- kernel: v6.13-rc7-43-g619f0b6fad52
- git tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
- git sha: 619f0b6fad524f08d493a98d55bac9ab8895e3a6
- git describe: v6.13-rc7-43-g619f0b6fad52
- test details: https://qa-reports.linaro.org/~anders.roxell/testtrigger/build/v6.13-rc7-43-g619f0b6fad52
Home
net_mptcp_mptcp_connect_sh_-_mptcp_connect_New_MPTCP_socket_can_be_blocked_via_sysctl pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_ping_tests pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v4_ns1_MPTCP__ns1_10_0_1_1_10000_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v4_ns1_MPTCP__ns1_10_0_1_1_10001_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v4_ns1_TCP__ns1_10_0_1_1_10002_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v6_ns1_MPTCP__ns1_dead_beef_1_1_10003_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v6_ns1_MPTCP__ns1_dead_beef_1_1_10004_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_loopback_v6_ns1_TCP__ns1_dead_beef_1_1_10005_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_10_0_1_2_10006_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_dead_beef_1_2_10007_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_10_0_2_1_10008_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns2_dead_beef_2_1_10009_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_10_0_2_2_10010_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_dead_beef_2_2_10011_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_10_0_3_2_10012_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns3_dead_beef_3_2_10013_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns4_10_0_3_1_10014_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns1_MPTCP__ns4_dead_beef_3_1_10015_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns1_10_0_1_1_10016_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns1_dead_beef_1_1_10017_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_10_0_2_2_10018_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_dead_beef_2_2_10019_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_10_0_3_2_10020_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns3_dead_beef_3_2_10021_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns4_10_0_3_1_10022_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns2_MPTCP__ns4_dead_beef_3_1_10023_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns1_10_0_1_1_10024_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns1_dead_beef_1_1_10025_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_10_0_1_2_10026_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_dead_beef_1_2_10027_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_10_0_2_1_10028_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns2_dead_beef_2_1_10029_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns4_10_0_3_1_10030_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns3_MPTCP__ns4_dead_beef_3_1_10031_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns1_10_0_1_1_10032_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns1_dead_beef_1_1_10033_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_10_0_1_2_10034_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_dead_beef_1_2_10035_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_10_0_2_1_10036_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns2_dead_beef_2_1_10037_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_10_0_2_2_10038_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_dead_beef_2_2_10039_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_10_0_3_2_10040_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_multihosts_ns4_MPTCP__ns3_dead_beef_3_2_10041_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_10_0_1_1_10042_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_10_0_1_1_10043_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_TCP__ns1_10_0_1_1_10044_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_dead_beef_1_1_10045_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_MPTCP__ns1_dead_beef_1_1_10046_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveWithPeek_ns1_TCP__ns1_dead_beef_1_1_10047_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_10_0_1_1_10048_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_10_0_1_1_10049_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_TCP__ns1_10_0_1_1_10050_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_dead_beef_1_1_10051_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_MPTCP__ns1_dead_beef_1_1_10052_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_peek_mode_saveAfterPeek_ns1_TCP__ns1_dead_beef_1_1_10053_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_MPTFO_ns2_MPTCP__ns1_10_0_1_1_10054_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_MPTFO_ns2_MPTCP__ns1_10_0_1_1_10055_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_MPTFO_ns2_MPTCP__ns1_dead_beef_1_1_10056_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_MPTFO_ns2_MPTCP__ns1_dead_beef_1_1_10057_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_tproxy_ipv4_ns1_MPTCP__ns2_10_0_3_1_20000_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_tproxy_ipv6_ns1_MPTCP__ns2_dead_beef_3_1_20000_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_10_0_1_1_20001_MPTCP fail
net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_dead_beef_1_1_20002_MPTCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_dead_beef_1_1_20003_TCP pass
net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_TCP__ns1_dead_beef_1_1_20004_MPTCP pass
net_mptcp_mptcp_connect_sh fail
Home
net_mptcp_mptcp_connect_sh_-_mptcp_connect_full_disconnect_ns1_MPTCP__ns1_10_0_1_1_20001_MPTCP fail
Home
seccomp_seccomp_benchmark_native_1_bitmap pass
seccomp_seccomp_benchmark_native_1_filter pass
seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail
seccomp_seccomp_benchmark_1_bitmapped_2_bitmapped pass
seccomp_seccomp_benchmark_entry_1_bitmapped pass
seccomp_seccomp_benchmark_entry_2_bitmapped fail
seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total pass
seccomp_seccomp_benchmark fail
Home
seccomp_seccomp_benchmark_entry_2_bitmapped fail
Home
seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail
Home
cgroup_core01 cgroup_core01
cgroup_core02 cgroup_core02
cgroup_core03 cgroup_core03
cgroup cgroup_regression_test.sh
cgroup_fj_function_debug cgroup_fj_function.sh debug
cgroup_fj_function_cpuset cgroup_fj_function.sh cpuset
cgroup_fj_function_cpu cgroup_fj_function.sh cpu
cgroup_fj_function_cpuacct cgroup_fj_function.sh cpuacct
cgroup_fj_function_memory cgroup_fj_function.sh memory
cgroup_fj_function_freezer cgroup_fj_function.sh freezer
cgroup_fj_function_devices cgroup_fj_function.sh devices
cgroup_fj_function_blkio cgroup_fj_function.sh blkio
cgroup_fj_function_net_cls cgroup_fj_function.sh net_cls
cgroup_fj_function_perf_event cgroup_fj_function.sh perf_event
cgroup_core01.c:63: TPASS: test_lesser_euid_open passed: EACCES (13)
cgroup_core02.c:84: TPASS: test_lesser_ns_open passed: ENOENT (2)
cgroup_core03.c:99: TPASS: cg_count_procs(cg_child_test_simple) passed
cgroup_core03.c:105: TPASS: cg_count_procs(cg_child_test_simple) passed
cgroup_regression_test 1 TINFO: Running: cgroup_regression_test.sh
cgroup_regression_test 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_regression_test 1 TINFO: Using /tmp/LTP_cgroup_regression_test.XyrmNrDYYE as tmpdir (tmpfs filesystem)
cgroup_regression_test 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_regression_test 1 TINFO: timeout per run is 0h 55m 0s
cgroup_regression_test 1 TPASS: no kernel bug was found
cgroup_regression_test 2 TFAIL: Failed to mount cgroup filesystem
cgroup_regression_test 3 TCONF: CONFIG_SCHED_DEBUG is not enabled
cgroup_regression_test 4 TCONF: CONFIG_LOCKDEP is not enabled
cgroup_regression_test 5 TINFO: The '/tmp/LTP_cgroup_regression_test.XyrmNrDYYE/cgroup' is not mounted, skipping umount
cgroup_regression_test 5 TPASS: no kernel bug was found
cgroup_regression_test 6 TPASS: no kernel bug was found
cgroup_regression_test 7 TPASS: no kernel bug was found for test 1
cgroup_regression_test 7 TCONF: skip rest of testing due possible oops triggered by reading /proc/sched_debug
cgroup_regression_test 7 TPASS: no kernel bug was found for test 2
cgroup_regression_test 8 TPASS: no kernel bug was found
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh debug
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.Ai3FoHfCCs as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TCONF: 'tst_cgctl require' exited. Controller is probably not available?
