Build

Regressions (compared to v6.13-rc7-41-g7f5b6a8ec18e)

qemu-arm64, kselftest-net-mptcp

qemu-arm64, kselftest-seccomp

qemu-arm64, ltp-controllers

Fixes (compared to v6.13-rc7-41-g7f5b6a8ec18e)

qemu-arm64, ltp-fs

Boot Parser (compared to v6.13-rc7-41-g7f5b6a8ec18e)

qemu-arm64, log-parser-boot


[ 30.918083] ================================================================== [ 30.919245] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 30.919977] Read of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274 [ 30.921395] [ 30.921898] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.922819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.923348] Hardware name: linux,dummy-virt (DT) [ 30.923920] Call trace: [ 30.924286] show_stack+0x20/0x38 (C) [ 30.925394] dump_stack_lvl+0x8c/0xd0 [ 30.925818] print_report+0x118/0x5e0 [ 30.926500] kasan_report+0xc8/0x118 [ 30.927207] kasan_check_range+0x100/0x1a8 [ 30.927952] __kasan_check_read+0x20/0x30 [ 30.928653] copy_user_test_oob+0x3c8/0xec0 [ 30.929399] kunit_try_run_case+0x14c/0x3d0 [ 30.930128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.930972] kthread+0x24c/0x2d0 [ 30.931618] ret_from_fork+0x10/0x20 [ 30.932350] [ 30.932805] Allocated by task 274: [ 30.933366] kasan_save_stack+0x3c/0x68 [ 30.934040] kasan_save_track+0x20/0x40 [ 30.934605] kasan_save_alloc_info+0x40/0x58 [ 30.935260] __kasan_kmalloc+0xd4/0xd8 [ 30.935819] __kmalloc_noprof+0x188/0x4c8 [ 30.936409] kunit_kmalloc_array+0x34/0x88 [ 30.936950] copy_user_test_oob+0xac/0xec0 [ 30.937634] kunit_try_run_case+0x14c/0x3d0 [ 30.938189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.939023] kthread+0x24c/0x2d0 [ 30.939579] ret_from_fork+0x10/0x20 [ 30.940220] [ 30.940625] The buggy address belongs to the object at fff00000c5d54b00 [ 30.940625] which belongs to the cache kmalloc-128 of size 128 [ 30.942181] The buggy address is located 0 bytes inside of [ 30.942181] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78) [ 30.943621] [ 30.944081] The buggy address belongs to the physical page: [ 30.944873] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54 [ 30.945878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.946838] page_type: f5(slab) [ 30.947327] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.948407] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.949384] page dumped because: kasan: bad access detected [ 30.950229] [ 30.950716] Memory state around the buggy address: [ 30.951299] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.952068] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.953337] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.954043] ^ [ 30.954978] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.955930] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.956912] ==================================================================


[ 30.833952] ================================================================== [ 30.834645] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 30.835354] Read of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274 [ 30.836903] [ 30.837395] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.838498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.839058] Hardware name: linux,dummy-virt (DT) [ 30.839798] Call trace: [ 30.840515] show_stack+0x20/0x38 (C) [ 30.841252] dump_stack_lvl+0x8c/0xd0 [ 30.841932] print_report+0x118/0x5e0 [ 30.842618] kasan_report+0xc8/0x118 [ 30.843372] kasan_check_range+0x100/0x1a8 [ 30.844204] __kasan_check_read+0x20/0x30 [ 30.844781] copy_user_test_oob+0x728/0xec0 [ 30.845324] kunit_try_run_case+0x14c/0x3d0 [ 30.846195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.846996] kthread+0x24c/0x2d0 [ 30.847820] ret_from_fork+0x10/0x20 [ 30.848527] [ 30.848987] Allocated by task 274: [ 30.849430] kasan_save_stack+0x3c/0x68 [ 30.850139] kasan_save_track+0x20/0x40 [ 30.850820] kasan_save_alloc_info+0x40/0x58 [ 30.851599] __kasan_kmalloc+0xd4/0xd8 [ 30.852018] __kmalloc_noprof+0x188/0x4c8 [ 30.853114] kunit_kmalloc_array+0x34/0x88 [ 30.853435] copy_user_test_oob+0xac/0xec0 [ 30.853670] kunit_try_run_case+0x14c/0x3d0 [ 30.854070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.854891] kthread+0x24c/0x2d0 [ 30.855337] ret_from_fork+0x10/0x20 [ 30.856145] [ 30.856842] The buggy address belongs to the object at fff00000c5d54b00 [ 30.856842] which belongs to the cache kmalloc-128 of size 128 [ 30.857933] The buggy address is located 0 bytes inside of [ 30.857933] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78) [ 30.859885] [ 30.860337] The buggy address belongs to the physical page: [ 30.861177] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54 [ 30.862163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.863129] page_type: f5(slab) [ 30.863556] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.864493] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.865269] page dumped because: kasan: bad access detected [ 30.865941] [ 30.866271] Memory state around the buggy address: [ 30.866922] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.867922] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.868653] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.869485] ^ [ 30.870541] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.871562] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.872539] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob-bb59e92c3c34f6799a8c38bbd660f192d269ef0a220d50334b048b3fbef3a9ba/details/) (gcc-13-lkftconfig-kunit)[ 30.958697] ================================================================== [ 30.960012] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 30.960799] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274 [ 30.961463] [ 30.962517] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.963430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.964126] Hardware name: linux,dummy-virt (DT) [ 30.964895] Call trace: [ 30.965443] show_stack+0x20/0x38 (C) [ 30.966188] dump_stack_lvl+0x8c/0xd0 [ 30.966895] print_report+0x118/0x5e0 [ 30.967589] kasan_report+0xc8/0x118 [ 30.968290] kasan_check_range+0x100/0x1a8 [ 30.968854] __kasan_check_write+0x20/0x30 [ 30.969396] copy_user_test_oob+0x434/0xec0 [ 30.969959] kunit_try_run_case+0x14c/0x3d0 [ 30.970504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.971642] kthread+0x24c/0x2d0 [ 30.972298] ret_from_fork+0x10/0x20 [ 30.973003] [ 30.973497] Allocated by task 274: [ 30.974078] kasan_save_stack+0x3c/0x68 [ 30.974730] kasan_save_track+0x20/0x40 [ 30.975450] kasan_save_alloc_info+0x40/0x58 [ 30.976196] __kasan_kmalloc+0xd4/0xd8 [ 30.976889] __kmalloc_noprof+0x188/0x4c8 [ 30.977555] kunit_kmalloc_array+0x34/0x88 [ 30.978261] copy_user_test_oob+0xac/0xec0 [ 30.978999] kunit_try_run_case+0x14c/0x3d0 [ 30.979738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.980578] kthread+0x24c/0x2d0 [ 30.981094] ret_from_fork+0x10/0x20 [ 30.981576] [ 30.982262] The buggy address belongs to the object at fff00000c5d54b00 [ 30.982262] which belongs to the cache kmalloc-128 of size 128 [ 30.983767] The buggy address is located 0 bytes inside of [ 30.983767] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78) [ 30.985239] [ 30.985551] The buggy address belongs to the physical page: [ 30.986230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54 [ 30.987372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.988271] page_type: f5(slab) [ 30.988974] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.990009] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.990991] page dumped because: kasan: bad access detected [ 30.991800] [ 30.992291] Memory state around the buggy address: [ 30.992846] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.993599] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.994666] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.995564] ^ [ 30.996515] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.997502] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.998455] ==================================================================


[ 30.784487] ================================================================== [ 30.786190] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 30.786914] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274 [ 30.788680] [ 30.789257] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.790350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.791031] Hardware name: linux,dummy-virt (DT) [ 30.791986] Call trace: [ 30.792406] show_stack+0x20/0x38 (C) [ 30.793111] dump_stack_lvl+0x8c/0xd0 [ 30.793803] print_report+0x118/0x5e0 [ 30.794482] kasan_report+0xc8/0x118 [ 30.795352] kasan_check_range+0x100/0x1a8 [ 30.795927] __kasan_check_write+0x20/0x30 [ 30.796467] copy_user_test_oob+0x234/0xec0 [ 30.797022] kunit_try_run_case+0x14c/0x3d0 [ 30.797563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.798643] kthread+0x24c/0x2d0 [ 30.799772] ret_from_fork+0x10/0x20 [ 30.800173] [ 30.800613] Allocated by task 274: [ 30.801197] kasan_save_stack+0x3c/0x68 [ 30.801707] kasan_save_track+0x20/0x40 [ 30.802468] kasan_save_alloc_info+0x40/0x58 [ 30.803386] __kasan_kmalloc+0xd4/0xd8 [ 30.804082] __kmalloc_noprof+0x188/0x4c8 [ 30.805255] kunit_kmalloc_array+0x34/0x88 [ 30.805965] copy_user_test_oob+0xac/0xec0 [ 30.806652] kunit_try_run_case+0x14c/0x3d0 [ 30.807498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.808439] kthread+0x24c/0x2d0 [ 30.809141] ret_from_fork+0x10/0x20 [ 30.809631] [ 30.809954] The buggy address belongs to the object at fff00000c5d54b00 [ 30.809954] which belongs to the cache kmalloc-128 of size 128 [ 30.811820] The buggy address is located 0 bytes inside of [ 30.811820] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78) [ 30.813260] [ 30.813717] The buggy address belongs to the physical page: [ 30.814467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54 [ 30.815689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.816593] page_type: f5(slab) [ 30.817226] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.818223] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.819032] page dumped because: kasan: bad access detected [ 30.820024] [ 30.820470] Memory state around the buggy address: [ 30.821174] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.822038] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.823818] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.824550] ^ [ 30.825489] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.826300] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.827257] ==================================================================


[ 30.880906] ================================================================== [ 30.881729] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 30.882484] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274 [ 30.883189] [ 30.883600] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.884670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.885291] Hardware name: linux,dummy-virt (DT) [ 30.885842] Call trace: [ 30.886373] show_stack+0x20/0x38 (C) [ 30.887108] dump_stack_lvl+0x8c/0xd0 [ 30.887778] print_report+0x118/0x5e0 [ 30.888480] kasan_report+0xc8/0x118 [ 30.889048] kasan_check_range+0x100/0x1a8 [ 30.889720] __kasan_check_write+0x20/0x30 [ 30.890384] copy_user_test_oob+0x35c/0xec0 [ 30.891060] kunit_try_run_case+0x14c/0x3d0 [ 30.891705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.892444] kthread+0x24c/0x2d0 [ 30.892971] ret_from_fork+0x10/0x20 [ 30.893529] [ 30.893834] Allocated by task 274: [ 30.894355] kasan_save_stack+0x3c/0x68 [ 30.894960] kasan_save_track+0x20/0x40 [ 30.895561] kasan_save_alloc_info+0x40/0x58 [ 30.896185] __kasan_kmalloc+0xd4/0xd8 [ 30.896795] __kmalloc_noprof+0x188/0x4c8 [ 30.897399] kunit_kmalloc_array+0x34/0x88 [ 30.898025] copy_user_test_oob+0xac/0xec0 [ 30.898654] kunit_try_run_case+0x14c/0x3d0 [ 30.899286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.900015] kthread+0x24c/0x2d0 [ 30.900546] ret_from_fork+0x10/0x20 [ 30.901121] [ 30.901468] The buggy address belongs to the object at fff00000c5d54b00 [ 30.901468] which belongs to the cache kmalloc-128 of size 128 [ 30.902831] The buggy address is located 0 bytes inside of [ 30.902831] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78) [ 30.904156] [ 30.904527] The buggy address belongs to the physical page: [ 30.905303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54 [ 30.906205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.907087] page_type: f5(slab) [ 30.907678] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.908595] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.909427] page dumped because: kasan: bad access detected [ 30.910162] [ 30.910513] Memory state around the buggy address: [ 30.911174] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.912008] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.912870] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.913683] ^ [ 30.914510] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.915358] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.916171] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper-50c8c2972deebe6938818981d6047ed3528268af59f1328b96aac74153036265/details/) (gcc-13-lkftconfig-kunit)[ 29.442210] ================================================================== [ 29.443300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.444231] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.445237] [ 29.445691] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.446856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.447475] Hardware name: linux,dummy-virt (DT) [ 29.448149] Call trace: [ 29.448626] show_stack+0x20/0x38 (C) [ 29.449279] dump_stack_lvl+0x8c/0xd0 [ 29.449946] print_report+0x118/0x5e0 [ 29.450595] kasan_report+0xc8/0x118 [ 29.451249] kasan_check_range+0x100/0x1a8 [ 29.451908] __kasan_check_read+0x20/0x30 [ 29.452580] kasan_atomics_helper+0xdd4/0x4858 [ 29.453288] kasan_atomics+0x198/0x2e8 [ 29.453803] kunit_try_run_case+0x14c/0x3d0 [ 29.454326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.454973] kthread+0x24c/0x2d0 [ 29.455597] ret_from_fork+0x10/0x20 [ 29.456229] [ 29.456588] Allocated by task 254: [ 29.457187] kasan_save_stack+0x3c/0x68 [ 29.457858] kasan_save_track+0x20/0x40 [ 29.458407] kasan_save_alloc_info+0x40/0x58 [ 29.459128] __kasan_kmalloc+0xd4/0xd8 [ 29.459649] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.460362] kasan_atomics+0xb8/0x2e8 [ 29.460960] kunit_try_run_case+0x14c/0x3d0 [ 29.461571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.462278] kthread+0x24c/0x2d0 [ 29.462837] ret_from_fork+0x10/0x20 [ 29.463377] [ 29.463798] The buggy address belongs to the object at fff00000c5d53180 [ 29.463798] which belongs to the cache kmalloc-64 of size 64 [ 29.465146] The buggy address is located 0 bytes to the right of [ 29.465146] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.466506] [ 29.466836] The buggy address belongs to the physical page: [ 29.467579] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.468519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.469321] page_type: f5(slab) [ 29.469865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.470764] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.471609] page dumped because: kasan: bad access detected [ 29.472275] [ 29.472605] Memory state around the buggy address: [ 29.473247] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.474138] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.475018] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.475831] ^ [ 29.476467] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.477312] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.478126] ==================================================================


[ 28.252662] ================================================================== [ 28.253419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 28.254298] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.255506] [ 28.255891] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.256821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.257300] Hardware name: linux,dummy-virt (DT) [ 28.258887] Call trace: [ 28.259205] show_stack+0x20/0x38 (C) [ 28.260197] dump_stack_lvl+0x8c/0xd0 [ 28.260983] print_report+0x118/0x5e0 [ 28.261551] kasan_report+0xc8/0x118 [ 28.262001] kasan_check_range+0x100/0x1a8 [ 28.262696] __kasan_check_read+0x20/0x30 [ 28.263727] kasan_atomics_helper+0x2b0/0x4858 [ 28.264346] kasan_atomics+0x198/0x2e8 [ 28.264994] kunit_try_run_case+0x14c/0x3d0 [ 28.265663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.266437] kthread+0x24c/0x2d0 [ 28.267112] ret_from_fork+0x10/0x20 [ 28.267669] [ 28.268027] Allocated by task 254: [ 28.268609] kasan_save_stack+0x3c/0x68 [ 28.269283] kasan_save_track+0x20/0x40 [ 28.269868] kasan_save_alloc_info+0x40/0x58 [ 28.270509] __kasan_kmalloc+0xd4/0xd8 [ 28.271198] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.271858] kasan_atomics+0xb8/0x2e8 [ 28.272379] kunit_try_run_case+0x14c/0x3d0 [ 28.273094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.273887] kthread+0x24c/0x2d0 [ 28.274408] ret_from_fork+0x10/0x20 [ 28.274969] [ 28.275319] The buggy address belongs to the object at fff00000c5d53180 [ 28.275319] which belongs to the cache kmalloc-64 of size 64 [ 28.276759] The buggy address is located 0 bytes to the right of [ 28.276759] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.278024] [ 28.278356] The buggy address belongs to the physical page: [ 28.279042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.280655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.281410] page_type: f5(slab) [ 28.282150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.283321] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.284386] page dumped because: kasan: bad access detected [ 28.285295] [ 28.285610] Memory state around the buggy address: [ 28.286390] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.287391] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.288555] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.289277] ^ [ 28.289954] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.290934] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.292059] ==================================================================


[ 28.168361] ================================================================== [ 28.169061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 28.170922] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.171342] [ 28.171600] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.172985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.173786] Hardware name: linux,dummy-virt (DT) [ 28.174359] Call trace: [ 28.174877] show_stack+0x20/0x38 (C) [ 28.175732] dump_stack_lvl+0x8c/0xd0 [ 28.176446] print_report+0x118/0x5e0 [ 28.177158] kasan_report+0xc8/0x118 [ 28.177789] kasan_check_range+0x100/0x1a8 [ 28.178495] __kasan_check_read+0x20/0x30 [ 28.179430] kasan_atomics_helper+0x1ec/0x4858 [ 28.180172] kasan_atomics+0x198/0x2e8 [ 28.180882] kunit_try_run_case+0x14c/0x3d0 [ 28.181418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.182153] kthread+0x24c/0x2d0 [ 28.182819] ret_from_fork+0x10/0x20 [ 28.183402] [ 28.184145] Allocated by task 254: [ 28.184914] kasan_save_stack+0x3c/0x68 [ 28.185490] kasan_save_track+0x20/0x40 [ 28.186000] kasan_save_alloc_info+0x40/0x58 [ 28.186499] __kasan_kmalloc+0xd4/0xd8 [ 28.187234] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.188031] kasan_atomics+0xb8/0x2e8 [ 28.188673] kunit_try_run_case+0x14c/0x3d0 [ 28.189573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.190263] kthread+0x24c/0x2d0 [ 28.191913] ret_from_fork+0x10/0x20 [ 28.192869] [ 28.193416] The buggy address belongs to the object at fff00000c5d53180 [ 28.193416] which belongs to the cache kmalloc-64 of size 64 [ 28.194627] The buggy address is located 0 bytes to the right of [ 28.194627] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.196511] [ 28.196996] The buggy address belongs to the physical page: [ 28.197755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.198615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.199807] page_type: f5(slab) [ 28.200331] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.201269] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.202146] page dumped because: kasan: bad access detected [ 28.202841] [ 28.203233] Memory state around the buggy address: [ 28.203673] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.205555] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.206310] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.207352] ^ [ 28.208164] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.208782] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.210320] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper-82d261eb7edfb6ad5e1e2cd2d5402c3638e845f6ab651e0cb8e804f392a6c210/details/) (gcc-13-lkftconfig-kunit)[ 28.669299] ================================================================== [ 28.670464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 28.671549] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.672608] [ 28.673056] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.674226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.674822] Hardware name: linux,dummy-virt (DT) [ 28.675505] Call trace: [ 28.675964] show_stack+0x20/0x38 (C) [ 28.676632] dump_stack_lvl+0x8c/0xd0 [ 28.677239] print_report+0x118/0x5e0 [ 28.677757] kasan_report+0xc8/0x118 [ 28.678241] kasan_check_range+0x100/0x1a8 [ 28.678826] __kasan_check_write+0x20/0x30 [ 28.679535] kasan_atomics_helper+0x61c/0x4858 [ 28.680286] kasan_atomics+0x198/0x2e8 [ 28.680885] kunit_try_run_case+0x14c/0x3d0 [ 28.681504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.682061] kthread+0x24c/0x2d0 [ 28.682430] ret_from_fork+0x10/0x20 [ 28.683365] [ 28.683633] Allocated by task 254: [ 28.684598] kasan_save_stack+0x3c/0x68 [ 28.685134] kasan_save_track+0x20/0x40 [ 28.685680] kasan_save_alloc_info+0x40/0x58 [ 28.686309] __kasan_kmalloc+0xd4/0xd8 [ 28.686848] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.687395] kasan_atomics+0xb8/0x2e8 [ 28.687911] kunit_try_run_case+0x14c/0x3d0 [ 28.688413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.689116] kthread+0x24c/0x2d0 [ 28.689580] ret_from_fork+0x10/0x20 [ 28.690147] [ 28.690507] The buggy address belongs to the object at fff00000c5d53180 [ 28.690507] which belongs to the cache kmalloc-64 of size 64 [ 28.691805] The buggy address is located 0 bytes to the right of [ 28.691805] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.693057] [ 28.693430] The buggy address belongs to the physical page: [ 28.694044] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.694964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.695731] page_type: f5(slab) [ 28.696210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.697043] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.697830] page dumped because: kasan: bad access detected [ 28.698466] [ 28.698823] Memory state around the buggy address: [ 28.699424] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.700198] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.700972] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.701831] ^ [ 28.702465] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.703233] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.704039] ==================================================================


[ 28.817251] ================================================================== [ 28.817986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 28.819046] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.819954] [ 28.820326] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.821529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.822113] Hardware name: linux,dummy-virt (DT) [ 28.822708] Call trace: [ 28.823162] show_stack+0x20/0x38 (C) [ 28.823776] dump_stack_lvl+0x8c/0xd0 [ 28.824501] print_report+0x118/0x5e0 [ 28.825102] kasan_report+0xc8/0x118 [ 28.825796] kasan_check_range+0x100/0x1a8 [ 28.826488] __kasan_check_write+0x20/0x30 [ 28.827160] kasan_atomics_helper+0x7cc/0x4858 [ 28.827810] kasan_atomics+0x198/0x2e8 [ 28.828451] kunit_try_run_case+0x14c/0x3d0 [ 28.829113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.829869] kthread+0x24c/0x2d0 [ 28.830431] ret_from_fork+0x10/0x20 [ 28.831055] [ 28.831400] Allocated by task 254: [ 28.831935] kasan_save_stack+0x3c/0x68 [ 28.832569] kasan_save_track+0x20/0x40 [ 28.833148] kasan_save_alloc_info+0x40/0x58 [ 28.833771] __kasan_kmalloc+0xd4/0xd8 [ 28.834341] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.835001] kasan_atomics+0xb8/0x2e8 [ 28.835565] kunit_try_run_case+0x14c/0x3d0 [ 28.836192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.836890] kthread+0x24c/0x2d0 [ 28.837353] ret_from_fork+0x10/0x20 [ 28.837909] [ 28.838244] The buggy address belongs to the object at fff00000c5d53180 [ 28.838244] which belongs to the cache kmalloc-64 of size 64 [ 28.839564] The buggy address is located 0 bytes to the right of [ 28.839564] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.840911] [ 28.841312] The buggy address belongs to the physical page: [ 28.841975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.843047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.843885] page_type: f5(slab) [ 28.844351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.845347] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.846217] page dumped because: kasan: bad access detected [ 28.846925] [ 28.847254] Memory state around the buggy address: [ 28.847952] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.848789] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.849690] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.850502] ^ [ 28.851159] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.852015] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.852821] ==================================================================


[ 29.369036] ================================================================== [ 29.369999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.370761] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.371576] [ 29.371839] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.372633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.373028] Hardware name: linux,dummy-virt (DT) [ 29.373608] Call trace: [ 29.373966] show_stack+0x20/0x38 (C) [ 29.374440] dump_stack_lvl+0x8c/0xd0 [ 29.375065] print_report+0x118/0x5e0 [ 29.375640] kasan_report+0xc8/0x118 [ 29.376230] kasan_check_range+0x100/0x1a8 [ 29.376965] __kasan_check_write+0x20/0x30 [ 29.377588] kasan_atomics_helper+0xd3c/0x4858 [ 29.378185] kasan_atomics+0x198/0x2e8 [ 29.378701] kunit_try_run_case+0x14c/0x3d0 [ 29.379361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.380045] kthread+0x24c/0x2d0 [ 29.380484] ret_from_fork+0x10/0x20 [ 29.381149] [ 29.381473] Allocated by task 254: [ 29.382013] kasan_save_stack+0x3c/0x68 [ 29.382584] kasan_save_track+0x20/0x40 [ 29.383166] kasan_save_alloc_info+0x40/0x58 [ 29.383759] __kasan_kmalloc+0xd4/0xd8 [ 29.384271] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.384823] kasan_atomics+0xb8/0x2e8 [ 29.385409] kunit_try_run_case+0x14c/0x3d0 [ 29.385979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.386648] kthread+0x24c/0x2d0 [ 29.387162] ret_from_fork+0x10/0x20 [ 29.387733] [ 29.388077] The buggy address belongs to the object at fff00000c5d53180 [ 29.388077] which belongs to the cache kmalloc-64 of size 64 [ 29.389267] The buggy address is located 0 bytes to the right of [ 29.389267] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.390512] [ 29.390910] The buggy address belongs to the physical page: [ 29.391533] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.392382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.393146] page_type: f5(slab) [ 29.393647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.394486] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.395341] page dumped because: kasan: bad access detected [ 29.395948] [ 29.396275] Memory state around the buggy address: [ 29.396872] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.397631] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.398455] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.399241] ^ [ 29.399886] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.400624] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.401409] ==================================================================


[ 29.900908] ================================================================== [ 29.901642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 29.903085] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.904218] [ 29.904782] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.905736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.906459] Hardware name: linux,dummy-virt (DT) [ 29.907192] Call trace: [ 29.907692] show_stack+0x20/0x38 (C) [ 29.908413] dump_stack_lvl+0x8c/0xd0 [ 29.909072] print_report+0x118/0x5e0 [ 29.909756] kasan_report+0xc8/0x118 [ 29.910280] kasan_check_range+0x100/0x1a8 [ 29.910857] __kasan_check_write+0x20/0x30 [ 29.911429] kasan_atomics_helper+0x11f8/0x4858 [ 29.912384] kasan_atomics+0x198/0x2e8 [ 29.913099] kunit_try_run_case+0x14c/0x3d0 [ 29.913819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.914646] kthread+0x24c/0x2d0 [ 29.915301] ret_from_fork+0x10/0x20 [ 29.915975] [ 29.916448] Allocated by task 254: [ 29.917062] kasan_save_stack+0x3c/0x68 [ 29.917722] kasan_save_track+0x20/0x40 [ 29.918405] kasan_save_alloc_info+0x40/0x58 [ 29.919123] __kasan_kmalloc+0xd4/0xd8 [ 29.919779] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.920502] kasan_atomics+0xb8/0x2e8 [ 29.921148] kunit_try_run_case+0x14c/0x3d0 [ 29.921690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.922350] kthread+0x24c/0x2d0 [ 29.923123] ret_from_fork+0x10/0x20 [ 29.923763] [ 29.924208] The buggy address belongs to the object at fff00000c5d53180 [ 29.924208] which belongs to the cache kmalloc-64 of size 64 [ 29.925776] The buggy address is located 0 bytes to the right of [ 29.925776] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.927093] [ 29.927567] The buggy address belongs to the physical page: [ 29.928336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.929314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.930064] page_type: f5(slab) [ 29.930518] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.931324] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.932402] page dumped because: kasan: bad access detected [ 29.933170] [ 29.933657] Memory state around the buggy address: [ 29.934375] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.935301] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.936220] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.937128] ^ [ 29.937860] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.938814] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.939699] ==================================================================


[ 30.447263] ================================================================== [ 30.447920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 30.448686] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.450096] [ 30.450405] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.451492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.452024] Hardware name: linux,dummy-virt (DT) [ 30.452589] Call trace: [ 30.452976] show_stack+0x20/0x38 (C) [ 30.453508] dump_stack_lvl+0x8c/0xd0 [ 30.454192] print_report+0x118/0x5e0 [ 30.454733] kasan_report+0xc8/0x118 [ 30.455254] kasan_check_range+0x100/0x1a8 [ 30.455899] __kasan_check_write+0x20/0x30 [ 30.456444] kasan_atomics_helper+0x175c/0x4858 [ 30.457062] kasan_atomics+0x198/0x2e8 [ 30.457597] kunit_try_run_case+0x14c/0x3d0 [ 30.458588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.459441] kthread+0x24c/0x2d0 [ 30.460095] ret_from_fork+0x10/0x20 [ 30.460631] [ 30.460954] Allocated by task 254: [ 30.461489] kasan_save_stack+0x3c/0x68 [ 30.461961] kasan_save_track+0x20/0x40 [ 30.462518] kasan_save_alloc_info+0x40/0x58 [ 30.463127] __kasan_kmalloc+0xd4/0xd8 [ 30.463720] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.464307] kasan_atomics+0xb8/0x2e8 [ 30.464856] kunit_try_run_case+0x14c/0x3d0 [ 30.465448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.466144] kthread+0x24c/0x2d0 [ 30.466609] ret_from_fork+0x10/0x20 [ 30.467262] [ 30.467554] The buggy address belongs to the object at fff00000c5d53180 [ 30.467554] which belongs to the cache kmalloc-64 of size 64 [ 30.468760] The buggy address is located 0 bytes to the right of [ 30.468760] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.470022] [ 30.470352] The buggy address belongs to the physical page: [ 30.471047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.472042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.472790] page_type: f5(slab) [ 30.473287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.474099] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.474947] page dumped because: kasan: bad access detected [ 30.475551] [ 30.475927] Memory state around the buggy address: [ 30.476475] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.477227] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.477986] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.478859] ^ [ 30.479414] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.480242] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.481034] ==================================================================


[ 29.143326] ================================================================== [ 29.144135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 29.144896] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.145554] [ 29.145958] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.146921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.147439] Hardware name: linux,dummy-virt (DT) [ 29.148032] Call trace: [ 29.148456] show_stack+0x20/0x38 (C) [ 29.149080] dump_stack_lvl+0x8c/0xd0 [ 29.149676] print_report+0x118/0x5e0 [ 29.150264] kasan_report+0xc8/0x118 [ 29.150875] kasan_check_range+0x100/0x1a8 [ 29.151443] __kasan_check_write+0x20/0x30 [ 29.152091] kasan_atomics_helper+0xb70/0x4858 [ 29.152692] kasan_atomics+0x198/0x2e8 [ 29.153258] kunit_try_run_case+0x14c/0x3d0 [ 29.153886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.154616] kthread+0x24c/0x2d0 [ 29.155196] ret_from_fork+0x10/0x20 [ 29.155704] [ 29.156048] Allocated by task 254: [ 29.156503] kasan_save_stack+0x3c/0x68 [ 29.157123] kasan_save_track+0x20/0x40 [ 29.157621] kasan_save_alloc_info+0x40/0x58 [ 29.158180] __kasan_kmalloc+0xd4/0xd8 [ 29.158697] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.159418] kasan_atomics+0xb8/0x2e8 [ 29.159911] kunit_try_run_case+0x14c/0x3d0 [ 29.160505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.161141] kthread+0x24c/0x2d0 [ 29.161711] ret_from_fork+0x10/0x20 [ 29.162225] [ 29.162508] The buggy address belongs to the object at fff00000c5d53180 [ 29.162508] which belongs to the cache kmalloc-64 of size 64 [ 29.163686] The buggy address is located 0 bytes to the right of [ 29.163686] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.165038] [ 29.165377] The buggy address belongs to the physical page: [ 29.166071] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.166888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.167688] page_type: f5(slab) [ 29.168153] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.169103] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.169899] page dumped because: kasan: bad access detected [ 29.170578] [ 29.170899] Memory state around the buggy address: [ 29.171469] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.172243] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.173016] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.173833] ^ [ 29.174463] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.175200] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.176045] ==================================================================


[ 28.999916] ================================================================== [ 29.000671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 29.001459] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.002225] [ 29.002575] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.003524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.004252] Hardware name: linux,dummy-virt (DT) [ 29.004776] Call trace: [ 29.005144] show_stack+0x20/0x38 (C) [ 29.005637] dump_stack_lvl+0x8c/0xd0 [ 29.006208] print_report+0x118/0x5e0 [ 29.006673] kasan_report+0xc8/0x118 [ 29.007221] kasan_check_range+0x100/0x1a8 [ 29.007793] __kasan_check_write+0x20/0x30 [ 29.008454] kasan_atomics_helper+0xa04/0x4858 [ 29.009046] kasan_atomics+0x198/0x2e8 [ 29.009779] kunit_try_run_case+0x14c/0x3d0 [ 29.010472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.011183] kthread+0x24c/0x2d0 [ 29.011822] ret_from_fork+0x10/0x20 [ 29.012457] [ 29.012841] Allocated by task 254: [ 29.013355] kasan_save_stack+0x3c/0x68 [ 29.013961] kasan_save_track+0x20/0x40 [ 29.014524] kasan_save_alloc_info+0x40/0x58 [ 29.015152] __kasan_kmalloc+0xd4/0xd8 [ 29.015699] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.016385] kasan_atomics+0xb8/0x2e8 [ 29.016860] kunit_try_run_case+0x14c/0x3d0 [ 29.017541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.018299] kthread+0x24c/0x2d0 [ 29.018850] ret_from_fork+0x10/0x20 [ 29.019369] [ 29.019728] The buggy address belongs to the object at fff00000c5d53180 [ 29.019728] which belongs to the cache kmalloc-64 of size 64 [ 29.021242] The buggy address is located 0 bytes to the right of [ 29.021242] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.023051] [ 29.023494] The buggy address belongs to the physical page: [ 29.024128] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.024951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.025795] page_type: f5(slab) [ 29.026258] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.027139] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.027999] page dumped because: kasan: bad access detected [ 29.028651] [ 29.028953] Memory state around the buggy address: [ 29.029486] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.030323] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.031102] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.031919] ^ [ 29.032499] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.033346] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.034118] ==================================================================


[ 28.420504] ================================================================== [ 28.421335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 28.422121] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.422996] [ 28.423389] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.424710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.425422] Hardware name: linux,dummy-virt (DT) [ 28.426412] Call trace: [ 28.426921] show_stack+0x20/0x38 (C) [ 28.428024] dump_stack_lvl+0x8c/0xd0 [ 28.428844] print_report+0x118/0x5e0 [ 28.429625] kasan_report+0xc8/0x118 [ 28.430296] kasan_check_range+0x100/0x1a8 [ 28.430791] __kasan_check_write+0x20/0x30 [ 28.431892] kasan_atomics_helper+0x3ac/0x4858 [ 28.432803] kasan_atomics+0x198/0x2e8 [ 28.433309] kunit_try_run_case+0x14c/0x3d0 [ 28.433854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.434506] kthread+0x24c/0x2d0 [ 28.435431] ret_from_fork+0x10/0x20 [ 28.435928] [ 28.436194] Allocated by task 254: [ 28.437253] kasan_save_stack+0x3c/0x68 [ 28.437933] kasan_save_track+0x20/0x40 [ 28.438518] kasan_save_alloc_info+0x40/0x58 [ 28.439335] __kasan_kmalloc+0xd4/0xd8 [ 28.440085] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.440727] kasan_atomics+0xb8/0x2e8 [ 28.441340] kunit_try_run_case+0x14c/0x3d0 [ 28.441968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.442735] kthread+0x24c/0x2d0 [ 28.444578] ret_from_fork+0x10/0x20 [ 28.444975] [ 28.445340] The buggy address belongs to the object at fff00000c5d53180 [ 28.445340] which belongs to the cache kmalloc-64 of size 64 [ 28.446641] The buggy address is located 0 bytes to the right of [ 28.446641] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.448530] [ 28.449313] The buggy address belongs to the physical page: [ 28.449870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.450989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.452103] page_type: f5(slab) [ 28.452608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.453493] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.454390] page dumped because: kasan: bad access detected [ 28.455304] [ 28.455631] Memory state around the buggy address: [ 28.456137] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.456831] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.457385] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.458821] ^ [ 28.459607] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.460378] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.461420] ==================================================================


[ 29.290796] ================================================================== [ 29.291627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 29.293150] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.293919] [ 29.294160] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.295693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.296499] Hardware name: linux,dummy-virt (DT) [ 29.297172] Call trace: [ 29.297556] show_stack+0x20/0x38 (C) [ 29.298327] dump_stack_lvl+0x8c/0xd0 [ 29.299017] print_report+0x118/0x5e0 [ 29.299671] kasan_report+0xc8/0x118 [ 29.300366] kasan_check_range+0x100/0x1a8 [ 29.301107] __kasan_check_write+0x20/0x30 [ 29.301828] kasan_atomics_helper+0xca0/0x4858 [ 29.302391] kasan_atomics+0x198/0x2e8 [ 29.303129] kunit_try_run_case+0x14c/0x3d0 [ 29.303775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.304586] kthread+0x24c/0x2d0 [ 29.305242] ret_from_fork+0x10/0x20 [ 29.305964] [ 29.306405] Allocated by task 254: [ 29.306960] kasan_save_stack+0x3c/0x68 [ 29.307421] kasan_save_track+0x20/0x40 [ 29.308698] kasan_save_alloc_info+0x40/0x58 [ 29.309135] __kasan_kmalloc+0xd4/0xd8 [ 29.309595] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.311229] kasan_atomics+0xb8/0x2e8 [ 29.311987] kunit_try_run_case+0x14c/0x3d0 [ 29.313085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.314115] kthread+0x24c/0x2d0 [ 29.314495] ret_from_fork+0x10/0x20 [ 29.314930] [ 29.315192] The buggy address belongs to the object at fff00000c5d53180 [ 29.315192] which belongs to the cache kmalloc-64 of size 64 [ 29.316913] The buggy address is located 0 bytes to the right of [ 29.316913] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.318471] [ 29.318795] The buggy address belongs to the physical page: [ 29.319430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.320606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.321473] page_type: f5(slab) [ 29.322104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.323121] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.324106] page dumped because: kasan: bad access detected [ 29.324718] [ 29.325033] Memory state around the buggy address: [ 29.325595] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.326798] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.327736] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.328710] ^ [ 29.329524] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.330407] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.331263] ==================================================================


[ 28.705600] ================================================================== [ 28.706376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 28.707285] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.708579] [ 28.708943] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.710027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.710737] Hardware name: linux,dummy-virt (DT) [ 28.711393] Call trace: [ 28.711841] show_stack+0x20/0x38 (C) [ 28.712415] dump_stack_lvl+0x8c/0xd0 [ 28.712975] print_report+0x118/0x5e0 [ 28.713517] kasan_report+0xc8/0x118 [ 28.714044] kasan_check_range+0x100/0x1a8 [ 28.714700] __kasan_check_write+0x20/0x30 [ 28.715246] kasan_atomics_helper+0x684/0x4858 [ 28.715991] kasan_atomics+0x198/0x2e8 [ 28.716551] kunit_try_run_case+0x14c/0x3d0 [ 28.717176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.717808] kthread+0x24c/0x2d0 [ 28.718378] ret_from_fork+0x10/0x20 [ 28.718944] [ 28.719280] Allocated by task 254: [ 28.719779] kasan_save_stack+0x3c/0x68 [ 28.720290] kasan_save_track+0x20/0x40 [ 28.720927] kasan_save_alloc_info+0x40/0x58 [ 28.721506] __kasan_kmalloc+0xd4/0xd8 [ 28.722058] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.722688] kasan_atomics+0xb8/0x2e8 [ 28.723313] kunit_try_run_case+0x14c/0x3d0 [ 28.723888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.724698] kthread+0x24c/0x2d0 [ 28.725194] ret_from_fork+0x10/0x20 [ 28.725833] [ 28.726164] The buggy address belongs to the object at fff00000c5d53180 [ 28.726164] which belongs to the cache kmalloc-64 of size 64 [ 28.727462] The buggy address is located 0 bytes to the right of [ 28.727462] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.728773] [ 28.729139] The buggy address belongs to the physical page: [ 28.729839] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.730663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.731517] page_type: f5(slab) [ 28.732009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.732914] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.733664] page dumped because: kasan: bad access detected [ 28.734323] [ 28.734668] Memory state around the buggy address: [ 28.735295] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.736032] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.736910] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.737656] ^ [ 28.738567] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.739514] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.740424] ==================================================================


[ 28.963435] ================================================================== [ 28.964151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 28.966261] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.967290] [ 28.967649] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.968514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.969094] Hardware name: linux,dummy-virt (DT) [ 28.969669] Call trace: [ 28.970069] show_stack+0x20/0x38 (C) [ 28.970623] dump_stack_lvl+0x8c/0xd0 [ 28.971205] print_report+0x118/0x5e0 [ 28.971822] kasan_report+0xc8/0x118 [ 28.972417] kasan_check_range+0x100/0x1a8 [ 28.972997] __kasan_check_write+0x20/0x30 [ 28.973558] kasan_atomics_helper+0x99c/0x4858 [ 28.974141] kasan_atomics+0x198/0x2e8 [ 28.974773] kunit_try_run_case+0x14c/0x3d0 [ 28.975331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.976046] kthread+0x24c/0x2d0 [ 28.976612] ret_from_fork+0x10/0x20 [ 28.977149] [ 28.977526] Allocated by task 254: [ 28.978005] kasan_save_stack+0x3c/0x68 [ 28.978511] kasan_save_track+0x20/0x40 [ 28.979127] kasan_save_alloc_info+0x40/0x58 [ 28.979724] __kasan_kmalloc+0xd4/0xd8 [ 28.980275] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.980932] kasan_atomics+0xb8/0x2e8 [ 28.981446] kunit_try_run_case+0x14c/0x3d0 [ 28.981992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.982816] kthread+0x24c/0x2d0 [ 28.983247] ret_from_fork+0x10/0x20 [ 28.983794] [ 28.984138] The buggy address belongs to the object at fff00000c5d53180 [ 28.984138] which belongs to the cache kmalloc-64 of size 64 [ 28.985250] The buggy address is located 0 bytes to the right of [ 28.985250] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.986564] [ 28.986907] The buggy address belongs to the physical page: [ 28.987639] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.988444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.989299] page_type: f5(slab) [ 28.989735] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.990695] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.991560] page dumped because: kasan: bad access detected [ 28.992152] [ 28.992489] Memory state around the buggy address: [ 28.993060] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.993879] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.994688] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.995536] ^ [ 28.996128] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.996942] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.997762] ==================================================================


[ 29.517398] ================================================================== [ 29.518727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.519540] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.520584] [ 29.520906] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.522063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.522840] Hardware name: linux,dummy-virt (DT) [ 29.523461] Call trace: [ 29.524011] show_stack+0x20/0x38 (C) [ 29.524672] dump_stack_lvl+0x8c/0xd0 [ 29.525384] print_report+0x118/0x5e0 [ 29.526041] kasan_report+0xc8/0x118 [ 29.526696] kasan_check_range+0x100/0x1a8 [ 29.527419] __kasan_check_write+0x20/0x30 [ 29.528122] kasan_atomics_helper+0xe44/0x4858 [ 29.528852] kasan_atomics+0x198/0x2e8 [ 29.529527] kunit_try_run_case+0x14c/0x3d0 [ 29.530250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.531046] kthread+0x24c/0x2d0 [ 29.531647] ret_from_fork+0x10/0x20 [ 29.532326] [ 29.532821] Allocated by task 254: [ 29.533395] kasan_save_stack+0x3c/0x68 [ 29.534046] kasan_save_track+0x20/0x40 [ 29.534695] kasan_save_alloc_info+0x40/0x58 [ 29.535297] __kasan_kmalloc+0xd4/0xd8 [ 29.536072] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.536805] kasan_atomics+0xb8/0x2e8 [ 29.537309] kunit_try_run_case+0x14c/0x3d0 [ 29.538093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.538870] kthread+0x24c/0x2d0 [ 29.539466] ret_from_fork+0x10/0x20 [ 29.540170] [ 29.540482] The buggy address belongs to the object at fff00000c5d53180 [ 29.540482] which belongs to the cache kmalloc-64 of size 64 [ 29.541707] The buggy address is located 0 bytes to the right of [ 29.541707] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.543641] [ 29.544153] The buggy address belongs to the physical page: [ 29.544923] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.545906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.546703] page_type: f5(slab) [ 29.547244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.548209] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.549091] page dumped because: kasan: bad access detected [ 29.549759] [ 29.550098] Memory state around the buggy address: [ 29.550760] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.551509] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.552414] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.553221] ^ [ 29.553854] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.554707] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.555527] ==================================================================


[ 29.214098] ================================================================== [ 29.214762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 29.215684] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.216802] [ 29.217539] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.218529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.219327] Hardware name: linux,dummy-virt (DT) [ 29.220055] Call trace: [ 29.220503] show_stack+0x20/0x38 (C) [ 29.221058] dump_stack_lvl+0x8c/0xd0 [ 29.221649] print_report+0x118/0x5e0 [ 29.222192] kasan_report+0xc8/0x118 [ 29.222786] kasan_check_range+0x100/0x1a8 [ 29.223424] __kasan_check_write+0x20/0x30 [ 29.224001] kasan_atomics_helper+0xc08/0x4858 [ 29.224606] kasan_atomics+0x198/0x2e8 [ 29.225185] kunit_try_run_case+0x14c/0x3d0 [ 29.225717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.226446] kthread+0x24c/0x2d0 [ 29.226987] ret_from_fork+0x10/0x20 [ 29.227554] [ 29.227906] Allocated by task 254: [ 29.228380] kasan_save_stack+0x3c/0x68 [ 29.228919] kasan_save_track+0x20/0x40 [ 29.229368] kasan_save_alloc_info+0x40/0x58 [ 29.230003] __kasan_kmalloc+0xd4/0xd8 [ 29.230514] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.231124] kasan_atomics+0xb8/0x2e8 [ 29.231668] kunit_try_run_case+0x14c/0x3d0 [ 29.232264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.233196] kthread+0x24c/0x2d0 [ 29.233607] ret_from_fork+0x10/0x20 [ 29.234372] [ 29.234876] The buggy address belongs to the object at fff00000c5d53180 [ 29.234876] which belongs to the cache kmalloc-64 of size 64 [ 29.236047] The buggy address is located 0 bytes to the right of [ 29.236047] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.237309] [ 29.237618] The buggy address belongs to the physical page: [ 29.238295] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.239185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.239936] page_type: f5(slab) [ 29.240459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.241342] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.242144] page dumped because: kasan: bad access detected [ 29.242805] [ 29.243114] Memory state around the buggy address: [ 29.243693] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.244423] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.245253] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.246074] ^ [ 29.246657] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.247494] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.248252] ==================================================================


