Date
July 18, 2025, 2:09 p.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 19.359992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 19.398932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 19.235022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 19.220250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 19.086890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 19.139584] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 19.035362] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 94.073526] Internal error: Oops: 0000000096000005 [#1] SMP [ 94.079733] Modules linked in: [ 94.081530] CPU: 1 UID: 0 PID: 532 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 94.082717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 94.083079] Hardware name: linux,dummy-virt (DT) [ 94.083383] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.083707] pc : kunit_test_null_dereference+0x70/0x170 [ 94.083978] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.084235] sp : ffff800082097d30 [ 94.084714] x29: ffff800082097d90 x28: 0000000000000000 x27: 0000000000000000 [ 94.085611] x26: 1ffe000018b6fd81 x25: 0000000000000000 x24: 0000000000000004 [ 94.086463] x23: fff00000c5b7ec0c x22: ffffaeee56222478 x21: fff00000c1b5ae08 [ 94.087203] x20: 1ffff00010412fa6 x19: ffff800080087990 x18: 00000000cf21e6c3 [ 94.088092] x17: 0000000000000001 x16: fff00000da475d28 x15: fff00000ff616b08 [ 94.089054] x14: 0000000000018fff x13: fff00000cb87bcc8 x12: fffd80001970f8b4 [ 94.089916] x11: 1ffe00001970f8b3 x10: fffd80001970f8b3 x9 : ffffaeee562198e0 [ 94.090953] x8 : ffff800082097c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 94.091715] x5 : ffff700010412fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 94.092476] x2 : dfff800000000000 x1 : fff00000cb87bcc0 x0 : ffff800080087990 [ 94.093406] Call trace: [ 94.093781] kunit_test_null_dereference+0x70/0x170 (P) [ 94.094366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.094730] kthread+0x328/0x630 [ 94.094915] ret_from_fork+0x10/0x20 [ 94.095406] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 94.096019] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 50.077728] ================================================================== [ 50.077828] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 50.077828] [ 50.077930] Use-after-free read at 0x000000006405bb58 (in kfence-#150): [ 50.077982] test_krealloc+0x51c/0x830 [ 50.078030] kunit_try_run_case+0x170/0x3f0 [ 50.078077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.078121] kthread+0x328/0x630 [ 50.078161] ret_from_fork+0x10/0x20 [ 50.078202] [ 50.078226] kfence-#150: 0x000000006405bb58-0x0000000037df8b7b, size=32, cache=kmalloc-32 [ 50.078226] [ 50.078280] allocated by task 337 on cpu 1 at 50.077044s (0.001232s ago): [ 50.078366] test_alloc+0x29c/0x628 [ 50.078409] test_krealloc+0xc0/0x830 [ 50.078447] kunit_try_run_case+0x170/0x3f0 [ 50.078485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.078529] kthread+0x328/0x630 [ 50.078566] ret_from_fork+0x10/0x20 [ 50.078606] [ 50.078631] freed by task 337 on cpu 1 at 50.077291s (0.001336s ago): [ 50.078693] krealloc_noprof+0x148/0x360 [ 50.078733] test_krealloc+0x1dc/0x830 [ 50.078773] kunit_try_run_case+0x170/0x3f0 [ 50.078811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.078855] kthread+0x328/0x630 [ 50.078890] ret_from_fork+0x10/0x20 [ 50.078930] [ 50.078978] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 50.079057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.079088] Hardware name: linux,dummy-virt (DT) [ 50.079124] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 49.901030] ================================================================== [ 49.901137] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 49.901137] [ 49.901239] Use-after-free read at 0x000000003b78985d (in kfence-#148): [ 49.901295] test_memcache_typesafe_by_rcu+0x280/0x560 [ 49.901364] kunit_try_run_case+0x170/0x3f0 [ 49.901413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.901458] kthread+0x328/0x630 [ 49.901498] ret_from_fork+0x10/0x20 [ 49.901539] [ 49.901565] kfence-#148: 0x000000003b78985d-0x000000004312cc97, size=32, cache=test [ 49.901565] [ 49.901619] allocated by task 335 on cpu 0 at 49.868984s (0.032630s ago): [ 49.901688] test_alloc+0x230/0x628 [ 49.901729] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 49.901774] kunit_try_run_case+0x170/0x3f0 [ 49.901812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.901856] kthread+0x328/0x630 [ 49.901891] ret_from_fork+0x10/0x20 [ 49.901930] [ 49.901953] freed by task 335 on cpu 0 at 49.869103s (0.032846s ago): [ 49.902011] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 49.902055] kunit_try_run_case+0x170/0x3f0 [ 49.902093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.902136] kthread+0x328/0x630 [ 49.902172] ret_from_fork+0x10/0x20 [ 49.902213] [ 49.902259] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 49.902348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.902378] Hardware name: linux,dummy-virt (DT) [ 49.902413] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 27.113374] ================================================================== [ 27.113530] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 27.113530] [ 27.113669] Invalid read at 0x0000000025e0d646: [ 27.113882] test_invalid_access+0xdc/0x1f0 [ 27.113964] kunit_try_run_case+0x170/0x3f0 [ 27.114027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.114078] kthread+0x328/0x630 [ 27.114121] ret_from_fork+0x10/0x20 [ 27.114238] [ 27.114297] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 27.114398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.114678] Hardware name: linux,dummy-virt (DT) [ 27.114787] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 26.885269] ================================================================== [ 26.885390] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 26.885390] [ 26.885459] Corrupted memory at 0x000000005fe0eed8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#144): [ 26.885775] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 26.885825] kunit_try_run_case+0x170/0x3f0 [ 26.885868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.885913] kthread+0x328/0x630 [ 26.885951] ret_from_fork+0x10/0x20 [ 26.885992] [ 26.886016] kfence-#144: 0x000000009cd5b11a-0x0000000055dd6b87, size=73, cache=kmalloc-96 [ 26.886016] [ 26.886071] allocated by task 325 on cpu 1 at 26.885012s (0.001055s ago): [ 26.886135] test_alloc+0x29c/0x628 [ 26.886174] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 26.886217] kunit_try_run_case+0x170/0x3f0 [ 26.886258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.886299] kthread+0x328/0x630 [ 26.886347] ret_from_fork+0x10/0x20 [ 26.886387] [ 26.886412] freed by task 325 on cpu 1 at 26.885167s (0.001241s ago): [ 26.886473] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 26.886515] kunit_try_run_case+0x170/0x3f0 [ 26.886555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.886599] kthread+0x328/0x630 [ 26.886634] ret_from_fork+0x10/0x20 [ 26.886675] [ 26.886719] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 26.886796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.886826] Hardware name: linux,dummy-virt (DT) [ 26.886860] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 26.469202] ================================================================== [ 26.469308] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 26.469308] [ 26.469428] Out-of-bounds read at 0x00000000d9d904b4 (105B right of kfence-#140): [ 26.469491] test_kmalloc_aligned_oob_read+0x238/0x468 [ 26.469541] kunit_try_run_case+0x170/0x3f0 [ 26.469586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.469631] kthread+0x328/0x630 [ 26.469671] ret_from_fork+0x10/0x20 [ 26.469712] [ 26.469737] kfence-#140: 0x0000000076aecff8-0x0000000011433b06, size=73, cache=kmalloc-96 [ 26.469737] [ 26.469790] allocated by task 323 on cpu 1 at 26.468929s (0.000857s ago): [ 26.469861] test_alloc+0x29c/0x628 [ 26.469900] test_kmalloc_aligned_oob_read+0x100/0x468 [ 26.469944] kunit_try_run_case+0x170/0x3f0 [ 26.469985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.470027] kthread+0x328/0x630 [ 26.470064] ret_from_fork+0x10/0x20 [ 26.470104] [ 26.470151] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 26.470231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.470260] Hardware name: linux,dummy-virt (DT) [ 26.470296] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 22.413186] ================================================================== [ 22.413286] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 22.413286] [ 22.413361] Corrupted memory at 0x0000000094f4885a [ ! ] (in kfence-#101): [ 22.413486] test_corruption+0x1d8/0x378 [ 22.413535] kunit_try_run_case+0x170/0x3f0 [ 22.413579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.413623] kthread+0x328/0x630 [ 22.413661] ret_from_fork+0x10/0x20 [ 22.413702] [ 22.413726] kfence-#101: 0x0000000068f447da-0x0000000087a651fa, size=32, cache=test [ 22.413726] [ 22.413781] allocated by task 313 on cpu 0 at 22.413040s (0.000738s ago): [ 22.413844] test_alloc+0x230/0x628 [ 22.413887] test_corruption+0x198/0x378 [ 22.413925] kunit_try_run_case+0x170/0x3f0 [ 22.413965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.414007] kthread+0x328/0x630 [ 22.414041] ret_from_fork+0x10/0x20 [ 22.414080] [ 22.414103] freed by task 313 on cpu 0 at 22.413099s (0.001000s ago): [ 22.414163] test_corruption+0x1d8/0x378 [ 22.414202] kunit_try_run_case+0x170/0x3f0 [ 22.414241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.414282] kthread+0x328/0x630 [ 22.414327] ret_from_fork+0x10/0x20 [ 22.414364] [ 22.414407] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 22.414484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.414512] Hardware name: linux,dummy-virt (DT) [ 22.414546] ================================================================== [ 21.582609] ================================================================== [ 21.582706] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 21.582706] [ 21.582769] Corrupted memory at 0x000000008d68f499 [ ! . . . . . . . . . . . . . . . ] (in kfence-#93): [ 21.586652] test_corruption+0x278/0x378 [ 21.586734] kunit_try_run_case+0x170/0x3f0 [ 21.586785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.586830] kthread+0x328/0x630 [ 21.586877] ret_from_fork+0x10/0x20 [ 21.586930] [ 21.586971] kfence-#93: 0x00000000d37f787b-0x00000000341b2e1d, size=32, cache=kmalloc-32 [ 21.586971] [ 21.587077] allocated by task 311 on cpu 0 at 21.582302s (0.004759s ago): [ 21.587156] test_alloc+0x29c/0x628 [ 21.587206] test_corruption+0xdc/0x378 [ 21.587257] kunit_try_run_case+0x170/0x3f0 [ 21.587313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.587375] kthread+0x328/0x630 [ 21.587419] ret_from_fork+0x10/0x20 [ 21.587467] [ 21.587506] freed by task 311 on cpu 0 at 21.582429s (0.005065s ago): [ 21.587577] test_corruption+0x278/0x378 [ 21.587617] kunit_try_run_case+0x170/0x3f0 [ 21.587666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.587725] kthread+0x328/0x630 [ 21.587780] ret_from_fork+0x10/0x20 [ 21.587819] [ 21.587883] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 21.587989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.588034] Hardware name: linux,dummy-virt (DT) [ 21.588100] ================================================================== [ 21.997278] ================================================================== [ 21.997395] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 21.997395] [ 21.997459] Corrupted memory at 0x000000002aa9d90b [ ! ] (in kfence-#97): [ 21.997588] test_corruption+0x284/0x378 [ 21.997635] kunit_try_run_case+0x170/0x3f0 [ 21.997677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.997722] kthread+0x328/0x630 [ 21.997759] ret_from_fork+0x10/0x20 [ 21.997798] [ 21.997822] kfence-#97: 0x00000000c7c33a76-0x0000000095f27c5c, size=32, cache=kmalloc-32 [ 21.997822] [ 21.997876] allocated by task 311 on cpu 0 at 21.996992s (0.000881s ago): [ 21.997939] test_alloc+0x29c/0x628 [ 21.997978] test_corruption+0x198/0x378 [ 21.998016] kunit_try_run_case+0x170/0x3f0 [ 21.998055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.998098] kthread+0x328/0x630 [ 21.998132] ret_from_fork+0x10/0x20 [ 21.998172] [ 21.998194] freed by task 311 on cpu 0 at 21.997102s (0.001088s ago): [ 21.998254] test_corruption+0x284/0x378 [ 21.998293] kunit_try_run_case+0x170/0x3f0 [ 21.998343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.998386] kthread+0x328/0x630 [ 21.998420] ret_from_fork+0x10/0x20 [ 21.998459] [ 21.998502] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 21.998579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.998607] Hardware name: linux,dummy-virt (DT) [ 21.998641] ================================================================== [ 22.205175] ================================================================== [ 22.205275] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 22.205275] [ 22.205353] Corrupted memory at 0x0000000033100ab0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#99): [ 22.205664] test_corruption+0x120/0x378 [ 22.205711] kunit_try_run_case+0x170/0x3f0 [ 22.205754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.205798] kthread+0x328/0x630 [ 22.205836] ret_from_fork+0x10/0x20 [ 22.205877] [ 22.205901] kfence-#99: 0x00000000ad5ad1d6-0x00000000226ce682, size=32, cache=test [ 22.205901] [ 22.205957] allocated by task 313 on cpu 0 at 22.205027s (0.000927s ago): [ 22.206020] test_alloc+0x230/0x628 [ 22.206059] test_corruption+0xdc/0x378 [ 22.206099] kunit_try_run_case+0x170/0x3f0 [ 22.206139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.206183] kthread+0x328/0x630 [ 22.206217] ret_from_fork+0x10/0x20 [ 22.206256] [ 22.206281] freed by task 313 on cpu 0 at 22.205087s (0.001190s ago): [ 22.206350] test_corruption+0x120/0x378 [ 22.206390] kunit_try_run_case+0x170/0x3f0 [ 22.206429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.206473] kthread+0x328/0x630 [ 22.206507] ret_from_fork+0x10/0x20 [ 22.206546] [ 22.206591] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 22.206667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.206695] Hardware name: linux,dummy-virt (DT) [ 22.206730] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 21.370761] ================================================================== [ 21.370839] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 21.370839] [ 21.371062] Invalid free of 0x000000005005abd7 (in kfence-#91): [ 21.371132] test_invalid_addr_free+0x1ac/0x238 [ 21.371307] kunit_try_run_case+0x170/0x3f0 [ 21.371368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.371413] kthread+0x328/0x630 [ 21.371706] ret_from_fork+0x10/0x20 [ 21.371849] [ 21.371930] kfence-#91: 0x0000000004e28f95-0x000000005b39d323, size=32, cache=kmalloc-32 [ 21.371930] [ 21.372376] allocated by task 307 on cpu 0 at 21.370481s (0.001560s ago): [ 21.372465] test_alloc+0x29c/0x628 [ 21.372508] test_invalid_addr_free+0xd4/0x238 [ 21.372874] kunit_try_run_case+0x170/0x3f0 [ 21.373023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.373075] kthread+0x328/0x630 [ 21.373113] ret_from_fork+0x10/0x20 [ 21.373154] [ 21.373224] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 21.373624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.373734] Hardware name: linux,dummy-virt (DT) [ 21.373826] ================================================================== [ 21.479110] ================================================================== [ 21.479194] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 21.479194] [ 21.479541] Invalid free of 0x000000009ec085db (in kfence-#92): [ 21.479617] test_invalid_addr_free+0xec/0x238 [ 21.479691] kunit_try_run_case+0x170/0x3f0 [ 21.479751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.479823] kthread+0x328/0x630 [ 21.480100] ret_from_fork+0x10/0x20 [ 21.480144] [ 21.480177] kfence-#92: 0x0000000052ac07a0-0x0000000013ed7175, size=32, cache=test [ 21.480177] [ 21.480358] allocated by task 309 on cpu 0 at 21.478959s (0.001393s ago): [ 21.480708] test_alloc+0x230/0x628 [ 21.480775] test_invalid_addr_free+0xd4/0x238 [ 21.481048] kunit_try_run_case+0x170/0x3f0 [ 21.481164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.481303] kthread+0x328/0x630 [ 21.481686] ret_from_fork+0x10/0x20 [ 21.481804] [ 21.481869] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 21.482255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.482314] Hardware name: linux,dummy-virt (DT) [ 21.482363] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 21.158991] ================================================================== [ 21.159334] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 21.159334] [ 21.159553] Invalid free of 0x00000000e67eb885 (in kfence-#89): [ 21.159716] test_double_free+0x1bc/0x238 [ 21.159772] kunit_try_run_case+0x170/0x3f0 [ 21.159815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.160069] kthread+0x328/0x630 [ 21.160231] ret_from_fork+0x10/0x20 [ 21.160283] [ 21.160471] kfence-#89: 0x00000000e67eb885-0x00000000a2a27288, size=32, cache=kmalloc-32 [ 21.160471] [ 21.160759] allocated by task 303 on cpu 0 at 21.158114s (0.002637s ago): [ 21.161029] test_alloc+0x29c/0x628 [ 21.161185] test_double_free+0xd4/0x238 [ 21.161624] kunit_try_run_case+0x170/0x3f0 [ 21.161815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.161934] kthread+0x328/0x630 [ 21.162293] ret_from_fork+0x10/0x20 [ 21.162420] [ 21.162863] freed by task 303 on cpu 0 at 21.158475s (0.004376s ago): [ 21.162971] test_double_free+0x1ac/0x238 [ 21.163109] kunit_try_run_case+0x170/0x3f0 [ 21.163160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.163512] kthread+0x328/0x630 [ 21.163714] ret_from_fork+0x10/0x20 [ 21.163848] [ 21.164071] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 21.164547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.164694] Hardware name: linux,dummy-virt (DT) [ 21.164886] ================================================================== [ 21.262881] ================================================================== [ 21.262962] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 21.262962] [ 21.263165] Invalid free of 0x000000001a43d317 (in kfence-#90): [ 21.263255] test_double_free+0x100/0x238 [ 21.263308] kunit_try_run_case+0x170/0x3f0 [ 21.263509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.263571] kthread+0x328/0x630 [ 21.263649] ret_from_fork+0x10/0x20 [ 21.263893] [ 21.264024] kfence-#90: 0x000000001a43d317-0x00000000f80ddab9, size=32, cache=test [ 21.264024] [ 21.264379] allocated by task 305 on cpu 0 at 21.262256s (0.001974s ago): [ 21.264628] test_alloc+0x230/0x628 [ 21.264953] test_double_free+0xd4/0x238 [ 21.265184] kunit_try_run_case+0x170/0x3f0 [ 21.265631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.265843] kthread+0x328/0x630 [ 21.265979] ret_from_fork+0x10/0x20 [ 21.266024] [ 21.266049] freed by task 305 on cpu 0 at 21.262329s (0.003716s ago): [ 21.266485] test_double_free+0xf0/0x238 [ 21.266591] kunit_try_run_case+0x170/0x3f0 [ 21.266802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.267221] kthread+0x328/0x630 [ 21.267385] ret_from_fork+0x10/0x20 [ 21.267455] [ 21.267550] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 21.267631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.267672] Hardware name: linux,dummy-virt (DT) [ 21.267731] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 20.737497] ================================================================== [ 20.737765] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 20.737765] [ 20.737884] Use-after-free read at 0x000000006f0e0a37 (in kfence-#85): [ 20.738277] test_use_after_free_read+0x114/0x248 [ 20.738415] kunit_try_run_case+0x170/0x3f0 [ 20.738466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.738513] kthread+0x328/0x630 [ 20.738586] ret_from_fork+0x10/0x20 [ 20.738634] [ 20.738662] kfence-#85: 0x000000006f0e0a37-0x00000000db2193bf, size=32, cache=kmalloc-32 [ 20.738662] [ 20.738716] allocated by task 295 on cpu 0 at 20.736893s (0.001818s ago): [ 20.738784] test_alloc+0x29c/0x628 [ 20.738826] test_use_after_free_read+0xd0/0x248 [ 20.738876] kunit_try_run_case+0x170/0x3f0 [ 20.738917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.738959] kthread+0x328/0x630 [ 20.738995] ret_from_fork+0x10/0x20 [ 20.739344] [ 20.739948] freed by task 295 on cpu 0 at 20.736983s (0.002439s ago): [ 20.740108] test_use_after_free_read+0x1c0/0x248 [ 20.740461] kunit_try_run_case+0x170/0x3f0 [ 20.740656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.740702] kthread+0x328/0x630 [ 20.740786] ret_from_fork+0x10/0x20 [ 20.740849] [ 20.740898] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.741345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.741473] Hardware name: linux,dummy-virt (DT) [ 20.742008] ================================================================== [ 20.842471] ================================================================== [ 20.842585] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 20.842585] [ 20.842804] Use-after-free read at 0x000000004ed1a66a (in kfence-#86): [ 20.842962] test_use_after_free_read+0x114/0x248 [ 20.843277] kunit_try_run_case+0x170/0x3f0 [ 20.843406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.843457] kthread+0x328/0x630 [ 20.843625] ret_from_fork+0x10/0x20 [ 20.843680] [ 20.843964] kfence-#86: 0x000000004ed1a66a-0x0000000044fd3c6d, size=32, cache=test [ 20.843964] [ 20.844125] allocated by task 297 on cpu 0 at 20.841843s (0.002249s ago): [ 20.844211] test_alloc+0x230/0x628 [ 20.844508] test_use_after_free_read+0xd0/0x248 [ 20.844767] kunit_try_run_case+0x170/0x3f0 [ 20.844973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.845226] kthread+0x328/0x630 [ 20.845421] ret_from_fork+0x10/0x20 [ 20.845531] [ 20.845556] freed by task 297 on cpu 0 at 20.842108s (0.003444s ago): [ 20.845833] test_use_after_free_read+0xf0/0x248 [ 20.846073] kunit_try_run_case+0x170/0x3f0 [ 20.846132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.846516] kthread+0x328/0x630 [ 20.846638] ret_from_fork+0x10/0x20 [ 20.846701] [ 20.847213] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.847604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.847667] Hardware name: linux,dummy-virt (DT) [ 20.847783] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 20.635403] ================================================================== [ 20.635799] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 20.635799] [ 20.635898] Out-of-bounds write at 0x00000000f932d1e7 (1B left of kfence-#84): [ 20.636451] test_out_of_bounds_write+0x100/0x240 [ 20.636648] kunit_try_run_case+0x170/0x3f0 [ 20.636822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.636896] kthread+0x328/0x630 [ 20.637080] ret_from_fork+0x10/0x20 [ 20.637367] [ 20.637400] kfence-#84: 0x000000000faf15e7-0x00000000fbe7fa79, size=32, cache=test [ 20.637400] [ 20.637955] allocated by task 293 on cpu 0 at 20.634973s (0.002964s ago): [ 20.638176] test_alloc+0x230/0x628 [ 20.638372] test_out_of_bounds_write+0xc8/0x240 [ 20.638493] kunit_try_run_case+0x170/0x3f0 [ 20.638547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.638597] kthread+0x328/0x630 [ 20.638654] ret_from_fork+0x10/0x20 [ 20.638714] [ 20.638761] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.638856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.638889] Hardware name: linux,dummy-virt (DT) [ 20.638940] ================================================================== [ 20.530127] ================================================================== [ 20.530206] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 20.530206] [ 20.530293] Out-of-bounds write at 0x00000000b461b851 (1B left of kfence-#83): [ 20.530359] test_out_of_bounds_write+0x100/0x240 [ 20.530406] kunit_try_run_case+0x170/0x3f0 [ 20.530698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.530782] kthread+0x328/0x630 [ 20.530826] ret_from_fork+0x10/0x20 [ 20.530877] [ 20.530903] kfence-#83: 0x000000002cada134-0x00000000b6138ad3, size=32, cache=kmalloc-32 [ 20.530903] [ 20.531086] allocated by task 291 on cpu 0 at 20.529449s (0.001537s ago): [ 20.531177] test_alloc+0x29c/0x628 [ 20.531219] test_out_of_bounds_write+0xc8/0x240 [ 20.531262] kunit_try_run_case+0x170/0x3f0 [ 20.531300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.531354] kthread+0x328/0x630 [ 20.531392] ret_from_fork+0x10/0x20 [ 20.531573] [ 20.531747] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.531911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.532019] Hardware name: linux,dummy-virt (DT) [ 20.532054] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 18.859013] ================================================================== [ 18.859487] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 18.859600] Read of size 1 at addr ffff800080ac7b5f by task kunit_try_catch/251 [ 18.859682] [ 18.859718] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.859827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.859884] Hardware name: linux,dummy-virt (DT) [ 18.860133] Call trace: [ 18.860165] show_stack+0x20/0x38 (C) [ 18.860238] dump_stack_lvl+0x8c/0xd0 [ 18.860433] print_report+0x310/0x5d0 [ 18.860526] kasan_report+0xdc/0x128 [ 18.860594] __asan_report_load1_noabort+0x20/0x30 [ 18.860803] kasan_alloca_oob_left+0x2b8/0x310 [ 18.860919] kunit_try_run_case+0x170/0x3f0 [ 18.861029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.861125] kthread+0x328/0x630 [ 18.861227] ret_from_fork+0x10/0x20 [ 18.861368] [ 18.861419] The buggy address belongs to stack of task kunit_try_catch/251 [ 18.861511] [ 18.861534] The buggy address ffff800080ac7b5f belongs to a vmalloc virtual mapping [ 18.861579] The buggy address belongs to the physical page: [ 18.861612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b [ 18.861668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.861733] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.861785] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.861828] page dumped because: kasan: bad access detected [ 18.861862] [ 18.861882] Memory state around the buggy address: [ 18.861914] ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.861960] ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.862006] >ffff800080ac7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 18.862047] ^ [ 18.862087] ffff800080ac7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 18.862133] ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 18.862175] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 20.218516] ================================================================== [ 20.218597] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 20.218597] [ 20.218721] Out-of-bounds read at 0x0000000097da3632 (32B right of kfence-#80): [ 20.218813] test_out_of_bounds_read+0x1c8/0x3e0 [ 20.218898] kunit_try_run_case+0x170/0x3f0 [ 20.219011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.219095] kthread+0x328/0x630 [ 20.219185] ret_from_fork+0x10/0x20 [ 20.219234] [ 20.219281] kfence-#80: 0x00000000974ca35c-0x00000000caed2796, size=32, cache=kmalloc-32 [ 20.219281] [ 20.219363] allocated by task 287 on cpu 0 at 20.217943s (0.001399s ago): [ 20.219432] test_alloc+0x29c/0x628 [ 20.219491] test_out_of_bounds_read+0x198/0x3e0 [ 20.219534] kunit_try_run_case+0x170/0x3f0 [ 20.219574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.219622] kthread+0x328/0x630 [ 20.219687] ret_from_fork+0x10/0x20 [ 20.220089] [ 20.220183] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.220263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.220293] Hardware name: linux,dummy-virt (DT) [ 20.220337] ================================================================== [ 20.321153] ================================================================== [ 20.321236] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 20.321236] [ 20.321334] Out-of-bounds read at 0x00000000307fac2d (1B left of kfence-#81): [ 20.321392] test_out_of_bounds_read+0x114/0x3e0 [ 20.321437] kunit_try_run_case+0x170/0x3f0 [ 20.321480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.321524] kthread+0x328/0x630 [ 20.321561] ret_from_fork+0x10/0x20 [ 20.321599] [ 20.321623] kfence-#81: 0x000000008e669181-0x00000000c180fda1, size=32, cache=test [ 20.321623] [ 20.321672] allocated by task 289 on cpu 0 at 20.321060s (0.000609s ago): [ 20.321816] test_alloc+0x230/0x628 [ 20.321861] test_out_of_bounds_read+0xdc/0x3e0 [ 20.321903] kunit_try_run_case+0x170/0x3f0 [ 20.321941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.321984] kthread+0x328/0x630 [ 20.322019] ret_from_fork+0x10/0x20 [ 20.322059] [ 20.322101] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.322179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.322207] Hardware name: linux,dummy-virt (DT) [ 20.322240] ================================================================== [ 20.010733] ================================================================== [ 20.010833] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 20.010833] [ 20.011018] Out-of-bounds read at 0x000000000e8a6e9e (1B left of kfence-#78): [ 20.011765] test_out_of_bounds_read+0x114/0x3e0 [ 20.011833] kunit_try_run_case+0x170/0x3f0 [ 20.011880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.011922] kthread+0x328/0x630 [ 20.011962] ret_from_fork+0x10/0x20 [ 20.012006] [ 20.012178] kfence-#78: 0x000000008a7ba22d-0x000000006ac7420d, size=32, cache=kmalloc-32 [ 20.012178] [ 20.012359] allocated by task 287 on cpu 0 at 20.009907s (0.002384s ago): [ 20.013048] test_alloc+0x29c/0x628 [ 20.013125] test_out_of_bounds_read+0xdc/0x3e0 [ 20.013170] kunit_try_run_case+0x170/0x3f0 [ 20.013210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.013253] kthread+0x328/0x630 [ 20.013577] ret_from_fork+0x10/0x20 [ 20.014017] [ 20.014251] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.014482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.014657] Hardware name: linux,dummy-virt (DT) [ 20.014841] ================================================================== [ 20.426745] ================================================================== [ 20.426833] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 20.426833] [ 20.427038] Out-of-bounds read at 0x00000000998d9303 (32B right of kfence-#82): [ 20.427112] test_out_of_bounds_read+0x1c8/0x3e0 [ 20.427547] kunit_try_run_case+0x170/0x3f0 [ 20.427647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.427714] kthread+0x328/0x630 [ 20.427782] ret_from_fork+0x10/0x20 [ 20.427871] [ 20.427960] kfence-#82: 0x00000000d2a59537-0x0000000037320f19, size=32, cache=test [ 20.427960] [ 20.428165] allocated by task 289 on cpu 0 at 20.426560s (0.001451s ago): [ 20.428444] test_alloc+0x230/0x628 [ 20.428579] test_out_of_bounds_read+0x198/0x3e0 [ 20.428982] kunit_try_run_case+0x170/0x3f0 [ 20.429068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.429114] kthread+0x328/0x630 [ 20.429449] ret_from_fork+0x10/0x20 [ 20.429946] [ 20.430028] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.430226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.430258] Hardware name: linux,dummy-virt (DT) [ 20.430884] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 19.925687] ================================================================== [ 19.926083] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 19.926387] Write of size 1 at addr fff00000c7a4ee78 by task kunit_try_catch/285 [ 19.926450] [ 19.926484] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.926576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.926604] Hardware name: linux,dummy-virt (DT) [ 19.926638] Call trace: [ 19.927178] show_stack+0x20/0x38 (C) [ 19.927518] dump_stack_lvl+0x8c/0xd0 [ 19.927919] print_report+0x118/0x5d0 [ 19.928000] kasan_report+0xdc/0x128 [ 19.928068] __asan_report_store1_noabort+0x20/0x30 [ 19.928206] strncpy_from_user+0x270/0x2a0 [ 19.928269] copy_user_test_oob+0x5c0/0xec8 [ 19.928328] kunit_try_run_case+0x170/0x3f0 [ 19.928433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.928493] kthread+0x328/0x630 [ 19.928560] ret_from_fork+0x10/0x20 [ 19.929096] [ 19.929129] Allocated by task 285: [ 19.929163] kasan_save_stack+0x3c/0x68 [ 19.929221] kasan_save_track+0x20/0x40 [ 19.929508] kasan_save_alloc_info+0x40/0x58 [ 19.929766] __kasan_kmalloc+0xd4/0xd8 [ 19.929975] __kmalloc_noprof+0x198/0x4c8 [ 19.930199] kunit_kmalloc_array+0x34/0x88 [ 19.930412] copy_user_test_oob+0xac/0xec8 [ 19.930498] kunit_try_run_case+0x170/0x3f0 [ 19.930740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.930932] kthread+0x328/0x630 [ 19.931273] ret_from_fork+0x10/0x20 [ 19.931479] [ 19.931515] The buggy address belongs to the object at fff00000c7a4ee00 [ 19.931515] which belongs to the cache kmalloc-128 of size 128 [ 19.931616] The buggy address is located 0 bytes to the right of [ 19.931616] allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78) [ 19.931751] [ 19.931776] The buggy address belongs to the physical page: [ 19.931827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 19.931885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.931943] page_type: f5(slab) [ 19.931988] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.932042] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.932084] page dumped because: kasan: bad access detected [ 19.932119] [ 19.932148] Memory state around the buggy address: [ 19.932197] fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.932245] fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.932299] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.932362] ^ [ 19.932407] fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.932452] fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.933160] ================================================================== [ 19.915869] ================================================================== [ 19.915923] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 19.915984] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285 [ 19.916038] [ 19.916749] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.917062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.917238] Hardware name: linux,dummy-virt (DT) [ 19.917519] Call trace: [ 19.917958] show_stack+0x20/0x38 (C) [ 19.918042] dump_stack_lvl+0x8c/0xd0 [ 19.918203] print_report+0x118/0x5d0 [ 19.918315] kasan_report+0xdc/0x128 [ 19.918704] kasan_check_range+0x100/0x1a8 [ 19.918791] __kasan_check_write+0x20/0x30 [ 19.918938] strncpy_from_user+0x3c/0x2a0 [ 19.919331] copy_user_test_oob+0x5c0/0xec8 [ 19.919517] kunit_try_run_case+0x170/0x3f0 [ 19.919599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.919662] kthread+0x328/0x630 [ 19.919706] ret_from_fork+0x10/0x20 [ 19.919769] [ 19.919800] Allocated by task 285: [ 19.919841] kasan_save_stack+0x3c/0x68 [ 19.919886] kasan_save_track+0x20/0x40 [ 19.919926] kasan_save_alloc_info+0x40/0x58 [ 19.919967] __kasan_kmalloc+0xd4/0xd8 [ 19.920006] __kmalloc_noprof+0x198/0x4c8 [ 19.920054] kunit_kmalloc_array+0x34/0x88 [ 19.920102] copy_user_test_oob+0xac/0xec8 [ 19.920140] kunit_try_run_case+0x170/0x3f0 [ 19.920186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.920233] kthread+0x328/0x630 [ 19.920267] ret_from_fork+0x10/0x20 [ 19.920337] [ 19.920368] The buggy address belongs to the object at fff00000c7a4ee00 [ 19.920368] which belongs to the cache kmalloc-128 of size 128 [ 19.920439] The buggy address is located 0 bytes inside of [ 19.920439] allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78) [ 19.920823] [ 19.920857] The buggy address belongs to the physical page: [ 19.920978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 19.921168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.921468] page_type: f5(slab) [ 19.921544] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.921862] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.922237] page dumped because: kasan: bad access detected [ 19.922306] [ 19.922553] Memory state around the buggy address: [ 19.922702] fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.922846] fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.923207] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.923393] ^ [ 19.923589] fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.923812] fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.923897] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 19.894386] ================================================================== [ 19.894737] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 19.895093] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285 [ 19.895176] [ 19.895424] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.895523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.895996] Hardware name: linux,dummy-virt (DT) [ 19.896048] Call trace: [ 19.896104] show_stack+0x20/0x38 (C) [ 19.896168] dump_stack_lvl+0x8c/0xd0 [ 19.896526] print_report+0x118/0x5d0 [ 19.896642] kasan_report+0xdc/0x128 [ 19.897128] kasan_check_range+0x100/0x1a8 [ 19.897218] __kasan_check_write+0x20/0x30 [ 19.897429] copy_user_test_oob+0x434/0xec8 [ 19.897531] kunit_try_run_case+0x170/0x3f0 [ 19.897764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.898062] kthread+0x328/0x630 [ 19.898444] ret_from_fork+0x10/0x20 [ 19.898800] [ 19.898847] Allocated by task 285: [ 19.899027] kasan_save_stack+0x3c/0x68 [ 19.899286] kasan_save_track+0x20/0x40 [ 19.899507] kasan_save_alloc_info+0x40/0x58 [ 19.899676] __kasan_kmalloc+0xd4/0xd8 [ 19.899742] __kmalloc_noprof+0x198/0x4c8 [ 19.899788] kunit_kmalloc_array+0x34/0x88 [ 19.900096] copy_user_test_oob+0xac/0xec8 [ 19.900335] kunit_try_run_case+0x170/0x3f0 [ 19.900502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.900594] kthread+0x328/0x630 [ 19.900694] ret_from_fork+0x10/0x20 [ 19.900823] [ 19.900951] The buggy address belongs to the object at fff00000c7a4ee00 [ 19.900951] which belongs to the cache kmalloc-128 of size 128 [ 19.901031] The buggy address is located 0 bytes inside of [ 19.901031] allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78) [ 19.901484] [ 19.901582] The buggy address belongs to the physical page: [ 19.901845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 19.902051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.902151] page_type: f5(slab) [ 19.902292] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.902429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.902474] page dumped because: kasan: bad access detected [ 19.902545] [ 19.902819] Memory state around the buggy address: [ 19.902910] fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.903120] fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.903170] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.903555] ^ [ 19.903878] fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.904008] fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.904053] ================================================================== [ 19.878077] ================================================================== [ 19.878505] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 19.878573] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285 [ 19.878945] [ 19.879040] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.879413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.879485] Hardware name: linux,dummy-virt (DT) [ 19.879631] Call trace: [ 19.879793] show_stack+0x20/0x38 (C) [ 19.879855] dump_stack_lvl+0x8c/0xd0 [ 19.879965] print_report+0x118/0x5d0 [ 19.880018] kasan_report+0xdc/0x128 [ 19.880104] kasan_check_range+0x100/0x1a8 [ 19.880206] __kasan_check_write+0x20/0x30 [ 19.880483] copy_user_test_oob+0x35c/0xec8 [ 19.880722] kunit_try_run_case+0x170/0x3f0 [ 19.880952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.881286] kthread+0x328/0x630 [ 19.881419] ret_from_fork+0x10/0x20 [ 19.881594] [ 19.881757] Allocated by task 285: [ 19.881793] kasan_save_stack+0x3c/0x68 [ 19.881876] kasan_save_track+0x20/0x40 [ 19.882186] kasan_save_alloc_info+0x40/0x58 [ 19.882543] __kasan_kmalloc+0xd4/0xd8 [ 19.882624] __kmalloc_noprof+0x198/0x4c8 [ 19.882757] kunit_kmalloc_array+0x34/0x88 [ 19.882842] copy_user_test_oob+0xac/0xec8 [ 19.882974] kunit_try_run_case+0x170/0x3f0 [ 19.883080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.883458] kthread+0x328/0x630 [ 19.883522] ret_from_fork+0x10/0x20 [ 19.883879] [ 19.883939] The buggy address belongs to the object at fff00000c7a4ee00 [ 19.883939] which belongs to the cache kmalloc-128 of size 128 [ 19.884053] The buggy address is located 0 bytes inside of [ 19.884053] allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78) [ 19.884241] [ 19.884297] The buggy address belongs to the physical page: [ 19.884393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 19.884460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.884552] page_type: f5(slab) [ 19.884908] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.884991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.885387] page dumped because: kasan: bad access detected [ 19.885701] [ 19.885738] Memory state around the buggy address: [ 19.885778] fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.885990] fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.886423] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.886660] ^ [ 19.886797] fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.886910] fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.886954] ================================================================== [ 19.906224] ================================================================== [ 19.906352] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 19.906425] Read of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285 [ 19.906478] [ 19.906679] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.907096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.907172] Hardware name: linux,dummy-virt (DT) [ 19.907247] Call trace: [ 19.907277] show_stack+0x20/0x38 (C) [ 19.907522] dump_stack_lvl+0x8c/0xd0 [ 19.907675] print_report+0x118/0x5d0 [ 19.907967] kasan_report+0xdc/0x128 [ 19.908182] kasan_check_range+0x100/0x1a8 [ 19.908280] __kasan_check_read+0x20/0x30 [ 19.908530] copy_user_test_oob+0x4a0/0xec8 [ 19.908607] kunit_try_run_case+0x170/0x3f0 [ 19.908862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.909018] kthread+0x328/0x630 [ 19.909176] ret_from_fork+0x10/0x20 [ 19.909234] [ 19.909266] Allocated by task 285: [ 19.909303] kasan_save_stack+0x3c/0x68 [ 19.909657] kasan_save_track+0x20/0x40 [ 19.909853] kasan_save_alloc_info+0x40/0x58 [ 19.909926] __kasan_kmalloc+0xd4/0xd8 [ 19.910145] __kmalloc_noprof+0x198/0x4c8 [ 19.910312] kunit_kmalloc_array+0x34/0x88 [ 19.910786] copy_user_test_oob+0xac/0xec8 [ 19.910967] kunit_try_run_case+0x170/0x3f0 [ 19.911201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.911458] kthread+0x328/0x630 [ 19.911573] ret_from_fork+0x10/0x20 [ 19.911697] [ 19.911722] The buggy address belongs to the object at fff00000c7a4ee00 [ 19.911722] which belongs to the cache kmalloc-128 of size 128 [ 19.911830] The buggy address is located 0 bytes inside of [ 19.911830] allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78) [ 19.912205] [ 19.912262] The buggy address belongs to the physical page: [ 19.912607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 19.912785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.912888] page_type: f5(slab) [ 19.913015] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.913083] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.913133] page dumped because: kasan: bad access detected [ 19.913478] [ 19.913517] Memory state around the buggy address: [ 19.913572] fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.913842] fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.913899] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.913941] ^ [ 19.914111] fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.914175] fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.914217] ================================================================== [ 19.887975] ================================================================== [ 19.888738] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 19.888821] Read of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285 [ 19.889090] [ 19.889266] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.889406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.889473] Hardware name: linux,dummy-virt (DT) [ 19.889508] Call trace: [ 19.889533] show_stack+0x20/0x38 (C) [ 19.889904] dump_stack_lvl+0x8c/0xd0 [ 19.890117] print_report+0x118/0x5d0 [ 19.890418] kasan_report+0xdc/0x128 [ 19.890526] kasan_check_range+0x100/0x1a8 [ 19.890593] __kasan_check_read+0x20/0x30 [ 19.890639] copy_user_test_oob+0x3c8/0xec8 [ 19.890716] kunit_try_run_case+0x170/0x3f0 [ 19.890769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.890824] kthread+0x328/0x630 [ 19.890882] ret_from_fork+0x10/0x20 [ 19.890934] [ 19.890955] Allocated by task 285: [ 19.890992] kasan_save_stack+0x3c/0x68 [ 19.891047] kasan_save_track+0x20/0x40 [ 19.891087] kasan_save_alloc_info+0x40/0x58 [ 19.891131] __kasan_kmalloc+0xd4/0xd8 [ 19.891170] __kmalloc_noprof+0x198/0x4c8 [ 19.891211] kunit_kmalloc_array+0x34/0x88 [ 19.891262] copy_user_test_oob+0xac/0xec8 [ 19.891315] kunit_try_run_case+0x170/0x3f0 [ 19.891391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.891446] kthread+0x328/0x630 [ 19.891489] ret_from_fork+0x10/0x20 [ 19.891526] [ 19.891549] The buggy address belongs to the object at fff00000c7a4ee00 [ 19.891549] which belongs to the cache kmalloc-128 of size 128 [ 19.891608] The buggy address is located 0 bytes inside of [ 19.891608] allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78) [ 19.891682] [ 19.891718] The buggy address belongs to the physical page: [ 19.891755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 19.891816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.891883] page_type: f5(slab) [ 19.891923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.891975] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.892017] page dumped because: kasan: bad access detected [ 19.892059] [ 19.892095] Memory state around the buggy address: [ 19.892128] fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.892180] fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.892241] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.892281] ^ [ 19.892332] fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.892896] fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.893345] ================================================================== [ 19.861673] ================================================================== [ 19.861748] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 19.861809] Read of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285 [ 19.861863] [ 19.861904] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.861991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.862019] Hardware name: linux,dummy-virt (DT) [ 19.862055] Call trace: [ 19.862081] show_stack+0x20/0x38 (C) [ 19.862134] dump_stack_lvl+0x8c/0xd0 [ 19.862182] print_report+0x118/0x5d0 [ 19.862229] kasan_report+0xdc/0x128 [ 19.862277] kasan_check_range+0x100/0x1a8 [ 19.862342] __kasan_check_read+0x20/0x30 [ 19.862387] copy_user_test_oob+0x728/0xec8 [ 19.862436] kunit_try_run_case+0x170/0x3f0 [ 19.862495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.862549] kthread+0x328/0x630 [ 19.862597] ret_from_fork+0x10/0x20 [ 19.862648] [ 19.862680] Allocated by task 285: [ 19.862712] kasan_save_stack+0x3c/0x68 [ 19.862756] kasan_save_track+0x20/0x40 [ 19.862794] kasan_save_alloc_info+0x40/0x58 [ 19.862836] __kasan_kmalloc+0xd4/0xd8 [ 19.862873] __kmalloc_noprof+0x198/0x4c8 [ 19.862914] kunit_kmalloc_array+0x34/0x88 [ 19.862959] copy_user_test_oob+0xac/0xec8 [ 19.863000] kunit_try_run_case+0x170/0x3f0 [ 19.863039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.863083] kthread+0x328/0x630 [ 19.863118] ret_from_fork+0x10/0x20 [ 19.863154] [ 19.863176] The buggy address belongs to the object at fff00000c7a4ee00 [ 19.863176] which belongs to the cache kmalloc-128 of size 128 [ 19.863245] The buggy address is located 0 bytes inside of [ 19.863245] allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78) [ 19.863315] [ 19.864877] The buggy address belongs to the physical page: [ 19.864951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 19.865121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.865285] page_type: f5(slab) [ 19.865699] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.865797] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.865877] page dumped because: kasan: bad access detected [ 19.865930] [ 19.866726] Memory state around the buggy address: [ 19.866772] fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.866857] fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.866913] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.866976] ^ [ 19.867046] fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.867380] fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.867643] ================================================================== [ 19.846697] ================================================================== [ 19.846808] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 19.846890] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285 [ 19.846944] [ 19.847029] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.847214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.847272] Hardware name: linux,dummy-virt (DT) [ 19.847339] Call trace: [ 19.847449] show_stack+0x20/0x38 (C) [ 19.847511] dump_stack_lvl+0x8c/0xd0 [ 19.847566] print_report+0x118/0x5d0 [ 19.847615] kasan_report+0xdc/0x128 [ 19.847901] kasan_check_range+0x100/0x1a8 [ 19.847972] __kasan_check_write+0x20/0x30 [ 19.848082] copy_user_test_oob+0x234/0xec8 [ 19.848143] kunit_try_run_case+0x170/0x3f0 [ 19.848205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.848266] kthread+0x328/0x630 [ 19.848312] ret_from_fork+0x10/0x20 [ 19.848377] [ 19.848478] Allocated by task 285: [ 19.848529] kasan_save_stack+0x3c/0x68 [ 19.848760] kasan_save_track+0x20/0x40 [ 19.848977] kasan_save_alloc_info+0x40/0x58 [ 19.849210] __kasan_kmalloc+0xd4/0xd8 [ 19.849256] __kmalloc_noprof+0x198/0x4c8 [ 19.849595] kunit_kmalloc_array+0x34/0x88 [ 19.849706] copy_user_test_oob+0xac/0xec8 [ 19.850019] kunit_try_run_case+0x170/0x3f0 [ 19.850104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.850285] kthread+0x328/0x630 [ 19.850338] ret_from_fork+0x10/0x20 [ 19.850720] [ 19.850761] The buggy address belongs to the object at fff00000c7a4ee00 [ 19.850761] which belongs to the cache kmalloc-128 of size 128 [ 19.851137] The buggy address is located 0 bytes inside of [ 19.851137] allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78) [ 19.851333] [ 19.851401] The buggy address belongs to the physical page: [ 19.851456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 19.851593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.851765] page_type: f5(slab) [ 19.852157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.852226] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.852272] page dumped because: kasan: bad access detected [ 19.852364] [ 19.852512] Memory state around the buggy address: [ 19.852608] fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.852691] fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.852736] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.853105] ^ [ 19.853180] fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.853238] fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.853620] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 19.814922] ================================================================== [ 19.814995] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 19.815076] Read of size 8 at addr fff00000c7a4ed78 by task kunit_try_catch/281 [ 19.815656] [ 19.815925] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.816442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.816483] Hardware name: linux,dummy-virt (DT) [ 19.816587] Call trace: [ 19.816691] show_stack+0x20/0x38 (C) [ 19.816752] dump_stack_lvl+0x8c/0xd0 [ 19.816825] print_report+0x118/0x5d0 [ 19.816882] kasan_report+0xdc/0x128 [ 19.816929] __asan_report_load8_noabort+0x20/0x30 [ 19.816999] copy_to_kernel_nofault+0x204/0x250 [ 19.817051] copy_to_kernel_nofault_oob+0x158/0x418 [ 19.817099] kunit_try_run_case+0x170/0x3f0 [ 19.817359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.817524] kthread+0x328/0x630 [ 19.817640] ret_from_fork+0x10/0x20 [ 19.817714] [ 19.817735] Allocated by task 281: [ 19.817767] kasan_save_stack+0x3c/0x68 [ 19.817848] kasan_save_track+0x20/0x40 [ 19.817971] kasan_save_alloc_info+0x40/0x58 [ 19.818064] __kasan_kmalloc+0xd4/0xd8 [ 19.818136] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.818191] copy_to_kernel_nofault_oob+0xc8/0x418 [ 19.818284] kunit_try_run_case+0x170/0x3f0 [ 19.818338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.818421] kthread+0x328/0x630 [ 19.818478] ret_from_fork+0x10/0x20 [ 19.818518] [ 19.818542] The buggy address belongs to the object at fff00000c7a4ed00 [ 19.818542] which belongs to the cache kmalloc-128 of size 128 [ 19.818618] The buggy address is located 0 bytes to the right of [ 19.818618] allocated 120-byte region [fff00000c7a4ed00, fff00000c7a4ed78) [ 19.818694] [ 19.818717] The buggy address belongs to the physical page: [ 19.818779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 19.818840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.818892] page_type: f5(slab) [ 19.818938] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.818989] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.819168] page dumped because: kasan: bad access detected [ 19.819233] [ 19.819312] Memory state around the buggy address: [ 19.819443] fff00000c7a4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.819525] fff00000c7a4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.819587] >fff00000c7a4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.819695] ^ [ 19.819798] fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.819882] fff00000c7a4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.819996] ================================================================== [ 19.820346] ================================================================== [ 19.820737] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 19.820812] Write of size 8 at addr fff00000c7a4ed78 by task kunit_try_catch/281 [ 19.820866] [ 19.820900] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.820982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.821011] Hardware name: linux,dummy-virt (DT) [ 19.821043] Call trace: [ 19.821069] show_stack+0x20/0x38 (C) [ 19.821120] dump_stack_lvl+0x8c/0xd0 [ 19.821170] print_report+0x118/0x5d0 [ 19.821217] kasan_report+0xdc/0x128 [ 19.821267] kasan_check_range+0x100/0x1a8 [ 19.821317] __kasan_check_write+0x20/0x30 [ 19.821425] copy_to_kernel_nofault+0x8c/0x250 [ 19.821475] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 19.821535] kunit_try_run_case+0x170/0x3f0 [ 19.821582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.821636] kthread+0x328/0x630 [ 19.821680] ret_from_fork+0x10/0x20 [ 19.821728] [ 19.821766] Allocated by task 281: [ 19.821796] kasan_save_stack+0x3c/0x68 [ 19.821839] kasan_save_track+0x20/0x40 [ 19.821877] kasan_save_alloc_info+0x40/0x58 [ 19.821925] __kasan_kmalloc+0xd4/0xd8 [ 19.821965] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.822015] copy_to_kernel_nofault_oob+0xc8/0x418 [ 19.822056] kunit_try_run_case+0x170/0x3f0 [ 19.822103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.822154] kthread+0x328/0x630 [ 19.822190] ret_from_fork+0x10/0x20 [ 19.822226] [ 19.822247] The buggy address belongs to the object at fff00000c7a4ed00 [ 19.822247] which belongs to the cache kmalloc-128 of size 128 [ 19.822304] The buggy address is located 0 bytes to the right of [ 19.822304] allocated 120-byte region [fff00000c7a4ed00, fff00000c7a4ed78) [ 19.822379] [ 19.822409] The buggy address belongs to the physical page: [ 19.822444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 19.822505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.822554] page_type: f5(slab) [ 19.822593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.822645] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.822687] page dumped because: kasan: bad access detected [ 19.822718] [ 19.822748] Memory state around the buggy address: [ 19.822781] fff00000c7a4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.822827] fff00000c7a4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.822883] >fff00000c7a4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.822924] ^ [ 19.822966] fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.823011] fff00000c7a4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.823061] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 19.760874] ================================================================== [ 19.760935] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 19.761196] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 19.761334] [ 19.761403] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.761487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.761518] Hardware name: linux,dummy-virt (DT) [ 19.761675] Call trace: [ 19.761700] show_stack+0x20/0x38 (C) [ 19.761751] dump_stack_lvl+0x8c/0xd0 [ 19.761799] print_report+0x310/0x5d0 [ 19.762007] kasan_report+0xdc/0x128 [ 19.762094] __asan_report_load1_noabort+0x20/0x30 [ 19.762372] vmalloc_oob+0x51c/0x5d0 [ 19.762574] kunit_try_run_case+0x170/0x3f0 [ 19.762650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.763031] kthread+0x328/0x630 [ 19.763172] ret_from_fork+0x10/0x20 [ 19.763274] [ 19.763449] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 19.763615] The buggy address belongs to the physical page: [ 19.763677] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107abd [ 19.763764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.763874] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.763990] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.764090] page dumped because: kasan: bad access detected [ 19.764146] [ 19.764173] Memory state around the buggy address: [ 19.764207] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.764286] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.764632] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.764742] ^ [ 19.764825] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.764881] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.764930] ================================================================== [ 19.756064] ================================================================== [ 19.756138] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 19.756294] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 19.756363] [ 19.756534] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.756649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.756684] Hardware name: linux,dummy-virt (DT) [ 19.756721] Call trace: [ 19.756747] show_stack+0x20/0x38 (C) [ 19.756985] dump_stack_lvl+0x8c/0xd0 [ 19.757092] print_report+0x310/0x5d0 [ 19.757192] kasan_report+0xdc/0x128 [ 19.757291] __asan_report_load1_noabort+0x20/0x30 [ 19.757389] vmalloc_oob+0x578/0x5d0 [ 19.757486] kunit_try_run_case+0x170/0x3f0 [ 19.757624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.757766] kthread+0x328/0x630 [ 19.757871] ret_from_fork+0x10/0x20 [ 19.758003] [ 19.758079] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 19.758175] The buggy address belongs to the physical page: [ 19.758211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107abd [ 19.758432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.758684] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.758787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.758884] page dumped because: kasan: bad access detected [ 19.758933] [ 19.758955] Memory state around the buggy address: [ 19.758992] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.759308] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.759404] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.759506] ^ [ 19.759664] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.759844] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.759959] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 19.527627] ================================================================== [ 19.527681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.527734] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.528220] [ 19.528286] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.529029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.529078] Hardware name: linux,dummy-virt (DT) [ 19.529149] Call trace: [ 19.529197] show_stack+0x20/0x38 (C) [ 19.529253] dump_stack_lvl+0x8c/0xd0 [ 19.529302] print_report+0x118/0x5d0 [ 19.529363] kasan_report+0xdc/0x128 [ 19.529563] kasan_check_range+0x100/0x1a8 [ 19.529912] __kasan_check_write+0x20/0x30 [ 19.530149] kasan_atomics_helper+0xff0/0x4858 [ 19.530675] kasan_atomics+0x198/0x2e0 [ 19.530934] kunit_try_run_case+0x170/0x3f0 [ 19.531483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.531619] kthread+0x328/0x630 [ 19.531846] ret_from_fork+0x10/0x20 [ 19.531986] [ 19.532239] Allocated by task 265: [ 19.532332] kasan_save_stack+0x3c/0x68 [ 19.532510] kasan_save_track+0x20/0x40 [ 19.532771] kasan_save_alloc_info+0x40/0x58 [ 19.532974] __kasan_kmalloc+0xd4/0xd8 [ 19.533115] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.533162] kasan_atomics+0xb8/0x2e0 [ 19.533210] kunit_try_run_case+0x170/0x3f0 [ 19.533298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.533515] kthread+0x328/0x630 [ 19.533927] ret_from_fork+0x10/0x20 [ 19.534018] [ 19.534199] The buggy address belongs to the object at fff00000c7ab9600 [ 19.534199] which belongs to the cache kmalloc-64 of size 64 [ 19.534431] The buggy address is located 0 bytes to the right of [ 19.534431] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.534654] [ 19.534700] The buggy address belongs to the physical page: [ 19.534754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.535003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.535150] page_type: f5(slab) [ 19.535406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.535468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.535545] page dumped because: kasan: bad access detected [ 19.535742] [ 19.535771] Memory state around the buggy address: [ 19.535808] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.535865] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.535910] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.535947] ^ [ 19.535983] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536027] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536075] ================================================================== [ 19.507329] ================================================================== [ 19.507439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.507562] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.507663] [ 19.507699] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.507783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.507981] Hardware name: linux,dummy-virt (DT) [ 19.508245] Call trace: [ 19.508289] show_stack+0x20/0x38 (C) [ 19.508650] dump_stack_lvl+0x8c/0xd0 [ 19.508780] print_report+0x118/0x5d0 [ 19.508908] kasan_report+0xdc/0x128 [ 19.508970] kasan_check_range+0x100/0x1a8 [ 19.509288] __kasan_check_write+0x20/0x30 [ 19.509590] kasan_atomics_helper+0xf20/0x4858 [ 19.509774] kasan_atomics+0x198/0x2e0 [ 19.509960] kunit_try_run_case+0x170/0x3f0 [ 19.510090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.510214] kthread+0x328/0x630 [ 19.510501] ret_from_fork+0x10/0x20 [ 19.510884] [ 19.510912] Allocated by task 265: [ 19.511070] kasan_save_stack+0x3c/0x68 [ 19.512075] kasan_save_track+0x20/0x40 [ 19.512483] kasan_save_alloc_info+0x40/0x58 [ 19.512591] __kasan_kmalloc+0xd4/0xd8 [ 19.512697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.512947] kasan_atomics+0xb8/0x2e0 [ 19.513118] kunit_try_run_case+0x170/0x3f0 [ 19.513343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.513552] kthread+0x328/0x630 [ 19.513622] ret_from_fork+0x10/0x20 [ 19.513660] [ 19.513731] The buggy address belongs to the object at fff00000c7ab9600 [ 19.513731] which belongs to the cache kmalloc-64 of size 64 [ 19.514164] The buggy address is located 0 bytes to the right of [ 19.514164] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.514378] [ 19.514522] The buggy address belongs to the physical page: [ 19.514758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.515115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.515455] page_type: f5(slab) [ 19.515578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.515765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.516021] page dumped because: kasan: bad access detected [ 19.516129] [ 19.516250] Memory state around the buggy address: [ 19.516317] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.516606] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.516799] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.516849] ^ [ 19.517159] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.517214] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.517600] ================================================================== [ 19.711228] ================================================================== [ 19.711351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.711406] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.711481] [ 19.711521] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.711614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.711652] Hardware name: linux,dummy-virt (DT) [ 19.711684] Call trace: [ 19.711709] show_stack+0x20/0x38 (C) [ 19.711759] dump_stack_lvl+0x8c/0xd0 [ 19.711808] print_report+0x118/0x5d0 [ 19.711855] kasan_report+0xdc/0x128 [ 19.711902] kasan_check_range+0x100/0x1a8 [ 19.711953] __kasan_check_write+0x20/0x30 [ 19.712001] kasan_atomics_helper+0x175c/0x4858 [ 19.712068] kasan_atomics+0x198/0x2e0 [ 19.712114] kunit_try_run_case+0x170/0x3f0 [ 19.712167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.712230] kthread+0x328/0x630 [ 19.712273] ret_from_fork+0x10/0x20 [ 19.712673] [ 19.712707] Allocated by task 265: [ 19.712902] kasan_save_stack+0x3c/0x68 [ 19.713105] kasan_save_track+0x20/0x40 [ 19.713169] kasan_save_alloc_info+0x40/0x58 [ 19.713278] __kasan_kmalloc+0xd4/0xd8 [ 19.713721] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.713866] kasan_atomics+0xb8/0x2e0 [ 19.713947] kunit_try_run_case+0x170/0x3f0 [ 19.714303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.714489] kthread+0x328/0x630 [ 19.714814] ret_from_fork+0x10/0x20 [ 19.715046] [ 19.715114] The buggy address belongs to the object at fff00000c7ab9600 [ 19.715114] which belongs to the cache kmalloc-64 of size 64 [ 19.715452] The buggy address is located 0 bytes to the right of [ 19.715452] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.715718] [ 19.715763] The buggy address belongs to the physical page: [ 19.716296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.716385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.716552] page_type: f5(slab) [ 19.716598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.716650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.716995] page dumped because: kasan: bad access detected [ 19.717481] [ 19.717511] Memory state around the buggy address: [ 19.717550] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.717785] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.717851] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.718184] ^ [ 19.718280] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.718393] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.718731] ================================================================== [ 19.657661] ================================================================== [ 19.657956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.658055] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.658162] [ 19.658376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.658531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.658566] Hardware name: linux,dummy-virt (DT) [ 19.658908] Call trace: [ 19.659045] show_stack+0x20/0x38 (C) [ 19.659107] dump_stack_lvl+0x8c/0xd0 [ 19.659154] print_report+0x118/0x5d0 [ 19.659514] kasan_report+0xdc/0x128 [ 19.659586] kasan_check_range+0x100/0x1a8 [ 19.659699] __kasan_check_write+0x20/0x30 [ 19.659766] kasan_atomics_helper+0x15b4/0x4858 [ 19.659819] kasan_atomics+0x198/0x2e0 [ 19.660003] kunit_try_run_case+0x170/0x3f0 [ 19.660056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.660111] kthread+0x328/0x630 [ 19.660432] ret_from_fork+0x10/0x20 [ 19.660672] [ 19.660746] Allocated by task 265: [ 19.660892] kasan_save_stack+0x3c/0x68 [ 19.660952] kasan_save_track+0x20/0x40 [ 19.661048] kasan_save_alloc_info+0x40/0x58 [ 19.661122] __kasan_kmalloc+0xd4/0xd8 [ 19.661162] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.661227] kasan_atomics+0xb8/0x2e0 [ 19.661267] kunit_try_run_case+0x170/0x3f0 [ 19.661469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.661618] kthread+0x328/0x630 [ 19.661685] ret_from_fork+0x10/0x20 [ 19.662051] [ 19.662105] The buggy address belongs to the object at fff00000c7ab9600 [ 19.662105] which belongs to the cache kmalloc-64 of size 64 [ 19.662436] The buggy address is located 0 bytes to the right of [ 19.662436] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.662547] [ 19.662703] The buggy address belongs to the physical page: [ 19.663011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.663079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.663513] page_type: f5(slab) [ 19.663690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.664088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.664331] page dumped because: kasan: bad access detected [ 19.664631] [ 19.664753] Memory state around the buggy address: [ 19.664969] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.665209] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.665306] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.665530] ^ [ 19.665592] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.665685] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.665858] ================================================================== [ 19.676053] ================================================================== [ 19.676139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.676196] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.676302] [ 19.676346] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.676435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.676464] Hardware name: linux,dummy-virt (DT) [ 19.676496] Call trace: [ 19.676526] show_stack+0x20/0x38 (C) [ 19.677034] dump_stack_lvl+0x8c/0xd0 [ 19.677195] print_report+0x118/0x5d0 [ 19.677305] kasan_report+0xdc/0x128 [ 19.677487] kasan_check_range+0x100/0x1a8 [ 19.677541] __kasan_check_write+0x20/0x30 [ 19.677588] kasan_atomics_helper+0x1644/0x4858 [ 19.677639] kasan_atomics+0x198/0x2e0 [ 19.677684] kunit_try_run_case+0x170/0x3f0 [ 19.678228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.678440] kthread+0x328/0x630 [ 19.678575] ret_from_fork+0x10/0x20 [ 19.678706] [ 19.678778] Allocated by task 265: [ 19.678876] kasan_save_stack+0x3c/0x68 [ 19.678921] kasan_save_track+0x20/0x40 [ 19.678960] kasan_save_alloc_info+0x40/0x58 [ 19.679002] __kasan_kmalloc+0xd4/0xd8 [ 19.679050] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.679092] kasan_atomics+0xb8/0x2e0 [ 19.679140] kunit_try_run_case+0x170/0x3f0 [ 19.679180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.679239] kthread+0x328/0x630 [ 19.679275] ret_from_fork+0x10/0x20 [ 19.679314] [ 19.679479] The buggy address belongs to the object at fff00000c7ab9600 [ 19.679479] which belongs to the cache kmalloc-64 of size 64 [ 19.679929] The buggy address is located 0 bytes to the right of [ 19.679929] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.680197] [ 19.680529] The buggy address belongs to the physical page: [ 19.680964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.681030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.681090] page_type: f5(slab) [ 19.681464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.681855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.681907] page dumped because: kasan: bad access detected [ 19.681944] [ 19.681965] Memory state around the buggy address: [ 19.682407] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.682746] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.682996] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.683099] ^ [ 19.683298] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.683367] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.683406] ================================================================== [ 19.603447] ================================================================== [ 19.603750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.603992] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.604054] [ 19.604090] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.604345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.604387] Hardware name: linux,dummy-virt (DT) [ 19.604421] Call trace: [ 19.604483] show_stack+0x20/0x38 (C) [ 19.605135] dump_stack_lvl+0x8c/0xd0 [ 19.605246] print_report+0x118/0x5d0 [ 19.605512] kasan_report+0xdc/0x128 [ 19.605691] kasan_check_range+0x100/0x1a8 [ 19.606081] __kasan_check_write+0x20/0x30 [ 19.606272] kasan_atomics_helper+0x1384/0x4858 [ 19.606674] kasan_atomics+0x198/0x2e0 [ 19.606786] kunit_try_run_case+0x170/0x3f0 [ 19.607069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.607204] kthread+0x328/0x630 [ 19.607480] ret_from_fork+0x10/0x20 [ 19.607625] [ 19.607709] Allocated by task 265: [ 19.607741] kasan_save_stack+0x3c/0x68 [ 19.607851] kasan_save_track+0x20/0x40 [ 19.608165] kasan_save_alloc_info+0x40/0x58 [ 19.608550] __kasan_kmalloc+0xd4/0xd8 [ 19.608684] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.608842] kasan_atomics+0xb8/0x2e0 [ 19.608940] kunit_try_run_case+0x170/0x3f0 [ 19.609182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.609400] kthread+0x328/0x630 [ 19.609507] ret_from_fork+0x10/0x20 [ 19.609764] [ 19.609820] The buggy address belongs to the object at fff00000c7ab9600 [ 19.609820] which belongs to the cache kmalloc-64 of size 64 [ 19.610056] The buggy address is located 0 bytes to the right of [ 19.610056] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.610350] [ 19.610482] The buggy address belongs to the physical page: [ 19.610769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.610920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.611363] page_type: f5(slab) [ 19.611430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.611842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.611915] page dumped because: kasan: bad access detected [ 19.611951] [ 19.611972] Memory state around the buggy address: [ 19.612008] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.612483] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.612654] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.612841] ^ [ 19.612888] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.612935] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.612974] ================================================================== [ 19.562921] ================================================================== [ 19.562974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.563200] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.563280] [ 19.563315] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.563831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.563892] Hardware name: linux,dummy-virt (DT) [ 19.563981] Call trace: [ 19.564009] show_stack+0x20/0x38 (C) [ 19.564064] dump_stack_lvl+0x8c/0xd0 [ 19.564187] print_report+0x118/0x5d0 [ 19.564244] kasan_report+0xdc/0x128 [ 19.564291] kasan_check_range+0x100/0x1a8 [ 19.564352] __kasan_check_write+0x20/0x30 [ 19.564397] kasan_atomics_helper+0x1190/0x4858 [ 19.564675] kasan_atomics+0x198/0x2e0 [ 19.565193] kunit_try_run_case+0x170/0x3f0 [ 19.565297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.565479] kthread+0x328/0x630 [ 19.565527] ret_from_fork+0x10/0x20 [ 19.565576] [ 19.565873] Allocated by task 265: [ 19.566010] kasan_save_stack+0x3c/0x68 [ 19.566108] kasan_save_track+0x20/0x40 [ 19.566553] kasan_save_alloc_info+0x40/0x58 [ 19.566658] __kasan_kmalloc+0xd4/0xd8 [ 19.566772] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.566903] kasan_atomics+0xb8/0x2e0 [ 19.566990] kunit_try_run_case+0x170/0x3f0 [ 19.567207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.567461] kthread+0x328/0x630 [ 19.567760] ret_from_fork+0x10/0x20 [ 19.568011] [ 19.568069] The buggy address belongs to the object at fff00000c7ab9600 [ 19.568069] which belongs to the cache kmalloc-64 of size 64 [ 19.568593] The buggy address is located 0 bytes to the right of [ 19.568593] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.568819] [ 19.568944] The buggy address belongs to the physical page: [ 19.569076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.569346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.569592] page_type: f5(slab) [ 19.569675] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.569730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.570152] page dumped because: kasan: bad access detected [ 19.570458] [ 19.570600] Memory state around the buggy address: [ 19.570640] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.570882] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.571337] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.571893] ^ [ 19.572108] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.572438] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.572539] ================================================================== [ 19.455989] ================================================================== [ 19.456044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.456096] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.456147] [ 19.456184] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.456877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.457114] Hardware name: linux,dummy-virt (DT) [ 19.457178] Call trace: [ 19.457295] show_stack+0x20/0x38 (C) [ 19.457533] dump_stack_lvl+0x8c/0xd0 [ 19.457746] print_report+0x118/0x5d0 [ 19.457838] kasan_report+0xdc/0x128 [ 19.458102] kasan_check_range+0x100/0x1a8 [ 19.458373] __kasan_check_read+0x20/0x30 [ 19.458683] kasan_atomics_helper+0xdd4/0x4858 [ 19.458763] kasan_atomics+0x198/0x2e0 [ 19.458811] kunit_try_run_case+0x170/0x3f0 [ 19.459447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.459668] kthread+0x328/0x630 [ 19.459734] ret_from_fork+0x10/0x20 [ 19.460000] [ 19.460194] Allocated by task 265: [ 19.460261] kasan_save_stack+0x3c/0x68 [ 19.460329] kasan_save_track+0x20/0x40 [ 19.460372] kasan_save_alloc_info+0x40/0x58 [ 19.460421] __kasan_kmalloc+0xd4/0xd8 [ 19.460475] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.460795] kasan_atomics+0xb8/0x2e0 [ 19.460847] kunit_try_run_case+0x170/0x3f0 [ 19.460888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.460940] kthread+0x328/0x630 [ 19.460976] ret_from_fork+0x10/0x20 [ 19.461144] [ 19.461223] The buggy address belongs to the object at fff00000c7ab9600 [ 19.461223] which belongs to the cache kmalloc-64 of size 64 [ 19.461690] The buggy address is located 0 bytes to the right of [ 19.461690] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.462269] [ 19.462426] The buggy address belongs to the physical page: [ 19.462524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.462609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.462965] page_type: f5(slab) [ 19.463308] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.463652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.463902] page dumped because: kasan: bad access detected [ 19.464177] [ 19.464253] Memory state around the buggy address: [ 19.464384] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.464712] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.464766] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.464945] ^ [ 19.465025] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.465188] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.465267] ================================================================== [ 19.614758] ================================================================== [ 19.615153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.615252] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.615441] [ 19.615485] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.615568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.615598] Hardware name: linux,dummy-virt (DT) [ 19.615932] Call trace: [ 19.615974] show_stack+0x20/0x38 (C) [ 19.616030] dump_stack_lvl+0x8c/0xd0 [ 19.616498] print_report+0x118/0x5d0 [ 19.616922] kasan_report+0xdc/0x128 [ 19.617049] __asan_report_load8_noabort+0x20/0x30 [ 19.617168] kasan_atomics_helper+0x3f04/0x4858 [ 19.617337] kasan_atomics+0x198/0x2e0 [ 19.617410] kunit_try_run_case+0x170/0x3f0 [ 19.617468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.617523] kthread+0x328/0x630 [ 19.617731] ret_from_fork+0x10/0x20 [ 19.617859] [ 19.617888] Allocated by task 265: [ 19.618027] kasan_save_stack+0x3c/0x68 [ 19.618079] kasan_save_track+0x20/0x40 [ 19.618145] kasan_save_alloc_info+0x40/0x58 [ 19.618204] __kasan_kmalloc+0xd4/0xd8 [ 19.618243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.618298] kasan_atomics+0xb8/0x2e0 [ 19.618357] kunit_try_run_case+0x170/0x3f0 [ 19.618397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.618440] kthread+0x328/0x630 [ 19.618489] ret_from_fork+0x10/0x20 [ 19.618527] [ 19.618565] The buggy address belongs to the object at fff00000c7ab9600 [ 19.618565] which belongs to the cache kmalloc-64 of size 64 [ 19.618626] The buggy address is located 0 bytes to the right of [ 19.618626] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.618692] [ 19.618738] The buggy address belongs to the physical page: [ 19.618795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.618849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.618901] page_type: f5(slab) [ 19.618950] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.619005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.619047] page dumped because: kasan: bad access detected [ 19.619092] [ 19.619120] Memory state around the buggy address: [ 19.619162] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.619208] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.619253] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.619292] ^ [ 19.619336] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.620158] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.620228] ================================================================== [ 19.621412] ================================================================== [ 19.621467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.621523] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.621765] [ 19.621925] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.622156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.622326] Hardware name: linux,dummy-virt (DT) [ 19.622392] Call trace: [ 19.622558] show_stack+0x20/0x38 (C) [ 19.622619] dump_stack_lvl+0x8c/0xd0 [ 19.622675] print_report+0x118/0x5d0 [ 19.622768] kasan_report+0xdc/0x128 [ 19.622866] kasan_check_range+0x100/0x1a8 [ 19.623070] __kasan_check_write+0x20/0x30 [ 19.623280] kasan_atomics_helper+0x1414/0x4858 [ 19.623366] kasan_atomics+0x198/0x2e0 [ 19.623575] kunit_try_run_case+0x170/0x3f0 [ 19.623655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.623729] kthread+0x328/0x630 [ 19.623773] ret_from_fork+0x10/0x20 [ 19.624042] [ 19.624129] Allocated by task 265: [ 19.624170] kasan_save_stack+0x3c/0x68 [ 19.624237] kasan_save_track+0x20/0x40 [ 19.624483] kasan_save_alloc_info+0x40/0x58 [ 19.624651] __kasan_kmalloc+0xd4/0xd8 [ 19.624728] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.624963] kasan_atomics+0xb8/0x2e0 [ 19.625191] kunit_try_run_case+0x170/0x3f0 [ 19.625368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.625452] kthread+0x328/0x630 [ 19.625489] ret_from_fork+0x10/0x20 [ 19.625797] [ 19.625850] The buggy address belongs to the object at fff00000c7ab9600 [ 19.625850] which belongs to the cache kmalloc-64 of size 64 [ 19.626251] The buggy address is located 0 bytes to the right of [ 19.626251] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.627054] [ 19.627425] The buggy address belongs to the physical page: [ 19.627580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.628017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.628266] page_type: f5(slab) [ 19.628333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.628512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.628708] page dumped because: kasan: bad access detected [ 19.629014] [ 19.629041] Memory state around the buggy address: [ 19.629079] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.629126] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.629557] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.629871] ^ [ 19.630059] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630345] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.630549] ================================================================== [ 19.476254] ================================================================== [ 19.476335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.476390] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.476442] [ 19.476478] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.476942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.477143] Hardware name: linux,dummy-virt (DT) [ 19.477222] Call trace: [ 19.477250] show_stack+0x20/0x38 (C) [ 19.477313] dump_stack_lvl+0x8c/0xd0 [ 19.477373] print_report+0x118/0x5d0 [ 19.477426] kasan_report+0xdc/0x128 [ 19.478202] kasan_check_range+0x100/0x1a8 [ 19.478382] __kasan_check_write+0x20/0x30 [ 19.478524] kasan_atomics_helper+0xe44/0x4858 [ 19.478646] kasan_atomics+0x198/0x2e0 [ 19.478834] kunit_try_run_case+0x170/0x3f0 [ 19.479063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.479349] kthread+0x328/0x630 [ 19.479580] ret_from_fork+0x10/0x20 [ 19.479687] [ 19.479757] Allocated by task 265: [ 19.479851] kasan_save_stack+0x3c/0x68 [ 19.479898] kasan_save_track+0x20/0x40 [ 19.480119] kasan_save_alloc_info+0x40/0x58 [ 19.480237] __kasan_kmalloc+0xd4/0xd8 [ 19.480465] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.480697] kasan_atomics+0xb8/0x2e0 [ 19.480990] kunit_try_run_case+0x170/0x3f0 [ 19.481085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.481539] kthread+0x328/0x630 [ 19.481737] ret_from_fork+0x10/0x20 [ 19.481864] [ 19.481946] The buggy address belongs to the object at fff00000c7ab9600 [ 19.481946] which belongs to the cache kmalloc-64 of size 64 [ 19.482356] The buggy address is located 0 bytes to the right of [ 19.482356] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.482621] [ 19.482756] The buggy address belongs to the physical page: [ 19.482821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.483167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.483587] page_type: f5(slab) [ 19.483640] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.484048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.484338] page dumped because: kasan: bad access detected [ 19.484498] [ 19.484702] Memory state around the buggy address: [ 19.484807] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.485247] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.485303] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.485356] ^ [ 19.485393] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.485437] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.485574] ================================================================== [ 19.701277] ================================================================== [ 19.701495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.701576] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.701670] [ 19.701780] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.701869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.701897] Hardware name: linux,dummy-virt (DT) [ 19.701930] Call trace: [ 19.701954] show_stack+0x20/0x38 (C) [ 19.702005] dump_stack_lvl+0x8c/0xd0 [ 19.702054] print_report+0x118/0x5d0 [ 19.702103] kasan_report+0xdc/0x128 [ 19.702478] __asan_report_load8_noabort+0x20/0x30 [ 19.702765] kasan_atomics_helper+0x3e10/0x4858 [ 19.702980] kasan_atomics+0x198/0x2e0 [ 19.703117] kunit_try_run_case+0x170/0x3f0 [ 19.703201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.703362] kthread+0x328/0x630 [ 19.703414] ret_from_fork+0x10/0x20 [ 19.703806] [ 19.703842] Allocated by task 265: [ 19.704026] kasan_save_stack+0x3c/0x68 [ 19.704114] kasan_save_track+0x20/0x40 [ 19.704387] kasan_save_alloc_info+0x40/0x58 [ 19.704478] __kasan_kmalloc+0xd4/0xd8 [ 19.704587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.704684] kasan_atomics+0xb8/0x2e0 [ 19.704750] kunit_try_run_case+0x170/0x3f0 [ 19.704925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.705168] kthread+0x328/0x630 [ 19.705562] ret_from_fork+0x10/0x20 [ 19.705846] [ 19.705915] The buggy address belongs to the object at fff00000c7ab9600 [ 19.705915] which belongs to the cache kmalloc-64 of size 64 [ 19.706125] The buggy address is located 0 bytes to the right of [ 19.706125] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.706375] [ 19.706402] The buggy address belongs to the physical page: [ 19.706673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.706848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.707057] page_type: f5(slab) [ 19.707147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.707462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.707535] page dumped because: kasan: bad access detected [ 19.707635] [ 19.707776] Memory state around the buggy address: [ 19.708132] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.708192] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.708583] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.709064] ^ [ 19.709116] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.709173] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.709213] ================================================================== [ 19.545721] ================================================================== [ 19.545774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.546051] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.546270] [ 19.546306] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.546628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.546715] Hardware name: linux,dummy-virt (DT) [ 19.547017] Call trace: [ 19.547071] show_stack+0x20/0x38 (C) [ 19.547295] dump_stack_lvl+0x8c/0xd0 [ 19.547457] print_report+0x118/0x5d0 [ 19.547751] kasan_report+0xdc/0x128 [ 19.548211] kasan_check_range+0x100/0x1a8 [ 19.548384] __kasan_check_write+0x20/0x30 [ 19.548482] kasan_atomics_helper+0x10c0/0x4858 [ 19.548634] kasan_atomics+0x198/0x2e0 [ 19.548742] kunit_try_run_case+0x170/0x3f0 [ 19.548794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.548849] kthread+0x328/0x630 [ 19.548892] ret_from_fork+0x10/0x20 [ 19.549304] [ 19.549366] Allocated by task 265: [ 19.549607] kasan_save_stack+0x3c/0x68 [ 19.549793] kasan_save_track+0x20/0x40 [ 19.549976] kasan_save_alloc_info+0x40/0x58 [ 19.550099] __kasan_kmalloc+0xd4/0xd8 [ 19.550152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.550195] kasan_atomics+0xb8/0x2e0 [ 19.550422] kunit_try_run_case+0x170/0x3f0 [ 19.550626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.551546] kthread+0x328/0x630 [ 19.551638] ret_from_fork+0x10/0x20 [ 19.551703] [ 19.551727] The buggy address belongs to the object at fff00000c7ab9600 [ 19.551727] which belongs to the cache kmalloc-64 of size 64 [ 19.551805] The buggy address is located 0 bytes to the right of [ 19.551805] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.551911] [ 19.552507] The buggy address belongs to the physical page: [ 19.552671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.552729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.552781] page_type: f5(slab) [ 19.552823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.553436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.553513] page dumped because: kasan: bad access detected [ 19.553678] [ 19.553705] Memory state around the buggy address: [ 19.553743] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.553966] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.554033] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.554288] ^ [ 19.554473] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.554695] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.554961] ================================================================== [ 19.666604] ================================================================== [ 19.666825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.666978] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.667083] [ 19.667118] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.667241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.667271] Hardware name: linux,dummy-virt (DT) [ 19.667473] Call trace: [ 19.667510] show_stack+0x20/0x38 (C) [ 19.667952] dump_stack_lvl+0x8c/0xd0 [ 19.668014] print_report+0x118/0x5d0 [ 19.668116] kasan_report+0xdc/0x128 [ 19.668174] __asan_report_load8_noabort+0x20/0x30 [ 19.668228] kasan_atomics_helper+0x3db0/0x4858 [ 19.668457] kasan_atomics+0x198/0x2e0 [ 19.668792] kunit_try_run_case+0x170/0x3f0 [ 19.669072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.669233] kthread+0x328/0x630 [ 19.669375] ret_from_fork+0x10/0x20 [ 19.669481] [ 19.669559] Allocated by task 265: [ 19.669590] kasan_save_stack+0x3c/0x68 [ 19.669918] kasan_save_track+0x20/0x40 [ 19.670080] kasan_save_alloc_info+0x40/0x58 [ 19.670162] __kasan_kmalloc+0xd4/0xd8 [ 19.670390] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.670607] kasan_atomics+0xb8/0x2e0 [ 19.670677] kunit_try_run_case+0x170/0x3f0 [ 19.670809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.671067] kthread+0x328/0x630 [ 19.671280] ret_from_fork+0x10/0x20 [ 19.671494] [ 19.671706] The buggy address belongs to the object at fff00000c7ab9600 [ 19.671706] which belongs to the cache kmalloc-64 of size 64 [ 19.671840] The buggy address is located 0 bytes to the right of [ 19.671840] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.671911] [ 19.671995] The buggy address belongs to the physical page: [ 19.672378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.672610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.672817] page_type: f5(slab) [ 19.672865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.672920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.672964] page dumped because: kasan: bad access detected [ 19.673465] [ 19.673750] Memory state around the buggy address: [ 19.673860] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.673912] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.674074] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.674259] ^ [ 19.674304] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.674762] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.674918] ================================================================== [ 19.369509] ================================================================== [ 19.369674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.369734] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.369787] [ 19.370102] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.370489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.371303] print_report+0x118/0x5d0 [ 19.372889] kasan_save_alloc_info+0x40/0x58 [ 19.374571] [ 19.375043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.376748] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.378543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.378573] Hardware name: linux,dummy-virt (DT) [ 19.378604] Call trace: [ 19.378629] show_stack+0x20/0x38 (C) [ 19.378951] dump_stack_lvl+0x8c/0xd0 [ 19.379077] print_report+0x118/0x5d0 [ 19.379408] kasan_report+0xdc/0x128 [ 19.379711] kasan_check_range+0x100/0x1a8 [ 19.379908] __kasan_check_write+0x20/0x30 [ 19.380107] kasan_atomics_helper+0x934/0x4858 [ 19.380465] kasan_atomics+0x198/0x2e0 [ 19.380578] kunit_try_run_case+0x170/0x3f0 [ 19.380785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.381000] kthread+0x328/0x630 [ 19.381156] ret_from_fork+0x10/0x20 [ 19.381273] [ 19.381374] Allocated by task 265: [ 19.381406] kasan_save_stack+0x3c/0x68 [ 19.381455] kasan_save_track+0x20/0x40 [ 19.381495] kasan_save_alloc_info+0x40/0x58 [ 19.381536] __kasan_kmalloc+0xd4/0xd8 [ 19.381573] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.381615] kasan_atomics+0xb8/0x2e0 [ 19.381652] kunit_try_run_case+0x170/0x3f0 [ 19.381691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.381736] kthread+0x328/0x630 [ 19.381771] ret_from_fork+0x10/0x20 [ 19.381808] [ 19.381829] The buggy address belongs to the object at fff00000c7ab9600 [ 19.381829] which belongs to the cache kmalloc-64 of size 64 [ 19.381887] The buggy address is located 0 bytes to the right of [ 19.381887] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.381952] [ 19.381974] The buggy address belongs to the physical page: [ 19.382007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.382060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.382110] page_type: f5(slab) [ 19.382148] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.382201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.382244] page dumped because: kasan: bad access detected [ 19.382278] [ 19.382298] Memory state around the buggy address: [ 19.382354] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.382536] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.382581] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.382646] ^ [ 19.382683] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.382728] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.382767] ================================================================== [ 19.446912] ================================================================== [ 19.447336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.447515] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.447579] [ 19.447623] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.447979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.448264] Hardware name: linux,dummy-virt (DT) [ 19.448349] Call trace: [ 19.448485] show_stack+0x20/0x38 (C) [ 19.448633] dump_stack_lvl+0x8c/0xd0 [ 19.448721] print_report+0x118/0x5d0 [ 19.448866] kasan_report+0xdc/0x128 [ 19.448977] __asan_report_load4_noabort+0x20/0x30 [ 19.449035] kasan_atomics_helper+0x3e04/0x4858 [ 19.449300] kasan_atomics+0x198/0x2e0 [ 19.449504] kunit_try_run_case+0x170/0x3f0 [ 19.449606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.449666] kthread+0x328/0x630 [ 19.449712] ret_from_fork+0x10/0x20 [ 19.449781] [ 19.449809] Allocated by task 265: [ 19.449858] kasan_save_stack+0x3c/0x68 [ 19.449921] kasan_save_track+0x20/0x40 [ 19.449970] kasan_save_alloc_info+0x40/0x58 [ 19.450011] __kasan_kmalloc+0xd4/0xd8 [ 19.450056] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.450101] kasan_atomics+0xb8/0x2e0 [ 19.450139] kunit_try_run_case+0x170/0x3f0 [ 19.450179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.450223] kthread+0x328/0x630 [ 19.450259] ret_from_fork+0x10/0x20 [ 19.450297] [ 19.450518] The buggy address belongs to the object at fff00000c7ab9600 [ 19.450518] which belongs to the cache kmalloc-64 of size 64 [ 19.450845] The buggy address is located 0 bytes to the right of [ 19.450845] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.451389] [ 19.451661] The buggy address belongs to the physical page: [ 19.451735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.451828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.452095] page_type: f5(slab) [ 19.452338] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.452528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.453448] page dumped because: kasan: bad access detected [ 19.453528] [ 19.453579] Memory state around the buggy address: [ 19.453644] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.453702] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.453778] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.453846] ^ [ 19.453908] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.454406] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.454515] ================================================================== [ 19.728846] ================================================================== [ 19.728902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.729230] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.729394] [ 19.730091] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.730196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.730292] Hardware name: linux,dummy-virt (DT) [ 19.730387] Call trace: [ 19.730532] show_stack+0x20/0x38 (C) [ 19.730652] dump_stack_lvl+0x8c/0xd0 [ 19.730705] print_report+0x118/0x5d0 [ 19.730957] kasan_report+0xdc/0x128 [ 19.731378] kasan_check_range+0x100/0x1a8 [ 19.731669] __kasan_check_write+0x20/0x30 [ 19.732109] kasan_atomics_helper+0x17ec/0x4858 [ 19.732265] kasan_atomics+0x198/0x2e0 [ 19.732438] kunit_try_run_case+0x170/0x3f0 [ 19.732807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.733091] kthread+0x328/0x630 [ 19.733476] ret_from_fork+0x10/0x20 [ 19.733728] [ 19.733951] Allocated by task 265: [ 19.734274] kasan_save_stack+0x3c/0x68 [ 19.734445] kasan_save_track+0x20/0x40 [ 19.734674] kasan_save_alloc_info+0x40/0x58 [ 19.734828] __kasan_kmalloc+0xd4/0xd8 [ 19.735087] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.735296] kasan_atomics+0xb8/0x2e0 [ 19.735376] kunit_try_run_case+0x170/0x3f0 [ 19.735449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.735524] kthread+0x328/0x630 [ 19.735700] ret_from_fork+0x10/0x20 [ 19.735946] [ 19.735991] The buggy address belongs to the object at fff00000c7ab9600 [ 19.735991] which belongs to the cache kmalloc-64 of size 64 [ 19.736440] The buggy address is located 0 bytes to the right of [ 19.736440] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.736626] [ 19.736841] The buggy address belongs to the physical page: [ 19.736910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.737104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.737506] page_type: f5(slab) [ 19.737593] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.737812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.737981] page dumped because: kasan: bad access detected [ 19.738268] [ 19.738296] Memory state around the buggy address: [ 19.738353] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.738552] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.738617] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.738668] ^ [ 19.738724] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.738781] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.738819] ================================================================== [ 19.539002] ================================================================== [ 19.539063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.539145] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.539379] [ 19.539415] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.539669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.539713] Hardware name: linux,dummy-virt (DT) [ 19.539879] Call trace: [ 19.539915] show_stack+0x20/0x38 (C) [ 19.539970] dump_stack_lvl+0x8c/0xd0 [ 19.540018] print_report+0x118/0x5d0 [ 19.540330] kasan_report+0xdc/0x128 [ 19.540402] kasan_check_range+0x100/0x1a8 [ 19.540455] __kasan_check_write+0x20/0x30 [ 19.540653] kasan_atomics_helper+0x1058/0x4858 [ 19.540935] kasan_atomics+0x198/0x2e0 [ 19.541073] kunit_try_run_case+0x170/0x3f0 [ 19.541122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.541177] kthread+0x328/0x630 [ 19.541221] ret_from_fork+0x10/0x20 [ 19.541808] [ 19.541995] Allocated by task 265: [ 19.542072] kasan_save_stack+0x3c/0x68 [ 19.542604] kasan_save_track+0x20/0x40 [ 19.542672] kasan_save_alloc_info+0x40/0x58 [ 19.542716] __kasan_kmalloc+0xd4/0xd8 [ 19.542911] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.543021] kasan_atomics+0xb8/0x2e0 [ 19.543162] kunit_try_run_case+0x170/0x3f0 [ 19.543237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.543316] kthread+0x328/0x630 [ 19.543391] ret_from_fork+0x10/0x20 [ 19.543441] [ 19.543475] The buggy address belongs to the object at fff00000c7ab9600 [ 19.543475] which belongs to the cache kmalloc-64 of size 64 [ 19.543544] The buggy address is located 0 bytes to the right of [ 19.543544] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.543609] [ 19.543630] The buggy address belongs to the physical page: [ 19.543664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.543735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.543786] page_type: f5(slab) [ 19.543823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.543886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.543953] page dumped because: kasan: bad access detected [ 19.543995] [ 19.544064] Memory state around the buggy address: [ 19.544110] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.544158] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.544203] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.544250] ^ [ 19.544291] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544813] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.545247] ================================================================== [ 19.558025] ================================================================== [ 19.558148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.558249] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.558301] [ 19.558351] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.558482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.558540] Hardware name: linux,dummy-virt (DT) [ 19.558575] Call trace: [ 19.558602] show_stack+0x20/0x38 (C) [ 19.558698] dump_stack_lvl+0x8c/0xd0 [ 19.558751] print_report+0x118/0x5d0 [ 19.558806] kasan_report+0xdc/0x128 [ 19.558862] kasan_check_range+0x100/0x1a8 [ 19.558911] __kasan_check_write+0x20/0x30 [ 19.558957] kasan_atomics_helper+0x1128/0x4858 [ 19.559007] kasan_atomics+0x198/0x2e0 [ 19.559052] kunit_try_run_case+0x170/0x3f0 [ 19.559100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.559152] kthread+0x328/0x630 [ 19.559196] ret_from_fork+0x10/0x20 [ 19.559244] [ 19.559266] Allocated by task 265: [ 19.559294] kasan_save_stack+0x3c/0x68 [ 19.559349] kasan_save_track+0x20/0x40 [ 19.559388] kasan_save_alloc_info+0x40/0x58 [ 19.559440] __kasan_kmalloc+0xd4/0xd8 [ 19.559478] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.559519] kasan_atomics+0xb8/0x2e0 [ 19.559571] kunit_try_run_case+0x170/0x3f0 [ 19.559616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.559663] kthread+0x328/0x630 [ 19.559705] ret_from_fork+0x10/0x20 [ 19.559752] [ 19.559775] The buggy address belongs to the object at fff00000c7ab9600 [ 19.559775] which belongs to the cache kmalloc-64 of size 64 [ 19.559843] The buggy address is located 0 bytes to the right of [ 19.559843] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.559910] [ 19.559940] The buggy address belongs to the physical page: [ 19.559983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.560037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.560088] page_type: f5(slab) [ 19.560127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.560184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.560232] page dumped because: kasan: bad access detected [ 19.560267] [ 19.560287] Memory state around the buggy address: [ 19.560685] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.560809] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.560857] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.561911] ^ [ 19.561978] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.562046] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.562112] ================================================================== [ 19.487553] ================================================================== [ 19.487608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.487660] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.487856] [ 19.488303] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.488638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.488842] Hardware name: linux,dummy-virt (DT) [ 19.488993] Call trace: [ 19.489096] show_stack+0x20/0x38 (C) [ 19.489289] dump_stack_lvl+0x8c/0xd0 [ 19.489362] print_report+0x118/0x5d0 [ 19.489606] kasan_report+0xdc/0x128 [ 19.489725] __asan_report_store8_noabort+0x20/0x30 [ 19.489953] kasan_atomics_helper+0x3e5c/0x4858 [ 19.490121] kasan_atomics+0x198/0x2e0 [ 19.490174] kunit_try_run_case+0x170/0x3f0 [ 19.490225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.490278] kthread+0x328/0x630 [ 19.490776] ret_from_fork+0x10/0x20 [ 19.491413] [ 19.491463] Allocated by task 265: [ 19.491645] kasan_save_stack+0x3c/0x68 [ 19.492047] kasan_save_track+0x20/0x40 [ 19.492172] kasan_save_alloc_info+0x40/0x58 [ 19.492250] __kasan_kmalloc+0xd4/0xd8 [ 19.492292] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.492510] kasan_atomics+0xb8/0x2e0 [ 19.492834] kunit_try_run_case+0x170/0x3f0 [ 19.492945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.493099] kthread+0x328/0x630 [ 19.493140] ret_from_fork+0x10/0x20 [ 19.493485] [ 19.493609] The buggy address belongs to the object at fff00000c7ab9600 [ 19.493609] which belongs to the cache kmalloc-64 of size 64 [ 19.493960] The buggy address is located 0 bytes to the right of [ 19.493960] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.494303] [ 19.494603] The buggy address belongs to the physical page: [ 19.494650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.494848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.495002] page_type: f5(slab) [ 19.495145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.495216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.495266] page dumped because: kasan: bad access detected [ 19.495302] [ 19.495335] Memory state around the buggy address: [ 19.495376] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.495424] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.495477] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.495517] ^ [ 19.495560] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.495621] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.495663] ================================================================== [ 19.593963] ================================================================== [ 19.594076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.594171] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.594345] [ 19.594385] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.594471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.594825] Hardware name: linux,dummy-virt (DT) [ 19.594917] Call trace: [ 19.595101] show_stack+0x20/0x38 (C) [ 19.595290] dump_stack_lvl+0x8c/0xd0 [ 19.595410] print_report+0x118/0x5d0 [ 19.595463] kasan_report+0xdc/0x128 [ 19.595549] kasan_check_range+0x100/0x1a8 [ 19.595778] __kasan_check_write+0x20/0x30 [ 19.595995] kasan_atomics_helper+0x12d8/0x4858 [ 19.596064] kasan_atomics+0x198/0x2e0 [ 19.596330] kunit_try_run_case+0x170/0x3f0 [ 19.596411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.596606] kthread+0x328/0x630 [ 19.596700] ret_from_fork+0x10/0x20 [ 19.596838] [ 19.596870] Allocated by task 265: [ 19.596907] kasan_save_stack+0x3c/0x68 [ 19.597424] kasan_save_track+0x20/0x40 [ 19.597672] kasan_save_alloc_info+0x40/0x58 [ 19.597749] __kasan_kmalloc+0xd4/0xd8 [ 19.597924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.598386] kasan_atomics+0xb8/0x2e0 [ 19.598493] kunit_try_run_case+0x170/0x3f0 [ 19.598557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.598892] kthread+0x328/0x630 [ 19.599035] ret_from_fork+0x10/0x20 [ 19.599702] [ 19.599898] The buggy address belongs to the object at fff00000c7ab9600 [ 19.599898] which belongs to the cache kmalloc-64 of size 64 [ 19.600471] The buggy address is located 0 bytes to the right of [ 19.600471] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.600557] [ 19.600582] The buggy address belongs to the physical page: [ 19.600617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.600672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.600730] page_type: f5(slab) [ 19.601068] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.601127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.601306] page dumped because: kasan: bad access detected [ 19.601362] [ 19.601403] Memory state around the buggy address: [ 19.601469] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.601530] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.601576] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.601616] ^ [ 19.601659] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.601719] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.601757] ================================================================== [ 19.496138] ================================================================== [ 19.496199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.496250] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.496317] [ 19.496361] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.496904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.497366] Hardware name: linux,dummy-virt (DT) [ 19.497403] Call trace: [ 19.497427] show_stack+0x20/0x38 (C) [ 19.497483] dump_stack_lvl+0x8c/0xd0 [ 19.497583] print_report+0x118/0x5d0 [ 19.497867] kasan_report+0xdc/0x128 [ 19.498167] kasan_check_range+0x100/0x1a8 [ 19.498294] __kasan_check_write+0x20/0x30 [ 19.498519] kasan_atomics_helper+0xeb8/0x4858 [ 19.498655] kasan_atomics+0x198/0x2e0 [ 19.498943] kunit_try_run_case+0x170/0x3f0 [ 19.499211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.499569] kthread+0x328/0x630 [ 19.499729] ret_from_fork+0x10/0x20 [ 19.499846] [ 19.500203] Allocated by task 265: [ 19.500423] kasan_save_stack+0x3c/0x68 [ 19.500715] kasan_save_track+0x20/0x40 [ 19.500984] kasan_save_alloc_info+0x40/0x58 [ 19.501147] __kasan_kmalloc+0xd4/0xd8 [ 19.501336] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.501443] kasan_atomics+0xb8/0x2e0 [ 19.501597] kunit_try_run_case+0x170/0x3f0 [ 19.501734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.501815] kthread+0x328/0x630 [ 19.501849] ret_from_fork+0x10/0x20 [ 19.502054] [ 19.502196] The buggy address belongs to the object at fff00000c7ab9600 [ 19.502196] which belongs to the cache kmalloc-64 of size 64 [ 19.502364] The buggy address is located 0 bytes to the right of [ 19.502364] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.502831] [ 19.502871] The buggy address belongs to the physical page: [ 19.503111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.503459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.503643] page_type: f5(slab) [ 19.503747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.503969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.504182] page dumped because: kasan: bad access detected [ 19.504427] [ 19.504498] Memory state around the buggy address: [ 19.504809] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.505014] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.505427] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.505625] ^ [ 19.505860] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.506022] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.506135] ================================================================== [ 19.466751] ================================================================== [ 19.466804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.466858] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.466909] [ 19.467117] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.467338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.467371] Hardware name: linux,dummy-virt (DT) [ 19.467405] Call trace: [ 19.467429] show_stack+0x20/0x38 (C) [ 19.467488] dump_stack_lvl+0x8c/0xd0 [ 19.467538] print_report+0x118/0x5d0 [ 19.467593] kasan_report+0xdc/0x128 [ 19.467650] __asan_report_load8_noabort+0x20/0x30 [ 19.467704] kasan_atomics_helper+0x3f58/0x4858 [ 19.467752] kasan_atomics+0x198/0x2e0 [ 19.467801] kunit_try_run_case+0x170/0x3f0 [ 19.467852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.467908] kthread+0x328/0x630 [ 19.467951] ret_from_fork+0x10/0x20 [ 19.468000] [ 19.468021] Allocated by task 265: [ 19.468068] kasan_save_stack+0x3c/0x68 [ 19.468120] kasan_save_track+0x20/0x40 [ 19.468175] kasan_save_alloc_info+0x40/0x58 [ 19.468217] __kasan_kmalloc+0xd4/0xd8 [ 19.468256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.468297] kasan_atomics+0xb8/0x2e0 [ 19.468804] kunit_try_run_case+0x170/0x3f0 [ 19.469076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.470020] kthread+0x328/0x630 [ 19.470094] ret_from_fork+0x10/0x20 [ 19.470157] [ 19.470218] The buggy address belongs to the object at fff00000c7ab9600 [ 19.470218] which belongs to the cache kmalloc-64 of size 64 [ 19.470505] The buggy address is located 0 bytes to the right of [ 19.470505] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.470796] [ 19.471207] The buggy address belongs to the physical page: [ 19.471419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.471795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.471879] page_type: f5(slab) [ 19.472408] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.472472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.472514] page dumped because: kasan: bad access detected [ 19.473263] [ 19.473384] Memory state around the buggy address: [ 19.473519] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.473788] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.474152] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.474297] ^ [ 19.474390] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.474441] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.474479] ================================================================== [ 19.574119] ================================================================== [ 19.574183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.574439] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.574501] [ 19.574622] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.574711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.574740] Hardware name: linux,dummy-virt (DT) [ 19.574844] Call trace: [ 19.574872] show_stack+0x20/0x38 (C) [ 19.574926] dump_stack_lvl+0x8c/0xd0 [ 19.574983] print_report+0x118/0x5d0 [ 19.575030] kasan_report+0xdc/0x128 [ 19.575336] kasan_check_range+0x100/0x1a8 [ 19.575742] __kasan_check_write+0x20/0x30 [ 19.575861] kasan_atomics_helper+0x11f8/0x4858 [ 19.575994] kasan_atomics+0x198/0x2e0 [ 19.576241] kunit_try_run_case+0x170/0x3f0 [ 19.576494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.576712] kthread+0x328/0x630 [ 19.576798] ret_from_fork+0x10/0x20 [ 19.577044] [ 19.577155] Allocated by task 265: [ 19.577234] kasan_save_stack+0x3c/0x68 [ 19.577578] kasan_save_track+0x20/0x40 [ 19.577827] kasan_save_alloc_info+0x40/0x58 [ 19.577911] __kasan_kmalloc+0xd4/0xd8 [ 19.578342] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.578449] kasan_atomics+0xb8/0x2e0 [ 19.578790] kunit_try_run_case+0x170/0x3f0 [ 19.579005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.579103] kthread+0x328/0x630 [ 19.579287] ret_from_fork+0x10/0x20 [ 19.579472] [ 19.579526] The buggy address belongs to the object at fff00000c7ab9600 [ 19.579526] which belongs to the cache kmalloc-64 of size 64 [ 19.579860] The buggy address is located 0 bytes to the right of [ 19.579860] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.579963] [ 19.580094] The buggy address belongs to the physical page: [ 19.580183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.580262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.580314] page_type: f5(slab) [ 19.580367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.580430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.580472] page dumped because: kasan: bad access detected [ 19.580516] [ 19.580537] Memory state around the buggy address: [ 19.580578] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.580624] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.580669] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.580717] ^ [ 19.580752] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.580796] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.580835] ================================================================== [ 19.684157] ================================================================== [ 19.684249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.684438] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.684513] [ 19.684709] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.684967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.685020] Hardware name: linux,dummy-virt (DT) [ 19.685177] Call trace: [ 19.685254] show_stack+0x20/0x38 (C) [ 19.685328] dump_stack_lvl+0x8c/0xd0 [ 19.685572] print_report+0x118/0x5d0 [ 19.685919] kasan_report+0xdc/0x128 [ 19.686199] __asan_report_load8_noabort+0x20/0x30 [ 19.686426] kasan_atomics_helper+0x3df4/0x4858 [ 19.686565] kasan_atomics+0x198/0x2e0 [ 19.686619] kunit_try_run_case+0x170/0x3f0 [ 19.686677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.686746] kthread+0x328/0x630 [ 19.686808] ret_from_fork+0x10/0x20 [ 19.686867] [ 19.686897] Allocated by task 265: [ 19.686942] kasan_save_stack+0x3c/0x68 [ 19.686995] kasan_save_track+0x20/0x40 [ 19.687045] kasan_save_alloc_info+0x40/0x58 [ 19.687086] __kasan_kmalloc+0xd4/0xd8 [ 19.687135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.687191] kasan_atomics+0xb8/0x2e0 [ 19.687227] kunit_try_run_case+0x170/0x3f0 [ 19.687276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.687332] kthread+0x328/0x630 [ 19.687374] ret_from_fork+0x10/0x20 [ 19.687413] [ 19.687449] The buggy address belongs to the object at fff00000c7ab9600 [ 19.687449] which belongs to the cache kmalloc-64 of size 64 [ 19.687510] The buggy address is located 0 bytes to the right of [ 19.687510] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.687577] [ 19.687607] The buggy address belongs to the physical page: [ 19.687639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.687702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.687755] page_type: f5(slab) [ 19.687794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.687857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.687915] page dumped because: kasan: bad access detected [ 19.687950] [ 19.687969] Memory state around the buggy address: [ 19.688003] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.688058] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.688105] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.688145] ^ [ 19.688197] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688254] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688302] ================================================================== [ 19.690616] ================================================================== [ 19.690679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.690732] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.690965] [ 19.691027] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.691121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.691149] Hardware name: linux,dummy-virt (DT) [ 19.691477] Call trace: [ 19.691530] show_stack+0x20/0x38 (C) [ 19.691957] dump_stack_lvl+0x8c/0xd0 [ 19.692034] print_report+0x118/0x5d0 [ 19.692238] kasan_report+0xdc/0x128 [ 19.692398] kasan_check_range+0x100/0x1a8 [ 19.692616] __kasan_check_write+0x20/0x30 [ 19.692729] kasan_atomics_helper+0x16d0/0x4858 [ 19.692938] kasan_atomics+0x198/0x2e0 [ 19.693130] kunit_try_run_case+0x170/0x3f0 [ 19.693233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.693406] kthread+0x328/0x630 [ 19.693478] ret_from_fork+0x10/0x20 [ 19.693551] [ 19.693572] Allocated by task 265: [ 19.693788] kasan_save_stack+0x3c/0x68 [ 19.693997] kasan_save_track+0x20/0x40 [ 19.694069] kasan_save_alloc_info+0x40/0x58 [ 19.694475] __kasan_kmalloc+0xd4/0xd8 [ 19.694559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.694751] kasan_atomics+0xb8/0x2e0 [ 19.694842] kunit_try_run_case+0x170/0x3f0 [ 19.694890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.695130] kthread+0x328/0x630 [ 19.695351] ret_from_fork+0x10/0x20 [ 19.695913] [ 19.696222] The buggy address belongs to the object at fff00000c7ab9600 [ 19.696222] which belongs to the cache kmalloc-64 of size 64 [ 19.696332] The buggy address is located 0 bytes to the right of [ 19.696332] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.696509] [ 19.696705] The buggy address belongs to the physical page: [ 19.696893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.696979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.697316] page_type: f5(slab) [ 19.697450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.697881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.698263] page dumped because: kasan: bad access detected [ 19.698436] [ 19.698542] Memory state around the buggy address: [ 19.698891] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.699021] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.699072] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.699533] ^ [ 19.699797] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.700114] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.700200] ================================================================== [ 19.582710] ================================================================== [ 19.582772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.582899] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.582974] [ 19.583173] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.583716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.583872] Hardware name: linux,dummy-virt (DT) [ 19.583905] Call trace: [ 19.583932] show_stack+0x20/0x38 (C) [ 19.583985] dump_stack_lvl+0x8c/0xd0 [ 19.584035] print_report+0x118/0x5d0 [ 19.584081] kasan_report+0xdc/0x128 [ 19.584128] kasan_check_range+0x100/0x1a8 [ 19.584183] __kasan_check_write+0x20/0x30 [ 19.584230] kasan_atomics_helper+0x126c/0x4858 [ 19.584280] kasan_atomics+0x198/0x2e0 [ 19.584336] kunit_try_run_case+0x170/0x3f0 [ 19.586054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.586433] kthread+0x328/0x630 [ 19.586541] ret_from_fork+0x10/0x20 [ 19.586686] [ 19.586822] Allocated by task 265: [ 19.586884] kasan_save_stack+0x3c/0x68 [ 19.586941] kasan_save_track+0x20/0x40 [ 19.587169] kasan_save_alloc_info+0x40/0x58 [ 19.587299] __kasan_kmalloc+0xd4/0xd8 [ 19.587409] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.587887] kasan_atomics+0xb8/0x2e0 [ 19.588203] kunit_try_run_case+0x170/0x3f0 [ 19.588280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.588365] kthread+0x328/0x630 [ 19.588448] ret_from_fork+0x10/0x20 [ 19.588490] [ 19.588513] The buggy address belongs to the object at fff00000c7ab9600 [ 19.588513] which belongs to the cache kmalloc-64 of size 64 [ 19.588934] The buggy address is located 0 bytes to the right of [ 19.588934] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.589235] [ 19.589276] The buggy address belongs to the physical page: [ 19.589312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.589378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.589862] page_type: f5(slab) [ 19.590174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.590363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.590419] page dumped because: kasan: bad access detected [ 19.590813] [ 19.590864] Memory state around the buggy address: [ 19.591355] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591414] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591756] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.592165] ^ [ 19.592308] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.592370] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.592410] ================================================================== [ 19.429102] ================================================================== [ 19.429179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.429275] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.429408] [ 19.429441] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.429529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.429585] Hardware name: linux,dummy-virt (DT) [ 19.429617] Call trace: [ 19.429640] show_stack+0x20/0x38 (C) [ 19.429716] dump_stack_lvl+0x8c/0xd0 [ 19.429765] print_report+0x118/0x5d0 [ 19.429971] kasan_report+0xdc/0x128 [ 19.430021] __asan_report_load4_noabort+0x20/0x30 [ 19.430076] kasan_atomics_helper+0x3dd8/0x4858 [ 19.430127] kasan_atomics+0x198/0x2e0 [ 19.430174] kunit_try_run_case+0x170/0x3f0 [ 19.430234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.430379] kthread+0x328/0x630 [ 19.430472] ret_from_fork+0x10/0x20 [ 19.430541] [ 19.430564] Allocated by task 265: [ 19.430593] kasan_save_stack+0x3c/0x68 [ 19.430636] kasan_save_track+0x20/0x40 [ 19.430676] kasan_save_alloc_info+0x40/0x58 [ 19.430718] __kasan_kmalloc+0xd4/0xd8 [ 19.430766] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.430807] kasan_atomics+0xb8/0x2e0 [ 19.430846] kunit_try_run_case+0x170/0x3f0 [ 19.430896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.430952] kthread+0x328/0x630 [ 19.430988] ret_from_fork+0x10/0x20 [ 19.431038] [ 19.431062] The buggy address belongs to the object at fff00000c7ab9600 [ 19.431062] which belongs to the cache kmalloc-64 of size 64 [ 19.431121] The buggy address is located 0 bytes to the right of [ 19.431121] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.431187] [ 19.431210] The buggy address belongs to the physical page: [ 19.431245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.431300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.431359] page_type: f5(slab) [ 19.431397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.431459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.431510] page dumped because: kasan: bad access detected [ 19.431542] [ 19.431563] Memory state around the buggy address: [ 19.431594] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.431640] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.431689] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.431728] ^ [ 19.431764] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.431809] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.431857] ================================================================== [ 19.652009] ================================================================== [ 19.652439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.652519] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.652817] [ 19.652862] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.653260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.653315] Hardware name: linux,dummy-virt (DT) [ 19.653364] Call trace: [ 19.653389] show_stack+0x20/0x38 (C) [ 19.653444] dump_stack_lvl+0x8c/0xd0 [ 19.653493] print_report+0x118/0x5d0 [ 19.653922] kasan_report+0xdc/0x128 [ 19.653994] kasan_check_range+0x100/0x1a8 [ 19.654194] __kasan_check_write+0x20/0x30 [ 19.654380] kasan_atomics_helper+0x154c/0x4858 [ 19.654516] kasan_atomics+0x198/0x2e0 [ 19.654590] kunit_try_run_case+0x170/0x3f0 [ 19.654651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.654705] kthread+0x328/0x630 [ 19.654775] ret_from_fork+0x10/0x20 [ 19.654841] [ 19.654867] Allocated by task 265: [ 19.654918] kasan_save_stack+0x3c/0x68 [ 19.654983] kasan_save_track+0x20/0x40 [ 19.655024] kasan_save_alloc_info+0x40/0x58 [ 19.655064] __kasan_kmalloc+0xd4/0xd8 [ 19.655122] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.655165] kasan_atomics+0xb8/0x2e0 [ 19.655204] kunit_try_run_case+0x170/0x3f0 [ 19.655242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.655287] kthread+0x328/0x630 [ 19.655343] ret_from_fork+0x10/0x20 [ 19.655381] [ 19.655404] The buggy address belongs to the object at fff00000c7ab9600 [ 19.655404] which belongs to the cache kmalloc-64 of size 64 [ 19.655465] The buggy address is located 0 bytes to the right of [ 19.655465] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.655551] [ 19.655588] The buggy address belongs to the physical page: [ 19.655630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.655708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.655758] page_type: f5(slab) [ 19.655798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.655851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.655894] page dumped because: kasan: bad access detected [ 19.655944] [ 19.655972] Memory state around the buggy address: [ 19.656015] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.656060] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.656105] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.656164] ^ [ 19.656206] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.656258] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.656329] ================================================================== [ 19.519108] ================================================================== [ 19.519162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.519214] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.519267] [ 19.519302] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.519400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.519429] Hardware name: linux,dummy-virt (DT) [ 19.519460] Call trace: [ 19.519797] show_stack+0x20/0x38 (C) [ 19.519890] dump_stack_lvl+0x8c/0xd0 [ 19.519941] print_report+0x118/0x5d0 [ 19.519998] kasan_report+0xdc/0x128 [ 19.520055] kasan_check_range+0x100/0x1a8 [ 19.520104] __kasan_check_write+0x20/0x30 [ 19.520157] kasan_atomics_helper+0xf88/0x4858 [ 19.520207] kasan_atomics+0x198/0x2e0 [ 19.520252] kunit_try_run_case+0x170/0x3f0 [ 19.520300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.520891] kthread+0x328/0x630 [ 19.521080] ret_from_fork+0x10/0x20 [ 19.521159] [ 19.521188] Allocated by task 265: [ 19.521221] kasan_save_stack+0x3c/0x68 [ 19.521264] kasan_save_track+0x20/0x40 [ 19.521305] kasan_save_alloc_info+0x40/0x58 [ 19.521356] __kasan_kmalloc+0xd4/0xd8 [ 19.521395] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.521989] kasan_atomics+0xb8/0x2e0 [ 19.522181] kunit_try_run_case+0x170/0x3f0 [ 19.522254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.522644] kthread+0x328/0x630 [ 19.522857] ret_from_fork+0x10/0x20 [ 19.523004] [ 19.523251] The buggy address belongs to the object at fff00000c7ab9600 [ 19.523251] which belongs to the cache kmalloc-64 of size 64 [ 19.523388] The buggy address is located 0 bytes to the right of [ 19.523388] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.523832] [ 19.523873] The buggy address belongs to the physical page: [ 19.524006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.524107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.524293] page_type: f5(slab) [ 19.524410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.524874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.524944] page dumped because: kasan: bad access detected [ 19.524979] [ 19.525000] Memory state around the buggy address: [ 19.525038] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.525084] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.525374] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.525915] ^ [ 19.526094] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526176] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526564] ================================================================== [ 19.632706] ================================================================== [ 19.632903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.632996] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.633148] [ 19.633216] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.633378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.633433] Hardware name: linux,dummy-virt (DT) [ 19.633475] Call trace: [ 19.633501] show_stack+0x20/0x38 (C) [ 19.633792] dump_stack_lvl+0x8c/0xd0 [ 19.633962] print_report+0x118/0x5d0 [ 19.634368] kasan_report+0xdc/0x128 [ 19.634514] kasan_check_range+0x100/0x1a8 [ 19.634619] __kasan_check_write+0x20/0x30 [ 19.634696] kasan_atomics_helper+0x147c/0x4858 [ 19.635106] kasan_atomics+0x198/0x2e0 [ 19.635350] kunit_try_run_case+0x170/0x3f0 [ 19.635712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.635837] kthread+0x328/0x630 [ 19.635908] ret_from_fork+0x10/0x20 [ 19.636327] [ 19.636380] Allocated by task 265: [ 19.636619] kasan_save_stack+0x3c/0x68 [ 19.636690] kasan_save_track+0x20/0x40 [ 19.637006] kasan_save_alloc_info+0x40/0x58 [ 19.637118] __kasan_kmalloc+0xd4/0xd8 [ 19.637285] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.637346] kasan_atomics+0xb8/0x2e0 [ 19.637497] kunit_try_run_case+0x170/0x3f0 [ 19.637546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.637666] kthread+0x328/0x630 [ 19.637913] ret_from_fork+0x10/0x20 [ 19.637981] [ 19.638015] The buggy address belongs to the object at fff00000c7ab9600 [ 19.638015] which belongs to the cache kmalloc-64 of size 64 [ 19.638082] The buggy address is located 0 bytes to the right of [ 19.638082] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.638148] [ 19.638172] The buggy address belongs to the physical page: [ 19.638206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.638271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.638333] page_type: f5(slab) [ 19.638385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.638775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.639005] page dumped because: kasan: bad access detected [ 19.639080] [ 19.639287] Memory state around the buggy address: [ 19.639435] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.639581] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.639953] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.640027] ^ [ 19.640296] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.640372] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.640412] ================================================================== [ 19.642504] ================================================================== [ 19.642794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.642986] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.643050] [ 19.643086] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.643297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.643364] Hardware