff00000c59d5fa8 by task kunit_try_catch/190 [ 18.054075] [ 18.054113] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.054217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.054243] Hardware name: linux,dummy-virt (DT) [ 18.054276] Call trace: [ 18.054297] show_stack+0x20/0x38 (C) [ 18.054390] dump_stack_lvl+0x8c/0xd0 [ 18.054442] print_report+0x118/0x5d0 [ 18.054488] kasan_report+0xdc/0x128 [ 18.054541] __asan_report_load1_noabort+0x20/0x30 [ 18.054599] kmalloc_uaf2+0x3f4/0x468 [ 18.054646] kunit_try_run_case+0x170/0x3f0 [ 18.054704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.054759] kthread+0x328/0x630 [ 18.054804] ret_from_fork+0x10/0x20 [ 18.054853] [ 18.054871] Allocated by task 190: [ 18.054899] kasan_save_stack+0x3c/0x68 [ 18.054938] kasan_save_track+0x20/0x40 [ 18.054974] kasan_save_alloc_info+0x40/0x58 [ 18.055016] __kasan_kmalloc+0xd4/0xd8 [ 18.055062] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.055110] kmalloc_uaf2+0xc4/0x468 [ 18.055157] kunit_try_run_case+0x170/0x3f0 [ 18.055194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.055525] kthread+0x328/0x630 [ 18.055657] ret_from_fork+0x10/0x20 [ 18.056255] [ 18.056638] Freed by task 190: [ 18.056804] kasan_save_stack+0x3c/0x68 [ 18.057114] kasan_save_track+0x20/0x40 [ 18.057297] kasan_save_free_info+0x4c/0x78 [ 18.057692] __kasan_slab_free+0x6c/0x98 [ 18.057895] kfree+0x214/0x3c8 [ 18.057942] kmalloc_uaf2+0x134/0x468 [ 18.058166] kunit_try_run_case+0x170/0x3f0 [ 18.058275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.058352] kthread+0x328/0x630 [ 18.058730] ret_from_fork+0x10/0x20 [ 18.058797] [ 18.058919] The buggy address belongs to the object at fff00000c59d5f80 [ 18.058919] which belongs to the cache kmalloc-64 of size 64 [ 18.059004] The buggy address is located 40 bytes inside of [ 18.059004] freed 64-byte region [fff00000c59d5f80, fff00000c59d5fc0) [ 18.059384] [ 18.059421] The buggy address belongs to the physical page: [ 18.059609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d5 [ 18.059824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.059998] page_type: f5(slab) [ 18.060040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.060562] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000 [ 18.060644] page dumped because: kasan: bad access detected [ 18.060679] [ 18.060835] Memory state around the buggy address: [ 18.061057] fff00000c59d5e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.061163] fff00000c59d5f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.061224] >fff00000c59d5f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.061658] ^ [ 18.061730] fff00000c59d6000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.061786] fff00000c59d6080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.061826] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 18.034739] ================================================================== [ 18.034803] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 18.034858] Write of size 33 at addr fff00000c59d5e80 by task kunit_try_catch/188 [ 18.035170] [ 18.035233] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.035318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.035346] Hardware name: linux,dummy-virt (DT) [ 18.035387] Call trace: [ 18.035410] show_stack+0x20/0x38 (C) [ 18.035473] dump_stack_lvl+0x8c/0xd0 [ 18.035523] print_report+0x118/0x5d0 [ 18.035568] kasan_report+0xdc/0x128 [ 18.035611] kasan_check_range+0x100/0x1a8 [ 18.035667] __asan_memset+0x34/0x78 [ 18.035724] kmalloc_uaf_memset+0x170/0x310 [ 18.035774] kunit_try_run_case+0x170/0x3f0 [ 18.035832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.035899] kthread+0x328/0x630 [ 18.035944] ret_from_fork+0x10/0x20 [ 18.035993] [ 18.036011] Allocated by task 188: [ 18.036039] kasan_save_stack+0x3c/0x68 [ 18.036085] kasan_save_track+0x20/0x40 [ 18.036123] kasan_save_alloc_info+0x40/0x58 [ 18.036161] __kasan_kmalloc+0xd4/0xd8 [ 18.036196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.037239] kmalloc_uaf_memset+0xb8/0x310 [ 18.037286] kunit_try_run_case+0x170/0x3f0 [ 18.037339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.037756] kthread+0x328/0x630 [ 18.037824] ret_from_fork+0x10/0x20 [ 18.038020] [ 18.038146] Freed by task 188: [ 18.038185] kasan_save_stack+0x3c/0x68 [ 18.038234] kasan_save_track+0x20/0x40 [ 18.038289] kasan_save_free_info+0x4c/0x78 [ 18.038327] __kasan_slab_free+0x6c/0x98 [ 18.038636] kfree+0x214/0x3c8 [ 18.038946] kmalloc_uaf_memset+0x11c/0x310 [ 18.039062] kunit_try_run_case+0x170/0x3f0 [ 18.039234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.039331] kthread+0x328/0x630 [ 18.039415] ret_from_fork+0x10/0x20 [ 18.039577] [ 18.039917] The buggy address belongs to the object at fff00000c59d5e80 [ 18.039917] which belongs to the cache kmalloc-64 of size 64 [ 18.040036] The buggy address is located 0 bytes inside of [ 18.040036] freed 64-byte region [fff00000c59d5e80, fff00000c59d5ec0) [ 18.040239] [ 18.040373] The buggy address belongs to the physical page: [ 18.040453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d5 [ 18.040611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.040664] page_type: f5(slab) [ 18.040703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.040822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.041247] page dumped because: kasan: bad access detected [ 18.041356] [ 18.041453] Memory state around the buggy address: [ 18.041562] fff00000c59d5d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.041998] fff00000c59d5e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.042126] >fff00000c59d5e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.042266] ^ [ 18.042371] fff00000c59d5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.042448] fff00000c59d5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.042607] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 18.010073] ================================================================== [ 18.010371] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 18.010454] Read of size 1 at addr fff00000c45d8b48 by task kunit_try_catch/186 [ 18.010795] [ 18.010926] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 18.011026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.011072] Hardware name: linux,dummy-virt (DT) [ 18.011119] Call trace: [ 18.011579] show_stack+0x20/0x38 (C) [ 18.011723] dump_stack_lvl+0x8c/0xd0 [ 18.011776] print_report+0x118/0x5d0 [ 18.012138] kasan_report+0xdc/0x128 [ 18.012409] __asan_report_load1_noabort+0x20/0x30 [ 18.012576] kmalloc_uaf+0x300/0x338 [ 18.012664] kunit_try_run_case+0x170/0x3f0 [ 18.012758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.013009] kthread+0x328/0x630 [ 18.013432] ret_from_fork+0x10/0x20 [ 18.013602] [ 18.013677] Allocated by task 186: [ 18.013705] kasan_save_stack+0x3c/0x68 [ 18.013748] kasan_save_track+0x20/0x40 [ 18.013789] kasan_save_alloc_info+0x40/0x58 [ 18.013829] __kasan_kmalloc+0xd4/0xd8 [ 18.014044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.014331] kmalloc_uaf+0xb8/0x338 [ 18.014464] kunit_try_run_case+0x170/0x3f0 [ 18.014557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.014923] kthread+0x328/0x630 [ 18.015132] ret_from_fork+0x10/0x20 [ 18.015200] [ 18.015603] Freed by task 186: [ 18.015634] kasan_save_stack+0x3c/0x68 [ 18.015803] kasan_save_track+0x20/0x40 [ 18.016062] kasan_save_free_info+0x4c/0x78 [ 18.016144] __kasan_slab_free+0x6c/0x98 [ 18.016509] kfree+0x214/0x3c8 [ 18.016594] kmalloc_uaf+0x11c/0x338 [ 18.016673] kunit_try_run_case+0x170/0x3f0 [ 18.017324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.017617] kthread+0x328/0x630 [ 18.017701] ret_from_fork+0x10/0x20 [ 18.017900] [ 18.017922] The buggy address belongs to the object at fff00000c45d8b40 [ 18.017922] which belongs to the cache kmalloc-16 of size 16 [ 18.018145] The buggy address is located 8 bytes inside of [ 18.018145] freed 16-byte region [fff00000c45d8b40, fff00000c45d8b50) [ 18.018483] [ 18.018594] The buggy address belongs to the physical page: [ 18.018662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 18.018766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.018851] page_type: f5(slab) [ 18.018925] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.019044] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.019096] page dumped because: kasan: bad access detected [ 18.019292] [ 18.019510] Memory state around the buggy address: [ 18.019552] fff00000c45d8a00: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc [ 18.019608] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.019671] >fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 18.019725] ^ [ 18.019762] fff00000c45d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.019804] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.019853] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 17.995083] ================================================================== [ 17.995143] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 17.995197] Read of size 64 at addr fff00000c59d5b84 by task kunit_try_catch/184 [ 17.995270] [ 17.995302] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.995385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.995422] Hardware name: linux,dummy-virt (DT) [ 17.995453] Call trace: [ 17.995474] show_stack+0x20/0x38 (C) [ 17.995708] dump_stack_lvl+0x8c/0xd0 [ 17.995759] print_report+0x118/0x5d0 [ 17.995803] kasan_report+0xdc/0x128 [ 17.995858] kasan_check_range+0x100/0x1a8 [ 17.995904] __asan_memmove+0x3c/0x98 [ 17.995948] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 17.996009] kunit_try_run_case+0x170/0x3f0 [ 17.996060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.996116] kthread+0x328/0x630 [ 17.996160] ret_from_fork+0x10/0x20 [ 17.997084] [ 17.997112] Allocated by task 184: [ 17.997188] kasan_save_stack+0x3c/0x68 [ 17.997481] kasan_save_track+0x20/0x40 [ 17.997627] kasan_save_alloc_info+0x40/0x58 [ 17.997826] __kasan_kmalloc+0xd4/0xd8 [ 17.997962] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.998069] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 17.998186] kunit_try_run_case+0x170/0x3f0 [ 17.998573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.998720] kthread+0x328/0x630 [ 17.998820] ret_from_fork+0x10/0x20 [ 17.998981] [ 17.999059] The buggy address belongs to the object at fff00000c59d5b80 [ 17.999059] which belongs to the cache kmalloc-64 of size 64 [ 17.999164] The buggy address is located 4 bytes inside of [ 17.999164] allocated 64-byte region [fff00000c59d5b80, fff00000c59d5bc0) [ 17.999302] [ 17.999343] The buggy address belongs to the physical page: [ 17.999410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d5 [ 17.999860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.000009] page_type: f5(slab) [ 18.000109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.000161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.000379] page dumped because: kasan: bad access detected [ 18.000583] [ 18.000609] Memory state around the buggy address: [ 18.000824] fff00000c59d5a80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.000937] fff00000c59d5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.001036] >fff00000c59d5b80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.001255] ^ [ 18.001360] fff00000c59d5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.001450] fff00000c59d5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.001572] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 17.975319] ================================================================== [ 17.975422] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.975571] Read of size 18446744073709551614 at addr fff00000c59d5984 by task kunit_try_catch/182 [ 17.975798] [ 17.976013] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.976137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.976172] Hardware name: linux,dummy-virt (DT) [ 17.976201] Call trace: [ 17.976324] show_stack+0x20/0x38 (C) [ 17.976379] dump_stack_lvl+0x8c/0xd0 [ 17.976425] print_report+0x118/0x5d0 [ 17.976467] kasan_report+0xdc/0x128 [ 17.976860] kasan_check_range+0x100/0x1a8 [ 17.976935] __asan_memmove+0x3c/0x98 [ 17.977429] kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.977506] kunit_try_run_case+0x170/0x3f0 [ 17.977763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.978044] kthread+0x328/0x630 [ 17.978233] ret_from_fork+0x10/0x20 [ 17.978863] [ 17.979022] Allocated by task 182: [ 17.979242] kasan_save_stack+0x3c/0x68 [ 17.979361] kasan_save_track+0x20/0x40 [ 17.979420] kasan_save_alloc_info+0x40/0x58 [ 17.979495] __kasan_kmalloc+0xd4/0xd8 [ 17.979657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.980095] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 17.980283] kunit_try_run_case+0x170/0x3f0 [ 17.980383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.980528] kthread+0x328/0x630 [ 17.980608] ret_from_fork+0x10/0x20 [ 17.980712] [ 17.980789] The buggy address belongs to the object at fff00000c59d5980 [ 17.980789] which belongs