[ 29.036397] ================================================================== [ 29.037058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 29.037673] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.039462] [ 29.039726] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.040659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.041249] Hardware name: linux,dummy-virt (DT) [ 29.041841] Call trace: [ 29.042238] show_stack+0x20/0x38 (C) [ 29.042902] dump_stack_lvl+0x8c/0xd0 [ 29.043511] print_report+0x118/0x5e0 [ 29.044115] kasan_report+0xc8/0x118 [ 29.044642] kasan_check_range+0x100/0x1a8 [ 29.045242] __kasan_check_write+0x20/0x30 [ 29.045839] kasan_atomics_helper+0xa6c/0x4858 [ 29.046382] kasan_atomics+0x198/0x2e8 [ 29.047025] kunit_try_run_case+0x14c/0x3d0 [ 29.047651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.048422] kthread+0x24c/0x2d0 [ 29.049016] ret_from_fork+0x10/0x20 [ 29.049567] [ 29.049889] Allocated by task 254: [ 29.050368] kasan_save_stack+0x3c/0x68 [ 29.050953] kasan_save_track+0x20/0x40 [ 29.051445] kasan_save_alloc_info+0x40/0x58 [ 29.052115] __kasan_kmalloc+0xd4/0xd8 [ 29.052639] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.053358] kasan_atomics+0xb8/0x2e8 [ 29.053912] kunit_try_run_case+0x14c/0x3d0 [ 29.054468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.055037] kthread+0x24c/0x2d0 [ 29.055528] ret_from_fork+0x10/0x20 [ 29.056084] [ 29.056385] The buggy address belongs to the object at fff00000c5d53180 [ 29.056385] which belongs to the cache kmalloc-64 of size 64 [ 29.057663] The buggy address is located 0 bytes to the right of [ 29.057663] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.058893] [ 29.059235] The buggy address belongs to the physical page: [ 29.059957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.060779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.061516] page_type: f5(slab) [ 29.061992] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.062828] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.063562] page dumped because: kasan: bad access detected [ 29.064309] [ 29.064680] Memory state around the buggy address: [ 29.065280] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.066132] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.066897] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.067687] ^ [ 29.068315] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.069069] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.069816] ==================================================================


[ 29.860321] ================================================================== [ 29.861563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 29.862525] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.863729] [ 29.864019] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.864972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.865504] Hardware name: linux,dummy-virt (DT) [ 29.866403] Call trace: [ 29.866957] show_stack+0x20/0x38 (C) [ 29.867632] dump_stack_lvl+0x8c/0xd0 [ 29.868364] print_report+0x118/0x5e0 [ 29.869030] kasan_report+0xc8/0x118 [ 29.869700] kasan_check_range+0x100/0x1a8 [ 29.870415] __kasan_check_write+0x20/0x30 [ 29.871120] kasan_atomics_helper+0x1190/0x4858 [ 29.871869] kasan_atomics+0x198/0x2e8 [ 29.872407] kunit_try_run_case+0x14c/0x3d0 [ 29.873198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.873982] kthread+0x24c/0x2d0 [ 29.874648] ret_from_fork+0x10/0x20 [ 29.875335] [ 29.875802] Allocated by task 254: [ 29.876264] kasan_save_stack+0x3c/0x68 [ 29.877156] kasan_save_track+0x20/0x40 [ 29.877612] kasan_save_alloc_info+0x40/0x58 [ 29.878334] __kasan_kmalloc+0xd4/0xd8 [ 29.878866] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.879446] kasan_atomics+0xb8/0x2e8 [ 29.880199] kunit_try_run_case+0x14c/0x3d0 [ 29.881066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.881653] kthread+0x24c/0x2d0 [ 29.882292] ret_from_fork+0x10/0x20 [ 29.882957] [ 29.883404] The buggy address belongs to the object at fff00000c5d53180 [ 29.883404] which belongs to the cache kmalloc-64 of size 64 [ 29.884894] The buggy address is located 0 bytes to the right of [ 29.884894] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.886072] [ 29.886383] The buggy address belongs to the physical page: [ 29.887397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.888424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.889303] page_type: f5(slab) [ 29.889968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.890970] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.891931] page dumped because: kasan: bad access detected [ 29.892686] [ 29.893194] Memory state around the buggy address: [ 29.893941] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.894838] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.895769] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.896662] ^ [ 29.897253] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.898187] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.899118] ==================================================================


[ 28.628440] ================================================================== [ 28.629565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 28.630485] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.631732] [ 28.632134] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.633664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.634213] Hardware name: linux,dummy-virt (DT) [ 28.634797] Call trace: [ 28.635473] show_stack+0x20/0x38 (C) [ 28.636244] dump_stack_lvl+0x8c/0xd0 [ 28.636863] print_report+0x118/0x5e0 [ 28.637581] kasan_report+0xc8/0x118 [ 28.638269] kasan_check_range+0x100/0x1a8 [ 28.639005] __kasan_check_write+0x20/0x30 [ 28.639700] kasan_atomics_helper+0x5b4/0x4858 [ 28.640324] kasan_atomics+0x198/0x2e8 [ 28.640854] kunit_try_run_case+0x14c/0x3d0 [ 28.641412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.642405] kthread+0x24c/0x2d0 [ 28.643082] ret_from_fork+0x10/0x20 [ 28.643775] [ 28.644248] Allocated by task 254: [ 28.644680] kasan_save_stack+0x3c/0x68 [ 28.645440] kasan_save_track+0x20/0x40 [ 28.646125] kasan_save_alloc_info+0x40/0x58 [ 28.646860] __kasan_kmalloc+0xd4/0xd8 [ 28.647541] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.648272] kasan_atomics+0xb8/0x2e8 [ 28.648940] kunit_try_run_case+0x14c/0x3d0 [ 28.649624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.650419] kthread+0x24c/0x2d0 [ 28.650908] ret_from_fork+0x10/0x20 [ 28.651402] [ 28.651702] The buggy address belongs to the object at fff00000c5d53180 [ 28.651702] which belongs to the cache kmalloc-64 of size 64 [ 28.653296] The buggy address is located 0 bytes to the right of [ 28.653296] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.654792] [ 28.655224] The buggy address belongs to the physical page: [ 28.655966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.656979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.657852] page_type: f5(slab) [ 28.658479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.659421] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.660333] page dumped because: kasan: bad access detected [ 28.661100] [ 28.661545] Memory state around the buggy address: [ 28.662282] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.663219] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.664072] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.665029] ^ [ 28.665703] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.666483] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.667245] ==================================================================


[ 28.503770] ================================================================== [ 28.505137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 28.506024] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.507232] [ 28.507481] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.508332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.509976] Hardware name: linux,dummy-virt (DT) [ 28.510474] Call trace: [ 28.511054] show_stack+0x20/0x38 (C) [ 28.511770] dump_stack_lvl+0x8c/0xd0 [ 28.512427] print_report+0x118/0x5e0 [ 28.513113] kasan_report+0xc8/0x118 [ 28.513626] kasan_check_range+0x100/0x1a8 [ 28.514451] __kasan_check_write+0x20/0x30 [ 28.515232] kasan_atomics_helper+0x47c/0x4858 [ 28.515974] kasan_atomics+0x198/0x2e8 [ 28.516675] kunit_try_run_case+0x14c/0x3d0 [ 28.517406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.518198] kthread+0x24c/0x2d0 [ 28.518816] ret_from_fork+0x10/0x20 [ 28.519376] [ 28.519673] Allocated by task 254: [ 28.520454] kasan_save_stack+0x3c/0x68 [ 28.521117] kasan_save_track+0x20/0x40 [ 28.521787] kasan_save_alloc_info+0x40/0x58 [ 28.522466] __kasan_kmalloc+0xd4/0xd8 [ 28.523150] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.524018] kasan_atomics+0xb8/0x2e8 [ 28.524449] kunit_try_run_case+0x14c/0x3d0 [ 28.525178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.526011] kthread+0x24c/0x2d0 [ 28.526690] ret_from_fork+0x10/0x20 [ 28.527339] [ 28.527663] The buggy address belongs to the object at fff00000c5d53180 [ 28.527663] which belongs to the cache kmalloc-64 of size 64 [ 28.529087] The buggy address is located 0 bytes to the right of [ 28.529087] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.530659] [ 28.531177] The buggy address belongs to the physical page: [ 28.531824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.532659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.533647] page_type: f5(slab) [ 28.534329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.535279] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.536285] page dumped because: kasan: bad access detected [ 28.537127] [ 28.537586] Memory state around the buggy address: [ 28.538333] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.539259] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.540182] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.540945] ^ [ 28.541529] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.542642] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.543568] ==================================================================


[ 28.587689] ================================================================== [ 28.588387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 28.589294] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.590391] [ 28.590900] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.592039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.592700] Hardware name: linux,dummy-virt (DT) [ 28.593440] Call trace: [ 28.593969] show_stack+0x20/0x38 (C) [ 28.594506] dump_stack_lvl+0x8c/0xd0 [ 28.595061] print_report+0x118/0x5e0 [ 28.595585] kasan_report+0xc8/0x118 [ 28.596427] kasan_check_range+0x100/0x1a8 [ 28.597147] __kasan_check_write+0x20/0x30 [ 28.597860] kasan_atomics_helper+0x54c/0x4858 [ 28.598600] kasan_atomics+0x198/0x2e8 [ 28.599293] kunit_try_run_case+0x14c/0x3d0 [ 28.600010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.600827] kthread+0x24c/0x2d0 [ 28.601460] ret_from_fork+0x10/0x20 [ 28.602199] [ 28.602692] Allocated by task 254: [ 28.603185] kasan_save_stack+0x3c/0x68 [ 28.603696] kasan_save_track+0x20/0x40 [ 28.604251] kasan_save_alloc_info+0x40/0x58 [ 28.605291] __kasan_kmalloc+0xd4/0xd8 [ 28.605767] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.606491] kasan_atomics+0xb8/0x2e8 [ 28.607167] kunit_try_run_case+0x14c/0x3d0 [ 28.607855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.608647] kthread+0x24c/0x2d0 [ 28.609275] ret_from_fork+0x10/0x20 [ 28.609945] [ 28.610479] The buggy address belongs to the object at fff00000c5d53180 [ 28.610479] which belongs to the cache kmalloc-64 of size 64 [ 28.611808] The buggy address is located 0 bytes to the right of [ 28.611808] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.613226] [ 28.613549] The buggy address belongs to the physical page: [ 28.614514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.615573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.616340] page_type: f5(slab) [ 28.616818] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.617610] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.618771] page dumped because: kasan: bad access detected [ 28.619529] [ 28.619993] Memory state around the buggy address: [ 28.620683] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.621634] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.622598] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.623510] ^ [ 28.624231] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.625215] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.626129] ==================================================================


[ 29.629583] ================================================================== [ 29.630214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.630996] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.631816] [ 29.632120] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.633186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.634206] Hardware name: linux,dummy-virt (DT) [ 29.635254] Call trace: [ 29.635940] show_stack+0x20/0x38 (C) [ 29.636776] dump_stack_lvl+0x8c/0xd0 [ 29.637368] print_report+0x118/0x5e0 [ 29.637918] kasan_report+0xc8/0x118 [ 29.638505] kasan_check_range+0x100/0x1a8 [ 29.639104] __kasan_check_write+0x20/0x30 [ 29.639642] kasan_atomics_helper+0xf20/0x4858 [ 29.640336] kasan_atomics+0x198/0x2e8 [ 29.640941] kunit_try_run_case+0x14c/0x3d0 [ 29.641569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.642255] kthread+0x24c/0x2d0 [ 29.642772] ret_from_fork+0x10/0x20 [ 29.643313] [ 29.643618] Allocated by task 254: [ 29.644050] kasan_save_stack+0x3c/0x68 [ 29.644641] kasan_save_track+0x20/0x40 [ 29.645248] kasan_save_alloc_info+0x40/0x58 [ 29.645833] __kasan_kmalloc+0xd4/0xd8 [ 29.646376] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.647016] kasan_atomics+0xb8/0x2e8 [ 29.647481] kunit_try_run_case+0x14c/0x3d0 [ 29.648145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.648791] kthread+0x24c/0x2d0 [ 29.649375] ret_from_fork+0x10/0x20 [ 29.649883] [ 29.650249] The buggy address belongs to the object at fff00000c5d53180 [ 29.650249] which belongs to the cache kmalloc-64 of size 64 [ 29.651477] The buggy address is located 0 bytes to the right of [ 29.651477] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.652811] [ 29.653133] The buggy address belongs to the physical page: [ 29.653789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.654683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.655462] page_type: f5(slab) [ 29.655994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.656874] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.657683] page dumped because: kasan: bad access detected [ 29.658299] [ 29.658635] Memory state around the buggy address: [ 29.659197] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.659994] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.660870] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.661714] ^ [ 29.662423] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.663148] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.663985] ==================================================================


[ 28.855290] ================================================================== [ 28.856112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 28.856878] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.857759] [ 28.858170] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.859330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.859984] Hardware name: linux,dummy-virt (DT) [ 28.860580] Call trace: [ 28.861067] show_stack+0x20/0x38 (C) [ 28.861833] dump_stack_lvl+0x8c/0xd0 [ 28.862372] print_report+0x118/0x5e0 [ 28.862823] kasan_report+0xc8/0x118 [ 28.863228] kasan_check_range+0x100/0x1a8 [ 28.863661] __kasan_check_write+0x20/0x30 [ 28.864115] kasan_atomics_helper+0x894/0x4858 [ 28.864550] kasan_atomics+0x198/0x2e8 [ 28.864869] kunit_try_run_case+0x14c/0x3d0 [ 28.865564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.867169] kthread+0x24c/0x2d0 [ 28.867533] ret_from_fork+0x10/0x20 [ 28.867839] [ 28.867986] Allocated by task 254: [ 28.868191] kasan_save_stack+0x3c/0x68 [ 28.868419] kasan_save_track+0x20/0x40 [ 28.868639] kasan_save_alloc_info+0x40/0x58 [ 28.869490] __kasan_kmalloc+0xd4/0xd8 [ 28.870468] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.871517] kasan_atomics+0xb8/0x2e8 [ 28.872114] kunit_try_run_case+0x14c/0x3d0 [ 28.872772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.873575] kthread+0x24c/0x2d0 [ 28.874174] ret_from_fork+0x10/0x20 [ 28.874727] [ 28.875145] The buggy address belongs to the object at fff00000c5d53180 [ 28.875145] which belongs to the cache kmalloc-64 of size 64 [ 28.876455] The buggy address is located 0 bytes to the right of [ 28.876455] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.877661] [ 28.877987] The buggy address belongs to the physical page: [ 28.878605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.879594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.880277] page_type: f5(slab) [ 28.880827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.881769] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.882604] page dumped because: kasan: bad access detected [ 28.883267] [ 28.883556] Memory state around the buggy address: [ 28.884120] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.884927] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.885712] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.886460] ^ [ 28.887174] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.888016] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.888695] ==================================================================


[ 28.926393] ================================================================== [ 28.927096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 28.927811] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.928466] [ 28.928803] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.930710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.932038] Hardware name: linux,dummy-virt (DT) [ 28.932507] Call trace: [ 28.932707] show_stack+0x20/0x38 (C) [ 28.933279] dump_stack_lvl+0x8c/0xd0 [ 28.933807] print_report+0x118/0x5e0 [ 28.934416] kasan_report+0xc8/0x118 [ 28.934966] kasan_check_range+0x100/0x1a8 [ 28.935600] __kasan_check_write+0x20/0x30 [ 28.936235] kasan_atomics_helper+0x934/0x4858 [ 28.936823] kasan_atomics+0x198/0x2e8 [ 28.937374] kunit_try_run_case+0x14c/0x3d0 [ 28.937999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.938737] kthread+0x24c/0x2d0 [ 28.939277] ret_from_fork+0x10/0x20 [ 28.939863] [ 28.940239] Allocated by task 254: [ 28.940729] kasan_save_stack+0x3c/0x68 [ 28.941330] kasan_save_track+0x20/0x40 [ 28.941939] kasan_save_alloc_info+0x40/0x58 [ 28.942498] __kasan_kmalloc+0xd4/0xd8 [ 28.943079] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.943662] kasan_atomics+0xb8/0x2e8 [ 28.944224] kunit_try_run_case+0x14c/0x3d0 [ 28.944831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.945576] kthread+0x24c/0x2d0 [ 28.946162] ret_from_fork+0x10/0x20 [ 28.946684] [ 28.947061] The buggy address belongs to the object at fff00000c5d53180 [ 28.947061] which belongs to the cache kmalloc-64 of size 64 [ 28.948326] The buggy address is located 0 bytes to the right of [ 28.948326] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.949621] [ 28.949954] The buggy address belongs to the physical page: [ 28.950618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.951547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.952341] page_type: f5(slab) [ 28.952825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.953643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.954473] page dumped because: kasan: bad access detected [ 28.955187] [ 28.955549] Memory state around the buggy address: [ 28.956185] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.956970] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.957817] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.958650] ^ [ 28.959260] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.959992] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.960779] ==================================================================


[ 30.370198] ================================================================== [ 30.370929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 30.371860] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.372875] [ 30.373336] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.374561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.375166] Hardware name: linux,dummy-virt (DT) [ 30.375824] Call trace: [ 30.376317] show_stack+0x20/0x38 (C) [ 30.376979] dump_stack_lvl+0x8c/0xd0 [ 30.377617] print_report+0x118/0x5e0 [ 30.378255] kasan_report+0xc8/0x118 [ 30.378917] kasan_check_range+0x100/0x1a8 [ 30.379593] __kasan_check_write+0x20/0x30 [ 30.380290] kasan_atomics_helper+0x16d0/0x4858 [ 30.381008] kasan_atomics+0x198/0x2e8 [ 30.381648] kunit_try_run_case+0x14c/0x3d0 [ 30.382377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.383096] kthread+0x24c/0x2d0 [ 30.383667] ret_from_fork+0x10/0x20 [ 30.384237] [ 30.384512] Allocated by task 254: [ 30.385467] kasan_save_stack+0x3c/0x68 [ 30.386206] kasan_save_track+0x20/0x40 [ 30.386872] kasan_save_alloc_info+0x40/0x58 [ 30.387568] __kasan_kmalloc+0xd4/0xd8 [ 30.388263] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.389025] kasan_atomics+0xb8/0x2e8 [ 30.389523] kunit_try_run_case+0x14c/0x3d0 [ 30.390285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.391098] kthread+0x24c/0x2d0 [ 30.391567] ret_from_fork+0x10/0x20 [ 30.392285] [ 30.392764] The buggy address belongs to the object at fff00000c5d53180 [ 30.392764] which belongs to the cache kmalloc-64 of size 64 [ 30.394254] The buggy address is located 0 bytes to the right of [ 30.394254] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.395935] [ 30.396247] The buggy address belongs to the physical page: [ 30.397116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.398085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.398964] page_type: f5(slab) [ 30.399589] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.400568] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.401530] page dumped because: kasan: bad access detected [ 30.402165] [ 30.402698] Memory state around the buggy address: [ 30.403409] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.404365] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.405230] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.406040] ^ [ 30.406617] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.407511] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.408326] ==================================================================


[ 30.017883] ================================================================== [ 30.018671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 30.019969] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.020705] [ 30.021120] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.022040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.022591] Hardware name: linux,dummy-virt (DT) [ 30.023314] Call trace: [ 30.023682] show_stack+0x20/0x38 (C) [ 30.024293] dump_stack_lvl+0x8c/0xd0 [ 30.024878] print_report+0x118/0x5e0 [ 30.025480] kasan_report+0xc8/0x118 [ 30.026164] kasan_check_range+0x100/0x1a8 [ 30.026738] __kasan_check_write+0x20/0x30 [ 30.027465] kasan_atomics_helper+0x1384/0x4858 [ 30.028042] kasan_atomics+0x198/0x2e8 [ 30.028722] kunit_try_run_case+0x14c/0x3d0 [ 30.029291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.029987] kthread+0x24c/0x2d0 [ 30.030581] ret_from_fork+0x10/0x20 [ 30.031234] [ 30.031543] Allocated by task 254: [ 30.032016] kasan_save_stack+0x3c/0x68 [ 30.032564] kasan_save_track+0x20/0x40 [ 30.033098] kasan_save_alloc_info+0x40/0x58 [ 30.033767] __kasan_kmalloc+0xd4/0xd8 [ 30.034338] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.034985] kasan_atomics+0xb8/0x2e8 [ 30.035507] kunit_try_run_case+0x14c/0x3d0 [ 30.036156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.036839] kthread+0x24c/0x2d0 [ 30.037327] ret_from_fork+0x10/0x20 [ 30.037975] [ 30.038303] The buggy address belongs to the object at fff00000c5d53180 [ 30.038303] which belongs to the cache kmalloc-64 of size 64 [ 30.039493] The buggy address is located 0 bytes to the right of [ 30.039493] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.040764] [ 30.041142] The buggy address belongs to the physical page: [ 30.041680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.042610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.043330] page_type: f5(slab) [ 30.043895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.044723] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.045536] page dumped because: kasan: bad access detected [ 30.046197] [ 30.046514] Memory state around the buggy address: [ 30.047099] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.047885] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.048672] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.049480] ^ [ 30.050124] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.050906] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.051660] ==================================================================


[ 30.121878] ================================================================== [ 30.122561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 30.123310] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.124126] [ 30.124498] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.125499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.126047] Hardware name: linux,dummy-virt (DT) [ 30.126625] Call trace: [ 30.127002] show_stack+0x20/0x38 (C) [ 30.127540] dump_stack_lvl+0x8c/0xd0 [ 30.128109] print_report+0x118/0x5e0 [ 30.128703] kasan_report+0xc8/0x118 [ 30.129244] kasan_check_range+0x100/0x1a8 [ 30.129907] __kasan_check_write+0x20/0x30 [ 30.130451] kasan_atomics_helper+0x147c/0x4858 [ 30.131155] kasan_atomics+0x198/0x2e8 [ 30.131692] kunit_try_run_case+0x14c/0x3d0 [ 30.132303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.133042] kthread+0x24c/0x2d0 [ 30.133577] ret_from_fork+0x10/0x20 [ 30.134137] [ 30.134466] Allocated by task 254: [ 30.134916] kasan_save_stack+0x3c/0x68 [ 30.135522] kasan_save_track+0x20/0x40 [ 30.136023] kasan_save_alloc_info+0x40/0x58 [ 30.136637] __kasan_kmalloc+0xd4/0xd8 [ 30.137280] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.137931] kasan_atomics+0xb8/0x2e8 [ 30.138468] kunit_try_run_case+0x14c/0x3d0 [ 30.139056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.139594] kthread+0x24c/0x2d0 [ 30.139971] ret_from_fork+0x10/0x20 [ 30.140345] [ 30.140569] The buggy address belongs to the object at fff00000c5d53180 [ 30.140569] which belongs to the cache kmalloc-64 of size 64 [ 30.141568] The buggy address is located 0 bytes to the right of [ 30.141568] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.143031] [ 30.143302] The buggy address belongs to the physical page: [ 30.144100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.145043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.145899] page_type: f5(slab) [ 30.146399] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.147272] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.148126] page dumped because: kasan: bad access detected [ 30.148697] [ 30.149070] Memory state around the buggy address: [ 30.149732] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.150603] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.151371] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.152109] ^ [ 30.152758] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.153476] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.154333] ==================================================================


[ 28.464617] ================================================================== [ 28.465394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 28.466349] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.467460] [ 28.468302] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.469146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.469559] Hardware name: linux,dummy-virt (DT) [ 28.470589] Call trace: [ 28.471291] show_stack+0x20/0x38 (C) [ 28.472133] dump_stack_lvl+0x8c/0xd0 [ 28.472689] print_report+0x118/0x5e0 [ 28.473210] kasan_report+0xc8/0x118 [ 28.473701] kasan_check_range+0x100/0x1a8 [ 28.474303] __kasan_check_write+0x20/0x30 [ 28.474922] kasan_atomics_helper+0x414/0x4858 [ 28.475705] kasan_atomics+0x198/0x2e8 [ 28.476237] kunit_try_run_case+0x14c/0x3d0 [ 28.476684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.477604] kthread+0x24c/0x2d0 [ 28.478075] ret_from_fork+0x10/0x20 [ 28.478476] [ 28.478704] Allocated by task 254: [ 28.479944] kasan_save_stack+0x3c/0x68 [ 28.480375] kasan_save_track+0x20/0x40 [ 28.480790] kasan_save_alloc_info+0x40/0x58 [ 28.481229] __kasan_kmalloc+0xd4/0xd8 [ 28.481623] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.483205] kasan_atomics+0xb8/0x2e8 [ 28.484274] kunit_try_run_case+0x14c/0x3d0 [ 28.484677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.485074] kthread+0x24c/0x2d0 [ 28.485287] ret_from_fork+0x10/0x20 [ 28.485499] [ 28.485635] The buggy address belongs to the object at fff00000c5d53180 [ 28.485635] which belongs to the cache kmalloc-64 of size 64 [ 28.487497] The buggy address is located 0 bytes to the right of [ 28.487497] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.489409] [ 28.489780] The buggy address belongs to the physical page: [ 28.490402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.491173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.491923] page_type: f5(slab) [ 28.492381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.493203] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.493940] page dumped because: kasan: bad access detected [ 28.494662] [ 28.495009] Memory state around the buggy address: [ 28.495536] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.496870] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.497686] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.498653] ^ [ 28.499363] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.500620] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.501551] ==================================================================


[ 29.748340] ================================================================== [ 29.749293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 29.749648] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.751002] [ 29.751561] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.752587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.753359] Hardware name: linux,dummy-virt (DT) [ 29.754096] Call trace: [ 29.754640] show_stack+0x20/0x38 (C) [ 29.755345] dump_stack_lvl+0x8c/0xd0 [ 29.756022] print_report+0x118/0x5e0 [ 29.756576] kasan_report+0xc8/0x118 [ 29.757077] kasan_check_range+0x100/0x1a8 [ 29.757598] __kasan_check_write+0x20/0x30 [ 29.758217] kasan_atomics_helper+0x1058/0x4858 [ 29.758830] kasan_atomics+0x198/0x2e8 [ 29.759373] kunit_try_run_case+0x14c/0x3d0 [ 29.760038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.760792] kthread+0x24c/0x2d0 [ 29.761347] ret_from_fork+0x10/0x20 [ 29.761852] [ 29.762174] Allocated by task 254: [ 29.762737] kasan_save_stack+0x3c/0x68 [ 29.763429] kasan_save_track+0x20/0x40 [ 29.763997] kasan_save_alloc_info+0x40/0x58 [ 29.764594] __kasan_kmalloc+0xd4/0xd8 [ 29.765150] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.765772] kasan_atomics+0xb8/0x2e8 [ 29.766258] kunit_try_run_case+0x14c/0x3d0 [ 29.766836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.767546] kthread+0x24c/0x2d0 [ 29.768083] ret_from_fork+0x10/0x20 [ 29.768620] [ 29.768954] The buggy address belongs to the object at fff00000c5d53180 [ 29.768954] which belongs to the cache kmalloc-64 of size 64 [ 29.770484] The buggy address is located 0 bytes to the right of [ 29.770484] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.772252] [ 29.772479] The buggy address belongs to the physical page: [ 29.773194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.774181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.775094] page_type: f5(slab) [ 29.775703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.776777] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.777765] page dumped because: kasan: bad access detected [ 29.778573] [ 29.779104] Memory state around the buggy address: [ 29.779651] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.780401] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.781192] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.782257] ^ [ 29.783026] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.783972] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.784810] ==================================================================


[ 29.786605] ================================================================== [ 29.787569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 29.788217] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.789617] [ 29.790246] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.791100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.791501] Hardware name: linux,dummy-virt (DT) [ 29.792380] Call trace: [ 29.793115] show_stack+0x20/0x38 (C) [ 29.793637] dump_stack_lvl+0x8c/0xd0 [ 29.794283] print_report+0x118/0x5e0 [ 29.794580] kasan_report+0xc8/0x118 [ 29.794913] kasan_check_range+0x100/0x1a8 [ 29.795571] __kasan_check_write+0x20/0x30 [ 29.796262] kasan_atomics_helper+0x10c0/0x4858 [ 29.797053] kasan_atomics+0x198/0x2e8 [ 29.797621] kunit_try_run_case+0x14c/0x3d0 [ 29.798289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.799167] kthread+0x24c/0x2d0 [ 29.799660] ret_from_fork+0x10/0x20 [ 29.800253] [ 29.800582] Allocated by task 254: [ 29.801102] kasan_save_stack+0x3c/0x68 [ 29.801676] kasan_save_track+0x20/0x40 [ 29.802232] kasan_save_alloc_info+0x40/0x58 [ 29.802798] __kasan_kmalloc+0xd4/0xd8 [ 29.803367] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.804018] kasan_atomics+0xb8/0x2e8 [ 29.804525] kunit_try_run_case+0x14c/0x3d0 [ 29.805062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.805780] kthread+0x24c/0x2d0 [ 29.806226] ret_from_fork+0x10/0x20 [ 29.806736] [ 29.807124] The buggy address belongs to the object at fff00000c5d53180 [ 29.807124] which belongs to the cache kmalloc-64 of size 64 [ 29.808301] The buggy address is located 0 bytes to the right of [ 29.808301] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.809580] [ 29.809933] The buggy address belongs to the physical page: [ 29.810608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.811482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.812232] page_type: f5(slab) [ 29.812774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.813590] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.814384] page dumped because: kasan: bad access detected [ 29.815087] [ 29.815391] Memory state around the buggy address: [ 29.815965] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.816789] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.817777] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.818509] ^ [ 29.819147] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.819933] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.820773] ==================================================================


[ 30.086811] ================================================================== [ 30.087479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 30.088385] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.089258] [ 30.089614] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.090596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.091191] Hardware name: linux,dummy-virt (DT) [ 30.091733] Call trace: [ 30.092118] show_stack+0x20/0x38 (C) [ 30.092806] dump_stack_lvl+0x8c/0xd0 [ 30.093331] print_report+0x118/0x5e0 [ 30.093812] kasan_report+0xc8/0x118 [ 30.094444] kasan_check_range+0x100/0x1a8 [ 30.095138] __kasan_check_write+0x20/0x30 [ 30.095834] kasan_atomics_helper+0x1414/0x4858 [ 30.096450] kasan_atomics+0x198/0x2e8 [ 30.097077] kunit_try_run_case+0x14c/0x3d0 [ 30.097863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.098444] kthread+0x24c/0x2d0 [ 30.098982] ret_from_fork+0x10/0x20 [ 30.099478] [ 30.099864] Allocated by task 254: [ 30.100330] kasan_save_stack+0x3c/0x68 [ 30.100896] kasan_save_track+0x20/0x40 [ 30.101422] kasan_save_alloc_info+0x40/0x58 [ 30.101959] __kasan_kmalloc+0xd4/0xd8 [ 30.102522] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.103211] kasan_atomics+0xb8/0x2e8 [ 30.103793] kunit_try_run_case+0x14c/0x3d0 [ 30.104392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.105048] kthread+0x24c/0x2d0 [ 30.105523] ret_from_fork+0x10/0x20 [ 30.106116] [ 30.106457] The buggy address belongs to the object at fff00000c5d53180 [ 30.106457] which belongs to the cache kmalloc-64 of size 64 [ 30.107592] The buggy address is located 0 bytes to the right of [ 30.107592] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.108939] [ 30.109260] The buggy address belongs to the physical page: [ 30.109872] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.110835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.111555] page_type: f5(slab) [ 30.112041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.112824] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.113702] page dumped because: kasan: bad access detected [ 30.114342] [ 30.114666] Memory state around the buggy address: [ 30.115234] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.116000] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.116785] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.117580] ^ [ 30.118186] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.119028] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.119824] ==================================================================


[ 29.822280] ================================================================== [ 29.822956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 29.824244] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.824935] [ 29.825332] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.826376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.826938] Hardware name: linux,dummy-virt (DT) [ 29.827487] Call trace: [ 29.827973] show_stack+0x20/0x38 (C) [ 29.828550] dump_stack_lvl+0x8c/0xd0 [ 29.829191] print_report+0x118/0x5e0 [ 29.829800] kasan_report+0xc8/0x118 [ 29.830456] kasan_check_range+0x100/0x1a8 [ 29.831084] __kasan_check_write+0x20/0x30 [ 29.831704] kasan_atomics_helper+0x1128/0x4858 [ 29.832356] kasan_atomics+0x198/0x2e8 [ 29.832941] kunit_try_run_case+0x14c/0x3d0 [ 29.833626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.834380] kthread+0x24c/0x2d0 [ 29.834959] ret_from_fork+0x10/0x20 [ 29.835571] [ 29.835907] Allocated by task 254: [ 29.836431] kasan_save_stack+0x3c/0x68 [ 29.837023] kasan_save_track+0x20/0x40 [ 29.837583] kasan_save_alloc_info+0x40/0x58 [ 29.838224] __kasan_kmalloc+0xd4/0xd8 [ 29.838801] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.839400] kasan_atomics+0xb8/0x2e8 [ 29.840020] kunit_try_run_case+0x14c/0x3d0 [ 29.840601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.841334] kthread+0x24c/0x2d0 [ 29.841791] ret_from_fork+0x10/0x20 [ 29.842274] [ 29.842621] The buggy address belongs to the object at fff00000c5d53180 [ 29.842621] which belongs to the cache kmalloc-64 of size 64 [ 29.843885] The buggy address is located 0 bytes to the right of [ 29.843885] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.845220] [ 29.845545] The buggy address belongs to the physical page: [ 29.846331] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.847080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.847692] page_type: f5(slab) [ 29.848646] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.849622] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.850582] page dumped because: kasan: bad access detected [ 29.851368] [ 29.851842] Memory state around the buggy address: [ 29.852433] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.853411] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.854357] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.855263] ^ [ 29.856016] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.856777] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.857498] ==================================================================


[ 29.593208] ================================================================== [ 29.593924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.594964] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.595901] [ 29.596301] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.597497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.598118] Hardware name: linux,dummy-virt (DT) [ 29.598585] Call trace: [ 29.599838] show_stack+0x20/0x38 (C) [ 29.600635] dump_stack_lvl+0x8c/0xd0 [ 29.601081] print_report+0x118/0x5e0 [ 29.601495] kasan_report+0xc8/0x118 [ 29.601914] kasan_check_range+0x100/0x1a8 [ 29.602355] __kasan_check_write+0x20/0x30 [ 29.603728] kasan_atomics_helper+0xeb8/0x4858 [ 29.604380] kasan_atomics+0x198/0x2e8 [ 29.605097] kunit_try_run_case+0x14c/0x3d0 [ 29.605714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.606432] kthread+0x24c/0x2d0 [ 29.606989] ret_from_fork+0x10/0x20 [ 29.607498] [ 29.607832] Allocated by task 254: [ 29.608274] kasan_save_stack+0x3c/0x68 [ 29.608880] kasan_save_track+0x20/0x40 [ 29.609416] kasan_save_alloc_info+0x40/0x58 [ 29.610040] __kasan_kmalloc+0xd4/0xd8 [ 29.610570] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.611179] kasan_atomics+0xb8/0x2e8 [ 29.611668] kunit_try_run_case+0x14c/0x3d0 [ 29.612233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.612912] kthread+0x24c/0x2d0 [ 29.613367] ret_from_fork+0x10/0x20 [ 29.613877] [ 29.614188] The buggy address belongs to the object at fff00000c5d53180 [ 29.614188] which belongs to the cache kmalloc-64 of size 64 [ 29.615436] The buggy address is located 0 bytes to the right of [ 29.615436] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.616715] [ 29.617089] The buggy address belongs to the physical page: [ 29.617651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.618604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.619347] page_type: f5(slab) [ 29.619822] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.620672] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.621520] page dumped because: kasan: bad access detected [ 29.622171] [ 29.622488] Memory state around the buggy address: [ 29.623112] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.623918] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.624772] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.625531] ^ [ 29.626136] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.626929] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.627685] ==================================================================


[ 28.546380] ================================================================== [ 28.547306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 28.548149] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.549426] [ 28.549841] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.551318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.552227] Hardware name: linux,dummy-virt (DT) [ 28.552954] Call trace: [ 28.553524] show_stack+0x20/0x38 (C) [ 28.554204] dump_stack_lvl+0x8c/0xd0 [ 28.554901] print_report+0x118/0x5e0 [ 28.555423] kasan_report+0xc8/0x118 [ 28.556169] kasan_check_range+0x100/0x1a8 [ 28.556866] __kasan_check_write+0x20/0x30 [ 28.557561] kasan_atomics_helper+0x4e4/0x4858 [ 28.558295] kasan_atomics+0x198/0x2e8 [ 28.559006] kunit_try_run_case+0x14c/0x3d0 [ 28.559572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.560257] kthread+0x24c/0x2d0 [ 28.561167] ret_from_fork+0x10/0x20 [ 28.561592] [ 28.562108] Allocated by task 254: [ 28.562763] kasan_save_stack+0x3c/0x68 [ 28.563444] kasan_save_track+0x20/0x40 [ 28.564119] kasan_save_alloc_info+0x40/0x58 [ 28.564820] __kasan_kmalloc+0xd4/0xd8 [ 28.565479] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.566190] kasan_atomics+0xb8/0x2e8 [ 28.566880] kunit_try_run_case+0x14c/0x3d0 [ 28.567546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.568199] kthread+0x24c/0x2d0 [ 28.568657] ret_from_fork+0x10/0x20 [ 28.569172] [ 28.569469] The buggy address belongs to the object at fff00000c5d53180 [ 28.569469] which belongs to the cache kmalloc-64 of size 64 [ 28.571079] The buggy address is located 0 bytes to the right of [ 28.571079] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.572634] [ 28.573096] The buggy address belongs to the physical page: [ 28.573617] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.574690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.575618] page_type: f5(slab) [ 28.576255] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.577232] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.578175] page dumped because: kasan: bad access detected [ 28.579073] [ 28.579520] Memory state around the buggy address: [ 28.580102] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.581107] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.582063] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.582701] ^ [ 28.583491] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.584433] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.585332] ==================================================================


[ 28.338788] ================================================================== [ 28.339343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 28.340881] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.342125] [ 28.342480] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.343977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.344709] Hardware name: linux,dummy-virt (DT) [ 28.345457] Call trace: [ 28.345865] show_stack+0x20/0x38 (C) [ 28.346647] dump_stack_lvl+0x8c/0xd0 [ 28.347542] print_report+0x118/0x5e0 [ 28.348281] kasan_report+0xc8/0x118 [ 28.348828] kasan_check_range+0x100/0x1a8 [ 28.349617] __kasan_check_write+0x20/0x30 [ 28.350321] kasan_atomics_helper+0x32c/0x4858 [ 28.350928] kasan_atomics+0x198/0x2e8 [ 28.351440] kunit_try_run_case+0x14c/0x3d0 [ 28.352153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.352835] kthread+0x24c/0x2d0 [ 28.353322] ret_from_fork+0x10/0x20 [ 28.354016] [ 28.354404] Allocated by task 254: [ 28.354994] kasan_save_stack+0x3c/0x68 [ 28.355629] kasan_save_track+0x20/0x40 [ 28.356259] kasan_save_alloc_info+0x40/0x58 [ 28.356807] __kasan_kmalloc+0xd4/0xd8 [ 28.357302] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.357898] kasan_atomics+0xb8/0x2e8 [ 28.358498] kunit_try_run_case+0x14c/0x3d0 [ 28.359126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.359697] kthread+0x24c/0x2d0 [ 28.360197] ret_from_fork+0x10/0x20 [ 28.360845] [ 28.361298] The buggy address belongs to the object at fff00000c5d53180 [ 28.361298] which belongs to the cache kmalloc-64 of size 64 [ 28.362578] The buggy address is located 0 bytes to the right of [ 28.362578] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.364361] [ 28.364690] The buggy address belongs to the physical page: [ 28.365504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.366566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.367470] page_type: f5(slab) [ 28.367999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.369005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.370011] page dumped because: kasan: bad access detected [ 28.370542] [ 28.371046] Memory state around the buggy address: [ 28.371781] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.372733] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.373919] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.374692] ^ [ 28.375346] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.376251] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.376985] ==================================================================


[ 29.707298] ================================================================== [ 29.707982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.708656] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.709547] [ 29.710316] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.711247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.712140] Hardware name: linux,dummy-virt (DT) [ 29.712859] Call trace: [ 29.713401] show_stack+0x20/0x38 (C) [ 29.713973] dump_stack_lvl+0x8c/0xd0 [ 29.714680] print_report+0x118/0x5e0 [ 29.715393] kasan_report+0xc8/0x118 [ 29.716086] kasan_check_range+0x100/0x1a8 [ 29.716806] __kasan_check_write+0x20/0x30 [ 29.717399] kasan_atomics_helper+0xff0/0x4858 [ 29.718164] kasan_atomics+0x198/0x2e8 [ 29.718832] kunit_try_run_case+0x14c/0x3d0 [ 29.719548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.720277] kthread+0x24c/0x2d0 [ 29.720765] ret_from_fork+0x10/0x20 [ 29.721278] [ 29.721557] Allocated by task 254: [ 29.722596] kasan_save_stack+0x3c/0x68 [ 29.723308] kasan_save_track+0x20/0x40 [ 29.724005] kasan_save_alloc_info+0x40/0x58 [ 29.724684] __kasan_kmalloc+0xd4/0xd8 [ 29.725373] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.726122] kasan_atomics+0xb8/0x2e8 [ 29.726794] kunit_try_run_case+0x14c/0x3d0 [ 29.727481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.728150] kthread+0x24c/0x2d0 [ 29.728831] ret_from_fork+0x10/0x20 [ 29.729504] [ 29.729985] The buggy address belongs to the object at fff00000c5d53180 [ 29.729985] which belongs to the cache kmalloc-64 of size 64 [ 29.731361] The buggy address is located 0 bytes to the right of [ 29.731361] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.732887] [ 29.733186] The buggy address belongs to the physical page: [ 29.734095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.735079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.735929] page_type: f5(slab) [ 29.736560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.737566] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.738399] page dumped because: kasan: bad access detected [ 29.739256] [ 29.739706] Memory state around the buggy address: [ 29.740460] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.741383] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.742316] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.743094] ^ [ 29.743889] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.744829] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.745733] ==================================================================


[ 29.981976] ================================================================== [ 29.982599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 29.983661] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.984923] [ 29.985313] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.986892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.987557] Hardware name: linux,dummy-virt (DT) [ 29.988167] Call trace: [ 29.988586] show_stack+0x20/0x38 (C) [ 29.989176] dump_stack_lvl+0x8c/0xd0 [ 29.989726] print_report+0x118/0x5e0 [ 29.990331] kasan_report+0xc8/0x118 [ 29.990966] kasan_check_range+0x100/0x1a8 [ 29.991513] __kasan_check_write+0x20/0x30 [ 29.992160] kasan_atomics_helper+0x12d8/0x4858 [ 29.992733] kasan_atomics+0x198/0x2e8 [ 29.993358] kunit_try_run_case+0x14c/0x3d0 [ 29.993965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.994651] kthread+0x24c/0x2d0 [ 29.995211] ret_from_fork+0x10/0x20 [ 29.995794] [ 29.996092] Allocated by task 254: [ 29.996575] kasan_save_stack+0x3c/0x68 [ 29.997185] kasan_save_track+0x20/0x40 [ 29.997729] kasan_save_alloc_info+0x40/0x58 [ 29.998328] __kasan_kmalloc+0xd4/0xd8 [ 29.998858] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.999527] kasan_atomics+0xb8/0x2e8 [ 30.000090] kunit_try_run_case+0x14c/0x3d0 [ 30.000666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.001336] kthread+0x24c/0x2d0 [ 30.001815] ret_from_fork+0x10/0x20 [ 30.002289] [ 30.002663] The buggy address belongs to the object at fff00000c5d53180 [ 30.002663] which belongs to the cache kmalloc-64 of size 64 [ 30.003955] The buggy address is located 0 bytes to the right of [ 30.003955] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.005205] [ 30.005528] The buggy address belongs to the physical page: [ 30.006259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.007113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.007865] page_type: f5(slab) [ 30.008329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.009089] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.009981] page dumped because: kasan: bad access detected [ 30.010659] [ 30.010990] Memory state around the buggy address: [ 30.011820] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.012620] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.013422] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.014213] ^ [ 30.014785] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.015627] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.016430] ==================================================================