name: linux,dummy-virt (DT) [ 19.643400] Call trace: [ 19.643712] show_stack+0x20/0x38 (C) [ 19.643976] dump_stack_lvl+0x8c/0xd0 [ 19.644232] print_report+0x118/0x5d0 [ 19.644300] kasan_report+0xdc/0x128 [ 19.644427] kasan_check_range+0x100/0x1a8 [ 19.644482] __kasan_check_write+0x20/0x30 [ 19.644692] kasan_atomics_helper+0x14e4/0x4858 [ 19.644750] kasan_atomics+0x198/0x2e0 [ 19.644798] kunit_try_run_case+0x170/0x3f0 [ 19.644846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.644900] kthread+0x328/0x630 [ 19.645595] ret_from_fork+0x10/0x20 [ 19.645746] [ 19.645812] Allocated by task 265: [ 19.645853] kasan_save_stack+0x3c/0x68 [ 19.645904] kasan_save_track+0x20/0x40 [ 19.645945] kasan_save_alloc_info+0x40/0x58 [ 19.646002] __kasan_kmalloc+0xd4/0xd8 [ 19.646041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.646092] kasan_atomics+0xb8/0x2e0 [ 19.646139] kunit_try_run_case+0x170/0x3f0 [ 19.646187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.646233] kthread+0x328/0x630 [ 19.646268] ret_from_fork+0x10/0x20 [ 19.646305] [ 19.646704] The buggy address belongs to the object at fff00000c7ab9600 [ 19.646704] which belongs to the cache kmalloc-64 of size 64 [ 19.646777] The buggy address is located 0 bytes to the right of [ 19.646777] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.647632] [ 19.647867] The buggy address belongs to the physical page: [ 19.647935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.648027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.648101] page_type: f5(slab) [ 19.648373] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.648578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.648956] page dumped because: kasan: bad access detected [ 19.649267] [ 19.649394] Memory state around the buggy address: [ 19.649682] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.649855] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.650011] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.650059] ^ [ 19.650113] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.650338] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.650859] ================================================================== [ 19.383243] ================================================================== [ 19.383299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.383365] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.383417] [ 19.383450] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.383533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.383563] Hardware name: linux,dummy-virt (DT) [ 19.383596] Call trace: [ 19.383621] show_stack+0x20/0x38 (C) [ 19.383668] dump_stack_lvl+0x8c/0xd0 [ 19.383716] print_report+0x118/0x5d0 [ 19.383765] kasan_report+0xdc/0x128 [ 19.383831] kasan_check_range+0x100/0x1a8 [ 19.383943] __kasan_check_write+0x20/0x30 [ 19.384012] kasan_atomics_helper+0x99c/0x4858 [ 19.384062] kasan_atomics+0x198/0x2e0 [ 19.384109] kunit_try_run_case+0x170/0x3f0 [ 19.384162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.384225] kthread+0x328/0x630 [ 19.384270] ret_from_fork+0x10/0x20 [ 19.384328] [ 19.384349] Allocated by task 265: [ 19.384387] kasan_save_stack+0x3c/0x68 [ 19.384440] kasan_save_track+0x20/0x40 [ 19.384515] kasan_save_alloc_info+0x40/0x58 [ 19.384562] __kasan_kmalloc+0xd4/0xd8 [ 19.384601] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.384643] kasan_atomics+0xb8/0x2e0 [ 19.384681] kunit_try_run_case+0x170/0x3f0 [ 19.384720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.384766] kthread+0x328/0x630 [ 19.384800] ret_from_fork+0x10/0x20 [ 19.384838] [ 19.384859] The buggy address belongs to the object at fff00000c7ab9600 [ 19.384859] which belongs to the cache kmalloc-64 of size 64 [ 19.384917] The buggy address is located 0 bytes to the right of [ 19.384917] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.385034] [ 19.385122] The buggy address belongs to the physical page: [ 19.385162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.385287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.385472] page_type: f5(slab) [ 19.385512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.385567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.385608] page dumped because: kasan: bad access detected [ 19.385643] [ 19.385663] Memory state around the buggy address: [ 19.385698] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.386804] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.387914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.387968] kthread+0x328/0x630 [ 19.388012] ret_from_fork+0x10/0x20 [ 19.388059] [ 19.388080] Allocated by task 265: [ 19.388120] kasan_save_stack+0x3c/0x68 [ 19.388169] kasan_save_track+0x20/0x40 [ 19.388209] kasan_save_alloc_info+0x40/0x58 [ 19.388250] __kasan_kmalloc+0xd4/0xd8 [ 19.388432] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.388500] kasan_atomics+0xb8/0x2e0 [ 19.388540] kunit_try_run_case+0x170/0x3f0 [ 19.388580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.388626] kthread+0x328/0x630 [ 19.388660] ret_from_fork+0x10/0x20 [ 19.388696] [ 19.388718] The buggy address belongs to the object at fff00000c7ab9600 [ 19.388718] which belongs to the cache kmalloc-64 of size 64 [ 19.388776] The buggy address is located 0 bytes to the right of [ 19.388776] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.388842] [ 19.388885] The buggy address belongs to the physical page: [ 19.388920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.388972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.389021] page_type: f5(slab) [ 19.389059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.389110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.389152] page dumped because: kasan: bad access detected [ 19.389186] [ 19.389205] Memory state around the buggy address: [ 19.389508] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.390473] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.391380] __kasan_check_write+0x20/0x30 [ 19.391904] [ 19.391943] Allocated by task 265: [ 19.392001] kasan_save_stack+0x3c/0x68 [ 19.392046] kasan_save_track+0x20/0x40 [ 19.392118] kasan_save_alloc_info+0x40/0x58 [ 19.392196] __kasan_kmalloc+0xd4/0xd8 [ 19.392281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.392332] kasan_atomics+0xb8/0x2e0 [ 19.392379] kunit_try_run_case+0x170/0x3f0 [ 19.392419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.392473] kthread+0x328/0x630 [ 19.392539] ret_from_fork+0x10/0x20 [ 19.392576] [ 19.392599] The buggy address belongs to the object at fff00000c7ab9600 [ 19.392599] which belongs to the cache kmalloc-64 of size 64 [ 19.392776] The buggy address is located 0 bytes to the right of [ 19.392776] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.392919] [ 19.393047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.394087] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.394315] ================================================================== [ 19.719765] ================================================================== [ 19.720143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.720218] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.720507] [ 19.720806] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.720938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.721235] Hardware name: linux,dummy-virt (DT) [ 19.721292] Call trace: [ 19.721316] show_stack+0x20/0x38 (C) [ 19.721383] dump_stack_lvl+0x8c/0xd0 [ 19.721834] print_report+0x118/0x5d0 [ 19.722302] kasan_report+0xdc/0x128 [ 19.722731] __asan_report_load8_noabort+0x20/0x30 [ 19.722897] kasan_atomics_helper+0x3e20/0x4858 [ 19.723057] kasan_atomics+0x198/0x2e0 [ 19.723199] kunit_try_run_case+0x170/0x3f0 [ 19.723250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.723492] kthread+0x328/0x630 [ 19.723704] ret_from_fork+0x10/0x20 [ 19.723988] [ 19.724148] Allocated by task 265: [ 19.724197] kasan_save_stack+0x3c/0x68 [ 19.724444] kasan_save_track+0x20/0x40 [ 19.724646] kasan_save_alloc_info+0x40/0x58 [ 19.725130] __kasan_kmalloc+0xd4/0xd8 [ 19.725297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.725412] kasan_atomics+0xb8/0x2e0 [ 19.725451] kunit_try_run_case+0x170/0x3f0 [ 19.725492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.725536] kthread+0x328/0x630 [ 19.725572] ret_from_fork+0x10/0x20 [ 19.725608] [ 19.725925] The buggy address belongs to the object at fff00000c7ab9600 [ 19.725925] which belongs to the cache kmalloc-64 of size 64 [ 19.726412] The buggy address is located 0 bytes to the right of [ 19.726412] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.726499] [ 19.726522] The buggy address belongs to the physical page: [ 19.727100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.727185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.727249] page_type: f5(slab) [ 19.727303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.727368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.727422] page dumped because: kasan: bad access detected [ 19.727457] [ 19.727487] Memory state around the buggy address: [ 19.727532] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.727585] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.727641] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.727681] ^ [ 19.727717] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.727763] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.727812] ================================================================== [ 19.273888] ================================================================== [ 19.274899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 19.276181] kasan_atomics_helper+0x414/0x4858 [ 19.276240] kasan_atomics+0x198/0x2e0 [ 19.276845] [ 19.278895] __kasan_kmalloc+0xd4/0xd8 [ 19.281364] The buggy address is located 0 bytes to the right of [ 19.281364] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.281786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.283145] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.284038] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.286315] Hardware name: linux,dummy-virt (DT) [ 19.287051] [ 19.288765] [ 19.289707] [ 19.289944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.291719] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.292690] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.295024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.295819] kasan_report+0xdc/0x128 [ 19.296866] kthread+0x328/0x630 [ 19.297656] kasan_save_track+0x20/0x40 [ 19.298091] kunit_try_run_case+0x170/0x3f0 [ 19.299615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.300157] page dumped because: kasan: bad access detected [ 19.301013] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.303655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 19.304391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.305344] __kasan_check_write+0x20/0x30 [ 19.305834] kasan_save_alloc_info+0x40/0x58 [ 19.306042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.306372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.306571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.306866] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.307110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 19.307778] print_report+0x118/0x5d0 [ 19.308821] __kasan_check_write+0x20/0x30 [ 19.309505] kthread+0x328/0x630 [ 19.309878] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.310115] ret_from_fork+0x10/0x20 [ 19.311844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.313272] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.314128] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.315898] [ 19.316440] __kasan_check_write+0x20/0x30 [ 19.318665] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.320201] [ 19.320230] The buggy address belongs to the physical page: [ 19.320403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.320663] page dumped because: kasan: bad access detected [ 19.320803] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.321052] ================================================================== [ 19.431979] ================================================================== [ 19.432020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.432065] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265 [ 19.432115] [ 19.432144] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.432235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.432262] Hardware name: linux,dummy-virt (DT) [ 19.432295] Call trace: [ 19.436129] show_stack+0x20/0x38 (C) [ 19.436335] dump_stack_lvl+0x8c/0xd0 [ 19.436392] print_report+0x118/0x5d0 [ 19.436830] kasan_report+0xdc/0x128 [ 19.436895] kasan_check_range+0x100/0x1a8 [ 19.437388] __kasan_check_write+0x20/0x30 [ 19.437902] kasan_atomics_helper+0xd3c/0x4858 [ 19.438154] kasan_atomics+0x198/0x2e0 [ 19.438548] kunit_try_run_case+0x170/0x3f0 [ 19.438785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.438878] kthread+0x328/0x630 [ 19.438980] ret_from_fork+0x10/0x20 [ 19.439374] [ 19.439605] Allocated by task 265: [ 19.439769] kasan_save_stack+0x3c/0x68 [ 19.439912] kasan_save_track+0x20/0x40 [ 19.440054] kasan_save_alloc_info+0x40/0x58 [ 19.440313] __kasan_kmalloc+0xd4/0xd8 [ 19.440577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.440667] kasan_atomics+0xb8/0x2e0 [ 19.440720] kunit_try_run_case+0x170/0x3f0 [ 19.440774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.440821] kthread+0x328/0x630 [ 19.440860] ret_from_fork+0x10/0x20 [ 19.441418] [ 19.441649] The buggy address belongs to the object at fff00000c7ab9600 [ 19.441649] which belongs to the cache kmalloc-64 of size 64 [ 19.441988] The buggy address is located 0 bytes to the right of [ 19.441988] allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630) [ 19.442117] [ 19.442495] The buggy address belongs to the physical page: [ 19.442555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9 [ 19.442754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.443282] page_type: f5(slab) [ 19.443403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.443583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.443918] page dumped because: kasan: bad access detected [ 19.444074] [ 19.444121] Memory state around the buggy address: [ 19.444464] fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.444713] fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.444780] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.445011] ^ [ 19.445057] fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.445317] fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.445573] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 18.935540] ================================================================== [ 18.936033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.936095] Read of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.936147] [ 18.936186] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.936266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.936294] Hardware name: linux,dummy-virt (DT) [ 18.936339] Call trace: [ 18.936363] show_stack+0x20/0x38 (C) [ 18.936425] dump_stack_lvl+0x8c/0xd0 [ 18.936473] print_report+0x118/0x5d0 [ 18.936529] kasan_report+0xdc/0x128 [ 18.936575] __asan_report_load8_noabort+0x20/0x30 [ 18.936630] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.936683] kasan_bitops_generic+0x110/0x1c8 [ 18.936792] kunit_try_run_case+0x170/0x3f0 [ 18.936843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.936898] kthread+0x328/0x630 [ 18.936942] ret_from_fork+0x10/0x20 [ 18.936993] [ 18.937013] Allocated by task 261: [ 18.937066] kasan_save_stack+0x3c/0x68 [ 18.937108] kasan_save_track+0x20/0x40 [ 18.937148] kasan_save_alloc_info+0x40/0x58 [ 18.937189] __kasan_kmalloc+0xd4/0xd8 [ 18.937235] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.937276] kasan_bitops_generic+0xa0/0x1c8 [ 18.937314] kunit_try_run_case+0x170/0x3f0 [ 18.937364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.937529] kthread+0x328/0x630 [ 18.937586] ret_from_fork+0x10/0x20 [ 18.937624] [ 18.937705] The buggy address belongs to the object at fff00000c5a02c60 [ 18.937705] which belongs to the cache kmalloc-16 of size 16 [ 18.937809] The buggy address is located 8 bytes inside of [ 18.937809] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 18.937871] [ 18.937893] The buggy address belongs to the physical page: [ 18.937925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.937980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.938027] page_type: f5(slab) [ 18.938068] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.938120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.938178] page dumped because: kasan: bad access detected [ 18.938274] [ 18.938361] Memory state around the buggy address: [ 18.938402] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 18.938525] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.938570] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 18.938609] ^ [ 18.938651] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.938695] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.938734] ================================================================== [ 18.930477] ================================================================== [ 18.930547] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.930612] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.930699] [ 18.930735] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.930819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.930848] Hardware name: linux,dummy-virt (DT) [ 18.930882] Call trace: [ 18.930913] show_stack+0x20/0x38 (C) [ 18.931114] dump_stack_lvl+0x8c/0xd0 [ 18.931249] print_report+0x118/0x5d0 [ 18.931364] kasan_report+0xdc/0x128 [ 18.931410] kasan_check_range+0x100/0x1a8 [ 18.931460] __kasan_check_write+0x20/0x30 [ 18.931506] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.931558] kasan_bitops_generic+0x110/0x1c8 [ 18.931605] kunit_try_run_case+0x170/0x3f0 [ 18.931654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.931707] kthread+0x328/0x630 [ 18.931751] ret_from_fork+0x10/0x20 [ 18.931800] [ 18.931820] Allocated by task 261: [ 18.931849] kasan_save_stack+0x3c/0x68 [ 18.931891] kasan_save_track+0x20/0x40 [ 18.931930] kasan_save_alloc_info+0x40/0x58 [ 18.931972] __kasan_kmalloc+0xd4/0xd8 [ 18.932009] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.932051] kasan_bitops_generic+0xa0/0x1c8 [ 18.932091] kunit_try_run_case+0x170/0x3f0 [ 18.932129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.932209] kthread+0x328/0x630 [ 18.932383] ret_from_fork+0x10/0x20 [ 18.932426] [ 18.932447] The buggy address belongs to the object at fff00000c5a02c60 [ 18.932447] which belongs to the cache kmalloc-16 of size 16 [ 18.932550] The buggy address is located 8 bytes inside of [ 18.932550] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 18.932614] [ 18.932636] The buggy address belongs to the physical page: [ 18.932667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.932722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.932772] page_type: f5(slab) [ 18.932812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.932865] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.932920] page dumped because: kasan: bad access detected [ 18.933165] [ 18.933186] Memory state around the buggy address: [ 18.934011] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 18.934130] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.934213] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 18.934277] ^ [ 18.934340] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.934386] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.934426] ================================================================== [ 18.940469] ================================================================== [ 18.940581] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 18.940749] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.940801] [ 18.940848] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.941120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.941838] Hardware name: linux,dummy-virt (DT) [ 18.942501] Call trace: [ 18.942687] show_stack+0x20/0x38 (C) [ 18.942880] dump_stack_lvl+0x8c/0xd0 [ 18.942936] print_report+0x118/0x5d0 [ 18.943346] kasan_report+0xdc/0x128 [ 18.943409] kasan_check_range+0x100/0x1a8 [ 18.943890] __kasan_check_write+0x20/0x30 [ 18.943939] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 18.943992] kasan_bitops_generic+0x110/0x1c8 [ 18.944515] kunit_try_run_case+0x170/0x3f0 [ 18.944800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.944900] kthread+0x328/0x630 [ 18.944946] ret_from_fork+0x10/0x20 [ 18.944994] [ 18.945016] Allocated by task 261: [ 18.945279] kasan_save_stack+0x3c/0x68 [ 18.945351] kasan_save_track+0x20/0x40 [ 18.945598] kasan_save_alloc_info+0x40/0x58 [ 18.945642] __kasan_kmalloc+0xd4/0xd8 [ 18.945680] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.946286] kasan_bitops_generic+0xa0/0x1c8 [ 18.946702] kunit_try_run_case+0x170/0x3f0 [ 18.946749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.946931] kthread+0x328/0x630 [ 18.947269] ret_from_fork+0x10/0x20 [ 18.947557] [ 18.947587] The buggy address belongs to the object at fff00000c5a02c60 [ 18.947587] which belongs to the cache kmalloc-16 of size 16 [ 18.947961] The buggy address is located 8 bytes inside of [ 18.947961] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 18.948038] [ 18.948290] The buggy address belongs to the physical page: [ 18.948353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.948411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.949109] page_type: f5(slab) [ 18.949355] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.949450] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.949501] page dumped because: kasan: bad access detected [ 18.949800] [ 18.950016] Memory state around the buggy address: [ 18.950055] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 18.950382] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.950723] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 18.950965] ^ [ 18.951016] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.951429] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.951496] ================================================================== [ 18.963422] ================================================================== [ 18.963477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 18.964846] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.964934] [ 18.964969] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.965442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.965503] Hardware name: linux,dummy-virt (DT) [ 18.965787] Call trace: [ 18.965868] show_stack+0x20/0x38 (C) [ 18.966160] dump_stack_lvl+0x8c/0xd0 [ 18.966412] print_report+0x118/0x5d0 [ 18.966463] kasan_report+0xdc/0x128 [ 18.966512] kasan_check_range+0x100/0x1a8 [ 18.967228] __kasan_check_write+0x20/0x30 [ 18.967348] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 18.967403] kasan_bitops_generic+0x110/0x1c8 [ 18.967452] kunit_try_run_case+0x170/0x3f0 [ 18.967500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.967555] kthread+0x328/0x630 [ 18.967600] ret_from_fork+0x10/0x20 [ 18.967649] [ 18.967670] Allocated by task 261: [ 18.967700] kasan_save_stack+0x3c/0x68 [ 18.967743] kasan_save_track+0x20/0x40 [ 18.967782] kasan_save_alloc_info+0x40/0x58 [ 18.967825] __kasan_kmalloc+0xd4/0xd8 [ 18.967862] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.967904] kasan_bitops_generic+0xa0/0x1c8 [ 18.967944] kunit_try_run_case+0x170/0x3f0 [ 18.967982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.968028] kthread+0x328/0x630 [ 18.968063] ret_from_fork+0x10/0x20 [ 18.968471] [ 18.968531] The buggy address belongs to the object at fff00000c5a02c60 [ 18.968531] which belongs to the cache kmalloc-16 of size 16 [ 18.969187] The buggy address is located 8 bytes inside of [ 18.969187] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 18.969350] [ 18.969376] The buggy address belongs to the physical page: [ 18.969409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.969463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.969513] page_type: f5(slab) [ 18.969554] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.969606] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.969648] page dumped because: kasan: bad access detected [ 18.969785] [ 18.970185] Memory state around the buggy address: [ 18.970224] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 18.970771] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.970844] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 18.971724] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.974184] __kasan_check_write+0x20/0x30 [ 18.978212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.981207] page dumped because: kasan: bad access detected [ 18.986304] [ 18.988952] kasan_bitops_generic+0x110/0x1c8 [ 18.992234] kunit_try_run_case+0x170/0x3f0 [ 18.992958] page_type: f5(slab) [ 18.993309] ^ [ 18.995371] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.995422] [ 18.995458] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.995540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.996005] Hardware name: linux,dummy-virt (DT) [ 18.996054] Call trace: [ 18.996083] show_stack+0x20/0x38 (C) [ 18.997149] dump_stack_lvl+0x8c/0xd0 [ 18.997222] print_report+0x118/0x5d0 [ 18.997274] kasan_report+0xdc/0x128 [ 18.997666] kasan_check_range+0x100/0x1a8 [ 18.997978] __kasan_check_write+0x20/0x30 [ 18.998152] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 19.000384] kasan_save_stack+0x3c/0x68 [ 19.000606] kasan_bitops_generic+0xa0/0x1c8 [ 19.002057] ret_from_fork+0x10/0x20 [ 19.002889] The buggy address is located 8 bytes inside of [ 19.002889] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 19.006018] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.007096] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.011929] ================================================================== [ 18.952570] ================================================================== [ 18.953366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 18.953452] Read of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.953606] [ 18.953650] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.953834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.954047] Hardware name: linux,dummy-virt (DT) [ 18.954081] Call trace: [ 18.954253] show_stack+0x20/0x38 (C) [ 18.954330] dump_stack_lvl+0x8c/0xd0 [ 18.954380] print_report+0x118/0x5d0 [ 18.954852] kasan_report+0xdc/0x128 [ 18.955088] __asan_report_load8_noabort+0x20/0x30 [ 18.955156] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 18.955873] kasan_bitops_generic+0x110/0x1c8 [ 18.955937] kunit_try_run_case+0x170/0x3f0 [ 18.956605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.956835] kthread+0x328/0x630 [ 18.956882] ret_from_fork+0x10/0x20 [ 18.957334] [ 18.957437] Allocated by task 261: [ 18.957609] kasan_save_stack+0x3c/0x68 [ 18.957663] kasan_save_track+0x20/0x40 [ 18.957702] kasan_save_alloc_info+0x40/0x58 [ 18.957743] __kasan_kmalloc+0xd4/0xd8 [ 18.957780] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.958366] kasan_bitops_generic+0xa0/0x1c8 [ 18.958415] kunit_try_run_case+0x170/0x3f0 [ 18.958456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.958502] kthread+0x328/0x630 [ 18.958536] ret_from_fork+0x10/0x20 [ 18.958746] [ 18.958771] The buggy address belongs to the object at fff00000c5a02c60 [ 18.958771] which belongs to the cache kmalloc-16 of size 16 [ 18.959124] The buggy address is located 8 bytes inside of [ 18.959124] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 18.959227] [ 18.959532] The buggy address belongs to the physical page: [ 18.959572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.959892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.960097] page_type: f5(slab) [ 18.960221] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.960375] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.960525] page dumped because: kasan: bad access detected [ 18.960565] [ 18.960586] Memory state around the buggy address: [ 18.961439] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 18.961541] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.961645] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 18.961745] ^ [ 18.961999] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.962215] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.962261] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 18.922612] ================================================================== [ 18.922676] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 18.922723] Read of size 1 at addr fff00000c7a5ef90 by task kunit_try_catch/259 [ 18.922775] [ 18.922809] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.922893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.922922] Hardware name: linux,dummy-virt (DT) [ 18.922955] Call trace: [ 18.922980] show_stack+0x20/0x38 (C) [ 18.923031] dump_stack_lvl+0x8c/0xd0 [ 18.923080] print_report+0x118/0x5d0 [ 18.923129] kasan_report+0xdc/0x128 [ 18.923176] __asan_report_load1_noabort+0x20/0x30 [ 18.923228] strnlen+0x80/0x88 [ 18.923271] kasan_strings+0x478/0xb00 [ 18.923316] kunit_try_run_case+0x170/0x3f0 [ 18.923375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.923430] kthread+0x328/0x630 [ 18.923472] ret_from_fork+0x10/0x20 [ 18.923521] [ 18.923542] Allocated by task 259: [ 18.923571] kasan_save_stack+0x3c/0x68 [ 18.923612] kasan_save_track+0x20/0x40 [ 18.923652] kasan_save_alloc_info+0x40/0x58 [ 18.923694] __kasan_kmalloc+0xd4/0xd8 [ 18.923732] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.923777] kasan_strings+0xc8/0xb00 [ 18.923814] kunit_try_run_case+0x170/0x3f0 [ 18.923854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.923900] kthread+0x328/0x630 [ 18.923933] ret_from_fork+0x10/0x20 [ 18.923971] [ 18.923992] Freed by task 259: [ 18.924019] kasan_save_stack+0x3c/0x68 [ 18.924059] kasan_save_track+0x20/0x40 [ 18.924096] kasan_save_free_info+0x4c/0x78 [ 18.924138] __kasan_slab_free+0x6c/0x98 [ 18.924181] kfree+0x214/0x3c8 [ 18.924217] kasan_strings+0x24c/0xb00 [ 18.924252] kunit_try_run_case+0x170/0x3f0 [ 18.924298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.924439] kthread+0x328/0x630 [ 18.924473] ret_from_fork+0x10/0x20 [ 18.924583] [ 18.924635] The buggy address belongs to the object at fff00000c7a5ef80 [ 18.924635] which belongs to the cache kmalloc-32 of size 32 [ 18.924840] The buggy address is located 16 bytes inside of [ 18.924840] freed 32-byte region [fff00000c7a5ef80, fff00000c7a5efa0) [ 18.924966] [ 18.925087] The buggy address belongs to the physical page: [ 18.925145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e [ 18.925201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.925267] page_type: f5(slab) [ 18.925354] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.925487] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 18.925555] page dumped because: kasan: bad access detected [ 18.925701] [ 18.925722] Memory state around the buggy address: [ 18.925755] fff00000c7a5ee80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.925800] fff00000c7a5ef00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.925844] >fff00000c7a5ef80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.925886] ^ [ 18.925920] fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.925964] fff00000c7a5f080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.926004] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 18.907359] ================================================================== [ 18.907567] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 18.907784] Read of size 1 at addr fff00000c7a5ef90 by task kunit_try_catch/259 [ 18.908109] [ 18.908539] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.908781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.909142] Hardware name: linux,dummy-virt (DT) [ 18.909847] Call trace: [ 18.909912] show_stack+0x20/0x38 (C) [ 18.910169] dump_stack_lvl+0x8c/0xd0 [ 18.910442] print_report+0x118/0x5d0 [ 18.910626] kasan_report+0xdc/0x128 [ 18.910676] __asan_report_load1_noabort+0x20/0x30 [ 18.910730] strlen+0xa8/0xb0 [ 18.911850] kasan_strings+0x418/0xb00 [ 18.912884] kunit_try_run_case+0x170/0x3f0 [ 18.913201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.913276] kthread+0x328/0x630 [ 18.913334] ret_from_fork+0x10/0x20 [ 18.913387] [ 18.913408] Allocated by task 259: [ 18.913438] kasan_save_stack+0x3c/0x68 [ 18.913483] kasan_save_track+0x20/0x40 [ 18.913520] kasan_save_alloc_info+0x40/0x58 [ 18.913918] __kasan_kmalloc+0xd4/0xd8 [ 18.913971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.914014] kasan_strings+0xc8/0xb00 [ 18.914052] kunit_try_run_case+0x170/0x3f0 [ 18.914340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.914946] kthread+0x328/0x630 [ 18.915096] ret_from_fork+0x10/0x20 [ 18.915138] [ 18.915161] Freed by task 259: [ 18.915190] kasan_save_stack+0x3c/0x68 [ 18.915384] kasan_save_track+0x20/0x40 [ 18.915955] kasan_save_free_info+0x4c/0x78 [ 18.916310] __kasan_slab_free+0x6c/0x98 [ 18.916682] kfree+0x214/0x3c8 [ 18.916857] kasan_strings+0x24c/0xb00 [ 18.916896] kunit_try_run_case+0x170/0x3f0 [ 18.917167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.917371] kthread+0x328/0x630 [ 18.917465] ret_from_fork+0x10/0x20 [ 18.917779] [ 18.917872] The buggy address belongs to the object at fff00000c7a5ef80 [ 18.917872] which belongs to the cache kmalloc-32 of size 32 [ 18.918066] The buggy address is located 16 bytes inside of [ 18.918066] freed 32-byte region [fff00000c7a5ef80, fff00000c7a5efa0) [ 18.918612] [ 18.918649] The buggy address belongs to the physical page: [ 18.918774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e [ 18.919231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.919289] page_type: f5(slab) [ 18.919578] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.919888] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 18.920100] page dumped because: kasan: bad access detected [ 18.920139] [ 18.920364] Memory state around the buggy address: [ 18.920406] fff00000c7a5ee80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.920869] fff00000c7a5ef00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.920921] >fff00000c7a5ef80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.922034] ^ [ 18.922086] fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.922134] fff00000c7a5f080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.922175] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 18.898411] ================================================================== [ 18.898955] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 18.899011] Read of size 1 at addr fff00000c7a5ef90 by task kunit_try_catch/259 [ 18.899066] [ 18.899101] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.899185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.899214] Hardware name: linux,dummy-virt (DT) [ 18.899247] Call trace: [ 18.899274] show_stack+0x20/0x38 (C) [ 18.899335] dump_stack_lvl+0x8c/0xd0 [ 18.899386] print_report+0x118/0x5d0 [ 18.899434] kasan_report+0xdc/0x128 [ 18.899482] __asan_report_load1_noabort+0x20/0x30 [ 18.899535] kasan_strings+0x95c/0xb00 [ 18.899582] kunit_try_run_case+0x170/0x3f0 [ 18.899631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.899686] kthread+0x328/0x630 [ 18.899728] ret_from_fork+0x10/0x20 [ 18.899778] [ 18.899800] Allocated by task 259: [ 18.899829] kasan_save_stack+0x3c/0x68 [ 18.899872] kasan_save_track+0x20/0x40 [ 18.899913] kasan_save_alloc_info+0x40/0x58 [ 18.899956] __kasan_kmalloc+0xd4/0xd8 [ 18.899996] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.900038] kasan_strings+0xc8/0xb00 [ 18.900077] kunit_try_run_case+0x170/0x3f0 [ 18.900116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.900167] kthread+0x328/0x630 [ 18.900202] ret_from_fork+0x10/0x20 [ 18.900240] [ 18.900260] Freed by task 259: [ 18.900286] kasan_save_stack+0x3c/0x68 [ 18.900337] kasan_save_track+0x20/0x40 [ 18.900375] kasan_save_free_info+0x4c/0x78 [ 18.900417] __kasan_slab_free+0x6c/0x98 [ 18.900456] kfree+0x214/0x3c8 [ 18.900491] kasan_strings+0x24c/0xb00 [ 18.901202] kunit_try_run_case+0x170/0x3f0 [ 18.901275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.901344] kthread+0x328/0x630 [ 18.901390] ret_from_fork+0x10/0x20 [ 18.901430] [ 18.901453] The buggy address belongs to the object at fff00000c7a5ef80 [ 18.901453] which belongs to the cache kmalloc-32 of size 32 [ 18.901515] The buggy address is located 16 bytes inside of [ 18.901515] freed 32-byte region [fff00000c7a5ef80, fff00000c7a5efa0) [ 18.901577] [ 18.901601] The buggy address belongs to the physical page: [ 18.901948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e [ 18.902122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.902297] page_type: f5(slab) [ 18.902352] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.902404] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 18.902445] page dumped because: kasan: bad access detected [ 18.902479] [ 18.903653] Memory state around the buggy address: [ 18.904732] fff00000c7a5ee80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.904787] fff00000c7a5ef00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.905490] >fff00000c7a5ef80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.905538] ^ [ 18.905570] fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.905616] fff00000c7a5f080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.905659] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 18.891757] ================================================================== [ 18.891908] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 18.892000] Read of size 1 at addr fff00000c7a5ef90 by task kunit_try_catch/259 [ 18.892053] [ 18.892106] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.892198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.892293] Hardware name: linux,dummy-virt (DT) [ 18.892363] Call trace: [ 18.892410] show_stack+0x20/0x38 (C) [ 18.892465] dump_stack_lvl+0x8c/0xd0 [ 18.892522] print_report+0x118/0x5d0 [ 18.892610] kasan_report+0xdc/0x128 [ 18.892733] __asan_report_load1_noabort+0x20/0x30 [ 18.892799] strcmp+0xc0/0xc8 [ 18.892842] kasan_strings+0x340/0xb00 [ 18.892896] kunit_try_run_case+0x170/0x3f0 [ 18.892946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.893001] kthread+0x328/0x630 [ 18.893044] ret_from_fork+0x10/0x20 [ 18.893095] [ 18.893403] Allocated by task 259: [ 18.893472] kasan_save_stack+0x3c/0x68 [ 18.893669] kasan_save_track+0x20/0x40 [ 18.893753] kasan_save_alloc_info+0x40/0x58 [ 18.893904] __kasan_kmalloc+0xd4/0xd8 [ 18.894072] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.894121] kasan_strings+0xc8/0xb00 [ 18.894159] kunit_try_run_case+0x170/0x3f0 [ 18.894200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.894247] kthread+0x328/0x630 [ 18.894283] ret_from_fork+0x10/0x20 [ 18.894330] [ 18.894425] Freed by task 259: [ 18.894616] kasan_save_stack+0x3c/0x68 [ 18.894680] kasan_save_track+0x20/0x40 [ 18.894905] kasan_save_free_info+0x4c/0x78 [ 18.895095] __kasan_slab_free+0x6c/0x98 [ 18.895203] kfree+0x214/0x3c8 [ 18.895388] kasan_strings+0x24c/0xb00 [ 18.895444] kunit_try_run_case+0x170/0x3f0 [ 18.895496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.895543] kthread+0x328/0x630 [ 18.895584] ret_from_fork+0x10/0x20 [ 18.895625] [ 18.895666] The buggy address belongs to the object at fff00000c7a5ef80 [ 18.895666] which belongs to the cache kmalloc-32 of size 32 [ 18.895741] The buggy address is located 16 bytes inside of [ 18.895741] freed 32-byte region [fff00000c7a5ef80, fff00000c7a5efa0) [ 18.895804] [ 18.895845] The buggy address belongs to the physical page: [ 18.895881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e [ 18.895947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.896000] page_type: f5(slab) [ 18.896042] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.896095] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 18.896148] page dumped because: kasan: bad access detected [ 18.896184] [ 18.896206] Memory state around the buggy address: [ 18.896250] fff00000c7a5ee80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.896296] fff00000c7a5ef00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.896827] >fff00000c7a5ef80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.896925] ^ [ 18.897088] fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.897151] fff00000c7a5f080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.898027] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 18.879292] ================================================================== [ 18.879512] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 18.879666] Read of size 1 at addr fff00000c7a5edd8 by task kunit_try_catch/257 [ 18.879722] [ 18.879806] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.879962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.880047] Hardware name: linux,dummy-virt (DT) [ 18.880085] Call trace: [ 18.880123] show_stack+0x20/0x38 (C) [ 18.880211] dump_stack_lvl+0x8c/0xd0 [ 18.880262] print_report+0x118/0x5d0 [ 18.880357] kasan_report+0xdc/0x128 [ 18.880433] __asan_report_load1_noabort+0x20/0x30 [ 18.880508] memcmp+0x198/0x1d8 [ 18.880568] kasan_memcmp+0x16c/0x300 [ 18.880674] kunit_try_run_case+0x170/0x3f0 [ 18.880799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.880856] kthread+0x328/0x630 [ 18.880914] ret_from_fork+0x10/0x20 [ 18.880966] [ 18.880988] Allocated by task 257: [ 18.881019] kasan_save_stack+0x3c/0x68 [ 18.881063] kasan_save_track+0x20/0x40 [ 18.881103] kasan_save_alloc_info+0x40/0x58 [ 18.881291] __kasan_kmalloc+0xd4/0xd8 [ 18.881529] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.881647] kasan_memcmp+0xbc/0x300 [ 18.881744] kunit_try_run_case+0x170/0x3f0 [ 18.881852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.881957] kthread+0x328/0x630 [ 18.882076] ret_from_fork+0x10/0x20 [ 18.882163] [ 18.882206] The buggy address belongs to the object at fff00000c7a5edc0 [ 18.882206] which belongs to the cache kmalloc-32 of size 32 [ 18.882296] The buggy address is located 0 bytes to the right of [ 18.882296] allocated 24-byte region [fff00000c7a5edc0, fff00000c7a5edd8) [ 18.882405] [ 18.882428] The buggy address belongs to the physical page: [ 18.882602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e [ 18.882709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.882933] page_type: f5(slab) [ 18.883005] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.883097] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.883180] page dumped because: kasan: bad access detected [ 18.883232] [ 18.883264] Memory state around the buggy address: [ 18.883315] fff00000c7a5ec80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.883370] fff00000c7a5ed00: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 18.883423] >fff00000c7a5ed80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.883466] ^ [ 18.883505] fff00000c7a5ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.883559] fff00000c7a5ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.883620] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 18.866969] ================================================================== [ 18.867029] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 18.867082] Read of size 1 at addr ffff800080b27b4a by task kunit_try_catch/253 [ 18.867133] [ 18.867167] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.867251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.867280] Hardware name: linux,dummy-virt (DT) [ 18.867313] Call trace: [ 18.867360] show_stack+0x20/0x38 (C) [ 18.867411] dump_stack_lvl+0x8c/0xd0 [ 18.867476] print_report+0x310/0x5d0 [ 18.867526] kasan_report+0xdc/0x128 [ 18.867572] __asan_report_load1_noabort+0x20/0x30 [ 18.867627] kasan_alloca_oob_right+0x2dc/0x340 [ 18.867697] kunit_try_run_case+0x170/0x3f0 [ 18.867748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.867802] kthread+0x328/0x630 [ 18.867847] ret_from_fork+0x10/0x20 [ 18.867897] [ 18.867922] The buggy address belongs to stack of task kunit_try_catch/253 [ 18.867975] [ 18.867997] The buggy address ffff800080b27b4a belongs to a vmalloc virtual mapping [ 18.868039] The buggy address belongs to the physical page: [ 18.868077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a58 [ 18.868134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.868208] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.868261] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.868303] page dumped because: kasan: bad access detected [ 18.868347] [ 18.868375] Memory state around the buggy address: [ 18.868419] ffff800080b27a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.868481] ffff800080b27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.868525] >ffff800080b27b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 18.868565] ^ [ 18.868604] ffff800080b27b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 18.868647] ffff800080b27c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 18.868688] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 18.847954] ================================================================== [ 18.848058] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 18.848114] Read of size 1 at addr ffff800080ac7c2a by task kunit_try_catch/249 [ 18.848170] [ 18.848206] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.848289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.848937] Hardware name: linux,dummy-virt (DT) [ 18.848977] Call trace: [ 18.849001] show_stack+0x20/0x38 (C) [ 18.849050] dump_stack_lvl+0x8c/0xd0 [ 18.849117] print_report+0x310/0x5d0 [ 18.849302] kasan_report+0xdc/0x128 [ 18.849419] __asan_report_load1_noabort+0x20/0x30 [ 18.849607] kasan_stack_oob+0x238/0x270 [ 18.849721] kunit_try_run_case+0x170/0x3f0 [ 18.849978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.850036] kthread+0x328/0x630 [ 18.850101] ret_from_fork+0x10/0x20 [ 18.850282] [ 18.850353] The buggy address belongs to stack of task kunit_try_catch/249 [ 18.850670] and is located at offset 138 in frame: [ 18.850813] kasan_stack_oob+0x0/0x270 [ 18.851297] [ 18.851409] This frame has 4 objects: [ 18.851688] [48, 49) '__assertion' [ 18.851732] [64, 72) 'array' [ 18.851767] [96, 112) '__assertion' [ 18.851871] [128, 138) 'stack_array' [ 18.852089] [ 18.852160] The buggy