to the cache kmalloc-64 of size 64 [ 17.981023] The buggy address is located 4 bytes inside of [ 17.981023] 64-byte region [fff00000c59d5980, fff00000c59d59c0) [ 17.981193] [ 17.981331] The buggy address belongs to the physical page: [ 17.981369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d5 [ 17.981448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.981776] page_type: f5(slab) [ 17.981952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.982034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.982215] page dumped because: kasan: bad access detected [ 17.982424] [ 17.982471] Memory state around the buggy address: [ 17.982774] fff00000c59d5880: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 17.983244] fff00000c59d5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.983421] >fff00000c59d5980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 17.983481] ^ [ 17.983839] fff00000c59d5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.984058] fff00000c59d5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.984337] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 17.962809] ================================================================== [ 17.962904] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 17.962965] Write of size 16 at addr fff00000c59e4169 by task kunit_try_catch/180 [ 17.963015] [ 17.963045] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.963505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.963549] Hardware name: linux,dummy-virt (DT) [ 17.963609] Call trace: [ 17.963634] show_stack+0x20/0x38 (C) [ 17.963786] dump_stack_lvl+0x8c/0xd0 [ 17.963838] print_report+0x118/0x5d0 [ 17.963881] kasan_report+0xdc/0x128 [ 17.964055] kasan_check_range+0x100/0x1a8 [ 17.964163] __asan_memset+0x34/0x78 [ 17.964238] kmalloc_oob_memset_16+0x150/0x2f8 [ 17.964287] kunit_try_run_case+0x170/0x3f0 [ 17.964738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.964832] kthread+0x328/0x630 [ 17.964878] ret_from_fork+0x10/0x20 [ 17.965046] [ 17.965108] Allocated by task 180: [ 17.965155] kasan_save_stack+0x3c/0x68 [ 17.965509] kasan_save_track+0x20/0x40 [ 17.965632] kasan_save_alloc_info+0x40/0x58 [ 17.965737] __kasan_kmalloc+0xd4/0xd8 [ 17.965828] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.965975] kmalloc_oob_memset_16+0xb0/0x2f8 [ 17.966068] kunit_try_run_case+0x170/0x3f0 [ 17.966190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.966248] kthread+0x328/0x630 [ 17.966283] ret_from_fork+0x10/0x20 [ 17.966324] [ 17.966503] The buggy address belongs to the object at fff00000c59e4100 [ 17.966503] which belongs to the cache kmalloc-128 of size 128 [ 17.966732] The buggy address is located 105 bytes inside of [ 17.966732] allocated 120-byte region [fff00000c59e4100, fff00000c59e4178) [ 17.966923] [ 17.966971] The buggy address belongs to the physical page: [ 17.967078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 17.967242] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.967294] page_type: f5(slab) [ 17.967539] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.967735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.967786] page dumped because: kasan: bad access detected [ 17.967818] [ 17.967836] Memory state around the buggy address: [ 17.967868] fff00000c59e4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.967911] fff00000c59e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.967953] >fff00000c59e4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.967990] ^ [ 17.968032] fff00000c59e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.968074] fff00000c59e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.968112] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 17.924055] ================================================================== [ 17.924341] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 17.924406] Write of size 4 at addr fff00000c59e4075 by task kunit_try_catch/176 [ 17.924483] [ 17.924532] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.924750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.924787] Hardware name: linux,dummy-virt (DT) [ 17.924858] Call trace: [ 17.924908] show_stack+0x20/0x38 (C) [ 17.925169] dump_stack_lvl+0x8c/0xd0 [ 17.925250] print_report+0x118/0x5d0 [ 17.925295] kasan_report+0xdc/0x128 [ 17.925634] kasan_check_range+0x100/0x1a8 [ 17.925789] __asan_memset+0x34/0x78 [ 17.925891] kmalloc_oob_memset_4+0x150/0x300 [ 17.925978] kunit_try_run_case+0x170/0x3f0 [ 17.926079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.926132] kthread+0x328/0x630 [ 17.926177] ret_from_fork+0x10/0x20 [ 17.926235] [ 17.926254] Allocated by task 176: [ 17.926611] kasan_save_stack+0x3c/0x68 [ 17.926698] kasan_save_track+0x20/0x40 [ 17.926874] kasan_save_alloc_info+0x40/0x58 [ 17.926962] __kasan_kmalloc+0xd4/0xd8 [ 17.927115] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.927188] kmalloc_oob_memset_4+0xb0/0x300 [ 17.927393] kunit_try_run_case+0x170/0x3f0 [ 17.927573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.927677] kthread+0x328/0x630 [ 17.927759] ret_from_fork+0x10/0x20 [ 17.927891] [ 17.927981] The buggy address belongs to the object at fff00000c59e4000 [ 17.927981] which belongs to the cache kmalloc-128 of size 128 [ 17.928130] The buggy address is located 117 bytes inside of [ 17.928130] allocated 120-byte region [fff00000c59e4000, fff00000c59e4078) [ 17.928370] [ 17.928519] The buggy address belongs to the physical page: [ 17.928627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 17.928704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.928871] page_type: f5(slab) [ 17.928952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.929093] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.929135] page dumped because: kasan: bad access detected [ 17.929339] [ 17.929429] Memory state around the buggy address: [ 17.929600] fff00000c59e3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.929735] fff00000c59e3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.929818] >fff00000c59e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.929882] ^ [ 17.930034] fff00000c59e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.930099] fff00000c59e4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.930143] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 17.905096] ================================================================== [ 17.905171] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 17.905240] Write of size 2 at addr fff00000c47f9f77 by task kunit_try_catch/174 [ 17.905431] [ 17.905947] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.906135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.906165] Hardware name: linux,dummy-virt (DT) [ 17.906239] Call trace: [ 17.906428] show_stack+0x20/0x38 (C) [ 17.906642] dump_stack_lvl+0x8c/0xd0 [ 17.906859] print_report+0x118/0x5d0 [ 17.907003] kasan_report+0xdc/0x128 [ 17.907144] kasan_check_range+0x100/0x1a8 [ 17.907260] __asan_memset+0x34/0x78 [ 17.907329] kmalloc_oob_memset_2+0x150/0x2f8 [ 17.907588] kunit_try_run_case+0x170/0x3f0 [ 17.907923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.908226] kthread+0x328/0x630 [ 17.908470] ret_from_fork+0x10/0x20 [ 17.908757] [ 17.908818] Allocated by task 174: [ 17.908868] kasan_save_stack+0x3c/0x68 [ 17.909037] kasan_save_track+0x20/0x40 [ 17.909288] kasan_save_alloc_info+0x40/0x58 [ 17.909338] __kasan_kmalloc+0xd4/0xd8 [ 17.909508] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.909603] kmalloc_oob_memset_2+0xb0/0x2f8 [ 17.909771] kunit_try_run_case+0x170/0x3f0 [ 17.909923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.910031] kthread+0x328/0x630 [ 17.910369] ret_from_fork+0x10/0x20 [ 17.910494] [ 17.910563] The buggy address belongs to the object at fff00000c47f9f00 [ 17.910563] which belongs to the cache kmalloc-128 of size 128 [ 17.910733] The buggy address is located 119 bytes inside of [ 17.910733] allocated 120-byte region [fff00000c47f9f00, fff00000c47f9f78) [ 17.910830] [ 17.911050] The buggy address belongs to the physical page: [ 17.911305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9 [ 17.911400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.911720] page_type: f5(slab) [ 17.911769] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.911981] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.912447] page dumped because: kasan: bad access detected [ 17.912666] [ 17.912909] Memory state around the buggy address: [ 17.912970] fff00000c47f9e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.913369] fff00000c47f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.913522] >fff00000c47f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.913563] ^ [ 17.913607] fff00000c47f9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.913694] fff00000c47fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.913744] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 17.887075] ================================================================== [ 17.887150] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 17.887262] Write of size 128 at addr fff00000c47f9e00 by task kunit_try_catch/172 [ 17.887451] [ 17.887494] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.887577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.887603] Hardware name: linux,dummy-virt (DT) [ 17.887949] Call trace: [ 17.888123] show_stack+0x20/0x38 (C) [ 17.888260] dump_stack_lvl+0x8c/0xd0 [ 17.888349] print_report+0x118/0x5d0 [ 17.888425] kasan_report+0xdc/0x128 [ 17.888522] kasan_check_range+0x100/0x1a8 [ 17.888589] __asan_memset+0x34/0x78 [ 17.888633] kmalloc_oob_in_memset+0x144/0x2d0 [ 17.888814] kunit_try_run_case+0x170/0x3f0 [ 17.888869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.888921] kthread+0x328/0x630 [ 17.888966] ret_from_fork+0x10/0x20 [ 17.889331] [ 17.889417] Allocated by task 172: [ 17.889523] kasan_save_stack+0x3c/0x68 [ 17.889589] kasan_save_track+0x20/0x40 [ 17.889625] kasan_save_alloc_info+0x40/0x58 [ 17.889670] __kasan_kmalloc+0xd4/0xd8 [ 17.889704] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.889974] kmalloc_oob_in_memset+0xb0/0x2d0 [ 17.890164] kunit_try_run_case+0x170/0x3f0 [ 17.890341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.890438] kthread+0x328/0x630 [ 17.890522] ret_from_fork+0x10/0x20 [ 17.890647] [ 17.890668] The buggy address belongs to the object at fff00000c47f9e00 [ 17.890668] which belongs to the cache kmalloc-128 of size 128 [ 17.890781] The buggy address is located 0 bytes inside of [ 17.890781] allocated 120-byte region [fff00000c47f9e00, fff00000c47f9e78) [ 17.890992] [ 17.891049] The buggy address belongs to the physical page: [ 17.891241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9 [ 17.891346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.891410] page_type: f5(slab) [ 17.891447] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.891560] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.891619] page dumped because: kasan: bad access detected [ 17.891658] [ 17.891677] Memory state around the buggy address: [ 17.891717] fff00000c47f9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.891769] fff00000c47f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.891822] >fff00000c47f9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.891860] ^ [ 17.891901] fff00000c47f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.891942] fff00000c47f9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.891990] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 17.864806] ================================================================== [ 17.864868] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 17.865571] Read of size 16 at addr fff00000c45d8b20 by task kunit_try_catch/170 [ 17.865708] [ 17.865933] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.866451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.866487] Hardware name: linux,dummy-virt (DT) [ 17.866520] Call trace: [ 17.866556] show_stack+0x20/0x38 (C) [ 17.866633] dump_stack_lvl+0x8c/0xd0 [ 17.866688] print_report+0x118/0x5d0 [ 17.866744] kasan_report+0xdc/0x128 [ 17.866788] __asan_report_load16_noabort+0x20/0x30 [ 17.866855] kmalloc_uaf_16+0x3bc/0x438 [ 17.866902] kunit_try_run_case+0x170/0x3f0 [ 17.866949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.867013] kthread+0x328/0x630 [ 17.867059] ret_from_fork+0x10/0x20 [ 17.867124] [ 17.867143] Allocated by task 170: [ 17.867170] kasan_save_stack+0x3c/0x68 [ 17.867390] kasan_save_track+0x20/0x40 [ 17.867787] kasan_save_alloc_info+0x40/0x58 [ 17.867971] __kasan_kmalloc+0xd4/0xd8 [ 17.868305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.868389] kmalloc_uaf_16+0x140/0x438 [ 17.868922] kunit_try_run_case+0x170/0x3f0 [ 17.869016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.869353] kthread+0x328/0x630 [ 17.869447] ret_from_fork+0x10/0x20 [ 17.869532] [ 17.869700] Freed by task 170: [ 17.869728] kasan_save_stack+0x3c/0x68 [ 17.869939] kasan_save_track+0x20/0x40 [ 17.870024] kasan_save_free_info+0x4c/0x78 [ 