[ 29.072736] ================================================================== [ 29.073414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 29.074186] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.074853] [ 29.075208] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.076596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.077214] Hardware name: linux,dummy-virt (DT) [ 29.077820] Call trace: [ 29.078183] show_stack+0x20/0x38 (C) [ 29.078787] dump_stack_lvl+0x8c/0xd0 [ 29.079391] print_report+0x118/0x5e0 [ 29.079966] kasan_report+0xc8/0x118 [ 29.080578] kasan_check_range+0x100/0x1a8 [ 29.081187] __kasan_check_write+0x20/0x30 [ 29.081870] kasan_atomics_helper+0xad4/0x4858 [ 29.082496] kasan_atomics+0x198/0x2e8 [ 29.083084] kunit_try_run_case+0x14c/0x3d0 [ 29.083665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.084343] kthread+0x24c/0x2d0 [ 29.084924] ret_from_fork+0x10/0x20 [ 29.085479] [ 29.085830] Allocated by task 254: [ 29.086299] kasan_save_stack+0x3c/0x68 [ 29.086919] kasan_save_track+0x20/0x40 [ 29.087394] kasan_save_alloc_info+0x40/0x58 [ 29.088055] __kasan_kmalloc+0xd4/0xd8 [ 29.088593] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.089262] kasan_atomics+0xb8/0x2e8 [ 29.089809] kunit_try_run_case+0x14c/0x3d0 [ 29.090435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.091129] kthread+0x24c/0x2d0 [ 29.091585] ret_from_fork+0x10/0x20 [ 29.092171] [ 29.092479] The buggy address belongs to the object at fff00000c5d53180 [ 29.092479] which belongs to the cache kmalloc-64 of size 64 [ 29.093812] The buggy address is located 0 bytes to the right of [ 29.093812] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.095058] [ 29.095417] The buggy address belongs to the physical page: [ 29.096033] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.096916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.097591] page_type: f5(slab) [ 29.098172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.099027] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.099923] page dumped because: kasan: bad access detected [ 29.100428] [ 29.100769] Memory state around the buggy address: [ 29.101368] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.102247] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.103086] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.103848] ^ [ 29.104470] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.105254] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.106040] ==================================================================


[ 30.156108] ================================================================== [ 30.156674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 30.157621] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.158290] [ 30.158638] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.159832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.160381] Hardware name: linux,dummy-virt (DT) [ 30.160944] Call trace: [ 30.161325] show_stack+0x20/0x38 (C) [ 30.161915] dump_stack_lvl+0x8c/0xd0 [ 30.162445] print_report+0x118/0x5e0 [ 30.163122] kasan_report+0xc8/0x118 [ 30.163682] kasan_check_range+0x100/0x1a8 [ 30.164258] __kasan_check_write+0x20/0x30 [ 30.164861] kasan_atomics_helper+0x14e4/0x4858 [ 30.165458] kasan_atomics+0x198/0x2e8 [ 30.166034] kunit_try_run_case+0x14c/0x3d0 [ 30.166696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.167336] kthread+0x24c/0x2d0 [ 30.167957] ret_from_fork+0x10/0x20 [ 30.168489] [ 30.168796] Allocated by task 254: [ 30.169360] kasan_save_stack+0x3c/0x68 [ 30.169932] kasan_save_track+0x20/0x40 [ 30.170360] kasan_save_alloc_info+0x40/0x58 [ 30.170924] __kasan_kmalloc+0xd4/0xd8 [ 30.171462] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.172184] kasan_atomics+0xb8/0x2e8 [ 30.172684] kunit_try_run_case+0x14c/0x3d0 [ 30.173227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.174072] kthread+0x24c/0x2d0 [ 30.174585] ret_from_fork+0x10/0x20 [ 30.175139] [ 30.175455] The buggy address belongs to the object at fff00000c5d53180 [ 30.175455] which belongs to the cache kmalloc-64 of size 64 [ 30.176579] The buggy address is located 0 bytes to the right of [ 30.176579] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.177805] [ 30.178139] The buggy address belongs to the physical page: [ 30.178775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.179572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.180433] page_type: f5(slab) [ 30.180918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.181821] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.182604] page dumped because: kasan: bad access detected [ 30.183255] [ 30.183573] Memory state around the buggy address: [ 30.184075] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.184851] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.185611] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.186458] ^ [ 30.187088] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.187854] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.188644] ==================================================================


[ 30.519366] ================================================================== [ 30.520031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 30.520898] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.521734] [ 30.522116] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.523336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.524000] Hardware name: linux,dummy-virt (DT) [ 30.524606] Call trace: [ 30.525107] show_stack+0x20/0x38 (C) [ 30.525770] dump_stack_lvl+0x8c/0xd0 [ 30.526312] print_report+0x118/0x5e0 [ 30.526856] kasan_report+0xc8/0x118 [ 30.527421] kasan_check_range+0x100/0x1a8 [ 30.528004] __kasan_check_write+0x20/0x30 [ 30.528687] kasan_atomics_helper+0x17ec/0x4858 [ 30.529360] kasan_atomics+0x198/0x2e8 [ 30.529990] kunit_try_run_case+0x14c/0x3d0 [ 30.530621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.531406] kthread+0x24c/0x2d0 [ 30.531968] ret_from_fork+0x10/0x20 [ 30.532511] [ 30.532920] Allocated by task 254: [ 30.533468] kasan_save_stack+0x3c/0x68 [ 30.534046] kasan_save_track+0x20/0x40 [ 30.534639] kasan_save_alloc_info+0x40/0x58 [ 30.535303] __kasan_kmalloc+0xd4/0xd8 [ 30.535964] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.536559] kasan_atomics+0xb8/0x2e8 [ 30.537268] kunit_try_run_case+0x14c/0x3d0 [ 30.537832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.538620] kthread+0x24c/0x2d0 [ 30.539201] ret_from_fork+0x10/0x20 [ 30.539738] [ 30.540111] The buggy address belongs to the object at fff00000c5d53180 [ 30.540111] which belongs to the cache kmalloc-64 of size 64 [ 30.541362] The buggy address is located 0 bytes to the right of [ 30.541362] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.542717] [ 30.543146] The buggy address belongs to the physical page: [ 30.543908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.544916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.545678] page_type: f5(slab) [ 30.546117] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.546931] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.547793] page dumped because: kasan: bad access detected [ 30.548430] [ 30.548817] Memory state around the buggy address: [ 30.549515] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.550503] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.551348] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.552203] ^ [ 30.552844] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.553693] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.554512] ==================================================================


[ 28.779540] ================================================================== [ 28.780653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 28.781533] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.782344] [ 28.782727] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.783935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.784494] Hardware name: linux,dummy-virt (DT) [ 28.785120] Call trace: [ 28.785511] show_stack+0x20/0x38 (C) [ 28.786174] dump_stack_lvl+0x8c/0xd0 [ 28.786926] print_report+0x118/0x5e0 [ 28.787503] kasan_report+0xc8/0x118 [ 28.788214] kasan_check_range+0x100/0x1a8 [ 28.788913] __kasan_check_write+0x20/0x30 [ 28.789515] kasan_atomics_helper+0x760/0x4858 [ 28.790212] kasan_atomics+0x198/0x2e8 [ 28.790834] kunit_try_run_case+0x14c/0x3d0 [ 28.791464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.792221] kthread+0x24c/0x2d0 [ 28.792807] ret_from_fork+0x10/0x20 [ 28.793422] [ 28.793776] Allocated by task 254: [ 28.794384] kasan_save_stack+0x3c/0x68 [ 28.795061] kasan_save_track+0x20/0x40 [ 28.795584] kasan_save_alloc_info+0x40/0x58 [ 28.796262] __kasan_kmalloc+0xd4/0xd8 [ 28.796867] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.797498] kasan_atomics+0xb8/0x2e8 [ 28.798082] kunit_try_run_case+0x14c/0x3d0 [ 28.798684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.799429] kthread+0x24c/0x2d0 [ 28.799965] ret_from_fork+0x10/0x20 [ 28.800510] [ 28.800870] The buggy address belongs to the object at fff00000c5d53180 [ 28.800870] which belongs to the cache kmalloc-64 of size 64 [ 28.802213] The buggy address is located 0 bytes to the right of [ 28.802213] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.803534] [ 28.803918] The buggy address belongs to the physical page: [ 28.804681] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.805615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.806456] page_type: f5(slab) [ 28.807034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.807930] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.808796] page dumped because: kasan: bad access detected [ 28.809481] [ 28.809817] Memory state around the buggy address: [ 28.810488] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.811290] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.812245] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.813069] ^ [ 28.813680] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.814558] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.815389] ==================================================================


[ 30.224308] ================================================================== [ 30.225012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 30.226092] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.226816] [ 30.227271] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.228294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.228939] Hardware name: linux,dummy-virt (DT) [ 30.229476] Call trace: [ 30.229908] show_stack+0x20/0x38 (C) [ 30.230593] dump_stack_lvl+0x8c/0xd0 [ 30.231323] print_report+0x118/0x5e0 [ 30.231879] kasan_report+0xc8/0x118 [ 30.232864] kasan_check_range+0x100/0x1a8 [ 30.233340] __kasan_check_write+0x20/0x30 [ 30.233787] kasan_atomics_helper+0x15b4/0x4858 [ 30.234812] kasan_atomics+0x198/0x2e8 [ 30.235504] kunit_try_run_case+0x14c/0x3d0 [ 30.236162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.236996] kthread+0x24c/0x2d0 [ 30.237456] ret_from_fork+0x10/0x20 [ 30.237967] [ 30.238252] Allocated by task 254: [ 30.238706] kasan_save_stack+0x3c/0x68 [ 30.239251] kasan_save_track+0x20/0x40 [ 30.239849] kasan_save_alloc_info+0x40/0x58 [ 30.240660] __kasan_kmalloc+0xd4/0xd8 [ 30.241275] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.242014] kasan_atomics+0xb8/0x2e8 [ 30.242619] kunit_try_run_case+0x14c/0x3d0 [ 30.243325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.244054] kthread+0x24c/0x2d0 [ 30.244625] ret_from_fork+0x10/0x20 [ 30.245292] [ 30.245511] The buggy address belongs to the object at fff00000c5d53180 [ 30.245511] which belongs to the cache kmalloc-64 of size 64 [ 30.246998] The buggy address is located 0 bytes to the right of [ 30.246998] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.248522] [ 30.248964] The buggy address belongs to the physical page: [ 30.249630] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.250620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.251424] page_type: f5(slab) [ 30.251961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.252851] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.253698] page dumped because: kasan: bad access detected [ 30.254352] [ 30.254722] Memory state around the buggy address: [ 30.255355] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.256162] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.256912] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.257635] ^ [ 30.258341] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.259188] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.260003] ==================================================================


[ 28.212292] ================================================================== [ 28.212939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 28.213566] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.215854] [ 28.216148] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.216984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.217407] Hardware name: linux,dummy-virt (DT) [ 28.217891] Call trace: [ 28.218601] show_stack+0x20/0x38 (C) [ 28.219842] dump_stack_lvl+0x8c/0xd0 [ 28.220108] print_report+0x118/0x5e0 [ 28.220342] kasan_report+0xc8/0x118 [ 28.220570] kasan_check_range+0x100/0x1a8 [ 28.220853] __kasan_check_write+0x20/0x30 [ 28.221106] kasan_atomics_helper+0x24c/0x4858 [ 28.221359] kasan_atomics+0x198/0x2e8 [ 28.221588] kunit_try_run_case+0x14c/0x3d0 [ 28.222002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.222533] kthread+0x24c/0x2d0 [ 28.222941] ret_from_fork+0x10/0x20 [ 28.225237] [ 28.226163] Allocated by task 254: [ 28.226802] kasan_save_stack+0x3c/0x68 [ 28.227493] kasan_save_track+0x20/0x40 [ 28.228386] kasan_save_alloc_info+0x40/0x58 [ 28.228942] __kasan_kmalloc+0xd4/0xd8 [ 28.229411] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.230009] kasan_atomics+0xb8/0x2e8 [ 28.230561] kunit_try_run_case+0x14c/0x3d0 [ 28.231417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.232069] kthread+0x24c/0x2d0 [ 28.232434] ret_from_fork+0x10/0x20 [ 28.232836] [ 28.233062] The buggy address belongs to the object at fff00000c5d53180 [ 28.233062] which belongs to the cache kmalloc-64 of size 64 [ 28.235999] The buggy address is located 0 bytes to the right of [ 28.235999] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.237691] [ 28.237988] The buggy address belongs to the physical page: [ 28.238492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.239865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.240772] page_type: f5(slab) [ 28.241404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.242283] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.243514] page dumped because: kasan: bad access detected [ 28.244170] [ 28.244570] Memory state around the buggy address: [ 28.245337] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.246119] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.246955] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.248127] ^ [ 28.248802] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.249725] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.250638] ==================================================================


[ 30.189930] ================================================================== [ 30.190651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 30.191585] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.192315] [ 30.192653] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.193808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.194381] Hardware name: linux,dummy-virt (DT) [ 30.194945] Call trace: [ 30.195352] show_stack+0x20/0x38 (C) [ 30.195942] dump_stack_lvl+0x8c/0xd0 [ 30.196506] print_report+0x118/0x5e0 [ 30.197012] kasan_report+0xc8/0x118 [ 30.197571] kasan_check_range+0x100/0x1a8 [ 30.198183] __kasan_check_write+0x20/0x30 [ 30.198785] kasan_atomics_helper+0x154c/0x4858 [ 30.199383] kasan_atomics+0x198/0x2e8 [ 30.199976] kunit_try_run_case+0x14c/0x3d0 [ 30.200613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.201365] kthread+0x24c/0x2d0 [ 30.201911] ret_from_fork+0x10/0x20 [ 30.202468] [ 30.202783] Allocated by task 254: [ 30.203313] kasan_save_stack+0x3c/0x68 [ 30.203793] kasan_save_track+0x20/0x40 [ 30.204424] kasan_save_alloc_info+0x40/0x58 [ 30.204998] __kasan_kmalloc+0xd4/0xd8 [ 30.205530] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.206157] kasan_atomics+0xb8/0x2e8 [ 30.206679] kunit_try_run_case+0x14c/0x3d0 [ 30.207243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.207864] kthread+0x24c/0x2d0 [ 30.208414] ret_from_fork+0x10/0x20 [ 30.208942] [ 30.209246] The buggy address belongs to the object at fff00000c5d53180 [ 30.209246] which belongs to the cache kmalloc-64 of size 64 [ 30.210347] The buggy address is located 0 bytes to the right of [ 30.210347] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.211670] [ 30.212004] The buggy address belongs to the physical page: [ 30.212599] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.213492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.214304] page_type: f5(slab) [ 30.214796] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.215645] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.216470] page dumped because: kasan: bad access detected [ 30.217140] [ 30.217437] Memory state around the buggy address: [ 30.218068] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.218861] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.219643] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.220419] ^ [ 30.221026] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.221842] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.222591] ==================================================================


[ 29.941339] ================================================================== [ 29.942388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 29.943679] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.944633] [ 29.945171] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.946283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.946810] Hardware name: linux,dummy-virt (DT) [ 29.947361] Call trace: [ 29.948157] show_stack+0x20/0x38 (C) [ 29.948614] dump_stack_lvl+0x8c/0xd0 [ 29.949316] print_report+0x118/0x5e0 [ 29.950003] kasan_report+0xc8/0x118 [ 29.950651] kasan_check_range+0x100/0x1a8 [ 29.951360] __kasan_check_write+0x20/0x30 [ 29.952066] kasan_atomics_helper+0x126c/0x4858 [ 29.952803] kasan_atomics+0x198/0x2e8 [ 29.953478] kunit_try_run_case+0x14c/0x3d0 [ 29.954232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.954917] kthread+0x24c/0x2d0 [ 29.955408] ret_from_fork+0x10/0x20 [ 29.955925] [ 29.956216] Allocated by task 254: [ 29.956632] kasan_save_stack+0x3c/0x68 [ 29.957602] kasan_save_track+0x20/0x40 [ 29.958293] kasan_save_alloc_info+0x40/0x58 [ 29.959003] __kasan_kmalloc+0xd4/0xd8 [ 29.959652] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.960409] kasan_atomics+0xb8/0x2e8 [ 29.961082] kunit_try_run_case+0x14c/0x3d0 [ 29.961778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.962577] kthread+0x24c/0x2d0 [ 29.963213] ret_from_fork+0x10/0x20 [ 29.963895] [ 29.964378] The buggy address belongs to the object at fff00000c5d53180 [ 29.964378] which belongs to the cache kmalloc-64 of size 64 [ 29.965836] The buggy address is located 0 bytes to the right of [ 29.965836] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.967257] [ 29.967567] The buggy address belongs to the physical page: [ 29.968452] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.969434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.970248] page_type: f5(slab) [ 29.970718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.971548] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.972685] page dumped because: kasan: bad access detected [ 29.973410] [ 29.973911] Memory state around the buggy address: [ 29.974443] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.975466] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.976215] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.977180] ^ [ 29.977911] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.978889] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.979730] ==================================================================


[ 30.294709] ================================================================== [ 30.295379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 30.296520] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.297346] [ 30.297719] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.298693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.299339] Hardware name: linux,dummy-virt (DT) [ 30.299908] Call trace: [ 30.300379] show_stack+0x20/0x38 (C) [ 30.300944] dump_stack_lvl+0x8c/0xd0 [ 30.301527] print_report+0x118/0x5e0 [ 30.302178] kasan_report+0xc8/0x118 [ 30.302732] kasan_check_range+0x100/0x1a8 [ 30.303426] __kasan_check_write+0x20/0x30 [ 30.304368] kasan_atomics_helper+0x1644/0x4858 [ 30.304976] kasan_atomics+0x198/0x2e8 [ 30.305510] kunit_try_run_case+0x14c/0x3d0 [ 30.306166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.306871] kthread+0x24c/0x2d0 [ 30.307446] ret_from_fork+0x10/0x20 [ 30.307940] [ 30.308256] Allocated by task 254: [ 30.308768] kasan_save_stack+0x3c/0x68 [ 30.309261] kasan_save_track+0x20/0x40 [ 30.309881] kasan_save_alloc_info+0x40/0x58 [ 30.310465] __kasan_kmalloc+0xd4/0xd8 [ 30.311134] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.311662] kasan_atomics+0xb8/0x2e8 [ 30.312234] kunit_try_run_case+0x14c/0x3d0 [ 30.312870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.313589] kthread+0x24c/0x2d0 [ 30.314115] ret_from_fork+0x10/0x20 [ 30.314624] [ 30.314954] The buggy address belongs to the object at fff00000c5d53180 [ 30.314954] which belongs to the cache kmalloc-64 of size 64 [ 30.316124] The buggy address is located 0 bytes to the right of [ 30.316124] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.317404] [ 30.317731] The buggy address belongs to the physical page: [ 30.318378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.319636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.320446] page_type: f5(slab) [ 30.320953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.321807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.322596] page dumped because: kasan: bad access detected [ 30.323276] [ 30.323560] Memory state around the buggy address: [ 30.324132] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.324933] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.325708] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.326541] ^ [ 30.327128] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.327911] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.328724] ==================================================================


[ 28.743446] ================================================================== [ 28.744308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 28.744691] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.745630] [ 28.746319] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.747602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.748134] Hardware name: linux,dummy-virt (DT) [ 28.748663] Call trace: [ 28.749079] show_stack+0x20/0x38 (C) [ 28.749756] dump_stack_lvl+0x8c/0xd0 [ 28.750323] print_report+0x118/0x5e0 [ 28.750861] kasan_report+0xc8/0x118 [ 28.751450] kasan_check_range+0x100/0x1a8 [ 28.752087] __kasan_check_write+0x20/0x30 [ 28.752827] kasan_atomics_helper+0x6ec/0x4858 [ 28.753417] kasan_atomics+0x198/0x2e8 [ 28.753957] kunit_try_run_case+0x14c/0x3d0 [ 28.754621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.755317] kthread+0x24c/0x2d0 [ 28.755908] ret_from_fork+0x10/0x20 [ 28.756438] [ 28.756758] Allocated by task 254: [ 28.757196] kasan_save_stack+0x3c/0x68 [ 28.757806] kasan_save_track+0x20/0x40 [ 28.758433] kasan_save_alloc_info+0x40/0x58 [ 28.759036] __kasan_kmalloc+0xd4/0xd8 [ 28.759538] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.760129] kasan_atomics+0xb8/0x2e8 [ 28.760695] kunit_try_run_case+0x14c/0x3d0 [ 28.761351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.761949] kthread+0x24c/0x2d0 [ 28.762529] ret_from_fork+0x10/0x20 [ 28.763089] [ 28.763438] The buggy address belongs to the object at fff00000c5d53180 [ 28.763438] which belongs to the cache kmalloc-64 of size 64 [ 28.764709] The buggy address is located 0 bytes to the right of [ 28.764709] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.766058] [ 28.766401] The buggy address belongs to the physical page: [ 28.767034] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.768066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.768874] page_type: f5(slab) [ 28.769300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.770232] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.771160] page dumped because: kasan: bad access detected [ 28.771861] [ 28.772188] Memory state around the buggy address: [ 28.772903] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.773689] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.774589] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.775489] ^ [ 28.776127] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.776929] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.777707] ==================================================================


[ 29.665503] ================================================================== [ 29.666313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.667924] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.668610] [ 29.668874] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.669679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.671044] Hardware name: linux,dummy-virt (DT) [ 29.671581] Call trace: [ 29.671974] show_stack+0x20/0x38 (C) [ 29.672486] dump_stack_lvl+0x8c/0xd0 [ 29.673388] print_report+0x118/0x5e0 [ 29.674114] kasan_report+0xc8/0x118 [ 29.674791] kasan_check_range+0x100/0x1a8 [ 29.675518] __kasan_check_write+0x20/0x30 [ 29.676262] kasan_atomics_helper+0xf88/0x4858 [ 29.676905] kasan_atomics+0x198/0x2e8 [ 29.677639] kunit_try_run_case+0x14c/0x3d0 [ 29.678367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.679193] kthread+0x24c/0x2d0 [ 29.679879] ret_from_fork+0x10/0x20 [ 29.680558] [ 29.681037] Allocated by task 254: [ 29.681598] kasan_save_stack+0x3c/0x68 [ 29.682278] kasan_save_track+0x20/0x40 [ 29.682960] kasan_save_alloc_info+0x40/0x58 [ 29.683673] __kasan_kmalloc+0xd4/0xd8 [ 29.684380] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.685223] kasan_atomics+0xb8/0x2e8 [ 29.685903] kunit_try_run_case+0x14c/0x3d0 [ 29.686613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.687354] kthread+0x24c/0x2d0 [ 29.687780] ret_from_fork+0x10/0x20 [ 29.688247] [ 29.688538] The buggy address belongs to the object at fff00000c5d53180 [ 29.688538] which belongs to the cache kmalloc-64 of size 64 [ 29.690433] The buggy address is located 0 bytes to the right of [ 29.690433] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.692095] [ 29.692561] The buggy address belongs to the physical page: [ 29.693323] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.694343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.695244] page_type: f5(slab) [ 29.695719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.696800] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.697814] page dumped because: kasan: bad access detected [ 29.698458] [ 29.699026] Memory state around the buggy address: [ 29.699697] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.700576] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.701376] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.702344] ^ [ 29.703089] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.704027] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.704985] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper-a30fc17a3ab439b39214bea5124c561fad732c9521a8f82653f7e0631470597c/details/) (gcc-13-lkftconfig-kunit)[ 28.890342] ================================================================== [ 28.891387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 28.893202] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.894106] [ 28.894356] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.895812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.896376] Hardware name: linux,dummy-virt (DT) [ 28.897007] Call trace: [ 28.897363] show_stack+0x20/0x38 (C) [ 28.897965] dump_stack_lvl+0x8c/0xd0 [ 28.898537] print_report+0x118/0x5e0 [ 28.899102] kasan_report+0xc8/0x118 [ 28.899690] __asan_report_load4_noabort+0x20/0x30 [ 28.900331] kasan_atomics_helper+0x42d8/0x4858 [ 28.900898] kasan_atomics+0x198/0x2e8 [ 28.901536] kunit_try_run_case+0x14c/0x3d0 [ 28.902101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.902862] kthread+0x24c/0x2d0 [ 28.903382] ret_from_fork+0x10/0x20 [ 28.903996] [ 28.904363] Allocated by task 254: [ 28.904812] kasan_save_stack+0x3c/0x68 [ 28.905371] kasan_save_track+0x20/0x40 [ 28.906026] kasan_save_alloc_info+0x40/0x58 [ 28.906597] __kasan_kmalloc+0xd4/0xd8 [ 28.907150] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.907655] kasan_atomics+0xb8/0x2e8 [ 28.908235] kunit_try_run_case+0x14c/0x3d0 [ 28.908885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.909602] kthread+0x24c/0x2d0 [ 28.910221] ret_from_fork+0x10/0x20 [ 28.910731] [ 28.911086] The buggy address belongs to the object at fff00000c5d53180 [ 28.911086] which belongs to the cache kmalloc-64 of size 64 [ 28.912260] The buggy address is located 0 bytes to the right of [ 28.912260] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.913557] [ 28.913894] The buggy address belongs to the physical page: [ 28.914500] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.915454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.916257] page_type: f5(slab) [ 28.916723] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.917663] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.918419] page dumped because: kasan: bad access detected [ 28.919116] [ 28.919425] Memory state around the buggy address: [ 28.919995] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.920840] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.921628] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.922456] ^ [ 28.923102] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.923911] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.924790] ==================================================================


[ 29.107779] ================================================================== [ 29.108512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 29.109220] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.110075] [ 29.110416] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.111925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.112437] Hardware name: linux,dummy-virt (DT) [ 29.113367] Call trace: [ 29.113921] show_stack+0x20/0x38 (C) [ 29.114501] dump_stack_lvl+0x8c/0xd0 [ 29.115066] print_report+0x118/0x5e0 [ 29.115592] kasan_report+0xc8/0x118 [ 29.116213] __asan_report_load4_noabort+0x20/0x30 [ 29.116886] kasan_atomics_helper+0x3dcc/0x4858 [ 29.117483] kasan_atomics+0x198/0x2e8 [ 29.118056] kunit_try_run_case+0x14c/0x3d0 [ 29.118703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.119404] kthread+0x24c/0x2d0 [ 29.119921] ret_from_fork+0x10/0x20 [ 29.120495] [ 29.120827] Allocated by task 254: [ 29.121251] kasan_save_stack+0x3c/0x68 [ 29.121849] kasan_save_track+0x20/0x40 [ 29.122358] kasan_save_alloc_info+0x40/0x58 [ 29.123011] __kasan_kmalloc+0xd4/0xd8 [ 29.123491] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.124201] kasan_atomics+0xb8/0x2e8 [ 29.124700] kunit_try_run_case+0x14c/0x3d0 [ 29.125289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.125944] kthread+0x24c/0x2d0 [ 29.126476] ret_from_fork+0x10/0x20 [ 29.127064] [ 29.127379] The buggy address belongs to the object at fff00000c5d53180 [ 29.127379] which belongs to the cache kmalloc-64 of size 64 [ 29.128526] The buggy address is located 0 bytes to the right of [ 29.128526] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.129714] [ 29.130059] The buggy address belongs to the physical page: [ 29.130722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.131661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.132389] page_type: f5(slab) [ 29.132890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.133799] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.134563] page dumped because: kasan: bad access detected [ 29.135224] [ 29.135525] Memory state around the buggy address: [ 29.136055] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.136940] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.137728] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.138498] ^ [ 29.139194] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.139976] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.140809] ==================================================================


[ 29.250041] ================================================================== [ 29.250651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 29.251797] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.252728] [ 29.253101] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.254733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.255458] Hardware name: linux,dummy-virt (DT) [ 29.256239] Call trace: [ 29.256803] show_stack+0x20/0x38 (C) [ 29.257474] dump_stack_lvl+0x8c/0xd0 [ 29.258170] print_report+0x118/0x5e0 [ 29.258884] kasan_report+0xc8/0x118 [ 29.259515] __asan_report_load4_noabort+0x20/0x30 [ 29.260102] kasan_atomics_helper+0x3de4/0x4858 [ 29.260680] kasan_atomics+0x198/0x2e8 [ 29.261604] kunit_try_run_case+0x14c/0x3d0 [ 29.262339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.263195] kthread+0x24c/0x2d0 [ 29.263854] ret_from_fork+0x10/0x20 [ 29.264514] [ 29.264820] Allocated by task 254: [ 29.265307] kasan_save_stack+0x3c/0x68 [ 29.266137] kasan_save_track+0x20/0x40 [ 29.266782] kasan_save_alloc_info+0x40/0x58 [ 29.267327] __kasan_kmalloc+0xd4/0xd8 [ 29.267977] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.268676] kasan_atomics+0xb8/0x2e8 [ 29.269337] kunit_try_run_case+0x14c/0x3d0 [ 29.270056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.270877] kthread+0x24c/0x2d0 [ 29.271480] ret_from_fork+0x10/0x20 [ 29.271993] [ 29.272306] The buggy address belongs to the object at fff00000c5d53180 [ 29.272306] which belongs to the cache kmalloc-64 of size 64 [ 29.273847] The buggy address is located 0 bytes to the right of [ 29.273847] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.275282] [ 29.275796] The buggy address belongs to the physical page: [ 29.276534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.277535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.278373] page_type: f5(slab) [ 29.279043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.280046] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.281010] page dumped because: kasan: bad access detected [ 29.281648] [ 29.282210] Memory state around the buggy address: [ 29.282929] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.283823] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.284768] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.285506] ^ [ 29.286304] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.287244] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.288145] ==================================================================


[ 30.052844] ================================================================== [ 30.053534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 30.054356] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.055278] [ 30.055647] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.056694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.057171] Hardware name: linux,dummy-virt (DT) [ 30.057783] Call trace: [ 30.058180] show_stack+0x20/0x38 (C) [ 30.058704] dump_stack_lvl+0x8c/0xd0 [ 30.059297] print_report+0x118/0x5e0 [ 30.059835] kasan_report+0xc8/0x118 [ 30.060351] __asan_report_load8_noabort+0x20/0x30 [ 30.060992] kasan_atomics_helper+0x3f04/0x4858 [ 30.061658] kasan_atomics+0x198/0x2e8 [ 30.062254] kunit_try_run_case+0x14c/0x3d0 [ 30.062882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.063595] kthread+0x24c/0x2d0 [ 30.064187] ret_from_fork+0x10/0x20 [ 30.064726] [ 30.065077] Allocated by task 254: [ 30.065539] kasan_save_stack+0x3c/0x68 [ 30.066134] kasan_save_track+0x20/0x40 [ 30.066666] kasan_save_alloc_info+0x40/0x58 [ 30.067250] __kasan_kmalloc+0xd4/0xd8 [ 30.067837] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.068421] kasan_atomics+0xb8/0x2e8 [ 30.068982] kunit_try_run_case+0x14c/0x3d0 [ 30.069623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.070237] kthread+0x24c/0x2d0 [ 30.070820] ret_from_fork+0x10/0x20 [ 30.071376] [ 30.071661] The buggy address belongs to the object at fff00000c5d53180 [ 30.071661] which belongs to the cache kmalloc-64 of size 64 [ 30.072919] The buggy address is located 0 bytes to the right of [ 30.072919] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.074131] [ 30.074446] The buggy address belongs to the physical page: [ 30.075013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.076042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.076734] page_type: f5(slab) [ 30.077249] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.078074] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.078913] page dumped because: kasan: bad access detected [ 30.079612] [ 30.079956] Memory state around the buggy address: [ 30.080525] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.081321] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.082084] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.082844] ^ [ 30.083479] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.084240] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.085003] ==================================================================


[ 30.261554] ================================================================== [ 30.262506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 30.263557] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.264557] [ 30.265012] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.265479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.265694] Hardware name: linux,dummy-virt (DT) [ 30.265955] Call trace: [ 30.266117] show_stack+0x20/0x38 (C) [ 30.266350] dump_stack_lvl+0x8c/0xd0 [ 30.266597] print_report+0x118/0x5e0 [ 30.267180] kasan_report+0xc8/0x118 [ 30.268109] __asan_report_load8_noabort+0x20/0x30 [ 30.269074] kasan_atomics_helper+0x3db0/0x4858 [ 30.269936] kasan_atomics+0x198/0x2e8 [ 30.270588] kunit_try_run_case+0x14c/0x3d0 [ 30.271246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.271936] kthread+0x24c/0x2d0 [ 30.272428] ret_from_fork+0x10/0x20 [ 30.272972] [ 30.273293] Allocated by task 254: [ 30.273771] kasan_save_stack+0x3c/0x68 [ 30.274295] kasan_save_track+0x20/0x40 [ 30.274884] kasan_save_alloc_info+0x40/0x58 [ 30.275394] __kasan_kmalloc+0xd4/0xd8 [ 30.275988] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.276576] kasan_atomics+0xb8/0x2e8 [ 30.277114] kunit_try_run_case+0x14c/0x3d0 [ 30.277659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.278301] kthread+0x24c/0x2d0 [ 30.278808] ret_from_fork+0x10/0x20 [ 30.279322] [ 30.279625] The buggy address belongs to the object at fff00000c5d53180 [ 30.279625] which belongs to the cache kmalloc-64 of size 64 [ 30.280844] The buggy address is located 0 bytes to the right of [ 30.280844] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.282125] [ 30.282468] The buggy address belongs to the physical page: [ 30.283125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.284063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.284926] page_type: f5(slab) [ 30.285388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.286324] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.287156] page dumped because: kasan: bad access detected [ 30.287790] [ 30.288104] Memory state around the buggy address: [ 30.288629] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.289507] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.290280] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.291090] ^ [ 30.291719] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.292511] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.293247] ==================================================================


[ 28.084279] ================================================================== [ 28.085889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 28.086670] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.087289] [ 28.088483] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.089645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.090301] Hardware name: linux,dummy-virt (DT) [ 28.091138] Call trace: [ 28.091648] show_stack+0x20/0x38 (C) [ 28.092078] dump_stack_lvl+0x8c/0xd0 [ 28.092483] print_report+0x118/0x5e0 [ 28.092913] kasan_report+0xc8/0x118 [ 28.093720] __asan_report_load4_noabort+0x20/0x30 [ 28.094374] kasan_atomics_helper+0x40a8/0x4858 [ 28.094914] kasan_atomics+0x198/0x2e8 [ 28.095627] kunit_try_run_case+0x14c/0x3d0 [ 28.096298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.097398] kthread+0x24c/0x2d0 [ 28.098019] ret_from_fork+0x10/0x20 [ 28.098767] [ 28.099398] Allocated by task 254: [ 28.099943] kasan_save_stack+0x3c/0x68 [ 28.100583] kasan_save_track+0x20/0x40 [ 28.101314] kasan_save_alloc_info+0x40/0x58 [ 28.102022] __kasan_kmalloc+0xd4/0xd8 [ 28.102705] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.103592] kasan_atomics+0xb8/0x2e8 [ 28.104274] kunit_try_run_case+0x14c/0x3d0 [ 28.104932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.105766] kthread+0x24c/0x2d0 [ 28.106244] ret_from_fork+0x10/0x20 [ 28.106963] [ 28.108389] The buggy address belongs to the object at fff00000c5d53180 [ 28.108389] which belongs to the cache kmalloc-64 of size 64 [ 28.109833] The buggy address is located 0 bytes to the right of [ 28.109833] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.111428] [ 28.111736] The buggy address belongs to the physical page: [ 28.112717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.113596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.114394] page_type: f5(slab) [ 28.114918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.116105] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.116968] page dumped because: kasan: bad access detected [ 28.117551] [ 28.117921] Memory state around the buggy address: [ 28.118472] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.119609] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.120427] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.121246] ^ [ 28.121825] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.122612] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.123813] ==================================================================


[ 29.179945] ================================================================== [ 29.180641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 29.181415] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.182190] [ 29.182576] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.183814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.184229] Hardware name: linux,dummy-virt (DT) [ 29.184663] Call trace: [ 29.184987] show_stack+0x20/0x38 (C) [ 29.185398] dump_stack_lvl+0x8c/0xd0 [ 29.185865] print_report+0x118/0x5e0 [ 29.187195] kasan_report+0xc8/0x118 [ 29.187798] __asan_report_load4_noabort+0x20/0x30 [ 29.188237] kasan_atomics_helper+0x3dbc/0x4858 [ 29.188701] kasan_atomics+0x198/0x2e8 [ 29.189137] kunit_try_run_case+0x14c/0x3d0 [ 29.189849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.190525] kthread+0x24c/0x2d0 [ 29.191044] ret_from_fork+0x10/0x20 [ 29.191612] [ 29.191947] Allocated by task 254: [ 29.192400] kasan_save_stack+0x3c/0x68 [ 29.193004] kasan_save_track+0x20/0x40 [ 29.193493] kasan_save_alloc_info+0x40/0x58 [ 29.194177] __kasan_kmalloc+0xd4/0xd8 [ 29.194712] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.195262] kasan_atomics+0xb8/0x2e8 [ 29.195833] kunit_try_run_case+0x14c/0x3d0 [ 29.196481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.197220] kthread+0x24c/0x2d0 [ 29.197695] ret_from_fork+0x10/0x20 [ 29.198300] [ 29.198666] The buggy address belongs to the object at fff00000c5d53180 [ 29.198666] which belongs to the cache kmalloc-64 of size 64 [ 29.199820] The buggy address is located 0 bytes to the right of [ 29.199820] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.201207] [ 29.201553] The buggy address belongs to the physical page: [ 29.202602] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.203473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.204276] page_type: f5(slab) [ 29.204713] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.205622] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.206490] page dumped because: kasan: bad access detected [ 29.207174] [ 29.207482] Memory state around the buggy address: [ 29.208055] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.208849] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.209568] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.210418] ^ [ 29.211032] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.211791] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.212587] ==================================================================


[ 30.409722] ================================================================== [ 30.410760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 30.411763] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.412641] [ 30.413090] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.414125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.414602] Hardware name: linux,dummy-virt (DT) [ 30.415168] Call trace: [ 30.415577] show_stack+0x20/0x38 (C) [ 30.416229] dump_stack_lvl+0x8c/0xd0 [ 30.416738] print_report+0x118/0x5e0 [ 30.417442] kasan_report+0xc8/0x118 [ 30.418097] __asan_report_load8_noabort+0x20/0x30 [ 30.418958] kasan_atomics_helper+0x3e10/0x4858 [ 30.419643] kasan_atomics+0x198/0x2e8 [ 30.420204] kunit_try_run_case+0x14c/0x3d0 [ 30.420906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.421540] kthread+0x24c/0x2d0 [ 30.422183] ret_from_fork+0x10/0x20 [ 30.422858] [ 30.423218] Allocated by task 254: [ 30.423688] kasan_save_stack+0x3c/0x68 [ 30.424362] kasan_save_track+0x20/0x40 [ 30.424992] kasan_save_alloc_info+0x40/0x58 [ 30.425647] __kasan_kmalloc+0xd4/0xd8 [ 30.426229] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.426867] kasan_atomics+0xb8/0x2e8 [ 30.427425] kunit_try_run_case+0x14c/0x3d0 [ 30.427980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.428723] kthread+0x24c/0x2d0 [ 30.429352] ret_from_fork+0x10/0x20 [ 30.429943] [ 30.430288] The buggy address belongs to the object at fff00000c5d53180 [ 30.430288] which belongs to the cache kmalloc-64 of size 64 [ 30.431637] The buggy address is located 0 bytes to the right of [ 30.431637] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.432992] [ 30.433364] The buggy address belongs to the physical page: [ 30.434114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.435027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.435945] page_type: f5(slab) [ 30.436452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.437387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.438256] page dumped because: kasan: bad access detected [ 30.438981] [ 30.439302] Memory state around the buggy address: [ 30.439933] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.440799] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.441661] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.442398] ^ [ 30.443020] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.443814] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.444607] ==================================================================


[ 29.333593] ================================================================== [ 29.334205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.334868] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.336773] [ 29.337110] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.338207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.338819] Hardware name: linux,dummy-virt (DT) [ 29.339418] Call trace: [ 29.339886] show_stack+0x20/0x38 (C) [ 29.340508] dump_stack_lvl+0x8c/0xd0 [ 29.341130] print_report+0x118/0x5e0 [ 29.341791] kasan_report+0xc8/0x118 [ 29.342394] __asan_report_load4_noabort+0x20/0x30 [ 29.343125] kasan_atomics_helper+0x3dd8/0x4858 [ 29.343825] kasan_atomics+0x198/0x2e8 [ 29.344434] kunit_try_run_case+0x14c/0x3d0 [ 29.345101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.345845] kthread+0x24c/0x2d0 [ 29.346363] ret_from_fork+0x10/0x20 [ 29.346974] [ 29.347200] Allocated by task 254: [ 29.347822] kasan_save_stack+0x3c/0x68 [ 29.348407] kasan_save_track+0x20/0x40 [ 29.349052] kasan_save_alloc_info+0x40/0x58 [ 29.349715] __kasan_kmalloc+0xd4/0xd8 [ 29.350289] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.350931] kasan_atomics+0xb8/0x2e8 [ 29.351483] kunit_try_run_case+0x14c/0x3d0 [ 29.351915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.352393] kthread+0x24c/0x2d0 [ 29.352776] ret_from_fork+0x10/0x20 [ 29.353207] [ 29.353484] The buggy address belongs to the object at fff00000c5d53180 [ 29.353484] which belongs to the cache kmalloc-64 of size 64 [ 29.355064] The buggy address is located 0 bytes to the right of [ 29.355064] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.356029] [ 29.356284] The buggy address belongs to the physical page: [ 29.357390] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.358528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.359326] page_type: f5(slab) [ 29.359686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.360450] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.361205] page dumped because: kasan: bad access detected [ 29.361700] [ 29.362044] Memory state around the buggy address: [ 29.363260] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.364075] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.364790] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.365362] ^ [ 29.365926] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.366826] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.367616] ==================================================================


[ 28.293551] ================================================================== [ 28.294338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 28.295586] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.296643] [ 28.298093] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.299180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.299816] Hardware name: linux,dummy-virt (DT) [ 28.300389] Call trace: [ 28.300769] show_stack+0x20/0x38 (C) [ 28.301297] dump_stack_lvl+0x8c/0xd0 [ 28.302444] print_report+0x118/0x5e0 [ 28.302884] kasan_report+0xc8/0x118 [ 28.303654] __asan_report_load4_noabort+0x20/0x30 [ 28.304438] kasan_atomics_helper+0x40fc/0x4858 [ 28.305209] kasan_atomics+0x198/0x2e8 [ 28.305909] kunit_try_run_case+0x14c/0x3d0 [ 28.306622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.307629] kthread+0x24c/0x2d0 [ 28.308318] ret_from_fork+0x10/0x20 [ 28.309212] [ 28.309658] Allocated by task 254: [ 28.310330] kasan_save_stack+0x3c/0x68 [ 28.310799] kasan_save_track+0x20/0x40 [ 28.311454] kasan_save_alloc_info+0x40/0x58 [ 28.312366] __kasan_kmalloc+0xd4/0xd8 [ 28.313007] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.313762] kasan_atomics+0xb8/0x2e8 [ 28.314429] kunit_try_run_case+0x14c/0x3d0 [ 28.316070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.316421] kthread+0x24c/0x2d0 [ 28.316633] ret_from_fork+0x10/0x20 [ 28.317766] [ 28.318230] The buggy address belongs to the object at fff00000c5d53180 [ 28.318230] which belongs to the cache kmalloc-64 of size 64 [ 28.320046] The buggy address is located 0 bytes to the right of [ 28.320046] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.321335] [ 28.321625] The buggy address belongs to the physical page: [ 28.322726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.323985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.324928] page_type: f5(slab) [ 28.325573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.326587] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.327871] page dumped because: kasan: bad access detected [ 28.328717] [ 28.329204] Memory state around the buggy address: [ 28.329833] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.330867] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.331812] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.332967] ^ [ 28.333554] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.334610] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.336526] ==================================================================