cgroup_fj_function 1 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh cpuset
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.NcH7giA3ze as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 2
cgroup_fj_function 1 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 2 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 3 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 4 TINFO: Attaching task 4356 to /sys/fs/cgroup/ltp/test-4305/ltp_1
cgroup_fj_function 4 TPASS: Group /sys/fs/cgroup/ltp/test-4305/ltp_1 with task 4356 cannot be removed
cgroup_fj_function 5 TPASS: Dir /sys/fs/cgroup/ltp/test-4305/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 7 TPASS: Tasks file /sys/fs/cgroup/ltp/test-4305/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 9 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh cpu
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.adkEqWVgGU as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 2
cgroup_fj_function 1 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 2 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 3 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 4 TINFO: Attaching task 4455 to /sys/fs/cgroup/ltp/test-4404/ltp_1
cgroup_fj_function 4 TPASS: Group /sys/fs/cgroup/ltp/test-4404/ltp_1 with task 4455 cannot be removed
cgroup_fj_function 5 TPASS: Dir /sys/fs/cgroup/ltp/test-4404/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 7 TPASS: Tasks file /sys/fs/cgroup/ltp/test-4404/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 9 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh cpuacct
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.VBQet9beRc as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 1
cgroup_fj_function 1 TINFO: Attaching task 4552 to /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1
cgroup_fj_function 1 TINFO: Attaching task 4552 to /tmp/cgroup_cpuacct/ltp/test-4502
cgroup_fj_function 1 TPASS: Task attached successfully
cgroup_fj_function 2 TPASS: Successfully moved /tmp/cgroup_cpuacct/ltp/test-4502/ltp_2 to /tmp/cgroup_cpuacct/ltp/test-4502/ltp_3
cgroup_fj_function 3 TPASS: Failed to move /tmp/cgroup_cpuacct/ltp/test-4502/ltp_2 over existing /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1
cgroup_fj_function 4 TINFO: Attaching task 4552 to /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1
cgroup_fj_function 4 TPASS: Group /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1 with task 4552 cannot be removed
cgroup_fj_function 5 TPASS: Dir /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TPASS: Subgroup /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1 cannot be moved to /tmp/LTP_cgroup_fj_function.VBQet9beRc/ltp
cgroup_fj_function 7 TPASS: Tasks file /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TPASS: Cannot write invalid values to /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1/notify_on_release
cgroup_fj_function 9 TPASS: Set /tmp/cgroup_cpuacct/ltp/test-4502/ltp_1/notify_on_release to 1
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh memory
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.mfXC1eFSDk as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 2
cgroup_fj_function 1 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 2 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 3 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 4 TINFO: Attaching task 4661 to /sys/fs/cgroup/ltp/test-4610/ltp_1
cgroup_fj_function 4 TPASS: Group /sys/fs/cgroup/ltp/test-4610/ltp_1 with task 4661 cannot be removed
cgroup_fj_function 5 TPASS: Dir /sys/fs/cgroup/ltp/test-4610/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 7 TPASS: Tasks file /sys/fs/cgroup/ltp/test-4610/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 9 TCONF: Controller mounted on cgroup2 hierarchy, skipping test
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh freezer
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.C6QTH29MF6 as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 1
cgroup_fj_function 1 TINFO: Attaching task 4758 to /tmp/cgroup_freezer/ltp/test-4708/ltp_1
cgroup_fj_function 1 TINFO: Attaching task 4758 to /tmp/cgroup_freezer/ltp/test-4708
cgroup_fj_function 1 TPASS: Task attached successfully
cgroup_fj_function 2 TPASS: Successfully moved /tmp/cgroup_freezer/ltp/test-4708/ltp_2 to /tmp/cgroup_freezer/ltp/test-4708/ltp_3
cgroup_fj_function 3 TPASS: Failed to move /tmp/cgroup_freezer/ltp/test-4708/ltp_2 over existing /tmp/cgroup_freezer/ltp/test-4708/ltp_1
cgroup_fj_function 4 TINFO: Attaching task 4758 to /tmp/cgroup_freezer/ltp/test-4708/ltp_1
cgroup_fj_function 4 TPASS: Group /tmp/cgroup_freezer/ltp/test-4708/ltp_1 with task 4758 cannot be removed
cgroup_fj_function 5 TPASS: Dir /tmp/cgroup_freezer/ltp/test-4708/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TPASS: Subgroup /tmp/cgroup_freezer/ltp/test-4708/ltp_1 cannot be moved to /tmp/LTP_cgroup_fj_function.C6QTH29MF6/ltp
cgroup_fj_function 7 TPASS: Tasks file /tmp/cgroup_freezer/ltp/test-4708/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TPASS: Cannot write invalid values to /tmp/cgroup_freezer/ltp/test-4708/ltp_1/notify_on_release
cgroup_fj_function 9 TPASS: Set /tmp/cgroup_freezer/ltp/test-4708/ltp_1/notify_on_release to 1
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh devices
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.SANoxaY4Qg as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 1
cgroup_fj_function 1 TINFO: Attaching task 4867 to /tmp/cgroup_devices/ltp/test-4817/ltp_1
cgroup_fj_function 1 TINFO: Attaching task 4867 to /tmp/cgroup_devices/ltp/test-4817
cgroup_fj_function 1 TPASS: Task attached successfully
cgroup_fj_function 2 TPASS: Successfully moved /tmp/cgroup_devices/ltp/test-4817/ltp_2 to /tmp/cgroup_devices/ltp/test-4817/ltp_3
cgroup_fj_function 3 TPASS: Failed to move /tmp/cgroup_devices/ltp/test-4817/ltp_2 over existing /tmp/cgroup_devices/ltp/test-4817/ltp_1
cgroup_fj_function 4 TINFO: Attaching task 4867 to /tmp/cgroup_devices/ltp/test-4817/ltp_1
cgroup_fj_function 4 TPASS: Group /tmp/cgroup_devices/ltp/test-4817/ltp_1 with task 4867 cannot be removed
cgroup_fj_function 5 TPASS: Dir /tmp/cgroup_devices/ltp/test-4817/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TPASS: Subgroup /tmp/cgroup_devices/ltp/test-4817/ltp_1 cannot be moved to /tmp/LTP_cgroup_fj_function.SANoxaY4Qg/ltp
cgroup_fj_function 7 TPASS: Tasks file /tmp/cgroup_devices/ltp/test-4817/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TPASS: Cannot write invalid values to /tmp/cgroup_devices/ltp/test-4817/ltp_1/notify_on_release
cgroup_fj_function 9 TPASS: Set /tmp/cgroup_devices/ltp/test-4817/ltp_1/notify_on_release to 1
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh blkio
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.3pwiwmqkld as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TCONF: 'tst_cgctl require' exited. Controller is probably not available?
cgroup_fj_function 1 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh net_cls
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.Su7tilugAk as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 1
cgroup_fj_function 1 TINFO: Attaching task 5015 to /tmp/cgroup_net_cls/ltp/test-4965/ltp_1
cgroup_fj_function 1 TINFO: Attaching task 5015 to /tmp/cgroup_net_cls/ltp/test-4965
cgroup_fj_function 1 TPASS: Task attached successfully
cgroup_fj_function 2 TPASS: Successfully moved /tmp/cgroup_net_cls/ltp/test-4965/ltp_2 to /tmp/cgroup_net_cls/ltp/test-4965/ltp_3
cgroup_fj_function 3 TPASS: Failed to move /tmp/cgroup_net_cls/ltp/test-4965/ltp_2 over existing /tmp/cgroup_net_cls/ltp/test-4965/ltp_1
cgroup_fj_function 4 TINFO: Attaching task 5015 to /tmp/cgroup_net_cls/ltp/test-4965/ltp_1
cgroup_fj_function 4 TPASS: Group /tmp/cgroup_net_cls/ltp/test-4965/ltp_1 with task 5015 cannot be removed
cgroup_fj_function 5 TPASS: Dir /tmp/cgroup_net_cls/ltp/test-4965/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TPASS: Subgroup /tmp/cgroup_net_cls/ltp/test-4965/ltp_1 cannot be moved to /tmp/LTP_cgroup_fj_function.Su7tilugAk/ltp
cgroup_fj_function 7 TPASS: Tasks file /tmp/cgroup_net_cls/ltp/test-4965/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TPASS: Cannot write invalid values to /tmp/cgroup_net_cls/ltp/test-4965/ltp_1/notify_on_release
cgroup_fj_function 9 TPASS: Set /tmp/cgroup_net_cls/ltp/test-4965/ltp_1/notify_on_release to 1
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
cgroup_fj_function 1 TINFO: Running: cgroup_fj_function.sh perf_event
cgroup_fj_function 1 TINFO: Tested kernel: Linux runner-vwmj3eza-project-40964107-concurrent-2 6.13.0-rc7 #1 SMP PREEMPT @1736943140 aarch64 GNU/Linux
cgroup_fj_function 1 TINFO: Using /tmp/LTP_cgroup_fj_function.ocuGzCLPfJ as tmpdir (tmpfs filesystem)
cgroup_fj_function 1 TINFO: ceiling LTP_TIMEOUT_MUL to 11
cgroup_fj_function 1 TINFO: timeout per run is 0h 55m 0s
cgroup_fj_function 1 TINFO: test starts with cgroup version 1
cgroup_fj_function 1 TINFO: Attaching task 5123 to /tmp/cgroup_perf_event/ltp/test-5073/ltp_1
cgroup_fj_function 1 TINFO: Attaching task 5123 to /tmp/cgroup_perf_event/ltp/test-5073
cgroup_fj_function 1 TPASS: Task attached successfully
cgroup_fj_function 2 TPASS: Successfully moved /tmp/cgroup_perf_event/ltp/test-5073/ltp_2 to /tmp/cgroup_perf_event/ltp/test-5073/ltp_3
cgroup_fj_function 3 TPASS: Failed to move /tmp/cgroup_perf_event/ltp/test-5073/ltp_2 over existing /tmp/cgroup_perf_event/ltp/test-5073/ltp_1
cgroup_fj_function 4 TINFO: Attaching task 5123 to /tmp/cgroup_perf_event/ltp/test-5073/ltp_1
cgroup_fj_function 4 TPASS: Group /tmp/cgroup_perf_event/ltp/test-5073/ltp_1 with task 5123 cannot be removed
cgroup_fj_function 5 TPASS: Dir /tmp/cgroup_perf_event/ltp/test-5073/ltp_1 with subdir 'a' cannot be removed
cgroup_fj_function 6 TPASS: Subgroup /tmp/cgroup_perf_event/ltp/test-5073/ltp_1 cannot be moved to /tmp/LTP_cgroup_fj_function.ocuGzCLPfJ/ltp
cgroup_fj_function 7 TPASS: Tasks file /tmp/cgroup_perf_event/ltp/test-5073/ltp_1/tasks cannot be removed
cgroup_fj_function 8 TPASS: Cannot write invalid values to /tmp/cgroup_perf_event/ltp/test-5073/ltp_1/notify_on_release
cgroup_fj_function 9 TPASS: Set /tmp/cgroup_perf_event/ltp/test-5073/ltp_1/notify_on_release to 1
cgroup_fj_function 10 TINFO: Removing all ltp subgroups...