address ffff800080ac7c2a belongs to a vmalloc virtual mapping [ 18.852287] The buggy address belongs to the physical page: [ 18.852363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b [ 18.852451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.852865] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.852919] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.852983] page dumped because: kasan: bad access detected [ 18.853018] [ 18.853039] Memory state around the buggy address: [ 18.853074] ffff800080ac7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.853274] ffff800080ac7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 18.853332] >ffff800080ac7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 18.853370] ^ [ 18.853552] ffff800080ac7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 18.853646] ffff800080ac7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 18.853732] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 18.834414] ================================================================== [ 18.834479] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 18.834536] Read of size 1 at addr ffffaeee5cb4f58d by task kunit_try_catch/245 [ 18.834599] [ 18.834726] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.834809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.834836] Hardware name: linux,dummy-virt (DT) [ 18.834868] Call trace: [ 18.834910] show_stack+0x20/0x38 (C) [ 18.834962] dump_stack_lvl+0x8c/0xd0 [ 18.835511] print_report+0x310/0x5d0 [ 18.835569] kasan_report+0xdc/0x128 [ 18.835669] __asan_report_load1_noabort+0x20/0x30 [ 18.835799] kasan_global_oob_right+0x230/0x270 [ 18.835847] kunit_try_run_case+0x170/0x3f0 [ 18.835904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.836011] kthread+0x328/0x630 [ 18.836112] ret_from_fork+0x10/0x20 [ 18.836176] [ 18.836226] The buggy address belongs to the variable: [ 18.836268] global_array+0xd/0x40 [ 18.836446] [ 18.836528] The buggy address ffffaeee5cb4f58d belongs to a vmalloc virtual mapping [ 18.836677] The buggy address belongs to the physical page: [ 18.836721] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f [ 18.836777] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 18.837104] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000 [ 18.837202] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.837242] page dumped because: kasan: bad access detected [ 18.837294] [ 18.837312] Memory state around the buggy address: [ 18.837354] ffffaeee5cb4f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.837398] ffffaeee5cb4f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 18.837475] >ffffaeee5cb4f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 18.837534] ^ [ 18.837562] ffffaeee5cb4f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 18.837604] ffffaeee5cb4f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.837643] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 18.821432] ================================================================== [ 18.821578] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.821642] Free of addr fff00000c7a74001 by task kunit_try_catch/243 [ 18.821836] [ 18.821875] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.821957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.821984] Hardware name: linux,dummy-virt (DT) [ 18.822042] Call trace: [ 18.822175] show_stack+0x20/0x38 (C) [ 18.822301] dump_stack_lvl+0x8c/0xd0 [ 18.822443] print_report+0x118/0x5d0 [ 18.822491] kasan_report_invalid_free+0xc0/0xe8 [ 18.822541] __kasan_mempool_poison_object+0xfc/0x150 [ 18.822594] mempool_free+0x28c/0x328 [ 18.822842] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.822898] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 18.822950] kunit_try_run_case+0x170/0x3f0 [ 18.822997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.823060] kthread+0x328/0x630 [ 18.823183] ret_from_fork+0x10/0x20 [ 18.823232] [ 18.823252] The buggy address belongs to the physical page: [ 18.823286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a74 [ 18.823350] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.823594] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.823712] page_type: f8(unknown) [ 18.823858] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.824024] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.824098] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.824159] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.824483] head: 0bfffe0000000002 ffffc1ffc31e9d01 00000000ffffffff 00000000ffffffff [ 18.824573] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.824672] page dumped because: kasan: bad access detected [ 18.824704] [ 18.824753] Memory state around the buggy address: [ 18.824931] fff00000c7a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.824975] fff00000c7a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.825161] >fff00000c7a74000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.825200] ^ [ 18.825228] fff00000c7a74080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.826654] fff00000c7a74100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.826816] ================================================================== [ 18.809210] ================================================================== [ 18.809290] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.809495] Free of addr fff00000c7a4e901 by task kunit_try_catch/241 [ 18.809538] [ 18.809577] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.809687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.809714] Hardware name: linux,dummy-virt (DT) [ 18.809746] Call trace: [ 18.809770] show_stack+0x20/0x38 (C) [ 18.809822] dump_stack_lvl+0x8c/0xd0 [ 18.809891] print_report+0x118/0x5d0 [ 18.809967] kasan_report_invalid_free+0xc0/0xe8 [ 18.810128] check_slab_allocation+0xfc/0x108 [ 18.810189] __kasan_mempool_poison_object+0x78/0x150 [ 18.810240] mempool_free+0x28c/0x328 [ 18.810287] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.810348] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.810398] kunit_try_run_case+0x170/0x3f0 [ 18.810447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.810500] kthread+0x328/0x630 [ 18.810545] ret_from_fork+0x10/0x20 [ 18.810595] [ 18.810613] Allocated by task 241: [ 18.810643] kasan_save_stack+0x3c/0x68 [ 18.810695] kasan_save_track+0x20/0x40 [ 18.810734] kasan_save_alloc_info+0x40/0x58 [ 18.810772] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.810836] remove_element+0x130/0x1f8 [ 18.810884] mempool_alloc_preallocated+0x58/0xc0 [ 18.810923] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 18.810966] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.811008] kunit_try_run_case+0x170/0x3f0 [ 18.811044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.811115] kthread+0x328/0x630 [ 18.811148] ret_from_fork+0x10/0x20 [ 18.811184] [ 18.811203] The buggy address belongs to the object at fff00000c7a4e900 [ 18.811203] which belongs to the cache kmalloc-128 of size 128 [ 18.811262] The buggy address is located 1 bytes inside of [ 18.811262] 128-byte region [fff00000c7a4e900, fff00000c7a4e980) [ 18.811331] [ 18.811353] The buggy address belongs to the physical page: [ 18.811383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 18.811437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.811487] page_type: f5(slab) [ 18.811529] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.811579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.811619] page dumped because: kasan: bad access detected [ 18.811662] [ 18.811681] Memory state around the buggy address: [ 18.811714] fff00000c7a4e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.811776] fff00000c7a4e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.811819] >fff00000c7a4e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.811858] ^ [ 18.811884] fff00000c7a4e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.811953] fff00000c7a4ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.812026] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 18.788028] ================================================================== [ 18.788099] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.788491] Free of addr fff00000c7a74000 by task kunit_try_catch/239 [ 18.788673] [ 18.788825] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.788947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.788986] Hardware name: linux,dummy-virt (DT) [ 18.789017] Call trace: [ 18.789043] show_stack+0x20/0x38 (C) [ 18.789096] dump_stack_lvl+0x8c/0xd0 [ 18.789686] print_report+0x118/0x5d0 [ 18.789917] kasan_report_invalid_free+0xc0/0xe8 [ 18.790018] __kasan_mempool_poison_pages+0xe0/0xe8 [ 18.790628] mempool_free+0x24c/0x328 [ 18.790714] mempool_double_free_helper+0x150/0x2e8 [ 18.790928] mempool_page_alloc_double_free+0xbc/0x118 [ 18.791061] kunit_try_run_case+0x170/0x3f0 [ 18.791159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.791433] kthread+0x328/0x630 [ 18.791550] ret_from_fork+0x10/0x20 [ 18.791876] [ 18.791944] The buggy address belongs to the physical page: [ 18.791997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a74 [ 18.792068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.792312] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.792564] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.792648] page dumped because: kasan: bad access detected [ 18.792706] [ 18.792742] Memory state around the buggy address: [ 18.792817] fff00000c7a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.792951] fff00000c7a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.793002] >fff00000c7a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.793040] ^ [ 18.793068] fff00000c7a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.793587] fff00000c7a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.793683] ================================================================== [ 18.774265] ================================================================== [ 18.774351] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.774409] Free of addr fff00000c7a74000 by task kunit_try_catch/237 [ 18.774451] [ 18.774499] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.774581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.774611] Hardware name: linux,dummy-virt (DT) [ 18.774644] Call trace: [ 18.774666] show_stack+0x20/0x38 (C) [ 18.774715] dump_stack_lvl+0x8c/0xd0 [ 18.774774] print_report+0x118/0x5d0 [ 18.774825] kasan_report_invalid_free+0xc0/0xe8 [ 18.774876] __kasan_mempool_poison_object+0x14c/0x150 [ 18.774929] mempool_free+0x28c/0x328 [ 18.774983] mempool_double_free_helper+0x150/0x2e8 [ 18.775033] mempool_kmalloc_large_double_free+0xc0/0x118 [ 18.775084] kunit_try_run_case+0x170/0x3f0 [ 18.775131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.775191] kthread+0x328/0x630 [ 18.775234] ret_from_fork+0x10/0x20 [ 18.775283] [ 18.775303] The buggy address belongs to the physical page: [ 18.775346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a74 [ 18.775679] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.775935] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.776628] page_type: f8(unknown) [ 18.776712] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.776765] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.776843] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.777694] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.777777] head: 0bfffe0000000002 ffffc1ffc31e9d01 00000000ffffffff 00000000ffffffff [ 18.777849] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.777924] page dumped because: kasan: bad access detected [ 18.777984] [ 18.778019] Memory state around the buggy address: [ 18.778072] fff00000c7a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.778140] fff00000c7a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.778185] >fff00000c7a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.778539] ^ [ 18.778740] fff00000c7a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.778817] fff00000c7a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.778893] ================================================================== [ 18.755153] ================================================================== [ 18.755232] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.755295] Free of addr fff00000c7a4e500 by task kunit_try_catch/235 [ 18.755349] [ 18.755652] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.755785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.755826] Hardware name: linux,dummy-virt (DT) [ 18.755865] Call trace: [ 18.755892] show_stack+0x20/0x38 (C) [ 18.755949] dump_stack_lvl+0x8c/0xd0 [ 18.756217] print_report+0x118/0x5d0 [ 18.756296] kasan_report_invalid_free+0xc0/0xe8 [ 18.756358] check_slab_allocation+0xd4/0x108 [ 18.756740] __kasan_mempool_poison_object+0x78/0x150 [ 18.756829] mempool_free+0x28c/0x328 [ 18.756961] mempool_double_free_helper+0x150/0x2e8 [ 18.757087] mempool_kmalloc_double_free+0xc0/0x118 [ 18.757147] kunit_try_run_case+0x170/0x3f0 [ 18.757496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.757640] kthread+0x328/0x630 [ 18.757716] ret_from_fork+0x10/0x20 [ 18.758069] [ 18.758124] Allocated by task 235: [ 18.758176] kasan_save_stack+0x3c/0x68 [ 18.758309] kasan_save_track+0x20/0x40 [ 18.758384] kasan_save_alloc_info+0x40/0x58 [ 18.758426] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.758762] remove_element+0x130/0x1f8 [ 18.758834] mempool_alloc_preallocated+0x58/0xc0 [ 18.758932] mempool_double_free_helper+0x94/0x2e8 [ 18.759047] mempool_kmalloc_double_free+0xc0/0x118 [ 18.759106] kunit_try_run_case+0x170/0x3f0 [ 18.759145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.759410] kthread+0x328/0x630 [ 18.759590] ret_from_fork+0x10/0x20 [ 18.759637] [ 18.759699] Freed by task 235: [ 18.759983] kasan_save_stack+0x3c/0x68 [ 18.760127] kasan_save_track+0x20/0x40 [ 18.760182] kasan_save_free_info+0x4c/0x78 [ 18.760486] __kasan_mempool_poison_object+0xc0/0x150 [ 18.760573] mempool_free+0x28c/0x328 [ 18.760650] mempool_double_free_helper+0x100/0x2e8 [ 18.760993] mempool_kmalloc_double_free+0xc0/0x118 [ 18.761109] kunit_try_run_case+0x170/0x3f0 [ 18.761198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.761314] kthread+0x328/0x630 [ 18.761381] ret_from_fork+0x10/0x20 [ 18.761439] [ 18.761779] The buggy address belongs to the object at fff00000c7a4e500 [ 18.761779] which belongs to the cache kmalloc-128 of size 128 [ 18.761961] The buggy address is located 0 bytes inside of [ 18.761961] 128-byte region [fff00000c7a4e500, fff00000c7a4e580) [ 18.762032] [ 18.762055] The buggy address belongs to the physical page: [ 18.762088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 18.762433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.762589] page_type: f5(slab) [ 18.762648] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.762743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.762851] page dumped because: kasan: bad access detected [ 18.762917] [ 18.762958] Memory state around the buggy address: [ 18.763350] fff00000c7a4e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.763449] fff00000c7a4e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.763493] >fff00000c7a4e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.763531] ^ [ 18.763578] fff00000c7a4e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.763655] fff00000c7a4e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.763733] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 18.684233] ================================================================== [ 18.684303] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.684436] Read of size 1 at addr fff00000c7a6c000 by task kunit_try_catch/229 [ 18.684579] [ 18.684745] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.684865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.684893] Hardware name: linux,dummy-virt (DT) [ 18.684951] Call trace: [ 18.684978] show_stack+0x20/0x38 (C) [ 18.685030] dump_stack_lvl+0x8c/0xd0 [ 18.685188] print_report+0x118/0x5d0 [ 18.685299] kasan_report+0xdc/0x128 [ 18.685413] __asan_report_load1_noabort+0x20/0x30 [ 18.685526] mempool_uaf_helper+0x314/0x340 [ 18.685584] mempool_kmalloc_large_uaf+0xc4/0x120 [ 18.685632] kunit_try_run_case+0x170/0x3f0 [ 18.685679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.685733] kthread+0x328/0x630 [ 18.685912] ret_from_fork+0x10/0x20 [ 18.686047] [ 18.686186] The buggy address belongs to the physical page: [ 18.686291] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a6c [ 18.686460] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.686517] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.686579] page_type: f8(unknown) [ 18.686619] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.686669] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.686741] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.686797] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.686855] head: 0bfffe0000000002 ffffc1ffc31e9b01 00000000ffffffff 00000000ffffffff [ 18.686904] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.686944] page dumped because: kasan: bad access detected [ 18.686976] [ 18.686993] Memory state around the buggy address: [ 18.687025] fff00000c7a6bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.687078] fff00000c7a6bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.687125] >fff00000c7a6c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.687162] ^ [ 18.687189] fff00000c7a6c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.687230] fff00000c7a6c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.687268] ================================================================== [ 18.738564] ================================================================== [ 18.738688] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.738887] Read of size 1 at addr fff00000c7a74000 by task kunit_try_catch/233 [ 18.739062] [ 18.739116] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.739200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.739238] Hardware name: linux,dummy-virt (DT) [ 18.739271] Call trace: [ 18.739305] show_stack+0x20/0x38 (C) [ 18.739630] dump_stack_lvl+0x8c/0xd0 [ 18.739720] print_report+0x118/0x5d0 [ 18.739768] kasan_report+0xdc/0x128 [ 18.739814] __asan_report_load1_noabort+0x20/0x30 [ 18.740128] mempool_uaf_helper+0x314/0x340 [ 18.740212] mempool_page_alloc_uaf+0xc0/0x118 [ 18.740284] kunit_try_run_case+0x170/0x3f0 [ 18.740345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.740614] kthread+0x328/0x630 [ 18.740803] ret_from_fork+0x10/0x20 [ 18.740966] [ 18.740993] The buggy address belongs to the physical page: [ 18.741050] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a74 [ 18.741115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.741468] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.745148] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.745200] page dumped because: kasan: bad access detected [ 18.745234] [ 18.745253] Memory state around the buggy address: [ 18.745288] fff00000c7a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.745345] fff00000c7a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.745391] >fff00000c7a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.745430] ^ [ 18.745458] fff00000c7a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.745500] fff00000c7a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.745537] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 18.648005] ================================================================== [ 18.648111] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.648213] Read of size 1 at addr fff00000c7a4e100 by task kunit_try_catch/227 [ 18.648271] [ 18.648311] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.648486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.648835] Hardware name: linux,dummy-virt (DT) [ 18.648886] Call trace: [ 18.648965] show_stack+0x20/0x38 (C) [ 18.649037] dump_stack_lvl+0x8c/0xd0 [ 18.649117] print_report+0x118/0x5d0 [ 18.649166] kasan_report+0xdc/0x128 [ 18.649211] __asan_report_load1_noabort+0x20/0x30 [ 18.649261] mempool_uaf_helper+0x314/0x340 [ 18.649308] mempool_kmalloc_uaf+0xc4/0x120 [ 18.649502] kunit_try_run_case+0x170/0x3f0 [ 18.649588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.649693] kthread+0x328/0x630 [ 18.649767] ret_from_fork+0x10/0x20 [ 18.649831] [ 18.649921] Allocated by task 227: [ 18.649979] kasan_save_stack+0x3c/0x68 [ 18.651008] kasan_save_track+0x20/0x40 [ 18.651067] kasan_save_alloc_info+0x40/0x58 [ 18.651109] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.651445] remove_element+0x130/0x1f8 [ 18.651521] mempool_alloc_preallocated+0x58/0xc0 [ 18.651664] mempool_uaf_helper+0xa4/0x340 [ 18.651767] mempool_kmalloc_uaf+0xc4/0x120 [ 18.651817] kunit_try_run_case+0x170/0x3f0 [ 18.652276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.652541] kthread+0x328/0x630 [ 18.652575] ret_from_fork+0x10/0x20 [ 18.653264] [ 18.653293] Freed by task 227: [ 18.653335] kasan_save_stack+0x3c/0x68 [ 18.654012] kasan_save_track+0x20/0x40 [ 18.654402] kasan_save_free_info+0x4c/0x78 [ 18.654717] __kasan_mempool_poison_object+0xc0/0x150 [ 18.655393] mempool_free+0x28c/0x328 [ 18.655570] mempool_uaf_helper+0x104/0x340 [ 18.655607] mempool_kmalloc_uaf+0xc4/0x120 [ 18.655647] kunit_try_run_case+0x170/0x3f0 [ 18.656276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.656821] kthread+0x328/0x630 [ 18.656998] ret_from_fork+0x10/0x20 [ 18.657039] [ 18.657531] The buggy address belongs to the object at fff00000c7a4e100 [ 18.657531] which belongs to the cache kmalloc-128 of size 128 [ 18.658015] The buggy address is located 0 bytes inside of [ 18.658015] freed 128-byte region [fff00000c7a4e100, fff00000c7a4e180) [ 18.658725] [ 18.659109] The buggy address belongs to the physical page: [ 18.659147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 18.661461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.661529] page_type: f5(slab) [ 18.661687] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.662327] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.663551] page dumped because: kasan: bad access detected [ 18.663603] [ 18.663657] Memory state around the buggy address: [ 18.663694] fff00000c7a4e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.663903] fff00000c7a4e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.664053] >fff00000c7a4e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.664546] ^ [ 18.665173] fff00000c7a4e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.665237] fff00000c7a4e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.665501] ================================================================== [ 18.699249] ================================================================== [ 18.699313] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.699749] Read of size 1 at addr fff00000c7a5b240 by task kunit_try_catch/231 [ 18.700165] [ 18.700214] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.700316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.700363] Hardware name: linux,dummy-virt (DT) [ 18.700397] Call trace: [ 18.700429] show_stack+0x20/0x38 (C) [ 18.700481] dump_stack_lvl+0x8c/0xd0 [ 18.701965] print_report+0x118/0x5d0 [ 18.702514] kasan_report+0xdc/0x128 [ 18.703063] __asan_report_load1_noabort+0x20/0x30 [ 18.703260] mempool_uaf_helper+0x314/0x340 [ 18.703315] mempool_slab_uaf+0xc0/0x118 [ 18.703417] kunit_try_run_case+0x170/0x3f0 [ 18.704110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.704234] kthread+0x328/0x630 [ 18.704380] ret_from_fork+0x10/0x20 [ 18.704552] [ 18.704692] Allocated by task 231: [ 18.704726] kasan_save_stack+0x3c/0x68 [ 18.704791] kasan_save_track+0x20/0x40 [ 18.705042] kasan_save_alloc_info+0x40/0x58 [ 18.705211] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.705356] remove_element+0x16c/0x1f8 [ 18.705425] mempool_alloc_preallocated+0x58/0xc0 [ 18.705794] mempool_uaf_helper+0xa4/0x340 [ 18.705863] mempool_slab_uaf+0xc0/0x118 [ 18.705935] kunit_try_run_case+0x170/0x3f0 [ 18.706059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.706128] kthread+0x328/0x630 [ 18.706477] ret_from_fork+0x10/0x20 [ 18.706923] [ 18.707004] Freed by task 231: [ 18.707036] kasan_save_stack+0x3c/0x68 [ 18.707357] kasan_save_track+0x20/0x40 [ 18.707437] kasan_save_free_info+0x4c/0x78 [ 18.707520] __kasan_mempool_poison_object+0xc0/0x150 [ 18.707566] mempool_free+0x28c/0x328 [ 18.707907] mempool_uaf_helper+0x104/0x340 [ 18.707962] mempool_slab_uaf+0xc0/0x118 [ 18.708000] kunit_try_run_case+0x170/0x3f0 [ 18.708038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.708082] kthread+0x328/0x630 [ 18.708115] ret_from_fork+0x10/0x20 [ 18.708156] [ 18.708177] The buggy address belongs to the object at fff00000c7a5b240 [ 18.708177] which belongs to the cache test_cache of size 123 [ 18.708240] The buggy address is located 0 bytes inside of [ 18.708240] freed 123-byte region [fff00000c7a5b240, fff00000c7a5b2bb) [ 18.708308] [ 18.708338] The buggy address belongs to the physical page: [ 18.708372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5b [ 18.708424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.708474] page_type: f5(slab) [ 18.708519] raw: 0bfffe0000000000 fff00000c598d8c0 dead000000000122 0000000000000000 [ 18.708569] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.708607] page dumped because: kasan: bad access detected [ 18.708645] [ 18.708662] Memory state around the buggy address: [ 18.708697] fff00000c7a5b100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.708737] fff00000c7a5b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.708872] >fff00000c7a5b200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 18.708947] ^ [ 18.708985] fff00000c7a5b280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.709428] fff00000c7a5b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.709494] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 18.619380] ================================================================== [ 18.619488] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.619564] Read of size 1 at addr fff00000c7a4e2bb by task kunit_try_catch/225 [ 18.619615] [ 18.619662] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.619754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.619782] Hardware name: linux,dummy-virt (DT) [ 18.619817] Call trace: [ 18.619845] show_stack+0x20/0x38 (C) [ 18.619898] dump_stack_lvl+0x8c/0xd0 [ 18.619958] print_report+0x118/0x5d0 [ 18.620009] kasan_report+0xdc/0x128 [ 18.620055] __asan_report_load1_noabort+0x20/0x30 [ 18.620108] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.620162] mempool_slab_oob_right+0xc0/0x118 [ 18.620211] kunit_try_run_case+0x170/0x3f0 [ 18.620261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.620315] kthread+0x328/0x630 [ 18.620371] ret_from_fork+0x10/0x20 [ 18.620422] [ 18.620440] Allocated by task 225: [ 18.620472] kasan_save_stack+0x3c/0x68 [ 18.620882] kasan_save_track+0x20/0x40 [ 18.620930] kasan_save_alloc_info+0x40/0x58 [ 18.620971] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.621014] remove_element+0x16c/0x1f8 [ 18.621053] mempool_alloc_preallocated+0x58/0xc0 [ 18.621094] mempool_oob_right_helper+0x98/0x2f0 [ 18.621132] mempool_slab_oob_right+0xc0/0x118 [ 18.621169] kunit_try_run_case+0x170/0x3f0 [ 18.621208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.621250] kthread+0x328/0x630 [ 18.621282] ret_from_fork+0x10/0x20 [ 18.621335] [ 18.621356] The buggy address belongs to the object at fff00000c7a4e240 [ 18.621356] which belongs to the cache test_cache of size 123 [ 18.621415] The buggy address is located 0 bytes to the right of [ 18.621415] allocated 123-byte region [fff00000c7a4e240, fff00000c7a4e2bb) [ 18.621478] [ 18.621499] The buggy address belongs to the physical page: [ 18.621533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 18.621588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.621637] page_type: f5(slab) [ 18.621682] raw: 0bfffe0000000000 fff00000ffe8ef00 dead000000000122 0000000000000000 [ 18.621731] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.621772] page dumped because: kasan: bad access detected [ 18.621804] [ 18.621822] Memory state around the buggy address: [ 18.621854] fff00000c7a4e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.621898] fff00000c7a4e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 18.621941] >fff00000c7a4e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 18.621978] ^ [ 18.622010] fff00000c7a4e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.622051] fff00000c7a4e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.622090] ================================================================== [ 18.571979] ================================================================== [ 18.572059] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.572126] Read of size 1 at addr fff00000c65ce001 by task kunit_try_catch/223 [ 18.572183] [ 18.572223] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.572316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.572436] Hardware name: linux,dummy-virt (DT) [ 18.572605] Call trace: [ 18.572749] show_stack+0x20/0x38 (C) [ 18.572812] dump_stack_lvl+0x8c/0xd0 [ 18.572866] print_report+0x118/0x5d0 [ 18.572913] kasan_report+0xdc/0x128 [ 18.572957] __asan_report_load1_noabort+0x20/0x30 [ 18.575195] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.575284] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 18.575530] kunit_try_run_case+0x170/0x3f0 [ 18.576182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.576546] kthread+0x328/0x630 [ 18.577273] ret_from_fork+0x10/0x20 [ 18.577538] [ 18.577755] The buggy address belongs to the physical page: [ 18.578402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cc [ 18.578481] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.578531] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.578588] page_type: f8(unknown) [ 18.578632] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.578682] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.578732] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.578780] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.578829] head: 0bfffe0000000002 ffffc1ffc3197301 00000000ffffffff 00000000ffffffff [ 18.578878] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.578921] page dumped because: kasan: bad access detected [ 18.578954] [ 18.578973] Memory state around the buggy address: [ 18.579008] fff00000c65cdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.579050] fff00000c65cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.579093] >fff00000c65ce000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.579129] ^ [ 18.581811] fff00000c65ce080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.581925] fff00000c65ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.582493] ================================================================== [ 18.555840] ================================================================== [ 18.555940] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.556022] Read of size 1 at addr fff00000c790a273 by task kunit_try_catch/221 [ 18.556074] [ 18.556125] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.556220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.556246] Hardware name: linux,dummy-virt (DT) [ 18.556281] Call trace: [ 18.556307] show_stack+0x20/0x38 (C) [ 18.556372] dump_stack_lvl+0x8c/0xd0 [ 18.556424] print_report+0x118/0x5d0 [ 18.556470] kasan_report+0xdc/0x128 [ 18.556630] __asan_report_load1_noabort+0x20/0x30 [ 18.556686] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.556735] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.556783] kunit_try_run_case+0x170/0x3f0 [ 18.556843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.556897] kthread+0x328/0x630 [ 18.556940] ret_from_fork+0x10/0x20 [ 18.556989] [ 18.557010] Allocated by task 221: [ 18.557039] kasan_save_stack+0x3c/0x68 [ 18.557083] kasan_save_track+0x20/0x40 [ 18.557120] kasan_save_alloc_info+0x40/0x58 [ 18.557160] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.557202] remove_element+0x130/0x1f8 [ 18.557247] mempool_alloc_preallocated+0x58/0xc0 [ 18.557285] mempool_oob_right_helper+0x98/0x2f0 [ 18.557336] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.557376] kunit_try_run_case+0x170/0x3f0 [ 18.557415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.557459] kthread+0x328/0x630 [ 18.557491] ret_from_fork+0x10/0x20 [ 18.557528] [ 18.557548] The buggy address belongs to the object at fff00000c790a200 [ 18.557548] which belongs to the cache kmalloc-128 of size 128 [ 18.557614] The buggy address is located 0 bytes to the right of [ 18.557614] allocated 115-byte region [fff00000c790a200, fff00000c790a273) [ 18.557678] [ 18.557700] The buggy address belongs to the physical page: [ 18.557733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790a [ 18.557788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.557842] page_type: f5(slab) [ 18.557886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.557935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.557975] page dumped because: kasan: bad access detected [ 18.558009] [ 18.558027] Memory state around the buggy address: [ 18.558060] fff00000c790a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.558103] fff00000c790a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.558146] >fff00000c790a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.558185] ^ [ 18.558225] fff00000c790a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.558266] fff00000c790a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.558305] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 17.995434] ================================================================== [ 17.995516] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 17.995588] Read of size 1 at addr fff00000c598d640 by task kunit_try_catch/215 [ 17.995640] [ 17.995683] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.995769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.995797] Hardware name: linux,dummy-virt (DT) [ 17.995830] Call trace: [ 17.995854] show_stack+0x20/0x38 (C) [ 17.995910] dump_stack_lvl+0x8c/0xd0 [ 17.995962] print_report+0x118/0x5d0 [ 17.996009] kasan_report+0xdc/0x128 [ 17.996053] __kasan_check_byte+0x54/0x70 [ 17.996099] kmem_cache_destroy+0x34/0x218 [ 17.996147] kmem_cache_double_destroy+0x174/0x300 [ 17.996202] kunit_try_run_case+0x170/0x3f0 [ 17.996252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.996304] kthread+0x328/0x630 [ 17.996360] ret_from_fork+0x10/0x20 [ 17.996408] [ 17.996426] Allocated by task 215: [ 17.996457] kasan_save_stack+0x3c/0x68 [ 17.996526] kasan_save_track+0x20/0x40 [ 17.996565] kasan_save_alloc_info+0x40/0x58 [ 17.996604] __kasan_slab_alloc+0xa8/0xb0 [ 17.996643] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.996683] __kmem_cache_create_args+0x178/0x280 [ 17.996723] kmem_cache_double_destroy+0xc0/0x300 [ 17.996761] kunit_try_run_case+0x170/0x3f0 [ 17.996799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.996840] kthread+0x328/0x630 [ 17.996873] ret_from_fork+0x10/0x20 [ 17.996908] [ 17.996927] Freed by task 215: [ 17.996954] kasan_save_stack+0x3c/0x68 [ 17.996990] kasan_save_track+0x20/0x40 [ 17.997027] kasan_save_free_info+0x4c/0x78 [ 17.997065] __kasan_slab_free+0x6c/0x98 [ 17.997103] kmem_cache_free+0x260/0x468 [ 17.997138] slab_kmem_cache_release+0x38/0x50 [ 17.997178] kmem_cache_release+0x1c/0x30 [ 17.997215] kobject_put+0x17c/0x420 [ 17.997249] sysfs_slab_release+0x1c/0x30 [ 17.997287] kmem_cache_destroy+0x118/0x218 [ 17.997333] kmem_cache_double_destroy+0x128/0x300 [ 17.997373] kunit_try_run_case+0x170/0x3f0 [ 17.997409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.997452] kthread+0x328/0x630 [ 17.997485] ret_from_fork+0x10/0x20 [ 17.997520] [ 17.997539] The buggy address belongs to the object at fff00000c598d640 [ 17.997539] which belongs to the cache kmem_cache of size 208 [ 17.997595] The buggy address is located 0 bytes inside of [ 17.997595] freed 208-byte region [fff00000c598d640, fff00000c598d710) [ 17.997654] [ 17.997677] The buggy address belongs to the physical page: [ 17.997709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598d [ 17.997763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.997815] page_type: f5(slab) [ 17.997857] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 17.997909] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 17.997950] page dumped because: kasan: bad access detected [ 17.997983] [ 17.998000] Memory state around the buggy address: [ 17.998035] fff00000c598d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.998078] fff00000c598d580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 17.998121] >fff00000c598d600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 17.998159] ^ [ 17.998193] fff00000c598d680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.998236] fff00000c598d700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.998275] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 17.924989] ================================================================== [ 17.925118] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 17.925201] Read of size 1 at addr fff00000c7997000 by task kunit_try_catch/213 [ 17.925253] [ 17.925300] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.925408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.925434] Hardware name: linux,dummy-virt (DT) [ 17.925472] Call trace: [ 17.925496] show_stack+0x20/0x38 (C) [ 17.925552] dump_stack_lvl+0x8c/0xd0 [ 17.925603] print_report+0x118/0x5d0 [ 17.925651] kasan_report+0xdc/0x128 [ 17.925696] __asan_report_load1_noabort+0x20/0x30 [ 17.925748] kmem_cache_rcu_uaf+0x388/0x468 [ 17.925797] kunit_try_run_case+0x170/0x3f0 [ 17.925846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.925899] kthread+0x328/0x630 [ 17.925944] ret_from_fork+0x10/0x20 [ 17.925995] [ 17.926013] Allocated by task 213: [ 17.926044] kasan_save_stack+0x3c/0x68 [ 17.926086] kasan_save_track+0x20/0x40 [ 17.926124] kasan_save_alloc_info+0x40/0x58 [ 17.926164] __kasan_slab_alloc+0xa8/0xb0 [ 17.926202] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.926244] kmem_cache_rcu_uaf+0x12c/0x468 [ 17.926281] kunit_try_run_case+0x170/0x3f0 [ 17.926332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.926375] kthread+0x328/0x630 [ 17.926407] ret_from_fork+0x10/0x20 [ 17.926443] [ 17.926462] Freed by task 0: [ 17.926489] kasan_save_stack+0x3c/0x68 [ 17.926526] kasan_save_track+0x20/0x40 [ 17.926564] kasan_save_free_info+0x4c/0x78 [ 17.926605] __kasan_slab_free+0x6c/0x98 [ 17.926642] slab_free_after_rcu_debug+0xd4/0x2f8 [ 17.926683] rcu_core+0x9f4/0x1e20 [ 17.926719] rcu_core_si+0x18/0x30 [ 17.926754] handle_softirqs+0x374/0xb28 [ 17.926791] __do_softirq+0x1c/0x28 [ 17.926826] [ 17.926845] Last potentially related work creation: [ 17.926871] kasan_save_stack+0x3c/0x68 [ 17.926910] kasan_record_aux_stack+0xb4/0xc8 [ 17.926948] kmem_cache_free+0x120/0x468 [ 17.926986] kmem_cache_rcu_uaf+0x16c/0x468 [ 17.927021] kunit_try_run_case+0x170/0x3f0 [ 17.927060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.927102] kthread+0x328/0x630 [ 17.927133] ret_from_fork+0x10/0x20 [ 17.927169] [ 17.927187] The buggy address belongs to the object at fff00000c7997000 [ 17.927187] which belongs to the cache test_cache of size 200 [ 17.927246] The buggy address is located 0 bytes inside of [ 17.927246] freed 200-byte region [fff00000c7997000, fff00000c79970c8) [ 17.927306] [ 17.927337] The buggy address belongs to the physical page: [ 17.927371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107997 [ 17.927427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.927480] page_type: f5(slab) [ 17.927524] raw: 0bfffe0000000000 fff00000c598d500 dead000000000122 0000000000000000 [ 17.927575] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.927615] page dumped because: kasan: bad access detected [ 17.927647] [ 17.927665] Memory state around the buggy address: [ 17.927700] fff00000c7996f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927745] fff00000c7996f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927788] >fff00000c7997000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.927828] ^ [ 17.927855] fff00000c7997080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 17.927897] fff00000c7997100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927936] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 17.361716] ================================================================== [ 17.362107] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 17.362263] Free of addr fff00000c7994001 by task kunit_try_catch/211 [ 17.362386] [ 17.362431] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.362549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.362603] Hardware name: linux,dummy-virt (DT) [ 17.362639] Call trace: [ 17.362662] show_stack+0x20/0x38 (C) [ 17.362747] dump_stack_lvl+0x8c/0xd0 [ 17.363045] print_report+0x118/0x5d0 [ 17.363112] kasan_report_invalid_free+0xc0/0xe8 [ 17.363164] check_slab_allocation+0xfc/0x108 [ 17.363213] __kasan_slab_pre_free+0x2c/0x48 [ 17.363372] kmem_cache_free+0xf0/0x468 [ 17.363460] kmem_cache_invalid_free+0x184/0x3c8 [ 17.363646] kunit_try_run_case+0x170/0x3f0 [ 17.363759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.363823] kthread+0x328/0x630 [ 17.363869] ret_from_fork+0x10/0x20 [ 17.364148] [ 17.364187] Allocated by task 211: [ 17.364219] kasan_save_stack+0x3c/0x68 [ 17.364481] kasan_save_track+0x20/0x40 [ 17.364744] kasan_save_alloc_info+0x40/0x58 [ 17.364898] __kasan_slab_alloc+0xa8/0xb0 [ 17.364973] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.365075] kmem_cache_invalid_free+0x12c/0x3c8 [ 17.365165] kunit_try_run_case+0x170/0x3f0 [ 17.365250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.365398] kthread+0x328/0x630 [ 17.365816] ret_from_fork+0x10/0x20 [ 17.365946] [ 17.366015] The buggy address belongs to the object at fff00000c7994000 [ 17.366015] which belongs to the cache test_cache of size 200 [ 17.366163] The buggy address is located 1 bytes inside of [ 17.366163] 200-byte region [fff00000c7994000, fff00000c79940c8) [ 17.366231] [ 17.366253] The buggy address belongs to the physical page: [ 17.366286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107994 [ 17.366379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.366433] page_type: f5(slab) [ 17.366475] raw: 0bfffe0000000000 fff00000c598d3c0 dead000000000122 0000000000000000 [ 17.366526] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.366857] page dumped because: kasan: bad access detected [ 17.366944] [ 17.367079] Memory state around the buggy address: [ 17.367132] fff00000c7993f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.367208] fff00000c7993f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.367355] >fff00000c7994000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.367664] ^ [ 17.367839] fff00000c7994080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.367929] fff00000c7994100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.368007] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 17.311521] ================================================================== [ 17.311607] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 17.311680] Free of addr fff00000c7992000 by task kunit_try_catch/209 [ 17.311726] [ 17.311768] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.311854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.311881] Hardware name: linux,dummy-virt (DT) [ 17.311915] Call trace: [ 17.311939] show_stack+0x20/0x38 (C) [ 17.311993] dump_stack_lvl+0x8c/0xd0 [ 17.312044] print_report+0x118/0x5d0 [ 17.312093] kasan_report_invalid_free+0xc0/0xe8 [ 17.312144] check_slab_allocation+0xd4/0x108 [ 17.312200] __kasan_slab_pre_free+0x2c/0x48 [ 17.312248] kmem_cache_free+0xf0/0x468 [ 17.312295] kmem_cache_double_free+0x190/0x3c8 [ 17.312354] kunit_try_run_case+0x170/0x3f0 [ 17.312403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.312456] kthread+0x328/0x630 [ 17.312729] ret_from_fork+0x10/0x20 [ 17.313598] [ 17.313739] Allocated by task 209: [ 17.313799] kasan_save_stack+0x3c/0x68 [ 17.314443] kasan_save_track+0x20/0x40 [ 17.314697] kasan_save_alloc_info+0x40/0x58 [ 17.314840] __kasan_slab_alloc+0xa8/0xb0 [ 17.314938] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.315073] kmem_cache_double_free+0x12c/0x3c8 [ 17.315197] kunit_try_run_case+0x170/0x3f0 [ 17.315262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.315640] kthread+0x328/0x630 [ 17.315772] ret_from_fork+0x10/0x20 [ 17.315840] [ 17.315860] Freed by task 209: [ 17.316238] kasan_save_stack+0x3c/0x68 [ 17.316375] kasan_save_track+0x20/0x40 [ 17.316454] kasan_save_free_info+0x4c/0x78 [ 17.316774] __kasan_slab_free+0x6c/0x98 [ 17.316818] kmem_cache_free+0x260/0x468 [ 17.316856] kmem_cache_double_free+0x140/0x3c8 [ 17.316893] kunit_try_run_case+0x170/0x3f0 [ 17.317366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.318257] kthread+0x328/0x630 [ 17.318769] ret_from_fork+0x10/0x20 [ 17.318855] [ 17.318875] The buggy address belongs to the object at fff00000c7992000 [ 17.318875] which belongs to the cache test_cache of size 200 [ 17.319262] The buggy address is located 0 bytes inside of [ 17.319262] 200-byte region [fff00000c7992000, fff00000c79920c8) [ 17.319386] [ 17.319457] The buggy address belongs to the physical page: [ 17.319842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107992 [ 17.320306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.320435] page_type: f5(slab) [ 17.320798] raw: 0bfffe0000000000 fff00000c598d280 dead000000000122 0000000000000000 [ 17.320943] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.320989] page dumped because: kasan: bad access detected [ 17.321200] [ 17.321307] Memory state around the buggy address: [ 17.321571] fff00000c7991f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.321666] fff00000c7991f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.321711] >fff00000c7992000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.321802] ^ [ 17.321845] fff00000c7992080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 17.321897] fff00000c7992100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.321936] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 17.015542] ================================================================== [ 17.015600] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 17.015681] Read of size 1 at addr