[ 30.330377] ================================================================== [ 30.332270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 30.333032] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.334073] [ 30.334709] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.335909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.336478] Hardware name: linux,dummy-virt (DT) [ 30.337136] Call trace: [ 30.337678] show_stack+0x20/0x38 (C) [ 30.338337] dump_stack_lvl+0x8c/0xd0 [ 30.339035] print_report+0x118/0x5e0 [ 30.339660] kasan_report+0xc8/0x118 [ 30.340296] __asan_report_load8_noabort+0x20/0x30 [ 30.341047] kasan_atomics_helper+0x3df4/0x4858 [ 30.341730] kasan_atomics+0x198/0x2e8 [ 30.342394] kunit_try_run_case+0x14c/0x3d0 [ 30.343093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.343849] kthread+0x24c/0x2d0 [ 30.344461] ret_from_fork+0x10/0x20 [ 30.345094] [ 30.345465] Allocated by task 254: [ 30.346094] kasan_save_stack+0x3c/0x68 [ 30.346785] kasan_save_track+0x20/0x40 [ 30.347420] kasan_save_alloc_info+0x40/0x58 [ 30.348132] __kasan_kmalloc+0xd4/0xd8 [ 30.348769] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.349315] kasan_atomics+0xb8/0x2e8 [ 30.349794] kunit_try_run_case+0x14c/0x3d0 [ 30.350302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.350976] kthread+0x24c/0x2d0 [ 30.351390] ret_from_fork+0x10/0x20 [ 30.352123] [ 30.352468] The buggy address belongs to the object at fff00000c5d53180 [ 30.352468] which belongs to the cache kmalloc-64 of size 64 [ 30.354041] The buggy address is located 0 bytes to the right of [ 30.354041] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.355547] [ 30.356046] The buggy address belongs to the physical page: [ 30.356824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.357830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.358662] page_type: f5(slab) [ 30.359258] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.360196] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.361098] page dumped because: kasan: bad access detected [ 30.361821] [ 30.362045] Memory state around the buggy address: [ 30.362859] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.363820] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.364760] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.365596] ^ [ 30.366256] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.367138] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.367978] ==================================================================


[ 30.482315] ================================================================== [ 30.483093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 30.483933] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 30.484901] [ 30.485306] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 30.486272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.486884] Hardware name: linux,dummy-virt (DT) [ 30.487332] Call trace: [ 30.487801] show_stack+0x20/0x38 (C) [ 30.488328] dump_stack_lvl+0x8c/0xd0 [ 30.489462] print_report+0x118/0x5e0 [ 30.489992] kasan_report+0xc8/0x118 [ 30.490594] __asan_report_load8_noabort+0x20/0x30 [ 30.491286] kasan_atomics_helper+0x3e20/0x4858 [ 30.491932] kasan_atomics+0x198/0x2e8 [ 30.492515] kunit_try_run_case+0x14c/0x3d0 [ 30.493152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.493810] kthread+0x24c/0x2d0 [ 30.494418] ret_from_fork+0x10/0x20 [ 30.494993] [ 30.495366] Allocated by task 254: [ 30.495913] kasan_save_stack+0x3c/0x68 [ 30.496560] kasan_save_track+0x20/0x40 [ 30.497220] kasan_save_alloc_info+0x40/0x58 [ 30.497852] __kasan_kmalloc+0xd4/0xd8 [ 30.498423] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.498997] kasan_atomics+0xb8/0x2e8 [ 30.499638] kunit_try_run_case+0x14c/0x3d0 [ 30.500219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.500962] kthread+0x24c/0x2d0 [ 30.501573] ret_from_fork+0x10/0x20 [ 30.502191] [ 30.502514] The buggy address belongs to the object at fff00000c5d53180 [ 30.502514] which belongs to the cache kmalloc-64 of size 64 [ 30.503906] The buggy address is located 0 bytes to the right of [ 30.503906] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 30.505261] [ 30.505587] The buggy address belongs to the physical page: [ 30.506324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 30.507176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.508012] page_type: f5(slab) [ 30.508545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.509410] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.510277] page dumped because: kasan: bad access detected [ 30.511029] [ 30.511390] Memory state around the buggy address: [ 30.512003] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.512891] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.513628] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.514513] ^ [ 30.515054] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.515993] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.516842] ==================================================================


[ 29.403330] ================================================================== [ 29.404720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.405121] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.405455] [ 29.405605] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.407784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.408692] Hardware name: linux,dummy-virt (DT) [ 29.409151] Call trace: [ 29.409341] show_stack+0x20/0x38 (C) [ 29.409584] dump_stack_lvl+0x8c/0xd0 [ 29.409926] print_report+0x118/0x5e0 [ 29.410604] kasan_report+0xc8/0x118 [ 29.411627] __asan_report_load4_noabort+0x20/0x30 [ 29.412595] kasan_atomics_helper+0x3e04/0x4858 [ 29.413361] kasan_atomics+0x198/0x2e8 [ 29.413975] kunit_try_run_case+0x14c/0x3d0 [ 29.414502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.415238] kthread+0x24c/0x2d0 [ 29.415927] ret_from_fork+0x10/0x20 [ 29.416618] [ 29.417040] Allocated by task 254: [ 29.417658] kasan_save_stack+0x3c/0x68 [ 29.418414] kasan_save_track+0x20/0x40 [ 29.419117] kasan_save_alloc_info+0x40/0x58 [ 29.419815] __kasan_kmalloc+0xd4/0xd8 [ 29.420434] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.421163] kasan_atomics+0xb8/0x2e8 [ 29.421772] kunit_try_run_case+0x14c/0x3d0 [ 29.422489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.423273] kthread+0x24c/0x2d0 [ 29.423868] ret_from_fork+0x10/0x20 [ 29.424510] [ 29.424960] The buggy address belongs to the object at fff00000c5d53180 [ 29.424960] which belongs to the cache kmalloc-64 of size 64 [ 29.426339] The buggy address is located 0 bytes to the right of [ 29.426339] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.427823] [ 29.428285] The buggy address belongs to the physical page: [ 29.429092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.430094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.430958] page_type: f5(slab) [ 29.431517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.432486] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.433431] page dumped because: kasan: bad access detected [ 29.434165] [ 29.434614] Memory state around the buggy address: [ 29.435278] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.436008] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.436716] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.437501] ^ [ 29.438279] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.439192] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.440074] ==================================================================


[ 29.479760] ================================================================== [ 29.480401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.481333] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.482493] [ 29.482925] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.484061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.484672] Hardware name: linux,dummy-virt (DT) [ 29.485334] Call trace: [ 29.485775] show_stack+0x20/0x38 (C) [ 29.486442] dump_stack_lvl+0x8c/0xd0 [ 29.487062] print_report+0x118/0x5e0 [ 29.487681] kasan_report+0xc8/0x118 [ 29.488334] __asan_report_load8_noabort+0x20/0x30 [ 29.489022] kasan_atomics_helper+0x3f58/0x4858 [ 29.489688] kasan_atomics+0x198/0x2e8 [ 29.490318] kunit_try_run_case+0x14c/0x3d0 [ 29.490993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.491720] kthread+0x24c/0x2d0 [ 29.492311] ret_from_fork+0x10/0x20 [ 29.492912] [ 29.493237] Allocated by task 254: [ 29.493789] kasan_save_stack+0x3c/0x68 [ 29.494438] kasan_save_track+0x20/0x40 [ 29.495036] kasan_save_alloc_info+0x40/0x58 [ 29.495704] __kasan_kmalloc+0xd4/0xd8 [ 29.496306] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.496963] kasan_atomics+0xb8/0x2e8 [ 29.497486] kunit_try_run_case+0x14c/0x3d0 [ 29.498155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.498908] kthread+0x24c/0x2d0 [ 29.499420] ret_from_fork+0x10/0x20 [ 29.500011] [ 29.500402] The buggy address belongs to the object at fff00000c5d53180 [ 29.500402] which belongs to the cache kmalloc-64 of size 64 [ 29.501707] The buggy address is located 0 bytes to the right of [ 29.501707] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.503105] [ 29.503481] The buggy address belongs to the physical page: [ 29.504192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.504985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.505865] page_type: f5(slab) [ 29.506414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.507378] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.508249] page dumped because: kasan: bad access detected [ 29.508934] [ 29.509258] Memory state around the buggy address: [ 29.509897] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.510829] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.511683] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.512471] ^ [ 29.513151] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.514001] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.514816] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper-dacb5ab3cc26431c27057666ac6d7fa7df9e116b7a951401f3828546fc7c0ed0/details/) (gcc-13-lkftconfig-kunit)[ 29.557197] ================================================================== [ 29.557896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.559080] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 29.559694] [ 29.560047] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 29.560989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.561550] Hardware name: linux,dummy-virt (DT) [ 29.562175] Call trace: [ 29.562672] show_stack+0x20/0x38 (C) [ 29.563202] dump_stack_lvl+0x8c/0xd0 [ 29.563661] print_report+0x118/0x5e0 [ 29.564354] kasan_report+0xc8/0x118 [ 29.565020] __asan_report_store8_noabort+0x20/0x30 [ 29.565796] kasan_atomics_helper+0x3e5c/0x4858 [ 29.566409] kasan_atomics+0x198/0x2e8 [ 29.567101] kunit_try_run_case+0x14c/0x3d0 [ 29.567889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.568599] kthread+0x24c/0x2d0 [ 29.569218] ret_from_fork+0x10/0x20 [ 29.569844] [ 29.570179] Allocated by task 254: [ 29.570709] kasan_save_stack+0x3c/0x68 [ 29.571374] kasan_save_track+0x20/0x40 [ 29.572015] kasan_save_alloc_info+0x40/0x58 [ 29.572629] __kasan_kmalloc+0xd4/0xd8 [ 29.573204] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.573872] kasan_atomics+0xb8/0x2e8 [ 29.574408] kunit_try_run_case+0x14c/0x3d0 [ 29.575061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.575813] kthread+0x24c/0x2d0 [ 29.576324] ret_from_fork+0x10/0x20 [ 29.576962] [ 29.577355] The buggy address belongs to the object at fff00000c5d53180 [ 29.577355] which belongs to the cache kmalloc-64 of size 64 [ 29.578595] The buggy address is located 0 bytes to the right of [ 29.578595] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 29.580031] [ 29.580403] The buggy address belongs to the physical page: [ 29.581059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 29.582022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.582869] page_type: f5(slab) [ 29.583408] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.584326] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.585176] page dumped because: kasan: bad access detected [ 29.585852] [ 29.586195] Memory state around the buggy address: [ 29.586836] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.587644] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.588549] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.589363] ^ [ 29.589988] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.590853] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.591655] ==================================================================


[ 28.126159] ================================================================== [ 28.126871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 28.128593] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.129298] [ 28.129613] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.131524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.132009] Hardware name: linux,dummy-virt (DT) [ 28.132580] Call trace: [ 28.132951] show_stack+0x20/0x38 (C) [ 28.133465] dump_stack_lvl+0x8c/0xd0 [ 28.134508] print_report+0x118/0x5e0 [ 28.135220] kasan_report+0xc8/0x118 [ 28.136135] __asan_report_store4_noabort+0x20/0x30 [ 28.136905] kasan_atomics_helper+0x3f7c/0x4858 [ 28.137826] kasan_atomics+0x198/0x2e8 [ 28.138497] kunit_try_run_case+0x14c/0x3d0 [ 28.139509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.140317] kthread+0x24c/0x2d0 [ 28.140974] ret_from_fork+0x10/0x20 [ 28.141659] [ 28.142143] Allocated by task 254: [ 28.142775] kasan_save_stack+0x3c/0x68 [ 28.143478] kasan_save_track+0x20/0x40 [ 28.144416] kasan_save_alloc_info+0x40/0x58 [ 28.145152] __kasan_kmalloc+0xd4/0xd8 [ 28.145823] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.146393] kasan_atomics+0xb8/0x2e8 [ 28.146920] kunit_try_run_case+0x14c/0x3d0 [ 28.148519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.149210] kthread+0x24c/0x2d0 [ 28.149698] ret_from_fork+0x10/0x20 [ 28.150269] [ 28.150605] The buggy address belongs to the object at fff00000c5d53180 [ 28.150605] which belongs to the cache kmalloc-64 of size 64 [ 28.152227] The buggy address is located 0 bytes to the right of [ 28.152227] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.153504] [ 28.153890] The buggy address belongs to the physical page: [ 28.154540] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.155848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.156621] page_type: f5(slab) [ 28.157113] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.157998] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.158820] page dumped because: kasan: bad access detected [ 28.159713] [ 28.160025] Memory state around the buggy address: [ 28.160554] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.161398] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.162262] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.163113] ^ [ 28.164016] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.164820] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.165574] ==================================================================


[ 28.378410] ================================================================== [ 28.379143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 28.379880] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254 [ 28.380673] [ 28.381472] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.382559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.383760] Hardware name: linux,dummy-virt (DT) [ 28.384757] Call trace: [ 28.385221] show_stack+0x20/0x38 (C) [ 28.385528] dump_stack_lvl+0x8c/0xd0 [ 28.385821] print_report+0x118/0x5e0 [ 28.386424] kasan_report+0xc8/0x118 [ 28.387489] __asan_report_store4_noabort+0x20/0x30 [ 28.388770] kasan_atomics_helper+0x3f94/0x4858 [ 28.389292] kasan_atomics+0x198/0x2e8 [ 28.389704] kunit_try_run_case+0x14c/0x3d0 [ 28.390604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.391924] kthread+0x24c/0x2d0 [ 28.392652] ret_from_fork+0x10/0x20 [ 28.393180] [ 28.393489] Allocated by task 254: [ 28.393990] kasan_save_stack+0x3c/0x68 [ 28.394481] kasan_save_track+0x20/0x40 [ 28.396904] kasan_save_alloc_info+0x40/0x58 [ 28.397679] __kasan_kmalloc+0xd4/0xd8 [ 28.398350] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.398975] kasan_atomics+0xb8/0x2e8 [ 28.399440] kunit_try_run_case+0x14c/0x3d0 [ 28.400055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.400793] kthread+0x24c/0x2d0 [ 28.401350] ret_from_fork+0x10/0x20 [ 28.401987] [ 28.402392] The buggy address belongs to the object at fff00000c5d53180 [ 28.402392] which belongs to the cache kmalloc-64 of size 64 [ 28.404163] The buggy address is located 0 bytes to the right of [ 28.404163] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0) [ 28.405808] [ 28.406187] The buggy address belongs to the physical page: [ 28.406928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53 [ 28.408120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.409133] page_type: f5(slab) [ 28.409676] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.410597] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.411857] page dumped because: kasan: bad access detected [ 28.412664] [ 28.413028] Memory state around the buggy address: [ 28.413554] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.414449] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.415788] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.416466] ^ [ 28.417156] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.417696] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.419124] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop-d29ba521d10e07482ca0cfdaba547a91135688c2944828db5b0d66e8b243b80a/details/) (gcc-13-lkftconfig-kunit)[ 27.398146] ================================================================== [ 27.398780] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 27.400533] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.401461] [ 27.401813] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.402934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.404358] Hardware name: linux,dummy-virt (DT) [ 27.404919] Call trace: [ 27.405359] show_stack+0x20/0x38 (C) [ 27.405931] dump_stack_lvl+0x8c/0xd0 [ 27.406576] print_report+0x118/0x5e0 [ 27.407299] kasan_report+0xc8/0x118 [ 27.407935] kasan_check_range+0x100/0x1a8 [ 27.408475] __kasan_check_write+0x20/0x30 [ 27.409011] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 27.409618] kasan_bitops_generic+0x110/0x1c8 [ 27.411856] kunit_try_run_case+0x14c/0x3d0 [ 27.412323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.413283] kthread+0x24c/0x2d0 [ 27.413929] ret_from_fork+0x10/0x20 [ 27.414635] [ 27.415574] Allocated by task 250: [ 27.415982] kasan_save_stack+0x3c/0x68 [ 27.416505] kasan_save_track+0x20/0x40 [ 27.417047] kasan_save_alloc_info+0x40/0x58 [ 27.417577] __kasan_kmalloc+0xd4/0xd8 [ 27.418204] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.418704] kasan_bitops_generic+0xa0/0x1c8 [ 27.419476] kunit_try_run_case+0x14c/0x3d0 [ 27.420308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.420781] kthread+0x24c/0x2d0 [ 27.422028] ret_from_fork+0x10/0x20 [ 27.422426] [ 27.422649] The buggy address belongs to the object at fff00000c5b73360 [ 27.422649] which belongs to the cache kmalloc-16 of size 16 [ 27.424523] The buggy address is located 8 bytes inside of [ 27.424523] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.425920] [ 27.426218] The buggy address belongs to the physical page: [ 27.426861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.428267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.428599] page_type: f5(slab) [ 27.428838] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.429186] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.429513] page dumped because: kasan: bad access detected [ 27.429837] [ 27.430209] Memory state around the buggy address: [ 27.432078] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.432985] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.434005] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.434970] ^ [ 27.435662] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.437260] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.438164] ==================================================================


[ 27.481475] ================================================================== [ 27.482203] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 27.483163] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.485168] [ 27.485509] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.486669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.487632] Hardware name: linux,dummy-virt (DT) [ 27.488174] Call trace: [ 27.488642] show_stack+0x20/0x38 (C) [ 27.489290] dump_stack_lvl+0x8c/0xd0 [ 27.490001] print_report+0x118/0x5e0 [ 27.490525] kasan_report+0xc8/0x118 [ 27.491215] kasan_check_range+0x100/0x1a8 [ 27.492045] __kasan_check_write+0x20/0x30 [ 27.493050] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 27.494138] kasan_bitops_generic+0x110/0x1c8 [ 27.495043] kunit_try_run_case+0x14c/0x3d0 [ 27.495726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.496404] kthread+0x24c/0x2d0 [ 27.496870] ret_from_fork+0x10/0x20 [ 27.497364] [ 27.497642] Allocated by task 250: [ 27.498636] kasan_save_stack+0x3c/0x68 [ 27.499458] kasan_save_track+0x20/0x40 [ 27.500219] kasan_save_alloc_info+0x40/0x58 [ 27.501319] __kasan_kmalloc+0xd4/0xd8 [ 27.501859] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.502619] kasan_bitops_generic+0xa0/0x1c8 [ 27.503368] kunit_try_run_case+0x14c/0x3d0 [ 27.503954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.505466] kthread+0x24c/0x2d0 [ 27.505852] ret_from_fork+0x10/0x20 [ 27.506236] [ 27.506459] The buggy address belongs to the object at fff00000c5b73360 [ 27.506459] which belongs to the cache kmalloc-16 of size 16 [ 27.507553] The buggy address is located 8 bytes inside of [ 27.507553] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.509334] [ 27.509703] The buggy address belongs to the physical page: [ 27.510238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.512396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.513986] page_type: f5(slab) [ 27.514918] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.516148] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.516673] page dumped because: kasan: bad access detected [ 27.517186] [ 27.517597] Memory state around the buggy address: [ 27.518529] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.519577] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.520421] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.521726] ^ [ 27.522606] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.523541] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.524349] ==================================================================


[ 27.658141] ================================================================== [ 27.658880] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 27.659945] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.661046] [ 27.661397] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.662404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.663161] Hardware name: linux,dummy-virt (DT) [ 27.663622] Call trace: [ 27.664255] show_stack+0x20/0x38 (C) [ 27.664950] dump_stack_lvl+0x8c/0xd0 [ 27.665635] print_report+0x118/0x5e0 [ 27.666334] kasan_report+0xc8/0x118 [ 27.667015] kasan_check_range+0x100/0x1a8 [ 27.667717] __kasan_check_write+0x20/0x30 [ 27.668426] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 27.669231] kasan_bitops_generic+0x110/0x1c8 [ 27.669953] kunit_try_run_case+0x14c/0x3d0 [ 27.670528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.671247] kthread+0x24c/0x2d0 [ 27.672228] ret_from_fork+0x10/0x20 [ 27.672665] [ 27.673144] Allocated by task 250: [ 27.673773] kasan_save_stack+0x3c/0x68 [ 27.674431] kasan_save_track+0x20/0x40 [ 27.675136] kasan_save_alloc_info+0x40/0x58 [ 27.675848] __kasan_kmalloc+0xd4/0xd8 [ 27.676491] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.677224] kasan_bitops_generic+0xa0/0x1c8 [ 27.677944] kunit_try_run_case+0x14c/0x3d0 [ 27.678680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.679347] kthread+0x24c/0x2d0 [ 27.679822] ret_from_fork+0x10/0x20 [ 27.680327] [ 27.680630] The buggy address belongs to the object at fff00000c5b73360 [ 27.680630] which belongs to the cache kmalloc-16 of size 16 [ 27.682478] The buggy address is located 8 bytes inside of [ 27.682478] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.683829] [ 27.684312] The buggy address belongs to the physical page: [ 27.685060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.686025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.686912] page_type: f5(slab) [ 27.687545] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.688500] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.689445] page dumped because: kasan: bad access detected [ 27.690072] [ 27.690377] Memory state around the buggy address: [ 27.691003] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.692272] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.692996] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.693902] ^ [ 27.694786] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.695729] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.696639] ==================================================================


[ 27.616110] ================================================================== [ 27.617282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 27.618299] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.618941] [ 27.620268] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.621419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.622068] Hardware name: linux,dummy-virt (DT) [ 27.622827] Call trace: [ 27.623377] show_stack+0x20/0x38 (C) [ 27.624072] dump_stack_lvl+0x8c/0xd0 [ 27.624710] print_report+0x118/0x5e0 [ 27.625366] kasan_report+0xc8/0x118 [ 27.625944] kasan_check_range+0x100/0x1a8 [ 27.626769] __kasan_check_write+0x20/0x30 [ 27.627472] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 27.628371] kasan_bitops_generic+0x110/0x1c8 [ 27.629014] kunit_try_run_case+0x14c/0x3d0 [ 27.629539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.630521] kthread+0x24c/0x2d0 [ 27.631158] ret_from_fork+0x10/0x20 [ 27.631848] [ 27.632312] Allocated by task 250: [ 27.632920] kasan_save_stack+0x3c/0x68 [ 27.633577] kasan_save_track+0x20/0x40 [ 27.634236] kasan_save_alloc_info+0x40/0x58 [ 27.634965] __kasan_kmalloc+0xd4/0xd8 [ 27.635475] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.636068] kasan_bitops_generic+0xa0/0x1c8 [ 27.636621] kunit_try_run_case+0x14c/0x3d0 [ 27.637517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.638353] kthread+0x24c/0x2d0 [ 27.639019] ret_from_fork+0x10/0x20 [ 27.639686] [ 27.640157] The buggy address belongs to the object at fff00000c5b73360 [ 27.640157] which belongs to the cache kmalloc-16 of size 16 [ 27.641468] The buggy address is located 8 bytes inside of [ 27.641468] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.643094] [ 27.643482] The buggy address belongs to the physical page: [ 27.644266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.645119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.646128] page_type: f5(slab) [ 27.646843] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.647820] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.648779] page dumped because: kasan: bad access detected [ 27.649554] [ 27.649995] Memory state around the buggy address: [ 27.650772] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.651632] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.652529] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.653283] ^ [ 27.654000] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.655217] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.655928] ==================================================================


[ 27.527724] ================================================================== [ 27.528434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 27.529419] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.530294] [ 27.530663] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.531759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.532497] Hardware name: linux,dummy-virt (DT) [ 27.534039] Call trace: [ 27.534826] show_stack+0x20/0x38 (C) [ 27.536413] dump_stack_lvl+0x8c/0xd0 [ 27.537613] print_report+0x118/0x5e0 [ 27.538423] kasan_report+0xc8/0x118 [ 27.539204] kasan_check_range+0x100/0x1a8 [ 27.539786] __kasan_check_write+0x20/0x30 [ 27.540625] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 27.541334] kasan_bitops_generic+0x110/0x1c8 [ 27.542160] kunit_try_run_case+0x14c/0x3d0 [ 27.542902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.543803] kthread+0x24c/0x2d0 [ 27.544483] ret_from_fork+0x10/0x20 [ 27.545097] [ 27.545736] Allocated by task 250: [ 27.546206] kasan_save_stack+0x3c/0x68 [ 27.546779] kasan_save_track+0x20/0x40 [ 27.547932] kasan_save_alloc_info+0x40/0x58 [ 27.548580] __kasan_kmalloc+0xd4/0xd8 [ 27.549203] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.549956] kasan_bitops_generic+0xa0/0x1c8 [ 27.550484] kunit_try_run_case+0x14c/0x3d0 [ 27.551385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.552669] kthread+0x24c/0x2d0 [ 27.553278] ret_from_fork+0x10/0x20 [ 27.553907] [ 27.554322] The buggy address belongs to the object at fff00000c5b73360 [ 27.554322] which belongs to the cache kmalloc-16 of size 16 [ 27.556090] The buggy address is located 8 bytes inside of [ 27.556090] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.557518] [ 27.558012] The buggy address belongs to the physical page: [ 27.558646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.559614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.561237] page_type: f5(slab) [ 27.561898] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.562890] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.563885] page dumped because: kasan: bad access detected [ 27.564507] [ 27.565370] Memory state around the buggy address: [ 27.566177] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.567098] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.568419] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.569443] ^ [ 27.570310] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.571715] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.572687] ==================================================================


[ 27.317309] ================================================================== [ 27.318162] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 27.319067] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.320996] [ 27.321454] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.322441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.322996] Hardware name: linux,dummy-virt (DT) [ 27.323827] Call trace: [ 27.324166] show_stack+0x20/0x38 (C) [ 27.324840] dump_stack_lvl+0x8c/0xd0 [ 27.325569] print_report+0x118/0x5e0 [ 27.326250] kasan_report+0xc8/0x118 [ 27.326805] kasan_check_range+0x100/0x1a8 [ 27.327724] __kasan_check_write+0x20/0x30 [ 27.328361] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 27.329156] kasan_bitops_generic+0x110/0x1c8 [ 27.329811] kunit_try_run_case+0x14c/0x3d0 [ 27.330536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.331562] kthread+0x24c/0x2d0 [ 27.332102] ret_from_fork+0x10/0x20 [ 27.332516] [ 27.332734] Allocated by task 250: [ 27.333211] kasan_save_stack+0x3c/0x68 [ 27.334162] kasan_save_track+0x20/0x40 [ 27.334724] kasan_save_alloc_info+0x40/0x58 [ 27.335676] __kasan_kmalloc+0xd4/0xd8 [ 27.336159] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.336756] kasan_bitops_generic+0xa0/0x1c8 [ 27.337361] kunit_try_run_case+0x14c/0x3d0 [ 27.337967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.338634] kthread+0x24c/0x2d0 [ 27.339380] ret_from_fork+0x10/0x20 [ 27.339863] [ 27.340199] The buggy address belongs to the object at fff00000c5b73360 [ 27.340199] which belongs to the cache kmalloc-16 of size 16 [ 27.341485] The buggy address is located 8 bytes inside of [ 27.341485] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.342912] [ 27.343603] The buggy address belongs to the physical page: [ 27.344191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.345194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.345978] page_type: f5(slab) [ 27.346443] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.347601] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.348443] page dumped because: kasan: bad access detected [ 27.349043] [ 27.349372] Memory state around the buggy address: [ 27.350312] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.351064] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.352188] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.352902] ^ [ 27.353573] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.354246] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.355213] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop-e0cdf5f18e69305ced8e48d6be092968e5d123e72d8e3c887fb2c808c2d3fdf3/details/) (gcc-13-lkftconfig-kunit)[ 27.358213] ================================================================== [ 27.359471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 27.360092] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.360437] [ 27.360589] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.361380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.362084] Hardware name: linux,dummy-virt (DT) [ 27.362858] Call trace: [ 27.363275] show_stack+0x20/0x38 (C) [ 27.364546] dump_stack_lvl+0x8c/0xd0 [ 27.365817] print_report+0x118/0x5e0 [ 27.366409] kasan_report+0xc8/0x118 [ 27.367188] __asan_report_load8_noabort+0x20/0x30 [ 27.367962] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 27.368591] kasan_bitops_generic+0x110/0x1c8 [ 27.369256] kunit_try_run_case+0x14c/0x3d0 [ 27.369814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.370471] kthread+0x24c/0x2d0 [ 27.371837] ret_from_fork+0x10/0x20 [ 27.372404] [ 27.372704] Allocated by task 250: [ 27.373197] kasan_save_stack+0x3c/0x68 [ 27.373734] kasan_save_track+0x20/0x40 [ 27.374303] kasan_save_alloc_info+0x40/0x58 [ 27.374902] __kasan_kmalloc+0xd4/0xd8 [ 27.375403] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.376347] kasan_bitops_generic+0xa0/0x1c8 [ 27.376949] kunit_try_run_case+0x14c/0x3d0 [ 27.377535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.378421] kthread+0x24c/0x2d0 [ 27.379764] ret_from_fork+0x10/0x20 [ 27.380369] [ 27.380679] The buggy address belongs to the object at fff00000c5b73360 [ 27.380679] which belongs to the cache kmalloc-16 of size 16 [ 27.381885] The buggy address is located 8 bytes inside of [ 27.381885] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.383197] [ 27.383979] The buggy address belongs to the physical page: [ 27.384568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.385515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.386302] page_type: f5(slab) [ 27.386804] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.388420] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.389320] page dumped because: kasan: bad access detected [ 27.389916] [ 27.390249] Memory state around the buggy address: [ 27.390845] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.391601] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.392858] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.393621] ^ [ 27.394423] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.395898] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.396587] ==================================================================


[ 27.574496] ================================================================== [ 27.575943] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 27.577233] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.577991] [ 27.578153] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.578586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.578921] Hardware name: linux,dummy-virt (DT) [ 27.580134] Call trace: [ 27.580722] show_stack+0x20/0x38 (C) [ 27.581519] dump_stack_lvl+0x8c/0xd0 [ 27.582308] print_report+0x118/0x5e0 [ 27.582889] kasan_report+0xc8/0x118 [ 27.583763] __asan_report_load8_noabort+0x20/0x30 [ 27.584409] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 27.585081] kasan_bitops_generic+0x110/0x1c8 [ 27.585665] kunit_try_run_case+0x14c/0x3d0 [ 27.586322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.587113] kthread+0x24c/0x2d0 [ 27.587761] ret_from_fork+0x10/0x20 [ 27.588305] [ 27.588601] Allocated by task 250: [ 27.589098] kasan_save_stack+0x3c/0x68 [ 27.590058] kasan_save_track+0x20/0x40 [ 27.590731] kasan_save_alloc_info+0x40/0x58 [ 27.591849] __kasan_kmalloc+0xd4/0xd8 [ 27.592695] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.593767] kasan_bitops_generic+0xa0/0x1c8 [ 27.594464] kunit_try_run_case+0x14c/0x3d0 [ 27.595471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.596276] kthread+0x24c/0x2d0 [ 27.596905] ret_from_fork+0x10/0x20 [ 27.597300] [ 27.597522] The buggy address belongs to the object at fff00000c5b73360 [ 27.597522] which belongs to the cache kmalloc-16 of size 16 [ 27.598580] The buggy address is located 8 bytes inside of [ 27.598580] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.600716] [ 27.601057] The buggy address belongs to the physical page: [ 27.601660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.603843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.604662] page_type: f5(slab) [ 27.605111] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.606152] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.607113] page dumped because: kasan: bad access detected [ 27.608418] [ 27.608646] Memory state around the buggy address: [ 27.609059] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.609847] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.610721] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.611686] ^ [ 27.612524] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.613411] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.614280] ==================================================================


[ 27.439872] ================================================================== [ 27.440620] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 27.442126] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.444506] [ 27.445046] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.446237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.446467] Hardware name: linux,dummy-virt (DT) [ 27.446725] Call trace: [ 27.447243] show_stack+0x20/0x38 (C) [ 27.448495] dump_stack_lvl+0x8c/0xd0 [ 27.449274] print_report+0x118/0x5e0 [ 27.449835] kasan_report+0xc8/0x118 [ 27.450482] __asan_report_load8_noabort+0x20/0x30 [ 27.451181] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 27.451973] kasan_bitops_generic+0x110/0x1c8 [ 27.452590] kunit_try_run_case+0x14c/0x3d0 [ 27.453368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.454145] kthread+0x24c/0x2d0 [ 27.454768] ret_from_fork+0x10/0x20 [ 27.455428] [ 27.456238] Allocated by task 250: [ 27.456813] kasan_save_stack+0x3c/0x68 [ 27.457468] kasan_save_track+0x20/0x40 [ 27.458154] kasan_save_alloc_info+0x40/0x58 [ 27.458793] __kasan_kmalloc+0xd4/0xd8 [ 27.459872] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.460438] kasan_bitops_generic+0xa0/0x1c8 [ 27.461054] kunit_try_run_case+0x14c/0x3d0 [ 27.461629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.462521] kthread+0x24c/0x2d0 [ 27.463017] ret_from_fork+0x10/0x20 [ 27.463518] [ 27.463878] The buggy address belongs to the object at fff00000c5b73360 [ 27.463878] which belongs to the cache kmalloc-16 of size 16 [ 27.465098] The buggy address is located 8 bytes inside of [ 27.465098] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.466262] [ 27.466619] The buggy address belongs to the physical page: [ 27.468169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.469085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.469886] page_type: f5(slab) [ 27.470501] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.471496] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.472645] page dumped because: kasan: bad access detected [ 27.473468] [ 27.473803] Memory state around the buggy address: [ 27.474475] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.475430] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.476513] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.477416] ^ [ 27.478132] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.478936] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.480067] ==================================================================


[ 27.699017] ================================================================== [ 27.699730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 27.700606] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.701713] [ 27.702175] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.703395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.703984] Hardware name: linux,dummy-virt (DT) [ 27.704514] Call trace: [ 27.704925] show_stack+0x20/0x38 (C) [ 27.705486] dump_stack_lvl+0x8c/0xd0 [ 27.706151] print_report+0x118/0x5e0 [ 27.706814] kasan_report+0xc8/0x118 [ 27.707352] __asan_report_load8_noabort+0x20/0x30 [ 27.708099] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 27.708785] kasan_bitops_generic+0x110/0x1c8 [ 27.709425] kunit_try_run_case+0x14c/0x3d0 [ 27.710108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.710842] kthread+0x24c/0x2d0 [ 27.711363] ret_from_fork+0x10/0x20 [ 27.711900] [ 27.712184] Allocated by task 250: [ 27.712646] kasan_save_stack+0x3c/0x68 [ 27.713553] kasan_save_track+0x20/0x40 [ 27.714166] kasan_save_alloc_info+0x40/0x58 [ 27.714720] __kasan_kmalloc+0xd4/0xd8 [ 27.715591] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.716345] kasan_bitops_generic+0xa0/0x1c8 [ 27.717078] kunit_try_run_case+0x14c/0x3d0 [ 27.717796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.718622] kthread+0x24c/0x2d0 [ 27.719118] ret_from_fork+0x10/0x20 [ 27.719617] [ 27.720199] The buggy address belongs to the object at fff00000c5b73360 [ 27.720199] which belongs to the cache kmalloc-16 of size 16 [ 27.721803] The buggy address is located 8 bytes inside of [ 27.721803] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.723055] [ 27.723486] The buggy address belongs to the physical page: [ 27.724017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.725143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.726034] page_type: f5(slab) [ 27.726679] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.727649] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.728440] page dumped because: kasan: bad access detected [ 27.729263] [ 27.729705] Memory state around the buggy address: [ 27.730418] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.731427] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.732343] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.733234] ^ [ 27.734119] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.734883] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.735625] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop-3db53f497cc64d44a09e2770d0951d5ef1e8dd831018dbeb9b8a6ec1225a68b7/details/) (gcc-13-lkftconfig-kunit)[ 27.815848] ================================================================== [ 27.816542] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 27.817969] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.818608] [ 27.819027] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.819905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.820408] Hardware name: linux,dummy-virt (DT) [ 27.820983] Call trace: [ 27.821423] show_stack+0x20/0x38 (C) [ 27.822007] dump_stack_lvl+0x8c/0xd0 [ 27.822592] print_report+0x118/0x5e0 [ 27.823118] kasan_report+0xc8/0x118 [ 27.823697] kasan_check_range+0x100/0x1a8 [ 27.824317] __kasan_check_write+0x20/0x30 [ 27.824908] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 27.825641] kasan_bitops_generic+0x11c/0x1c8 [ 27.826301] kunit_try_run_case+0x14c/0x3d0 [ 27.826959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.827672] kthread+0x24c/0x2d0 [ 27.828223] ret_from_fork+0x10/0x20 [ 27.828788] [ 27.829116] Allocated by task 250: [ 27.829638] kasan_save_stack+0x3c/0x68 [ 27.830123] kasan_save_track+0x20/0x40 [ 27.830783] kasan_save_alloc_info+0x40/0x58 [ 27.831360] __kasan_kmalloc+0xd4/0xd8 [ 27.831852] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.832451] kasan_bitops_generic+0xa0/0x1c8 [ 27.832992] kunit_try_run_case+0x14c/0x3d0 [ 27.833640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.834329] kthread+0x24c/0x2d0 [ 27.834811] ret_from_fork+0x10/0x20 [ 27.835308] [ 27.835588] The buggy address belongs to the object at fff00000c5b73360 [ 27.835588] which belongs to the cache kmalloc-16 of size 16 [ 27.836853] The buggy address is located 8 bytes inside of [ 27.836853] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.838036] [ 27.838392] The buggy address belongs to the physical page: [ 27.838976] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.839957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.840677] page_type: f5(slab) [ 27.841188] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.842022] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.842819] page dumped because: kasan: bad access detected [ 27.843403] [ 27.843761] Memory state around the buggy address: [ 27.844350] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.845207] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.846033] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.846844] ^ [ 27.847612] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.848430] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.849280] ==================================================================


[ 27.885664] ================================================================== [ 27.886601] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 27.887928] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.888684] [ 27.889134] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.890155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.890842] Hardware name: linux,dummy-virt (DT) [ 27.891414] Call trace: [ 27.891824] show_stack+0x20/0x38 (C) [ 27.892382] dump_stack_lvl+0x8c/0xd0 [ 27.892931] print_report+0x118/0x5e0 [ 27.893562] kasan_report+0xc8/0x118 [ 27.894117] kasan_check_range+0x100/0x1a8 [ 27.894773] __kasan_check_write+0x20/0x30 [ 27.895376] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 27.896080] kasan_bitops_generic+0x11c/0x1c8 [ 27.896737] kunit_try_run_case+0x14c/0x3d0 [ 27.897347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.898067] kthread+0x24c/0x2d0 [ 27.898587] ret_from_fork+0x10/0x20 [ 27.899196] [ 27.899529] Allocated by task 250: [ 27.900022] kasan_save_stack+0x3c/0x68 [ 27.900525] kasan_save_track+0x20/0x40 [ 27.901130] kasan_save_alloc_info+0x40/0x58 [ 27.901651] __kasan_kmalloc+0xd4/0xd8 [ 27.902229] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.902780] kasan_bitops_generic+0xa0/0x1c8 [ 27.903432] kunit_try_run_case+0x14c/0x3d0 [ 27.904007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.904702] kthread+0x24c/0x2d0 [ 27.905248] ret_from_fork+0x10/0x20 [ 27.905735] [ 27.906097] The buggy address belongs to the object at fff00000c5b73360 [ 27.906097] which belongs to the cache kmalloc-16 of size 16 [ 27.907379] The buggy address is located 8 bytes inside of [ 27.907379] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.908580] [ 27.908954] The buggy address belongs to the physical page: [ 27.909603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.910504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.911314] page_type: f5(slab) [ 27.911883] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.912693] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.913489] page dumped because: kasan: bad access detected [ 27.914185] [ 27.914567] Memory state around the buggy address: [ 27.915192] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.916006] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.916759] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.917557] ^ [ 27.918369] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.919181] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.919981] ==================================================================


[ 27.738593] ================================================================== [ 27.739374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 27.740551] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.741502] [ 27.742146] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.743264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.743955] Hardware name: linux,dummy-virt (DT) [ 27.744640] Call trace: [ 27.745033] show_stack+0x20/0x38 (C) [ 27.745568] dump_stack_lvl+0x8c/0xd0 [ 27.746329] print_report+0x118/0x5e0 [ 27.746999] kasan_report+0xc8/0x118 [ 27.747649] kasan_check_range+0x100/0x1a8 [ 27.748338] __kasan_check_write+0x20/0x30 [ 27.749049] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 27.749909] kasan_bitops_generic+0x11c/0x1c8 [ 27.750480] kunit_try_run_case+0x14c/0x3d0 [ 27.751078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.751728] kthread+0x24c/0x2d0 [ 27.752589] ret_from_fork+0x10/0x20 [ 27.753254] [ 27.753780] Allocated by task 250: [ 27.754390] kasan_save_stack+0x3c/0x68 [ 27.755033] kasan_save_track+0x20/0x40 [ 27.755671] kasan_save_alloc_info+0x40/0x58 [ 27.756399] __kasan_kmalloc+0xd4/0xd8 [ 27.757080] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.757784] kasan_bitops_generic+0xa0/0x1c8 [ 27.758503] kunit_try_run_case+0x14c/0x3d0 [ 27.759083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.759724] kthread+0x24c/0x2d0 [ 27.760214] ret_from_fork+0x10/0x20 [ 27.760713] [ 27.761473] The buggy address belongs to the object at fff00000c5b73360 [ 27.761473] which belongs to the cache kmalloc-16 of size 16 [ 27.762772] The buggy address is located 8 bytes inside of [ 27.762772] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.764458] [ 27.764690] The buggy address belongs to the physical page: [ 27.765395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.766468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.767327] page_type: f5(slab) [ 27.767970] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.768948] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.769893] page dumped because: kasan: bad access detected [ 27.770667] [ 27.770986] Memory state around the buggy address: [ 27.771558] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.772311] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.773428] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.774388] ^ [ 27.775301] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.776212] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.777094] ==================================================================


[ 27.957579] ================================================================== [ 27.958249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 27.959385] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.960217] [ 27.960622] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.961596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.962171] Hardware name: linux,dummy-virt (DT) [ 27.962888] Call trace: [ 27.963333] show_stack+0x20/0x38 (C) [ 27.963970] dump_stack_lvl+0x8c/0xd0 [ 27.964578] print_report+0x118/0x5e0 [ 27.965112] kasan_report+0xc8/0x118 [ 27.965757] kasan_check_range+0x100/0x1a8 [ 27.966321] __kasan_check_write+0x20/0x30 [ 27.966909] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 27.967722] kasan_bitops_generic+0x11c/0x1c8 [ 27.968355] kunit_try_run_case+0x14c/0x3d0 [ 27.969004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.969680] kthread+0x24c/0x2d0 [ 27.970201] ret_from_fork+0x10/0x20 [ 27.970765] [ 27.971080] Allocated by task 250: [ 27.971573] kasan_save_stack+0x3c/0x68 [ 27.972190] kasan_save_track+0x20/0x40 [ 27.972710] kasan_save_alloc_info+0x40/0x58 [ 27.973301] __kasan_kmalloc+0xd4/0xd8 [ 27.973930] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.974511] kasan_bitops_generic+0xa0/0x1c8 [ 27.975184] kunit_try_run_case+0x14c/0x3d0 [ 27.975713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.976361] kthread+0x24c/0x2d0 [ 27.976841] ret_from_fork+0x10/0x20 [ 27.977475] [ 27.977860] The buggy address belongs to the object at fff00000c5b73360 [ 27.977860] which belongs to the cache kmalloc-16 of size 16 [ 27.979110] The buggy address is located 8 bytes inside of [ 27.979110] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.980298] [ 27.980655] The buggy address belongs to the physical page: [ 27.981302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.982198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.982981] page_type: f5(slab) [ 27.983545] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.984347] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.985259] page dumped because: kasan: bad access detected [ 27.985874] [ 27.986195] Memory state around the buggy address: [ 27.986762] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.987553] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.988395] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.989158] ^ [ 27.989904] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.990729] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.991547] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop-b783d6f868a74e7a0ad7ce1bf4027f8ea4f491174fd27d82bd8eee076c021062/details/) (gcc-13-lkftconfig-kunit)[ 27.993686] ================================================================== [ 27.994363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 27.995284] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.996023] [ 27.996405] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.997420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.998038] Hardware name: linux,dummy-virt (DT) [ 27.998589] Call trace: [ 27.999094] show_stack+0x20/0x38 (C) [ 27.999689] dump_stack_lvl+0x8c/0xd0 [ 28.000244] print_report+0x118/0x5e0 [ 28.000766] kasan_report+0xc8/0x118 [ 28.001339] __asan_report_load8_noabort+0x20/0x30 [ 28.002088] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 28.002863] kasan_bitops_generic+0x11c/0x1c8 [ 28.003490] kunit_try_run_case+0x14c/0x3d0 [ 28.004040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.004957] kthread+0x24c/0x2d0 [ 28.005969] ret_from_fork+0x10/0x20 [ 28.006405] [ 28.006664] Allocated by task 250: [ 28.007052] kasan_save_stack+0x3c/0x68 [ 28.007471] kasan_save_track+0x20/0x40 [ 28.008547] kasan_save_alloc_info+0x40/0x58 [ 28.009071] __kasan_kmalloc+0xd4/0xd8 [ 28.009546] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.010240] kasan_bitops_generic+0xa0/0x1c8 [ 28.010913] kunit_try_run_case+0x14c/0x3d0 [ 28.011513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.012177] kthread+0x24c/0x2d0 [ 28.012791] ret_from_fork+0x10/0x20 [ 28.013276] [ 28.013661] The buggy address belongs to the object at fff00000c5b73360 [ 28.013661] which belongs to the cache kmalloc-16 of size 16 [ 28.015037] The buggy address is located 8 bytes inside of [ 28.015037] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 28.016310] [ 28.016699] The buggy address belongs to the physical page: [ 28.017319] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 28.017989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.018855] page_type: f5(slab) [ 28.019443] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 28.020516] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.021373] page dumped because: kasan: bad access detected [ 28.022165] [ 28.022495] Memory state around the buggy address: [ 28.023101] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.024005] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.024849] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.025710] ^ [ 28.026498] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.027253] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.027964] ==================================================================