17.870064] __kasan_slab_free+0x6c/0x98 [ 17.870100] kfree+0x214/0x3c8 [ 17.870132] kmalloc_uaf_16+0x190/0x438 [ 17.870170] kunit_try_run_case+0x170/0x3f0 [ 17.870218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.870631] kthread+0x328/0x630 [ 17.870718] ret_from_fork+0x10/0x20 [ 17.870972] [ 17.871095] The buggy address belongs to the object at fff00000c45d8b20 [ 17.871095] which belongs to the cache kmalloc-16 of size 16 [ 17.871570] The buggy address is located 0 bytes inside of [ 17.871570] freed 16-byte region [fff00000c45d8b20, fff00000c45d8b30) [ 17.871694] [ 17.871753] The buggy address belongs to the physical page: [ 17.871785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 17.872019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.872330] page_type: f5(slab) [ 17.872398] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.872787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.872880] page dumped because: kasan: bad access detected [ 17.872961] [ 17.873152] Memory state around the buggy address: [ 17.873449] fff00000c45d8a00: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc [ 17.873626] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.873751] >fff00000c45d8b00: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 17.873793] ^ [ 17.873825] fff00000c45d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.873988] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.874059] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 17.822714] ================================================================== [ 17.822768] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 17.823301] Read of size 1 at addr fff00000c1c50400 by task kunit_try_catch/166 [ 17.823752] [ 17.823857] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.823969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.824066] Hardware name: linux,dummy-virt (DT) [ 17.824104] Call trace: [ 17.824142] show_stack+0x20/0x38 (C) [ 17.824223] dump_stack_lvl+0x8c/0xd0 [ 17.824272] print_report+0x118/0x5d0 [ 17.824608] kasan_report+0xdc/0x128 [ 17.824698] __asan_report_load1_noabort+0x20/0x30 [ 17.824753] krealloc_uaf+0x4c8/0x520 [ 17.824829] kunit_try_run_case+0x170/0x3f0 [ 17.824959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.825013] kthread+0x328/0x630 [ 17.825057] ret_from_fork+0x10/0x20 [ 17.825103] [ 17.825121] Allocated by task 166: [ 17.825147] kasan_save_stack+0x3c/0x68 [ 17.825185] kasan_save_track+0x20/0x40 [ 17.825383] kasan_save_alloc_info+0x40/0x58 [ 17.825641] __kasan_kmalloc+0xd4/0xd8 [ 17.825795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.825893] krealloc_uaf+0xc8/0x520 [ 17.826013] kunit_try_run_case+0x170/0x3f0 [ 17.826055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.826100] kthread+0x328/0x630 [ 17.826141] ret_from_fork+0x10/0x20 [ 17.826314] [ 17.826338] Freed by task 166: [ 17.826517] kasan_save_stack+0x3c/0x68 [ 17.826575] kasan_save_track+0x20/0x40 [ 17.826612] kasan_save_free_info+0x4c/0x78 [ 17.826660] __kasan_slab_free+0x6c/0x98 [ 17.826696] kfree+0x214/0x3c8 [ 17.826741] krealloc_uaf+0x12c/0x520 [ 17.826777] kunit_try_run_case+0x170/0x3f0 [ 17.826815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.826868] kthread+0x328/0x630 [ 17.826902] ret_from_fork+0x10/0x20 [ 17.826945] [ 17.826964] The buggy address belongs to the object at fff00000c1c50400 [ 17.826964] which belongs to the cache kmalloc-256 of size 256 [ 17.827032] The buggy address is located 0 bytes inside of [ 17.827032] freed 256-byte region [fff00000c1c50400, fff00000c1c50500) [ 17.827102] [ 17.827121] The buggy address belongs to the physical page: [ 17.827152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50 [ 17.827236] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.827313] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.827576] page_type: f5(slab) [ 17.827887] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.828097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.828159] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.828305] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.828410] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff [ 17.828687] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.828864] page dumped because: kasan: bad access detected [ 17.828962] [ 17.829039] Memory state around the buggy address: [ 17.829109] fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.829194] fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.829353] >fff00000c1c50400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.829566] ^ [ 17.829665] fff00000c1c50480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.829829] fff00000c1c50500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.829950] ================================================================== [ 17.808940] ================================================================== [ 17.809004] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 17.809057] Read of size 1 at addr fff00000c1c50400 by task kunit_try_catch/166 [ 17.809128] [ 17.809159] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.809961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.810050] Hardware name: linux,dummy-virt (DT) [ 17.810219] Call trace: [ 17.810302] show_stack+0x20/0x38 (C) [ 17.810377] dump_stack_lvl+0x8c/0xd0 [ 17.810700] print_report+0x118/0x5d0 [ 17.810865] kasan_report+0xdc/0x128 [ 17.811019] __kasan_check_byte+0x54/0x70 [ 17.811585] krealloc_noprof+0x44/0x360 [ 17.811870] krealloc_uaf+0x180/0x520 [ 17.812088] kunit_try_run_case+0x170/0x3f0 [ 17.812437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.813060] kthread+0x328/0x630 [ 17.813434] ret_from_fork+0x10/0x20 [ 17.813533] [ 17.813553] Allocated by task 166: [ 17.813581] kasan_save_stack+0x3c/0x68 [ 17.813621] kasan_save_track+0x20/0x40 [ 17.813666] kasan_save_alloc_info+0x40/0x58 [ 17.814144] __kasan_kmalloc+0xd4/0xd8 [ 17.814377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.814574] krealloc_uaf+0xc8/0x520 [ 17.814615] kunit_try_run_case+0x170/0x3f0 [ 17.814665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.814726] kthread+0x328/0x630 [ 17.814763] ret_from_fork+0x10/0x20 [ 17.814813] [ 17.814833] Freed by task 166: [ 17.814872] kasan_save_stack+0x3c/0x68 [ 17.814908] kasan_save_track+0x20/0x40 [ 17.814952] kasan_save_free_info+0x4c/0x78 [ 17.814990] __kasan_slab_free+0x6c/0x98 [ 17.815031] kfree+0x214/0x3c8 [ 17.815062] krealloc_uaf+0x12c/0x520 [ 17.815104] kunit_try_run_case+0x170/0x3f0 [ 17.815152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.815196] kthread+0x328/0x630 [ 17.815243] ret_from_fork+0x10/0x20 [ 17.815481] [ 17.815915] The buggy address belongs to the object at fff00000c1c50400 [ 17.815915] which belongs to the cache kmalloc-256 of size 256 [ 17.816405] The buggy address is located 0 bytes inside of [ 17.816405] freed 256-byte region [fff00000c1c50400, fff00000c1c50500) [ 17.816808] [ 17.816903] The buggy address belongs to the physical page: [ 17.816981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50 [ 17.817037] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.817423] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.817537] page_type: f5(slab) [ 17.817593] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.817769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.818114] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.818255] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.818309] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff [ 17.818424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.818578] page dumped because: kasan: bad access detected [ 17.818820] [ 17.818845] Memory state around the buggy address: [ 17.819014] fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.819283] fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.819479] >fff00000c1c50400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.819686] ^ [ 17.819740] fff00000c1c50480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.819896] fff00000c1c50500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.820157] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 17.798282] ================================================================== [ 17.798471] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.798579] Write of size 1 at addr fff00000c78860eb by task kunit_try_catch/164 [ 17.798783] [ 17.798961] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.799054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.799080] Hardware name: linux,dummy-virt (DT) [ 17.799574] Call trace: [ 17.799640] show_stack+0x20/0x38 (C) [ 17.799833] dump_stack_lvl+0x8c/0xd0 [ 17.799950] print_report+0x118/0x5d0 [ 17.800036] kasan_report+0xdc/0x128 [ 17.800081] __asan_report_store1_noabort+0x20/0x30 [ 17.800320] krealloc_less_oob_helper+0xa58/0xc50 [ 17.800372] krealloc_large_less_oob+0x20/0x38 [ 17.800426] kunit_try_run_case+0x170/0x3f0 [ 17.800619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.800689] kthread+0x328/0x630 [ 17.800810] ret_from_fork+0x10/0x20 [ 17.800866] [ 17.800914] The buggy address belongs to the physical page: [ 17.800952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 17.801012] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.801059] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.801354] page_type: f8(unknown) [ 17.801503] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.801608] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.801721] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.801842] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.801893] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff [ 17.801942] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.801983] page dumped because: kasan: bad access detected [ 17.802162] [ 17.802362] Memory state around the buggy address: [ 17.802482] fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.802542] fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.802585] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.802629] ^ [ 17.802679] fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.802721] fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.802759] ================================================================== [ 17.784985] ================================================================== [ 17.785091] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.785166] Write of size 1 at addr fff00000c78860da by task kunit_try_catch/164 [ 17.785228] [ 17.785257] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.785581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.785944] Hardware name: linux,dummy-virt (DT) [ 17.786150] Call trace: [ 17.786232] show_stack+0x20/0x38 (C) [ 17.786377] dump_stack_lvl+0x8c/0xd0 [ 17.786464] print_report+0x118/0x5d0 [ 17.786587] kasan_report+0xdc/0x128 [ 17.786652] __asan_report_store1_noabort+0x20/0x30 [ 17.786723] krealloc_less_oob_helper+0xa80/0xc50 [ 17.786949] krealloc_large_less_oob+0x20/0x38 [ 17.787186] kunit_try_run_case+0x170/0x3f0 [ 17.787265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.787376] kthread+0x328/0x630 [ 17.787424] ret_from_fork+0x10/0x20 [ 17.787485] [ 17.787515] The buggy address belongs to the physical page: [ 17.787546] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 17.787599] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.787646] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.787696] page_type: f8(unknown) [ 17.787742] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.787815] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.787865] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.787913] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.787977] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff [ 17.788033] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.788082] page dumped because: kasan: bad access detected [ 17.788114] [ 17.788131] Memory state around the buggy address: [ 17.788161] fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.788232] fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.788274] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.788312] ^ [ 17.788348] fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.788390] fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.788427] ================================================================== [ 17.715390] ================================================================== [ 17.715441] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.715486] Write of size 1 at addr fff00000c1c502da by task kunit_try_catch/160 [ 17.715536] [ 17.715564] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.715642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.715668] Hardware name: linux,dummy-virt (DT) [ 17.715895] Call trace: [ 17.715941] show_stack+0x20/0x38 (C) [ 17.715993] dump_stack_lvl+0x8c/0xd0 [ 17.716040] print_report+0x118/0x5d0 [ 17.716083] kasan_report+0xdc/0x128 [ 17.716126] __asan_report_store1_noabort+0x20/0x30 [ 17.716175] krealloc_less_oob_helper+0xa80/0xc50 [ 17.716237] krealloc_less_oob+0x20/0x38 [ 17.716280] kunit_try_run_case+0x170/0x3f0 [ 17.716327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.716380] kthread+0x328/0x630 [ 17.716427] ret_from_fork+0x10/0x20 [ 17.716474] [ 17.716492] Allocated by task 160: [ 17.716536] kasan_save_stack+0x3c/0x68 [ 17.716580] kasan_save_track+0x20/0x40 [ 17.716615] kasan_save_alloc_info+0x40/0x58 [ 17.716653] __kasan_krealloc+0x118/0x178 [ 17.716696] krealloc_noprof+0x128/0x360 [ 17.716736] krealloc_less_oob_helper+0x168/0xc50 [ 17.716773] krealloc_less_oob+0x20/0x38 [ 17.716806] kunit_try_run_case+0x170/0x3f0 [ 17.716843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.716896] kthread+0x328/0x630 [ 17.716930] ret_from_fork+0x10/0x20 [ 17.716964] [ 17.716981] The buggy address belongs to the object at fff00000c1c50200 [ 17.716981] which belongs to the cache kmalloc-256 of size 256 [ 17.717038] The buggy address is located 17 bytes to the right of [ 17.717038] allocated 201-byte region [fff00000c1c50200, fff00000c1c502c9) [ 17.717102] [ 17.717121] The buggy address belongs to the physical page: [ 17.717151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50 [ 17.717212] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.717488] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.717584] page_type: f5(slab) [ 17.717622] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.717673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.718419] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.718574] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.718922] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff [ 17.719115] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.719234] page dumped because: kasan: bad access detected [ 17.719348] [ 17.719421] Memory state around the buggy address: [ 17.719473] fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.719534] fff00000c1c50200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.720131] >fff00000c1c50280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.720310] ^ [ 17.720388] fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.720448] fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.720692] ================================================================== [ 17.779301] ================================================================== [ 17.779355] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.779400] Write of size 1 at addr fff00000c78860d0 by task kunit_try_catch/164 [ 17.779518] [ 17.779576] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.779656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.779727] Hardware name: linux,dummy-virt (DT) [ 17.779758] Call trace: [ 17.779780] show_stack+0x20/0x38 (C) [ 17.780022] dump_stack_lvl+0x8c/0xd0 [ 17.780103] print_report+0x118/0x5d0 [ 17.780320] kasan_report+0xdc/0x128 [ 17.780381] __asan_report_store1_noabort+0x20/0x30 [ 17.780438] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.780580] krealloc_large_less_oob+0x20/0x38 [ 17.780656] kunit_try_run_case+0x170/0x3f0 [ 17.780705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.780973] kthread+0x328/0x630 [ 17.781249] ret_from_fork+0x10/0x20 [ 17.781403] [ 17.781478] The buggy address belongs to the physical page: [ 17.781509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 17.781562] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.781768] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.781828] page_type: f8(unknown) [ 17.782299] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.782435] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.782788] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.782920] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.783023] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff [ 17.783121] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.783251] page dumped because: kasan: bad access detected [ 17.783310] [ 17.783328] Memory state around the buggy address: [ 17.783360] fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.783757] fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.783876] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.783987] ^ [ 17.784126] fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.784194] fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.784250] ================================================================== [ 17.772421] ================================================================== [ 17.772481] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.772540] Write of size 1 at addr fff00000c78860c9 by task kunit_try_catch/164 [ 17.772672] [ 17.772816] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.773084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.773152] Hardware name: linux,dummy-virt (DT) [ 17.773201] Call trace: [ 17.773278] show_stack+0x20/0x38 (C) [ 17.773347] dump_stack_lvl+0x8c/0xd0 [ 17.773773] print_report+0x118/0x5d0 [ 17.773967] kasan_report+0xdc/0x128 [ 17.774076] __asan_report_store1_noabort+0x20/0x30 [ 17.774211] krealloc_less_oob_helper+0xa48/0xc50 [ 17.774362] krealloc_large_less_oob+0x20/0x38 [ 17.774575] kunit_try_run_case+0x170/0x3f0 [ 17.774967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.775188] kthread+0x328/0x630 [ 17.775333] ret_from_fork+0x10/0x20 [ 17.775499] [ 17.775554] The buggy address belongs to the physical page: [ 17.775653] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 17.775897] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.776149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.776277] page_type: f8(unknown) [ 17.776385] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.776546] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.776707] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.776761] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.776850] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff [ 17.777033] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.777276] page dumped because: kasan: bad access detected [ 17.777384] [ 17.777452] Memory state around the buggy address: [ 17.777567] fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.777629] fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.777678] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.777723] ^ [ 17.777758] fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.778011] fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.778161] ================================================================== [ 17.722176] ================================================================== [ 17.722239] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.722453] Write of size 1 at addr fff00000c1c502ea by task kunit_try_catch/160 [ 17.722675] [ 17.722725] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.723166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.723586] Hardware name: linux,dummy-virt (DT) [ 17.723630] Call trace: [ 17.723662] show_stack+0x20/0x38 (C) [ 17.723715] dump_stack_lvl+0x8c/0xd0 [ 17.723761] print_report+0x118/0x5d0 [ 17.723804] kasan_report+0xdc/0x128 [ 17.723847] __asan_report_store1_noabort+0x20/0x30 [ 17.724231] krealloc_less_oob_helper+0xae4/0xc50 [ 17.724527] krealloc_less_oob+0x20/0x38 [ 17.724683] kunit_try_run_case+0x170/0x3f0 [ 17.724743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.724797] kthread+0x328/0x630 [ 17.724842] ret_from_fork+0x10/0x20 [ 17.724888] [ 17.724906] Allocated by task 160: [ 17.724932] kasan_save_stack+0x3c/0x68 [ 17.725387] kasan_save_track+0x20/0x40 [ 17.725550] kasan_save_alloc_info+0x40/0x58 [ 17.725626] __kasan_krealloc+0x118/0x178 [ 17.725662] krealloc_noprof+0x128/0x360 [ 17.725958] krealloc_less_oob_helper+0x168/0xc50 [ 17.726082] krealloc_less_oob+0x20/0x38 [ 17.726247] kunit_try_run_case+0x170/0x3f0 [ 17.726463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.726630] kthread+0x328/0x630 [ 17.726709] ret_from_fork+0x10/0x20 [ 17.726785] [ 17.726869] The buggy address belongs to the object at fff00000c1c50200 [ 17.726869] which belongs to the cache kmalloc-256 of size 256 [ 17.726961] The buggy address is located 33 bytes to the right of [ 17.726961] allocated 201-byte region [fff00000c1c50200, fff00000c1c502c9) [ 17.727116] [ 17.727157] The buggy address belongs to the physical page: [ 17.727325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50 [ 17.727606] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.727861] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.728082] page_type: f5(slab) [ 17.728159] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.728317] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.728372] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.728876] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.728984] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff [ 17.729340] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.729536] page dumped because: kasan: bad access detected [ 17.729650] [ 17.729670] Memory state around the buggy address: [ 17.729703] fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.729762] fff00000c1c50200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.729810] >fff00000c1c50280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.729992] ^ [ 17.730227] fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.730294] fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.730476] ================================================================== [ 17.791009] ================================================================== [ 17.791062] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.791108] Write of size 1 at addr fff00000c78860ea by task kunit_try_catch/164 [ 17.791238] [ 17.791305] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.791451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.791479] Hardware name: linux,dummy-virt (DT) [ 17.791736] Call trace: [ 17.791804] show_stack+0x20/0x38 (C) [ 17.791857] dump_stack_lvl+0x8c/0xd0 [ 17.791994] print_report+0x118/0x5d0 [ 17.792042] kasan_report+0xdc/0x128 [ 17.792356] __asan_report_store1_noabort+0x20/0x30 [ 17.792434] krealloc_less_oob_helper+0xae4/0xc50 [ 17.792515] krealloc_large_less_oob+0x20/0x38 [ 17.792573] kunit_try_run_case+0x170/0x3f0 [ 17.792922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.793001] kthread+0x328/0x630 [ 17.793295] ret_from_fork+0x10/0x20 [ 17.793549] [ 17.793574] The buggy address belongs to the physical page: [ 17.793612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 17.794070] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.794180] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.794358] page_type: f8(unknown) [ 17.794594] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.794721] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.794832] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.795251] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.795655] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff [ 17.795904] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.796069] page dumped because: kasan: bad access detected [ 17.796171] [ 17.796285] Memory state around the buggy address: [ 17.796320] fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.796483] fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.796770] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.796948] ^ [ 17.797155] fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.797284] fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.797324] ================================================================== [ 17.694056] ================================================================== [ 17.694223] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.694311] Write of size 1 at addr fff00000c1c502c9 by task kunit_try_catch/160 [ 17.694362] [ 17.694779] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.694875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.694900] Hardware name: linux,dummy-virt (DT) [ 17.694930] Call trace: [ 17.694950] show_stack+0x20/0x38 (C) [ 17.695270] dump_stack_lvl+0x8c/0xd0 [ 17.695607] print_report+0x118/0x5d0 [ 17.695731] kasan_report+0xdc/0x128 [ 17.695810] __asan_report_store1_noabort+0x20/0x30 [ 17.695872] krealloc_less_oob_helper+0xa48/0xc50 [ 17.696144] krealloc_less_oob+0x20/0x38 [ 17.696225] kunit_try_run_case+0x170/0x3f0 [ 17.696547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.696625] kthread+0x328/0x630 [ 17.696673] ret_from_fork+0x10/0x20 [ 17.696721] [ 17.696740] Allocated by task 160: [ 17.696766] kasan_save_stack+0x3c/0x68 [ 17.697303] kasan_save_track+0x20/0x40 [ 17.697361] kasan_save_alloc_info+0x40/0x58 [ 17.697656] __kasan_krealloc+0x118/0x178 [ 17.697809] krealloc_noprof+0x128/0x360 [ 17.697860] krealloc_less_oob_helper+0x168/0xc50 [ 17.697898] krealloc_less_oob+0x20/0x38 [ 17.697938] kunit_try_run_case+0x170/0x3f0 [ 17.697977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.698272] kthread+0x328/0x630 [ 17.698395] ret_from_fork+0x10/0x20 [ 17.698528] [ 17.698597] The buggy address belongs to the object at fff00000c1c50200 [ 