fff00000c79900c8 by task kunit_try_catch/207 [ 17.015741] [ 17.015776] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.015877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.015920] Hardware name: linux,dummy-virt (DT) [ 17.015969] Call trace: [ 17.016027] show_stack+0x20/0x38 (C) [ 17.016080] dump_stack_lvl+0x8c/0xd0 [ 17.016181] print_report+0x118/0x5d0 [ 17.016236] kasan_report+0xdc/0x128 [ 17.016283] __asan_report_load1_noabort+0x20/0x30 [ 17.016348] kmem_cache_oob+0x344/0x430 [ 17.016393] kunit_try_run_case+0x170/0x3f0 [ 17.016439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.016492] kthread+0x328/0x630 [ 17.016533] ret_from_fork+0x10/0x20 [ 17.016609] [ 17.016627] Allocated by task 207: [ 17.016813] kasan_save_stack+0x3c/0x68 [ 17.016945] kasan_save_track+0x20/0x40 [ 17.017044] kasan_save_alloc_info+0x40/0x58 [ 17.017098] __kasan_slab_alloc+0xa8/0xb0 [ 17.017204] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.017265] kmem_cache_oob+0x12c/0x430 [ 17.017391] kunit_try_run_case+0x170/0x3f0 [ 17.017455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.017552] kthread+0x328/0x630 [ 17.017675] ret_from_fork+0x10/0x20 [ 17.017761] [ 17.017781] The buggy address belongs to the object at fff00000c7990000 [ 17.017781] which belongs to the cache test_cache of size 200 [ 17.017890] The buggy address is located 0 bytes to the right of [ 17.017890] allocated 200-byte region [fff00000c7990000, fff00000c79900c8) [ 17.017966] [ 17.017986] The buggy address belongs to the physical page: [ 17.018016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107990 [ 17.018094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.018143] page_type: f5(slab) [ 17.018183] raw: 0bfffe0000000000 fff00000c598d140 dead000000000122 0000000000000000 [ 17.018233] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.018273] page dumped because: kasan: bad access detected [ 17.018304] [ 17.018357] Memory state around the buggy address: [ 17.018391] fff00000c798ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.018436] fff00000c7990000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.018479] >fff00000c7990080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.018562] ^ [ 17.018676] fff00000c7990100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.018718] fff00000c7990180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.018780] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 16.996297] ================================================================== [ 16.996420] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 16.996475] Read of size 8 at addr fff00000c794c800 by task kunit_try_catch/200 [ 16.996595] [ 16.996737] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.996871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.996912] Hardware name: linux,dummy-virt (DT) [ 16.996945] Call trace: [ 16.996990] show_stack+0x20/0x38 (C) [ 16.997041] dump_stack_lvl+0x8c/0xd0 [ 16.997230] print_report+0x118/0x5d0 [ 16.997279] kasan_report+0xdc/0x128 [ 16.997336] __asan_report_load8_noabort+0x20/0x30 [ 16.997388] workqueue_uaf+0x480/0x4a8 [ 16.997433] kunit_try_run_case+0x170/0x3f0 [ 16.997479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.997532] kthread+0x328/0x630 [ 16.997573] ret_from_fork+0x10/0x20 [ 16.997796] [ 16.997815] Allocated by task 200: [ 16.997890] kasan_save_stack+0x3c/0x68 [ 16.997971] kasan_save_track+0x20/0x40 [ 16.998061] kasan_save_alloc_info+0x40/0x58 [ 16.998214] __kasan_kmalloc+0xd4/0xd8 [ 16.998353] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.998398] workqueue_uaf+0x13c/0x4a8 [ 16.998489] kunit_try_run_case+0x170/0x3f0 [ 16.998530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.998575] kthread+0x328/0x630 [ 16.998607] ret_from_fork+0x10/0x20 [ 16.998836] [ 16.998906] Freed by task 48: [ 16.999017] kasan_save_stack+0x3c/0x68 [ 16.999184] kasan_save_track+0x20/0x40 [ 16.999232] kasan_save_free_info+0x4c/0x78 [ 16.999274] __kasan_slab_free+0x6c/0x98 [ 16.999310] kfree+0x214/0x3c8 [ 16.999351] workqueue_uaf_work+0x18/0x30 [ 16.999387] process_one_work+0x530/0xf98 [ 16.999447] worker_thread+0x618/0xf38 [ 16.999481] kthread+0x328/0x630 [ 16.999513] ret_from_fork+0x10/0x20 [ 16.999550] [ 16.999568] Last potentially related work creation: [ 16.999596] kasan_save_stack+0x3c/0x68 [ 16.999683] kasan_record_aux_stack+0xb4/0xc8 [ 16.999790] __queue_work+0x65c/0x1008 [ 16.999862] queue_work_on+0xbc/0xf8 [ 16.999951] workqueue_uaf+0x210/0x4a8 [ 17.000017] kunit_try_run_case+0x170/0x3f0 [ 17.000053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.000131] kthread+0x328/0x630 [ 17.000183] ret_from_fork+0x10/0x20 [ 17.000226] [ 17.000247] The buggy address belongs to the object at fff00000c794c800 [ 17.000247] which belongs to the cache kmalloc-32 of size 32 [ 17.000308] The buggy address is located 0 bytes inside of [ 17.000308] freed 32-byte region [fff00000c794c800, fff00000c794c820) [ 17.000400] [ 17.000422] The buggy address belongs to the physical page: [ 17.000453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794c [ 17.000505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.000554] page_type: f5(slab) [ 17.000638] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 17.000727] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 17.000778] page dumped because: kasan: bad access detected [ 17.000809] [ 17.000827] Memory state around the buggy address: [ 17.000877] fff00000c794c700: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 17.000920] fff00000c794c780: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 17.000963] >fff00000c794c800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 17.001054] ^ [ 17.001081] fff00000c794c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.001123] fff00000c794c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.001161] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 16.973969] ================================================================== [ 16.974095] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 16.974166] Read of size 4 at addr fff00000c794c600 by task swapper/1/0 [ 16.974213] [ 16.974255] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.974353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.974380] Hardware name: linux,dummy-virt (DT) [ 16.974412] Call trace: [ 16.974436] show_stack+0x20/0x38 (C) [ 16.974486] dump_stack_lvl+0x8c/0xd0 [ 16.974535] print_report+0x118/0x5d0 [ 16.974580] kasan_report+0xdc/0x128 [ 16.974625] __asan_report_load4_noabort+0x20/0x30 [ 16.974673] rcu_uaf_reclaim+0x64/0x70 [ 16.980249] rcu_core+0x9f4/0x1e20 [ 16.980663] rcu_core_si+0x18/0x30 [ 16.980714] handle_softirqs+0x374/0xb28 [ 16.980766] __do_softirq+0x1c/0x28 [ 16.981263] ____do_softirq+0x18/0x30 [ 16.982351] call_on_irq_stack+0x24/0x30 [ 16.982411] do_softirq_own_stack+0x24/0x38 [ 16.982460] __irq_exit_rcu+0x1fc/0x318 [ 16.982529] irq_exit_rcu+0x1c/0x80 [ 16.982574] el1_interrupt+0x38/0x58 [ 16.982625] el1h_64_irq_handler+0x18/0x28 [ 16.982673] el1h_64_irq+0x6c/0x70 [ 16.982775] arch_local_irq_enable+0x4/0x8 (P) [ 16.982827] do_idle+0x384/0x4e8 [ 16.982870] cpu_startup_entry+0x64/0x80 [ 16.982916] secondary_start_kernel+0x288/0x340 [ 16.982963] __secondary_switched+0xc0/0xc8 [ 16.983017] [ 16.983035] Allocated by task 198: [ 16.983065] kasan_save_stack+0x3c/0x68 [ 16.983107] kasan_save_track+0x20/0x40 [ 16.983146] kasan_save_alloc_info+0x40/0x58 [ 16.983185] __kasan_kmalloc+0xd4/0xd8 [ 16.983223] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.983261] rcu_uaf+0xb0/0x2d8 [ 16.983294] kunit_try_run_case+0x170/0x3f0 [ 16.983345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.983456] kthread+0x328/0x630 [ 16.983526] ret_from_fork+0x10/0x20 [ 16.983563] [ 16.983620] Freed by task 0: [ 16.983707] kasan_save_stack+0x3c/0x68 [ 16.983756] kasan_save_track+0x20/0x40 [ 16.983832] kasan_save_free_info+0x4c/0x78 [ 16.983873] __kasan_slab_free+0x6c/0x98 [ 16.984243] kfree+0x214/0x3c8 [ 16.984423] rcu_uaf_reclaim+0x28/0x70 [ 16.984491] rcu_core+0x9f4/0x1e20 [ 16.984525] rcu_core_si+0x18/0x30 [ 16.984611] handle_softirqs+0x374/0xb28 [ 16.984688] __do_softirq+0x1c/0x28 [ 16.984803] [ 16.984864] Last potentially related work creation: [ 16.984899] kasan_save_stack+0x3c/0x68 [ 16.985058] kasan_record_aux_stack+0xb4/0xc8 [ 16.985187] __call_rcu_common.constprop.0+0x74/0x8c8 [ 16.985253] call_rcu+0x18/0x30 [ 16.985285] rcu_uaf+0x14c/0x2d8 [ 16.985330] kunit_try_run_case+0x170/0x3f0 [ 16.985368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.985412] kthread+0x328/0x630 [ 16.985444] ret_from_fork+0x10/0x20 [ 16.985523] [ 16.985552] The buggy address belongs to the object at fff00000c794c600 [ 16.985552] which belongs to the cache kmalloc-32 of size 32 [ 16.985612] The buggy address is located 0 bytes inside of [ 16.985612] freed 32-byte region [fff00000c794c600, fff00000c794c620) [ 16.985671] [ 16.985691] The buggy address belongs to the physical page: [ 16.985724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794c [ 16.985801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.985853] page_type: f5(slab) [ 16.985907] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 16.985957] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 16.986050] page dumped because: kasan: bad access detected [ 16.986120] [ 16.986138] Memory state around the buggy address: [ 16.986200] fff00000c794c500: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 16.986308] fff00000c794c580: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 16.986363] >fff00000c794c600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 16.986433] ^ [ 16.986491] fff00000c794c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.986533] fff00000c794c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.986571] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 16.883190] ================================================================== [ 16.883595] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 16.883675] Read of size 1 at addr fff00000c5b7de00 by task kunit_try_catch/196 [ 16.883727] [ 16.883769] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.884113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.884171] Hardware name: linux,dummy-virt (DT) [ 16.884204] Call trace: [ 16.884232] show_stack+0x20/0x38 (C) [ 16.884569] dump_stack_lvl+0x8c/0xd0 [ 16.884779] print_report+0x118/0x5d0 [ 16.884993] kasan_report+0xdc/0x128 [ 16.885535] __kasan_check_byte+0x54/0x70 [ 16.885617] ksize+0x30/0x88 [ 16.885764] ksize_uaf+0x168/0x5f8 [ 16.885834] kunit_try_run_case+0x170/0x3f0 [ 16.886155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.886256] kthread+0x328/0x630 [ 16.886647] ret_from_fork+0x10/0x20 [ 16.886885] [ 16.886953] Allocated by task 196: [ 16.887040] kasan_save_stack+0x3c/0x68 [ 16.887143] kasan_save_track+0x20/0x40 [ 16.887211] kasan_save_alloc_info+0x40/0x58 [ 16.887664] __kasan_kmalloc+0xd4/0xd8 [ 16.887741] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.887807] ksize_uaf+0xb8/0x5f8 [ 16.887843] kunit_try_run_case+0x170/0x3f0 [ 16.887880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.887925] kthread+0x328/0x630 [ 16.887957] ret_from_fork+0x10/0x20 [ 16.887996] [ 16.888025] Freed by task 196: [ 16.888053] kasan_save_stack+0x3c/0x68 [ 16.888105] kasan_save_track+0x20/0x40 [ 16.888160] kasan_save_free_info+0x4c/0x78 [ 16.888199] __kasan_slab_free+0x6c/0x98 [ 16.888237] kfree+0x214/0x3c8 [ 16.888268] ksize_uaf+0x11c/0x5f8 [ 16.888309] kunit_try_run_case+0x170/0x3f0 [ 16.888368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.888423] kthread+0x328/0x630 [ 16.888456] ret_from_fork+0x10/0x20 [ 16.888765] [ 16.888790] The buggy address belongs to the object at fff00000c5b7de00 [ 16.888790] which belongs to the cache kmalloc-128 of size 128 [ 16.889367] The buggy address is located 0 bytes inside of [ 16.889367] freed 128-byte region [fff00000c5b7de00, fff00000c5b7de80) [ 16.889449] [ 16.889818] The buggy address belongs to the physical page: [ 16.889882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.889969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.890178] page_type: f5(slab) [ 16.890429] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.890493] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.890535] page dumped because: kasan: bad access detected [ 16.890838] [ 16.890917] Memory state around the buggy address: [ 16.891056] fff00000c5b7dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.891179] fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.891262] >fff00000c5b7de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.891580] ^ [ 16.891642] fff00000c5b7de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.891728] fff00000c5b7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.891797] ================================================================== [ 16.895670] ================================================================== [ 16.895724] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 16.895772] Read of size 1 at addr fff00000c5b7de00 by task kunit_try_catch/196 [ 16.896202] [ 16.896341] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.896467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.896638] Hardware name: linux,dummy-virt (DT) [ 16.896673] Call trace: [ 16.896822] show_stack+0x20/0x38 (C) [ 16.897035] dump_stack_lvl+0x8c/0xd0 [ 16.897147] print_report+0x118/0x5d0 [ 16.897197] kasan_report+0xdc/0x128 [ 16.897260] __asan_report_load1_noabort+0x20/0x30 [ 16.897328] ksize_uaf+0x598/0x5f8 [ 16.897372] kunit_try_run_case+0x170/0x3f0 [ 16.897419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.897471] kthread+0x328/0x630 [ 16.897511] ret_from_fork+0x10/0x20 [ 16.897568] [ 16.897594] Allocated by task 196: [ 16.897642] kasan_save_stack+0x3c/0x68 [ 16.897700] kasan_save_track+0x20/0x40 [ 16.897737] kasan_save_alloc_info+0x40/0x58 [ 16.897785] __kasan_kmalloc+0xd4/0xd8 [ 16.897820] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.897859] ksize_uaf+0xb8/0x5f8 [ 16.897896] kunit_try_run_case+0x170/0x3f0 [ 16.897947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.897992] kthread+0x328/0x630 [ 16.898025] ret_from_fork+0x10/0x20 [ 16.898060] [ 16.898079] Freed by task 196: [ 16.898115] kasan_save_stack+0x3c/0x68 [ 16.898152] kasan_save_track+0x20/0x40 [ 16.898189] kasan_save_free_info+0x4c/0x78 [ 16.898226] __kasan_slab_free+0x6c/0x98 [ 16.898264] kfree+0x214/0x3c8 [ 16.898306] ksize_uaf+0x11c/0x5f8 [ 16.898813] kunit_try_run_case+0x170/0x3f0 [ 16.898897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.899097] kthread+0x328/0x630 [ 16.899313] ret_from_fork+0x10/0x20 [ 16.899379] [ 16.899429] The buggy address belongs to the object at fff00000c5b7de00 [ 16.899429] which belongs to the cache kmalloc-128 of size 128 [ 16.899635] The buggy address is located 0 bytes inside of [ 16.899635] freed 128-byte region [fff00000c5b7de00, fff00000c5b7de80) [ 16.899795] [ 16.899845] The buggy address belongs to the physical page: [ 16.900125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.900224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.900403] page_type: f5(slab) [ 16.900451] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.900629] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.900694] page dumped because: kasan: bad access detected [ 16.900827] [ 16.900970] Memory state around the buggy address: [ 16.901172] fff00000c5b7dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.901378] fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.901519] >fff00000c5b7de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.901658] ^ [ 16.901719] fff00000c5b7de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.901793] fff00000c5b7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.901901] ================================================================== [ 16.902972] ================================================================== [ 16.903312] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 16.903477] Read of size 1 at addr fff00000c5b7de78 by task kunit_try_catch/196 [ 16.903561] [ 16.903595] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.903744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.903772] Hardware name: linux,dummy-virt (DT) [ 16.903828] Call trace: [ 16.903860] show_stack+0x20/0x38 (C) [ 16.904147] dump_stack_lvl+0x8c/0xd0 [ 16.904305] print_report+0x118/0x5d0 [ 16.904479] kasan_report+0xdc/0x128 [ 16.904566] __asan_report_load1_noabort+0x20/0x30 [ 16.904677] ksize_uaf+0x544/0x5f8 [ 16.904723] kunit_try_run_case+0x170/0x3f0 [ 16.904769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.904821] kthread+0x328/0x630 [ 16.905159] ret_from_fork+0x10/0x20 [ 16.905253] [ 16.905301] Allocated by task 196: [ 16.905490] kasan_save_stack+0x3c/0x68 [ 16.905643] kasan_save_track+0x20/0x40 [ 16.906048] kasan_save_alloc_info+0x40/0x58 [ 16.906138] __kasan_kmalloc+0xd4/0xd8 [ 16.906225] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.906442] ksize_uaf+0xb8/0x5f8 [ 16.906529] kunit_try_run_case+0x170/0x3f0 [ 16.906685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.906732] kthread+0x328/0x630 [ 16.906797] ret_from_fork+0x10/0x20 [ 16.907112] [ 16.907150] Freed by task 196: [ 16.907207] kasan_save_stack+0x3c/0x68 [ 16.907346] kasan_save_track+0x20/0x40 [ 16.907444] kasan_save_free_info+0x4c/0x78 [ 16.907595] __kasan_slab_free+0x6c/0x98 [ 16.907647] kfree+0x214/0x3c8 [ 16.907708] ksize_uaf+0x11c/0x5f8 [ 16.908060] kunit_try_run_case+0x170/0x3f0 [ 16.908126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.908272] kthread+0x328/0x630 [ 16.908377] ret_from_fork+0x10/0x20 [ 16.908581] [ 16.908613] The buggy address belongs to the object at fff00000c5b7de00 [ 16.908613] which belongs to the cache kmalloc-128 of size 128 [ 16.908687] The buggy address is located 120 bytes inside of [ 16.908687] freed 128-byte region [fff00000c5b7de00, fff00000c5b7de80) [ 16.909070] [ 16.909114] The buggy address belongs to the physical page: [ 16.909243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.909342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.909475] page_type: f5(slab) [ 16.909580] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.910033] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.910197] page dumped because: kasan: bad access detected [ 16.910255] [ 16.910404] Memory state around the buggy address: [ 16.910492] fff00000c5b7dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.910565] fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.910885] >fff00000c5b7de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.910989] ^ [ 16.911066] fff00000c5b7de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.911154] fff00000c5b7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.911295] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 16.848351] ================================================================== [ 16.848550] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 16.848611] Read of size 1 at addr fff00000c5b7dd73 by task kunit_try_catch/194 [ 16.848663] [ 16.848706] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.849027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.849249] Hardware name: linux,dummy-virt (DT) [ 16.849286] Call trace: [ 16.849509] show_stack+0x20/0x38 (C) [ 16.849671] dump_stack_lvl+0x8c/0xd0 [ 16.849808] print_report+0x118/0x5d0 [ 16.850066] kasan_report+0xdc/0x128 [ 16.850277] __asan_report_load1_noabort+0x20/0x30 [ 16.850343] ksize_unpoisons_memory+0x628/0x740 [ 16.850638] kunit_try_run_case+0x170/0x3f0 [ 16.850847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.850995] kthread+0x328/0x630 [ 16.851041] ret_from_fork+0x10/0x20 [ 16.851416] [ 16.851459] Allocated by task 194: [ 16.851559] kasan_save_stack+0x3c/0x68 [ 16.851662] kasan_save_track+0x20/0x40 [ 16.851701] kasan_save_alloc_info+0x40/0x58 [ 16.852008] __kasan_kmalloc+0xd4/0xd8 [ 16.852076] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.852465] ksize_unpoisons_memory+0xc0/0x740 [ 16.852547] kunit_try_run_case+0x170/0x3f0 [ 16.852593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.852665] kthread+0x328/0x630 [ 16.852979] ret_from_fork+0x10/0x20 [ 16.853062] [ 16.853189] The buggy address belongs to the object at fff00000c5b7dd00 [ 16.853189] which belongs to the cache kmalloc-128 of size 128 [ 16.853366] The buggy address is located 0 bytes to the right of [ 16.853366] allocated 115-byte region [fff00000c5b7dd00, fff00000c5b7dd73) [ 16.853484] [ 16.853506] The buggy address belongs to the physical page: [ 16.853839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.854091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.854264] page_type: f5(slab) [ 16.854331] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.854465] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.854507] page dumped because: kasan: bad access detected [ 16.854563] [ 16.854851] Memory state around the buggy address: [ 16.854912] fff00000c5b7dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.854967] fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.855181] >fff00000c5b7dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.855555] ^ [ 16.855632] fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.855968] fff00000c5b7de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.856050] ================================================================== [ 16.866971] ================================================================== [ 16.867025] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 16.867422] Read of size 1 at addr fff00000c5b7dd7f by task kunit_try_catch/194 [ 16.867491] [ 16.867545] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.867701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.867789] Hardware name: linux,dummy-virt (DT) [ 16.867898] Call trace: [ 16.867925] show_stack+0x20/0x38 (C) [ 16.868173] dump_stack_lvl+0x8c/0xd0 [ 16.868622] print_report+0x118/0x5d0 [ 16.868731] kasan_report+0xdc/0x128 [ 16.868917] __asan_report_load1_noabort+0x20/0x30 [ 16.869105] ksize_unpoisons_memory+0x690/0x740 [ 16.869230] kunit_try_run_case+0x170/0x3f0 [ 16.869336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.869442] kthread+0x328/0x630 [ 16.869777] ret_from_fork+0x10/0x20 [ 16.869921] [ 16.870011] Allocated by task 194: [ 16.870078] kasan_save_stack+0x3c/0x68 [ 16.870182] kasan_save_track+0x20/0x40 [ 16.870279] kasan_save_alloc_info+0x40/0x58 [ 16.870414] __kasan_kmalloc+0xd4/0xd8 [ 16.870493] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.870558] ksize_unpoisons_memory+0xc0/0x740 [ 16.870891] kunit_try_run_case+0x170/0x3f0 [ 16.870964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.871063] kthread+0x328/0x630 [ 16.871244] ret_from_fork+0x10/0x20 [ 16.871448] [ 16.871528] The buggy address belongs to the object at fff00000c5b7dd00 [ 16.871528] which belongs to the cache kmalloc-128 of size 128 [ 16.871881] The buggy address is located 12 bytes to the right of [ 16.871881] allocated 115-byte region [fff00000c5b7dd00, fff00000c5b7dd73) [ 16.871989] [ 16.872075] The buggy address belongs to the physical page: [ 16.872158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.872253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.872403] page_type: f5(slab) [ 16.872532] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.872866] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.873136] page dumped because: kasan: bad access detected [ 16.873259] [ 16.873330] Memory state around the buggy address: [ 16.873389] fff00000c5b7dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.873454] fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.873640] >fff00000c5b7dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.873705] ^ [ 16.874050] fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.874133] fff00000c5b7de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.874211] ================================================================== [ 16.858259] ================================================================== [ 16.858312] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 16.858387] Read of size 1 at addr fff00000c5b7dd78 by task kunit_try_catch/194 [ 16.858456] [ 16.858488] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.858570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.858596] Hardware name: linux,dummy-virt (DT) [ 16.858647] Call trace: [ 16.858681] show_stack+0x20/0x38 (C) [ 16.858731] dump_stack_lvl+0x8c/0xd0 [ 16.858778] print_report+0x118/0x5d0 [ 16.858825] kasan_report+0xdc/0x128 [ 16.858870] __asan_report_load1_noabort+0x20/0x30 [ 16.858931] ksize_unpoisons_memory+0x618/0x740 [ 16.858986] kunit_try_run_case+0x170/0x3f0 [ 16.859037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.859091] kthread+0x328/0x630 [ 16.859132] ret_from_fork+0x10/0x20 [ 16.859179] [ 16.859199] Allocated by task 194: [ 16.859228] kasan_save_stack+0x3c/0x68 [ 16.859277] kasan_save_track+0x20/0x40 [ 16.859315] kasan_save_alloc_info+0x40/0x58 [ 16.859814] __kasan_kmalloc+0xd4/0xd8 [ 16.860130] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.860768] ksize_unpoisons_memory+0xc0/0x740 [ 16.860850] kunit_try_run_case+0x170/0x3f0 [ 16.860922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.861088] kthread+0x328/0x630 [ 16.861615] ret_from_fork+0x10/0x20 [ 16.861697] [ 16.861744] The buggy address belongs to the object at fff00000c5b7dd00 [ 16.861744] which belongs to the cache kmalloc-128 of size 128 [ 16.861841] The buggy address is located 5 bytes to the right of [ 16.861841] allocated 115-byte region [fff00000c5b7dd00, fff00000c5b7dd73) [ 16.861999] [ 16.862069] The buggy address belongs to the physical page: [ 16.862099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.862215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.862582] page_type: f5(slab) [ 16.862670] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.862785] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.862958] page dumped because: kasan: bad access detected [ 16.863024] [ 16.863380] Memory state around the buggy address: [ 16.863453] fff00000c5b7dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.863645] fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.863811] >fff00000c5b7dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.863890] ^ [ 16.863932] fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.864289] fff00000c5b7de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.864381] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 16.832307] ================================================================== [ 16.832691] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 16.832775] Free of addr fff00000c5a02c40 by task kunit_try_catch/192 [ 16.832828] [ 16.833008] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.833217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.833542] Hardware name: linux,dummy-virt (DT) [ 16.833580] Call trace: [ 16.833603] show_stack+0x20/0x38 (C) [ 16.833732] dump_stack_lvl+0x8c/0xd0 [ 16.833832] print_report+0x118/0x5d0 [ 16.834004] kasan_report_invalid_free+0xc0/0xe8 [ 16.834111] check_slab_allocation+0xd4/0x108 [ 16.834281] __kasan_slab_pre_free+0x2c/0x48 [ 16.834346] kfree+0xe8/0x3c8 [ 16.834693] kfree_sensitive+0x3c/0xb0 [ 16.834946] kmalloc_double_kzfree+0x168/0x308 [ 16.835097] kunit_try_run_case+0x170/0x3f0 [ 16.835181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.835301] kthread+0x328/0x630 [ 16.835391] ret_from_fork+0x10/0x20 [ 16.835630] [ 16.835719] Allocated by task 192: [ 16.835751] kasan_save_stack+0x3c/0x68 [ 16.835824] kasan_save_track+0x20/0x40 [ 16.835864] kasan_save_alloc_info+0x40/0x58 [ 16.835905] __kasan_kmalloc+0xd4/0xd8 [ 16.835941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.835982] kmalloc_double_kzfree+0xb8/0x308 [ 16.836084] kunit_try_run_case+0x170/0x3f0 [ 16.836125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.836185] kthread+0x328/0x630 [ 16.836229] ret_from_fork+0x10/0x20 [ 16.836265] [ 16.836284] Freed by task 192: [ 16.836309] kasan_save_stack+0x3c/0x68 [ 16.836703] kasan_save_track+0x20/0x40 [ 16.836768] kasan_save_free_info+0x4c/0x78 [ 16.837145] __kasan_slab_free+0x6c/0x98 [ 16.837254] kfree+0x214/0x3c8 [ 16.837397] kfree_sensitive+0x80/0xb0 [ 16.837503] kmalloc_double_kzfree+0x11c/0x308 [ 16.837664] kunit_try_run_case+0x170/0x3f0 [ 16.837765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.837993] kthread+0x328/0x630 [ 16.838062] ret_from_fork+0x10/0x20 [ 16.838248] [ 16.838307] The buggy address belongs to the object at fff00000c5a02c40 [ 16.838307] which belongs to the cache kmalloc-16 of size 16 [ 16.838499] The buggy address is located 0 bytes inside of [ 16.838499] 16-byte region [fff00000c5a02c40, fff00000c5a02c50) [ 16.838652] [ 16.838736] The buggy address belongs to the physical page: [ 16.838806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 16.839143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.839370] page_type: f5(slab) [ 16.839534] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.839640] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.839786] page dumped because: kasan: bad access detected [ 16.839826] [ 16.839844] Memory state around the buggy address: [ 16.840140] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 16.840329] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.840384] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 16.840514] ^ [ 16.840648] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.840736] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.840853] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 16.825065] ================================================================== [ 16.825125] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 16.825178] Read of size 1 at addr fff00000c5a02c40 by task kunit_try_catch/192 [ 16.825228] [ 16.825262] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.825364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.825392] Hardware name: linux,dummy-virt (DT) [ 16.825424] Call trace: [ 16.825449] show_stack+0x20/0x38 (C) [ 16.825498] dump_stack_lvl+0x8c/0xd0 [ 16.825546] print_report+0x118/0x5d0 [ 16.825593] kasan_report+0xdc/0x128 [ 16.825636] __kasan_check_byte+0x54/0x70 [ 16.825682] kfree_sensitive+0x30/0xb0 [ 16.825729] kmalloc_double_kzfree+0x168/0x308 [ 16.825774] kunit_try_run_case+0x170/0x3f0 [ 16.825822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.825875] kthread+0x328/0x630 [ 16.825916] ret_from_fork+0x10/0x20 [ 16.825963] [ 16.825982] Allocated by task 192: [ 16.826010] kasan_save_stack+0x3c/0x68 [ 16.826049] kasan_save_track+0x20/0x40 [ 16.826087] kasan_save_alloc_info+0x40/0x58 [ 16.826128] __kasan_kmalloc+0xd4/0xd8 [ 16.826165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.826205] kmalloc_double_kzfree+0xb8/0x308 [ 16.826243] kunit_try_run_case+0x170/0x3f0 [ 16.826280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.826456] kthread+0x328/0x630 [ 16.826502] ret_from_fork+0x10/0x20 [ 16.826548] [ 16.826997] Freed by task 192: [ 16.827067] kasan_save_stack+0x3c/0x68 [ 16.827241] kasan_save_track+0x20/0x40 [ 16.827395] kasan_save_free_info+0x4c/0x78 [ 16.827520] __kasan_slab_free+0x6c/0x98 [ 16.827699] kfree+0x214/0x3c8 [ 16.827784] kfree_sensitive+0x80/0xb0 [ 16.827825] kmalloc_double_kzfree+0x11c/0x308 [ 16.828093] kunit_try_run_case+0x170/0x3f0 [ 16.828272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.828923] kthread+0x328/0x630 [ 16.828961] ret_from_fork+0x10/0x20 [ 16.829005] [ 16.829027] The buggy address belongs to the object at fff00000c5a02c40 [ 16.829027] which belongs to the cache kmalloc-16 of size 16 [ 16.829334] The buggy address is located 0 bytes inside of [ 16.829334] freed 16-byte region [fff00000c5a02c40, fff00000c5a02c50) [ 16.829517] [ 16.829578] The buggy address belongs to the physical page: [ 16.829670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 16.829748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.829909] page_type: f5(slab) [ 16.829992] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.830121] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.830163] page dumped because: kasan: bad access detected [ 16.830231] [ 16.830421] Memory state around the buggy address: [ 16.830559] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 16.830699] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.830775] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 16.830869] ^ [ 16.830946] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.831014] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.831127] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 16.801149] ================================================================== [ 16.801212] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 16.801267] Read of size 1 at addr fff00000c7951628 by task kunit_try_catch/188 [ 16.801333] [ 16.801373] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.802144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.802232] Hardware name: linux,dummy-virt (DT) [ 16.802427] Call trace: [ 16.802734] show_stack+0x20/0x38 (C) [ 16.802829] dump_stack_lvl+0x8c/0xd0 [ 16.802908] print_report+0x118/0x5d0 [ 16.802996] kasan_report+0xdc/0x128 [ 16.803068] __asan_report_load1_noabort+0x20/0x30 [ 16.803140] kmalloc_uaf2+0x3f4/0x468 [ 16.803228] kunit_try_run_case+0x170/0x3f0 [ 16.803810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.803910] kthread+0x328/0x630 [ 16.803972] ret_from_fork+0x10/0x20 [ 16.804061] [ 16.804104] Allocated by task 188: [ 16.804135] kasan_save_stack+0x3c/0x68 [ 16.804455] kasan_save_track+0x20/0x40 [ 16.804580] kasan_save_alloc_info+0x40/0x58 [ 16.804620] __kasan_kmalloc+0xd4/0xd8 [ 16.804658] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.804698] kmalloc_uaf2+0xc4/0x468 [ 16.805166] kunit_try_run_case+0x170/0x3f0 [ 16.805252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.805461] kthread+0x328/0x630 [ 16.805619] ret_from_fork+0x10/0x20 [ 16.805687] [ 16.805744] Freed by task 188: [ 16.805783] kasan_save_stack+0x3c/0x68 [ 16.805898] kasan_save_track+0x20/0x40 [ 16.806246] kasan_save_free_info+0x4c/0x78 [ 16.806454] __kasan_slab_free+0x6c/0x98 [ 16.806626] kfree+0x214/0x3c8 [ 16.806693] kmalloc_uaf2+0x134/0x468 [ 16.806818] kunit_try_run_case+0x170/0x3f0 [ 16.806879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.807163] kthread+0x328/0x630 [ 16.807230] ret_from_fork+0x10/0x20 [ 16.807305] [ 16.807440] The buggy address belongs to the object at fff00000c7951600 [ 16.807440] which belongs to the cache kmalloc-64 of size 64 [ 16.807828] The buggy address is located 40 bytes inside of [ 16.807828] freed 64-byte region [fff00000c7951600, fff00000c7951640) [ 16.807970] [ 16.808007] The buggy address belongs to the physical page: [ 16.808077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107951 [ 16.808224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.808335] page_type: f5(slab) [ 16.808537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.808767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.808815] page dumped because: kasan: bad access detected [ 16.809025] [ 16.809151] Memory state around the buggy address: [ 16.809240] fff00000c7951500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.809413] fff00000c7951580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.809797] >fff00000c7951600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.809889] ^ [ 16.809948] fff00000c7951680: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 16.810058] fff00000c7951700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.810127] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 16.783606] ================================================================== [ 16.783699] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 16.783862] Write of size 33 at addr fff00000c7951480 by task kunit_try_catch/186 [ 16.783917] [ 16.783978] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.784411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.784447] Hardware name: linux,dummy-virt (DT) [ 16.784557] Call trace: [ 16.784615] show_stack+0x20/0x38 (C) [ 16.784694] dump_stack_lvl+0x8c/0xd0 [ 16.784909] print_report+0x118/0x5d0 [ 16.785134] kasan_report+0xdc/0x128 [ 16.785248] kasan_check_range+0x100/0x1a8 [ 16.785376] __asan_memset+0x34/0x78 [ 16.785425] kmalloc_uaf_memset+0x170/0x310 [ 16.785675] kunit_try_run_case+0x170/0x3f0 [ 16.785853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.785938] kthread+0x328/0x630 [ 16.786081] ret_from_fork+0x10/0x20 [ 16.786192] [ 16.786298] Allocated by task 186: [ 16.786398] kasan_save_stack+0x3c/0x68 [ 16.786825] kasan_save_track+0x20/0x40 [ 16.786914] kasan_save_alloc_info+0x40/0x58 [ 16.787077] __kasan_kmalloc+0xd4/0xd8 [ 16.787174] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.787335] kmalloc_uaf_memset+0xb8/0x310 [ 16.787549] kunit_try_run_case+0x170/0x3f0 [ 16.787748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.787828] kthread+0x328/0x630 [ 16.787940] ret_from_fork+0x10/0x20 [ 16.788063] [ 16.788143] Freed by task 186: [ 16.788344] kasan_save_stack+0x3c/0x68 [ 16.788503] kasan_save_track+0x20/0x40 [ 16.788583] kasan_save_free_info+0x4c/0x78 [ 16.788975] __kasan_slab_free+0x6c/0x98 [ 16.789067] kfree+0x214/0x3c8 [ 16.789158] kmalloc_uaf_memset+0x11c/0x310 [ 16.789301] kunit_try_run_case+0x170/0x3f0 [ 16.789476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.789524] kthread+0x328/0x630 [ 16.789872] ret_from_fork+0x10/0x20 [ 16.790053] [ 16.790123] The buggy address belongs to the object at fff00000c7951480 [ 16.790123] which belongs to the cache kmalloc-64 of size 64 [ 16.790295] The buggy address is located 0 bytes inside of [ 16.790295] freed 64-byte region [fff00000c7951480, fff00000c79514c0) [ 16.790504] [ 16.790565] The buggy address belongs to the physical page: [ 16.790621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107951 [ 16.790851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.790947] page_type: f5(slab) [ 16.791080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.791189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.791242] page dumped because: kasan: bad access detected [ 16.791274] [ 16.791313] Memory state around the buggy address: [ 16.791364] fff00000c7951380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.791408] fff00000c7951400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.791457] >fff00000c7951480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.791511] ^ [ 16.791551] fff00000c7951500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.791613] fff00000c7951580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.791651] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 16.764167] ================================================================== [ 16.764232] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 16.764295] Read of size 1 at addr fff00000c5a02c28 by task kunit_try_catch/184 [ 16.764358] [ 16.764393] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.764476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.765205] Hardware name: linux,dummy-virt (DT) [ 16.765243] Call trace: [ 16.765270] show_stack+0x20/0x38 (C) [ 16.765345] dump_stack_lvl+0x8c/0xd0 [ 16.765422] print_report+0x118/0x5d0 [ 16.765612] kasan_report+0xdc/0x128 [ 16.765901] __asan_report_load1_noabort+0x20/0x30 [ 16.766072] kmalloc_uaf+0x300/0x338 [ 16.766201] kunit_try_run_case+0x170/0x3f0 [ 16.766445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.766635] kthread+0x328/0x630 [ 16.766744] ret_from_fork+0x10/0x20 [ 16.767077] [ 16.767129] Allocated by task 184: [ 16.767209] kasan_save_stack+0x3c/0x68 [ 16.767378] kasan_save_track+0x20/0x40 [ 16.767519] kasan_save_alloc_info+0x40/0x58 [ 16.767601] __kasan_kmalloc+0xd4/0xd8 [ 16.767810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.767970] kmalloc_uaf+0xb8/0x338 [ 16.768034] kunit_try_run_case+0x170/0x3f0 [ 16.768163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.768244] kthread+0x328/0x630 [ 16.768600] ret_from_fork+0x10/0x20 [ 16.768672] [ 16.768742] Freed by task 184: [ 16.768792] kasan_save_stack+0x3c/0x68 [ 16.768832] kasan_save_track+0x20/0x40 [ 16.768870] kasan_save_free_info+0x4c/0x78 [ 16.769378] __kasan_slab_free+0x6c/0x98 [ 16.769513] kfree+0x214/0x3c8 [ 16.769549] kmalloc_uaf+0x11c/0x338 [ 16.769770] kunit_try_run_case+0x170/0x3f0 [ 16.769955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.770018] kthread+0x328/0x630 [ 16.770213] ret_from_fork+0x10/0x20 [ 16.770283] [ 16.770616] The buggy address belongs to the object at fff00000c5a02c20 [ 16.770616] which belongs to the cache kmalloc-16 of size 16 [ 16.771068] The buggy address is located 8 bytes inside of [ 16.771068] freed 16-byte region [fff00000c5a02c20, fff00000c5a02c30) [ 16.771211] [ 16.771282] The buggy address belongs to the physical page: [ 16.771540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 16.771618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.772038] page_type: f5(slab) [ 16.772100] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.772343] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.772404] page dumped because: kasan: bad access detected [ 16.772677] [ 16.772704] Memory state around the buggy address: [ 16.772763] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 16.772840] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.773190] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 16.773348] ^ [ 16.773388] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.773473] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.773646] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 16.746860] ================================================================== [ 16.746985] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 16.747088] Read of size 64 at addr fff00000c7951184 by task kunit_try_catch/182 [ 16.747490] [ 16.747577] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.747665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.747692] Hardware name: linux,dummy-virt (DT) [ 16.747794] Call trace: [ 16.747862] show_stack+0x20/0x38 (C) [ 16.747936] dump_stack_lvl+0x8c/0xd0 [ 16.748034] print_report+0x118/0x5d0 [ 16.748083] kasan_report+0xdc/0x128 [ 16.748127] kasan_check_range+0x100/0x1a8 [ 16.748332] __asan_memmove+0x3c/0x98 [ 16.748532] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 16.748604] kunit_try_run_case+0x170/0x3f0 [ 16.748744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.748873] kthread+0x328/0x630 [ 16.748978] ret_from_fork+0x10/0x20 [ 16.749027] [ 16.749046] Allocated by task 182: [ 16.749100] kasan_save_stack+0x3c/0x68 [ 16.749144] kasan_save_track+0x20/0x40 [ 16.749362] kasan_save_alloc_info+0x40/0x58 [ 16.749546] __kasan_kmalloc+0xd4/0xd8 [ 16.749614] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.749725] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 16.749835] kunit_try_run_case+0x170/0x3f0 [ 16.749955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.750082] kthread+0x328/0x630 [ 16.750131] ret_from_fork+0x10/0x20 [ 16.750168] [ 16.750536] The buggy address belongs to the object at fff00000c7951180 [ 16.750536] which belongs to the cache kmalloc-64 of size 64 [ 16.750667] The buggy address is located 4 bytes inside of [ 16.750667] allocated 64-byte region [fff00000c7951180, fff00000c79511c0) [ 16.750730] [ 16.750757] The buggy address belongs to the physical page: [ 16.750800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107951 [ 16.750871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.750930] page_type: f5(slab) [ 16.750977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.751034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.751076] page dumped because: kasan: bad access detected [ 16.751107] [ 16.751125] Memory state around the buggy address: [ 16.751170] fff00000c7951080: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.751232] fff00000c7951100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.751280] >fff00000c7951180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.751348] ^ [ 16.751383] fff00000c7951200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.751434] fff00000c7951280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.751471] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 16.724426] ================================================================== [ 16.724682] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 16.724752] Read of size 18446744073709551614 at addr fff00000c7965f84 by task kunit_try_catch/180 [ 16.725443] [ 16.725730] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.726102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.726427] Hardware name: linux,dummy-virt (DT) [ 16.726819] Call trace: [ 16.726942] show_stack+0x20/0x38 (C) [ 16.727111] dump_stack_lvl+0x8c/0xd0 [ 16.727211] print_report+0x118/0x5d0 [ 16.727637] kasan_report+0xdc/0x128 [ 16.727736] kasan_check_range+0x100/0x1a8 [ 16.727800] __asan_memmove+0x3c/0x98 [ 16.727870] kmalloc_memmove_negative_size+0x154/0x2e0 [ 16.728203] kunit_try_run_case+0x170/0x3f0 [ 16.728619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.728814] kthread+0x328/0x630 [ 16.728942] ret_from_fork+0x10/0x20 [ 16.729128] [ 16.729344] Allocated by task 180: [ 16.729392] kasan_save_stack+0x3c/0x68 [ 16.729569] kasan_save_track+0x20/0x40 [ 16.729714] kasan_save_alloc_info+0x40/0x58 [ 16.729864] __kasan_kmalloc+0xd4/0xd8 [ 16.729904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.731236] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 16.731309] kunit_try_run_case+0x170/0x3f0 [ 16.731543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.731692] kthread+0x328/0x630 [ 16.731736] ret_from_fork+0x10/0x20 [ 16.731909] [ 16.732138] The buggy address belongs to the object at fff00000c7965f80 [ 16.732138] which belongs to the cache kmalloc-64 of size 64 [ 16.732470] The buggy address is located 4 bytes inside of [ 16.732470] 64-byte region [fff00000c7965f80, fff00000c7965fc0) [ 16.732687] [ 16.732821] The buggy address belongs to the physical page: [ 16.732863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107965 [ 16.732950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.733358] page_type: f5(slab) [ 16.733511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.733595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.733984] page dumped because: kasan: bad access detected [ 16.734095] [ 16.734154] Memory state around the buggy address: [ 16.734192] fff00000c7965e80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 