[ 28.030361] ================================================================== [ 28.031170] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 28.032103] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 28.032728] [ 28.034263] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 28.035732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.036411] Hardware name: linux,dummy-virt (DT) [ 28.037141] Call trace: [ 28.037508] show_stack+0x20/0x38 (C) [ 28.038046] dump_stack_lvl+0x8c/0xd0 [ 28.038559] print_report+0x118/0x5e0 [ 28.039495] kasan_report+0xc8/0x118 [ 28.040176] __asan_report_load8_noabort+0x20/0x30 [ 28.040971] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 28.041817] kasan_bitops_generic+0x11c/0x1c8 [ 28.042491] kunit_try_run_case+0x14c/0x3d0 [ 28.043225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.044108] kthread+0x24c/0x2d0 [ 28.044780] ret_from_fork+0x10/0x20 [ 28.045433] [ 28.046080] Allocated by task 250: [ 28.046509] kasan_save_stack+0x3c/0x68 [ 28.047203] kasan_save_track+0x20/0x40 [ 28.047864] kasan_save_alloc_info+0x40/0x58 [ 28.048557] __kasan_kmalloc+0xd4/0xd8 [ 28.049239] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.050005] kasan_bitops_generic+0xa0/0x1c8 [ 28.050701] kunit_try_run_case+0x14c/0x3d0 [ 28.051278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.051937] kthread+0x24c/0x2d0 [ 28.052387] ret_from_fork+0x10/0x20 [ 28.053319] [ 28.053597] The buggy address belongs to the object at fff00000c5b73360 [ 28.053597] which belongs to the cache kmalloc-16 of size 16 [ 28.055220] The buggy address is located 8 bytes inside of [ 28.055220] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 28.056517] [ 28.056869] The buggy address belongs to the physical page: [ 28.057527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 28.058599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.059404] page_type: f5(slab) [ 28.059845] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 28.060617] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.061334] page dumped because: kasan: bad access detected [ 28.061981] [ 28.062273] Memory state around the buggy address: [ 28.062971] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.063713] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.064793] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.065527] ^ [ 28.066470] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.067311] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.068335] ==================================================================


[ 27.850688] ================================================================== [ 27.852112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 27.852790] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.853523] [ 27.853951] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.855687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.856360] Hardware name: linux,dummy-virt (DT) [ 27.857096] Call trace: [ 27.857480] show_stack+0x20/0x38 (C) [ 27.858157] dump_stack_lvl+0x8c/0xd0 [ 27.858686] print_report+0x118/0x5e0 [ 27.859335] kasan_report+0xc8/0x118 [ 27.859879] __asan_report_load8_noabort+0x20/0x30 [ 27.860850] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 27.861652] kasan_bitops_generic+0x11c/0x1c8 [ 27.862325] kunit_try_run_case+0x14c/0x3d0 [ 27.862608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.862922] kthread+0x24c/0x2d0 [ 27.863143] ret_from_fork+0x10/0x20 [ 27.863366] [ 27.863498] Allocated by task 250: [ 27.863694] kasan_save_stack+0x3c/0x68 [ 27.864120] kasan_save_track+0x20/0x40 [ 27.864570] kasan_save_alloc_info+0x40/0x58 [ 27.865112] __kasan_kmalloc+0xd4/0xd8 [ 27.865551] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.866054] kasan_bitops_generic+0xa0/0x1c8 [ 27.866834] kunit_try_run_case+0x14c/0x3d0 [ 27.867426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.868291] kthread+0x24c/0x2d0 [ 27.868829] ret_from_fork+0x10/0x20 [ 27.869339] [ 27.869735] The buggy address belongs to the object at fff00000c5b73360 [ 27.869735] which belongs to the cache kmalloc-16 of size 16 [ 27.871095] The buggy address is located 8 bytes inside of [ 27.871095] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.872504] [ 27.872871] The buggy address belongs to the physical page: [ 27.873547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.874478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.875275] page_type: f5(slab) [ 27.875815] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.876716] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.877568] page dumped because: kasan: bad access detected [ 27.878217] [ 27.878604] Memory state around the buggy address: [ 27.879282] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.880077] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.880780] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.881557] ^ [ 27.882362] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.883477] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.884223] ==================================================================


[ 27.779427] ================================================================== [ 27.780223] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 27.781118] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.781835] [ 27.782339] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.783505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.784218] Hardware name: linux,dummy-virt (DT) [ 27.784865] Call trace: [ 27.785385] show_stack+0x20/0x38 (C) [ 27.785982] dump_stack_lvl+0x8c/0xd0 [ 27.786721] print_report+0x118/0x5e0 [ 27.787354] kasan_report+0xc8/0x118 [ 27.787938] __asan_report_load8_noabort+0x20/0x30 [ 27.788598] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 27.789455] kasan_bitops_generic+0x11c/0x1c8 [ 27.790097] kunit_try_run_case+0x14c/0x3d0 [ 27.790730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.791543] kthread+0x24c/0x2d0 [ 27.792095] ret_from_fork+0x10/0x20 [ 27.792659] [ 27.792984] Allocated by task 250: [ 27.793446] kasan_save_stack+0x3c/0x68 [ 27.794017] kasan_save_track+0x20/0x40 [ 27.794538] kasan_save_alloc_info+0x40/0x58 [ 27.795349] __kasan_kmalloc+0xd4/0xd8 [ 27.796042] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.796687] kasan_bitops_generic+0xa0/0x1c8 [ 27.797358] kunit_try_run_case+0x14c/0x3d0 [ 27.798058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.798854] kthread+0x24c/0x2d0 [ 27.799413] ret_from_fork+0x10/0x20 [ 27.799845] [ 27.800257] The buggy address belongs to the object at fff00000c5b73360 [ 27.800257] which belongs to the cache kmalloc-16 of size 16 [ 27.801664] The buggy address is located 8 bytes inside of [ 27.801664] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.803129] [ 27.803503] The buggy address belongs to the physical page: [ 27.804161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.805136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.805859] page_type: f5(slab) [ 27.806367] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.807205] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.808087] page dumped because: kasan: bad access detected [ 27.808702] [ 27.809022] Memory state around the buggy address: [ 27.809590] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.810377] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.811216] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.811990] ^ [ 27.812721] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.813539] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.814331] ==================================================================