17.698597] which belongs to the cache kmalloc-256 of size 256 [ 17.698810] The buggy address is located 0 bytes to the right of [ 17.698810] allocated 201-byte region [fff00000c1c50200, fff00000c1c502c9) [ 17.699094] [ 17.699141] The buggy address belongs to the physical page: [ 17.699175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50 [ 17.699364] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.699603] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.699706] page_type: f5(slab) [ 17.699834] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.699886] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.700266] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.700376] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.700602] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff [ 17.700792] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.700991] page dumped because: kasan: bad access detected [ 17.701169] [ 17.701413] Memory state around the buggy address: [ 17.701548] fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.701597] fff00000c1c50200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.701641] >fff00000c1c50280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.702071] ^ [ 17.702278] fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.702529] fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.702633] ================================================================== [ 17.732110] ================================================================== [ 17.732231] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.732463] Write of size 1 at addr fff00000c1c502eb by task kunit_try_catch/160 [ 17.732543] [ 17.732590] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.732679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.733027] Hardware name: linux,dummy-virt (DT) [ 17.733163] Call trace: [ 17.733188] show_stack+0x20/0x38 (C) [ 17.733251] dump_stack_lvl+0x8c/0xd0 [ 17.733747] print_report+0x118/0x5d0 [ 17.734006] kasan_report+0xdc/0x128 [ 17.734134] __asan_report_store1_noabort+0x20/0x30 [ 17.734371] krealloc_less_oob_helper+0xa58/0xc50 [ 17.734900] krealloc_less_oob+0x20/0x38 [ 17.734974] kunit_try_run_case+0x170/0x3f0 [ 17.735385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.735819] kthread+0x328/0x630 [ 17.735947] ret_from_fork+0x10/0x20 [ 17.736016] [ 17.736035] Allocated by task 160: [ 17.736138] kasan_save_stack+0x3c/0x68 [ 17.736587] kasan_save_track+0x20/0x40 [ 17.736788] kasan_save_alloc_info+0x40/0x58 [ 17.737014] __kasan_krealloc+0x118/0x178 [ 17.737281] krealloc_noprof+0x128/0x360 [ 17.737470] krealloc_less_oob_helper+0x168/0xc50 [ 17.737555] krealloc_less_oob+0x20/0x38 [ 17.737679] kunit_try_run_case+0x170/0x3f0 [ 17.737732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.737945] kthread+0x328/0x630 [ 17.738316] ret_from_fork+0x10/0x20 [ 17.738394] [ 17.738432] The buggy address belongs to the object at fff00000c1c50200 [ 17.738432] which belongs to the cache kmalloc-256 of size 256 [ 17.738827] The buggy address is located 34 bytes to the right of [ 17.738827] allocated 201-byte region [fff00000c1c50200, fff00000c1c502c9) [ 17.738972] [ 17.738993] The buggy address belongs to the physical page: [ 17.739035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50 [ 17.739348] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.739544] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.739603] page_type: f5(slab) [ 17.739640] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.739721] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.739780] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.739849] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.739899] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff [ 17.739962] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.740017] page dumped because: kasan: bad access detected [ 17.740056] [ 17.740081] Memory state around the buggy address: [ 17.740113] fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.740156] fff00000c1c50200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.740198] >fff00000c1c50280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.740254] ^ [ 17.740300] fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.740343] fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.740387] ================================================================== [ 17.704871] ================================================================== [ 17.704926] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.704972] Write of size 1 at addr fff00000c1c502d0 by task kunit_try_catch/160 [ 17.705021] [ 17.705351] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.705561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.705684] Hardware name: linux,dummy-virt (DT) [ 17.705720] Call trace: [ 17.705913] show_stack+0x20/0x38 (C) [ 17.706114] dump_stack_lvl+0x8c/0xd0 [ 17.706260] print_report+0x118/0x5d0 [ 17.706357] kasan_report+0xdc/0x128 [ 17.706585] __asan_report_store1_noabort+0x20/0x30 [ 17.706777] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.706828] krealloc_less_oob+0x20/0x38 [ 17.707245] kunit_try_run_case+0x170/0x3f0 [ 17.707310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.707878] kthread+0x328/0x630 [ 17.708049] ret_from_fork+0x10/0x20 [ 17.708264] [ 17.708322] Allocated by task 160: [ 17.708411] kasan_save_stack+0x3c/0x68 [ 17.708597] kasan_save_track+0x20/0x40 [ 17.708823] kasan_save_alloc_info+0x40/0x58 [ 17.708920] __kasan_krealloc+0x118/0x178 [ 17.709007] krealloc_noprof+0x128/0x360 [ 17.709063] krealloc_less_oob_helper+0x168/0xc50 [ 17.709288] krealloc_less_oob+0x20/0x38 [ 17.709562] kunit_try_run_case+0x170/0x3f0 [ 17.709703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.709800] kthread+0x328/0x630 [ 17.709903] ret_from_fork+0x10/0x20 [ 17.710119] [ 17.710282] The buggy address belongs to the object at fff00000c1c50200 [ 17.710282] which belongs to the cache kmalloc-256 of size 256 [ 17.710439] The buggy address is located 7 bytes to the right of [ 17.710439] allocated 201-byte region [fff00000c1c50200, fff00000c1c502c9) [ 17.710555] [ 17.710651] The buggy address belongs to the physical page: [ 17.710714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50 [ 17.710790] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.710972] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.711031] page_type: f5(slab) [ 17.711068] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.711378] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.712028] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.712157] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.712281] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff [ 17.712431] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.712524] page dumped because: kasan: bad access detected [ 17.712649] [ 17.712732] Memory state around the buggy address: [ 17.712919] fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.713122] fff00000c1c50200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.713278] >fff00000c1c50280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.713445] ^ [ 17.713506] fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.713569] fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.713784] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 17.671070] ================================================================== [ 17.671131] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.671636] Write of size 1 at addr fff00000c1c500eb by task kunit_try_catch/158 [ 17.671856] [ 17.671949] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.672199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.672256] Hardware name: linux,dummy-virt (DT) [ 17.672386] Call trace: [ 17.672409] show_stack+0x20/0x38 (C) [ 17.672465] dump_stack_lvl+0x8c/0xd0 [ 17.672512] print_report+0x118/0x5d0 [ 17.672605] kasan_report+0xdc/0x128 [ 17.672656] __asan_report_store1_noabort+0x20/0x30 [ 17.672705] krealloc_more_oob_helper+0x60c/0x678 [ 17.672753] krealloc_more_oob+0x20/0x38 [ 17.672804] kunit_try_run_case+0x170/0x3f0 [ 17.672868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.672934] kthread+0x328/0x630 [ 17.672979] ret_from_fork+0x10/0x20 [ 17.673038] [ 17.673056] Allocated by task 158: [ 17.673095] kasan_save_stack+0x3c/0x68 [ 17.673142] kasan_save_track+0x20/0x40 [ 17.673188] kasan_save_alloc_info+0x40/0x58 [ 17.673283] __kasan_krealloc+0x118/0x178 [ 17.673851] krealloc_noprof+0x128/0x360 [ 17.673970] krealloc_more_oob_helper+0x168/0x678 [ 17.674039] krealloc_more_oob+0x20/0x38 [ 17.674093] kunit_try_run_case+0x170/0x3f0 [ 17.674418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.674745] kthread+0x328/0x630 [ 17.674854] ret_from_fork+0x10/0x20 [ 17.675333] [ 17.675394] The buggy address belongs to the object at fff00000c1c50000 [ 17.675394] which belongs to the cache kmalloc-256 of size 256 [ 17.675553] The buggy address is located 0 bytes to the right of [ 17.675553] allocated 235-byte region [fff00000c1c50000, fff00000c1c500eb) [ 17.675664] [ 17.675857] The buggy address belongs to the physical page: [ 17.676078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50 [ 17.676158] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.676322] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.676428] page_type: f5(slab) [ 17.676685] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.676757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.676808] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.676939] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.677114] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff [ 17.677225] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.677427] page dumped because: kasan: bad access detected [ 17.677584] [ 17.677736] Memory state around the buggy address: [ 17.677856] fff00000c1c4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.677922] fff00000c1c50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.678037] >fff00000c1c50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.678134] ^ [ 17.678176] fff00000c1c50100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.678429] fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.678572] ================================================================== [ 17.682064] ================================================================== [ 17.682406] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.682624] Write of size 1 at addr fff00000c1c500f0 by task kunit_try_catch/158 [ 17.682776] [ 17.682813] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.682893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.682919] Hardware name: linux,dummy-virt (DT) [ 17.682956] Call trace: [ 17.682976] show_stack+0x20/0x38 (C) [ 17.683397] dump_stack_lvl+0x8c/0xd0 [ 17.683477] print_report+0x118/0x5d0 [ 17.683522] kasan_report+0xdc/0x128 [ 17.683566] __asan_report_store1_noabort+0x20/0x30 [ 17.683677] krealloc_more_oob_helper+0x5c0/0x678 [ 17.683753] krealloc_more_oob+0x20/0x38 [ 17.683797] kunit_try_run_case+0x170/0x3f0 [ 17.683903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.683959] kthread+0x328/0x630 [ 17.684006] ret_from_fork+0x10/0x20 [ 17.684388] [ 17.684478] Allocated by task 158: [ 17.684536] kasan_save_stack+0x3c/0x68 [ 17.684578] kasan_save_track+0x20/0x40 [ 17.684613] kasan_save_alloc_info+0x40/0x58 [ 17.684658] __kasan_krealloc+0x118/0x178 [ 17.684928] krealloc_noprof+0x128/0x360 [ 17.685165] krealloc_more_oob_helper+0x168/0x678 [ 17.685229] krealloc_more_oob+0x20/0x38 [ 17.685310] kunit_try_run_case+0x170/0x3f0 [ 17.685455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.685748] kthread+0x328/0x630 [ 17.685941] ret_from_fork+0x10/0x20 [ 17.686040] [ 17.686098] The buggy address belongs to the object at fff00000c1c50000 [ 17.686098] which belongs to the cache kmalloc-256 of size 256 [ 17.686302] The buggy address is located 5 bytes to the right of [ 17.686302] allocated 235-byte region [fff00000c1c50000, fff00000c1c500eb) [ 17.686401] [ 17.686421] The buggy address belongs to the physical page: [ 17.686729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50 [ 17.686926] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.686978] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.687038] page_type: f5(slab) [ 17.687128] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.687201] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.687262] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.687318] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.687383] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff [ 17.687460] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.687510] page dumped because: kasan: bad access detected [ 17.687547] [ 17.687565] Memory state around the buggy address: [ 17.687596] fff00000c1c4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.687646] fff00000c1c50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.687688] >fff00000c1c50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.687725] ^ [ 17.687765] fff00000c1c50100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.687807] fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.687845] ================================================================== [ 17.758923] ================================================================== [ 17.759087] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.759143] Write of size 1 at addr fff00000c78860f0 by task kunit_try_catch/162 [ 17.759501] [ 17.759556] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.759708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.759775] Hardware name: linux,dummy-virt (DT) [ 17.759823] Call trace: [ 17.759922] show_stack+0x20/0x38 (C) [ 17.759976] dump_stack_lvl+0x8c/0xd0 [ 17.760022] print_report+0x118/0x5d0 [ 17.760066] kasan_report+0xdc/0x128 [ 17.760123] __asan_report_store1_noabort+0x20/0x30 [ 17.760327] krealloc_more_oob_helper+0x5c0/0x678 [ 17.760503] krealloc_large_more_oob+0x20/0x38 [ 17.760651] kunit_try_run_case+0x170/0x3f0 [ 17.760737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.760799] kthread+0x328/0x630 [ 17.760843] ret_from_fork+0x10/0x20 [ 17.760889] [ 17.761727] The buggy address belongs to the physical page: [ 17.761825] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 17.761905] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.761986] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.762225] page_type: f8(unknown) [ 17.762675] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.763066] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.763132] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.763270] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.763357] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff [ 17.763527] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.763568] page dumped because: kasan: bad access detected [ 17.763750] [ 17.763789] Memory state around the buggy address: [ 17.763822] fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.764314] fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.764428] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.764524] ^ [ 17.764675] fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.764737] fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.764831] ================================================================== [ 17.751416] ================================================================== [ 17.751860] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.751999] Write of size 1 at addr fff00000c78860eb by task kunit_try_catch/162 [ 17.752095] [ 17.752130] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.752370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.752592] Hardware name: linux,dummy-virt (DT) [ 17.752655] Call trace: [ 17.752747] show_stack+0x20/0x38 (C) [ 17.752842] dump_stack_lvl+0x8c/0xd0 [ 17.752917] print_report+0x118/0x5d0 [ 17.753016] kasan_report+0xdc/0x128 [ 17.753081] __asan_report_store1_noabort+0x20/0x30 [ 17.753157] krealloc_more_oob_helper+0x60c/0x678 [ 17.753223] krealloc_large_more_oob+0x20/0x38 [ 17.753270] kunit_try_run_case+0x170/0x3f0 [ 17.753513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.753733] kthread+0x328/0x630 [ 17.753848] ret_from_fork+0x10/0x20 [ 17.753898] [ 17.753919] The buggy address belongs to the physical page: [ 17.754079] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 17.754338] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.754563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.754754] page_type: f8(unknown) [ 17.755102] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.755314] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.755587] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.755751] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.755840] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff [ 17.755896] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.756065] page dumped because: kasan: bad access detected [ 17.756105] [ 17.756123] Memory state around the buggy address: [ 17.756326] fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.756378] fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.756443] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.756494] ^ [ 17.756551] fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.756593] fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.756631] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 17.652268] ================================================================== [ 17.652322] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 17.652721] Read of size 1 at addr fff00000c78c0000 by task kunit_try_catch/156 [ 17.652784] [ 17.652939] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.653033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.653059] Hardware name: linux,dummy-virt (DT) [ 17.653417] Call trace: [ 17.653503] show_stack+0x20/0x38 (C) [ 17.653557] dump_stack_lvl+0x8c/0xd0 [ 17.653911] print_report+0x118/0x5d0 [ 17.654152] kasan_report+0xdc/0x128 [ 17.654484] __asan_report_load1_noabort+0x20/0x30 [ 17.654692] page_alloc_uaf+0x328/0x350 [ 17.654835] kunit_try_run_case+0x170/0x3f0 [ 17.654935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.655335] kthread+0x328/0x630 [ 17.655508] ret_from_fork+0x10/0x20 [ 17.655682] [ 17.655740] The buggy address belongs to the physical page: [ 17.655879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c0 [ 17.656034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.656215] page_type: f0(buddy) [ 17.656465] raw: 0bfffe0000000000 fff00000ff6160f0 fff00000ff6160f0 0000000000000000 [ 17.656645] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 17.656897] page dumped because: kasan: bad access detected [ 17.657636] [ 17.657672] Memory state around the buggy address: [ 17.658061] fff00000c78bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.658157] fff00000c78bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.658254] >fff00000c78c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.658333] ^ [ 17.658369] fff00000c78c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.658423] fff00000c78c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.659216] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 17.631803] ================================================================== [ 17.631895] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 17.632712] Free of addr fff00000c787c001 by task kunit_try_catch/152 [ 17.632855] [ 17.632890] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.633000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.633235] Hardware name: linux,dummy-virt (DT) [ 17.633414] Call trace: [ 17.633499] show_stack+0x20/0x38 (C) [ 17.633554] dump_stack_lvl+0x8c/0xd0 [ 17.633601] print_report+0x118/0x5d0 [ 17.633644] kasan_report_invalid_free+0xc0/0xe8 [ 17.633690] __kasan_kfree_large+0x5c/0xa8 [ 17.633735] free_large_kmalloc+0x64/0x190 [ 17.634277] kfree+0x270/0x3c8 [ 17.634330] kmalloc_large_invalid_free+0x108/0x270 [ 17.634675] kunit_try_run_case+0x170/0x3f0 [ 17.634818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.634920] kthread+0x328/0x630 [ 17.635329] ret_from_fork+0x10/0x20 [ 17.635480] [ 17.635502] The buggy address belongs to the physical page: [ 17.635704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787c [ 17.635894] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.636026] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.636112] page_type: f8(unknown) [ 17.636160] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.636224] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.636274] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.636322] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.636371] head: 0bfffe0000000002 ffffc1ffc31e1f01 00000000ffffffff 00000000ffffffff [ 17.636448] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.636506] page dumped because: kasan: bad access detected [ 17.636539] [ 17.636556] Memory state around the buggy address: [ 17.636597] fff00000c787bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.636649] fff00000c787bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.636691] >fff00000c787c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.636738] ^ [ 17.636764] fff00000c787c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.636807] fff00000c787c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.636881] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 17.614738] ================================================================== [ 17.614996] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 17.615092] Read of size 1 at addr fff00000c787c000 by task kunit_try_catch/150 [ 17.615228] [ 17.615267] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.615351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.615663] Hardware name: linux,dummy-virt (DT) [ 17.615729] Call trace: [ 17.615835] show_stack+0x20/0x38 (C) [ 17.615920] dump_stack_lvl+0x8c/0xd0 [ 17.616048] print_report+0x118/0x5d0 [ 17.616113] kasan_report+0xdc/0x128 [ 17.616158] __asan_report_load1_noabort+0x20/0x30 [ 17.616498] kmalloc_large_uaf+0x2cc/0x2f8 [ 17.616665] kunit_try_run_case+0x170/0x3f0 [ 17.616739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.616824] kthread+0x328/0x630 [ 17.616961] ret_from_fork+0x10/0x20 [ 17.617013] [ 17.617035] The buggy address belongs to the physical page: [ 17.617096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787c [ 17.617150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.617662] raw: 0bfffe0000000000 ffffc1ffc31e2008 fff00000da47fe00 0000000000000000 [ 17.617727] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 17.617935] page dumped because: kasan: bad access detected [ 17.618187] [ 17.618259] Memory state around the buggy address: [ 17.618391] fff00000c787bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.618482] fff00000c787bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.618632] >fff00000c787c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.618733] ^ [ 17.618761] fff00000c787c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.618991] fff00000c787c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.619132] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 17.596476] ================================================================== [ 17.596544] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 17.596598] Write of size 1 at addr fff00000c787a00a by task kunit_try_catch/148 [ 17.596738] [ 17.596776] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.596859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.596885] Hardware name: linux,dummy-virt (DT) [ 17.596915] Call trace: [ 17.596936] show_stack+0x20/0x38 (C) [ 17.596985] dump_stack_lvl+0x8c/0xd0 [ 17.597031] print_report+0x118/0x5d0 [ 17.597074] kasan_report+0xdc/0x128 [ 17.597116] __asan_report_store1_noabort+0x20/0x30 [ 17.597171] kmalloc_large_oob_right+0x278/0x2b8 [ 17.597800] kunit_try_run_case+0x170/0x3f0 [ 17.598122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.598344] kthread+0x328/0x630 [ 17.598728] ret_from_fork+0x10/0x20 [ 17.598789] [ 17.599246] The buggy address belongs to the physical page: [ 17.599296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107878 [ 17.599400] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.599576] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.599823] page_type: f8(unknown) [ 17.600325] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.600555] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.600658] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.600883] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.601137] head: 0bfffe0000000002 ffffc1ffc31e1e01 00000000ffffffff 00000000ffffffff [ 17.601406] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.601452] page dumped because: kasan: bad access detected [ 17.601646] [ 17.601755] Memory state around the buggy address: [ 17.601911] fff00000c7879f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.601988] fff00000c7879f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.602052] >fff00000c787a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.602098] ^ [ 17.602126] fff00000c787a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.602433] fff00000c787a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.602651] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 17.579128] ================================================================== [ 17.579192] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.579352] Write of size 1 at addr fff00000c665df00 by task kunit_try_catch/146 [ 17.579437] [ 17.579485] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.579629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.579654] Hardware name: linux,dummy-virt (DT) [ 17.579683] Call trace: [ 17.580031] show_stack+0x20/0x38 (C) [ 17.580100] dump_stack_lvl+0x8c/0xd0 [ 17.580187] print_report+0x118/0x5d0 [ 17.580259] kasan_report+0xdc/0x128 [ 17.580302] __asan_report_store1_noabort+0x20/0x30 [ 