16.734440] fff00000c7965f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.734618] >fff00000c7965f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.734685] ^ [ 16.735008] fff00000c7966000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.735086] fff00000c7966080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.735262] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 16.709031] ================================================================== [ 16.709147] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 16.709396] Write of size 16 at addr fff00000c5b7dc69 by task kunit_try_catch/178 [ 16.709513] [ 16.709591] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.709694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.710063] Hardware name: linux,dummy-virt (DT) [ 16.710218] Call trace: [ 16.710385] show_stack+0x20/0x38 (C) [ 16.710530] dump_stack_lvl+0x8c/0xd0 [ 16.710648] print_report+0x118/0x5d0 [ 16.711002] kasan_report+0xdc/0x128 [ 16.711096] kasan_check_range+0x100/0x1a8 [ 16.711244] __asan_memset+0x34/0x78 [ 16.711299] kmalloc_oob_memset_16+0x150/0x2f8 [ 16.711357] kunit_try_run_case+0x170/0x3f0 [ 16.711410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.711498] kthread+0x328/0x630 [ 16.711539] ret_from_fork+0x10/0x20 [ 16.711598] [ 16.711628] Allocated by task 178: [ 16.711665] kasan_save_stack+0x3c/0x68 [ 16.711707] kasan_save_track+0x20/0x40 [ 16.711753] kasan_save_alloc_info+0x40/0x58 [ 16.711806] __kasan_kmalloc+0xd4/0xd8 [ 16.711842] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.711881] kmalloc_oob_memset_16+0xb0/0x2f8 [ 16.711917] kunit_try_run_case+0x170/0x3f0 [ 16.711954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.711996] kthread+0x328/0x630 [ 16.712027] ret_from_fork+0x10/0x20 [ 16.712063] [ 16.712083] The buggy address belongs to the object at fff00000c5b7dc00 [ 16.712083] which belongs to the cache kmalloc-128 of size 128 [ 16.712138] The buggy address is located 105 bytes inside of [ 16.712138] allocated 120-byte region [fff00000c5b7dc00, fff00000c5b7dc78) [ 16.712213] [ 16.712240] The buggy address belongs to the physical page: [ 16.712281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.712903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.713004] page_type: f5(slab) [ 16.713067] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.713168] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.713254] page dumped because: kasan: bad access detected [ 16.713284] [ 16.713310] Memory state around the buggy address: [ 16.713716] fff00000c5b7db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.713788] fff00000c5b7db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.713861] >fff00000c5b7dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.713939] ^ [ 16.714066] fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.714159] fff00000c5b7dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.714298] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 16.688912] ================================================================== [ 16.689261] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 16.689396] Write of size 8 at addr fff00000c5b7db71 by task kunit_try_catch/176 [ 16.689445] [ 16.689754] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.689857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.689965] Hardware name: linux,dummy-virt (DT) [ 16.690046] Call trace: [ 16.690215] show_stack+0x20/0x38 (C) [ 16.690428] dump_stack_lvl+0x8c/0xd0 [ 16.690535] print_report+0x118/0x5d0 [ 16.690590] kasan_report+0xdc/0x128 [ 16.690691] kasan_check_range+0x100/0x1a8 [ 16.691302] __asan_memset+0x34/0x78 [ 16.691380] kmalloc_oob_memset_8+0x150/0x2f8 [ 16.691459] kunit_try_run_case+0x170/0x3f0 [ 16.691699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.691855] kthread+0x328/0x630 [ 16.691903] ret_from_fork+0x10/0x20 [ 16.692337] [ 16.692381] Allocated by task 176: [ 16.692584] kasan_save_stack+0x3c/0x68 [ 16.692784] kasan_save_track+0x20/0x40 [ 16.692910] kasan_save_alloc_info+0x40/0x58 [ 16.693053] __kasan_kmalloc+0xd4/0xd8 [ 16.693096] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.693136] kmalloc_oob_memset_8+0xb0/0x2f8 [ 16.693174] kunit_try_run_case+0x170/0x3f0 [ 16.693506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.693669] kthread+0x328/0x630 [ 16.693730] ret_from_fork+0x10/0x20 [ 16.693989] [ 16.694244] The buggy address belongs to the object at fff00000c5b7db00 [ 16.694244] which belongs to the cache kmalloc-128 of size 128 [ 16.694639] The buggy address is located 113 bytes inside of [ 16.694639] allocated 120-byte region [fff00000c5b7db00, fff00000c5b7db78) [ 16.694804] [ 16.694885] The buggy address belongs to the physical page: [ 16.695043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.695140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.695371] page_type: f5(slab) [ 16.695434] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.695597] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.695641] page dumped because: kasan: bad access detected [ 16.695848] [ 16.695989] Memory state around the buggy address: [ 16.696047] fff00000c5b7da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.696211] fff00000c5b7da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.696255] >fff00000c5b7db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.696529] ^ [ 16.696742] fff00000c5b7db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.696853] fff00000c5b7dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.696938] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 16.674336] ================================================================== [ 16.674400] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 16.674450] Write of size 4 at addr fff00000c5b7da75 by task kunit_try_catch/174 [ 16.674497] [ 16.674531] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.674610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.674636] Hardware name: linux,dummy-virt (DT) [ 16.674665] Call trace: [ 16.674688] show_stack+0x20/0x38 (C) [ 16.674734] dump_stack_lvl+0x8c/0xd0 [ 16.674779] print_report+0x118/0x5d0 [ 16.674823] kasan_report+0xdc/0x128 [ 16.674876] kasan_check_range+0x100/0x1a8 [ 16.674923] __asan_memset+0x34/0x78 [ 16.674963] kmalloc_oob_memset_4+0x150/0x300 [ 16.675008] kunit_try_run_case+0x170/0x3f0 [ 16.675053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.675108] kthread+0x328/0x630 [ 16.675159] ret_from_fork+0x10/0x20 [ 16.675208] [ 16.675226] Allocated by task 174: [ 16.675254] kasan_save_stack+0x3c/0x68 [ 16.675293] kasan_save_track+0x20/0x40 [ 16.675728] kasan_save_alloc_info+0x40/0x58 [ 16.676115] __kasan_kmalloc+0xd4/0xd8 [ 16.676196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.676244] kmalloc_oob_memset_4+0xb0/0x300 [ 16.676289] kunit_try_run_case+0x170/0x3f0 [ 16.676586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.676748] kthread+0x328/0x630 [ 16.676802] ret_from_fork+0x10/0x20 [ 16.676990] [ 16.677031] The buggy address belongs to the object at fff00000c5b7da00 [ 16.677031] which belongs to the cache kmalloc-128 of size 128 [ 16.677234] The buggy address is located 117 bytes inside of [ 16.677234] allocated 120-byte region [fff00000c5b7da00, fff00000c5b7da78) [ 16.677650] [ 16.677701] The buggy address belongs to the physical page: [ 16.677740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.677819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.677944] page_type: f5(slab) [ 16.678042] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.678220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.678298] page dumped because: kasan: bad access detected [ 16.678422] [ 16.678468] Memory state around the buggy address: [ 16.678501] fff00000c5b7d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.678559] fff00000c5b7d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.678799] >fff00000c5b7da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.678984] ^ [ 16.679031] fff00000c5b7da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.679075] fff00000c5b7db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.679581] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 16.654416] ================================================================== [ 16.654546] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 16.654601] Write of size 2 at addr fff00000c5b7d977 by task kunit_try_catch/172 [ 16.655127] [ 16.655235] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.655336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.655363] Hardware name: linux,dummy-virt (DT) [ 16.655666] Call trace: [ 16.655738] show_stack+0x20/0x38 (C) [ 16.655793] dump_stack_lvl+0x8c/0xd0 [ 16.655839] print_report+0x118/0x5d0 [ 16.656239] kasan_report+0xdc/0x128 [ 16.656332] kasan_check_range+0x100/0x1a8 [ 16.656548] __asan_memset+0x34/0x78 [ 16.656610] kmalloc_oob_memset_2+0x150/0x2f8 [ 16.656656] kunit_try_run_case+0x170/0x3f0 [ 16.656932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.657169] kthread+0x328/0x630 [ 16.657366] ret_from_fork+0x10/0x20 [ 16.657481] [ 16.657818] Allocated by task 172: [ 16.657948] kasan_save_stack+0x3c/0x68 [ 16.658092] kasan_save_track+0x20/0x40 [ 16.658172] kasan_save_alloc_info+0x40/0x58 [ 16.658419] __kasan_kmalloc+0xd4/0xd8 [ 16.658619] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.658697] kmalloc_oob_memset_2+0xb0/0x2f8 [ 16.658771] kunit_try_run_case+0x170/0x3f0 [ 16.658959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.659075] kthread+0x328/0x630 [ 16.659382] ret_from_fork+0x10/0x20 [ 16.659620] [ 16.659663] The buggy address belongs to the object at fff00000c5b7d900 [ 16.659663] which belongs to the cache kmalloc-128 of size 128 [ 16.659799] The buggy address is located 119 bytes inside of [ 16.659799] allocated 120-byte region [fff00000c5b7d900, fff00000c5b7d978) [ 16.659929] [ 16.660075] The buggy address belongs to the physical page: [ 16.660108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.660466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.660833] page_type: f5(slab) [ 16.660895] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.661058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.661125] page dumped because: kasan: bad access detected [ 16.661164] [ 16.661182] Memory state around the buggy address: [ 16.661556] fff00000c5b7d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.661634] fff00000c5b7d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.661782] >fff00000c5b7d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.661956] ^ [ 16.662030] fff00000c5b7d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.662085] fff00000c5b7da00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.662177] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 16.639074] ================================================================== [ 16.639146] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 16.639198] Write of size 128 at addr fff00000c5b7d800 by task kunit_try_catch/170 [ 16.639359] [ 16.639398] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.639983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.640313] Hardware name: linux,dummy-virt (DT) [ 16.640366] Call trace: [ 16.640391] show_stack+0x20/0x38 (C) [ 16.640441] dump_stack_lvl+0x8c/0xd0 [ 16.640487] print_report+0x118/0x5d0 [ 16.640539] kasan_report+0xdc/0x128 [ 16.640615] kasan_check_range+0x100/0x1a8 [ 16.641317] __asan_memset+0x34/0x78 [ 16.641435] kmalloc_oob_in_memset+0x144/0x2d0 [ 16.641484] kunit_try_run_case+0x170/0x3f0 [ 16.641557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.641610] kthread+0x328/0x630 [ 16.641812] ret_from_fork+0x10/0x20 [ 16.642066] [ 16.642295] Allocated by task 170: [ 16.642507] kasan_save_stack+0x3c/0x68 [ 16.642603] kasan_save_track+0x20/0x40 [ 16.642746] kasan_save_alloc_info+0x40/0x58 [ 16.642907] __kasan_kmalloc+0xd4/0xd8 [ 16.642994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.643102] kmalloc_oob_in_memset+0xb0/0x2d0 [ 16.643204] kunit_try_run_case+0x170/0x3f0 [ 16.643247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.643445] kthread+0x328/0x630 [ 16.643625] ret_from_fork+0x10/0x20 [ 16.643719] [ 16.643795] The buggy address belongs to the object at fff00000c5b7d800 [ 16.643795] which belongs to the cache kmalloc-128 of size 128 [ 16.644040] The buggy address is located 0 bytes inside of [ 16.644040] allocated 120-byte region [fff00000c5b7d800, fff00000c5b7d878) [ 16.644254] [ 16.644379] The buggy address belongs to the physical page: [ 16.644455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.644881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.644937] page_type: f5(slab) [ 16.645259] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.645374] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.645498] page dumped because: kasan: bad access detected [ 16.645533] [ 16.645552] Memory state around the buggy address: [ 16.645852] fff00000c5b7d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.645935] fff00000c5b7d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646000] >fff00000c5b7d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.646066] ^ [ 16.646107] fff00000c5b7d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646278] fff00000c5b7d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646434] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 16.622263] ================================================================== [ 16.622337] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 16.622389] Read of size 16 at addr fff00000c5a02c00 by task kunit_try_catch/168 [ 16.622646] [ 16.622733] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.622866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.622921] Hardware name: linux,dummy-virt (DT) [ 16.622959] Call trace: [ 16.622983] show_stack+0x20/0x38 (C) [ 16.623335] dump_stack_lvl+0x8c/0xd0 [ 16.623391] print_report+0x118/0x5d0 [ 16.623502] kasan_report+0xdc/0x128 [ 16.623596] __asan_report_load16_noabort+0x20/0x30 [ 16.623650] kmalloc_uaf_16+0x3bc/0x438 [ 16.623695] kunit_try_run_case+0x170/0x3f0 [ 16.623741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.623837] kthread+0x328/0x630 [ 16.623877] ret_from_fork+0x10/0x20 [ 16.624178] [ 16.624213] Allocated by task 168: [ 16.624252] kasan_save_stack+0x3c/0x68 [ 16.624296] kasan_save_track+0x20/0x40 [ 16.624354] kasan_save_alloc_info+0x40/0x58 [ 16.624403] __kasan_kmalloc+0xd4/0xd8 [ 16.624439] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.624555] kmalloc_uaf_16+0x140/0x438 [ 16.624663] kunit_try_run_case+0x170/0x3f0 [ 16.624804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.625110] kthread+0x328/0x630 [ 16.625222] ret_from_fork+0x10/0x20 [ 16.625393] [ 16.625594] Freed by task 168: [ 16.625684] kasan_save_stack+0x3c/0x68 [ 16.625799] kasan_save_track+0x20/0x40 [ 16.625881] kasan_save_free_info+0x4c/0x78 [ 16.626058] __kasan_slab_free+0x6c/0x98 [ 16.626140] kfree+0x214/0x3c8 [ 16.626295] kmalloc_uaf_16+0x190/0x438 [ 16.626342] kunit_try_run_case+0x170/0x3f0 [ 16.626543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.626720] kthread+0x328/0x630 [ 16.626776] ret_from_fork+0x10/0x20 [ 16.626840] [ 16.626979] The buggy address belongs to the object at fff00000c5a02c00 [ 16.626979] which belongs to the cache kmalloc-16 of size 16 [ 16.627158] The buggy address is located 0 bytes inside of [ 16.627158] freed 16-byte region [fff00000c5a02c00, fff00000c5a02c10) [ 16.627277] [ 16.627333] The buggy address belongs to the physical page: [ 16.627654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 16.627743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.627894] page_type: f5(slab) [ 16.627964] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.628077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.628182] page dumped because: kasan: bad access detected [ 16.628268] [ 16.628626] Memory state around the buggy address: [ 16.628701] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 16.628850] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 16.628939] >fff00000c5a02c00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.629067] ^ [ 16.629115] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.629261] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.629449] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 16.603288] ================================================================== [ 16.603642] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 16.603721] Write of size 16 at addr fff00000c5a02ba0 by task kunit_try_catch/166 [ 16.603780] [ 16.603815] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.604051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.604112] Hardware name: linux,dummy-virt (DT) [ 16.604284] Call trace: [ 16.604340] show_stack+0x20/0x38 (C) [ 16.604462] dump_stack_lvl+0x8c/0xd0 [ 16.604563] print_report+0x118/0x5d0 [ 16.604621] kasan_report+0xdc/0x128 [ 16.604667] __asan_report_store16_noabort+0x20/0x30 [ 16.605074] kmalloc_oob_16+0x3a0/0x3f8 [ 16.605470] kunit_try_run_case+0x170/0x3f0 [ 16.605603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.605662] kthread+0x328/0x630 [ 16.605729] ret_from_fork+0x10/0x20 [ 16.606080] [ 16.606136] Allocated by task 166: [ 16.606182] kasan_save_stack+0x3c/0x68 [ 16.606508] kasan_save_track+0x20/0x40 [ 16.606644] kasan_save_alloc_info+0x40/0x58 [ 16.606726] __kasan_kmalloc+0xd4/0xd8 [ 16.607020] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.607138] kmalloc_oob_16+0xb4/0x3f8 [ 16.607279] kunit_try_run_case+0x170/0x3f0 [ 16.607371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.607739] kthread+0x328/0x630 [ 16.607824] ret_from_fork+0x10/0x20 [ 16.607895] [ 16.607951] The buggy address belongs to the object at fff00000c5a02ba0 [ 16.607951] which belongs to the cache kmalloc-16 of size 16 [ 16.608355] The buggy address is located 0 bytes inside of [ 16.608355] allocated 13-byte region [fff00000c5a02ba0, fff00000c5a02bad) [ 16.608522] [ 16.608591] The buggy address belongs to the physical page: [ 16.608641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 16.608695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.608743] page_type: f5(slab) [ 16.609093] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.609253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.609298] page dumped because: kasan: bad access detected [ 16.609656] [ 16.609777] Memory state around the buggy address: [ 16.609832] fff00000c5a02a80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.609902] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 16.610119] >fff00000c5a02b80: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 16.610263] ^ [ 16.610388] fff00000c5a02c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.610520] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.610598] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 16.575080] ================================================================== [ 16.575193] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 16.575246] Read of size 1 at addr fff00000c45d0000 by task kunit_try_catch/164 [ 16.575700] [ 16.575751] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.575861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.575898] Hardware name: linux,dummy-virt (DT) [ 16.575929] Call trace: [ 16.575953] show_stack+0x20/0x38 (C) [ 16.576013] dump_stack_lvl+0x8c/0xd0 [ 16.576063] print_report+0x118/0x5d0 [ 16.576111] kasan_report+0xdc/0x128 [ 16.576161] __kasan_check_byte+0x54/0x70 [ 16.576209] krealloc_noprof+0x44/0x360 [ 16.576255] krealloc_uaf+0x180/0x520 [ 16.576308] kunit_try_run_case+0x170/0x3f0 [ 16.576375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.576426] kthread+0x328/0x630 [ 16.576467] ret_from_fork+0x10/0x20 [ 16.576804] [ 16.577619] Allocated by task 164: [ 16.577682] kasan_save_stack+0x3c/0x68 [ 16.578045] kasan_save_track+0x20/0x40 [ 16.578119] kasan_save_alloc_info+0x40/0x58 [ 16.578428] __kasan_kmalloc+0xd4/0xd8 [ 16.578586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.578902] krealloc_uaf+0xc8/0x520 [ 16.578992] kunit_try_run_case+0x170/0x3f0 [ 16.579090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.579261] kthread+0x328/0x630 [ 16.579376] ret_from_fork+0x10/0x20 [ 16.579455] [ 16.579551] Freed by task 164: [ 16.580014] kasan_save_stack+0x3c/0x68 [ 16.580095] kasan_save_track+0x20/0x40 [ 16.580221] kasan_save_free_info+0x4c/0x78 [ 16.580292] __kasan_slab_free+0x6c/0x98 [ 16.580767] kfree+0x214/0x3c8 [ 16.580992] krealloc_uaf+0x12c/0x520 [ 16.581062] kunit_try_run_case+0x170/0x3f0 [ 16.581260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.581401] kthread+0x328/0x630 [ 16.581438] ret_from_fork+0x10/0x20 [ 16.581837] [ 16.581909] The buggy address belongs to the object at fff00000c45d0000 [ 16.581909] which belongs to the cache kmalloc-256 of size 256 [ 16.582011] The buggy address is located 0 bytes inside of [ 16.582011] freed 256-byte region [fff00000c45d0000, fff00000c45d0100) [ 16.582378] [ 16.582439] The buggy address belongs to the physical page: [ 16.582484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d0 [ 16.582673] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.582878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.583005] page_type: f5(slab) [ 16.583047] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.583404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.583539] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.583598] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.583683] head: 0bfffe0000000001 ffffc1ffc3117401 00000000ffffffff 00000000ffffffff [ 16.584048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.584165] page dumped because: kasan: bad access detected [ 16.584227] [ 16.584246] Memory state around the buggy address: [ 16.584613] fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.584696] fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.584801] >fff00000c45d0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.584840] ^ [ 16.584885] fff00000c45d0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.585196] fff00000c45d0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.585272] ================================================================== [ 16.588764] ================================================================== [ 16.588819] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 16.588877] Read of size 1 at addr fff00000c45d0000 by task kunit_try_catch/164 [ 16.588924] [ 16.588958] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.589036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.589062] Hardware name: linux,dummy-virt (DT) [ 16.589363] Call trace: [ 16.589415] show_stack+0x20/0x38 (C) [ 16.589491] dump_stack_lvl+0x8c/0xd0 [ 16.589831] print_report+0x118/0x5d0 [ 16.589913] kasan_report+0xdc/0x128 [ 16.589982] __asan_report_load1_noabort+0x20/0x30 [ 16.590062] krealloc_uaf+0x4c8/0x520 [ 16.590124] kunit_try_run_case+0x170/0x3f0 [ 16.590432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.590529] kthread+0x328/0x630 [ 16.590577] ret_from_fork+0x10/0x20 [ 16.590645] [ 16.590664] Allocated by task 164: [ 16.590702] kasan_save_stack+0x3c/0x68 [ 16.590742] kasan_save_track+0x20/0x40 [ 16.590779] kasan_save_alloc_info+0x40/0x58 [ 16.590817] __kasan_kmalloc+0xd4/0xd8 [ 16.590853] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.590891] krealloc_uaf+0xc8/0x520 [ 16.590935] kunit_try_run_case+0x170/0x3f0 [ 16.590972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.591013] kthread+0x328/0x630 [ 16.591054] ret_from_fork+0x10/0x20 [ 16.591099] [ 16.591117] Freed by task 164: [ 16.591152] kasan_save_stack+0x3c/0x68 [ 16.591194] kasan_save_track+0x20/0x40 [ 16.591229] kasan_save_free_info+0x4c/0x78 [ 16.591276] __kasan_slab_free+0x6c/0x98 [ 16.591313] kfree+0x214/0x3c8 [ 16.591357] krealloc_uaf+0x12c/0x520 [ 16.591400] kunit_try_run_case+0x170/0x3f0 [ 16.591441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.591493] kthread+0x328/0x630 [ 16.591533] ret_from_fork+0x10/0x20 [ 16.591573] [ 16.591591] The buggy address belongs to the object at fff00000c45d0000 [ 16.591591] which belongs to the cache kmalloc-256 of size 256 [ 16.591645] The buggy address is located 0 bytes inside of [ 16.591645] freed 256-byte region [fff00000c45d0000, fff00000c45d0100) [ 16.591704] [ 16.591722] The buggy address belongs to the physical page: [ 16.591752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d0 [ 16.591812] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.591858] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.591912] page_type: f5(slab) [ 16.591960] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.592008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.592055] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.592111] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.592165] head: 0bfffe0000000001 ffffc1ffc3117401 00000000ffffffff 00000000ffffffff [ 16.592213] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.592250] page dumped because: kasan: bad access detected [ 16.592290] [ 16.592307] Memory state around the buggy address: [ 16.592692] fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.592741] fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.593106] >fff00000c45d0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.593485] ^ [ 16.593537] fff00000c45d0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.593617] fff00000c45d0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.593671] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 16.491440] ================================================================== [ 16.491499] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.491545] Write of size 1 at addr fff00000c45cfed0 by task kunit_try_catch/158 [ 16.491600] [ 16.491630] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.491715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.491855] Hardware name: linux,dummy-virt (DT) [ 16.492029] Call trace: [ 16.492104] show_stack+0x20/0x38 (C) [ 16.492194] dump_stack_lvl+0x8c/0xd0 [ 16.492332] print_report+0x118/0x5d0 [ 16.492380] kasan_report+0xdc/0x128 [ 16.492425] __asan_report_store1_noabort+0x20/0x30 [ 16.492498] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.492566] krealloc_less_oob+0x20/0x38 [ 16.492611] kunit_try_run_case+0x170/0x3f0 [ 16.492693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.492756] kthread+0x328/0x630 [ 16.492797] ret_from_fork+0x10/0x20 [ 16.492927] [ 16.492981] Allocated by task 158: [ 16.493009] kasan_save_stack+0x3c/0x68 [ 16.493103] kasan_save_track+0x20/0x40 [ 16.493189] kasan_save_alloc_info+0x40/0x58 [ 16.493267] __kasan_krealloc+0x118/0x178 [ 16.493378] krealloc_noprof+0x128/0x360 [ 16.493435] krealloc_less_oob_helper+0x168/0xc50 [ 16.493573] krealloc_less_oob+0x20/0x38 [ 16.493668] kunit_try_run_case+0x170/0x3f0 [ 16.493733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.493775] kthread+0x328/0x630 [ 16.493806] ret_from_fork+0x10/0x20 [ 16.493854] [ 16.493871] The buggy address belongs to the object at fff00000c45cfe00 [ 16.493871] which belongs to the cache kmalloc-256 of size 256 [ 16.493925] The buggy address is located 7 bytes to the right of [ 16.493925] allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9) [ 16.494021] [ 16.494040] The buggy address belongs to the physical page: [ 16.494081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce [ 16.494131] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.494177] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.494242] page_type: f5(slab) [ 16.494285] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.494462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.494511] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.494558] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.494605] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff [ 16.494652] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.494690] page dumped because: kasan: bad access detected [ 16.494729] [ 16.494747] Memory state around the buggy address: [ 16.494777] fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.494845] fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.494887] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.494935] ^ [ 16.495090] fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.495211] fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.495283] ================================================================== [ 16.486724] ================================================================== [ 16.486967] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.487089] Write of size 1 at addr fff00000c45cfec9 by task kunit_try_catch/158 [ 16.487343] [ 16.487384] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.487569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.487595] Hardware name: linux,dummy-virt (DT) [ 16.487625] Call trace: [ 16.487647] show_stack+0x20/0x38 (C) [ 16.487695] dump_stack_lvl+0x8c/0xd0 [ 16.487749] print_report+0x118/0x5d0 [ 16.487907] kasan_report+0xdc/0x128 [ 16.488038] __asan_report_store1_noabort+0x20/0x30 [ 16.488304] krealloc_less_oob_helper+0xa48/0xc50 [ 16.488375] krealloc_less_oob+0x20/0x38 [ 16.488420] kunit_try_run_case+0x170/0x3f0 [ 16.488467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.488518] kthread+0x328/0x630 [ 16.488560] ret_from_fork+0x10/0x20 [ 16.488606] [ 16.488624] Allocated by task 158: [ 16.488693] kasan_save_stack+0x3c/0x68 [ 16.488735] kasan_save_track+0x20/0x40 [ 16.488784] kasan_save_alloc_info+0x40/0x58 [ 16.488823] __kasan_krealloc+0x118/0x178 [ 16.488859] krealloc_noprof+0x128/0x360 [ 16.488896] krealloc_less_oob_helper+0x168/0xc50 [ 16.488951] krealloc_less_oob+0x20/0x38 [ 16.489001] kunit_try_run_case+0x170/0x3f0 [ 16.489054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.489109] kthread+0x328/0x630 [ 16.489150] ret_from_fork+0x10/0x20 [ 16.489185] [ 16.489215] The buggy address belongs to the object at fff00000c45cfe00 [ 16.489215] which belongs to the cache kmalloc-256 of size 256 [ 16.489270] The buggy address is located 0 bytes to the right of [ 16.489270] allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9) [ 16.489339] [ 16.489359] The buggy address belongs to the physical page: [ 16.489389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce [ 16.489441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.489488] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.489641] page_type: f5(slab) [ 16.489694] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.489794] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.489843] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.489890] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.489937] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff [ 16.490027] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.490088] page dumped because: kasan: bad access detected [ 16.490118] [ 16.490136] Memory state around the buggy address: [ 16.490166] fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.490336] fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.490378] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.490471] ^ [ 16.490583] fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.490625] fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.490703] ================================================================== [ 16.538302] ================================================================== [ 16.538545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 16.538626] Write of size 1 at addr fff00000c79ba0c9 by task kunit_try_catch/162 [ 16.538678] [ 16.538871] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.539002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.539110] Hardware name: linux,dummy-virt (DT) [ 16.539147] Call trace: [ 16.539431] show_stack+0x20/0x38 (C) [ 16.539632] dump_stack_lvl+0x8c/0xd0 [ 16.539755] print_report+0x118/0x5d0 [ 16.539807] kasan_report+0xdc/0x128 [ 16.539853] __asan_report_store1_noabort+0x20/0x30 [ 16.539951] krealloc_less_oob_helper+0xa48/0xc50 [ 16.540014] krealloc_large_less_oob+0x20/0x38 [ 16.540351] kunit_try_run_case+0x170/0x3f0 [ 16.540427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.540480] kthread+0x328/0x630 [ 16.540700] ret_from_fork+0x10/0x20 [ 16.540832] [ 16.540905] The buggy address belongs to the physical page: [ 16.540974] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8 [ 16.541067] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.541114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.541461] page_type: f8(unknown) [ 16.541582] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.541655] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.541730] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.541812] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.541860] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff [ 16.541914] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.541964] page dumped because: kasan: bad access detected [ 16.542009] [ 16.542045] Memory state around the buggy address: [ 16.542078] fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.542121] fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.542162] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.542208] ^ [ 16.542244] fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.542292] fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.542340] ================================================================== [ 16.501425] ================================================================== [ 16.501472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.501517] Write of size 1 at addr fff00000c45cfeea by task kunit_try_catch/158 [ 16.501564] [ 16.501594] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.501671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.501706] Hardware name: linux,dummy-virt (DT) [ 16.501852] Call trace: [ 16.501964] show_stack+0x20/0x38 (C) [ 16.502136] dump_stack_lvl+0x8c/0xd0 [ 16.502229] print_report+0x118/0x5d0 [ 16.502481] kasan_report+0xdc/0x128 [ 16.502709] __asan_report_store1_noabort+0x20/0x30 [ 16.502865] krealloc_less_oob_helper+0xae4/0xc50 [ 16.503036] krealloc_less_oob+0x20/0x38 [ 16.503272] kunit_try_run_case+0x170/0x3f0 [ 16.503959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.504020] kthread+0x328/0x630 [ 16.504064] ret_from_fork+0x10/0x20 [ 16.504112] [ 16.504129] Allocated by task 158: [ 16.504161] kasan_save_stack+0x3c/0x68 [ 16.504200] kasan_save_track+0x20/0x40 [ 16.504236] kasan_save_alloc_info+0x40/0x58 [ 16.504285] __kasan_krealloc+0x118/0x178 [ 16.504333] krealloc_noprof+0x128/0x360 [ 16.504371] krealloc_less_oob_helper+0x168/0xc50 [ 16.504602] krealloc_less_oob+0x20/0x38 [ 16.504773] kunit_try_run_case+0x170/0x3f0 [ 16.504811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.504852] kthread+0x328/0x630 [ 16.504939] ret_from_fork+0x10/0x20 [ 16.504986] [ 16.505005] The buggy address belongs to the object at fff00000c45cfe00 [ 16.505005] which belongs to the cache kmalloc-256 of size 256 [ 16.505060] The buggy address is located 33 bytes to the right of [ 16.505060] allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9) [ 16.505237] [ 16.505265] The buggy address belongs to the physical page: [ 16.505294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce [ 16.505362] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.505408] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.505458] page_type: f5(slab) [ 16.505530] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.505643] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.505806] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.505855] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.505902] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff [ 16.505949] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.505988] page dumped because: kasan: bad access detected [ 16.506244] [ 16.506264] Memory state around the buggy address: [ 16.506300] fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.506409] fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.506451] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.506486] ^ [ 16.506524] fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.506582] fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.506770] ================================================================== [ 16.543953] ================================================================== [ 16.544018] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 16.544357] Write of size 1 at addr fff00000c79ba0d0 by task kunit_try_catch/162 [ 16.544409] [ 16.544448] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.544705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.544962] Hardware name: linux,dummy-virt (DT) [ 16.545049] Call trace: [ 16.545129] show_stack+0x20/0x38 (C) [ 16.545409] dump_stack_lvl+0x8c/0xd0 [ 16.545638] print_report+0x118/0x5d0 [ 16.545705] kasan_report+0xdc/0x128 [ 16.545852] __asan_report_store1_noabort+0x20/0x30 [ 16.545930] krealloc_less_oob_helper+0xb9c/0xc50 [ 16.546084] krealloc_large_less_oob+0x20/0x38 [ 16.546136] kunit_try_run_case+0x170/0x3f0 [ 16.546345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.546563] kthread+0x328/0x630 [ 16.546649] ret_from_fork+0x10/0x20 [ 16.546825] [ 16.546875] The buggy address belongs to the physical page: [ 16.546906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8 [ 16.547266] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.547474] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.547760] page_type: f8(unknown) [ 16.547975] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.548032] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.548531] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.548818] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.548913] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff [ 16.549050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.549215] page dumped because: kasan: bad access detected [ 16.549289] [ 16.549315] Memory state around the buggy address: [ 16.549359] fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.549634] fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.549698] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.549844] ^ [ 16.549889] fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.549951] fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.549997] ================================================================== [ 16.554523] ================================================================== [ 16.554660] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 16.554714] Write of size 1 at addr fff00000c79ba0ea by task kunit_try_catch/162 [ 16.554781] [ 16.554817] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.554895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.554921] Hardware name: linux,dummy-virt (DT) [ 16.554951] Call trace: [ 16.555386] show_stack+0x20/0x38 (C) [ 16.555492] dump_stack_lvl+0x8c/0xd0 [ 16.555681] print_report+0x118/0x5d0 [ 16.555745] kasan_report+0xdc/0x128 [ 16.555926] __asan_report_store1_noabort+0x20/0x30 [ 16.556001] krealloc_less_oob_helper+0xae4/0xc50 [ 16.556183] krealloc_large_less_oob+0x20/0x38 [ 16.556469] kunit_try_run_case+0x170/0x3f0 [ 16.556696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.556778] kthread+0x328/0x630 [ 16.556862] ret_from_fork+0x10/0x20 [ 16.557219] [ 16.557265] The buggy address belongs to the physical page: [ 16.557380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8 [ 16.557726] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.557845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.557937] page_type: f8(unknown) [ 16.558025] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.558162] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.558333] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.558418] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.558495] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff [ 16.558674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.558837] page dumped because: kasan: bad access detected [ 16.558935] [ 16.558994] Memory state around the buggy address: [ 16.559055] fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.559195] fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.559261] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.559385] ^ [ 16.559446] fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.559487] fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.559682] ================================================================== [ 16.561368] ================================================================== [ 16.561510] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.561562] Write of size 1 at addr fff00000c79ba0eb by task kunit_try_catch/162 [ 16.561627] [ 16.561691] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.561773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.561833] Hardware name: linux,dummy-virt (DT) [ 16.561905] Call trace: [ 16.561955] show_stack+0x20/0x38 (C) [ 16.562005] dump_stack_lvl+0x8c/0xd0 [ 16.562058] print_report+0x118/0x5d0 [ 16.562102] kasan_report+0xdc/0x128 [ 16.562146] __asan_report_store1_noabort+0x20/0x30 [ 16.562474] krealloc_less_oob_helper+0xa58/0xc50 [ 16.562645] krealloc_large_less_oob+0x20/0x38 [ 16.562698] kunit_try_run_case+0x170/0x3f0 [ 16.562764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.562901] kthread+0x328/0x630 [ 16.562955] ret_from_fork+0x10/0x20 [ 16.563002] [ 16.563030] The buggy address belongs to the physical page: [ 16.563211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8 [ 16.563398] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.563464] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.563577] page_type: f8(unknown) [ 16.563635] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.563712] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.563803] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.563899] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.563947] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff [ 16.564168] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.564222] page dumped because: kasan: bad access detected [ 16.564380] [ 16.564406] Memory state around the buggy address: [ 16.564485] fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.564701] fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.564813] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.564909] ^ [ 16.564965] fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.565274] fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.565442] ================================================================== [ 16.507282] ================================================================== [ 16.507337] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 16.507383] Write of size 1 at addr fff00000c45cfeeb by task kunit_try_catch/158 [ 16.507430] [ 16.507459] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.507535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.507561] Hardware name: linux,dummy-virt (DT) [ 16.507591] Call trace: [ 16.507613] show_stack+0x20/0x38 (C) [ 16.507659] dump_stack_lvl+0x8c/0xd0 [ 16.507704] print_report+0x118/0x5d0 [ 16.507750] kasan_report+0xdc/0x128 [ 16.507807] __asan_report_store1_noabort+0x20/0x30 [ 16.507859] krealloc_less_oob_helper+0xa58/0xc50 [ 16.507906] krealloc_less_oob+0x20/0x38 [ 16.508013] kunit_try_run_case+0x170/0x3f0 [ 16.508066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.508129] kthread+0x328/0x630 [ 16.508314] ret_from_fork+0x10/0x20 [ 16.508378] [ 16.508474] Allocated by task 158: [ 16.508510] kasan_save_stack+0x3c/0x68 [ 16.508578] kasan_save_track+0x20/0x40 [ 16.508696] kasan_save_alloc_info+0x40/0x58 [ 16.508735] __kasan_krealloc+0x118/0x178 [ 16.508772] krealloc_noprof+0x128/0x360 [ 16.508808] krealloc_less_oob_helper+0x168/0xc50 [ 16.508847] krealloc_less_oob+0x20/0x38 [ 16.508881] kunit_try_run_case+0x170/0x3f0 [ 16.508917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.508960] kthread+0x328/0x630 [ 16.508990] ret_from_fork+0x10/0x20 [ 16.509035] [ 16.509053] The buggy address belongs to the object at fff00000c45cfe00 [ 16.509053] which belongs to the cache kmalloc-256 of size 256 [ 16.509109] The buggy address is located 34 bytes to the right of [ 16.509109] allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9) [ 16.509384] [ 16.509484] The buggy address belongs to the physical page: [ 16.509514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce [ 16.509739] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.509912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.509961] page_type: f5(slab) [ 16.510276] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.510398] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.510495] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.510563] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.510701] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff [ 16.510774] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.510856] page dumped because: kasan: bad access detected [ 16.510975] [ 16.511004] Memory state around the buggy address: [ 16.511034] fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.511340] fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.511399] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.511436] ^ [ 16.511473] fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.511515] fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.511578] ================================================================== [ 16.550910] ================================================================== [ 16.550956] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.551004] Write of size 1 at addr fff00000c79ba0da by task kunit_try_catch/162 [ 16.551061] [ 16.551092] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.551170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.551206] Hardware name: linux,dummy-virt (DT) [ 16.551241] Call trace: [ 16.551264] show_stack+0x20/0x38 (C) [ 16.551310] dump_stack_lvl+0x8c/0xd0 [ 16.551367] print_report+0x118/0x5d0 [ 16.551413] kasan_report+0xdc/0x128 [ 16.551457] __asan_report_store1_noabort+0x20/0x30 [ 16.551521] krealloc_less_oob_helper+0xa80/0xc50 [ 16.551569] krealloc_large_less_oob+0x20/0x38 [ 16.551616] kunit_try_run_case+0x170/0x3f0 [ 16.551664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.551716] kthread+0x328/0x630 [ 16.551766] ret_from_fork+0x10/0x20 [ 16.551813] [ 16.551832] The buggy address belongs to the physical page: [ 