[ 27.921723] ================================================================== [ 27.922356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 27.923472] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250 [ 27.924255] [ 27.924627] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.925675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.926221] Hardware name: linux,dummy-virt (DT) [ 27.926830] Call trace: [ 27.927262] show_stack+0x20/0x38 (C) [ 27.927865] dump_stack_lvl+0x8c/0xd0 [ 27.928466] print_report+0x118/0x5e0 [ 27.929096] kasan_report+0xc8/0x118 [ 27.929681] __asan_report_load8_noabort+0x20/0x30 [ 27.930312] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 27.931082] kasan_bitops_generic+0x11c/0x1c8 [ 27.931655] kunit_try_run_case+0x14c/0x3d0 [ 27.932225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.932953] kthread+0x24c/0x2d0 [ 27.933429] ret_from_fork+0x10/0x20 [ 27.934047] [ 27.934362] Allocated by task 250: [ 27.934921] kasan_save_stack+0x3c/0x68 [ 27.935545] kasan_save_track+0x20/0x40 [ 27.936051] kasan_save_alloc_info+0x40/0x58 [ 27.936685] __kasan_kmalloc+0xd4/0xd8 [ 27.937356] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.937924] kasan_bitops_generic+0xa0/0x1c8 [ 27.938647] kunit_try_run_case+0x14c/0x3d0 [ 27.939186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.939987] kthread+0x24c/0x2d0 [ 27.940480] ret_from_fork+0x10/0x20 [ 27.940984] [ 27.941341] The buggy address belongs to the object at fff00000c5b73360 [ 27.941341] which belongs to the cache kmalloc-16 of size 16 [ 27.942604] The buggy address is located 8 bytes inside of [ 27.942604] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369) [ 27.943859] [ 27.944216] The buggy address belongs to the physical page: [ 27.944886] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 27.945701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.946414] page_type: f5(slab) [ 27.946968] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.947771] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 27.948610] page dumped because: kasan: bad access detected [ 27.949370] [ 27.949666] Memory state around the buggy address: [ 27.950254] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.951139] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.951944] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.952700] ^ [ 27.953468] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.954224] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.955027] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right-522a5379af1f68f91d65c1dae4248c5bb2b753b7f34c878934deb6e0cbc2458d/details/) (gcc-13-lkftconfig-kunit)[ 23.075618] ================================================================== [ 23.077098] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 23.077774] Write of size 1 at addr fff00000c6025f00 by task kunit_try_catch/133 [ 23.078971] [ 23.079398] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.080784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.081312] Hardware name: linux,dummy-virt (DT) [ 23.082104] Call trace: [ 23.082647] show_stack+0x20/0x38 (C) [ 23.083520] dump_stack_lvl+0x8c/0xd0 [ 23.084237] print_report+0x118/0x5e0 [ 23.084790] kasan_report+0xc8/0x118 [ 23.085502] __asan_report_store1_noabort+0x20/0x30 [ 23.086256] kmalloc_big_oob_right+0x2a4/0x2f0 [ 23.087202] kunit_try_run_case+0x14c/0x3d0 [ 23.087726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.088377] kthread+0x24c/0x2d0 [ 23.089248] ret_from_fork+0x10/0x20 [ 23.089935] [ 23.090376] Allocated by task 133: [ 23.091353] kasan_save_stack+0x3c/0x68 [ 23.091805] kasan_save_track+0x20/0x40 [ 23.092217] kasan_save_alloc_info+0x40/0x58 [ 23.092655] __kasan_kmalloc+0xd4/0xd8 [ 23.093067] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.093510] kmalloc_big_oob_right+0xb8/0x2f0 [ 23.094963] kunit_try_run_case+0x14c/0x3d0 [ 23.095799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.096517] kthread+0x24c/0x2d0 [ 23.097409] ret_from_fork+0x10/0x20 [ 23.098050] [ 23.098387] The buggy address belongs to the object at fff00000c6024000 [ 23.098387] which belongs to the cache kmalloc-8k of size 8192 [ 23.100600] The buggy address is located 0 bytes to the right of [ 23.100600] allocated 7936-byte region [fff00000c6024000, fff00000c6025f00) [ 23.101957] [ 23.102275] The buggy address belongs to the physical page: [ 23.103028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020 [ 23.104338] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.105131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.106232] page_type: f5(slab) [ 23.106928] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 23.108105] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 23.109109] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 23.110092] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 23.111066] head: 0bfffe0000000003 ffffc1ffc3180801 ffffffffffffffff 0000000000000000 [ 23.112209] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 23.113177] page dumped because: kasan: bad access detected [ 23.113800] [ 23.114352] Memory state around the buggy address: [ 23.115166] fff00000c6025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.115810] fff00000c6025e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.117477] >fff00000c6025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.118221] ^ [ 23.118921] fff00000c6025f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.119731] fff00000c6026000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.120487] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right-f4789b8ac08d22ac5ec148c635951382fbb4224bc4d96fb0146da41fee6668a0/details/) (gcc-13-lkftconfig-kunit)[ 23.130398] ================================================================== [ 23.131835] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 23.133911] Write of size 1 at addr fff00000c65fe00a by task kunit_try_catch/135 [ 23.134586] [ 23.134847] CPU: 0 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.137071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.137490] Hardware name: linux,dummy-virt (DT) [ 23.137939] Call trace: [ 23.138232] show_stack+0x20/0x38 (C) [ 23.138662] dump_stack_lvl+0x8c/0xd0 [ 23.140361] print_report+0x118/0x5e0 [ 23.141181] kasan_report+0xc8/0x118 [ 23.141682] __asan_report_store1_noabort+0x20/0x30 [ 23.142275] kmalloc_large_oob_right+0x278/0x2b8 [ 23.143016] kunit_try_run_case+0x14c/0x3d0 [ 23.143759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.144968] kthread+0x24c/0x2d0 [ 23.145562] ret_from_fork+0x10/0x20 [ 23.146146] [ 23.146592] The buggy address belongs to the physical page: [ 23.147858] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc [ 23.148302] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.148634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.149190] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.150787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.152228] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.152948] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.153929] head: 0bfffe0000000002 ffffc1ffc3197f01 ffffffffffffffff 0000000000000000 [ 23.154869] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.156000] page dumped because: kasan: bad access detected [ 23.156576] [ 23.156814] Memory state around the buggy address: [ 23.157203] fff00000c65fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.158850] fff00000c65fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.159967] >fff00000c65fe000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.161047] ^ [ 23.161680] fff00000c65fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.162634] fff00000c65fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.163799] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size-6e68b81d554f13ae1ae5380a97c5de9b7b7d68a40cef719740d64197323b0ad7/details/) (gcc-13-lkftconfig-kunit)[ 24.424155] ================================================================== [ 24.425358] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 24.426465] Read of size 64 at addr fff00000c5c98984 by task kunit_try_catch/171 [ 24.427491] [ 24.428339] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.429234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.429645] Hardware name: linux,dummy-virt (DT) [ 24.430226] Call trace: [ 24.430587] show_stack+0x20/0x38 (C) [ 24.431691] dump_stack_lvl+0x8c/0xd0 [ 24.432224] print_report+0x118/0x5e0 [ 24.432761] kasan_report+0xc8/0x118 [ 24.433304] kasan_check_range+0x100/0x1a8 [ 24.433833] __asan_memmove+0x3c/0x98 [ 24.434425] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 24.435158] kunit_try_run_case+0x14c/0x3d0 [ 24.435772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.436565] kthread+0x24c/0x2d0 [ 24.437849] ret_from_fork+0x10/0x20 [ 24.438365] [ 24.438689] Allocated by task 171: [ 24.439677] kasan_save_stack+0x3c/0x68 [ 24.440255] kasan_save_track+0x20/0x40 [ 24.440779] kasan_save_alloc_info+0x40/0x58 [ 24.441392] __kasan_kmalloc+0xd4/0xd8 [ 24.441936] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.442572] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 24.444121] kunit_try_run_case+0x14c/0x3d0 [ 24.444670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.445353] kthread+0x24c/0x2d0 [ 24.445864] ret_from_fork+0x10/0x20 [ 24.446448] [ 24.446847] The buggy address belongs to the object at fff00000c5c98980 [ 24.446847] which belongs to the cache kmalloc-64 of size 64 [ 24.448358] The buggy address is located 4 bytes inside of [ 24.448358] allocated 64-byte region [fff00000c5c98980, fff00000c5c989c0) [ 24.449398] [ 24.449616] The buggy address belongs to the physical page: [ 24.450615] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c98 [ 24.452402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.453296] page_type: f5(slab) [ 24.454030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.455387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.456838] page dumped because: kasan: bad access detected [ 24.457828] [ 24.457973] Memory state around the buggy address: [ 24.458229] fff00000c5c98880: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.458566] fff00000c5c98900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.459839] >fff00000c5c98980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 24.461360] ^ [ 24.462216] fff00000c5c98a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.463302] fff00000c5c98a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.464151] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right-5e5fa3e7116bac3bacc817451ea8cf1b94faa3765633eb2523e9a0cc72d83cd5/details/) (gcc-13-lkftconfig-kunit)[ 22.931824] ================================================================== [ 22.932714] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 22.933857] Read of size 1 at addr fff00000c6619000 by task kunit_try_catch/129 [ 22.935265] [ 22.935649] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 22.936972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.937608] Hardware name: linux,dummy-virt (DT) [ 22.938293] Call trace: [ 22.938812] show_stack+0x20/0x38 (C) [ 22.939334] dump_stack_lvl+0x8c/0xd0 [ 22.939839] print_report+0x118/0x5e0 [ 22.940339] kasan_report+0xc8/0x118 [ 22.941133] __asan_report_load1_noabort+0x20/0x30 [ 22.942115] kmalloc_node_oob_right+0x2f4/0x330 [ 22.942862] kunit_try_run_case+0x14c/0x3d0 [ 22.943589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.944139] kthread+0x24c/0x2d0 [ 22.944824] ret_from_fork+0x10/0x20 [ 22.945540] [ 22.945964] Allocated by task 129: [ 22.946631] kasan_save_stack+0x3c/0x68 [ 22.947431] kasan_save_track+0x20/0x40 [ 22.947838] kasan_save_alloc_info+0x40/0x58 [ 22.948642] __kasan_kmalloc+0xd4/0xd8 [ 22.949374] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 22.950091] kmalloc_node_oob_right+0xbc/0x330 [ 22.950821] kunit_try_run_case+0x14c/0x3d0 [ 22.951689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.952430] kthread+0x24c/0x2d0 [ 22.952962] ret_from_fork+0x10/0x20 [ 22.953602] [ 22.954038] The buggy address belongs to the object at fff00000c6618000 [ 22.954038] which belongs to the cache kmalloc-4k of size 4096 [ 22.955561] The buggy address is located 0 bytes to the right of [ 22.955561] allocated 4096-byte region [fff00000c6618000, fff00000c6619000) [ 22.956672] [ 22.957799] The buggy address belongs to the physical page: [ 22.958550] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106618 [ 22.959931] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.960845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.961699] page_type: f5(slab) [ 22.962262] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 22.963636] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 22.964455] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 22.965345] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 22.966244] head: 0bfffe0000000003 ffffc1ffc3198601 ffffffffffffffff 0000000000000000 [ 22.967169] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 22.968278] page dumped because: kasan: bad access detected [ 22.968964] [ 22.969290] Memory state around the buggy address: [ 22.969949] fff00000c6618f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.970817] fff00000c6618f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.971873] >fff00000c6619000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.972758] ^ [ 22.973275] fff00000c6619080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.974102] fff00000c6619100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.974949] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob-0a37adade9b637e41136e4959445125e9e59adf63a760774fe60f10dda816030/details/) (gcc-13-lkftconfig-kunit)[ 24.024487] ================================================================== [ 24.025374] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 24.026043] Write of size 16 at addr fff00000c5b732c0 by task kunit_try_catch/155 [ 24.026973] [ 24.027341] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.029661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.030203] Hardware name: linux,dummy-virt (DT) [ 24.030980] Call trace: [ 24.031517] show_stack+0x20/0x38 (C) [ 24.032778] dump_stack_lvl+0x8c/0xd0 [ 24.033313] print_report+0x118/0x5e0 [ 24.033915] kasan_report+0xc8/0x118 [ 24.034446] __asan_report_store16_noabort+0x20/0x30 [ 24.035848] kmalloc_oob_16+0x3a0/0x3f8 [ 24.036248] kunit_try_run_case+0x14c/0x3d0 [ 24.037190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.038000] kthread+0x24c/0x2d0 [ 24.038477] ret_from_fork+0x10/0x20 [ 24.039302] [ 24.039944] Allocated by task 155: [ 24.040384] kasan_save_stack+0x3c/0x68 [ 24.040902] kasan_save_track+0x20/0x40 [ 24.041366] kasan_save_alloc_info+0x40/0x58 [ 24.042267] __kasan_kmalloc+0xd4/0xd8 [ 24.042851] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.044281] kmalloc_oob_16+0xb4/0x3f8 [ 24.044987] kunit_try_run_case+0x14c/0x3d0 [ 24.045708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.046349] kthread+0x24c/0x2d0 [ 24.047396] ret_from_fork+0x10/0x20 [ 24.047800] [ 24.048383] The buggy address belongs to the object at fff00000c5b732c0 [ 24.048383] which belongs to the cache kmalloc-16 of size 16 [ 24.050018] The buggy address is located 0 bytes inside of [ 24.050018] allocated 13-byte region [fff00000c5b732c0, fff00000c5b732cd) [ 24.052287] [ 24.052518] The buggy address belongs to the physical page: [ 24.053426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 24.054226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.055244] page_type: f5(slab) [ 24.056128] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.057049] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.057914] page dumped because: kasan: bad access detected [ 24.058644] [ 24.059024] Memory state around the buggy address: [ 24.060356] fff00000c5b73180: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 24.061344] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.062149] >fff00000c5b73280: 00 04 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 24.063230] ^ [ 24.063779] fff00000c5b73300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.064680] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.065460] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset-0a3c69e48d5d568f08cb8e89969af6af2a82e3c07e39747682abaaf9f9844611/details/) (gcc-13-lkftconfig-kunit)[ 24.132150] ================================================================== [ 24.133023] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 24.133849] Write of size 128 at addr fff00000c5ca2b00 by task kunit_try_catch/159 [ 24.134779] [ 24.135111] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.136619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.137123] Hardware name: linux,dummy-virt (DT) [ 24.137837] Call trace: [ 24.138316] show_stack+0x20/0x38 (C) [ 24.138996] dump_stack_lvl+0x8c/0xd0 [ 24.139937] print_report+0x118/0x5e0 [ 24.140454] kasan_report+0xc8/0x118 [ 24.140990] kasan_check_range+0x100/0x1a8 [ 24.141675] __asan_memset+0x34/0x78 [ 24.142291] kmalloc_oob_in_memset+0x144/0x2d0 [ 24.143301] kunit_try_run_case+0x14c/0x3d0 [ 24.143808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.144540] kthread+0x24c/0x2d0 [ 24.145114] ret_from_fork+0x10/0x20 [ 24.145721] [ 24.146077] Allocated by task 159: [ 24.146682] kasan_save_stack+0x3c/0x68 [ 24.147565] kasan_save_track+0x20/0x40 [ 24.148120] kasan_save_alloc_info+0x40/0x58 [ 24.148781] __kasan_kmalloc+0xd4/0xd8 [ 24.149372] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.150074] kmalloc_oob_in_memset+0xb0/0x2d0 [ 24.150659] kunit_try_run_case+0x14c/0x3d0 [ 24.151261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.152220] kthread+0x24c/0x2d0 [ 24.152771] ret_from_fork+0x10/0x20 [ 24.153294] [ 24.153687] The buggy address belongs to the object at fff00000c5ca2b00 [ 24.153687] which belongs to the cache kmalloc-128 of size 128 [ 24.155025] The buggy address is located 0 bytes inside of [ 24.155025] allocated 120-byte region [fff00000c5ca2b00, fff00000c5ca2b78) [ 24.156720] [ 24.157067] The buggy address belongs to the physical page: [ 24.157692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2 [ 24.158727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.159698] page_type: f5(slab) [ 24.160711] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.161614] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.162417] page dumped because: kasan: bad access detected [ 24.163106] [ 24.163726] Memory state around the buggy address: [ 24.164316] fff00000c5ca2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.165025] fff00000c5ca2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.165722] >fff00000c5ca2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.166653] ^ [ 24.167834] fff00000c5ca2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.168539] fff00000c5ca2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.169191] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset-6b2a905fec891e52b52dd3f9fb59ea5fdcf1e5a2207d9b8b8077f8f7747e2ea1/details/) (gcc-13-lkftconfig-kunit)[ 24.326101] ================================================================== [ 24.327315] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 24.328594] Write of size 16 at addr fff00000c5ca3969 by task kunit_try_catch/167 [ 24.330166] [ 24.330472] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.331775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.332390] Hardware name: linux,dummy-virt (DT) [ 24.332985] Call trace: [ 24.333377] show_stack+0x20/0x38 (C) [ 24.333940] dump_stack_lvl+0x8c/0xd0 [ 24.334511] print_report+0x118/0x5e0 [ 24.335346] kasan_report+0xc8/0x118 [ 24.335840] kasan_check_range+0x100/0x1a8 [ 24.336263] __asan_memset+0x34/0x78 [ 24.336658] kmalloc_oob_memset_16+0x150/0x2f8 [ 24.337092] kunit_try_run_case+0x14c/0x3d0 [ 24.337536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.338830] kthread+0x24c/0x2d0 [ 24.339964] ret_from_fork+0x10/0x20 [ 24.340663] [ 24.340970] Allocated by task 167: [ 24.341417] kasan_save_stack+0x3c/0x68 [ 24.342014] kasan_save_track+0x20/0x40 [ 24.342495] kasan_save_alloc_info+0x40/0x58 [ 24.343399] __kasan_kmalloc+0xd4/0xd8 [ 24.343854] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.344425] kmalloc_oob_memset_16+0xb0/0x2f8 [ 24.344986] kunit_try_run_case+0x14c/0x3d0 [ 24.345532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.346675] kthread+0x24c/0x2d0 [ 24.347573] ret_from_fork+0x10/0x20 [ 24.347882] [ 24.348367] The buggy address belongs to the object at fff00000c5ca3900 [ 24.348367] which belongs to the cache kmalloc-128 of size 128 [ 24.349584] The buggy address is located 105 bytes inside of [ 24.349584] allocated 120-byte region [fff00000c5ca3900, fff00000c5ca3978) [ 24.350774] [ 24.351110] The buggy address belongs to the physical page: [ 24.351697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca3 [ 24.352809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.353511] page_type: f5(slab) [ 24.354401] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.355387] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.356499] page dumped because: kasan: bad access detected [ 24.357280] [ 24.357730] Memory state around the buggy address: [ 24.358407] fff00000c5ca3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.359399] fff00000c5ca3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.360398] >fff00000c5ca3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.361090] ^ [ 24.362413] fff00000c5ca3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.363156] fff00000c5ca3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.364321] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset-6c6f66ae1ae3be04ae8a56e02f3b2f4a0b1ee2cfbced89fe28bc92ce1e7d6ad3/details/) (gcc-13-lkftconfig-kunit)[ 24.178839] ================================================================== [ 24.180707] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 24.181616] Write of size 2 at addr fff00000c5ca2c77 by task kunit_try_catch/161 [ 24.182423] [ 24.182782] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.183833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.184733] Hardware name: linux,dummy-virt (DT) [ 24.185357] Call trace: [ 24.186530] show_stack+0x20/0x38 (C) [ 24.187248] dump_stack_lvl+0x8c/0xd0 [ 24.187825] print_report+0x118/0x5e0 [ 24.188417] kasan_report+0xc8/0x118 [ 24.188969] kasan_check_range+0x100/0x1a8 [ 24.189514] __asan_memset+0x34/0x78 [ 24.190108] kmalloc_oob_memset_2+0x150/0x2f8 [ 24.190782] kunit_try_run_case+0x14c/0x3d0 [ 24.191385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.192542] kthread+0x24c/0x2d0 [ 24.193058] ret_from_fork+0x10/0x20 [ 24.193572] [ 24.194170] Allocated by task 161: [ 24.194514] kasan_save_stack+0x3c/0x68 [ 24.195558] kasan_save_track+0x20/0x40 [ 24.196849] kasan_save_alloc_info+0x40/0x58 [ 24.197539] __kasan_kmalloc+0xd4/0xd8 [ 24.198212] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.198810] kmalloc_oob_memset_2+0xb0/0x2f8 [ 24.199735] kunit_try_run_case+0x14c/0x3d0 [ 24.200432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.201229] kthread+0x24c/0x2d0 [ 24.201683] ret_from_fork+0x10/0x20 [ 24.202184] [ 24.202478] The buggy address belongs to the object at fff00000c5ca2c00 [ 24.202478] which belongs to the cache kmalloc-128 of size 128 [ 24.204083] The buggy address is located 119 bytes inside of [ 24.204083] allocated 120-byte region [fff00000c5ca2c00, fff00000c5ca2c78) [ 24.205492] [ 24.206122] The buggy address belongs to the physical page: [ 24.206816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2 [ 24.208026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.208907] page_type: f5(slab) [ 24.209352] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.210164] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.211389] page dumped because: kasan: bad access detected [ 24.211877] [ 24.212441] Memory state around the buggy address: [ 24.213254] fff00000c5ca2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.214140] fff00000c5ca2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.215386] >fff00000c5ca2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.216093] ^ [ 24.216869] fff00000c5ca2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.217624] fff00000c5ca2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.219531] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset-6d9796fcad3b9f947cc35a8e13d9b042876fb450cc44c5a16204b2b4589f2d4d/details/) (gcc-13-lkftconfig-kunit)[ 24.228263] ================================================================== [ 24.229276] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 24.229943] Write of size 4 at addr fff00000c5ca2d75 by task kunit_try_catch/163 [ 24.230853] [ 24.231257] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.232544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.233022] Hardware name: linux,dummy-virt (DT) [ 24.233690] Call trace: [ 24.235218] show_stack+0x20/0x38 (C) [ 24.235865] dump_stack_lvl+0x8c/0xd0 [ 24.236249] print_report+0x118/0x5e0 [ 24.236863] kasan_report+0xc8/0x118 [ 24.237408] kasan_check_range+0x100/0x1a8 [ 24.238048] __asan_memset+0x34/0x78 [ 24.238558] kmalloc_oob_memset_4+0x150/0x300 [ 24.239219] kunit_try_run_case+0x14c/0x3d0 [ 24.239807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.240783] kthread+0x24c/0x2d0 [ 24.241281] ret_from_fork+0x10/0x20 [ 24.241905] [ 24.242181] Allocated by task 163: [ 24.242675] kasan_save_stack+0x3c/0x68 [ 24.243314] kasan_save_track+0x20/0x40 [ 24.243939] kasan_save_alloc_info+0x40/0x58 [ 24.244849] __kasan_kmalloc+0xd4/0xd8 [ 24.245571] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.246115] kmalloc_oob_memset_4+0xb0/0x300 [ 24.246629] kunit_try_run_case+0x14c/0x3d0 [ 24.248192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.248861] kthread+0x24c/0x2d0 [ 24.249574] ret_from_fork+0x10/0x20 [ 24.250240] [ 24.250566] The buggy address belongs to the object at fff00000c5ca2d00 [ 24.250566] which belongs to the cache kmalloc-128 of size 128 [ 24.251687] The buggy address is located 117 bytes inside of [ 24.251687] allocated 120-byte region [fff00000c5ca2d00, fff00000c5ca2d78) [ 24.252547] [ 24.252991] The buggy address belongs to the physical page: [ 24.254951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2 [ 24.257384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.258351] page_type: f5(slab) [ 24.258776] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.260016] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.260919] page dumped because: kasan: bad access detected [ 24.261687] [ 24.262146] Memory state around the buggy address: [ 24.262785] fff00000c5ca2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.264109] fff00000c5ca2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.264782] >fff00000c5ca2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.265884] ^ [ 24.266660] fff00000c5ca2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.267482] fff00000c5ca2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.268238] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset-fc2dba12805e5c2c6f009dcfe4c86390f635190dc98a3daeb5638f3105bf708c/details/) (gcc-13-lkftconfig-kunit)[ 24.278185] ================================================================== [ 24.279925] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 24.280847] Write of size 8 at addr fff00000c5ca2e71 by task kunit_try_catch/165 [ 24.281773] [ 24.282177] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.283310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.283854] Hardware name: linux,dummy-virt (DT) [ 24.284498] Call trace: [ 24.285015] show_stack+0x20/0x38 (C) [ 24.285620] dump_stack_lvl+0x8c/0xd0 [ 24.286275] print_report+0x118/0x5e0 [ 24.286923] kasan_report+0xc8/0x118 [ 24.287570] kasan_check_range+0x100/0x1a8 [ 24.288174] __asan_memset+0x34/0x78 [ 24.288825] kmalloc_oob_memset_8+0x150/0x2f8 [ 24.289511] kunit_try_run_case+0x14c/0x3d0 [ 24.290228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.290980] kthread+0x24c/0x2d0 [ 24.291574] ret_from_fork+0x10/0x20 [ 24.292231] [ 24.292545] Allocated by task 165: [ 24.294378] kasan_save_stack+0x3c/0x68 [ 24.295786] kasan_save_track+0x20/0x40 [ 24.296323] kasan_save_alloc_info+0x40/0x58 [ 24.296905] __kasan_kmalloc+0xd4/0xd8 [ 24.297399] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.297996] kmalloc_oob_memset_8+0xb0/0x2f8 [ 24.298530] kunit_try_run_case+0x14c/0x3d0 [ 24.299255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.299804] kthread+0x24c/0x2d0 [ 24.300343] ret_from_fork+0x10/0x20 [ 24.300898] [ 24.301207] The buggy address belongs to the object at fff00000c5ca2e00 [ 24.301207] which belongs to the cache kmalloc-128 of size 128 [ 24.303046] The buggy address is located 113 bytes inside of [ 24.303046] allocated 120-byte region [fff00000c5ca2e00, fff00000c5ca2e78) [ 24.304230] [ 24.304598] The buggy address belongs to the physical page: [ 24.305238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2 [ 24.306351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.307250] page_type: f5(slab) [ 24.307711] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.308633] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.309437] page dumped because: kasan: bad access detected [ 24.310111] [ 24.310387] Memory state around the buggy address: [ 24.310993] fff00000c5ca2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.311785] fff00000c5ca2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.312500] >fff00000c5ca2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.313311] ^ [ 24.314081] fff00000c5ca2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.314966] fff00000c5ca2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.315772] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right-2a272745d37947c896e2cf5e4e9f5b7896c08a7238152c4a96f0af275e077b91/details/) (gcc-13-lkftconfig-kunit)[ 22.746188] ================================================================== [ 22.747310] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 22.749280] Write of size 1 at addr fff00000c6352873 by task kunit_try_catch/125 [ 22.749898] [ 22.751649] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.13.0-rc7 #1 [ 22.753082] Tainted: [N]=TEST [ 22.753661] Hardware name: linux,dummy-virt (DT) [ 22.754655] Call trace: [ 22.755509] show_stack+0x20/0x38 (C) [ 22.756078] dump_stack_lvl+0x8c/0xd0 [ 22.756524] print_report+0x118/0x5e0 [ 22.757452] kasan_report+0xc8/0x118 [ 22.758098] __asan_report_store1_noabort+0x20/0x30 [ 22.758758] kmalloc_oob_right+0x5a4/0x660 [ 22.759563] kunit_try_run_case+0x14c/0x3d0 [ 22.760243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.760953] kthread+0x24c/0x2d0 [ 22.761417] ret_from_fork+0x10/0x20 [ 22.762306] [ 22.762756] Allocated by task 125: [ 22.763664] kasan_save_stack+0x3c/0x68 [ 22.764243] kasan_save_track+0x20/0x40 [ 22.764756] kasan_save_alloc_info+0x40/0x58 [ 22.765318] __kasan_kmalloc+0xd4/0xd8 [ 22.766208] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.766899] kmalloc_oob_right+0xb0/0x660 [ 22.767405] kunit_try_run_case+0x14c/0x3d0 [ 22.768255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.768903] kthread+0x24c/0x2d0 [ 22.769340] ret_from_fork+0x10/0x20 [ 22.770256] [ 22.771208] The buggy address belongs to the object at fff00000c6352800 [ 22.771208] which belongs to the cache kmalloc-128 of size 128 [ 22.772569] The buggy address is located 0 bytes to the right of [ 22.772569] allocated 115-byte region [fff00000c6352800, fff00000c6352873) [ 22.773685] [ 22.774619] The buggy address belongs to the physical page: [ 22.776119] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352 [ 22.777296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.778443] page_type: f5(slab) [ 22.779496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.780271] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 22.781420] page dumped because: kasan: bad access detected [ 22.782093] [ 22.782406] Memory state around the buggy address: [ 22.783519] fff00000c6352700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 22.784471] fff00000c6352780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.785352] >fff00000c6352800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.786047] ^ [ 22.786788] fff00000c6352880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.788549] fff00000c6352900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.789269] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right-570ed7a645b6037dfab10fd4b552f568b1d265ae6346e7f2c405fb488566f75d/details/) (gcc-13-lkftconfig-kunit)[ 22.792408] ================================================================== [ 22.793645] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 22.794309] Write of size 1 at addr fff00000c6352878 by task kunit_try_catch/125 [ 22.795763] [ 22.796797] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 22.797964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.798609] Hardware name: linux,dummy-virt (DT) [ 22.799551] Call trace: [ 22.800094] show_stack+0x20/0x38 (C) [ 22.800804] dump_stack_lvl+0x8c/0xd0 [ 22.801450] print_report+0x118/0x5e0 [ 22.802136] kasan_report+0xc8/0x118 [ 22.802689] __asan_report_store1_noabort+0x20/0x30 [ 22.803906] kmalloc_oob_right+0x538/0x660 [ 22.804372] kunit_try_run_case+0x14c/0x3d0 [ 22.805115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.805920] kthread+0x24c/0x2d0 [ 22.806570] ret_from_fork+0x10/0x20 [ 22.807542] [ 22.807826] Allocated by task 125: [ 22.808267] kasan_save_stack+0x3c/0x68 [ 22.808767] kasan_save_track+0x20/0x40 [ 22.809270] kasan_save_alloc_info+0x40/0x58 [ 22.810346] __kasan_kmalloc+0xd4/0xd8 [ 22.810807] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.811663] kmalloc_oob_right+0xb0/0x660 [ 22.812358] kunit_try_run_case+0x14c/0x3d0 [ 22.813117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.814066] kthread+0x24c/0x2d0 [ 22.814689] ret_from_fork+0x10/0x20 [ 22.815402] [ 22.815985] The buggy address belongs to the object at fff00000c6352800 [ 22.815985] which belongs to the cache kmalloc-128 of size 128 [ 22.817441] The buggy address is located 5 bytes to the right of [ 22.817441] allocated 115-byte region [fff00000c6352800, fff00000c6352873) [ 22.818921] [ 22.819252] The buggy address belongs to the physical page: [ 22.820255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352 [ 22.821236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.822117] page_type: f5(slab) [ 22.822778] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.823972] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 22.824946] page dumped because: kasan: bad access detected [ 22.825722] [ 22.826168] Memory state around the buggy address: [ 22.826821] fff00000c6352700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.827973] fff00000c6352780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.828954] >fff00000c6352800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.829874] ^ [ 22.830808] fff00000c6352880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.831817] fff00000c6352900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.832646] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right-ba82fdcfa30331f01eecc2dae1dda8dfc6385f67e0eb47a8a06c205d29d1f078/details/) (gcc-13-lkftconfig-kunit)[ 22.835760] ================================================================== [ 22.836535] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 22.837471] Read of size 1 at addr fff00000c6352880 by task kunit_try_catch/125 [ 22.838887] [ 22.839535] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 22.840617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.841342] Hardware name: linux,dummy-virt (DT) [ 22.842052] Call trace: [ 22.842582] show_stack+0x20/0x38 (C) [ 22.843506] dump_stack_lvl+0x8c/0xd0 [ 22.844066] print_report+0x118/0x5e0 [ 22.844573] kasan_report+0xc8/0x118 [ 22.845100] __asan_report_load1_noabort+0x20/0x30 [ 22.845697] kmalloc_oob_right+0x5d0/0x660 [ 22.846696] kunit_try_run_case+0x14c/0x3d0 [ 22.847414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.848364] kthread+0x24c/0x2d0 [ 22.848836] ret_from_fork+0x10/0x20 [ 22.849318] [ 22.849596] Allocated by task 125: [ 22.850046] kasan_save_stack+0x3c/0x68 [ 22.850598] kasan_save_track+0x20/0x40 [ 22.851809] kasan_save_alloc_info+0x40/0x58 [ 22.852445] __kasan_kmalloc+0xd4/0xd8 [ 22.853067] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.853735] kmalloc_oob_right+0xb0/0x660 [ 22.854353] kunit_try_run_case+0x14c/0x3d0 [ 22.855134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.855891] kthread+0x24c/0x2d0 [ 22.856453] ret_from_fork+0x10/0x20 [ 22.857076] [ 22.857478] The buggy address belongs to the object at fff00000c6352800 [ 22.857478] which belongs to the cache kmalloc-128 of size 128 [ 22.858903] The buggy address is located 13 bytes to the right of [ 22.858903] allocated 115-byte region [fff00000c6352800, fff00000c6352873) [ 22.860469] [ 22.860612] The buggy address belongs to the physical page: [ 22.860931] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352 [ 22.861290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.861595] page_type: f5(slab) [ 22.861933] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.863353] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 22.864827] page dumped because: kasan: bad access detected [ 22.865635] [ 22.865873] Memory state around the buggy address: [ 22.866814] fff00000c6352780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.868021] fff00000c6352800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.868657] >fff00000c6352880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.869254] ^ [ 22.869980] fff00000c6352900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.870863] fff00000c6352980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.871874] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right-5d8adc7f4829bc33f0d4859c67e55688e6c08bdf48b9be622bc8fd1f40080d0b/details/) (gcc-13-lkftconfig-kunit)[ 23.025461] ================================================================== [ 23.026319] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490 [ 23.027703] Write of size 1 at addr fff00000c5cac578 by task kunit_try_catch/131 [ 23.028898] [ 23.029152] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.030108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.030792] Hardware name: linux,dummy-virt (DT) [ 23.032102] Call trace: [ 23.032526] show_stack+0x20/0x38 (C) [ 23.033131] dump_stack_lvl+0x8c/0xd0 [ 23.034019] print_report+0x118/0x5e0 [ 23.034702] kasan_report+0xc8/0x118 [ 23.035474] __asan_report_store1_noabort+0x20/0x30 [ 23.036153] kmalloc_track_caller_oob_right+0x420/0x490 [ 23.036999] kunit_try_run_case+0x14c/0x3d0 [ 23.037569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.038386] kthread+0x24c/0x2d0 [ 23.039064] ret_from_fork+0x10/0x20 [ 23.039916] [ 23.040199] Allocated by task 131: [ 23.040636] kasan_save_stack+0x3c/0x68 [ 23.041144] kasan_save_track+0x20/0x40 [ 23.041604] kasan_save_alloc_info+0x40/0x58 [ 23.042566] __kasan_kmalloc+0xd4/0xd8 [ 23.043875] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 23.044551] kmalloc_track_caller_oob_right+0x184/0x490 [ 23.045431] kunit_try_run_case+0x14c/0x3d0 [ 23.046109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.046945] kthread+0x24c/0x2d0 [ 23.048102] ret_from_fork+0x10/0x20 [ 23.048766] [ 23.049090] The buggy address belongs to the object at fff00000c5cac500 [ 23.049090] which belongs to the cache kmalloc-128 of size 128 [ 23.050570] The buggy address is located 0 bytes to the right of [ 23.050570] allocated 120-byte region [fff00000c5cac500, fff00000c5cac578) [ 23.052454] [ 23.052924] The buggy address belongs to the physical page: [ 23.053659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cac [ 23.054552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.056179] page_type: f5(slab) [ 23.056935] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.057915] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.058917] page dumped because: kasan: bad access detected [ 23.059732] [ 23.060402] Memory state around the buggy address: [ 23.060911] fff00000c5cac400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.061905] fff00000c5cac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.062680] >fff00000c5cac500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.064167] ^ [ 23.065131] fff00000c5cac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.066037] fff00000c5cac600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.066804] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right-b8d8bf6acc6cc38cbdcdfeef1db810a0245b7d56ec9e5d810255b52c30ab3ff1/details/) (gcc-13-lkftconfig-kunit)[ 22.984827] ================================================================== [ 22.985882] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 22.986703] Write of size 1 at addr fff00000c5cac478 by task kunit_try_catch/131 [ 22.987332] [ 22.987707] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 22.988578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.988968] Hardware name: linux,dummy-virt (DT) [ 22.989371] Call trace: [ 22.989661] show_stack+0x20/0x38 (C) [ 22.990269] dump_stack_lvl+0x8c/0xd0 [ 22.991055] print_report+0x118/0x5e0 [ 22.991665] kasan_report+0xc8/0x118 [ 22.992285] __asan_report_store1_noabort+0x20/0x30 [ 22.993098] kmalloc_track_caller_oob_right+0x414/0x490 [ 22.993918] kunit_try_run_case+0x14c/0x3d0 [ 22.995680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.996443] kthread+0x24c/0x2d0 [ 22.997002] ret_from_fork+0x10/0x20 [ 22.997454] [ 22.997833] Allocated by task 131: [ 22.998445] kasan_save_stack+0x3c/0x68 [ 22.999177] kasan_save_track+0x20/0x40 [ 22.999938] kasan_save_alloc_info+0x40/0x58 [ 23.001003] __kasan_kmalloc+0xd4/0xd8 [ 23.001545] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 23.002258] kmalloc_track_caller_oob_right+0xa8/0x490 [ 23.002960] kunit_try_run_case+0x14c/0x3d0 [ 23.003466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.004526] kthread+0x24c/0x2d0 [ 23.004914] ret_from_fork+0x10/0x20 [ 23.005319] [ 23.005728] The buggy address belongs to the object at fff00000c5cac400 [ 23.005728] which belongs to the cache kmalloc-128 of size 128 [ 23.007834] The buggy address is located 0 bytes to the right of [ 23.007834] allocated 120-byte region [fff00000c5cac400, fff00000c5cac478) [ 23.009661] [ 23.010051] The buggy address belongs to the physical page: [ 23.010715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cac [ 23.012050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.012714] page_type: f5(slab) [ 23.013155] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.014236] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.014992] page dumped because: kasan: bad access detected [ 23.015890] [ 23.016253] Memory state around the buggy address: [ 23.017410] fff00000c5cac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 23.018227] fff00000c5cac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.019525] >fff00000c5cac400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.020390] ^ [ 23.020735] fff00000c5cac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.021859] fff00000c5cac500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.022787] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob-9bf0d5b38385f90cb6d9d206f967d2c4ea139311baf9ba1e60155651855bb682/details/) (gcc-13-lkftconfig-kunit)[ 25.221635] ================================================================== [ 25.222639] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 25.223298] Read of size 1 at addr fff00000c5ce80c8 by task kunit_try_catch/196 [ 25.225353] [ 25.225610] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 25.226441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.228116] Hardware name: linux,dummy-virt (DT) [ 25.228612] Call trace: [ 25.228975] show_stack+0x20/0x38 (C) [ 25.229630] dump_stack_lvl+0x8c/0xd0 [ 25.230249] print_report+0x118/0x5e0 [ 25.230839] kasan_report+0xc8/0x118 [ 25.231374] __asan_report_load1_noabort+0x20/0x30 [ 25.232115] kmem_cache_oob+0x33c/0x428 [ 25.232652] kunit_try_run_case+0x14c/0x3d0 [ 25.233539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.234271] kthread+0x24c/0x2d0 [ 25.234801] ret_from_fork+0x10/0x20 [ 25.235618] [ 25.235913] Allocated by task 196: [ 25.236374] kasan_save_stack+0x3c/0x68 [ 25.236948] kasan_save_track+0x20/0x40 [ 25.237457] kasan_save_alloc_info+0x40/0x58 [ 25.238048] __kasan_slab_alloc+0xa8/0xb0 [ 25.238600] kmem_cache_alloc_noprof+0x108/0x398 [ 25.239526] kmem_cache_oob+0x12c/0x428 [ 25.240021] kunit_try_run_case+0x14c/0x3d0 [ 25.240642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.241276] kthread+0x24c/0x2d0 [ 25.241799] ret_from_fork+0x10/0x20 [ 25.242321] [ 25.242662] The buggy address belongs to the object at fff00000c5ce8000 [ 25.242662] which belongs to the cache test_cache of size 200 [ 25.244684] The buggy address is located 0 bytes to the right of [ 25.244684] allocated 200-byte region [fff00000c5ce8000, fff00000c5ce80c8) [ 25.246535] [ 25.246819] The buggy address belongs to the physical page: [ 25.247834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce8 [ 25.248714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.249435] page_type: f5(slab) [ 25.249994] raw: 0bfffe0000000000 fff00000c565a640 dead000000000122 0000000000000000 [ 25.250825] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 25.251900] page dumped because: kasan: bad access detected [ 25.252535] [ 25.252848] Memory state around the buggy address: [ 25.253369] fff00000c5ce7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.254205] fff00000c5ce8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.255284] >fff00000c5ce8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 25.256082] ^ [ 25.256758] fff00000c5ce8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.257549] fff00000c5ce8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.258353] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper-093b7c532cac6b3b31dc1432dffe804b4cc61a0594d1b2512029f5d8823b8d5e/details/) (gcc-13-lkftconfig-kunit)[ 23.593897] ================================================================== [ 23.594802] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.596043] Write of size 1 at addr fff00000c6364aeb by task kunit_try_catch/147 [ 23.596668] [ 23.597021] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.599462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.600515] Hardware name: linux,dummy-virt (DT) [ 23.601865] Call trace: [ 23.602254] show_stack+0x20/0x38 (C) [ 23.602892] dump_stack_lvl+0x8c/0xd0 [ 23.603619] print_report+0x118/0x5e0 [ 23.604543] kasan_report+0xc8/0x118 [ 23.605391] __asan_report_store1_noabort+0x20/0x30 [ 23.606110] krealloc_less_oob_helper+0xa58/0xc50 [ 23.606806] krealloc_less_oob+0x20/0x38 [ 23.607536] kunit_try_run_case+0x14c/0x3d0 [ 23.608443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.609805] kthread+0x24c/0x2d0 [ 23.610481] ret_from_fork+0x10/0x20 [ 23.611569] [ 23.611806] Allocated by task 147: [ 23.612672] kasan_save_stack+0x3c/0x68 [ 23.613322] kasan_save_track+0x20/0x40 [ 23.613993] kasan_save_alloc_info+0x40/0x58 [ 23.614727] __kasan_krealloc+0x118/0x178 [ 23.615448] krealloc_noprof+0x128/0x360 [ 23.616237] krealloc_less_oob_helper+0x168/0xc50 [ 23.616644] krealloc_less_oob+0x20/0x38 [ 23.617050] kunit_try_run_case+0x14c/0x3d0 [ 23.617625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.618385] kthread+0x24c/0x2d0 [ 23.618864] ret_from_fork+0x10/0x20 [ 23.619484] [ 23.619817] The buggy address belongs to the object at fff00000c6364a00 [ 23.619817] which belongs to the cache kmalloc-256 of size 256 [ 23.621367] The buggy address is located 34 bytes to the right of [ 23.621367] allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9) [ 23.622643] [ 23.623521] The buggy address belongs to the physical page: [ 23.624276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364 [ 23.625096] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.626209] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.627488] page_type: f5(slab) [ 23.627715] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.628088] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.628424] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.628839] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.630074] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000 [ 23.631177] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.632989] page dumped because: kasan: bad access detected [ 23.633605] [ 23.633950] Memory state around the buggy address: [ 23.634609] fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.635713] fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.636661] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.637574] ^ [ 23.638369] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.639285] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.640342] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper-186308a10e56139b215840a6881c6abdedd48644d3fc020f6f8fd1925baf5856/details/) (gcc-13-lkftconfig-kunit)[ 23.438823] ================================================================== [ 23.439844] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 23.440431] Write of size 1 at addr fff00000c6364ad0 by task kunit_try_catch/147 [ 23.440979] [ 23.441394] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.442523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.443599] Hardware name: linux,dummy-virt (DT) [ 23.444432] Call trace: [ 23.444737] show_stack+0x20/0x38 (C) [ 23.445265] dump_stack_lvl+0x8c/0xd0 [ 23.445693] print_report+0x118/0x5e0 [ 23.446681] kasan_report+0xc8/0x118 [ 23.447354] __asan_report_store1_noabort+0x20/0x30 [ 23.448813] krealloc_less_oob_helper+0xb9c/0xc50 [ 23.450038] krealloc_less_oob+0x20/0x38 [ 23.450732] kunit_try_run_case+0x14c/0x3d0 [ 23.451419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.452579] kthread+0x24c/0x2d0 [ 23.453361] ret_from_fork+0x10/0x20 [ 23.453960] [ 23.454304] Allocated by task 147: [ 23.454855] kasan_save_stack+0x3c/0x68 [ 23.455605] kasan_save_track+0x20/0x40 [ 23.456145] kasan_save_alloc_info+0x40/0x58 [ 23.456662] __kasan_krealloc+0x118/0x178 [ 23.457241] krealloc_noprof+0x128/0x360 [ 23.458362] krealloc_less_oob_helper+0x168/0xc50 [ 23.459178] krealloc_less_oob+0x20/0x38 [ 23.460097] kunit_try_run_case+0x14c/0x3d0 [ 23.460823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.461431] kthread+0x24c/0x2d0 [ 23.462096] ret_from_fork+0x10/0x20 [ 23.462574] [ 23.463020] The buggy address belongs to the object at fff00000c6364a00 [ 23.463020] which belongs to the cache kmalloc-256 of size 256 [ 23.465349] The buggy address is located 7 bytes to the right of [ 23.465349] allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9) [ 23.466845] [ 23.467374] The buggy address belongs to the physical page: [ 23.468238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364 [ 23.469416] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.470342] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.472112] page_type: f5(slab) [ 23.472710] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.473785] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.474789] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.476135] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.476979] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000 [ 23.478302] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.480060] page dumped because: kasan: bad access detected [ 23.480794] [ 23.481090] Memory state around the buggy address: [ 23.481674] fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.482427] fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.484112] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.485081] ^ [ 23.485910] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.486887] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.487686] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper-2f6f47570eb5bb6e5abb2c86c44bee226ad7feef2ca4f206eb243de6489c471a/details/) (gcc-13-lkftconfig-kunit)[ 23.793187] ================================================================== [ 23.793888] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.794585] Write of size 1 at addr fff00000c66060da by task kunit_try_catch/151 [ 23.795607] [ 23.797134] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.798255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.798783] Hardware name: linux,dummy-virt (DT) [ 23.799331] Call trace: [ 23.799731] show_stack+0x20/0x38 (C) [ 23.800842] dump_stack_lvl+0x8c/0xd0 [ 23.801371] print_report+0x118/0x5e0 [ 23.801912] kasan_report+0xc8/0x118 [ 23.802454] __asan_report_store1_noabort+0x20/0x30 [ 23.804092] krealloc_less_oob_helper+0xa80/0xc50 [ 23.804580] krealloc_large_less_oob+0x20/0x38 [ 23.805309] kunit_try_run_case+0x14c/0x3d0 [ 23.806009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.806737] kthread+0x24c/0x2d0 [ 23.807787] ret_from_fork+0x10/0x20 [ 23.808316] [ 23.808626] The buggy address belongs to the physical page: [ 23.809245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604 [ 23.810863] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.811979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.813536] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.814332] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.816056] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.817124] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.818130] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000 [ 23.819095] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.820250] page dumped because: kasan: bad access detected [ 23.821186] [ 23.821427] Memory state around the buggy address: [ 23.822146] fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.822925] fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.823895] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.825001] ^ [ 23.825891] fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.826704] fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.827829] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper-7ceb0a47b00a35966b005bad3968be571c62e4107d479cbc027cbd36a3bbf95c/details/) (gcc-13-lkftconfig-kunit)[ 23.864868] ================================================================== [ 23.865561] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.866498] Write of size 1 at addr fff00000c66060eb by task kunit_try_catch/151 [ 23.867396] [ 23.867981] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.869046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.869538] Hardware name: linux,dummy-virt (DT) [ 23.870309] Call trace: [ 23.870766] show_stack+0x20/0x38 (C) [ 23.872187] dump_stack_lvl+0x8c/0xd0 [ 23.872857] print_report+0x118/0x5e0 [ 23.873452] kasan_report+0xc8/0x118 [ 23.874045] __asan_report_store1_noabort+0x20/0x30 [ 23.874918] krealloc_less_oob_helper+0xa58/0xc50 [ 23.875981] krealloc_large_less_oob+0x20/0x38 [ 23.876706] kunit_try_run_case+0x14c/0x3d0 [ 23.877431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.878256] kthread+0x24c/0x2d0 [ 23.878925] ret_from_fork+0x10/0x20 [ 23.879645] [ 23.879950] The buggy address belongs to the physical page: [ 23.880556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604 [ 23.882115] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.883533] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.885040] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.886164] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.886895] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.888499] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.889511] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000 [ 23.890553] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.891712] page dumped because: kasan: bad access detected [ 23.892332] [ 23.892621] Memory state around the buggy address: [ 23.894041] fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.894983] fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.895965] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.896709] ^ [ 23.897417] fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.898842] fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.899857] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper-90ee1be57a79abb62b39832d110889f1b9889d83407e503efb2be5636b701527/details/) (gcc-13-lkftconfig-kunit)[ 23.828918] ================================================================== [ 23.829570] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.830968] Write of size 1 at addr fff00000c66060ea by task kunit_try_catch/151 [ 23.832405] [ 23.832623] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.833310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.833712] Hardware name: linux,dummy-virt (DT) [ 23.835998] Call trace: [ 23.836492] show_stack+0x20/0x38 (C) [ 23.837204] dump_stack_lvl+0x8c/0xd0 [ 23.837875] print_report+0x118/0x5e0 [ 23.838492] kasan_report+0xc8/0x118 [ 23.839367] __asan_report_store1_noabort+0x20/0x30 [ 23.839958] krealloc_less_oob_helper+0xae4/0xc50 [ 23.840528] krealloc_large_less_oob+0x20/0x38 [ 23.841829] kunit_try_run_case+0x14c/0x3d0 [ 23.842104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.842383] kthread+0x24c/0x2d0 [ 23.842610] ret_from_fork+0x10/0x20 [ 23.843543] [ 23.844102] The buggy address belongs to the physical page: [ 23.845015] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604 [ 23.846187] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.847284] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.848247] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.849697] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.850694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.851679] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.852780] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000 [ 23.853816] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.854793] page dumped because: kasan: bad access detected [ 23.855616] [ 23.856554] Memory state around the buggy address: [ 23.857099] fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.857978] fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.858923] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.860192] ^ [ 23.860930] fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.861776] fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.862535] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper-a63580725f51564098db7897f6801a8cfb15b0a8deffea60c4b188e7b3f51ca8/details/) (gcc-13-lkftconfig-kunit)[ 23.490520] ================================================================== [ 23.491247] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.492348] Write of size 1 at addr fff00000c6364ada by task kunit_try_catch/147 [ 23.493612] [ 23.494099] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.495287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.495938] Hardware name: linux,dummy-virt (DT) [ 23.496825] Call trace: [ 23.497599] show_stack+0x20/0x38 (C) [ 23.498461] dump_stack_lvl+0x8c/0xd0 [ 23.499070] print_report+0x118/0x5e0 [ 23.500039] kasan_report+0xc8/0x118 [ 23.500561] __asan_report_store1_noabort+0x20/0x30 [ 23.501169] krealloc_less_oob_helper+0xa80/0xc50 [ 23.501733] krealloc_less_oob+0x20/0x38 [ 23.502761] kunit_try_run_case+0x14c/0x3d0 [ 23.503519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.504407] kthread+0x24c/0x2d0 [ 23.505679] ret_from_fork+0x10/0x20 [ 23.506408] [ 23.506881] Allocated by task 147: [ 23.507517] kasan_save_stack+0x3c/0x68 [ 23.508043] kasan_save_track+0x20/0x40 [ 23.508519] kasan_save_alloc_info+0x40/0x58 [ 23.509664] __kasan_krealloc+0x118/0x178 [ 23.510268] krealloc_noprof+0x128/0x360 [ 23.510885] krealloc_less_oob_helper+0x168/0xc50 [ 23.512420] krealloc_less_oob+0x20/0x38 [ 23.512980] kunit_try_run_case+0x14c/0x3d0 [ 23.513229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.513499] kthread+0x24c/0x2d0 [ 23.513697] ret_from_fork+0x10/0x20 [ 23.514439] [ 23.515525] The buggy address belongs to the object at fff00000c6364a00 [ 23.515525] which belongs to the cache kmalloc-256 of size 256 [ 23.516865] The buggy address is located 17 bytes to the right of [ 23.516865] allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9) [ 23.518410] [ 23.518712] The buggy address belongs to the physical page: [ 23.519344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364 [ 23.521167] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.522563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.523732] page_type: f5(slab) [ 23.524366] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.525148] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.526324] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.527208] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.528247] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000 [ 23.530306] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.531352] page dumped because: kasan: bad access detected [ 23.531830] [ 23.532125] Memory state around the buggy address: [ 23.533574] fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.534310] fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.536037] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.537005] ^ [ 23.537879] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.538833] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.539767] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper-b598326d7f33e26402f2a749db317260e483bef647bad764665a48d96e8eadb0/details/) (gcc-13-lkftconfig-kunit)[ 23.390653] ================================================================== [ 23.391570] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 23.393162] Write of size 1 at addr fff00000c6364ac9 by task kunit_try_catch/147 [ 23.393733] [ 23.394034] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.395693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.396300] Hardware name: linux,dummy-virt (DT) [ 23.397274] Call trace: [ 23.397600] show_stack+0x20/0x38 (C) [ 23.398249] dump_stack_lvl+0x8c/0xd0 [ 23.399074] print_report+0x118/0x5e0 [ 23.399728] kasan_report+0xc8/0x118 [ 23.400135] __asan_report_store1_noabort+0x20/0x30 [ 23.400590] krealloc_less_oob_helper+0xa48/0xc50 [ 23.401618] krealloc_less_oob+0x20/0x38 [ 23.402180] kunit_try_run_case+0x14c/0x3d0 [ 23.402794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.403349] kthread+0x24c/0x2d0 [ 23.404477] ret_from_fork+0x10/0x20 [ 23.405024] [ 23.405340] Allocated by task 147: [ 23.405854] kasan_save_stack+0x3c/0x68 [ 23.406354] kasan_save_track+0x20/0x40 [ 23.407809] kasan_save_alloc_info+0x40/0x58 [ 23.408594] __kasan_krealloc+0x118/0x178 [ 23.409099] krealloc_noprof+0x128/0x360 [ 23.409620] krealloc_less_oob_helper+0x168/0xc50 [ 23.410214] krealloc_less_oob+0x20/0x38 [ 23.410779] kunit_try_run_case+0x14c/0x3d0 [ 23.411797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.412485] kthread+0x24c/0x2d0 [ 23.412954] ret_from_fork+0x10/0x20 [ 23.413488] [ 23.414243] The buggy address belongs to the object at fff00000c6364a00 [ 23.414243] which belongs to the cache kmalloc-256 of size 256 [ 23.415968] The buggy address is located 0 bytes to the right of [ 23.415968] allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9) [ 23.417145] [ 23.417427] The buggy address belongs to the physical page: [ 23.419284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364 [ 23.420480] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.421559] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.422420] page_type: f5(slab) [ 23.422922] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.424820] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.425531] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.426408] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.427546] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000 [ 23.428345] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.429028] page dumped because: kasan: bad access detected [ 23.429528] [ 23.429776] Memory state around the buggy address: [ 23.430606] fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.432447] fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.433224] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.434015] ^ [ 23.434608] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.435290] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.436294] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper-b7a44ae0b7c9c85112d8209933d131b2e6d1b89e9257afc16adbc4faa8cbdd2c/details/) (gcc-13-lkftconfig-kunit)[ 23.723495] ================================================================== [ 23.724550] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 23.725338] Write of size 1 at addr fff00000c66060c9 by task kunit_try_catch/151 [ 23.726714] [ 23.727142] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.728232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.729609] Hardware name: linux,dummy-virt (DT) [ 23.730239] Call trace: [ 23.730790] show_stack+0x20/0x38 (C) [ 23.731561] dump_stack_lvl+0x8c/0xd0 [ 23.732457] print_report+0x118/0x5e0 [ 23.733010] kasan_report+0xc8/0x118 [ 23.733500] __asan_report_store1_noabort+0x20/0x30 [ 23.734271] krealloc_less_oob_helper+0xa48/0xc50 [ 23.735011] krealloc_large_less_oob+0x20/0x38 [ 23.736594] kunit_try_run_case+0x14c/0x3d0 [ 23.737281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.738070] kthread+0x24c/0x2d0 [ 23.738667] ret_from_fork+0x10/0x20 [ 23.739839] [ 23.740212] The buggy address belongs to the physical page: [ 23.741028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604 [ 23.741995] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.743198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.743888] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.744563] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.746647] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.747805] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.748562] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000 [ 23.749826] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.750693] page dumped because: kasan: bad access detected [ 23.751471] [ 23.752708] Memory state around the buggy address: [ 23.753317] fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.754135] fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.755031] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.755931] ^ [ 23.756545] fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.757854] fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.758674] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper-c59af2330cbac4df0aedfc6a83a6feb7b2f1cc9dfd1fd39f7a6653381f668f50/details/) (gcc-13-lkftconfig-kunit)[ 23.542292] ================================================================== [ 23.543021] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.544105] Write of size 1 at addr fff00000c6364aea by task kunit_try_catch/147 [ 23.545863] [ 23.546332] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.547517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.548408] Hardware name: linux,dummy-virt (DT) [ 23.549320] Call trace: [ 23.549855] show_stack+0x20/0x38 (C) [ 23.550596] dump_stack_lvl+0x8c/0xd0 [ 23.551481] print_report+0x118/0x5e0 [ 23.551995] kasan_report+0xc8/0x118 [ 23.552474] __asan_report_store1_noabort+0x20/0x30 [ 23.553956] krealloc_less_oob_helper+0xae4/0xc50 [ 23.554240] krealloc_less_oob+0x20/0x38 [ 23.554472] kunit_try_run_case+0x14c/0x3d0 [ 23.554737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.556344] kthread+0x24c/0x2d0 [ 23.556837] ret_from_fork+0x10/0x20 [ 23.557626] [ 23.558126] Allocated by task 147: [ 23.558688] kasan_save_stack+0x3c/0x68 [ 23.559373] kasan_save_track+0x20/0x40 [ 23.560222] kasan_save_alloc_info+0x40/0x58 [ 23.560852] __kasan_krealloc+0x118/0x178 [ 23.561859] krealloc_noprof+0x128/0x360 [ 23.562366] krealloc_less_oob_helper+0x168/0xc50 [ 23.563591] krealloc_less_oob+0x20/0x38 [ 23.564111] kunit_try_run_case+0x14c/0x3d0 [ 23.564882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.565558] kthread+0x24c/0x2d0 [ 23.565830] ret_from_fork+0x10/0x20 [ 23.566517] [ 23.566847] The buggy address belongs to the object at fff00000c6364a00 [ 23.566847] which belongs to the cache kmalloc-256 of size 256 [ 23.568378] The buggy address is located 33 bytes to the right of [ 23.568378] allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9) [ 23.569587] [ 23.570513] The buggy address belongs to the physical page: [ 23.571278] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364 [ 23.572559] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.574453] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.575675] page_type: f5(slab) [ 23.576493] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.577500] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.578505] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.580281] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.581137] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000 [ 23.582027] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.582898] page dumped because: kasan: bad access detected [ 23.583854] [ 23.584123] Memory state around the buggy address: [ 23.584861] fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.585724] fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.586595] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.587891] ^ [ 23.588437] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.590201] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.591085] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper-cf2c95a1be6f201949ab9a62801c3cefd423f71d0bd4e41851cdc47fc3c78c13/details/) (gcc-13-lkftconfig-kunit)[ 23.760427] ================================================================== [ 23.761173] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 23.762189] Write of size 1 at addr fff00000c66060d0 by task kunit_try_catch/151 [ 23.763045] [ 23.763460] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.764352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.765619] Hardware name: linux,dummy-virt (DT) [ 23.766367] Call trace: [ 23.766841] show_stack+0x20/0x38 (C) [ 23.767569] dump_stack_lvl+0x8c/0xd0 [ 23.768474] print_report+0x118/0x5e0 [ 23.768871] kasan_report+0xc8/0x118 [ 23.769279] __asan_report_store1_noabort+0x20/0x30 [ 23.770038] krealloc_less_oob_helper+0xb9c/0xc50 [ 23.770792] krealloc_large_less_oob+0x20/0x38 [ 23.771995] kunit_try_run_case+0x14c/0x3d0 [ 23.772540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.773124] kthread+0x24c/0x2d0 [ 23.773662] ret_from_fork+0x10/0x20 [ 23.774157] [ 23.774495] The buggy address belongs to the physical page: [ 23.776226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604 [ 23.776990] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.777904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.778779] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.779993] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.780961] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.781809] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.782582] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000 [ 23.783650] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.784523] page dumped because: kasan: bad access detected [ 23.785052] [ 23.785263] Memory state around the buggy address: [ 23.785719] fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.786836] fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.787571] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.788219] ^ [ 23.790203] fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.790932] fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.792034] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper-1463e60f904d4c6fd60a8f474d10f5ab2c1621140a03b3607b82de34bb3233a1/details/) (gcc-13-lkftconfig-kunit)[ 23.685568] ================================================================== [ 23.686377] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 23.687279] Write of size 1 at addr fff00000c66020f0 by task kunit_try_catch/149 [ 23.688343] [ 23.688837] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.689964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.690581] Hardware name: linux,dummy-virt (DT) [ 23.691229] Call trace: [ 23.691714] show_stack+0x20/0x38 (C) [ 23.692366] dump_stack_lvl+0x8c/0xd0 [ 23.693015] print_report+0x118/0x5e0 [ 23.693576] kasan_report+0xc8/0x118 [ 23.694328] __asan_report_store1_noabort+0x20/0x30 [ 23.695131] krealloc_more_oob_helper+0x5c8/0x680 [ 23.695891] krealloc_large_more_oob+0x20/0x38 [ 23.696536] kunit_try_run_case+0x14c/0x3d0 [ 23.697169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.697899] kthread+0x24c/0x2d0 [ 23.698407] ret_from_fork+0x10/0x20 [ 23.699057] [ 23.699404] The buggy address belongs to the physical page: [ 23.700088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600 [ 23.701066] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.701939] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.702823] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.703685] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.704541] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.705409] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.706348] head: 0bfffe0000000002 ffffc1ffc3198001 ffffffffffffffff 0000000000000000 [ 23.707311] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.708086] page dumped because: kasan: bad access detected [ 23.708673] [ 23.708958] Memory state around the buggy address: [ 23.709456] fff00000c6601f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.710361] fff00000c6602000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.711110] >fff00000c6602080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 23.711929] ^ [ 23.712616] fff00000c6602100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.713446] fff00000c6602180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.714273] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper-85f24a16639dfaf19634c0a1397d67ada14421e05dea9f115e2fabf41493c150/details/) (gcc-13-lkftconfig-kunit)[ 23.649316] ================================================================== [ 23.650361] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 23.652588] Write of size 1 at addr fff00000c66020eb by task kunit_try_catch/149 [ 23.653422] [ 23.653778] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.654880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.655765] Hardware name: linux,dummy-virt (DT) [ 23.656317] Call trace: [ 23.656666] show_stack+0x20/0x38 (C) [ 23.657408] dump_stack_lvl+0x8c/0xd0 [ 23.658069] print_report+0x118/0x5e0 [ 23.658932] kasan_report+0xc8/0x118 [ 23.659439] __asan_report_store1_noabort+0x20/0x30 [ 23.660307] krealloc_more_oob_helper+0x614/0x680 [ 23.661088] krealloc_large_more_oob+0x20/0x38 [ 23.661689] kunit_try_run_case+0x14c/0x3d0 [ 23.662334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.663061] kthread+0x24c/0x2d0 [ 23.663697] ret_from_fork+0x10/0x20 [ 23.664225] [ 23.664523] The buggy address belongs to the physical page: [ 23.665669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600 [ 23.666339] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.667836] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.668674] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.669649] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.670559] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.671686] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.672775] head: 0bfffe0000000002 ffffc1ffc3198001 ffffffffffffffff 0000000000000000 [ 23.673766] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.674719] page dumped because: kasan: bad access detected [ 23.675789] [ 23.676243] Memory state around the buggy address: [ 23.677049] fff00000c6601f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.677775] fff00000c6602000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.678724] >fff00000c6602080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 23.679673] ^ [ 23.680388] fff00000c6602100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.681510] fff00000c6602180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.682651] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper-bb28a307504a540b9926da04f8433f8cd28b664d67fce79670d14c81fc02549c/details/) (gcc-13-lkftconfig-kunit)[ 23.288500] ================================================================== [ 23.289455] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 23.290162] Write of size 1 at addr fff00000c096ceeb by task kunit_try_catch/145 [ 23.290924] [ 23.291610] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.292645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.293220] Hardware name: linux,dummy-virt (DT) [ 23.293721] Call trace: [ 23.294199] show_stack+0x20/0x38 (C) [ 23.294792] dump_stack_lvl+0x8c/0xd0 [ 23.295331] print_report+0x118/0x5e0 [ 23.295918] kasan_report+0xc8/0x118 [ 23.296509] __asan_report_store1_noabort+0x20/0x30 [ 23.297270] krealloc_more_oob_helper+0x614/0x680 [ 23.298038] krealloc_more_oob+0x20/0x38 [ 23.298585] kunit_try_run_case+0x14c/0x3d0 [ 23.299529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.300376] kthread+0x24c/0x2d0 [ 23.301145] ret_from_fork+0x10/0x20 [ 23.301663] [ 23.301981] Allocated by task 145: [ 23.302457] kasan_save_stack+0x3c/0x68 [ 23.303371] kasan_save_track+0x20/0x40 [ 23.304487] kasan_save_alloc_info+0x40/0x58 [ 23.305088] __kasan_krealloc+0x118/0x178 [ 23.305649] krealloc_noprof+0x128/0x360 [ 23.306215] krealloc_more_oob_helper+0x168/0x680 [ 23.306892] krealloc_more_oob+0x20/0x38 [ 23.307563] kunit_try_run_case+0x14c/0x3d0 [ 23.308265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.309000] kthread+0x24c/0x2d0 [ 23.309534] ret_from_fork+0x10/0x20 [ 23.310109] [ 23.310486] The buggy address belongs to the object at fff00000c096ce00 [ 23.310486] which belongs to the cache kmalloc-256 of size 256 [ 23.311918] The buggy address is located 0 bytes to the right of [ 23.311918] allocated 235-byte region [fff00000c096ce00, fff00000c096ceeb) [ 23.313387] [ 23.313980] The buggy address belongs to the physical page: [ 23.315304] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10096c [ 23.316408] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.317554] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.318445] page_type: f5(slab) [ 23.319234] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.320134] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.320985] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.321856] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.322786] head: 0bfffe0000000001 ffffc1ffc3025b01 ffffffffffffffff 0000000000000000 [ 23.324017] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.324929] page dumped because: kasan: bad access detected [ 23.325627] [ 23.325977] Memory state around the buggy address: [ 23.326556] fff00000c096cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.327531] fff00000c096ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.328660] >fff00000c096ce80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 23.329578] ^ [ 23.330155] fff00000c096cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.330478] fff00000c096cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.330900] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper-d0c3e6049f2d73ba0892e6d6a903b2db106f1e6a945bb01599315827cf63627f/details/) (gcc-13-lkftconfig-kunit)[ 23.334731] ================================================================== [ 23.335660] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 23.337187] Write of size 1 at addr fff00000c096cef0 by task kunit_try_catch/145 [ 23.337833] [ 23.338204] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.340404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.340923] Hardware name: linux,dummy-virt (DT) [ 23.341472] Call trace: [ 23.342141] show_stack+0x20/0x38 (C) [ 23.342760] dump_stack_lvl+0x8c/0xd0 [ 23.343602] print_report+0x118/0x5e0 [ 23.344293] kasan_report+0xc8/0x118 [ 23.344824] __asan_report_store1_noabort+0x20/0x30 [ 23.345415] krealloc_more_oob_helper+0x5c8/0x680 [ 23.346243] krealloc_more_oob+0x20/0x38 [ 23.346945] kunit_try_run_case+0x14c/0x3d0 [ 23.347733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.348583] kthread+0x24c/0x2d0 [ 23.348989] ret_from_fork+0x10/0x20 [ 23.349385] [ 23.349602] Allocated by task 145: [ 23.349971] kasan_save_stack+0x3c/0x68 [ 23.350380] kasan_save_track+0x20/0x40 [ 23.352024] kasan_save_alloc_info+0x40/0x58 [ 23.352658] __kasan_krealloc+0x118/0x178 [ 23.353686] krealloc_noprof+0x128/0x360 [ 23.354081] krealloc_more_oob_helper+0x168/0x680 [ 23.355322] krealloc_more_oob+0x20/0x38 [ 23.356027] kunit_try_run_case+0x14c/0x3d0 [ 23.356276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.356546] kthread+0x24c/0x2d0 [ 23.356790] ret_from_fork+0x10/0x20 [ 23.357656] [ 23.358093] The buggy address belongs to the object at fff00000c096ce00 [ 23.358093] which belongs to the cache kmalloc-256 of size 256 [ 23.359554] The buggy address is located 5 bytes to the right of [ 23.359554] allocated 235-byte region [fff00000c096ce00, fff00000c096ceeb) [ 23.361166] [ 23.361515] The buggy address belongs to the physical page: [ 23.362277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10096c [ 23.363248] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.364195] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.365022] page_type: f5(slab) [ 23.365463] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.366824] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.367963] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.368868] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.369857] head: 0bfffe0000000001 ffffc1ffc3025b01 ffffffffffffffff 0000000000000000 [ 23.370863] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.371693] page dumped because: kasan: bad access detected [ 23.372658] [ 23.373755] Memory state around the buggy address: [ 23.374510] fff00000c096cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.375926] fff00000c096ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.376792] >fff00000c096ce80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 23.377518] ^ [ 23.378586] fff00000c096cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.379512] fff00000c096cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.380534] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory-58c17a942a9940768b9d4b3d32669e3298eaa6615ffd890ccfa5bcb4428be537/details/) (gcc-13-lkftconfig-kunit)[ 24.835570] ================================================================== [ 24.836164] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 24.837353] Read of size 1 at addr fff00000c5cd657f by task kunit_try_catch/183 [ 24.838178] [ 24.838593] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.839574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.840383] Hardware name: linux,dummy-virt (DT) [ 24.841549] Call trace: [ 24.841985] show_stack+0x20/0x38 (C) [ 24.842611] dump_stack_lvl+0x8c/0xd0 [ 24.843236] print_report+0x118/0x5e0 [ 24.844361] kasan_report+0xc8/0x118 [ 24.844903] __asan_report_load1_noabort+0x20/0x30 [ 24.845556] ksize_unpoisons_memory+0x6a0/0x750 [ 24.846276] kunit_try_run_case+0x14c/0x3d0 [ 24.846977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.847714] kthread+0x24c/0x2d0 [ 24.848968] ret_from_fork+0x10/0x20 [ 24.849519] [ 24.849879] Allocated by task 183: [ 24.850380] kasan_save_stack+0x3c/0x68 [ 24.851435] kasan_save_track+0x20/0x40 [ 24.851937] kasan_save_alloc_info+0x40/0x58 [ 24.852469] __kasan_kmalloc+0xd4/0xd8 [ 24.852961] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.853495] ksize_unpoisons_memory+0xc0/0x750 [ 24.854873] kunit_try_run_case+0x14c/0x3d0 [ 24.856356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.857109] kthread+0x24c/0x2d0 [ 24.857632] ret_from_fork+0x10/0x20 [ 24.858173] [ 24.858551] The buggy address belongs to the object at fff00000c5cd6500 [ 24.858551] which belongs to the cache kmalloc-128 of size 128 [ 24.860096] The buggy address is located 12 bytes to the right of [ 24.860096] allocated 115-byte region [fff00000c5cd6500, fff00000c5cd6573) [ 24.861320] [ 24.861604] The buggy address belongs to the physical page: [ 24.862619] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6 [ 24.863506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.864554] page_type: f5(slab) [ 24.864923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.865356] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.865693] page dumped because: kasan: bad access detected [ 24.866993] [ 24.867263] Memory state around the buggy address: [ 24.867816] fff00000c5cd6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.868619] fff00000c5cd6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.869876] >fff00000c5cd6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.870642] ^ [ 24.872185] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.872840] fff00000c5cd6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.873555] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory-7ca0025a23776f119245c011a2a33675a4bd7e202b9bdaa4ea5649bd5919acc9/details/) (gcc-13-lkftconfig-kunit)[ 24.749796] ================================================================== [ 24.750660] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 24.751441] Read of size 1 at addr fff00000c5cd6573 by task kunit_try_catch/183 [ 24.752971] [ 24.753448] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.754241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.755456] Hardware name: linux,dummy-virt (DT) [ 24.756157] Call trace: [ 24.756850] show_stack+0x20/0x38 (C) [ 24.757531] dump_stack_lvl+0x8c/0xd0 [ 24.758247] print_report+0x118/0x5e0 [ 24.758802] kasan_report+0xc8/0x118 [ 24.759431] __asan_report_load1_noabort+0x20/0x30 [ 24.760447] ksize_unpoisons_memory+0x638/0x750 [ 24.761309] kunit_try_run_case+0x14c/0x3d0 [ 24.761993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.762805] kthread+0x24c/0x2d0 [ 24.763673] ret_from_fork+0x10/0x20 [ 24.764291] [ 24.764625] Allocated by task 183: [ 24.765176] kasan_save_stack+0x3c/0x68 [ 24.765807] kasan_save_track+0x20/0x40 [ 24.766450] kasan_save_alloc_info+0x40/0x58 [ 24.767032] __kasan_kmalloc+0xd4/0xd8 [ 24.767866] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.768393] ksize_unpoisons_memory+0xc0/0x750 [ 24.768947] kunit_try_run_case+0x14c/0x3d0 [ 24.769455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.770951] kthread+0x24c/0x2d0 [ 24.771827] ret_from_fork+0x10/0x20 [ 24.772381] [ 24.772732] The buggy address belongs to the object at fff00000c5cd6500 [ 24.772732] which belongs to the cache kmalloc-128 of size 128 [ 24.774119] The buggy address is located 0 bytes to the right of [ 24.774119] allocated 115-byte region [fff00000c5cd6500, fff00000c5cd6573) [ 24.775817] [ 24.776050] The buggy address belongs to the physical page: [ 24.777153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6 [ 24.778319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.779628] page_type: f5(slab) [ 24.780012] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.781019] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.781775] page dumped because: kasan: bad access detected [ 24.782370] [ 24.782669] Memory state around the buggy address: [ 24.783225] fff00000c5cd6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.785024] fff00000c5cd6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.785950] >fff00000c5cd6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.786611] ^ [ 24.788067] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.788892] fff00000c5cd6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.789688] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory-92d499ecabab6eaab290f73f43ec9806e57dcda34b1298f52d8359c5e169f72d/details/) (gcc-13-lkftconfig-kunit)[ 24.791133] ================================================================== [ 24.792135] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 24.792827] Read of size 1 at addr fff00000c5cd6578 by task kunit_try_catch/183 [ 24.793469] [ 24.793705] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.796147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.796569] Hardware name: linux,dummy-virt (DT) [ 24.797032] Call trace: [ 24.797313] show_stack+0x20/0x38 (C) [ 24.797738] dump_stack_lvl+0x8c/0xd0 [ 24.799576] print_report+0x118/0x5e0 [ 24.800592] kasan_report+0xc8/0x118 [ 24.801216] __asan_report_load1_noabort+0x20/0x30 [ 24.802007] ksize_unpoisons_memory+0x628/0x750 [ 24.802735] kunit_try_run_case+0x14c/0x3d0 [ 24.803530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.804224] kthread+0x24c/0x2d0 [ 24.804713] ret_from_fork+0x10/0x20 [ 24.805253] [ 24.805539] Allocated by task 183: [ 24.806792] kasan_save_stack+0x3c/0x68 [ 24.807520] kasan_save_track+0x20/0x40 [ 24.808782] kasan_save_alloc_info+0x40/0x58 [ 24.809516] __kasan_kmalloc+0xd4/0xd8 [ 24.810195] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.810966] ksize_unpoisons_memory+0xc0/0x750 [ 24.811722] kunit_try_run_case+0x14c/0x3d0 [ 24.812292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.812946] kthread+0x24c/0x2d0 [ 24.813404] ret_from_fork+0x10/0x20 [ 24.814302] [ 24.814587] The buggy address belongs to the object at fff00000c5cd6500 [ 24.814587] which belongs to the cache kmalloc-128 of size 128 [ 24.816866] The buggy address is located 5 bytes to the right of [ 24.816866] allocated 115-byte region [fff00000c5cd6500, fff00000c5cd6573) [ 24.817636] [ 24.818330] The buggy address belongs to the physical page: [ 24.819305] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6 [ 24.820566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.821374] page_type: f5(slab) [ 24.821814] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.822560] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.823985] page dumped because: kasan: bad access detected [ 24.824876] [ 24.825887] Memory state around the buggy address: [ 24.826516] fff00000c5cd6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.827694] fff00000c5cd6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.828755] >fff00000c5cd6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.829680] ^ [ 24.830641] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.831605] fff00000c5cd6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.833672] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-memchr](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-memchr-90dd3aa377693d99886693bb62f9045ad27d942b0354179d06c2f3b1f4a80612/details/) (gcc-13-lkftconfig-kunit)[ 26.938896] ================================================================== [ 26.939926] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88 [ 26.940525] Read of size 1 at addr fff00000c5d0e118 by task kunit_try_catch/244 [ 26.941330] [ 26.941645] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 26.942541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.943368] Hardware name: linux,dummy-virt (DT) [ 26.944315] Call trace: [ 26.945178] show_stack+0x20/0x38 (C) [ 26.945882] dump_stack_lvl+0x8c/0xd0 [ 26.946390] print_report+0x118/0x5e0 [ 26.946921] kasan_report+0xc8/0x118 [ 26.947419] __asan_report_load1_noabort+0x20/0x30 [ 26.948644] memchr+0x78/0x88 [ 26.949268] kasan_memchr+0x148/0x2d8 [ 26.949971] kunit_try_run_case+0x14c/0x3d0 [ 26.950696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.951700] kthread+0x24c/0x2d0 [ 26.952365] ret_from_fork+0x10/0x20 [ 26.953083] [ 26.953384] Allocated by task 244: [ 26.954097] kasan_save_stack+0x3c/0x68 [ 26.954773] kasan_save_track+0x20/0x40 [ 26.955500] kasan_save_alloc_info+0x40/0x58 [ 26.956314] __kasan_kmalloc+0xd4/0xd8 [ 26.956866] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.957660] kasan_memchr+0xb0/0x2d8 [ 26.958332] kunit_try_run_case+0x14c/0x3d0 [ 26.959248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.959878] kthread+0x24c/0x2d0 [ 26.960795] ret_from_fork+0x10/0x20 [ 26.961475] [ 26.961960] The buggy address belongs to the object at fff00000c5d0e100 [ 26.961960] which belongs to the cache kmalloc-32 of size 32 [ 26.963555] The buggy address is located 0 bytes to the right of [ 26.963555] allocated 24-byte region [fff00000c5d0e100, fff00000c5d0e118) [ 26.964771] [ 26.965068] The buggy address belongs to the physical page: [ 26.965681] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e [ 26.966663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.967878] page_type: f5(slab) [ 26.968391] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 26.969327] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 26.970203] page dumped because: kasan: bad access detected [ 26.970962] [ 26.971345] Memory state around the buggy address: [ 26.972001] fff00000c5d0e000: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 26.972801] fff00000c5d0e080: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 26.973737] >fff00000c5d0e100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.974652] ^ [ 26.975395] fff00000c5d0e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.976052] fff00000c5d0e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.976693] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-memcmp](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-memcmp-a44002864e2e675234495dbfd4ec32e56164d9b5f716a0d0e54ad5c2c985489a/details/) (gcc-13-lkftconfig-kunit)[ 26.985881] ================================================================== [ 26.986881] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 26.988445] Read of size 1 at addr fff00000c5d0e1d8 by task kunit_try_catch/246 [ 26.989454] [ 26.989843] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 26.990883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.992112] Hardware name: linux,dummy-virt (DT) [ 26.992773] Call trace: [ 26.993222] show_stack+0x20/0x38 (C) [ 26.993884] dump_stack_lvl+0x8c/0xd0 [ 26.994429] print_report+0x118/0x5e0 [ 26.995734] kasan_report+0xc8/0x118 [ 26.996311] __asan_report_load1_noabort+0x20/0x30 [ 26.996981] memcmp+0x198/0x1d8 [ 26.997505] kasan_memcmp+0x16c/0x300 [ 26.998079] kunit_try_run_case+0x14c/0x3d0 [ 26.998711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.999834] kthread+0x24c/0x2d0 [ 27.000324] ret_from_fork+0x10/0x20 [ 27.001001] [ 27.001339] Allocated by task 246: [ 27.001889] kasan_save_stack+0x3c/0x68 [ 27.002458] kasan_save_track+0x20/0x40 [ 27.003985] kasan_save_alloc_info+0x40/0x58 [ 27.004551] __kasan_kmalloc+0xd4/0xd8 [ 27.004820] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.005085] kasan_memcmp+0xbc/0x300 [ 27.005299] kunit_try_run_case+0x14c/0x3d0 [ 27.005535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.005916] kthread+0x24c/0x2d0 [ 27.006318] ret_from_fork+0x10/0x20 [ 27.006726] [ 27.008229] The buggy address belongs to the object at fff00000c5d0e1c0 [ 27.008229] which belongs to the cache kmalloc-32 of size 32 [ 27.009344] The buggy address is located 0 bytes to the right of [ 27.009344] allocated 24-byte region [fff00000c5d0e1c0, fff00000c5d0e1d8) [ 27.010717] [ 27.011156] The buggy address belongs to the physical page: [ 27.012373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e [ 27.013261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.014109] page_type: f5(slab) [ 27.014668] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.015763] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 27.016737] page dumped because: kasan: bad access detected [ 27.017533] [ 27.017865] Memory state around the buggy address: [ 27.018500] fff00000c5d0e080: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 27.019645] fff00000c5d0e100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 27.020765] >fff00000c5d0e180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 27.021512] ^ [ 27.021901] fff00000c5d0e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.022887] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.024041] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper-09e710b2f667af8d9ffaa5e15062b40467fb8c42efa029f0d670a5f1f5733a6f/details/) (gcc-13-lkftconfig-kunit)[ 26.270466] ================================================================== [ 26.271633] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 26.273073] Read of size 1 at addr fff00000c5c7b2bb by task kunit_try_catch/214 [ 26.274530] [ 26.275379] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 26.276403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.277131] Hardware name: linux,dummy-virt (DT) [ 26.277712] Call trace: [ 26.278075] show_stack+0x20/0x38 (C) [ 26.278650] dump_stack_lvl+0x8c/0xd0 [ 26.279586] print_report+0x118/0x5e0 [ 26.280368] kasan_report+0xc8/0x118 [ 26.280849] __asan_report_load1_noabort+0x20/0x30 [ 26.281412] mempool_oob_right_helper+0x2ac/0x2f0 [ 26.282179] mempool_slab_oob_right+0xb8/0x110 [ 26.282998] kunit_try_run_case+0x14c/0x3d0 [ 26.283877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.284639] kthread+0x24c/0x2d0 [ 26.285256] ret_from_fork+0x10/0x20 [ 26.285938] [ 26.286161] Allocated by task 214: [ 26.286918] kasan_save_stack+0x3c/0x68 [ 26.287543] kasan_save_track+0x20/0x40 [ 26.288882] kasan_save_alloc_info+0x40/0x58 [ 26.289566] __kasan_mempool_unpoison_object+0xbc/0x180 [ 26.290340] remove_element+0x16c/0x1f8 [ 26.290986] mempool_alloc_preallocated+0x58/0xc0 [ 26.291811] mempool_oob_right_helper+0x98/0x2f0 [ 26.292679] mempool_slab_oob_right+0xb8/0x110 [ 26.293388] kunit_try_run_case+0x14c/0x3d0 [ 26.294060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.294817] kthread+0x24c/0x2d0 [ 26.295523] ret_from_fork+0x10/0x20 [ 26.296041] [ 26.296457] The buggy address belongs to the object at fff00000c5c7b240 [ 26.296457] which belongs to the cache test_cache of size 123 [ 26.297878] The buggy address is located 0 bytes to the right of [ 26.297878] allocated 123-byte region [fff00000c5c7b240, fff00000c5c7b2bb) [ 26.299619] [ 26.299983] The buggy address belongs to the physical page: [ 26.300616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c7b [ 26.301462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.302471] page_type: f5(slab) [ 26.302941] raw: 0bfffe0000000000 fff00000c565aa00 dead000000000122 0000000000000000 [ 26.303965] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 26.304727] page dumped because: kasan: bad access detected [ 26.305424] [ 26.305759] Memory state around the buggy address: [ 26.306332] fff00000c5c7b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.307877] fff00000c5c7b200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 26.308737] >fff00000c5c7b280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 26.309690] ^ [ 26.310300] fff00000c5c7b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.311210] fff00000c5c7b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.311988] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper-47c13e865841e7acbe767db7376c6b5d26d9163e1130d946a0f44c45625aff0c/details/) (gcc-13-lkftconfig-kunit)[ 26.228227] ================================================================== [ 26.229554] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 26.230422] Read of size 1 at addr fff00000c66de001 by task kunit_try_catch/212 [ 26.232712] [ 26.233112] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 26.233612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.234036] Hardware name: linux,dummy-virt (DT) [ 26.234527] Call trace: [ 26.235053] show_stack+0x20/0x38 (C) [ 26.235648] dump_stack_lvl+0x8c/0xd0 [ 26.236514] print_report+0x118/0x5e0 [ 26.237516] kasan_report+0xc8/0x118 [ 26.238157] __asan_report_load1_noabort+0x20/0x30 [ 26.238768] mempool_oob_right_helper+0x2ac/0x2f0 [ 26.239712] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 26.240246] kunit_try_run_case+0x14c/0x3d0 [ 26.240935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.242474] kthread+0x24c/0x2d0 [ 26.243487] ret_from_fork+0x10/0x20 [ 26.244501] [ 26.244817] The buggy address belongs to the physical page: [ 26.245428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc [ 26.246184] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.247258] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.248018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.248691] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.249956] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.250860] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.251644] head: 0bfffe0000000002 ffffc1ffc319b701 ffffffffffffffff 0000000000000000 [ 26.252763] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 26.253620] page dumped because: kasan: bad access detected [ 26.254264] [ 26.254623] Memory state around the buggy address: [ 26.255533] fff00000c66ddf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.256183] fff00000c66ddf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.256852] >fff00000c66de000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.257485] ^ [ 26.258333] fff00000c66de080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.260044] fff00000c66de100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.260764] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper-73bbd040b0516e646b127d8ddd1b13331f2d88580dcb561f8acf36c38afc0660/details/) (gcc-13-lkftconfig-kunit)[ 26.179022] ================================================================== [ 26.180544] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 26.181394] Read of size 1 at addr fff00000c5d0c473 by task kunit_try_catch/210 [ 26.182178] [ 26.182511] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 26.183615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.184186] Hardware name: linux,dummy-virt (DT) [ 26.184863] Call trace: [ 26.185266] show_stack+0x20/0x38 (C) [ 26.185806] dump_stack_lvl+0x8c/0xd0 [ 26.186404] print_report+0x118/0x5e0 [ 26.187253] kasan_report+0xc8/0x118 [ 26.187996] __asan_report_load1_noabort+0x20/0x30 [ 26.188572] mempool_oob_right_helper+0x2ac/0x2f0 [ 26.189242] mempool_kmalloc_oob_right+0xbc/0x118 [ 26.189821] kunit_try_run_case+0x14c/0x3d0 [ 26.190438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.191472] kthread+0x24c/0x2d0 [ 26.192031] ret_from_fork+0x10/0x20 [ 26.192607] [ 26.192963] Allocated by task 210: [ 26.193419] kasan_save_stack+0x3c/0x68 [ 26.194017] kasan_save_track+0x20/0x40 [ 26.194500] kasan_save_alloc_info+0x40/0x58 [ 26.195246] __kasan_mempool_unpoison_object+0x11c/0x180 [ 26.196263] remove_element+0x130/0x1f8 [ 26.196841] mempool_alloc_preallocated+0x58/0xc0 [ 26.197642] mempool_oob_right_helper+0x98/0x2f0 [ 26.198245] mempool_kmalloc_oob_right+0xbc/0x118 [ 26.198710] kunit_try_run_case+0x14c/0x3d0 [ 26.199320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.200275] kthread+0x24c/0x2d0 [ 26.200824] ret_from_fork+0x10/0x20 [ 26.201275] [ 26.201639] The buggy address belongs to the object at fff00000c5d0c400 [ 26.201639] which belongs to the cache kmalloc-128 of size 128 [ 26.203414] The buggy address is located 0 bytes to the right of [ 26.203414] allocated 115-byte region [fff00000c5d0c400, fff00000c5d0c473) [ 26.204727] [ 26.205046] The buggy address belongs to the physical page: [ 26.205707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0c [ 26.206694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.207832] page_type: f5(slab) [ 26.208287] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.209223] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 26.209992] page dumped because: kasan: bad access detected [ 26.210622] [ 26.211395] Memory state around the buggy address: [ 26.211974] fff00000c5d0c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.212719] fff00000c5d0c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.213451] >fff00000c5d0c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.214304] ^ [ 26.215633] fff00000c5d0c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.216514] fff00000c5d0c500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.217379] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user-5aa12fdac75119d3b018e76c334c05b02e523dbf13a60952d3415333d2f3300b/details/) (gcc-13-lkftconfig-kunit)[ 31.041330] ================================================================== [ 31.042426] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 31.043657] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274 [ 31.044950] [ 31.045458] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 31.046601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.047319] Hardware name: linux,dummy-virt (DT) [ 31.048095] Call trace: [ 31.048639] show_stack+0x20/0x38 (C) [ 31.049237] dump_stack_lvl+0x8c/0xd0 [ 31.050138] print_report+0x118/0x5e0 [ 31.050584] kasan_report+0xc8/0x118 [ 31.051265] kasan_check_range+0x100/0x1a8 [ 31.051992] __kasan_check_write+0x20/0x30 [ 31.052642] strncpy_from_user+0x3c/0x2a0 [ 31.053371] copy_user_test_oob+0x5c0/0xec0 [ 31.053963] kunit_try_run_case+0x14c/0x3d0 [ 31.054517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.055512] kthread+0x24c/0x2d0 [ 31.056102] ret_from_fork+0x10/0x20 [ 31.056819] [ 31.057311] Allocated by task 274: [ 31.057773] kasan_save_stack+0x3c/0x68 [ 31.058536] kasan_save_track+0x20/0x40 [ 31.059205] kasan_save_alloc_info+0x40/0x58 [ 31.059782] __kasan_kmalloc+0xd4/0xd8 [ 31.060294] __kmalloc_noprof+0x188/0x4c8 [ 31.060835] kunit_kmalloc_array+0x34/0x88 [ 31.061375] copy_user_test_oob+0xac/0xec0 [ 31.062306] kunit_try_run_case+0x14c/0x3d0 [ 31.062979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.063665] kthread+0x24c/0x2d0 [ 31.064344] ret_from_fork+0x10/0x20 [ 31.064984] [ 31.065430] The buggy address belongs to the object at fff00000c5d54b00 [ 31.065430] which belongs to the cache kmalloc-128 of size 128 [ 31.066785] The buggy address is located 0 bytes inside of [ 31.066785] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78) [ 31.068369] [ 31.068681] The buggy address belongs to the physical page: [ 31.069600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54 [ 31.070607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.071495] page_type: f5(slab) [ 31.072146] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.073063] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.074033] page dumped because: kasan: bad access detected [ 31.074815] [ 31.075305] Memory state around the buggy address: [ 31.075886] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.076624] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.077735] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.078639] ^ [ 31.079560] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.080499] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.081411] ================================================================== - [kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user-65a3b499d65a39a4c317a2ba50fc3223ea74651bf996a80bee31e25ebcd3c171/details/) (gcc-13-lkftconfig-kunit)[ 31.083895] ================================================================== [ 31.084646] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 31.085453] Write of size 1 at addr fff00000c5d54b78 by task kunit_try_catch/274 [ 31.086379] [ 31.086787] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 31.087788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.088492] Hardware name: linux,dummy-virt (DT) [ 31.089153] Call trace: [ 31.089674] show_stack+0x20/0x38 (C) [ 31.090426] dump_stack_lvl+0x8c/0xd0 [ 31.090966] print_report+0x118/0x5e0 [ 31.091491] kasan_report+0xc8/0x118 [ 31.092133] __asan_report_store1_noabort+0x20/0x30 [ 31.092811] strncpy_from_user+0x270/0x2a0 [ 31.093472] copy_user_test_oob+0x5c0/0xec0 [ 31.094146] kunit_try_run_case+0x14c/0x3d0 [ 31.094818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.095566] kthread+0x24c/0x2d0 [ 31.096157] ret_from_fork+0x10/0x20 [ 31.096713] [ 31.097075] Allocated by task 274: [ 31.097536] kasan_save_stack+0x3c/0x68 [ 31.098024] kasan_save_track+0x20/0x40 [ 31.098592] kasan_save_alloc_info+0x40/0x58 [ 31.099138] __kasan_kmalloc+0xd4/0xd8 [ 31.099702] __kmalloc_noprof+0x188/0x4c8 [ 31.100289] kunit_kmalloc_array+0x34/0x88 [ 31.100866] copy_user_test_oob+0xac/0xec0 [ 31.101358] kunit_try_run_case+0x14c/0x3d0 [ 31.101949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.102617] kthread+0x24c/0x2d0 [ 31.103134] ret_from_fork+0x10/0x20 [ 31.103607] [ 31.103961] The buggy address belongs to the object at fff00000c5d54b00 [ 31.103961] which belongs to the cache kmalloc-128 of size 128 [ 31.105126] The buggy address is located 0 bytes to the right of [ 31.105126] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78) [ 31.106415] [ 31.106776] The buggy address belongs to the physical page: [ 31.107396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54 [ 31.108298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.109100] page_type: f5(slab) [ 31.109588] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.110401] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.111202] page dumped because: kasan: bad access detected [ 31.111908] [ 31.112249] Memory state around the buggy address: [ 31.112867] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.113736] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.114480] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.115363] ^ [ 31.116320] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.117183] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.117949] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-kasan_strings](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-kasan_strings-d08d63de3c78aa20fa389ba8be30e71934be8e2b917a8eff864da787e2a9f86e/details/) (gcc-13-lkftconfig-kunit)[ 27.174205] ================================================================== [ 27.174928] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8 [ 27.176602] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248 [ 27.177603] [ 27.177946] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.179288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.180029] Hardware name: linux,dummy-virt (DT) [ 27.180606] Call trace: [ 27.181047] show_stack+0x20/0x38 (C) [ 27.181597] dump_stack_lvl+0x8c/0xd0 [ 27.182238] print_report+0x118/0x5e0 [ 27.182833] kasan_report+0xc8/0x118 [ 27.183533] __asan_report_load1_noabort+0x20/0x30 [ 27.184271] kasan_strings+0x858/0x8f8 [ 27.184893] kunit_try_run_case+0x14c/0x3d0 [ 27.185340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.186006] kthread+0x24c/0x2d0 [ 27.186474] ret_from_fork+0x10/0x20 [ 27.187029] [ 27.187301] Allocated by task 248: [ 27.187879] kasan_save_stack+0x3c/0x68 [ 27.188558] kasan_save_track+0x20/0x40 [ 27.189114] kasan_save_alloc_info+0x40/0x58 [ 27.189722] __kasan_kmalloc+0xd4/0xd8 [ 27.190393] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.191091] kasan_strings+0xb4/0x8f8 [ 27.191566] kunit_try_run_case+0x14c/0x3d0 [ 27.192282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.193020] kthread+0x24c/0x2d0 [ 27.193539] ret_from_fork+0x10/0x20 [ 27.194059] [ 27.194433] Freed by task 248: [ 27.194954] kasan_save_stack+0x3c/0x68 [ 27.195478] kasan_save_track+0x20/0x40 [ 27.196112] kasan_save_free_info+0x4c/0x78 [ 27.196734] __kasan_slab_free+0x6c/0x98 [ 27.197345] kfree+0x114/0x3c8 [ 27.197913] kasan_strings+0x128/0x8f8 [ 27.198474] kunit_try_run_case+0x14c/0x3d0 [ 27.199006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.199828] kthread+0x24c/0x2d0 [ 27.200405] ret_from_fork+0x10/0x20 [ 27.200977] [ 27.201324] The buggy address belongs to the object at fff00000c5d0e240 [ 27.201324] which belongs to the cache kmalloc-32 of size 32 [ 27.202756] The buggy address is located 16 bytes inside of [ 27.202756] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260) [ 27.204050] [ 27.204409] The buggy address belongs to the physical page: [ 27.205089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e [ 27.206014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.206815] page_type: f5(slab) [ 27.207348] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.208269] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 27.209104] page dumped because: kasan: bad access detected [ 27.209777] [ 27.210107] Memory state around the buggy address: [ 27.210765] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.211645] fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.212564] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.213394] ^ [ 27.214053] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.215236] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.215935] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree-d4df8fe7a095039f35874393e326fe7535da53c240b269c91592f4a0b3fec270/details/) (gcc-13-lkftconfig-kunit)[ 24.643144] ================================================================== [ 24.644515] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 24.645474] Read of size 1 at addr fff00000c63157c0 by task kunit_try_catch/181 [ 24.646382] [ 24.646771] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.648137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.648566] Hardware name: linux,dummy-virt (DT) [ 24.649050] Call trace: [ 24.649343] show_stack+0x20/0x38 (C) [ 24.649815] dump_stack_lvl+0x8c/0xd0 [ 24.650868] print_report+0x118/0x5e0 [ 24.651583] kasan_report+0xc8/0x118 [ 24.652449] __kasan_check_byte+0x54/0x70 [ 24.653163] kfree_sensitive+0x30/0xb0 [ 24.653675] kmalloc_double_kzfree+0x168/0x308 [ 24.654235] kunit_try_run_case+0x14c/0x3d0 [ 24.654828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.656121] kthread+0x24c/0x2d0 [ 24.656763] ret_from_fork+0x10/0x20 [ 24.657256] [ 24.657541] Allocated by task 181: [ 24.658014] kasan_save_stack+0x3c/0x68 [ 24.658502] kasan_save_track+0x20/0x40 [ 24.659068] kasan_save_alloc_info+0x40/0x58 [ 24.659592] __kasan_kmalloc+0xd4/0xd8 [ 24.660344] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.661280] kmalloc_double_kzfree+0xb8/0x308 [ 24.661982] kunit_try_run_case+0x14c/0x3d0 [ 24.662651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.663659] kthread+0x24c/0x2d0 [ 24.664444] ret_from_fork+0x10/0x20 [ 24.665247] [ 24.665555] Freed by task 181: [ 24.666004] kasan_save_stack+0x3c/0x68 [ 24.666494] kasan_save_track+0x20/0x40 [ 24.667331] kasan_save_free_info+0x4c/0x78 [ 24.668120] __kasan_slab_free+0x6c/0x98 [ 24.668866] kfree+0x114/0x3c8 [ 24.669442] kfree_sensitive+0x80/0xb0 [ 24.670119] kmalloc_double_kzfree+0x11c/0x308 [ 24.670819] kunit_try_run_case+0x14c/0x3d0 [ 24.671469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.672269] kthread+0x24c/0x2d0 [ 24.672910] ret_from_fork+0x10/0x20 [ 24.673503] [ 24.673944] The buggy address belongs to the object at fff00000c63157c0 [ 24.673944] which belongs to the cache kmalloc-16 of size 16 [ 24.675421] The buggy address is located 0 bytes inside of [ 24.675421] freed 16-byte region [fff00000c63157c0, fff00000c63157d0) [ 24.676958] [ 24.677346] The buggy address belongs to the physical page: [ 24.678155] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106315 [ 24.679294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.680007] page_type: f5(slab) [ 24.680432] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.681268] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.682275] page dumped because: kasan: bad access detected [ 24.683000] [ 24.683682] Memory state around the buggy address: [ 24.684248] fff00000c6315680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.685016] fff00000c6315700: fa fb fc fc fa fb fc fc 00 05 fc fc 00 05 fc fc [ 24.685713] >fff00000c6315780: 00 00 fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 24.686401] ^ [ 24.687091] fff00000c6315800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.688061] fff00000c6315880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.689004] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf-b5d830bce98fc20e446d9761238f2259fa999f6fa580f4c290c86e9b2e6c8cba/details/) (gcc-13-lkftconfig-kunit)[ 24.075771] ================================================================== [ 24.076980] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 24.077809] Read of size 16 at addr fff00000c5b73320 by task kunit_try_catch/157 [ 24.078658] [ 24.079146] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.080216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.080897] Hardware name: linux,dummy-virt (DT) [ 24.081605] Call trace: [ 24.081941] show_stack+0x20/0x38 (C) [ 24.082599] dump_stack_lvl+0x8c/0xd0 [ 24.083466] print_report+0x118/0x5e0 [ 24.083932] kasan_report+0xc8/0x118 [ 24.085207] __asan_report_load16_noabort+0x20/0x30 [ 24.086085] kmalloc_uaf_16+0x3bc/0x438 [ 24.086651] kunit_try_run_case+0x14c/0x3d0 [ 24.087647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.088398] kthread+0x24c/0x2d0 [ 24.088927] ret_from_fork+0x10/0x20 [ 24.089502] [ 24.089841] Allocated by task 157: [ 24.090314] kasan_save_stack+0x3c/0x68 [ 24.091797] kasan_save_track+0x20/0x40 [ 24.092198] kasan_save_alloc_info+0x40/0x58 [ 24.092923] __kasan_kmalloc+0xd4/0xd8 [ 24.093476] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.094114] kmalloc_uaf_16+0x140/0x438 [ 24.094679] kunit_try_run_case+0x14c/0x3d0 [ 24.096053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.096798] kthread+0x24c/0x2d0 [ 24.097273] ret_from_fork+0x10/0x20 [ 24.097887] [ 24.098234] Freed by task 157: [ 24.098654] kasan_save_stack+0x3c/0x68 [ 24.100060] kasan_save_track+0x20/0x40 [ 24.100637] kasan_save_free_info+0x4c/0x78 [ 24.101268] __kasan_slab_free+0x6c/0x98 [ 24.101908] kfree+0x114/0x3c8 [ 24.102397] kmalloc_uaf_16+0x190/0x438 [ 24.103377] kunit_try_run_case+0x14c/0x3d0 [ 24.103952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.104687] kthread+0x24c/0x2d0 [ 24.105253] ret_from_fork+0x10/0x20 [ 24.105874] [ 24.106208] The buggy address belongs to the object at fff00000c5b73320 [ 24.106208] which belongs to the cache kmalloc-16 of size 16 [ 24.108219] The buggy address is located 0 bytes inside of [ 24.108219] freed 16-byte region [fff00000c5b73320, fff00000c5b73330) [ 24.109556] [ 24.109946] The buggy address belongs to the physical page: [ 24.110610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 24.111729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.112831] page_type: f5(slab) [ 24.113334] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.114196] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.115217] page dumped because: kasan: bad access detected [ 24.116168] [ 24.116415] Memory state around the buggy address: [ 24.117071] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.118041] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.118840] >fff00000c5b73300: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 24.119980] ^ [ 24.120661] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.121641] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.122510] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf-c48c08226122d276c4c7be836fe779427efa5cf1317da0aa6450b178952323cb/details/) (gcc-13-lkftconfig-kunit)[ 24.473275] ================================================================== [ 24.474279] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 24.475582] Read of size 1 at addr fff00000c5b73348 by task kunit_try_catch/173 [ 24.476261] [ 24.476629] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.477775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.478296] Hardware name: linux,dummy-virt (DT) [ 24.478838] Call trace: [ 24.479291] show_stack+0x20/0x38 (C) [ 24.480090] dump_stack_lvl+0x8c/0xd0 [ 24.480736] print_report+0x118/0x5e0 [ 24.481365] kasan_report+0xc8/0x118 [ 24.481938] __asan_report_load1_noabort+0x20/0x30 [ 24.482570] kmalloc_uaf+0x300/0x338 [ 24.483354] kunit_try_run_case+0x14c/0x3d0 [ 24.483956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.484677] kthread+0x24c/0x2d0 [ 24.485362] ret_from_fork+0x10/0x20 [ 24.485944] [ 24.486247] Allocated by task 173: [ 24.486723] kasan_save_stack+0x3c/0x68 [ 24.487803] kasan_save_track+0x20/0x40 [ 24.488304] kasan_save_alloc_info+0x40/0x58 [ 24.488785] __kasan_kmalloc+0xd4/0xd8 [ 24.489256] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.489835] kmalloc_uaf+0xb8/0x338 [ 24.490321] kunit_try_run_case+0x14c/0x3d0 [ 24.490997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.492123] kthread+0x24c/0x2d0 [ 24.492572] ret_from_fork+0x10/0x20 [ 24.493075] [ 24.493377] Freed by task 173: [ 24.493868] kasan_save_stack+0x3c/0x68 [ 24.494464] kasan_save_track+0x20/0x40 [ 24.495309] kasan_save_free_info+0x4c/0x78 [ 24.495887] __kasan_slab_free+0x6c/0x98 [ 24.496305] kfree+0x114/0x3c8 [ 24.496652] kmalloc_uaf+0x11c/0x338 [ 24.497679] kunit_try_run_case+0x14c/0x3d0 [ 24.498610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.499439] kthread+0x24c/0x2d0 [ 24.500127] ret_from_fork+0x10/0x20 [ 24.500678] [ 24.501034] The buggy address belongs to the object at fff00000c5b73340 [ 24.501034] which belongs to the cache kmalloc-16 of size 16 [ 24.502276] The buggy address is located 8 bytes inside of [ 24.502276] freed 16-byte region [fff00000c5b73340, fff00000c5b73350) [ 24.503598] [ 24.503862] The buggy address belongs to the physical page: [ 24.505067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73 [ 24.505879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.506695] page_type: f5(slab) [ 24.507351] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.508293] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.508630] page dumped because: kasan: bad access detected [ 24.508914] [ 24.509044] Memory state around the buggy address: [ 24.509283] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.509597] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.510287] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 24.510954] ^ [ 24.511683] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.513083] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.514078] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf-c5f60a70de54593c1ddcfb178c2b08757fa6f76adf852e28cdfcbf0cf3540364/details/) (gcc-13-lkftconfig-kunit)[ 24.581253] ================================================================== [ 24.582224] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 24.583185] Read of size 1 at addr fff00000c5ca6e28 by task kunit_try_catch/177 [ 24.584325] [ 24.584649] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.585622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.587546] Hardware name: linux,dummy-virt (DT) [ 24.588069] Call trace: [ 24.588594] show_stack+0x20/0x38 (C) [ 24.589301] dump_stack_lvl+0x8c/0xd0 [ 24.589998] print_report+0x118/0x5e0 [ 24.590664] kasan_report+0xc8/0x118 [ 24.591646] __asan_report_load1_noabort+0x20/0x30 [ 24.592184] kmalloc_uaf2+0x3f4/0x468 [ 24.592850] kunit_try_run_case+0x14c/0x3d0 [ 24.593437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.594320] kthread+0x24c/0x2d0 [ 24.594986] ret_from_fork+0x10/0x20 [ 24.595698] [ 24.596280] Allocated by task 177: [ 24.596724] kasan_save_stack+0x3c/0x68 [ 24.597527] kasan_save_track+0x20/0x40 [ 24.598077] kasan_save_alloc_info+0x40/0x58 [ 24.598861] __kasan_kmalloc+0xd4/0xd8 [ 24.599559] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.600849] kmalloc_uaf2+0xc4/0x468 [ 24.601490] kunit_try_run_case+0x14c/0x3d0 [ 24.602214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.602889] kthread+0x24c/0x2d0 [ 24.603781] ret_from_fork+0x10/0x20 [ 24.604455] [ 24.604930] Freed by task 177: [ 24.605448] kasan_save_stack+0x3c/0x68 [ 24.606013] kasan_save_track+0x20/0x40 [ 24.606755] kasan_save_free_info+0x4c/0x78 [ 24.607478] __kasan_slab_free+0x6c/0x98 [ 24.608288] kfree+0x114/0x3c8 [ 24.608919] kmalloc_uaf2+0x134/0x468 [ 24.609572] kunit_try_run_case+0x14c/0x3d0 [ 24.610150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.611003] kthread+0x24c/0x2d0 [ 24.611758] ret_from_fork+0x10/0x20 [ 24.612429] [ 24.612959] The buggy address belongs to the object at fff00000c5ca6e00 [ 24.612959] which belongs to the cache kmalloc-64 of size 64 [ 24.614391] The buggy address is located 40 bytes inside of [ 24.614391] freed 64-byte region [fff00000c5ca6e00, fff00000c5ca6e40) [ 24.615901] [ 24.616045] The buggy address belongs to the physical page: [ 24.616306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca6 [ 24.616663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.617006] page_type: f5(slab) [ 24.617213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.617555] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.619142] page dumped because: kasan: bad access detected [ 24.619736] [ 24.620497] Memory state around the buggy address: [ 24.621483] fff00000c5ca6d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.622387] fff00000c5ca6d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.623735] >fff00000c5ca6e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.624508] ^ [ 24.625134] fff00000c5ca6e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 24.625998] fff00000c5ca6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.626856] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset-0db854427873510cd3bd891ad4bda209d87be2fdc3675a371776ef925d789518/details/) (gcc-13-lkftconfig-kunit)[ 24.524416] ================================================================== [ 24.525443] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 24.526186] Write of size 33 at addr fff00000c5ca6d00 by task kunit_try_catch/175 [ 24.526826] [ 24.528163] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.529533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.529993] Hardware name: linux,dummy-virt (DT) [ 24.530830] Call trace: [ 24.531399] show_stack+0x20/0x38 (C) [ 24.532175] dump_stack_lvl+0x8c/0xd0 [ 24.532842] print_report+0x118/0x5e0 [ 24.533500] kasan_report+0xc8/0x118 [ 24.534144] kasan_check_range+0x100/0x1a8 [ 24.534735] __asan_memset+0x34/0x78 [ 24.535632] kmalloc_uaf_memset+0x170/0x310 [ 24.536353] kunit_try_run_case+0x14c/0x3d0 [ 24.537082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.537760] kthread+0x24c/0x2d0 [ 24.538441] ret_from_fork+0x10/0x20 [ 24.539432] [ 24.539658] Allocated by task 175: [ 24.540081] kasan_save_stack+0x3c/0x68 [ 24.540619] kasan_save_track+0x20/0x40 [ 24.541154] kasan_save_alloc_info+0x40/0x58 [ 24.541703] __kasan_kmalloc+0xd4/0xd8 [ 24.542794] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.543649] kmalloc_uaf_memset+0xb8/0x310 [ 24.544331] kunit_try_run_case+0x14c/0x3d0 [ 24.545019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.545821] kthread+0x24c/0x2d0 [ 24.546425] ret_from_fork+0x10/0x20 [ 24.547287] [ 24.547493] Freed by task 175: [ 24.547810] kasan_save_stack+0x3c/0x68 [ 24.548210] kasan_save_track+0x20/0x40 [ 24.548610] kasan_save_free_info+0x4c/0x78 [ 24.550343] __kasan_slab_free+0x6c/0x98 [ 24.551224] kfree+0x114/0x3c8 [ 24.551581] kmalloc_uaf_memset+0x11c/0x310 [ 24.552030] kunit_try_run_case+0x14c/0x3d0 [ 24.552473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.553818] kthread+0x24c/0x2d0 [ 24.554474] ret_from_fork+0x10/0x20 [ 24.555481] [ 24.555825] The buggy address belongs to the object at fff00000c5ca6d00 [ 24.555825] which belongs to the cache kmalloc-64 of size 64 [ 24.556967] The buggy address is located 0 