Home
[ 35.322718] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 35.324056] Modules linked in:
[ 35.327012] CPU: 0 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G N 6.13.0-rc7 #1
[ 35.328123] Tainted: [N]=TEST
[ 35.328601] Hardware name: linux,dummy-virt (DT)
[ 35.329443] pstate: 82402009 (Nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 35.330166] pc : kunit_test_null_dereference+0x2c/0x114
[ 35.331947] lr : kunit_generic_run_threadfn_adapter+0x84/0x104
[ 35.332493] sp : ffff800080fb7dd0
[ 35.332970] x29: ffff800080fb7de0 x28: 0000000000000000 x27: 1ffe000018fe9001
[ 35.334165] x26: dfff800000000000 x25: ffffa69205309214 x24: fff00000c5a4d020
[ 35.334914] x23: 1ffe000018f811f1 x22: dfff800000000000 x21: dfff800000000000
[ 35.336371] x20: ffffa6920531665c x19: fff00000c7c08f88 x18: 00000000b1c019b3
[ 35.337239] x17: 000000002ef4bae1 x16: 0000000000000000 x15: 0000000000000001
[ 35.338195] x14: 1ffe000018fe90f1 x13: 0000000000000000 x12: 0000000000000000
[ 35.339310] x11: fffd800018fe90f2 x10: dfff800000000000 x9 : 1ffe000018f811f2
[ 35.340388] x8 : 8523d9b505a84100 x7 : ffffa692072cf9c0 x6 : 0000000000000003
[ 35.341227] x5 : fff00000daa5e260 x4 : 0000000000000000 x3 : ffffa6920715b838
[ 35.341881] x2 : 0000000000000001 x1 : 0000000000000001 x0 : ffff800080087af8
[ 35.343157] Call trace:
[ 35.343687] kunit_test_null_dereference+0x2c/0x114 (P)
[ 35.344714] kunit_generic_run_threadfn_adapter+0x84/0x104
[ 35.345356] kthread+0x25c/0x35c
[ 35.345862] ret_from_fork+0x10/0x20
[ 35.347073] Code: d2d00015 f9426508 f2fbfff5 f90007e8 (39c002a8)
[ 35.348104] ---[ end trace 0000000000000000 ]---
Home
[ 54.337879] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 54.339067] Modules linked in:
[ 54.342825] CPU: 1 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G N 6.13.0-rc7 #1
[ 54.344296] Tainted: [N]=TEST
[ 54.344782] Hardware name: linux,dummy-virt (DT)
[ 54.345825] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 54.346652] pc : kunit_test_null_dereference+0x68/0x160
[ 54.348845] lr : kunit_generic_run_threadfn_adapter+0x80/0xec
[ 54.349520] sp : ffff800080fb7db0
[ 54.350105] x29: ffff800080fb7e10 x28: 0000000000000000 x27: 0000000000000000
[ 54.351590] x26: 0000000000000000 x25: fff00000c7fda500 x24: fff00000c5e62200
[ 54.352647] x23: fff00000c7ca4b80 x22: ffffae27595cc304 x21: fff00000c7ca4b88
[ 54.354056] x20: 1ffff000101f6fb6 x19: ffff800080087a10 x18: 00000000352a4afa
[ 54.355056] x17: 000000000a1bd9c2 x16: 0000000000000100 x15: fff00000ff80ce40
[ 54.356253] x14: 1ffe00001b5300c3 x13: 00000000f1f1f1f1 x12: fffd800018ffb592
[ 54.357031] x11: 1ffe000018ffb591 x10: fffd800018ffb591 x9 : dfff800000000000
[ 54.357578] x8 : fff00000c7fdac8c x7 : 0000000000000001 x6 : 0000000041b58ab3
[ 54.358209] x5 : ffff7000101f6fb6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[ 54.359611] x2 : dfff800000000000 x1 : fff00000c7fda500 x0 : ffff800080087a10
[ 54.361006] Call trace:
[ 54.361806] kunit_test_null_dereference+0x68/0x160 (P)
[ 54.362796] kunit_generic_run_threadfn_adapter+0x80/0xec
[ 54.363528] kthread+0x2b4/0x338
[ 54.364066] ret_from_fork+0x10/0x20
[ 54.365657] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042)
[ 54.366941] ---[ end trace 0000000000000000 ]---
Home
[ 112.633643] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 112.635528] Modules linked in:
[ 112.636558] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 112.637505] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 112.638145] Hardware name: linux,dummy-virt (DT)
[ 112.638662] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 112.639813] pc : kunit_test_null_dereference+0x70/0x170
[ 112.640694] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[ 112.641563] sp : ffff800083177dc0
[ 112.641998] x29: ffff800083177e20 x28: 0000000000000000 x27: 0000000000000000
[ 112.643470] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c9daff00
[ 112.644889] x23: ffff9b153cfc6f90 x22: ffff9b153cfcfb50 x21: fff00000c9daff08
[ 112.645963] x20: 1ffff0001062efb8 x19: ffff8000800879f0 x18: 00000000a76e9934
[ 112.646909] x17: 000000008055b2b1 x16: 0000000000000100 x15: 0000000000000000
[ 112.648068] x14: 1ffe00001b49c778 x13: fff00000da4e3c98 x12: fffd8000191643a2
[ 112.649116] x11: 1ffe0000191643a1 x10: fffd8000191643a1 x9 : ffff9b153cfc7018
[ 112.650156] x8 : ffff800083177cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[ 112.651201] x5 : ffff70001062efb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[ 112.652392] x2 : dfff800000000000 x1 : fff00000c8b21440 x0 : ffff8000800879f0
[ 112.653691] Call trace:
[ 112.654100] kunit_test_null_dereference+0x70/0x170 (P)
[ 112.654712] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 112.655400] kthread+0x24c/0x2d0
[ 112.655931] ret_from_fork+0x10/0x20
[ 112.657443] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042)
[ 112.658772] ---[ end trace 0000000000000000 ]---
Home
[ 26.862356] ==================================================================
[ 26.863623] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[ 26.865011] Read of size 1 at addr ffff800080977bdf by task kunit_try_catch/240
[ 26.865896]
[ 26.866273] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.868523] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.868996] Hardware name: linux,dummy-virt (DT)
[ 26.869450] Call trace:
[ 26.869756] show_stack+0x20/0x38 (C)
[ 26.870285] dump_stack_lvl+0x8c/0xd0
[ 26.870780] print_report+0x2fc/0x5e0
[ 26.871574] kasan_report+0xc8/0x118
[ 26.872243] __asan_report_load1_noabort+0x20/0x30
[ 26.872792] kasan_alloca_oob_left+0x2b8/0x310
[ 26.873386] kunit_try_run_case+0x14c/0x3d0
[ 26.873960] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.874776] kthread+0x24c/0x2d0
[ 26.875906] ret_from_fork+0x10/0x20
[ 26.876429]
[ 26.876866] The buggy address belongs to stack of task kunit_try_catch/240
[ 26.877675]
[ 26.877968] The buggy address belongs to the virtual mapping at
[ 26.877968] [ffff800080970000, ffff800080979000) created by:
[ 26.877968] kernel_clone+0x140/0x788
[ 26.879975]
[ 26.880846] The buggy address belongs to the physical page:
[ 26.881637] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c83
[ 26.882412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.883321] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 26.884396] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.885281] page dumped because: kasan: bad access detected
[ 26.885972]
[ 26.886310] Memory state around the buggy address:
[ 26.886958] ffff800080977a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.888048] ffff800080977b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.888990] >ffff800080977b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[ 26.889720] ^
[ 26.890571] ffff800080977c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[ 26.891659] ffff800080977c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[ 26.892660] ==================================================================
Home
[ 26.900905] ==================================================================
[ 26.901978] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[ 26.903227] Read of size 1 at addr ffff8000809f7bea by task kunit_try_catch/242
[ 26.904499]
[ 26.904762] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.906294] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.906729] Hardware name: linux,dummy-virt (DT)
[ 26.907499] Call trace:
[ 26.908181] show_stack+0x20/0x38 (C)
[ 26.908891] dump_stack_lvl+0x8c/0xd0
[ 26.909450] print_report+0x2fc/0x5e0
[ 26.910232] kasan_report+0xc8/0x118
[ 26.910922] __asan_report_load1_noabort+0x20/0x30
[ 26.911787] kasan_alloca_oob_right+0x2e4/0x348
[ 26.912459] kunit_try_run_case+0x14c/0x3d0
[ 26.913129] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.913912] kthread+0x24c/0x2d0
[ 26.914476] ret_from_fork+0x10/0x20
[ 26.915199]
[ 26.915474] The buggy address belongs to stack of task kunit_try_catch/242
[ 26.916137]
[ 26.916373] The buggy address belongs to the virtual mapping at
[ 26.916373] [ffff8000809f0000, ffff8000809f9000) created by:
[ 26.916373] kernel_clone+0x140/0x788
[ 26.918977]
[ 26.919561] The buggy address belongs to the physical page:
[ 26.920202] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d18
[ 26.921102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.921914] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 26.922787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.923872] page dumped because: kasan: bad access detected
[ 26.924359]
[ 26.924585] Memory state around the buggy address:
[ 26.925003] ffff8000809f7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.925721] ffff8000809f7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.926353] >ffff8000809f7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[ 26.927043] ^
[ 26.928162] ffff8000809f7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[ 26.929217] ffff8000809f7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[ 26.929887] ==================================================================
Home
[ 24.691618] ==================================================================
[ 24.692389] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[ 24.693271] Free of addr fff00000c63157c0 by task kunit_try_catch/181
[ 24.694361]
[ 24.694936] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.696830] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.697764] Hardware name: linux,dummy-virt (DT)