16.551871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8 [ 16.551923] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.551969] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.552017] page_type: f8(unknown) [ 16.552060] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.552108] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.552166] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.552214] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.552261] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff [ 16.552307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.552355] page dumped because: kasan: bad access detected [ 16.552384] [ 16.552812] Memory state around the buggy address: [ 16.552848] fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.552894] fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.553297] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 16.553360] ^ [ 16.553451] fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.553509] fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.553757] ================================================================== [ 16.496225] ================================================================== [ 16.496272] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 16.496333] Write of size 1 at addr fff00000c45cfeda by task kunit_try_catch/158 [ 16.496383] [ 16.496421] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.496948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.497062] Hardware name: linux,dummy-virt (DT) [ 16.497175] Call trace: [ 16.497212] show_stack+0x20/0x38 (C) [ 16.497263] dump_stack_lvl+0x8c/0xd0 [ 16.497309] print_report+0x118/0x5d0 [ 16.497597] kasan_report+0xdc/0x128 [ 16.497646] __asan_report_store1_noabort+0x20/0x30 [ 16.497696] krealloc_less_oob_helper+0xa80/0xc50 [ 16.497857] krealloc_less_oob+0x20/0x38 [ 16.497972] kunit_try_run_case+0x170/0x3f0 [ 16.498039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.498097] kthread+0x328/0x630 [ 16.498140] ret_from_fork+0x10/0x20 [ 16.498187] [ 16.498205] Allocated by task 158: [ 16.498269] kasan_save_stack+0x3c/0x68 [ 16.498310] kasan_save_track+0x20/0x40 [ 16.498365] kasan_save_alloc_info+0x40/0x58 [ 16.498429] __kasan_krealloc+0x118/0x178 [ 16.498604] krealloc_noprof+0x128/0x360 [ 16.498662] krealloc_less_oob_helper+0x168/0xc50 [ 16.498765] krealloc_less_oob+0x20/0x38 [ 16.498801] kunit_try_run_case+0x170/0x3f0 [ 16.498837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.498878] kthread+0x328/0x630 [ 16.499207] ret_from_fork+0x10/0x20 [ 16.499297] [ 16.499410] The buggy address belongs to the object at fff00000c45cfe00 [ 16.499410] which belongs to the cache kmalloc-256 of size 256 [ 16.499479] The buggy address is located 17 bytes to the right of [ 16.499479] allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9) [ 16.499570] [ 16.499590] The buggy address belongs to the physical page: [ 16.499621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce [ 16.499672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.499718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.499768] page_type: f5(slab) [ 16.499804] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.499911] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.500173] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.500329] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.500378] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff [ 16.500425] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.500464] page dumped because: kasan: bad access detected [ 16.500494] [ 16.500512] Memory state around the buggy address: [ 16.500542] fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.500604] fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.500645] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 16.500681] ^ [ 16.500717] fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.500758] fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.500793] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 16.451531] ================================================================== [ 16.452527] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.452670] Write of size 1 at addr fff00000c45cfceb by task kunit_try_catch/156 [ 16.452848] [ 16.453040] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.453583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.453765] Hardware name: linux,dummy-virt (DT) [ 16.453916] Call trace: [ 16.453942] show_stack+0x20/0x38 (C) [ 16.454389] dump_stack_lvl+0x8c/0xd0 [ 16.454938] print_report+0x118/0x5d0 [ 16.455207] kasan_report+0xdc/0x128 [ 16.455254] __asan_report_store1_noabort+0x20/0x30 [ 16.455674] krealloc_more_oob_helper+0x60c/0x678 [ 16.456291] krealloc_more_oob+0x20/0x38 [ 16.456476] kunit_try_run_case+0x170/0x3f0 [ 16.456526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.456926] kthread+0x328/0x630 [ 16.457258] ret_from_fork+0x10/0x20 [ 16.457377] [ 16.457413] Allocated by task 156: [ 16.457445] kasan_save_stack+0x3c/0x68 [ 16.457634] kasan_save_track+0x20/0x40 [ 16.457708] kasan_save_alloc_info+0x40/0x58 [ 16.458183] __kasan_krealloc+0x118/0x178 [ 16.458375] krealloc_noprof+0x128/0x360 [ 16.458752] krealloc_more_oob_helper+0x168/0x678 [ 16.459065] krealloc_more_oob+0x20/0x38 [ 16.459142] kunit_try_run_case+0x170/0x3f0 [ 16.459181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.459224] kthread+0x328/0x630 [ 16.459854] ret_from_fork+0x10/0x20 [ 16.459942] [ 16.459963] The buggy address belongs to the object at fff00000c45cfc00 [ 16.459963] which belongs to the cache kmalloc-256 of size 256 [ 16.460022] The buggy address is located 0 bytes to the right of [ 16.460022] allocated 235-byte region [fff00000c45cfc00, fff00000c45cfceb) [ 16.460084] [ 16.460105] The buggy address belongs to the physical page: [ 16.460743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce [ 16.460805] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.460853] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.460907] page_type: f5(slab) [ 16.461689] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.461744] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.462152] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.462462] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.462522] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff [ 16.462830] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.463008] page dumped because: kasan: bad access detected [ 16.463212] [ 16.463535] Memory state around the buggy address: [ 16.463768] fff00000c45cfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.464013] fff00000c45cfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.464294] >fff00000c45cfc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.464386] ^ [ 16.464434] fff00000c45cfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.464475] fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.464879] ================================================================== [ 16.466676] ================================================================== [ 16.467244] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.467357] Write of size 1 at addr fff00000c45cfcf0 by task kunit_try_catch/156 [ 16.467738] [ 16.467775] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.468080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.468373] Hardware name: linux,dummy-virt (DT) [ 16.468424] Call trace: [ 16.468536] show_stack+0x20/0x38 (C) [ 16.468834] dump_stack_lvl+0x8c/0xd0 [ 16.468883] print_report+0x118/0x5d0 [ 16.468930] kasan_report+0xdc/0x128 [ 16.468979] __asan_report_store1_noabort+0x20/0x30 [ 16.469030] krealloc_more_oob_helper+0x5c0/0x678 [ 16.469782] krealloc_more_oob+0x20/0x38 [ 16.469858] kunit_try_run_case+0x170/0x3f0 [ 16.469914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.470041] kthread+0x328/0x630 [ 16.470084] ret_from_fork+0x10/0x20 [ 16.470575] [ 16.470896] Allocated by task 156: [ 16.471261] kasan_save_stack+0x3c/0x68 [ 16.471308] kasan_save_track+0x20/0x40 [ 16.471733] kasan_save_alloc_info+0x40/0x58 [ 16.472168] __kasan_krealloc+0x118/0x178 [ 16.472361] krealloc_noprof+0x128/0x360 [ 16.472595] krealloc_more_oob_helper+0x168/0x678 [ 16.472648] krealloc_more_oob+0x20/0x38 [ 16.472684] kunit_try_run_case+0x170/0x3f0 [ 16.472721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.472770] kthread+0x328/0x630 [ 16.473180] ret_from_fork+0x10/0x20 [ 16.473440] [ 16.473699] The buggy address belongs to the object at fff00000c45cfc00 [ 16.473699] which belongs to the cache kmalloc-256 of size 256 [ 16.474189] The buggy address is located 5 bytes to the right of [ 16.474189] allocated 235-byte region [fff00000c45cfc00, fff00000c45cfceb) [ 16.474271] [ 16.474293] The buggy address belongs to the physical page: [ 16.474335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce [ 16.474386] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.474432] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.474483] page_type: f5(slab) [ 16.475295] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.475568] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.475888] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.476182] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.476430] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff [ 16.476506] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.476753] page dumped because: kasan: bad access detected [ 16.476791] [ 16.476862] Memory state around the buggy address: [ 16.476910] fff00000c45cfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.476953] fff00000c45cfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.477200] >fff00000c45cfc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 16.477430] ^ [ 16.477768] fff00000c45cfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.477976] fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.478576] ================================================================== [ 16.522751] ================================================================== [ 16.522803] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 16.522855] Write of size 1 at addr fff00000c79ba0f0 by task kunit_try_catch/160 [ 16.523149] [ 16.523435] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.523659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.523694] Hardware name: linux,dummy-virt (DT) [ 16.524013] Call trace: [ 16.524053] show_stack+0x20/0x38 (C) [ 16.524106] dump_stack_lvl+0x8c/0xd0 [ 16.524420] print_report+0x118/0x5d0 [ 16.524500] kasan_report+0xdc/0x128 [ 16.524761] __asan_report_store1_noabort+0x20/0x30 [ 16.524890] krealloc_more_oob_helper+0x5c0/0x678 [ 16.525270] krealloc_large_more_oob+0x20/0x38 [ 16.525503] kunit_try_run_case+0x170/0x3f0 [ 16.525836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.526019] kthread+0x328/0x630 [ 16.526085] ret_from_fork+0x10/0x20 [ 16.526491] [ 16.526591] The buggy address belongs to the physical page: [ 16.526650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8 [ 16.526946] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.526998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.527049] page_type: f8(unknown) [ 16.527173] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.527237] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.527305] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.527371] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.527419] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff [ 16.527476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.527514] page dumped because: kasan: bad access detected [ 16.527553] [ 16.527570] Memory state around the buggy address: [ 16.527609] fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.527652] fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.527691] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.527737] ^ [ 16.527782] fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.527823] fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.527861] ================================================================== [ 16.518604] ================================================================== [ 16.518660] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 16.518719] Write of size 1 at addr fff00000c79ba0eb by task kunit_try_catch/160 [ 16.518846] [ 16.518940] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.519330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.519357] Hardware name: linux,dummy-virt (DT) [ 16.519386] Call trace: [ 16.519408] show_stack+0x20/0x38 (C) [ 16.519481] dump_stack_lvl+0x8c/0xd0 [ 16.519554] print_report+0x118/0x5d0 [ 16.519601] kasan_report+0xdc/0x128 [ 16.519657] __asan_report_store1_noabort+0x20/0x30 [ 16.519708] krealloc_more_oob_helper+0x60c/0x678 [ 16.519768] krealloc_large_more_oob+0x20/0x38 [ 16.519915] kunit_try_run_case+0x170/0x3f0 [ 16.519962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.520013] kthread+0x328/0x630 [ 16.520081] ret_from_fork+0x10/0x20 [ 16.520128] [ 16.520163] The buggy address belongs to the physical page: [ 16.520193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8 [ 16.520246] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.520292] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.520368] page_type: f8(unknown) [ 16.520416] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.520475] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.520537] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.520719] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.520936] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff [ 16.520983] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.521491] page dumped because: kasan: bad access detected [ 16.521527] [ 16.521546] Memory state around the buggy address: [ 16.521577] fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.521618] fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.521659] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 16.521695] ^ [ 16.521733] fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.521774] fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.521810] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 16.425514] ================================================================== [ 16.425581] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 16.426460] Read of size 1 at addr fff00000c79c0000 by task kunit_try_catch/154 [ 16.426528] [ 16.426571] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.427200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.427736] Hardware name: linux,dummy-virt (DT) [ 16.427797] Call trace: [ 16.427824] show_stack+0x20/0x38 (C) [ 16.427882] dump_stack_lvl+0x8c/0xd0 [ 16.427931] print_report+0x118/0x5d0 [ 16.427978] kasan_report+0xdc/0x128 [ 16.428023] __asan_report_load1_noabort+0x20/0x30 [ 16.428074] page_alloc_uaf+0x328/0x350 [ 16.428662] kunit_try_run_case+0x170/0x3f0 [ 16.428734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.428788] kthread+0x328/0x630 [ 16.428878] ret_from_fork+0x10/0x20 [ 16.428930] [ 16.428951] The buggy address belongs to the physical page: [ 16.429045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079c0 [ 16.429173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.429848] page_type: f0(buddy) [ 16.429910] raw: 0bfffe0000000000 fff00000ff616170 fff00000ff616170 0000000000000000 [ 16.430259] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 16.430567] page dumped because: kasan: bad access detected [ 16.430612] [ 16.430630] Memory state around the buggy address: [ 16.430675] fff00000c79bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.430718] fff00000c79bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.431365] >fff00000c79c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.431671] ^ [ 16.431758] fff00000c79c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.432097] fff00000c79c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.432410] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 16.356711] ================================================================== [ 16.357394] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 16.357741] Free of addr fff00000c669c001 by task kunit_try_catch/150 [ 16.357816] [ 16.358359] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.359123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.359204] Hardware name: linux,dummy-virt (DT) [ 16.359591] Call trace: [ 16.359995] show_stack+0x20/0x38 (C) [ 16.360302] dump_stack_lvl+0x8c/0xd0 [ 16.360580] print_report+0x118/0x5d0 [ 16.360639] kasan_report_invalid_free+0xc0/0xe8 [ 16.360689] __kasan_kfree_large+0x5c/0xa8 [ 16.360736] free_large_kmalloc+0x64/0x190 [ 16.361804] kfree+0x270/0x3c8 [ 16.361861] kmalloc_large_invalid_free+0x108/0x270 [ 16.362461] kunit_try_run_case+0x170/0x3f0 [ 16.362773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.362838] kthread+0x328/0x630 [ 16.363367] ret_from_fork+0x10/0x20 [ 16.364074] [ 16.364191] The buggy address belongs to the physical page: [ 16.364508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669c [ 16.364865] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.365297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.365933] page_type: f8(unknown) [ 16.366145] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.367034] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.367335] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.367387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.367443] head: 0bfffe0000000002 ffffc1ffc319a701 00000000ffffffff 00000000ffffffff [ 16.367490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.368677] page dumped because: kasan: bad access detected [ 16.368727] [ 16.369073] Memory state around the buggy address: [ 16.369312] fff00000c669bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.369764] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.370359] >fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.370742] ^ [ 16.370783] fff00000c669c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.370961] fff00000c669c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.371223] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 16.337293] ================================================================== [ 16.337827] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 16.338435] Read of size 1 at addr fff00000c669c000 by task kunit_try_catch/148 [ 16.338535] [ 16.338571] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.338650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.338675] Hardware name: linux,dummy-virt (DT) [ 16.338823] Call trace: [ 16.338850] show_stack+0x20/0x38 (C) [ 16.338992] dump_stack_lvl+0x8c/0xd0 [ 16.339069] print_report+0x118/0x5d0 [ 16.339229] kasan_report+0xdc/0x128 [ 16.339275] __asan_report_load1_noabort+0x20/0x30 [ 16.339342] kmalloc_large_uaf+0x2cc/0x2f8 [ 16.339412] kunit_try_run_case+0x170/0x3f0 [ 16.339458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.339508] kthread+0x328/0x630 [ 16.339612] ret_from_fork+0x10/0x20 [ 16.339672] [ 16.339700] The buggy address belongs to the physical page: [ 16.340013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669c [ 16.340069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.340131] raw: 0bfffe0000000000 fff00000da479c40 fff00000da479c40 0000000000000000 [ 16.340183] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.340222] page dumped because: kasan: bad access detected [ 16.340252] [ 16.340271] Memory state around the buggy address: [ 16.340538] fff00000c669bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.340854] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.340897] >fff00000c669c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.340960] ^ [ 16.340988] fff00000c669c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.341029] fff00000c669c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.341065] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 16.323521] ================================================================== [ 16.323693] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 16.323748] Write of size 1 at addr fff00000c669e00a by task kunit_try_catch/146 [ 16.323797] [ 16.324203] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.324350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.324377] Hardware name: linux,dummy-virt (DT) [ 16.324408] Call trace: [ 16.324459] show_stack+0x20/0x38 (C) [ 16.324583] dump_stack_lvl+0x8c/0xd0 [ 16.324664] print_report+0x118/0x5d0 [ 16.324709] kasan_report+0xdc/0x128 [ 16.324833] __asan_report_store1_noabort+0x20/0x30 [ 16.324909] kmalloc_large_oob_right+0x278/0x2b8 [ 16.324956] kunit_try_run_case+0x170/0x3f0 [ 16.325238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.325298] kthread+0x328/0x630 [ 16.325404] ret_from_fork+0x10/0x20 [ 16.325464] [ 16.325526] The buggy address belongs to the physical page: [ 16.325558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669c [ 16.325666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.325723] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.325782] page_type: f8(unknown) [ 16.325821] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.325869] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.326092] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.326387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.326438] head: 0bfffe0000000002 ffffc1ffc319a701 00000000ffffffff 00000000ffffffff [ 16.326625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.326788] page dumped because: kasan: bad access detected [ 16.326915] [ 16.326933] Memory state around the buggy address: [ 16.327022] fff00000c669df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.327064] fff00000c669df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.327219] >fff00000c669e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.327400] ^ [ 16.327648] fff00000c669e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.327744] fff00000c669e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.327780] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 16.309894] ================================================================== [ 16.310075] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 16.310220] Write of size 1 at addr fff00000c662df00 by task kunit_try_catch/144 [ 16.310467] [ 16.310500] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.310647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.310769] Hardware name: linux,dummy-virt (DT) [ 16.310844] Call trace: [ 16.310867] show_stack+0x20/0x38 (C) [ 16.310915] dump_stack_lvl+0x8c/0xd0 [ 16.310967] print_report+0x118/0x5d0 [ 16.311099] kasan_report+0xdc/0x128 [ 16.311234] __asan_report_store1_noabort+0x20/0x30 [ 16.311360] kmalloc_big_oob_right+0x2a4/0x2f0 [ 16.311406] kunit_try_run_case+0x170/0x3f0 [ 16.311452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.311502] kthread+0x328/0x630 [ 16.311544] ret_from_fork+0x10/0x20 [ 16.311695] [ 16.312050] Allocated by task 144: [ 16.312263] kasan_save_stack+0x3c/0x68 [ 16.312308] kasan_save_track+0x20/0x40 [ 16.312358] kasan_save_alloc_info+0x40/0x58 [ 16.312396] __kasan_kmalloc+0xd4/0xd8 [ 16.312593] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.312867] kmalloc_big_oob_right+0xb8/0x2f0 [ 16.312913] kunit_try_run_case+0x170/0x3f0 [ 16.312951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.312993] kthread+0x328/0x630 [ 16.313025] ret_from_fork+0x10/0x20 [ 16.313063] [ 16.313084] The buggy address belongs to the object at fff00000c662c000 [ 16.313084] which belongs to the cache kmalloc-8k of size 8192 [ 16.313150] The buggy address is located 0 bytes to the right of [ 16.313150] allocated 7936-byte region [fff00000c662c000, fff00000c662df00) [ 16.313211] [ 16.313253] The buggy address belongs to the physical page: [ 16.313357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106628 [ 16.313646] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.313729] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.314037] page_type: f5(slab) [ 16.314222] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 16.314311] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.314370] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 16.314417] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.314464] head: 0bfffe0000000003 ffffc1ffc3198a01 00000000ffffffff 00000000ffffffff [ 16.314719] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.314761] page dumped because: kasan: bad access detected [ 16.314791] [ 16.314820] Memory state around the buggy address: [ 16.314929] fff00000c662de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.314971] fff00000c662de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.315011] >fff00000c662df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.315047] ^ [ 16.315096] fff00000c662df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.315241] fff00000c662e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.315508] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 16.296443] ================================================================== [ 16.296539] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 16.296592] Write of size 1 at addr fff00000c5b7d778 by task kunit_try_catch/142 [ 16.296947] [ 16.296988] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.297079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.297105] Hardware name: linux,dummy-virt (DT) [ 16.297135] Call trace: [ 16.297157] show_stack+0x20/0x38 (C) [ 16.297206] dump_stack_lvl+0x8c/0xd0 [ 16.297274] print_report+0x118/0x5d0 [ 16.297334] kasan_report+0xdc/0x128 [ 16.297381] __asan_report_store1_noabort+0x20/0x30 [ 16.297432] kmalloc_track_caller_oob_right+0x418/0x488 [ 16.297499] kunit_try_run_case+0x170/0x3f0 [ 16.297549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.297620] kthread+0x328/0x630 [ 16.297834] ret_from_fork+0x10/0x20 [ 16.297974] [ 16.298042] Allocated by task 142: [ 16.298075] kasan_save_stack+0x3c/0x68 [ 16.298141] kasan_save_track+0x20/0x40 [ 16.298178] kasan_save_alloc_info+0x40/0x58 [ 16.298261] __kasan_kmalloc+0xd4/0xd8 [ 16.298463] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.298518] kmalloc_track_caller_oob_right+0x184/0x488 [ 16.298558] kunit_try_run_case+0x170/0x3f0 [ 16.298625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.298667] kthread+0x328/0x630 [ 16.298698] ret_from_fork+0x10/0x20 [ 16.298777] [ 16.298882] The buggy address belongs to the object at fff00000c5b7d700 [ 16.298882] which belongs to the cache kmalloc-128 of size 128 [ 16.299089] The buggy address is located 0 bytes to the right of [ 16.299089] allocated 120-byte region [fff00000c5b7d700, fff00000c5b7d778) [ 16.299205] [ 16.299224] The buggy address belongs to the physical page: [ 16.299254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.299801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.299955] page_type: f5(slab) [ 16.300169] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.300219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.300313] page dumped because: kasan: bad access detected [ 16.300354] [ 16.300371] Memory state around the buggy address: [ 16.300401] fff00000c5b7d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.300625] fff00000c5b7d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300735] >fff00000c5b7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.300794] ^ [ 16.300896] fff00000c5b7d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300963] fff00000c5b7d800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.301008] ================================================================== [ 16.290929] ================================================================== [ 16.290988] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.291275] Write of size 1 at addr fff00000c5b7d678 by task kunit_try_catch/142 [ 16.291515] [ 16.291785] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.292072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.292126] Hardware name: linux,dummy-virt (DT) [ 16.292196] Call trace: [ 16.292227] show_stack+0x20/0x38 (C) [ 16.292376] dump_stack_lvl+0x8c/0xd0 [ 16.292477] print_report+0x118/0x5d0 [ 16.292545] kasan_report+0xdc/0x128 [ 16.292591] __asan_report_store1_noabort+0x20/0x30 [ 16.292642] kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.292691] kunit_try_run_case+0x170/0x3f0 [ 16.292738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.292790] kthread+0x328/0x630 [ 16.292831] ret_from_fork+0x10/0x20 [ 16.292879] [ 16.292897] Allocated by task 142: [ 16.292924] kasan_save_stack+0x3c/0x68 [ 16.292973] kasan_save_track+0x20/0x40 [ 16.293010] kasan_save_alloc_info+0x40/0x58 [ 16.293048] __kasan_kmalloc+0xd4/0xd8 [ 16.293083] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.293125] kmalloc_track_caller_oob_right+0xa8/0x488 [ 16.293233] kunit_try_run_case+0x170/0x3f0 [ 16.293483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.293664] kthread+0x328/0x630 [ 16.293803] ret_from_fork+0x10/0x20 [ 16.293965] [ 16.293985] The buggy address belongs to the object at fff00000c5b7d600 [ 16.293985] which belongs to the cache kmalloc-128 of size 128 [ 16.294306] The buggy address is located 0 bytes to the right of [ 16.294306] allocated 120-byte region [fff00000c5b7d600, fff00000c5b7d678) [ 16.294416] [ 16.294436] The buggy address belongs to the physical page: [ 16.294547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.294705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.294759] page_type: f5(slab) [ 16.294800] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.294849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.294888] page dumped because: kasan: bad access detected [ 16.294929] [ 16.294946] Memory state around the buggy address: [ 16.294977] fff00000c5b7d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.295070] fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.295389] >fff00000c5b7d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.295481] ^ [ 16.295574] fff00000c5b7d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.295621] fff00000c5b7d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.295657] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 16.277559] ================================================================== [ 16.277748] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 16.278011] Read of size 1 at addr fff00000c65b7000 by task kunit_try_catch/140 [ 16.278061] [ 16.278095] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.278202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.278228] Hardware name: linux,dummy-virt (DT) [ 16.278330] Call trace: [ 16.278419] show_stack+0x20/0x38 (C) [ 16.278789] dump_stack_lvl+0x8c/0xd0 [ 16.278936] print_report+0x118/0x5d0 [ 16.278988] kasan_report+0xdc/0x128 [ 16.279034] __asan_report_load1_noabort+0x20/0x30 [ 16.279084] kmalloc_node_oob_right+0x2f4/0x330 [ 16.279132] kunit_try_run_case+0x170/0x3f0 [ 16.279179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.279231] kthread+0x328/0x630 [ 16.279273] ret_from_fork+0x10/0x20 [ 16.279333] [ 16.279352] Allocated by task 140: [ 16.279379] kasan_save_stack+0x3c/0x68 [ 16.279419] kasan_save_track+0x20/0x40 [ 16.279456] kasan_save_alloc_info+0x40/0x58 [ 16.279495] __kasan_kmalloc+0xd4/0xd8 [ 16.279530] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 16.279619] kmalloc_node_oob_right+0xbc/0x330 [ 16.279663] kunit_try_run_case+0x170/0x3f0 [ 16.279699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.279830] kthread+0x328/0x630 [ 16.279900] ret_from_fork+0x10/0x20 [ 16.280100] [ 16.280120] The buggy address belongs to the object at fff00000c65b6000 [ 16.280120] which belongs to the cache kmalloc-4k of size 4096 [ 16.280342] The buggy address is located 0 bytes to the right of [ 16.280342] allocated 4096-byte region [fff00000c65b6000, fff00000c65b7000) [ 16.280408] [ 16.280427] The buggy address belongs to the physical page: [ 16.280510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0 [ 16.280787] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.280843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.280907] page_type: f5(slab) [ 16.280948] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 16.280997] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 16.281313] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 16.281398] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 16.281447] head: 0bfffe0000000003 ffffc1ffc3196c01 00000000ffffffff 00000000ffffffff [ 16.281494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.281647] page dumped because: kasan: bad access detected [ 16.281712] [ 16.281760] Memory state around the buggy address: [ 16.281842] fff00000c65b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.281920] fff00000c65b6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.282045] >fff00000c65b7000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.282082] ^ [ 16.282110] fff00000c65b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.282151] fff00000c65b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.282189] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 16.264028] ================================================================== [ 16.264220] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 16.264406] Read of size 1 at addr fff00000c5a02b7f by task kunit_try_catch/138 [ 16.264675] [ 16.264721] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.264810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.264907] Hardware name: linux,dummy-virt (DT) [ 16.264982] Call trace: [ 16.265004] show_stack+0x20/0x38 (C) [ 16.265053] dump_stack_lvl+0x8c/0xd0 [ 16.265099] print_report+0x118/0x5d0 [ 16.265144] kasan_report+0xdc/0x128 [ 16.265190] __asan_report_load1_noabort+0x20/0x30 [ 16.265241] kmalloc_oob_left+0x2ec/0x320 [ 16.265286] kunit_try_run_case+0x170/0x3f0 [ 16.265344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.265396] kthread+0x328/0x630 [ 16.265661] ret_from_fork+0x10/0x20 [ 16.265734] [ 16.265752] Allocated by task 24: [ 16.265790] kasan_save_stack+0x3c/0x68 [ 16.265831] kasan_save_track+0x20/0x40 [ 16.265868] kasan_save_alloc_info+0x40/0x58 [ 16.265910] __kasan_kmalloc+0xd4/0xd8 [ 16.265946] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.266006] kvasprintf+0xe0/0x180 [ 16.266041] __kthread_create_on_node+0x16c/0x350 [ 16.266180] kthread_create_on_node+0xe4/0x130 [ 16.266219] create_worker+0x380/0x6b8 [ 16.266254] worker_thread+0x808/0xf38 [ 16.266317] kthread+0x328/0x630 [ 16.266518] ret_from_fork+0x10/0x20 [ 16.266653] [ 16.266672] The buggy address belongs to the object at fff00000c5a02b60 [ 16.266672] which belongs to the cache kmalloc-16 of size 16 [ 16.266745] The buggy address is located 19 bytes to the right of [ 16.266745] allocated 12-byte region [fff00000c5a02b60, fff00000c5a02b6c) [ 16.266827] [ 16.266908] The buggy address belongs to the physical page: [ 16.266955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 16.267068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.267136] page_type: f5(slab) [ 16.267202] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.267780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.267827] page dumped because: kasan: bad access detected [ 16.267858] [ 16.267875] Memory state around the buggy address: [ 16.267907] fff00000c5a02a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 05 fc fc [ 16.268250] fff00000c5a02a80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.268348] >fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 16.268385] ^ [ 16.268424] fff00000c5a02b80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.268519] fff00000c5a02c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.268738] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 16.248134] ================================================================== [ 16.248185] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.248672] Write of size 1 at addr fff00000c5b7d578 by task kunit_try_catch/136 [ 16.248723] [ 16.248765] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.248850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.248876] Hardware name: linux,dummy-virt (DT) [ 16.248906] Call trace: [ 16.248928] show_stack+0x20/0x38 (C) [ 16.249054] dump_stack_lvl+0x8c/0xd0 [ 16.249102] print_report+0x118/0x5d0 [ 16.249148] kasan_report+0xdc/0x128 [ 16.249193] __asan_report_store1_noabort+0x20/0x30 [ 16.249243] kmalloc_oob_right+0x538/0x660 [ 16.249288] kunit_try_run_case+0x170/0x3f0 [ 16.249351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.249403] kthread+0x328/0x630 [ 16.249445] ret_from_fork+0x10/0x20 [ 16.249491] [ 16.249509] Allocated by task 136: [ 16.249537] kasan_save_stack+0x3c/0x68 [ 16.249576] kasan_save_track+0x20/0x40 [ 16.249611] kasan_save_alloc_info+0x40/0x58 [ 16.249662] __kasan_kmalloc+0xd4/0xd8 [ 16.249698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.249736] kmalloc_oob_right+0xb0/0x660 [ 16.249818] kunit_try_run_case+0x170/0x3f0 [ 16.249855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.250003] kthread+0x328/0x630 [ 16.250035] ret_from_fork+0x10/0x20 [ 16.250069] [ 16.250087] The buggy address belongs to the object at fff00000c5b7d500 [ 16.250087] which belongs to the cache kmalloc-128 of size 128 [ 16.250142] The buggy address is located 5 bytes to the right of [ 16.250142] allocated 115-byte region [fff00000c5b7d500, fff00000c5b7d573) [ 16.250203] [ 16.250465] The buggy address belongs to the physical page: [ 16.250501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.250599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.250727] page_type: f5(slab) [ 16.250766] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.250816] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.250855] page dumped because: kasan: bad access detected [ 16.250885] [ 16.250903] Memory state around the buggy address: [ 16.250933] fff00000c5b7d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.251126] fff00000c5b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.251169] >fff00000c5b7d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.251205] ^ [ 16.251244] fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.251284] fff00000c5b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.251330] ================================================================== [ 16.252911] ================================================================== [ 16.252958] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.253006] Read of size 1 at addr fff00000c5b7d580 by task kunit_try_catch/136 [ 16.253061] [ 16.253090] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.253167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.253194] Hardware name: linux,dummy-virt (DT) [ 16.253223] Call trace: [ 16.253244] show_stack+0x20/0x38 (C) [ 16.253297] dump_stack_lvl+0x8c/0xd0 [ 16.253560] print_report+0x118/0x5d0 [ 16.253635] kasan_report+0xdc/0x128 [ 16.253787] __asan_report_load1_noabort+0x20/0x30 [ 16.253928] kmalloc_oob_right+0x5d0/0x660 [ 16.253974] kunit_try_run_case+0x170/0x3f0 [ 16.254020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.254071] kthread+0x328/0x630 [ 16.254112] ret_from_fork+0x10/0x20 [ 16.254158] [ 16.254176] Allocated by task 136: [ 16.254209] kasan_save_stack+0x3c/0x68 [ 16.254720] kasan_save_track+0x20/0x40 [ 16.254784] kasan_save_alloc_info+0x40/0x58 [ 16.255219] __kasan_kmalloc+0xd4/0xd8 [ 16.255259] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.255478] kmalloc_oob_right+0xb0/0x660 [ 16.255548] kunit_try_run_case+0x170/0x3f0 [ 16.255795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.255847] kthread+0x328/0x630 [ 16.255889] ret_from_fork+0x10/0x20 [ 16.256034] [ 16.256065] The buggy address belongs to the object at fff00000c5b7d500 [ 16.256065] which belongs to the cache kmalloc-128 of size 128 [ 16.256121] The buggy address is located 13 bytes to the right of [ 16.256121] allocated 115-byte region [fff00000c5b7d500, fff00000c5b7d573) [ 16.256189] [ 16.256375] The buggy address belongs to the physical page: [ 16.256422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.256475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.256550] page_type: f5(slab) [ 16.256634] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.256700] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.256831] page dumped because: kasan: bad access detected [ 16.256875] [ 16.256892] Memory state around the buggy address: [ 16.256922] fff00000c5b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.256963] fff00000c5b7d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.257003] >fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.257039] ^ [ 16.257066] fff00000c5b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.257176] fff00000c5b7d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.257213] ================================================================== [ 16.233656] ================================================================== [ 16.234205] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.235636] Write of size 1 at addr fff00000c5b7d573 by task kunit_try_catch/136 [ 16.235743] [ 16.237851] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 16.238009] Tainted: [N]=TEST [ 16.238042] Hardware name: linux,dummy-virt (DT) [ 16.238392] Call trace: [ 16.238618] show_stack+0x20/0x38 (C) [ 16.239267] dump_stack_lvl+0x8c/0xd0 [ 16.239417] print_report+0x118/0x5d0 [ 16.239470] kasan_report+0xdc/0x128 [ 16.239650] __asan_report_store1_noabort+0x20/0x30 [ 16.239716] kmalloc_oob_right+0x5a4/0x660 [ 16.239769] kunit_try_run_case+0x170/0x3f0 [ 16.239866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.240016] kthread+0x328/0x630 [ 16.240061] ret_from_fork+0x10/0x20 [ 16.240335] [ 16.240379] Allocated by task 136: [ 16.240523] kasan_save_stack+0x3c/0x68 [ 16.240611] kasan_save_track+0x20/0x40 [ 16.240651] kasan_save_alloc_info+0x40/0x58 [ 16.240690] __kasan_kmalloc+0xd4/0xd8 [ 16.240727] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.240767] kmalloc_oob_right+0xb0/0x660 [ 16.241059] kunit_try_run_case+0x170/0x3f0 [ 16.241209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.241347] kthread+0x328/0x630 [ 16.241435] ret_from_fork+0x10/0x20 [ 16.241729] [ 16.242030] The buggy address belongs to the object at fff00000c5b7d500 [ 16.242030] which belongs to the cache kmalloc-128 of size 128 [ 16.242135] The buggy address is located 0 bytes to the right of [ 16.242135] allocated 115-byte region [fff00000c5b7d500, fff00000c5b7d573) [ 16.242201] [ 16.242611] The buggy address belongs to the physical page: [ 16.242840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.243399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.244252] page_type: f5(slab) [ 16.244888] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.244954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.245178] page dumped because: kasan: bad access detected [ 16.245257] [ 16.245297] Memory state around the buggy address: [ 16.245533] fff00000c5b7d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.245600] fff00000c5b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.245971] >fff00000c5b7d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.246044] ^ [ 16.246136] fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.246178] fff00000c5b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.246499] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 95.016224] WARNING: CPU: 1 PID: 656 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 95.018276] Modules linked in: [ 95.018546] CPU: 1 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc6 #1 PREEMPT [ 95.019473] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 95.020032] Hardware name: linux,dummy-virt (DT) [ 95.020521] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 95.021336] pc : intlog10+0x38/0x48 [ 95.021655] lr : intlog10_test+0xe4/0x200 [ 95.022104] sp : ffff8000823f7c10 [ 95.022459] x29: ffff8000823f7c90 x28: 0000000000000000 x27: 0000000000000000 [ 95.022986] x26: 1ffe0000187eba21 x25: 0000000000000000 x24: ffff8000823f7ce0 [ 95.023346] x23: ffff8000823f7d00 x22: 0000000000000000 x21: 1ffff0001047ef82 [ 95.023692] x20: ffffaeee58c89d80 x19: ffff800080087990 x18: 000000004403f9f9 [ 95.024038] x17: 000000001e265eb1 x16: fff00000c0975c3c x15: fff00000ff616b08 [ 95.024515] x14: 0000000000018fff x13: 1ffe00001b48a7cd x12: ffff75ddcb963379 [ 95.025286] x11: 1ffff5ddcb963378 x10: ffff75ddcb963378 x9 : ffffaeee56234e9c [ 95.026041] x8 : ffffaeee5cb19bc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 95.026790] x5 : ffff70001047ef82 x4 : 1ffff00010010f3a x3 : 1ffff5ddcb1913b0 [ 95.027529] x2 : 1ffff5ddcb1913b0 x1 : 0000000000000003 x0 : 0000000000000000 [ 95.028268] Call trace: [ 95.028581] intlog10+0x38/0x48 (P) [ 95.029021] kunit_try_run_case+0x170/0x3f0 [ 95.029536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 95.030239] kthread+0x328/0x630 [ 95.030623] ret_from_fork+0x10/0x20 [ 95.031027] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 94.967828] WARNING: CPU: 1 PID: 638 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 94.970777] Modules linked in: [ 94.971307] CPU: 1 UID: 0 PID: 638 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc6 #1 PREEMPT [ 94.972484] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 94.973059] Hardware name: linux,dummy-virt (DT) [ 94.973596] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.974374] pc : intlog2+0xd8/0xf8 [ 94.974794] lr : intlog2_test+0xe4/0x200 [ 94.975208] sp : ffff800082347c10 [ 94.975586] x29: ffff800082347c90 x28: 0000000000000000 x27: 0000000000000000 [ 94.976628] x26: 1ffe000018e8b081 x25: 0000000000000000 x24: ffff800082347ce0 [ 94.978034] x23: ffff800082347d00 x22: 0000000000000000 x21: 1ffff00010468f82 [ 94.978437] x20: ffffaeee58c89c80 x19: ffff800080087990 x18: 000000004d6f4d91 [ 94.978781] x17: 00000000130019ae x16: fff00000c0975c3c x15: fff00000ff616b08 [ 94.979118] x14: 0000000000018fff x13: 1ffe00001b48a7cd x12: ffff75ddcb963379 [ 94.979757] x11: 1ffff5ddcb963378 x10: ffff75ddcb963378 x9 : ffffaeee5623509c [ 94.980536] x8 : ffffaeee5cb19bc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 94.981457] x5 : ffff700010468f82 x4 : 1ffff00010010f3a x3 : 1ffff5ddcb191390 [ 94.982282] x2 : 1ffff5ddcb191390 x1 : 0000000000000003 x0 : 0000000000000000 [ 94.983111] Call trace: [ 94.983500] intlog2+0xd8/0xf8 (P) [ 94.983911] kunit_try_run_case+0x170/0x3f0 [ 94.984423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.985120] kthread+0x328/0x630 [ 94.985548] ret_from_fork+0x10/0x20 [ 94.986052] ---[ end trace 0000000000000000 ]---