bytes inside of [ 24.556967] freed 64-byte region [fff00000c5ca6d00, fff00000c5ca6d40) [ 24.558632] [ 24.559290] The buggy address belongs to the physical page: [ 24.559843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca6 [ 24.560562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.561200] page_type: f5(slab) [ 24.561562] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.563534] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.564352] page dumped because: kasan: bad access detected [ 24.565208] [ 24.565436] Memory state around the buggy address: [ 24.566357] fff00000c5ca6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.567992] fff00000c5ca6c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.568639] >fff00000c5ca6d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.569877] ^ [ 24.570489] fff00000c5ca6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.571628] fff00000c5ca6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.572537] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy-4e0798b209a8dc754e11168af4e8a5e6dd500e2deb53a63093878975025f2ea0/details/) (gcc-13-lkftconfig-kunit)[ 25.569579] ================================================================== [ 25.570170] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 25.570526] Read of size 1 at addr fff00000c565a8c0 by task kunit_try_catch/204 [ 25.571361] [ 25.571718] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 25.572635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.573114] Hardware name: linux,dummy-virt (DT) [ 25.574046] Call trace: [ 25.574643] show_stack+0x20/0x38 (C) [ 25.575885] dump_stack_lvl+0x8c/0xd0 [ 25.576467] print_report+0x118/0x5e0 [ 25.577178] kasan_report+0xc8/0x118 [ 25.577926] __kasan_check_byte+0x54/0x70 [ 25.578587] kmem_cache_destroy+0x34/0x218 [ 25.578975] kmem_cache_double_destroy+0x17c/0x2f8 [ 25.579948] kunit_try_run_case+0x14c/0x3d0 [ 25.580668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.581489] kthread+0x24c/0x2d0 [ 25.582163] ret_from_fork+0x10/0x20 [ 25.582854] [ 25.583384] Allocated by task 204: [ 25.583938] kasan_save_stack+0x3c/0x68 [ 25.584178] kasan_save_track+0x20/0x40 [ 25.584400] kasan_save_alloc_info+0x40/0x58 [ 25.584631] __kasan_slab_alloc+0xa8/0xb0 [ 25.584878] kmem_cache_alloc_noprof+0x108/0x398 [ 25.585130] __kmem_cache_create_args+0x18c/0x2b0 [ 25.585373] kmem_cache_double_destroy+0xc8/0x2f8 [ 25.585612] kunit_try_run_case+0x14c/0x3d0 [ 25.586293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.587329] kthread+0x24c/0x2d0 [ 25.588387] ret_from_fork+0x10/0x20 [ 25.588970] [ 25.589356] Freed by task 204: [ 25.589951] kasan_save_stack+0x3c/0x68 [ 25.590714] kasan_save_track+0x20/0x40 [ 25.591789] kasan_save_free_info+0x4c/0x78 [ 25.592374] __kasan_slab_free+0x6c/0x98 [ 25.593001] kmem_cache_free+0x118/0x470 [ 25.593594] slab_kmem_cache_release+0x38/0x50 [ 25.594271] kmem_cache_release+0x1c/0x30 [ 25.594870] kobject_put+0x17c/0x430 [ 25.595562] sysfs_slab_release+0x1c/0x30 [ 25.596129] kmem_cache_destroy+0x118/0x218 [ 25.596644] kmem_cache_double_destroy+0x130/0x2f8 [ 25.597300] kunit_try_run_case+0x14c/0x3d0 [ 25.597898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.598600] kthread+0x24c/0x2d0 [ 25.599219] ret_from_fork+0x10/0x20 [ 25.599987] [ 25.600410] The buggy address belongs to the object at fff00000c565a8c0 [ 25.600410] which belongs to the cache kmem_cache of size 208 [ 25.601720] The buggy address is located 0 bytes inside of [ 25.601720] freed 208-byte region [fff00000c565a8c0, fff00000c565a990) [ 25.603064] [ 25.603677] The buggy address belongs to the physical page: [ 25.604341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10565a [ 25.605299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.606117] page_type: f5(slab) [ 25.606641] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 25.607832] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000 [ 25.608521] page dumped because: kasan: bad access detected [ 25.609017] [ 25.609234] Memory state around the buggy address: [ 25.609705] fff00000c565a780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.610992] fff00000c565a800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 25.611832] >fff00000c565a880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 25.613202] ^ [ 25.614090] fff00000c565a900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.614998] fff00000c565a980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.616136] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf-87bab650a1614ab2af3778cbc7b82174403d1ff3274aeb63302a7f5297c825f5/details/) (gcc-13-lkftconfig-kunit)[ 25.475931] ================================================================== [ 25.476854] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 25.477688] Read of size 1 at addr fff00000c5d09000 by task kunit_try_catch/202 [ 25.478418] [ 25.478805] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 25.480327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.481278] Hardware name: linux,dummy-virt (DT) [ 25.481888] Call trace: [ 25.482262] show_stack+0x20/0x38 (C) [ 25.482807] dump_stack_lvl+0x8c/0xd0 [ 25.483528] print_report+0x118/0x5e0 [ 25.484102] kasan_report+0xc8/0x118 [ 25.484674] __asan_report_load1_noabort+0x20/0x30 [ 25.485513] kmem_cache_rcu_uaf+0x390/0x468 [ 25.486133] kunit_try_run_case+0x14c/0x3d0 [ 25.486774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.487666] kthread+0x24c/0x2d0 [ 25.488086] ret_from_fork+0x10/0x20 [ 25.488902] [ 25.489316] Allocated by task 202: [ 25.489831] kasan_save_stack+0x3c/0x68 [ 25.490421] kasan_save_track+0x20/0x40 [ 25.491106] kasan_save_alloc_info+0x40/0x58 [ 25.491666] __kasan_slab_alloc+0xa8/0xb0 [ 25.492551] kmem_cache_alloc_noprof+0x108/0x398 [ 25.493112] kmem_cache_rcu_uaf+0x12c/0x468 [ 25.493621] kunit_try_run_case+0x14c/0x3d0 [ 25.494144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.495480] kthread+0x24c/0x2d0 [ 25.496063] ret_from_fork+0x10/0x20 [ 25.496357] [ 25.496492] Freed by task 0: [ 25.496681] kasan_save_stack+0x3c/0x68 [ 25.497074] kasan_save_track+0x20/0x40 [ 25.497470] kasan_save_free_info+0x4c/0x78 [ 25.499099] __kasan_slab_free+0x6c/0x98 [ 25.499862] slab_free_after_rcu_debug+0xd4/0x2f8 [ 25.500692] rcu_core+0x9f4/0x1e20 [ 25.501401] rcu_core_si+0x18/0x30 [ 25.502050] handle_softirqs+0x374/0xb20 [ 25.502772] __do_softirq+0x1c/0x28 [ 25.504099] [ 25.504607] Last potentially related work creation: [ 25.505307] kasan_save_stack+0x3c/0x68 [ 25.505972] __kasan_record_aux_stack+0xbc/0xe8 [ 25.506692] kasan_record_aux_stack_noalloc+0x14/0x20 [ 25.507698] kmem_cache_free+0x28c/0x470 [ 25.509046] kmem_cache_rcu_uaf+0x16c/0x468 [ 25.509528] kunit_try_run_case+0x14c/0x3d0 [ 25.509977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.510491] kthread+0x24c/0x2d0 [ 25.512214] ret_from_fork+0x10/0x20 [ 25.512589] [ 25.513093] The buggy address belongs to the object at fff00000c5d09000 [ 25.513093] which belongs to the cache test_cache of size 200 [ 25.513898] The buggy address is located 0 bytes inside of [ 25.513898] freed 200-byte region [fff00000c5d09000, fff00000c5d090c8) [ 25.514389] [ 25.514525] The buggy address belongs to the physical page: [ 25.516034] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d09 [ 25.517042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.517902] page_type: f5(slab) [ 25.518529] raw: 0bfffe0000000000 fff00000c5d07000 dead000000000122 0000000000000000 [ 25.520365] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 25.521066] page dumped because: kasan: bad access detected [ 25.521887] [ 25.522362] Memory state around the buggy address: [ 25.523078] fff00000c5d08f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.524013] fff00000c5d08f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.524769] >fff00000c5d09000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.525464] ^ [ 25.526626] fff00000c5d09080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 25.528381] fff00000c5d09100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.529079] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf-18905f4e5bb7c023954a1125e51bdcc3f1aa23197e3014de495bb162c1c193fd/details/) (gcc-13-lkftconfig-kunit)[ 23.965007] ================================================================== [ 23.965810] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 23.966695] Read of size 1 at addr fff00000c6364c00 by task kunit_try_catch/153 [ 23.967724] [ 23.968144] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.969479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.970159] Hardware name: linux,dummy-virt (DT) [ 23.970887] Call trace: [ 23.971537] show_stack+0x20/0x38 (C) [ 23.972236] dump_stack_lvl+0x8c/0xd0 [ 23.972936] print_report+0x118/0x5e0 [ 23.973480] kasan_report+0xc8/0x118 [ 23.974191] __asan_report_load1_noabort+0x20/0x30 [ 23.975044] krealloc_uaf+0x4c8/0x520 [ 23.975809] kunit_try_run_case+0x14c/0x3d0 [ 23.976415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.977077] kthread+0x24c/0x2d0 [ 23.977536] ret_from_fork+0x10/0x20 [ 23.978442] [ 23.978993] Allocated by task 153: [ 23.979829] kasan_save_stack+0x3c/0x68 [ 23.980507] kasan_save_track+0x20/0x40 [ 23.981159] kasan_save_alloc_info+0x40/0x58 [ 23.981876] __kasan_kmalloc+0xd4/0xd8 [ 23.982520] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.983585] krealloc_uaf+0xc8/0x520 [ 23.984282] kunit_try_run_case+0x14c/0x3d0 [ 23.984895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.985569] kthread+0x24c/0x2d0 [ 23.986036] ret_from_fork+0x10/0x20 [ 23.986594] [ 23.986985] Freed by task 153: [ 23.987406] kasan_save_stack+0x3c/0x68 [ 23.988623] kasan_save_track+0x20/0x40 [ 23.989336] kasan_save_free_info+0x4c/0x78 [ 23.989799] __kasan_slab_free+0x6c/0x98 [ 23.990700] kfree+0x114/0x3c8 [ 23.991435] krealloc_uaf+0x12c/0x520 [ 23.992426] kunit_try_run_case+0x14c/0x3d0 [ 23.992954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.993616] kthread+0x24c/0x2d0 [ 23.994100] ret_from_fork+0x10/0x20 [ 23.994563] [ 23.994913] The buggy address belongs to the object at fff00000c6364c00 [ 23.994913] which belongs to the cache kmalloc-256 of size 256 [ 23.996268] The buggy address is located 0 bytes inside of [ 23.996268] freed 256-byte region [fff00000c6364c00, fff00000c6364d00) [ 23.997476] [ 23.997915] The buggy address belongs to the physical page: [ 23.998598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364 [ 23.999935] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.000872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.001737] page_type: f5(slab) [ 24.002255] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.003325] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.004240] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.005103] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.005984] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000 [ 24.006877] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 24.008700] page dumped because: kasan: bad access detected [ 24.009507] [ 24.009726] Memory state around the buggy address: [ 24.010495] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.011525] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.012190] >fff00000c6364c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.013334] ^ [ 24.014157] fff00000c6364c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.014974] fff00000c6364d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.015998] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf-d9bc2ac70fca903134212522bfe45e1f4e6cecdbc8472ddb8e496ad064e9058f/details/) (gcc-13-lkftconfig-kunit)[ 23.910637] ================================================================== [ 23.911904] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 23.912639] Read of size 1 at addr fff00000c6364c00 by task kunit_try_catch/153 [ 23.913982] [ 23.914457] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.916186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.916838] Hardware name: linux,dummy-virt (DT) [ 23.917523] Call trace: [ 23.917986] show_stack+0x20/0x38 (C) [ 23.918630] dump_stack_lvl+0x8c/0xd0 [ 23.919458] print_report+0x118/0x5e0 [ 23.920226] kasan_report+0xc8/0x118 [ 23.920778] __kasan_check_byte+0x54/0x70 [ 23.921318] krealloc_noprof+0x44/0x360 [ 23.922182] krealloc_uaf+0x180/0x520 [ 23.922942] kunit_try_run_case+0x14c/0x3d0 [ 23.923445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.924125] kthread+0x24c/0x2d0 [ 23.924583] ret_from_fork+0x10/0x20 [ 23.925672] [ 23.925997] Allocated by task 153: [ 23.926465] kasan_save_stack+0x3c/0x68 [ 23.926996] kasan_save_track+0x20/0x40 [ 23.927506] kasan_save_alloc_info+0x40/0x58 [ 23.929050] __kasan_kmalloc+0xd4/0xd8 [ 23.929585] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.930191] krealloc_uaf+0xc8/0x520 [ 23.930637] kunit_try_run_case+0x14c/0x3d0 [ 23.931311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.932612] kthread+0x24c/0x2d0 [ 23.933007] ret_from_fork+0x10/0x20 [ 23.933465] [ 23.933821] Freed by task 153: [ 23.934239] kasan_save_stack+0x3c/0x68 [ 23.934713] kasan_save_track+0x20/0x40 [ 23.935797] kasan_save_free_info+0x4c/0x78 [ 23.936406] __kasan_slab_free+0x6c/0x98 [ 23.937117] kfree+0x114/0x3c8 [ 23.937724] krealloc_uaf+0x12c/0x520 [ 23.938397] kunit_try_run_case+0x14c/0x3d0 [ 23.939339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.940113] kthread+0x24c/0x2d0 [ 23.940691] ret_from_fork+0x10/0x20 [ 23.941379] [ 23.941792] The buggy address belongs to the object at fff00000c6364c00 [ 23.941792] which belongs to the cache kmalloc-256 of size 256 [ 23.943503] The buggy address is located 0 bytes inside of [ 23.943503] freed 256-byte region [fff00000c6364c00, fff00000c6364d00) [ 23.944957] [ 23.945393] The buggy address belongs to the physical page: [ 23.946169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364 [ 23.947381] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.948196] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.949280] page_type: f5(slab) [ 23.949622] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.950049] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.950463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.952219] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.953337] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000 [ 23.954293] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.955085] page dumped because: kasan: bad access detected [ 23.955669] [ 23.956352] Memory state around the buggy address: [ 23.957027] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.958119] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.959210] >fff00000c6364c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.960146] ^ [ 23.960352] fff00000c6364c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.960668] fff00000c6364d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.961684] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-ksize_uaf](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf-51c8416b953e2d2c9cef25430d02f64a7cb8c8955be31df0c9dd8d88b3785c43/details/) (gcc-13-lkftconfig-kunit)[ 24.988172] ================================================================== [ 24.988905] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 24.989713] Read of size 1 at addr fff00000c5cd6678 by task kunit_try_catch/185 [ 24.990781] [ 24.991636] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.993275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.993817] Hardware name: linux,dummy-virt (DT) [ 24.994430] Call trace: [ 24.994911] show_stack+0x20/0x38 (C) [ 24.995490] dump_stack_lvl+0x8c/0xd0 [ 24.996485] print_report+0x118/0x5e0 [ 24.997084] kasan_report+0xc8/0x118 [ 24.997644] __asan_report_load1_noabort+0x20/0x30 [ 24.998265] ksize_uaf+0x548/0x600 [ 24.998846] kunit_try_run_case+0x14c/0x3d0 [ 24.999699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.000409] kthread+0x24c/0x2d0 [ 25.001382] ret_from_fork+0x10/0x20 [ 25.001975] [ 25.002274] Allocated by task 185: [ 25.002692] kasan_save_stack+0x3c/0x68 [ 25.003725] kasan_save_track+0x20/0x40 [ 25.004325] kasan_save_alloc_info+0x40/0x58 [ 25.004873] __kasan_kmalloc+0xd4/0xd8 [ 25.005374] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.006029] ksize_uaf+0xb8/0x600 [ 25.006621] kunit_try_run_case+0x14c/0x3d0 [ 25.008157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.008909] kthread+0x24c/0x2d0 [ 25.009331] ret_from_fork+0x10/0x20 [ 25.010283] [ 25.010500] Freed by task 185: [ 25.011140] kasan_save_stack+0x3c/0x68 [ 25.012148] kasan_save_track+0x20/0x40 [ 25.012876] kasan_save_free_info+0x4c/0x78 [ 25.013604] __kasan_slab_free+0x6c/0x98 [ 25.014279] kfree+0x114/0x3c8 [ 25.014944] ksize_uaf+0x11c/0x600 [ 25.016035] kunit_try_run_case+0x14c/0x3d0 [ 25.016537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.017501] kthread+0x24c/0x2d0 [ 25.018322] ret_from_fork+0x10/0x20 [ 25.019565] [ 25.019920] The buggy address belongs to the object at fff00000c5cd6600 [ 25.019920] which belongs to the cache kmalloc-128 of size 128 [ 25.021041] The buggy address is located 120 bytes inside of [ 25.021041] freed 128-byte region [fff00000c5cd6600, fff00000c5cd6680) [ 25.022700] [ 25.023777] The buggy address belongs to the physical page: [ 25.024397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6 [ 25.025240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.026578] page_type: f5(slab) [ 25.027625] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.028372] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 25.029346] page dumped because: kasan: bad access detected [ 25.030140] [ 25.030599] Memory state around the buggy address: [ 25.032036] fff00000c5cd6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.032916] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.033674] >fff00000c5cd6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.034422] ^ [ 25.035615] fff00000c5cd6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.036295] fff00000c5cd6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.037117] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-ksize_uaf](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf-56ba4062d3d6628605c7846455277ac90ade04f23be078fd215763e829f4013c/details/) (gcc-13-lkftconfig-kunit)[ 24.937564] ================================================================== [ 24.938240] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 24.939229] Read of size 1 at addr fff00000c5cd6600 by task kunit_try_catch/185 [ 24.940581] [ 24.940924] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.942052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.942883] Hardware name: linux,dummy-virt (DT) [ 24.944284] Call trace: [ 24.944572] show_stack+0x20/0x38 (C) [ 24.945261] dump_stack_lvl+0x8c/0xd0 [ 24.945996] print_report+0x118/0x5e0 [ 24.946665] kasan_report+0xc8/0x118 [ 24.947353] __asan_report_load1_noabort+0x20/0x30 [ 24.947993] ksize_uaf+0x59c/0x600 [ 24.948500] kunit_try_run_case+0x14c/0x3d0 [ 24.949206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.950332] kthread+0x24c/0x2d0 [ 24.951067] ret_from_fork+0x10/0x20 [ 24.951564] [ 24.952203] Allocated by task 185: [ 24.953717] kasan_save_stack+0x3c/0x68 [ 24.954231] kasan_save_track+0x20/0x40 [ 24.954658] kasan_save_alloc_info+0x40/0x58 [ 24.955053] __kasan_kmalloc+0xd4/0xd8 [ 24.955991] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.956654] ksize_uaf+0xb8/0x600 [ 24.957123] kunit_try_run_case+0x14c/0x3d0 [ 24.957635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.958396] kthread+0x24c/0x2d0 [ 24.959078] ret_from_fork+0x10/0x20 [ 24.959830] [ 24.960152] Freed by task 185: [ 24.960909] kasan_save_stack+0x3c/0x68 [ 24.961830] kasan_save_track+0x20/0x40 [ 24.962252] kasan_save_free_info+0x4c/0x78 [ 24.962691] __kasan_slab_free+0x6c/0x98 [ 24.963402] kfree+0x114/0x3c8 [ 24.964512] ksize_uaf+0x11c/0x600 [ 24.965210] kunit_try_run_case+0x14c/0x3d0 [ 24.965644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.966176] kthread+0x24c/0x2d0 [ 24.966549] ret_from_fork+0x10/0x20 [ 24.968440] [ 24.968758] The buggy address belongs to the object at fff00000c5cd6600 [ 24.968758] which belongs to the cache kmalloc-128 of size 128 [ 24.970001] The buggy address is located 0 bytes inside of [ 24.970001] freed 128-byte region [fff00000c5cd6600, fff00000c5cd6680) [ 24.971640] [ 24.972343] The buggy address belongs to the physical page: [ 24.973249] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6 [ 24.974278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.975411] page_type: f5(slab) [ 24.975832] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.976407] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.977494] page dumped because: kasan: bad access detected [ 24.978355] [ 24.978624] Memory state around the buggy address: [ 24.979296] fff00000c5cd6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.981003] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.981927] >fff00000c5cd6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.982838] ^ [ 24.983461] fff00000c5cd6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.984896] fff00000c5cd6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.985811] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-ksize_uaf](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf-da92dd236fa36305fa8fb7118e755e2d293d0de75e542be80a50668ed189d118/details/) (gcc-13-lkftconfig-kunit)[ 24.882566] ================================================================== [ 24.883875] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 24.884491] Read of size 1 at addr fff00000c5cd6600 by task kunit_try_catch/185 [ 24.886228] [ 24.886580] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 24.888201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.889252] Hardware name: linux,dummy-virt (DT) [ 24.889689] Call trace: [ 24.890314] show_stack+0x20/0x38 (C) [ 24.891374] dump_stack_lvl+0x8c/0xd0 [ 24.892084] print_report+0x118/0x5e0 [ 24.892726] kasan_report+0xc8/0x118 [ 24.893435] __kasan_check_byte+0x54/0x70 [ 24.893997] ksize+0x30/0x88 [ 24.894438] ksize_uaf+0x168/0x600 [ 24.894968] kunit_try_run_case+0x14c/0x3d0 [ 24.896334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.897190] kthread+0x24c/0x2d0 [ 24.897708] ret_from_fork+0x10/0x20 [ 24.898254] [ 24.898550] Allocated by task 185: [ 24.899685] kasan_save_stack+0x3c/0x68 [ 24.900366] kasan_save_track+0x20/0x40 [ 24.901028] kasan_save_alloc_info+0x40/0x58 [ 24.901768] __kasan_kmalloc+0xd4/0xd8 [ 24.902302] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.902858] ksize_uaf+0xb8/0x600 [ 24.903337] kunit_try_run_case+0x14c/0x3d0 [ 24.904894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.905443] kthread+0x24c/0x2d0 [ 24.906003] ret_from_fork+0x10/0x20 [ 24.906663] [ 24.907216] Freed by task 185: [ 24.908013] kasan_save_stack+0x3c/0x68 [ 24.908504] kasan_save_track+0x20/0x40 [ 24.909187] kasan_save_free_info+0x4c/0x78 [ 24.909820] __kasan_slab_free+0x6c/0x98 [ 24.910419] kfree+0x114/0x3c8 [ 24.910969] ksize_uaf+0x11c/0x600 [ 24.911578] kunit_try_run_case+0x14c/0x3d0 [ 24.912496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.913151] kthread+0x24c/0x2d0 [ 24.913596] ret_from_fork+0x10/0x20 [ 24.914116] [ 24.914428] The buggy address belongs to the object at fff00000c5cd6600 [ 24.914428] which belongs to the cache kmalloc-128 of size 128 [ 24.916760] The buggy address is located 0 bytes inside of [ 24.916760] freed 128-byte region [fff00000c5cd6600, fff00000c5cd6680) [ 24.918316] [ 24.918623] The buggy address belongs to the physical page: [ 24.919303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6 [ 24.920557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.921329] page_type: f5(slab) [ 24.922294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.923340] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 24.924627] page dumped because: kasan: bad access detected [ 24.925460] [ 24.925944] Memory state around the buggy address: [ 24.926427] fff00000c5cd6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.927959] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.928711] >fff00000c5cd6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.930049] ^ [ 24.930675] fff00000c5cd6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.931882] fff00000c5cd6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.933101] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper-a8f6aedeab1ca62389537e72e96683e9df7ab95096b34901f6f58ce739592013/details/) (gcc-13-lkftconfig-kunit)[ 26.436441] ================================================================== [ 26.437874] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 26.438529] Read of size 1 at addr fff00000c5d27240 by task kunit_try_catch/220 [ 26.439170] [ 26.440100] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 26.441465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.442127] Hardware name: linux,dummy-virt (DT) [ 26.442835] Call trace: [ 26.443818] show_stack+0x20/0x38 (C) [ 26.444244] dump_stack_lvl+0x8c/0xd0 [ 26.444729] print_report+0x118/0x5e0 [ 26.445235] kasan_report+0xc8/0x118 [ 26.446113] __asan_report_load1_noabort+0x20/0x30 [ 26.446589] mempool_uaf_helper+0x314/0x340 [ 26.447377] mempool_slab_uaf+0xb8/0x110 [ 26.447954] kunit_try_run_case+0x14c/0x3d0 [ 26.448495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.450119] kthread+0x24c/0x2d0 [ 26.450790] ret_from_fork+0x10/0x20 [ 26.451968] [ 26.452407] Allocated by task 220: [ 26.453007] kasan_save_stack+0x3c/0x68 [ 26.453544] kasan_save_track+0x20/0x40 [ 26.454141] kasan_save_alloc_info+0x40/0x58 [ 26.454828] __kasan_mempool_unpoison_object+0xbc/0x180 [ 26.456056] remove_element+0x16c/0x1f8 [ 26.456504] mempool_alloc_preallocated+0x58/0xc0 [ 26.457092] mempool_uaf_helper+0xa4/0x340 [ 26.457591] mempool_slab_uaf+0xb8/0x110 [ 26.458477] kunit_try_run_case+0x14c/0x3d0 [ 26.459391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.460693] kthread+0x24c/0x2d0 [ 26.461330] ret_from_fork+0x10/0x20 [ 26.462004] [ 26.462444] Freed by task 220: [ 26.463361] kasan_save_stack+0x3c/0x68 [ 26.463880] kasan_save_track+0x20/0x40 [ 26.464993] kasan_save_free_info+0x4c/0x78 [ 26.465723] __kasan_mempool_poison_object+0xc0/0x150 [ 26.466486] mempool_free+0x28c/0x328 [ 26.467789] mempool_uaf_helper+0x104/0x340 [ 26.468396] mempool_slab_uaf+0xb8/0x110 [ 26.468871] kunit_try_run_case+0x14c/0x3d0 [ 26.469661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.470341] kthread+0x24c/0x2d0 [ 26.470782] ret_from_fork+0x10/0x20 [ 26.471899] [ 26.472366] The buggy address belongs to the object at fff00000c5d27240 [ 26.472366] which belongs to the cache test_cache of size 123 [ 26.473788] The buggy address is located 0 bytes inside of [ 26.473788] freed 123-byte region [fff00000c5d27240, fff00000c5d272bb) [ 26.475896] [ 26.476231] The buggy address belongs to the physical page: [ 26.477004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d27 [ 26.477956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.478789] page_type: f5(slab) [ 26.479484] raw: 0bfffe0000000000 fff00000c5d073c0 dead000000000122 0000000000000000 [ 26.480589] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 26.481552] page dumped because: kasan: bad access detected [ 26.482209] [ 26.482735] Memory state around the buggy address: [ 26.483586] fff00000c5d27100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.484559] fff00000c5d27180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.485265] >fff00000c5d27200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 26.486834] ^ [ 26.487664] fff00000c5d27280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.488719] fff00000c5d27300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.489707] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper-db91d60f7a7736e5bc56095595e5c39b98f199e44c28d40a440f1c9fb77febd1/details/) (gcc-13-lkftconfig-kunit)[ 26.328831] ================================================================== [ 26.330047] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 26.330804] Read of size 1 at addr fff00000c5d02a00 by task kunit_try_catch/216 [ 26.332808] [ 26.333292] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 26.334428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.334947] Hardware name: linux,dummy-virt (DT) [ 26.335503] Call trace: [ 26.335868] show_stack+0x20/0x38 (C) [ 26.336352] dump_stack_lvl+0x8c/0xd0 [ 26.337329] print_report+0x118/0x5e0 [ 26.338127] kasan_report+0xc8/0x118 [ 26.338828] __asan_report_load1_noabort+0x20/0x30 [ 26.340118] mempool_uaf_helper+0x314/0x340 [ 26.340876] mempool_kmalloc_uaf+0xbc/0x118 [ 26.341603] kunit_try_run_case+0x14c/0x3d0 [ 26.342340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.343001] kthread+0x24c/0x2d0 [ 26.343486] ret_from_fork+0x10/0x20 [ 26.344974] [ 26.345407] Allocated by task 216: [ 26.345900] kasan_save_stack+0x3c/0x68 [ 26.346575] kasan_save_track+0x20/0x40 [ 26.347119] kasan_save_alloc_info+0x40/0x58 [ 26.348047] __kasan_mempool_unpoison_object+0x11c/0x180 [ 26.349185] remove_element+0x130/0x1f8 [ 26.349574] mempool_alloc_preallocated+0x58/0xc0 [ 26.350116] mempool_uaf_helper+0xa4/0x340 [ 26.350787] mempool_kmalloc_uaf+0xbc/0x118 [ 26.352096] kunit_try_run_case+0x14c/0x3d0 [ 26.352586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.353122] kthread+0x24c/0x2d0 [ 26.353485] ret_from_fork+0x10/0x20 [ 26.354732] [ 26.355228] Freed by task 216: [ 26.355806] kasan_save_stack+0x3c/0x68 [ 26.356201] kasan_save_track+0x20/0x40 [ 26.356800] kasan_save_free_info+0x4c/0x78 [ 26.357903] __kasan_mempool_poison_object+0xc0/0x150 [ 26.358680] mempool_free+0x28c/0x328 [ 26.359517] mempool_uaf_helper+0x104/0x340 [ 26.360206] mempool_kmalloc_uaf+0xbc/0x118 [ 26.360637] kunit_try_run_case+0x14c/0x3d0 [ 26.361092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.361620] kthread+0x24c/0x2d0 [ 26.362828] ret_from_fork+0x10/0x20 [ 26.363511] [ 26.364873] The buggy address belongs to the object at fff00000c5d02a00 [ 26.364873] which belongs to the cache kmalloc-128 of size 128 [ 26.366376] The buggy address is located 0 bytes inside of [ 26.366376] freed 128-byte region [fff00000c5d02a00, fff00000c5d02a80) [ 26.367998] [ 26.368298] The buggy address belongs to the physical page: [ 26.369373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d02 [ 26.370195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.370835] page_type: f5(slab) [ 26.372664] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.373535] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 26.374495] page dumped because: kasan: bad access detected [ 26.375571] [ 26.375821] Memory state around the buggy address: [ 26.376831] fff00000c5d02900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.377756] fff00000c5d02980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.378664] >fff00000c5d02a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.379634] ^ [ 26.380999] fff00000c5d02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.382025] fff00000c5d02b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.382943] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim-d6b35e835ee1ec0acb9a7964ac68a894ddb4c156ffb92541d2577c767bc400f7/details/) (gcc-13-lkftconfig-kunit)[ 25.067602] ================================================================== [ 25.068539] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 25.069636] Read of size 4 at addr fff00000c634edc0 by task swapper/1/0 [ 25.070272] [ 25.070712] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.13.0-rc7 #1 [ 25.071632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.072190] Hardware name: linux,dummy-virt (DT) [ 25.073246] Call trace: [ 25.073826] show_stack+0x20/0x38 (C) [ 25.074433] dump_stack_lvl+0x8c/0xd0 [ 25.075114] print_report+0x118/0x5e0 [ 25.075959] kasan_report+0xc8/0x118 [ 25.076552] __asan_report_load4_noabort+0x20/0x30 [ 25.077227] rcu_uaf_reclaim+0x64/0x70 [ 25.077840] rcu_core+0x9f4/0x1e20 [ 25.078393] rcu_core_si+0x18/0x30 [ 25.079324] handle_softirqs+0x374/0xb20 [ 25.079834] __do_softirq+0x1c/0x28 [ 25.080419] _dosoftirq+0x18/0x30 [ 25.081068] call_on_irq_stack+0x24/0x58 [ 25.081692] do_softirq_own_stack+0x24/0x38 [ 25.082319] irq_exit_rcu+0x1fc/0x318 [ 25.083270] irq_exit_rcu+0x1c/0x80 [ 25.083738] el1_interrupt+0x38/0x58 [ 25.084287] el1h_64_irq_handler+0x18/0x28 [ 25.084885] el1h_64_irq+0x6c/0x70 [ 25.085563] arch_local_irq_enable+0x4/0x8 (P) [ 25.086229] do_idle+0x384/0x4e8 [ 25.086710] cpu_startup_entry+0x68/0x80 [ 25.087730] secondary_start_kernel+0x288/0x340 [ 25.088375] __secondary_switched+0xc0/0xc8 [ 25.089020] [ 25.089326] Allocated by task 187: [ 25.089876] kasan_save_stack+0x3c/0x68 [ 25.090367] kasan_save_track+0x20/0x40 [ 25.091811] kasan_save_alloc_info+0x40/0x58 [ 25.092277] __kasan_kmalloc+0xd4/0xd8 [ 25.092736] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.093388] rcu_uaf+0xb0/0x2d0 [ 25.093931] kunit_try_run_case+0x14c/0x3d0 [ 25.094486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.095526] kthread+0x24c/0x2d0 [ 25.096002] ret_from_fork+0x10/0x20 [ 25.096523] [ 25.096867] Freed by task 0: [ 25.097286] kasan_save_stack+0x3c/0x68 [ 25.097899] kasan_save_track+0x20/0x40 [ 25.098465] kasan_save_free_info+0x4c/0x78 [ 25.099419] __kasan_slab_free+0x6c/0x98 [ 25.100001] kfree+0x114/0x3c8 [ 25.100455] rcu_uaf_reclaim+0x28/0x70 [ 25.100975] rcu_core+0x9f4/0x1e20 [ 25.101429] rcu_core_si+0x18/0x30 [ 25.101910] handle_softirqs+0x374/0xb20 [ 25.102516] __do_softirq+0x1c/0x28 [ 25.103429] [ 25.103804] Last potentially related work creation: [ 25.104368] kasan_save_stack+0x3c/0x68 [ 25.104997] __kasan_record_aux_stack+0xbc/0xe8 [ 25.105519] kasan_record_aux_stack_noalloc+0x14/0x20 [ 25.106365] __call_rcu_common.constprop.0+0x74/0xa10 [ 25.107338] call_rcu+0x18/0x30 [ 25.107788] rcu_uaf+0x14c/0x2d0 [ 25.108262] kunit_try_run_case+0x14c/0x3d0 [ 25.108843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.109462] kthread+0x24c/0x2d0 [ 25.110008] ret_from_fork+0x10/0x20 [ 25.110514] [ 25.110916] The buggy address belongs to the object at fff00000c634edc0 [ 25.110916] which belongs to the cache kmalloc-32 of size 32 [ 25.113250] The buggy address is located 0 bytes inside of [ 25.113250] freed 32-byte region [fff00000c634edc0, fff00000c634ede0) [ 25.114380] [ 25.114783] The buggy address belongs to the physical page: [ 25.115426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10634e [ 25.116720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.117595] page_type: f5(slab) [ 25.118088] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 25.118440] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 25.118892] page dumped because: kasan: bad access detected [ 25.120052] [ 25.120405] Memory state around the buggy address: [ 25.120942] fff00000c634ec80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 25.121779] fff00000c634ed00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 25.122600] >fff00000c634ed80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 25.123464] ^ [ 25.124105] fff00000c634ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.125063] fff00000c634ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.125783] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-strchr](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-strchr-777f9e746e75d153d5e5e56fb24f4aac432112efa4531fc4b9d6edb659b467f0/details/) (gcc-13-lkftconfig-kunit)[ 27.033764] ================================================================== [ 27.034786] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8 [ 27.035687] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248 [ 27.036288] [ 27.036630] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.037587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.038002] Hardware name: linux,dummy-virt (DT) [ 27.038462] Call trace: [ 27.039627] show_stack+0x20/0x38 (C) [ 27.040367] dump_stack_lvl+0x8c/0xd0 [ 27.041069] print_report+0x118/0x5e0 [ 27.041799] kasan_report+0xc8/0x118 [ 27.042426] __asan_report_load1_noabort+0x20/0x30 [ 27.043197] strchr+0xcc/0xd8 [ 27.043995] kasan_strings+0x180/0x8f8 [ 27.044610] kunit_try_run_case+0x14c/0x3d0 [ 27.045188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.045963] kthread+0x24c/0x2d0 [ 27.046522] ret_from_fork+0x10/0x20 [ 27.047317] [ 27.047539] Allocated by task 248: [ 27.047919] kasan_save_stack+0x3c/0x68 [ 27.048641] kasan_save_track+0x20/0x40 [ 27.049164] kasan_save_alloc_info+0x40/0x58 [ 27.049838] __kasan_kmalloc+0xd4/0xd8 [ 27.050507] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.051381] kasan_strings+0xb4/0x8f8 [ 27.051820] kunit_try_run_case+0x14c/0x3d0 [ 27.052428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.053354] kthread+0x24c/0x2d0 [ 27.053965] ret_from_fork+0x10/0x20 [ 27.054575] [ 27.054978] Freed by task 248: [ 27.056051] kasan_save_stack+0x3c/0x68 [ 27.056547] kasan_save_track+0x20/0x40 [ 27.057051] kasan_save_free_info+0x4c/0x78 [ 27.057554] __kasan_slab_free+0x6c/0x98 [ 27.059033] kfree+0x114/0x3c8 [ 27.059615] kasan_strings+0x128/0x8f8 [ 27.060181] kunit_try_run_case+0x14c/0x3d0 [ 27.060896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.061612] kthread+0x24c/0x2d0 [ 27.062181] ret_from_fork+0x10/0x20 [ 27.062802] [ 27.063215] The buggy address belongs to the object at fff00000c5d0e240 [ 27.063215] which belongs to the cache kmalloc-32 of size 32 [ 27.064621] The buggy address is located 16 bytes inside of [ 27.064621] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260) [ 27.066130] [ 27.066480] The buggy address belongs to the physical page: [ 27.067284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e [ 27.068168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.069006] page_type: f5(slab) [ 27.069441] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.070237] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 27.071019] page dumped because: kasan: bad access detected [ 27.071702] [ 27.072111] Memory state around the buggy address: [ 27.072775] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.073699] fff00000c5d0e180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.074566] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.075555] ^ [ 27.076231] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.077169] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.078018] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-strcmp](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-strcmp-63ba72c1782b4cbea4864ed2581411f0dae1b68864f34ac2094a2dede517d7fb/details/) (gcc-13-lkftconfig-kunit)[ 27.127433] ================================================================== [ 27.128069] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 27.128391] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248 [ 27.128721] [ 27.129018] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.130779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.132054] Hardware name: linux,dummy-virt (DT) [ 27.132730] Call trace: [ 27.133161] show_stack+0x20/0x38 (C) [ 27.133872] dump_stack_lvl+0x8c/0xd0 [ 27.134483] print_report+0x118/0x5e0 [ 27.135096] kasan_report+0xc8/0x118 [ 27.135953] __asan_report_load1_noabort+0x20/0x30 [ 27.136653] strcmp+0xc0/0xc8 [ 27.137254] kasan_strings+0x248/0x8f8 [ 27.137880] kunit_try_run_case+0x14c/0x3d0 [ 27.138510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.139406] kthread+0x24c/0x2d0 [ 27.140224] ret_from_fork+0x10/0x20 [ 27.140847] [ 27.141204] Allocated by task 248: [ 27.141774] kasan_save_stack+0x3c/0x68 [ 27.142378] kasan_save_track+0x20/0x40 [ 27.143004] kasan_save_alloc_info+0x40/0x58 [ 27.143772] __kasan_kmalloc+0xd4/0xd8 [ 27.144264] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.144814] kasan_strings+0xb4/0x8f8 [ 27.145286] kunit_try_run_case+0x14c/0x3d0 [ 27.145849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.146626] kthread+0x24c/0x2d0 [ 27.147356] ret_from_fork+0x10/0x20 [ 27.147836] [ 27.148057] Freed by task 248: [ 27.148404] kasan_save_stack+0x3c/0x68 [ 27.149608] kasan_save_track+0x20/0x40 [ 27.150326] kasan_save_free_info+0x4c/0x78 [ 27.151199] __kasan_slab_free+0x6c/0x98 [ 27.151576] kfree+0x114/0x3c8 [ 27.152589] kasan_strings+0x128/0x8f8 [ 27.154037] kunit_try_run_case+0x14c/0x3d0 [ 27.154683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.155517] kthread+0x24c/0x2d0 [ 27.156154] ret_from_fork+0x10/0x20 [ 27.156719] [ 27.157085] The buggy address belongs to the object at fff00000c5d0e240 [ 27.157085] which belongs to the cache kmalloc-32 of size 32 [ 27.158425] The buggy address is located 16 bytes inside of [ 27.158425] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260) [ 27.159756] [ 27.160108] The buggy address belongs to the physical page: [ 27.160897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e [ 27.161857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.162675] page_type: f5(slab) [ 27.163300] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.164189] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 27.165046] page dumped because: kasan: bad access detected [ 27.165719] [ 27.166102] Memory state around the buggy address: [ 27.166768] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.167577] fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.168405] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.169274] ^ [ 27.170045] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.170901] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.171734] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-strlen](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-strlen-22451dd5a1063c423b02d64e337d440d995343f810c3cfd84e81ba852e3430fc/details/) (gcc-13-lkftconfig-kunit)[ 27.220382] ================================================================== [ 27.221147] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 27.222048] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248 [ 27.223393] [ 27.223558] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.223997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.224223] Hardware name: linux,dummy-virt (DT) [ 27.224458] Call trace: [ 27.224621] show_stack+0x20/0x38 (C) [ 27.226234] dump_stack_lvl+0x8c/0xd0 [ 27.227422] print_report+0x118/0x5e0 [ 27.228170] kasan_report+0xc8/0x118 [ 27.228664] __asan_report_load1_noabort+0x20/0x30 [ 27.229738] strlen+0xa8/0xb0 [ 27.230227] kasan_strings+0x320/0x8f8 [ 27.230758] kunit_try_run_case+0x14c/0x3d0 [ 27.231684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.232643] kthread+0x24c/0x2d0 [ 27.233228] ret_from_fork+0x10/0x20 [ 27.234033] [ 27.234271] Allocated by task 248: [ 27.234829] kasan_save_stack+0x3c/0x68 [ 27.235387] kasan_save_track+0x20/0x40 [ 27.236392] kasan_save_alloc_info+0x40/0x58 [ 27.237344] __kasan_kmalloc+0xd4/0xd8 [ 27.237996] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.238737] kasan_strings+0xb4/0x8f8 [ 27.239411] kunit_try_run_case+0x14c/0x3d0 [ 27.239977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.240617] kthread+0x24c/0x2d0 [ 27.241546] ret_from_fork+0x10/0x20 [ 27.242256] [ 27.242692] Freed by task 248: [ 27.244052] kasan_save_stack+0x3c/0x68 [ 27.244757] kasan_save_track+0x20/0x40 [ 27.245257] kasan_save_free_info+0x4c/0x78 [ 27.245837] __kasan_slab_free+0x6c/0x98 [ 27.246408] kfree+0x114/0x3c8 [ 27.246902] kasan_strings+0x128/0x8f8 [ 27.247430] kunit_try_run_case+0x14c/0x3d0 [ 27.248005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.248647] kthread+0x24c/0x2d0 [ 27.249155] ret_from_fork+0x10/0x20 [ 27.249641] [ 27.249989] The buggy address belongs to the object at fff00000c5d0e240 [ 27.249989] which belongs to the cache kmalloc-32 of size 32 [ 27.251247] The buggy address is located 16 bytes inside of [ 27.251247] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260) [ 27.252454] [ 27.252824] The buggy address belongs to the physical page: [ 27.253445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e [ 27.254428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.255210] page_type: f5(slab) [ 27.255768] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.256571] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 27.257449] page dumped because: kasan: bad access detected [ 27.258073] [ 27.258405] Memory state around the buggy address: [ 27.259059] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.259832] fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.260578] >fff00000c5d0e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.261460] ^ [ 27.262136] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.262979] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.263771] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-strnlen](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-strnlen-03cb84c8c229ff74fc3bf1cb6364cd63961a73dc94ebe76a687261178b4dcfb3/details/) (gcc-13-lkftconfig-kunit)[ 27.266492] ================================================================== [ 27.267382] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 27.268116] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248 [ 27.269411] [ 27.269847] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.271328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.271888] Hardware name: linux,dummy-virt (DT) [ 27.272432] Call trace: [ 27.272871] show_stack+0x20/0x38 (C) [ 27.273814] dump_stack_lvl+0x8c/0xd0 [ 27.274538] print_report+0x118/0x5e0 [ 27.275288] kasan_report+0xc8/0x118 [ 27.275851] __asan_report_load1_noabort+0x20/0x30 [ 27.276392] strnlen+0x80/0x88 [ 27.276970] kasan_strings+0x380/0x8f8 [ 27.277515] kunit_try_run_case+0x14c/0x3d0 [ 27.278065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.278830] kthread+0x24c/0x2d0 [ 27.279387] ret_from_fork+0x10/0x20 [ 27.279998] [ 27.280324] Allocated by task 248: [ 27.280788] kasan_save_stack+0x3c/0x68 [ 27.281396] kasan_save_track+0x20/0x40 [ 27.282034] kasan_save_alloc_info+0x40/0x58 [ 27.282676] __kasan_kmalloc+0xd4/0xd8 [ 27.283206] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.283870] kasan_strings+0xb4/0x8f8 [ 27.284420] kunit_try_run_case+0x14c/0x3d0 [ 27.285065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.285674] kthread+0x24c/0x2d0 [ 27.286228] ret_from_fork+0x10/0x20 [ 27.286724] [ 27.287070] Freed by task 248: [ 27.287594] kasan_save_stack+0x3c/0x68 [ 27.288149] kasan_save_track+0x20/0x40 [ 27.288691] kasan_save_free_info+0x4c/0x78 [ 27.289230] __kasan_slab_free+0x6c/0x98 [ 27.289853] kfree+0x114/0x3c8 [ 27.290305] kasan_strings+0x128/0x8f8 [ 27.290839] kunit_try_run_case+0x14c/0x3d0 [ 27.291429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.292209] kthread+0x24c/0x2d0 [ 27.292701] ret_from_fork+0x10/0x20 [ 27.293203] [ 27.293568] The buggy address belongs to the object at fff00000c5d0e240 [ 27.293568] which belongs to the cache kmalloc-32 of size 32 [ 27.294789] The buggy address is located 16 bytes inside of [ 27.294789] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260) [ 27.296005] [ 27.296323] The buggy address belongs to the physical page: [ 27.297021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e [ 27.297889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.298783] page_type: f5(slab) [ 27.299242] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.300200] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 27.301016] page dumped because: kasan: bad access detected [ 27.301663] [ 27.301962] Memory state around the buggy address: [ 27.302527] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.303410] fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.304216] >fff00000c5d0e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.305044] ^ [ 27.305735] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.306578] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.307380] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-strrchr](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-strrchr-3523438bb86f8b7caf06d03b82e14778ede693269b6ca3c4d17daa4e35d46b68/details/) (gcc-13-lkftconfig-kunit)[ 27.080661] ================================================================== [ 27.081408] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78 [ 27.082920] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248 [ 27.084093] [ 27.084344] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 27.085176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.085588] Hardware name: linux,dummy-virt (DT) [ 27.087239] Call trace: [ 27.087709] show_stack+0x20/0x38 (C) [ 27.088314] dump_stack_lvl+0x8c/0xd0 [ 27.088950] print_report+0x118/0x5e0 [ 27.089459] kasan_report+0xc8/0x118 [ 27.090131] __asan_report_load1_noabort+0x20/0x30 [ 27.090788] strrchr+0x6c/0x78 [ 27.091367] kasan_strings+0x1e0/0x8f8 [ 27.091971] kunit_try_run_case+0x14c/0x3d0 [ 27.092624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.093359] kthread+0x24c/0x2d0 [ 27.093931] ret_from_fork+0x10/0x20 [ 27.094564] [ 27.095024] Allocated by task 248: [ 27.095535] kasan_save_stack+0x3c/0x68 [ 27.096208] kasan_save_track+0x20/0x40 [ 27.096716] kasan_save_alloc_info+0x40/0x58 [ 27.097476] __kasan_kmalloc+0xd4/0xd8 [ 27.098097] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.098785] kasan_strings+0xb4/0x8f8 [ 27.099368] kunit_try_run_case+0x14c/0x3d0 [ 27.100043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.100804] kthread+0x24c/0x2d0 [ 27.101364] ret_from_fork+0x10/0x20 [ 27.101900] [ 27.102288] Freed by task 248: [ 27.102834] kasan_save_stack+0x3c/0x68 [ 27.103398] kasan_save_track+0x20/0x40 [ 27.104060] kasan_save_free_info+0x4c/0x78 [ 27.104675] __kasan_slab_free+0x6c/0x98 [ 27.105329] kfree+0x114/0x3c8 [ 27.105862] kasan_strings+0x128/0x8f8 [ 27.106466] kunit_try_run_case+0x14c/0x3d0 [ 27.107130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.107885] kthread+0x24c/0x2d0 [ 27.108463] ret_from_fork+0x10/0x20 [ 27.109069] [ 27.109423] The buggy address belongs to the object at fff00000c5d0e240 [ 27.109423] which belongs to the cache kmalloc-32 of size 32 [ 27.110765] The buggy address is located 16 bytes inside of [ 27.110765] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260) [ 27.112094] [ 27.112422] The buggy address belongs to the physical page: [ 27.113081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e [ 27.114075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.114911] page_type: f5(slab) [ 27.115516] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.116454] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 27.117313] page dumped because: kasan: bad access detected [ 27.118023] [ 27.118350] Memory state around the buggy address: [ 27.118981] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.119923] fff00000c5d0e180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.120781] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.121569] ^ [ 27.122272] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.123152] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.124022] ================================================================== - [kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf-e593fa2aeab5c353238d78b0a0bfeb239860e66a3bbc2a013f8da9e28f5e1071/details/) (gcc-13-lkftconfig-kunit)[ 25.140583] ================================================================== [ 25.142505] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 25.143953] Read of size 8 at addr fff00000c634ee80 by task kunit_try_catch/189 [ 25.144897] [ 25.145219] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 25.146916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.147466] Hardware name: linux,dummy-virt (DT) [ 25.147983] Call trace: [ 25.148396] show_stack+0x20/0x38 (C) [ 25.149370] dump_stack_lvl+0x8c/0xd0 [ 25.149929] print_report+0x118/0x5e0 [ 25.150497] kasan_report+0xc8/0x118 [ 25.151394] __asan_report_load8_noabort+0x20/0x30 [ 25.151951] workqueue_uaf+0x480/0x4a8 [ 25.152568] kunit_try_run_case+0x14c/0x3d0 [ 25.153241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.153922] kthread+0x24c/0x2d0 [ 25.154443] ret_from_fork+0x10/0x20 [ 25.155333] [ 25.155551] Allocated by task 189: [ 25.155933] kasan_save_stack+0x3c/0x68 [ 25.156356] kasan_save_track+0x20/0x40 [ 25.156801] kasan_save_alloc_info+0x40/0x58 [ 25.157285] __kasan_kmalloc+0xd4/0xd8 [ 25.157833] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.158410] workqueue_uaf+0x13c/0x4a8 [ 25.158890] kunit_try_run_case+0x14c/0x3d0 [ 25.159883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.160426] kthread+0x24c/0x2d0 [ 25.160804] ret_from_fork+0x10/0x20 [ 25.161190] [ 25.161406] Freed by task 31: [ 25.161776] kasan_save_stack+0x3c/0x68 [ 25.162645] kasan_save_track+0x20/0x40 [ 25.163364] kasan_save_free_info+0x4c/0x78 [ 25.165104] __kasan_slab_free+0x6c/0x98 [ 25.165929] kfree+0x114/0x3c8 [ 25.166577] workqueue_uaf_work+0x18/0x30 [ 25.167763] process_one_work+0x530/0xf98 [ 25.168286] worker_thread+0x614/0xf28 [ 25.168762] kthread+0x24c/0x2d0 [ 25.169175] ret_from_fork+0x10/0x20 [ 25.169625] [ 25.169955] Last potentially related work creation: [ 25.171226] kasan_save_stack+0x3c/0x68 [ 25.171712] __kasan_record_aux_stack+0xbc/0xe8 [ 25.172607] kasan_record_aux_stack_noalloc+0x14/0x20 [ 25.173390] __queue_work+0x65c/0xfd8 [ 25.173902] queue_work_on+0xbc/0xf8 [ 25.174625] workqueue_uaf+0x210/0x4a8 [ 25.175479] kunit_try_run_case+0x14c/0x3d0 [ 25.175935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.176457] kthread+0x24c/0x2d0 [ 25.177551] ret_from_fork+0x10/0x20 [ 25.177943] [ 25.178534] The buggy address belongs to the object at fff00000c634ee80 [ 25.178534] which belongs to the cache kmalloc-32 of size 32 [ 25.180149] The buggy address is located 0 bytes inside of [ 25.180149] freed 32-byte region [fff00000c634ee80, fff00000c634eea0) [ 25.181307] [ 25.181608] The buggy address belongs to the physical page: [ 25.182710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10634e [ 25.184642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.185971] page_type: f5(slab) [ 25.186369] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 25.187703] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 25.188711] page dumped because: kasan: bad access detected [ 25.189509] [ 25.190013] Memory state around the buggy address: [ 25.190726] fff00000c634ed80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 25.191734] fff00000c634ee00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 25.192497] >fff00000c634ee80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 25.193634] ^ [ 25.194307] fff00000c634ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.195427] fff00000c634ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.196101] ================================================================== - [kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob-bac76e8d6840904483536a8b5e0fac0b68d851f81d045a218546867020007e5e/details/) (gcc-13-lkftconfig-kunit)[ 26.816963] ================================================================== [ 26.818334] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268 [ 26.819277] Read of size 1 at addr ffff800080a07cba by task kunit_try_catch/238 [ 26.820419] [ 26.820718] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 26.821807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.822346] Hardware name: linux,dummy-virt (DT) [ 26.823052] Call trace: [ 26.823724] show_stack+0x20/0x38 (C) [ 26.824266] dump_stack_lvl+0x8c/0xd0 [ 26.824890] print_report+0x2fc/0x5e0 [ 26.825447] kasan_report+0xc8/0x118 [ 26.826062] __asan_report_load1_noabort+0x20/0x30 [ 26.826760] kasan_stack_oob+0x230/0x268 [ 26.827582] kunit_try_run_case+0x14c/0x3d0 [ 26.828315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.829047] kthread+0x24c/0x2d0 [ 26.829550] ret_from_fork+0x10/0x20 [ 26.830180] [ 26.830596] The buggy address belongs to stack of task kunit_try_catch/238 [ 26.832039] and is located at offset 138 in frame: [ 26.832564] kasan_stack_oob+0x0/0x268 [ 26.833379] [ 26.833635] This frame has 4 objects: [ 26.834630] [48, 49) '__assertion' [ 26.834712] [64, 72) 'array' [ 26.835296] [96, 112) '__assertion' [ 26.835970] [128, 138) 'stack_array' [ 26.836630] [ 26.837918] The buggy address belongs to the virtual mapping at [ 26.837918] [ffff800080a00000, ffff800080a09000) created by: [ 26.837918] kernel_clone+0x140/0x788 [ 26.839711] [ 26.840078] The buggy address belongs to the physical page: [ 26.841300] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d22 [ 26.842099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.843055] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.844190] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.845166] page dumped because: kasan: bad access detected [ 26.846006] [ 26.846454] Memory state around the buggy address: [ 26.847203] ffff800080a07b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.848342] ffff800080a07c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 26.849249] >ffff800080a07c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 26.849998] ^ [ 26.850578] ffff800080a07d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 26.851853] ffff800080a07d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 26.852721] ================================================================== - [kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf-151f39f7cfd9819084f08517b4e7548eb0e1ba55f8f6b0ae39471ce1165b731d/details/) (gcc-13-lkftconfig-kunit)[ 23.173386] ================================================================== [ 23.174467] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 23.175690] Read of size 1 at addr fff00000c65fc000 by task kunit_try_catch/137 [ 23.177095] [ 23.177359] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 23.178167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.178574] Hardware name: linux,dummy-virt (DT) [ 23.180310] Call trace: [ 23.180836] show_stack+0x20/0x38 (C) [ 23.181537] dump_stack_lvl+0x8c/0xd0 [ 23.182288] print_report+0x118/0x5e0 [ 23.182990] kasan_report+0xc8/0x118 [ 23.183524] __asan_report_load1_noabort+0x20/0x30 [ 23.184124] kmalloc_large_uaf+0x2cc/0x2f8 [ 23.184652] kunit_try_run_case+0x14c/0x3d0 [ 23.186175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.186972] kthread+0x24c/0x2d0 [ 23.187788] ret_from_fork+0x10/0x20 [ 23.188484] [ 23.188961] The buggy address belongs to the physical page: [ 23.189674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc [ 23.190483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.191638] raw: 0bfffe0000000000 ffffc1ffc3198008 fff00000da4e7f80 0000000000000000 [ 23.192569] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 23.193604] page dumped because: kasan: bad access detected [ 23.194406] [ 23.194915] Memory state around the buggy address: [ 23.195927] fff00000c65fbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.196577] fff00000c65fbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.197223] >fff00000c65fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.198613] ^ [ 23.198988] fff00000c65fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.200268] fff00000c65fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.201348] ================================================================== - [kasan-bug-kasan-use-after-free-in-mempool_uaf_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper-02f5b37ba57bf3dcf4d8d329a702917c0ee4e8d82c7d131b72bf351195ce040c/details/) (gcc-13-lkftconfig-kunit)[ 26.392273] ================================================================== [ 26.393291] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 26.394041] Read of size 1 at addr fff00000c66f0000 by task kunit_try_catch/218 [ 26.394651] [ 26.395844] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 26.396997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.397675] Hardware name: linux,dummy-virt (DT) [ 26.398403] Call trace: [ 26.399172] show_stack+0x20/0x38 (C) [ 26.399866] dump_stack_lvl+0x8c/0xd0 [ 26.400610] print_report+0x118/0x5e0 [ 26.401270] kasan_report+0xc8/0x118 [ 26.401948] __asan_report_load1_noabort+0x20/0x30 [ 26.402716] mempool_uaf_helper+0x314/0x340 [ 26.403483] mempool_kmalloc_large_uaf+0xbc/0x118 [ 26.404386] kunit_try_run_case+0x14c/0x3d0 [ 26.405112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.405956] kthread+0x24c/0x2d0 [ 26.406605] ret_from_fork+0x10/0x20 [ 26.407381] [ 26.407610] The buggy address belongs to the physical page: [ 26.408138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f0 [ 26.409482] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.410319] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.411485] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.412185] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.412891] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.413586] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.415216] head: 0bfffe0000000002 ffffc1ffc319bc01 ffffffffffffffff 0000000000000000 [ 26.416431] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 26.417569] page dumped because: kasan: bad access detected [ 26.418414] [ 26.418880] Memory state around the buggy address: [ 26.419684] fff00000c66eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.420633] fff00000c66eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.421502] >fff00000c66f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.422234] ^ [ 26.422661] fff00000c66f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.423848] fff00000c66f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.424761] ================================================================== - [kasan-bug-kasan-use-after-free-in-mempool_uaf_helper](https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52/testrun/26769899/suite/log-parser-boot/test/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper-a44f91a4aa8add02587e93988fb01899d60b7d509b77fd9f104b1d78156753a6/details/) (gcc-13-lkftconfig-kunit)[ 26.504301] ================================================================== [ 26.505546] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 26.506412] Read of size 1 at addr fff00000c66dc000 by task kunit_try_catch/222 [ 26.507085] [ 26.507603] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1 [ 26.509142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.509808] Hardware name: linux,dummy-virt (DT) [ 26.511261] Call trace: [ 26.511921] show_stack+0x20/0x38 (C) [ 26.512486] dump_stack_lvl+0x8c/0xd0 [ 26.513091] print_report+0x118/0x5e0 [ 26.513674] kasan_report+0xc8/0x118 [ 26.514223] __asan_report_load1_noabort+0x20/0x30 [ 26.514895] mempool_uaf_helper+0x314/0x340 [ 26.515542] mempool_page_alloc_uaf+0xb8/0x118 [ 26.516704] kunit_try_run_case+0x14c/0x3d0 [ 26.517337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.518045] kthread+0x24c/0x2d0 [ 26.518525] ret_from_fork+0x10/0x20 [ 26.519172] [ 26.519506] The buggy address belongs to the physical page: [ 26.520151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc [ 26.521152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.521973] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.523316] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.524315] page dumped because: kasan: bad access detected [ 26.524918] [ 26.525221] Memory state around the buggy address: [ 26.526222] fff00000c66dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.527094] fff00000c66dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.527956] >fff00000c66dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.528787] ^ [ 26.529386] fff00000c66dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.530341] fff00000c66dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.531486] ================================================================== ```

Test Parser (compared to v6.13-rc7-41-g7f5b6a8ec18e)

qemu-arm64, log-parser-test