[ 24.698260] Call trace:
[ 24.698537] show_stack+0x20/0x38 (C)
[ 24.699298] dump_stack_lvl+0x8c/0xd0
[ 24.700133] print_report+0x118/0x5e0
[ 24.701062] kasan_report_invalid_free+0xb0/0xd8
[ 24.701953] check_slab_allocation+0xd4/0x108
[ 24.702304] __kasan_slab_pre_free+0x2c/0x48
[ 24.702569] kfree+0xe8/0x3c8
[ 24.702805] kfree_sensitive+0x3c/0xb0
[ 24.703387] kmalloc_double_kzfree+0x168/0x308
[ 24.704253] kunit_try_run_case+0x14c/0x3d0
[ 24.704944] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.705976] kthread+0x24c/0x2d0
[ 24.706656] ret_from_fork+0x10/0x20
[ 24.707780]
[ 24.708494] Allocated by task 181:
[ 24.708947] kasan_save_stack+0x3c/0x68
[ 24.709460] kasan_save_track+0x20/0x40
[ 24.709948] kasan_save_alloc_info+0x40/0x58
[ 24.710456] __kasan_kmalloc+0xd4/0xd8
[ 24.711936] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.712408] kmalloc_double_kzfree+0xb8/0x308
[ 24.713165] kunit_try_run_case+0x14c/0x3d0
[ 24.713790] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.714532] kthread+0x24c/0x2d0
[ 24.715098] ret_from_fork+0x10/0x20
[ 24.715733]
[ 24.716155] Freed by task 181:
[ 24.716697] kasan_save_stack+0x3c/0x68
[ 24.717313] kasan_save_track+0x20/0x40
[ 24.717774] kasan_save_free_info+0x4c/0x78
[ 24.718472] __kasan_slab_free+0x6c/0x98
[ 24.719442] kfree+0x114/0x3c8
[ 24.719988] kfree_sensitive+0x80/0xb0
[ 24.720492] kmalloc_double_kzfree+0x11c/0x308
[ 24.721064] kunit_try_run_case+0x14c/0x3d0
[ 24.721603] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.722270] kthread+0x24c/0x2d0
[ 24.722824] ret_from_fork+0x10/0x20
[ 24.723630]
[ 24.723956] The buggy address belongs to the object at fff00000c63157c0
[ 24.723956] which belongs to the cache kmalloc-16 of size 16
[ 24.725172] The buggy address is located 0 bytes inside of
[ 24.725172] 16-byte region [fff00000c63157c0, fff00000c63157d0)
[ 24.726397]
[ 24.726730] The buggy address belongs to the physical page:
[ 24.727814] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106315
[ 24.728709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.729451] page_type: f5(slab)
[ 24.729950] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 24.730777] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 24.732485] page dumped because: kasan: bad access detected
[ 24.733046]
[ 24.733353] Memory state around the buggy address:
[ 24.734286] fff00000c6315680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 24.735039] fff00000c6315700: fa fb fc fc fa fb fc fc 00 05 fc fc 00 05 fc fc
[ 24.736273] >fff00000c6315780: 00 00 fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 24.737208] ^
[ 24.737852] fff00000c6315800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.738609] fff00000c6315880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.739878] ==================================================================
Home
[ 25.297835] ==================================================================
[ 25.298718] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[ 25.299558] Free of addr fff00000c5ce6000 by task kunit_try_catch/198
[ 25.300178]
[ 25.300452] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 25.303230] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.303816] Hardware name: linux,dummy-virt (DT)
[ 25.304311] Call trace:
[ 25.304651] show_stack+0x20/0x38 (C)
[ 25.305275] dump_stack_lvl+0x8c/0xd0
[ 25.305826] print_report+0x118/0x5e0
[ 25.306375] kasan_report_invalid_free+0xb0/0xd8
[ 25.307015] check_slab_allocation+0xd4/0x108
[ 25.307826] __kasan_slab_pre_free+0x2c/0x48
[ 25.308391] kmem_cache_free+0xf0/0x470
[ 25.308999] kmem_cache_double_free+0x190/0x3c8
[ 25.309590] kunit_try_run_case+0x14c/0x3d0
[ 25.310353] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.311348] kthread+0x24c/0x2d0
[ 25.311811] ret_from_fork+0x10/0x20
[ 25.312312]
[ 25.312616] Allocated by task 198:
[ 25.313052] kasan_save_stack+0x3c/0x68
[ 25.313617] kasan_save_track+0x20/0x40
[ 25.314220] kasan_save_alloc_info+0x40/0x58
[ 25.314841] __kasan_slab_alloc+0xa8/0xb0
[ 25.315470] kmem_cache_alloc_noprof+0x108/0x398
[ 25.316890] kmem_cache_double_free+0x12c/0x3c8
[ 25.317447] kunit_try_run_case+0x14c/0x3d0
[ 25.318045] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.318722] kthread+0x24c/0x2d0
[ 25.319957] ret_from_fork+0x10/0x20
[ 25.320454]
[ 25.320725] Freed by task 198:
[ 25.321220] kasan_save_stack+0x3c/0x68
[ 25.321835] kasan_save_track+0x20/0x40
[ 25.322407] kasan_save_free_info+0x4c/0x78
[ 25.323337] __kasan_slab_free+0x6c/0x98
[ 25.323850] kmem_cache_free+0x118/0x470
[ 25.324424] kmem_cache_double_free+0x140/0x3c8
[ 25.325020] kunit_try_run_case+0x14c/0x3d0
[ 25.325637] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.326302] kthread+0x24c/0x2d0
[ 25.326784] ret_from_fork+0x10/0x20
[ 25.327637]
[ 25.327977] The buggy address belongs to the object at fff00000c5ce6000
[ 25.327977] which belongs to the cache test_cache of size 200
[ 25.329346] The buggy address is located 0 bytes inside of
[ 25.329346] 200-byte region [fff00000c5ce6000, fff00000c5ce60c8)
[ 25.330519]
[ 25.330886] The buggy address belongs to the physical page:
[ 25.331920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6
[ 25.332851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 25.333626] page_type: f5(slab)
[ 25.334123] raw: 0bfffe0000000000 fff00000c565a780 dead000000000122 0000000000000000
[ 25.334881] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[ 25.336704] page dumped because: kasan: bad access detected
[ 25.337360]
[ 25.337620] Memory state around the buggy address:
[ 25.338271] fff00000c5ce5f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.339049] fff00000c5ce5f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.339931] >fff00000c5ce6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.340700] ^
[ 25.341591] fff00000c5ce6080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 25.342368] fff00000c5ce6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.343443] ==================================================================
Home
[ 26.639230] ==================================================================
[ 26.640979] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[ 26.641783] Free of addr fff00000c66dc000 by task kunit_try_catch/228
[ 26.642429]
[ 26.642981] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.644316] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.645304] Hardware name: linux,dummy-virt (DT)
[ 26.646060] Call trace:
[ 26.646581] show_stack+0x20/0x38 (C)
[ 26.647684] dump_stack_lvl+0x8c/0xd0
[ 26.648381] print_report+0x118/0x5e0
[ 26.648881] kasan_report_invalid_free+0xb0/0xd8
[ 26.649547] __kasan_mempool_poison_pages+0xe0/0xe8
[ 26.650292] mempool_free+0x24c/0x328
[ 26.651093] mempool_double_free_helper+0x150/0x2e0
[ 26.651860] mempool_page_alloc_double_free+0xb4/0x110
[ 26.652450] kunit_try_run_case+0x14c/0x3d0
[ 26.652984] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.653716] kthread+0x24c/0x2d0
[ 26.654231] ret_from_fork+0x10/0x20
[ 26.654736]
[ 26.655499] The buggy address belongs to the physical page:
[ 26.656293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc
[ 26.657186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.658165] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 26.659131] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.660518] page dumped because: kasan: bad access detected
[ 26.661359]
[ 26.661816] Memory state around the buggy address:
[ 26.662424] fff00000c66dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.663860] fff00000c66dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.664671] >fff00000c66dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.665443] ^
[ 26.666167] fff00000c66dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.667102] fff00000c66dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.667852] ==================================================================
Home
[ 26.599893] ==================================================================
[ 26.601218] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[ 26.602149] Free of addr fff00000c66dc000 by task kunit_try_catch/226
[ 26.602964]
[ 26.603322] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.604580] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.605348] Hardware name: linux,dummy-virt (DT)
[ 26.605965] Call trace:
[ 26.606379] show_stack+0x20/0x38 (C)
[ 26.607145] dump_stack_lvl+0x8c/0xd0
[ 26.608077] print_report+0x118/0x5e0
[ 26.608678] kasan_report_invalid_free+0xb0/0xd8
[ 26.609361] __kasan_mempool_poison_object+0x14c/0x150
[ 26.610074] mempool_free+0x28c/0x328
[ 26.610691] mempool_double_free_helper+0x150/0x2e0
[ 26.611513] mempool_kmalloc_large_double_free+0xb8/0x110
[ 26.612613] kunit_try_run_case+0x14c/0x3d0
[ 26.613251] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.614018] kthread+0x24c/0x2d0
[ 26.614584] ret_from_fork+0x10/0x20
[ 26.615238]
[ 26.615484] The buggy address belongs to the physical page:
[ 26.616680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc
[ 26.617507] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 26.618334] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 26.619781] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 26.620526] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.621457] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 26.622431] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.623590] head: 0bfffe0000000002 ffffc1ffc319b701 ffffffffffffffff 0000000000000000