17.580411] kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.580478] kunit_try_run_case+0x170/0x3f0 [ 17.580671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.580732] kthread+0x328/0x630 [ 17.580777] ret_from_fork+0x10/0x20 [ 17.580823] [ 17.580841] Allocated by task 146: [ 17.580867] kasan_save_stack+0x3c/0x68 [ 17.580905] kasan_save_track+0x20/0x40 [ 17.580939] kasan_save_alloc_info+0x40/0x58 [ 17.580976] __kasan_kmalloc+0xd4/0xd8 [ 17.581010] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.581047] kmalloc_big_oob_right+0xb8/0x2f0 [ 17.581470] kunit_try_run_case+0x170/0x3f0 [ 17.581582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.581799] kthread+0x328/0x630 [ 17.581882] ret_from_fork+0x10/0x20 [ 17.582263] [ 17.582356] The buggy address belongs to the object at fff00000c665c000 [ 17.582356] which belongs to the cache kmalloc-8k of size 8192 [ 17.582486] The buggy address is located 0 bytes to the right of [ 17.582486] allocated 7936-byte region [fff00000c665c000, fff00000c665df00) [ 17.582660] [ 17.582720] The buggy address belongs to the physical page: [ 17.582863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106658 [ 17.582951] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.582998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.583325] page_type: f5(slab) [ 17.583409] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.583512] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.583574] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.583624] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.583682] head: 0bfffe0000000003 ffffc1ffc3199601 00000000ffffffff 00000000ffffffff [ 17.583745] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.583796] page dumped because: kasan: bad access detected [ 17.583835] [ 17.583853] Memory state around the buggy address: [ 17.583889] fff00000c665de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.583953] fff00000c665de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.583996] >fff00000c665df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.584034] ^ [ 17.584061] fff00000c665df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.584103] fff00000c665e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.584141] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 17.555782] ================================================================== [ 17.556293] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 17.556363] Write of size 1 at addr fff00000c47f9b78 by task kunit_try_catch/144 [ 17.556658] [ 17.556801] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.556890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.556916] Hardware name: linux,dummy-virt (DT) [ 17.556945] Call trace: [ 17.557097] show_stack+0x20/0x38 (C) [ 17.557278] dump_stack_lvl+0x8c/0xd0 [ 17.557636] print_report+0x118/0x5d0 [ 17.557767] kasan_report+0xdc/0x128 [ 17.557816] __asan_report_store1_noabort+0x20/0x30 [ 17.557867] kmalloc_track_caller_oob_right+0x40c/0x488 [ 17.558294] kunit_try_run_case+0x170/0x3f0 [ 17.558402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.558654] kthread+0x328/0x630 [ 17.558819] ret_from_fork+0x10/0x20 [ 17.558873] [ 17.558991] Allocated by task 144: [ 17.559123] kasan_save_stack+0x3c/0x68 [ 17.559307] kasan_save_track+0x20/0x40 [ 17.559349] kasan_save_alloc_info+0x40/0x58 [ 17.559749] __kasan_kmalloc+0xd4/0xd8 [ 17.559795] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.559841] kmalloc_track_caller_oob_right+0xa8/0x488 [ 17.559888] kunit_try_run_case+0x170/0x3f0 [ 17.559928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.559998] kthread+0x328/0x630 [ 17.560042] ret_from_fork+0x10/0x20 [ 17.560087] [ 17.560105] The buggy address belongs to the object at fff00000c47f9b00 [ 17.560105] which belongs to the cache kmalloc-128 of size 128 [ 17.560164] The buggy address is located 0 bytes to the right of [ 17.560164] allocated 120-byte region [fff00000c47f9b00, fff00000c47f9b78) [ 17.560251] [ 17.560270] The buggy address belongs to the physical page: [ 17.560300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9 [ 17.560354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.560404] page_type: f5(slab) [ 17.560440] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.560501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.560542] page dumped because: kasan: bad access detected [ 17.560582] [ 17.560599] Memory state around the buggy address: [ 17.560629] fff00000c47f9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.560681] fff00000c47f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.560722] >fff00000c47f9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.560760] ^ [ 17.560799] fff00000c47f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.560843] fff00000c47f9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.560881] ================================================================== [ 17.562834] ================================================================== [ 17.563465] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 17.563529] Write of size 1 at addr fff00000c47f9c78 by task kunit_try_catch/144 [ 17.563579] [ 17.563608] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.563688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.563714] Hardware name: linux,dummy-virt (DT) [ 17.564026] Call trace: [ 17.564184] show_stack+0x20/0x38 (C) [ 17.564259] dump_stack_lvl+0x8c/0xd0 [ 17.564504] print_report+0x118/0x5d0 [ 17.564580] kasan_report+0xdc/0x128 [ 17.564919] __asan_report_store1_noabort+0x20/0x30 [ 17.564981] kmalloc_track_caller_oob_right+0x418/0x488 [ 17.565070] kunit_try_run_case+0x170/0x3f0 [ 17.565121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.565421] kthread+0x328/0x630 [ 17.565582] ret_from_fork+0x10/0x20 [ 17.565785] [ 17.566050] Allocated by task 144: [ 17.566129] kasan_save_stack+0x3c/0x68 [ 17.566311] kasan_save_track+0x20/0x40 [ 17.566377] kasan_save_alloc_info+0x40/0x58 [ 17.566415] __kasan_kmalloc+0xd4/0xd8 [ 17.566740] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.566826] kmalloc_track_caller_oob_right+0x184/0x488 [ 17.566956] kunit_try_run_case+0x170/0x3f0 [ 17.567039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.567094] kthread+0x328/0x630 [ 17.567265] ret_from_fork+0x10/0x20 [ 17.567419] [ 17.567533] The buggy address belongs to the object at fff00000c47f9c00 [ 17.567533] which belongs to the cache kmalloc-128 of size 128 [ 17.567786] The buggy address is located 0 bytes to the right of [ 17.567786] allocated 120-byte region [fff00000c47f9c00, fff00000c47f9c78) [ 17.567976] [ 17.567999] The buggy address belongs to the physical page: [ 17.568177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9 [ 17.568249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.568783] page_type: f5(slab) [ 17.568932] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.569004] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.569228] page dumped because: kasan: bad access detected [ 17.569393] [ 17.569488] Memory state around the buggy address: [ 17.569570] fff00000c47f9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.569734] fff00000c47f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.569782] >fff00000c47f9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.569820] ^ [ 17.569868] fff00000c47f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.569910] fff00000c47f9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.570199] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 17.533187] ================================================================== [ 17.533269] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 17.533320] Read of size 1 at addr fff00000c7891000 by task kunit_try_catch/142 [ 17.533796] [ 17.534256] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.534352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.534562] Hardware name: linux,dummy-virt (DT) [ 17.534645] Call trace: [ 17.534938] show_stack+0x20/0x38 (C) [ 17.535285] dump_stack_lvl+0x8c/0xd0 [ 17.535847] print_report+0x118/0x5d0 [ 17.535950] kasan_report+0xdc/0x128 [ 17.536041] __asan_report_load1_noabort+0x20/0x30 [ 17.536374] kmalloc_node_oob_right+0x2f4/0x330 [ 17.536558] kunit_try_run_case+0x170/0x3f0 [ 17.536643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.536779] kthread+0x328/0x630 [ 17.536892] ret_from_fork+0x10/0x20 [ 17.537213] [ 17.537366] Allocated by task 142: [ 17.537418] kasan_save_stack+0x3c/0x68 [ 17.537531] kasan_save_track+0x20/0x40 [ 17.537618] kasan_save_alloc_info+0x40/0x58 [ 17.537724] __kasan_kmalloc+0xd4/0xd8 [ 17.537872] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 17.538125] kmalloc_node_oob_right+0xbc/0x330 [ 17.538269] kunit_try_run_case+0x170/0x3f0 [ 17.538371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.538587] kthread+0x328/0x630 [ 17.538817] ret_from_fork+0x10/0x20 [ 17.539060] [ 17.539190] The buggy address belongs to the object at fff00000c7890000 [ 17.539190] which belongs to the cache kmalloc-4k of size 4096 [ 17.539328] The buggy address is located 0 bytes to the right of [ 17.539328] allocated 4096-byte region [fff00000c7890000, fff00000c7891000) [ 17.539505] [ 17.539529] The buggy address belongs to the physical page: [ 17.539970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107890 [ 17.540502] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.540577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.541021] page_type: f5(slab) [ 17.541146] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.541241] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.541390] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.541463] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.541659] head: 0bfffe0000000003 ffffc1ffc31e2401 00000000ffffffff 00000000ffffffff [ 17.541724] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.542234] page dumped because: kasan: bad access detected [ 17.542371] [ 17.542435] Memory state around the buggy address: [ 17.542504] fff00000c7890f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.542661] fff00000c7890f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.542725] >fff00000c7891000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.542774] ^ [ 17.542887] fff00000c7891080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.542950] fff00000c7891100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.543152] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 17.515300] ================================================================== [ 17.515389] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 17.515854] Read of size 1 at addr fff00000c45d8abf by task kunit_try_catch/140 [ 17.515925] [ 17.516019] CPU: 0 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.516099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.516136] Hardware name: linux,dummy-virt (DT) [ 17.516168] Call trace: [ 17.516197] show_stack+0x20/0x38 (C) [ 17.516266] dump_stack_lvl+0x8c/0xd0 [ 17.516313] print_report+0x118/0x5d0 [ 17.516357] kasan_report+0xdc/0x128 [ 17.516400] __asan_report_load1_noabort+0x20/0x30 [ 17.516449] kmalloc_oob_left+0x2ec/0x320 [ 17.516495] kunit_try_run_case+0x170/0x3f0 [ 17.516541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.516595] kthread+0x328/0x630 [ 17.516652] ret_from_fork+0x10/0x20 [ 17.516708] [ 17.516726] Allocated by task 26: [ 17.516753] kasan_save_stack+0x3c/0x68 [ 17.516791] kasan_save_track+0x20/0x40 [ 17.516826] kasan_save_alloc_info+0x40/0x58 [ 17.516863] __kasan_kmalloc+0xd4/0xd8 [ 17.516896] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.516938] kstrdup+0x54/0xc8 [ 17.516983] devtmpfs_work_loop+0x6f8/0xa58 [ 17.517025] devtmpfsd+0x50/0x58 [ 17.517059] kthread+0x328/0x630 [ 17.517102] ret_from_fork+0x10/0x20 [ 17.517136] [ 17.517178] Freed by task 26: [ 17.517233] kasan_save_stack+0x3c/0x68 [ 17.517272] kasan_save_track+0x20/0x40 [ 17.517307] kasan_save_free_info+0x4c/0x78 [ 17.517924] __kasan_slab_free+0x6c/0x98 [ 17.518006] kfree+0x214/0x3c8 [ 17.518062] devtmpfs_work_loop+0x804/0xa58 [ 17.518195] devtmpfsd+0x50/0x58 [ 17.518326] kthread+0x328/0x630 [ 17.518555] ret_from_fork+0x10/0x20 [ 17.518970] [ 17.519071] The buggy address belongs to the object at fff00000c45d8aa0 [ 17.519071] which belongs to the cache kmalloc-16 of size 16 [ 17.519332] The buggy address is located 15 bytes to the right of [ 17.519332] allocated 16-byte region [fff00000c45d8aa0, fff00000c45d8ab0) [ 17.519616] [ 17.519718] The buggy address belongs to the physical page: [ 17.519869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 17.520020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.520070] page_type: f5(slab) [ 17.520108] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.520629] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.520728] page dumped because: kasan: bad access detected [ 17.520803] [ 17.520863] Memory state around the buggy address: [ 17.521233] fff00000c45d8980: 00 05 fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 17.521573] fff00000c45d8a00: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc [ 17.521631] >fff00000c45d8a80: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc [ 17.521705] ^ [ 17.521765] fff00000c45d8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.521872] fff00000c45d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.521911] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 17.495867] ================================================================== [ 17.495919] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.496036] Read of size 1 at addr fff00000c47f9a80 by task kunit_try_catch/138 [ 17.496090] [ 17.496119] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.496198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.496243] Hardware name: linux,dummy-virt (DT) [ 17.496375] Call trace: [ 17.496400] show_stack+0x20/0x38 (C) [ 17.496485] dump_stack_lvl+0x8c/0xd0 [ 17.496762] print_report+0x118/0x5d0 [ 17.496948] kasan_report+0xdc/0x128 [ 17.496993] __asan_report_load1_noabort+0x20/0x30 [ 17.497157] kmalloc_oob_right+0x5d0/0x660 [ 17.497228] kunit_try_run_case+0x170/0x3f0 [ 17.497275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.497565] kthread+0x328/0x630 [ 17.497903] ret_from_fork+0x10/0x20 [ 17.498022] [ 17.498057] Allocated by task 138: [ 17.498084] kasan_save_stack+0x3c/0x68 [ 17.498124] kasan_save_track+0x20/0x40 [ 17.498160] kasan_save_alloc_info+0x40/0x58 [ 17.498198] __kasan_kmalloc+0xd4/0xd8 [ 17.498243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.498291] kmalloc_oob_right+0xb0/0x660 [ 17.498331] kunit_try_run_case+0x170/0x3f0 [ 17.498368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.498420] kthread+0x328/0x630 [ 17.498463] ret_from_fork+0x10/0x20 [ 17.498505] [ 17.498535] The buggy address belongs to the object at fff00000c47f9a00 [ 17.498535] which belongs to the cache kmalloc-128 of size 128 [ 17.498594] The buggy address is located 13 bytes to the right of [ 17.498594] allocated 115-byte region [fff00000c47f9a00, fff00000c47f9a73) [ 17.498667] [ 17.498687] The buggy address belongs to the physical page: [ 17.498717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9 [ 17.498768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.498825] page_type: f5(slab) [ 17.498870] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.498921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.498961] page dumped because: kasan: bad access detected [ 17.498991] [ 17.499014] Memory state around the buggy address: [ 17.499053] fff00000c47f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.499103] fff00000c47f9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.499155] >fff00000c47f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.499192] ^ [ 17.499237] fff00000c47f9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.499286] fff00000c47f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.499333] ================================================================== [ 17.488487] ================================================================== [ 17.488528] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.488575] Write of size 1 at addr fff00000c47f9a78 by task kunit_try_catch/138 [ 17.488624] [ 17.488652] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 17.488731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.488771] Hardware name: linux,dummy-virt (DT) [ 17.488801] Call trace: [ 17.488821] show_stack+0x20/0x38 (C) [ 17.488867] dump_stack_lvl+0x8c/0xd0 [ 17.488923] print_report+0x118/0x5d0 [ 17.488968] kasan_report+0xdc/0x128 [ 17.489029] __asan_report_store1_noabort+0x20/0x30 [ 17.489095] kmalloc_oob_right+0x538/0x660 [ 17.489313] kunit_try_run_case+0x170/0x3f0 [ 17.489421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.489505] kthread+0x328/0x630 [ 17.489902] ret_from_fork+0x10/0x20 [ 17.489961] [ 17.489979] Allocated by task 138: [ 17.490005] kasan_save_stack+0x3c/0x68 [ 17.490052] kasan_save_track+0x20/0x40 [ 17.490358] kasan_save_alloc_info+0x40/0x58 [ 17.490437] __kasan_kmalloc+0xd4/0xd8 [ 17.490473] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.491361] kmalloc_oob_right+0xb0/0x660 [ 17.491694] kunit_try_run_case+0x170/0x3f0 [ 17.491745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.492037] kthread+0x328/0x630 [ 17.492131] ret_from_fork+0x10/0x20 [ 17.492233] [ 17.492310] The buggy address belongs to the object at fff00000c47f9a00 [ 17.492310] which belongs to the cache kmalloc-128 of size 128 [ 17.492413] The buggy address is located 5 bytes to the right of [ 17.492413] allocated 115-byte region [fff00000c47f9a00, fff00000c47f9a73) [ 17.492796] [ 17.493055] The buggy address belongs to the physical page: [ 17.493111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9 [ 17.493234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.493285] page_type: f5(slab) [ 17.493370] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.493421] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.493462] page dumped because: kasan: bad access detected [ 17.493492] [ 17.493510] Memory state around the buggy address: [ 17.493540] fff00000c47f9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.493916] fff00000c47f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.494014] >fff00000c47f9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.494189] ^ [ 17.494257] fff00000c47f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.494302] fff00000c47f9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.494350] ================================================================== [ 17.480004] ================================================================== [ 17.480380] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.481194] Write of size 1 at addr fff00000c47f9a73 by task kunit_try_catch/138 [ 17.481318] [ 17.482232] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.15.7-rc1 #1 PREEMPT [ 17.482376] Tainted: [N]=TEST [ 17.482408] Hardware name: linux,dummy-virt (DT) [ 17.482620] Call trace: [ 17.482785] show_stack+0x20/0x38 (C) [ 17.482915] dump_stack_lvl+0x8c/0xd0 [ 17.482978] print_report+0x118/0x5d0 [ 17.483031] kasan_report+0xdc/0x128 [ 17.483077] __asan_report_store1_noabort+0x20/0x30 [ 17.483128] kmalloc_oob_right+0x5a4/0x660 [ 17.483176] kunit_try_run_case+0x170/0x3f0 [ 17.483239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.483293] kthread+0x328/0x630 [ 17.483340] ret_from_fork+0x10/0x20 [ 17.483493] [ 17.483531] Allocated by task 138: [ 17.483639] kasan_save_stack+0x3c/0x68 [ 17.483702] kasan_save_track+0x20/0x40 [ 17.483739] kasan_save_alloc_info+0x40/0x58 [ 17.483777] __kasan_kmalloc+0xd4/0xd8 [ 17.483811] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.483849] kmalloc_oob_right+0xb0/0x660 [ 17.483887] kunit_try_run_case+0x170/0x3f0 [ 17.483925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.483968] kthread+0x328/0x630 [ 17.484003] ret_from_fork+0x10/0x20 [ 17.484054] [ 17.484110] The buggy address belongs to the object at fff00000c47f9a00 [ 17.484110] which belongs to the cache kmalloc-128 of size 128 [ 17.484217] The buggy address is located 0 bytes to the right of [ 17.484217] allocated 115-byte region [fff00000c47f9a00, fff00000c47f9a73) [ 17.484286] [ 17.484368] The buggy address belongs to the physical page: [ 17.484537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9 [ 17.484796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.485076] page_type: f5(slab) [ 17.485385] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.485454] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.485562] page dumped because: kasan: bad access detected [ 17.485602] [ 17.485627] Memory state around the buggy address: [ 17.485838] fff00000c47f9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.485904] fff00000c47f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.485958] >fff00000c47f9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.486011] ^ [ 17.486091] fff00000c47f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.486133] fff00000c47f9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.486196] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 95.881690] WARNING: CPU: 1 PID: 658 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 95.884082] Modules linked in: [ 95.884786] CPU: 1 UID: 0 PID: 658 Comm: kunit_try_catch Tainted: G B D W N 6.15.7-rc1 #1 PREEMPT [ 95.886267] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 95.886751] Hardware name: linux,dummy-virt (DT) [ 95.886968] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 95.887306] pc : intlog10+0x38/0x48 [ 95.887696] lr : intlog10_test+0xe4/0x200 [ 95.888112] sp : ffff800082027c10 [ 95.888467] x29: ffff800082027c90 x28: 0000000000000000 x27: 0000000000000000 [ 95.889240] x26: 1ffe00001959cac1 x25: 0000000000000000 x24: ffff800082027ce0 [ 95.890093] x23: ffff800082027d00 x22: 0000000000000000 x21: 1ffff00010404f82 [ 95.890595] x20: ffff977f45e35200 x19: ffff800080087990 x18: 000000003078a39f [ 95.890934] x17: 0000000000000001 x16: fff00000c096e03c x15: fff00000ff616b08 [ 95.891284] x14: 00000000f1f1f1f1 x13: 1ffe00001b48f81d x12: ffff72efe9379b71 [ 95.891685] x11: 1ffff2efe9379b70 x10: ffff72efe9379b70 x9 : ffff977f434159e4 [ 95.892063] x8 : ffff977f49bcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 95.892477] x5 : ffff700010404f82 x4 : 1ffff00010010f3a x3 : 1ffff2efe8bc6a40 [ 95.892864] x2 : 1ffff2efe8bc6a40 x1 : 0000000000000003 x0 : 0000000000000000 [ 95.893309] Call trace: [ 95.893484] intlog10+0x38/0x48 (P) [ 95.893735] kunit_try_run_case+0x170/0x3f0 [ 95.894018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.894364] kthread+0x328/0x630 [ 95.894601] ret_from_fork+0x10/0x20 [ 95.894824] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 95.833849] WARNING: CPU: 0 PID: 640 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 95.836595] Modules linked in: [ 95.837175] CPU: 0 UID: 0 PID: 640 Comm: kunit_try_catch Tainted: G B D N 6.15.7-rc1 #1 PREEMPT [ 95.838188] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 95.838417] Hardware name: linux,dummy-virt (DT) [ 95.838817] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 95.839752] pc : intlog2+0xd8/0xf8 [ 95.840199] lr : intlog2_test+0xe4/0x200 [ 95.840818] sp : ffff800080fc7c10 [ 95.841222] x29: ffff800080fc7c90 x28: 0000000000000000 x27: 0000000000000000 [ 95.842105] x26: 1ffe000018b3a6a1 x25: 0000000000000000 x24: ffff800080fc7ce0 [ 95.842910] x23: ffff800080fc7d00 x22: 0000000000000000 x21: 1ffff000101f8f82 [ 95.843797] x20: ffff977f45e35100 x19: ffff800080087990 x18: 00000000349b827c [ 95.844711] x17: 00000000c7bff53d x16: fff00000c096dc3c x15: 00000000386ef94e [ 95.845535] x14: 00000000f1f1f1f1 x13: 1ffe00001b493c1d x12: ffff72efe9379b71 [ 95.846193] x11: 1ffff2efe9379b70 x10: ffff72efe9379b70 x9 : ffff977f43415be4 [ 95.846557] x8 : ffff977f49bcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 95.846904] x5 : ffff7000101f8f82 x4 : 1ffff00010010f3a x3 : 1ffff2efe8bc6a20 [ 95.847317] x2 : 1ffff2efe8bc6a20 x1 : 0000000000000003 x0 : 0000000000000000 [ 95.848034] Call trace: [ 95.848325] intlog2+0xd8/0xf8 (P) [ 95.848710] kunit_try_run_case+0x170/0x3f0 [ 95.849152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.849770] kthread+0x328/0x630 [ 95.850201] ret_from_fork+0x10/0x20 [ 95.850649] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/internal-error-oops-oops-smp
KNOWN ISSUE - qemu-arm64: Internal error: Oops at kunit_test_null_dereference - kunit_generic_run_threadfn_adapter
[ 94.967157] Internal error: Oops: 0000000096000005 [#1] SMP [ 94.972870] Modules linked in: [ 94.973990] CPU: 0 UID: 0 PID: 534 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 94.974527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 94.974914] Hardware name: linux,dummy-virt (DT) [ 94.975560] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.975998] pc : kunit_test_null_dereference+0x70/0x170 [ 94.976477] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.976795] sp : ffff800080df7d30 [ 94.977418] x29: ffff800080df7d90 x28: 0000000000000000 x27: 0000000000000000 [ 94.978433] x26: 1ffe0000190fca21 x25: 0000000000000000 x24: 0000000000000004 [ 94.979362] x23: fff00000c87e510c x22: ffff977f43402fc0 x21: fff00000c8d1ce08 [ 94.980253] x20: 1ffff000101befa6 x19: ffff800080087990 x18: 000000007bb5833d [ 94.980879] x17: 0000000000000001 x16: fff00000c096dc3c x15: fff00000ff616b08 [ 94.981232] x14: 00000000f1f1f1f1 x13: 1ffe00001b493c1d x12: fffd800019742b3c [ 94.981917] x11: 1ffe000019742b3b x10: fffd800019742b3b x9 : ffff977f433fa428 [ 94.982424] x8 : ffff800080df7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 94.982897] x5 : ffff7000101befa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 94.983371] x2 : dfff800000000000 x1 : fff00000cba15100 x0 : ffff800080087990 [ 94.983877] Call trace: [ 94.984110] kunit_test_null_dereference+0x70/0x170 (P) [ 94.984475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.984828] kthread+0x328/0x630 [ 94.985084] ret_from_fork+0x10/0x20 [ 94.985676] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 94.986487] ---[ end trace 0000000000000000 ]---