[ 26.624282] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 26.624958] page dumped because: kasan: bad access detected
[ 26.625474]
[ 26.625685] Memory state around the buggy address:
[ 26.626131] fff00000c66dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.626974] fff00000c66dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.627612] >fff00000c66dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.628265] ^
[ 26.628614] fff00000c66dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.629258] fff00000c66dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.630860] ==================================================================
Home
[ 26.541772] ==================================================================
[ 26.542713] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[ 26.543439] Free of addr fff00000c5d0cf00 by task kunit_try_catch/224
[ 26.544262]
[ 26.544595] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.545892] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.546482] Hardware name: linux,dummy-virt (DT)
[ 26.548202] Call trace:
[ 26.548571] show_stack+0x20/0x38 (C)
[ 26.549110] dump_stack_lvl+0x8c/0xd0
[ 26.549676] print_report+0x118/0x5e0
[ 26.550335] kasan_report_invalid_free+0xb0/0xd8
[ 26.551018] check_slab_allocation+0xd4/0x108
[ 26.551938] __kasan_mempool_poison_object+0x78/0x150
[ 26.552570] mempool_free+0x28c/0x328
[ 26.553305] mempool_double_free_helper+0x150/0x2e0
[ 26.553988] mempool_kmalloc_double_free+0xb8/0x110
[ 26.554643] kunit_try_run_case+0x14c/0x3d0
[ 26.555512] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.556233] kthread+0x24c/0x2d0
[ 26.556763] ret_from_fork+0x10/0x20
[ 26.557300]
[ 26.557574] Allocated by task 224:
[ 26.558104] kasan_save_stack+0x3c/0x68
[ 26.558672] kasan_save_track+0x20/0x40
[ 26.559232] kasan_save_alloc_info+0x40/0x58
[ 26.560018] __kasan_mempool_unpoison_object+0x11c/0x180
[ 26.560658] remove_element+0x130/0x1f8
[ 26.561154] mempool_alloc_preallocated+0x58/0xc0
[ 26.561858] mempool_double_free_helper+0x94/0x2e0
[ 26.562440] mempool_kmalloc_double_free+0xb8/0x110
[ 26.563332] kunit_try_run_case+0x14c/0x3d0
[ 26.563727] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.564392] kthread+0x24c/0x2d0
[ 26.565684] ret_from_fork+0x10/0x20
[ 26.566184]
[ 26.566497] Freed by task 224:
[ 26.566987] kasan_save_stack+0x3c/0x68
[ 26.567701] kasan_save_track+0x20/0x40
[ 26.568194] kasan_save_free_info+0x4c/0x78
[ 26.568716] __kasan_mempool_poison_object+0xc0/0x150
[ 26.569306] mempool_free+0x28c/0x328
[ 26.569800] mempool_double_free_helper+0x100/0x2e0
[ 26.570394] mempool_kmalloc_double_free+0xb8/0x110
[ 26.571156] kunit_try_run_case+0x14c/0x3d0
[ 26.571590] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.572140] kthread+0x24c/0x2d0
[ 26.572498] ret_from_fork+0x10/0x20
[ 26.573580]
[ 26.573871] The buggy address belongs to the object at fff00000c5d0cf00
[ 26.573871] which belongs to the cache kmalloc-128 of size 128
[ 26.575682] The buggy address is located 0 bytes inside of
[ 26.575682] 128-byte region [fff00000c5d0cf00, fff00000c5d0cf80)
[ 26.576828]
[ 26.577181] The buggy address belongs to the physical page:
[ 26.578021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0c
[ 26.578939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.580079] page_type: f5(slab)
[ 26.580480] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 26.581292] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000
[ 26.582445] page dumped because: kasan: bad access detected
[ 26.583951]
[ 26.584396] Memory state around the buggy address:
[ 26.585108] fff00000c5d0ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.586134] fff00000c5d0ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.587430] >fff00000c5d0cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.588097] ^
[ 26.588551] fff00000c5d0cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.589311] fff00000c5d0d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.590399] ==================================================================
Home
[ 26.769155] ==================================================================
[ 26.770408] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[ 26.771325] Read of size 1 at addr ffff9b15434b202d by task kunit_try_catch/234
[ 26.772341]
[ 26.772849] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.773930] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.774480] Hardware name: linux,dummy-virt (DT)
[ 26.775394] Call trace:
[ 26.775670] show_stack+0x20/0x38 (C)
[ 26.776189] dump_stack_lvl+0x8c/0xd0
[ 26.776607] print_report+0x2fc/0x5e0
[ 26.778505] kasan_report+0xc8/0x118
[ 26.779058] __asan_report_load1_noabort+0x20/0x30
[ 26.779774] kasan_global_oob_right+0x230/0x270
[ 26.780617] kunit_try_run_case+0x14c/0x3d0
[ 26.781343] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.782171] kthread+0x24c/0x2d0
[ 26.782670] ret_from_fork+0x10/0x20
[ 26.783576]
[ 26.784136] The buggy address belongs to the variable:
[ 26.784940] global_array+0xd/0x40
[ 26.785401]
[ 26.786173] The buggy address belongs to the virtual mapping at
[ 26.786173] [ffff9b1541810000, ffff9b1543571000) created by:
[ 26.786173] paging_init+0x668/0x7c8
[ 26.788153]
[ 26.788973] The buggy address belongs to the physical page:
[ 26.789491] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478b2
[ 26.790308] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[ 26.792107] raw: 03fffe0000002000 ffffc1ffc01e2c88 ffffc1ffc01e2c88 0000000000000000
[ 26.792863] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.793783] page dumped because: kasan: bad access detected
[ 26.794538]
[ 26.795011] Memory state around the buggy address:
[ 26.796163] ffff9b15434b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.797076] ffff9b15434b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[ 26.798046] >ffff9b15434b2000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[ 26.798801] ^
[ 26.799523] ffff9b15434b2080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[ 26.800821] ffff9b15434b2100: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[ 26.801725] ==================================================================
Home
[ 23.209704] ==================================================================
[ 23.210791] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[ 23.211568] Free of addr fff00000c65fc001 by task kunit_try_catch/139
[ 23.212254]
[ 23.212640] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.213670] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.214138] Hardware name: linux,dummy-virt (DT)
[ 23.214685] Call trace:
[ 23.215180] show_stack+0x20/0x38 (C)
[ 23.215712] dump_stack_lvl+0x8c/0xd0
[ 23.216399] print_report+0x118/0x5e0
[ 23.216937] kasan_report_invalid_free+0xb0/0xd8
[ 23.217559] __kasan_kfree_large+0x5c/0xa8
[ 23.218080] free_large_kmalloc+0x58/0x140
[ 23.218724] kfree+0x270/0x3c8
[ 23.219189] kmalloc_large_invalid_free+0x108/0x270
[ 23.219932] kunit_try_run_case+0x14c/0x3d0
[ 23.220443] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.221137] kthread+0x24c/0x2d0
[ 23.221735] ret_from_fork+0x10/0x20
[ 23.222286]
[ 23.222622] The buggy address belongs to the physical page:
[ 23.223285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc
[ 23.224272] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.225092] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.225909] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.226815] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.227651] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.228476] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.229324] head: 0bfffe0000000002 ffffc1ffc3197f01 ffffffffffffffff 0000000000000000
[ 23.230183] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.230990] page dumped because: kasan: bad access detected
[ 23.231656]
[ 23.232002] Memory state around the buggy address:
[ 23.232598] fff00000c65fbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.233401] fff00000c65fbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.234143] >fff00000c65fc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.234912] ^
[ 23.235426] fff00000c65fc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.236159] fff00000c65fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.237040] ==================================================================
Home
[ 25.362638] ==================================================================
[ 25.364358] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[ 25.365896] Free of addr fff00000c5d06001 by task kunit_try_catch/200
[ 25.366618]
[ 25.366986] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 25.368289] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.369074] Hardware name: linux,dummy-virt (DT)
[ 25.369522] Call trace:
[ 25.369832] show_stack+0x20/0x38 (C)
[ 25.370256] dump_stack_lvl+0x8c/0xd0
[ 25.370675] print_report+0x118/0x5e0
[ 25.371633] kasan_report_invalid_free+0xb0/0xd8
[ 25.372344] check_slab_allocation+0xfc/0x108
[ 25.372919] __kasan_slab_pre_free+0x2c/0x48
[ 25.373410] kmem_cache_free+0xf0/0x470
[ 25.374172] kmem_cache_invalid_free+0x184/0x3b8
[ 25.375249] kunit_try_run_case+0x14c/0x3d0
[ 25.375867] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.376965] kthread+0x24c/0x2d0
[ 25.377609] ret_from_fork+0x10/0x20
[ 25.378311]
[ 25.378785] Allocated by task 200:
[ 25.379652] kasan_save_stack+0x3c/0x68
[ 25.380167] kasan_save_track+0x20/0x40
[ 25.380574] kasan_save_alloc_info+0x40/0x58
[ 25.381040] __kasan_slab_alloc+0xa8/0xb0
[ 25.381453] kmem_cache_alloc_noprof+0x108/0x398
[ 25.382996] kmem_cache_invalid_free+0x12c/0x3b8
[ 25.383919] kunit_try_run_case+0x14c/0x3d0
[ 25.384427] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.385025] kthread+0x24c/0x2d0
[ 25.385509] ret_from_fork+0x10/0x20
[ 25.386326]
[ 25.386879] The buggy address belongs to the object at fff00000c5d06000
[ 25.386879] which belongs to the cache test_cache of size 200
[ 25.388709] The buggy address is located 1 bytes inside of
[ 25.388709] 200-byte region [fff00000c5d06000, fff00000c5d060c8)
[ 25.390226]
[ 25.390703] The buggy address belongs to the physical page:
[ 25.391544] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d06
[ 25.392644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 25.393479] page_type: f5(slab)
[ 25.394205] raw: 0bfffe0000000000 fff00000c10d0dc0 dead000000000122 0000000000000000
[ 25.395253] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[ 25.396439] page dumped because: kasan: bad access detected
[ 25.397224]
[ 25.397703] Memory state around the buggy address:
[ 25.398346] fff00000c5d05f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.399668] fff00000c5d05f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.400840] >fff00000c5d06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 25.401759] ^
[ 25.402224] fff00000c5d06080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 25.403400] fff00000c5d06100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.404234] ==================================================================
Home
[ 26.677599] ==================================================================
[ 26.678870] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[ 26.680076] Free of addr fff00000c5cff701 by task kunit_try_catch/230
[ 26.680971]
[ 26.681286] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.682284] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.682784] Hardware name: linux,dummy-virt (DT)
[ 26.683506] Call trace:
[ 26.683856] show_stack+0x20/0x38 (C)
[ 26.684594] dump_stack_lvl+0x8c/0xd0
[ 26.685355] print_report+0x118/0x5e0
[ 26.685992] kasan_report_invalid_free+0xb0/0xd8
[ 26.686643] check_slab_allocation+0xfc/0x108
[ 26.687382] __kasan_mempool_poison_object+0x78/0x150
[ 26.688314] mempool_free+0x28c/0x328
[ 26.688949] mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[ 26.689674] mempool_kmalloc_invalid_free+0xb8/0x110
[ 26.690329] kunit_try_run_case+0x14c/0x3d0
[ 26.691028] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.691963] kthread+0x24c/0x2d0
[ 26.692484] ret_from_fork+0x10/0x20
[ 26.693132]
[ 26.693508] Allocated by task 230:
[ 26.693968] kasan_save_stack+0x3c/0x68
[ 26.694644] kasan_save_track+0x20/0x40
[ 26.695464] kasan_save_alloc_info+0x40/0x58
[ 26.695929] __kasan_mempool_unpoison_object+0x11c/0x180
[ 26.696445] remove_element+0x130/0x1f8
[ 26.697452] mempool_alloc_preallocated+0x58/0xc0
[ 26.698193] mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[ 26.698857] mempool_kmalloc_invalid_free+0xb8/0x110
[ 26.699958] kunit_try_run_case+0x14c/0x3d0
[ 26.700660] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.701203] kthread+0x24c/0x2d0
[ 26.702161] ret_from_fork+0x10/0x20
[ 26.702958]
[ 26.703760] The buggy address belongs to the object at fff00000c5cff700
[ 26.703760] which belongs to the cache kmalloc-128 of size 128
[ 26.706247] The buggy address is located 1 bytes inside of
[ 26.706247] 128-byte region [fff00000c5cff700, fff00000c5cff780)
[ 26.707903]
[ 26.708134] The buggy address belongs to the physical page:
[ 26.709082] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff
[ 26.710071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.711382] page_type: f5(slab)
[ 26.711800] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 26.712838] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 26.713811] page dumped because: kasan: bad access detected
[ 26.714601]
[ 26.715212] Memory state around the buggy address:
[ 26.715650] fff00000c5cff600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.716314] fff00000c5cff680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.717648] >fff00000c5cff700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.718582] ^
[ 26.719969] fff00000c5cff780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.720894] fff00000c5cff800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.721697] ==================================================================
Home
[ 26.730170] ==================================================================
[ 26.731317] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[ 26.732489] Free of addr fff00000c66dc001 by task kunit_try_catch/232
[ 26.733034]
[ 26.733291] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.734786] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.735840] Hardware name: linux,dummy-virt (DT)
[ 26.736393] Call trace:
[ 26.736728] show_stack+0x20/0x38 (C)
[ 26.737335] dump_stack_lvl+0x8c/0xd0
[ 26.737843] print_report+0x118/0x5e0
[ 26.738433] kasan_report_invalid_free+0xb0/0xd8
[ 26.739092] __kasan_mempool_poison_object+0xfc/0x150
[ 26.739806] mempool_free+0x28c/0x328
[ 26.740471] mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[ 26.741804] mempool_kmalloc_large_invalid_free+0xb8/0x110
[ 26.742813] kunit_try_run_case+0x14c/0x3d0
[ 26.743408] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.744016] kthread+0x24c/0x2d0
[ 26.744389] ret_from_fork+0x10/0x20
[ 26.745103]
[ 26.745374] The buggy address belongs to the physical page:
[ 26.745884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc
[ 26.746685] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 26.748497] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 26.749488] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 26.750329] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.751139] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 26.752038] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.753008] head: 0bfffe0000000002 ffffc1ffc319b701 ffffffffffffffff 0000000000000000
[ 26.753638] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 26.754105] page dumped because: kasan: bad access detected
[ 26.754371]
[ 26.754499] Memory state around the buggy address:
[ 26.755050] fff00000c66dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.755699] fff00000c66dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.756442] >fff00000c66dc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.757143] ^
[ 26.757892] fff00000c66dc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.758439] fff00000c66dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.759927] ==================================================================
Home
[ 24.373458] ==================================================================
[ 24.374911] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[ 24.375833] Read of size 18446744073709551614 at addr fff00000c5ca6b04 by task kunit_try_catch/169
[ 24.376646]
[ 24.376892] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.377718] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.379468] Hardware name: linux,dummy-virt (DT)
[ 24.380342] Call trace:
[ 24.380908] show_stack+0x20/0x38 (C)
[ 24.381585] dump_stack_lvl+0x8c/0xd0
[ 24.382289] print_report+0x118/0x5e0
[ 24.382986] kasan_report+0xc8/0x118
[ 24.383835] kasan_check_range+0x100/0x1a8
[ 24.384508] __asan_memmove+0x3c/0x98
[ 24.385032] kmalloc_memmove_negative_size+0x154/0x2e0
[ 24.385637] kunit_try_run_case+0x14c/0x3d0
[ 24.386417] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.387427] kthread+0x24c/0x2d0
[ 24.387961] ret_from_fork+0x10/0x20
[ 24.388472]
[ 24.389258] Allocated by task 169:
[ 24.389659] kasan_save_stack+0x3c/0x68
[ 24.390359] kasan_save_track+0x20/0x40
[ 24.391061] kasan_save_alloc_info+0x40/0x58
[ 24.391925] __kasan_kmalloc+0xd4/0xd8
[ 24.392589] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.393162] kmalloc_memmove_negative_size+0xb0/0x2e0
[ 24.394207] kunit_try_run_case+0x14c/0x3d0
[ 24.394702] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.396346] kthread+0x24c/0x2d0
[ 24.397003] ret_from_fork+0x10/0x20
[ 24.397664]
[ 24.398182] The buggy address belongs to the object at fff00000c5ca6b00
[ 24.398182] which belongs to the cache kmalloc-64 of size 64
[ 24.400105] The buggy address is located 4 bytes inside of
[ 24.400105] 64-byte region [fff00000c5ca6b00, fff00000c5ca6b40)
[ 24.401315]
[ 24.401687] The buggy address belongs to the physical page:
[ 24.402431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca6
[ 24.403373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.404538] page_type: f5(slab)
[ 24.405047] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 24.406255] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 24.406990] page dumped because: kasan: bad access detected
[ 24.408021]
[ 24.408464] Memory state around the buggy address:
[ 24.409095] fff00000c5ca6a00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[ 24.410028] fff00000c5ca6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 24.411106] >fff00000c5ca6b00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 24.412151] ^
[ 24.412799] fff00000c5ca6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.413784] fff00000c5ca6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.414504] ==================================================================
Home
[ 30.717766] ==================================================================
[ 30.718734] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[ 30.719584] Write of size 8 at addr fff00000c5d52778 by task kunit_try_catch/270
[ 30.720709]
[ 30.721135] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.722168] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.723034] Hardware name: linux,dummy-virt (DT)
[ 30.724088] Call trace:
[ 30.724396] show_stack+0x20/0x38 (C)
[ 30.724837] dump_stack_lvl+0x8c/0xd0
[ 30.726417] print_report+0x118/0x5e0
[ 30.727235] kasan_report+0xc8/0x118
[ 30.727962] kasan_check_range+0x100/0x1a8
[ 30.728402] __kasan_check_write+0x20/0x30
[ 30.728861] copy_to_kernel_nofault+0x8c/0x250
[ 30.729337] copy_to_kernel_nofault_oob+0x1bc/0x418
[ 30.730527] kunit_try_run_case+0x14c/0x3d0
[ 30.731534] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.733138] kthread+0x24c/0x2d0
[ 30.733688] ret_from_fork+0x10/0x20
[ 30.734335]
[ 30.734721] Allocated by task 270:
[ 30.735494] kasan_save_stack+0x3c/0x68
[ 30.736022] kasan_save_track+0x20/0x40
[ 30.736429] kasan_save_alloc_info+0x40/0x58
[ 30.736887] __kasan_kmalloc+0xd4/0xd8
[ 30.737293] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.738379] copy_to_kernel_nofault_oob+0xc8/0x418
[ 30.739025] kunit_try_run_case+0x14c/0x3d0
[ 30.740139] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.741088] kthread+0x24c/0x2d0
[ 30.741699] ret_from_fork+0x10/0x20
[ 30.742372]
[ 30.742827] The buggy address belongs to the object at fff00000c5d52700
[ 30.742827] which belongs to the cache kmalloc-128 of size 128
[ 30.744433] The buggy address is located 0 bytes to the right of
[ 30.744433] allocated 120-byte region [fff00000c5d52700, fff00000c5d52778)
[ 30.745665]
[ 30.746217] The buggy address belongs to the physical page:
[ 30.746584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d52
[ 30.748315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.749097] page_type: f5(slab)
[ 30.749553] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 30.750436] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 30.751363] page dumped because: kasan: bad access detected
[ 30.752219]
[ 30.752530] Memory state around the buggy address:
[ 30.753104] fff00000c5d52600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.754274] fff00000c5d52680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.755052] >fff00000c5d52700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 30.756364] ^
[ 30.757099] fff00000c5d52780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.757793] fff00000c5d52800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.759254] ==================================================================
Home
[ 30.672990] ==================================================================
[ 30.674373] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[ 30.675172] Read of size 8 at addr fff00000c5d52778 by task kunit_try_catch/270
[ 30.675794]
[ 30.676169] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.678292] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.678986] Hardware name: linux,dummy-virt (DT)
[ 30.679817] Call trace:
[ 30.680478] show_stack+0x20/0x38 (C)
[ 30.680989] dump_stack_lvl+0x8c/0xd0
[ 30.681903] print_report+0x118/0x5e0
[ 30.682612] kasan_report+0xc8/0x118
[ 30.683387] __asan_report_load8_noabort+0x20/0x30
[ 30.684328] copy_to_kernel_nofault+0x204/0x250
[ 30.684957] copy_to_kernel_nofault_oob+0x158/0x418
[ 30.685525] kunit_try_run_case+0x14c/0x3d0
[ 30.685979] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.687184] kthread+0x24c/0x2d0
[ 30.687948] ret_from_fork+0x10/0x20
[ 30.688533]
[ 30.688958] Allocated by task 270:
[ 30.689410] kasan_save_stack+0x3c/0x68
[ 30.689986] kasan_save_track+0x20/0x40
[ 30.690511] kasan_save_alloc_info+0x40/0x58
[ 30.691107] __kasan_kmalloc+0xd4/0xd8
[ 30.692038] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.693249] copy_to_kernel_nofault_oob+0xc8/0x418
[ 30.694058] kunit_try_run_case+0x14c/0x3d0
[ 30.694800] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.695793] kthread+0x24c/0x2d0
[ 30.696316] ret_from_fork+0x10/0x20
[ 30.697066]
[ 30.697324] The buggy address belongs to the object at fff00000c5d52700
[ 30.697324] which belongs to the cache kmalloc-128 of size 128
[ 30.699844] The buggy address is located 0 bytes to the right of
[ 30.699844] allocated 120-byte region [fff00000c5d52700, fff00000c5d52778)
[ 30.701324]
[ 30.701657] The buggy address belongs to the physical page:
[ 30.702454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d52
[ 30.703330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.704173] page_type: f5(slab)
[ 30.704673] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 30.706127] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 30.707917] page dumped because: kasan: bad access detected
[ 30.708476]
[ 30.708796] Memory state around the buggy address:
[ 30.709346] fff00000c5d52600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.710129] fff00000c5d52680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.711547] >fff00000c5d52700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 30.712250] ^
[ 30.713075] fff00000c5d52780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.713930] fff00000c5d52800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.714757] ==================================================================
Home
[ 31.001392] ==================================================================
[ 31.002316] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[ 31.003933] Read of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[ 31.005116]
[ 31.005630] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.006792] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.007536] Hardware name: linux,dummy-virt (DT)
[ 31.008343] Call trace:
[ 31.008735] show_stack+0x20/0x38 (C)
[ 31.009312] dump_stack_lvl+0x8c/0xd0
[ 31.010175] print_report+0x118/0x5e0
[ 31.010600] kasan_report+0xc8/0x118
[ 31.011276] kasan_check_range+0x100/0x1a8
[ 31.011992] __kasan_check_read+0x20/0x30
[ 31.012621] copy_user_test_oob+0x4a0/0xec0
[ 31.013273] kunit_try_run_case+0x14c/0x3d0
[ 31.013981] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.014823] kthread+0x24c/0x2d0
[ 31.015416] ret_from_fork+0x10/0x20
[ 31.016034]
[ 31.016363] Allocated by task 274:
[ 31.016895] kasan_save_stack+0x3c/0x68
[ 31.017565] kasan_save_track+0x20/0x40
[ 31.018168] kasan_save_alloc_info+0x40/0x58
[ 31.018845] __kasan_kmalloc+0xd4/0xd8
[ 31.019482] __kmalloc_noprof+0x188/0x4c8
[ 31.020076] kunit_kmalloc_array+0x34/0x88
[ 31.020684] copy_user_test_oob+0xac/0xec0
[ 31.021338] kunit_try_run_case+0x14c/0x3d0
[ 31.022018] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.022797] kthread+0x24c/0x2d0
[ 31.023387] ret_from_fork+0x10/0x20
[ 31.023967]
[ 31.024365] The buggy address belongs to the object at fff00000c5d54b00
[ 31.024365] which belongs to the cache kmalloc-128 of size 128
[ 31.025679] The buggy address is located 0 bytes inside of
[ 31.025679] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[ 31.027007]
[ 31.027378] The buggy address belongs to the physical page:
[ 31.028078] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[ 31.029098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 31.029942] page_type: f5(slab)
[ 31.030474] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 31.031385] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 31.032257] page dumped because: kasan: bad access detected
[ 31.032954]
[ 31.033177] Memory state around the buggy address:
[ 31.033646] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 31.034903] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.035639] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 31.036287] ^
[ 31.037598] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.038491] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.039348] ==================================================================
---
[ 30.918083] ==================================================================
[ 30.919245] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[ 30.919977] Read of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[ 30.921395]
[ 30.921898] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.922819] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.923348] Hardware name: linux,dummy-virt (DT)
[ 30.923920] Call trace:
[ 30.924286] show_stack+0x20/0x38 (C)
[ 30.925394] dump_stack_lvl+0x8c/0xd0
[ 30.925818] print_report+0x118/0x5e0
[ 30.926500] kasan_report+0xc8/0x118
[ 30.927207] kasan_check_range+0x100/0x1a8
[ 30.927952] __kasan_check_read+0x20/0x30
[ 30.928653] copy_user_test_oob+0x3c8/0xec0
[ 30.929399] kunit_try_run_case+0x14c/0x3d0
[ 30.930128] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.930972] kthread+0x24c/0x2d0
[ 30.931618] ret_from_fork+0x10/0x20
[ 30.932350]
[ 30.932805] Allocated by task 274:
[ 30.933366] kasan_save_stack+0x3c/0x68
[ 30.934040] kasan_save_track+0x20/0x40
[ 30.934605] kasan_save_alloc_info+0x40/0x58
[ 30.935260] __kasan_kmalloc+0xd4/0xd8
[ 30.935819] __kmalloc_noprof+0x188/0x4c8
[ 30.936409] kunit_kmalloc_array+0x34/0x88
[ 30.936950] copy_user_test_oob+0xac/0xec0
[ 30.937634] kunit_try_run_case+0x14c/0x3d0
[ 30.938189] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.939023] kthread+0x24c/0x2d0
[ 30.939579] ret_from_fork+0x10/0x20
[ 30.940220]
[ 30.940625] The buggy address belongs to the object at fff00000c5d54b00
[ 30.940625] which belongs to the cache kmalloc-128 of size 128
[ 30.942181] The buggy address is located 0 bytes inside of
[ 30.942181] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[ 30.943621]
[ 30.944081] The buggy address belongs to the physical page:
[ 30.944873] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[ 30.945878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.946838] page_type: f5(slab)
[ 30.947327] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 30.948407] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 30.949384] page dumped because: kasan: bad access detected
[ 30.950229]
[ 30.950716] Memory state around the buggy address:
[ 30.951299] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.952068] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.953337] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 30.954043] ^
[ 30.954978] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.955930] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.956912] ==================================================================
---
[ 30.833952] ==================================================================
[ 30.834645] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[ 30.835354] Read of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[ 30.836903]
[ 30.837395] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.838498] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.839058] Hardware name: linux,dummy-virt (DT)
[ 30.839798] Call trace:
[ 30.840515] show_stack+0x20/0x38 (C)
[ 30.841252] dump_stack_lvl+0x8c/0xd0
[ 30.841932] print_report+0x118/0x5e0
[ 30.842618] kasan_report+0xc8/0x118
[ 30.843372] kasan_check_range+0x100/0x1a8
[ 30.844204] __kasan_check_read+0x20/0x30
[ 30.844781] copy_user_test_oob+0x728/0xec0
[ 30.845324] kunit_try_run_case+0x14c/0x3d0
[ 30.846195] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.846996] kthread+0x24c/0x2d0
[ 30.847820] ret_from_fork+0x10/0x20
[ 30.848527]
[ 30.848987] Allocated by task 274:
[ 30.849430] kasan_save_stack+0x3c/0x68
[ 30.850139] kasan_save_track+0x20/0x40
[ 30.850820] kasan_save_alloc_info+0x40/0x58
[ 30.851599] __kasan_kmalloc+0xd4/0xd8
[ 30.852018] __kmalloc_noprof+0x188/0x4c8
[ 30.853114] kunit_kmalloc_array+0x34/0x88
[ 30.853435] copy_user_test_oob+0xac/0xec0
[ 30.853670] kunit_try_run_case+0x14c/0x3d0
[ 30.854070] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.854891] kthread+0x24c/0x2d0
[ 30.855337] ret_from_fork+0x10/0x20
[ 30.856145]
[ 30.856842] The buggy address belongs to the object at fff00000c5d54b00
[ 30.856842] which belongs to the cache kmalloc-128 of size 128
[ 30.857933] The buggy address is located 0 bytes inside of
[ 30.857933] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[ 30.859885]
[ 30.860337] The buggy address belongs to the physical page:
[ 30.861177] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[ 30.862163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.863129] page_type: f5(slab)
[ 30.863556] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 30.864493] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 30.865269] page dumped because: kasan: bad access detected
[ 30.865941]
[ 30.866271] Memory state around the buggy address:
[ 30.866922] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.867922] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.868653] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 30.869485] ^
[ 30.870541] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.871562] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.872539] ==================================================================
Home
[ 30.958697] ==================================================================
[ 30.960012] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[ 30.960799] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[ 30.961463]
[ 30.962517] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.963430] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.964126] Hardware name: linux,dummy-virt (DT)
[ 30.964895] Call trace:
[ 30.965443] show_stack+0x20/0x38 (C)
[ 30.966188] dump_stack_lvl+0x8c/0xd0
[ 30.966895] print_report+0x118/0x5e0
[ 30.967589] kasan_report+0xc8/0x118
[ 30.968290] kasan_check_range+0x100/0x1a8
[ 30.968854] __kasan_check_write+0x20/0x30
[ 30.969396] copy_user_test_oob+0x434/0xec0
[ 30.969959] kunit_try_run_case+0x14c/0x3d0
[ 30.970504] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.971642] kthread+0x24c/0x2d0
[ 30.972298] ret_from_fork+0x10/0x20
[ 30.973003]
[ 30.973497] Allocated by task 274:
[ 30.974078] kasan_save_stack+0x3c/0x68
[ 30.974730] kasan_save_track+0x20/0x40
[ 30.975450] kasan_save_alloc_info+0x40/0x58
[ 30.976196] __kasan_kmalloc+0xd4/0xd8
[ 30.976889] __kmalloc_noprof+0x188/0x4c8
[ 30.977555] kunit_kmalloc_array+0x34/0x88
[ 30.978261] copy_user_test_oob+0xac/0xec0
[ 30.978999] kunit_try_run_case+0x14c/0x3d0
[ 30.979738] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.980578] kthread+0x24c/0x2d0
[ 30.981094] ret_from_fork+0x10/0x20
[ 30.981576]
[ 30.982262] The buggy address belongs to the object at fff00000c5d54b00
[ 30.982262] which belongs to the cache kmalloc-128 of size 128
[ 30.983767] The buggy address is located 0 bytes inside of
[ 30.983767] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[ 30.985239]
[ 30.985551] The buggy address belongs to the physical page:
[ 30.986230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[ 30.987372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.988271] page_type: f5(slab)
[ 30.988974] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 30.990009] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 30.990991] page dumped because: kasan: bad access detected
[ 30.991800]
[ 30.992291] Memory state around the buggy address:
[ 30.992846] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.993599] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.994666] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 30.995564] ^
[ 30.996515] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.997502] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.998455] ==================================================================
---
[ 30.784487] ==================================================================
[ 30.786190] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[ 30.786914] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[ 30.788680]
[ 30.789257] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.790350] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.791031] Hardware name: linux,dummy-virt (DT)
[ 30.791986] Call trace:
[ 30.792406] show_stack+0x20/0x38 (C)
[ 30.793111] dump_stack_lvl+0x8c/0xd0
[ 30.793803] print_report+0x118/0x5e0
[ 30.794482] kasan_report+0xc8/0x118
[ 30.795352] kasan_check_range+0x100/0x1a8
[ 30.795927] __kasan_check_write+0x20/0x30
[ 30.796467] copy_user_test_oob+0x234/0xec0
[ 30.797022] kunit_try_run_case+0x14c/0x3d0
[ 30.797563] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.798643] kthread+0x24c/0x2d0
[ 30.799772] ret_from_fork+0x10/0x20
[ 30.800173]
[ 30.800613] Allocated by task 274:
[ 30.801197] kasan_save_stack+0x3c/0x68
[ 30.801707] kasan_save_track+0x20/0x40
[ 30.802468] kasan_save_alloc_info+0x40/0x58
[ 30.803386] __kasan_kmalloc+0xd4/0xd8
[ 30.804082] __kmalloc_noprof+0x188/0x4c8
[ 30.805255] kunit_kmalloc_array+0x34/0x88
[ 30.805965] copy_user_test_oob+0xac/0xec0
[ 30.806652] kunit_try_run_case+0x14c/0x3d0
[ 30.807498] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.808439] kthread+0x24c/0x2d0
[ 30.809141] ret_from_fork+0x10/0x20
[ 30.809631]
[ 30.809954] The buggy address belongs to the object at fff00000c5d54b00
[ 30.809954] which belongs to the cache kmalloc-128 of size 128
[ 30.811820] The buggy address is located 0 bytes inside of
[ 30.811820] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[ 30.813260]
[ 30.813717] The buggy address belongs to the physical page:
[ 30.814467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[ 30.815689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.816593] page_type: f5(slab)
[ 30.817226] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 30.818223] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 30.819032] page dumped because: kasan: bad access detected
[ 30.820024]
[ 30.820470] Memory state around the buggy address:
[ 30.821174] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.822038] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.823818] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 30.824550] ^
[ 30.825489] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.826300] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.827257] ==================================================================
---
[ 30.880906] ==================================================================
[ 30.881729] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[ 30.882484] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[ 30.883189]
[ 30.883600] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.884670] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.885291] Hardware name: linux,dummy-virt (DT)
[ 30.885842] Call trace:
[ 30.886373] show_stack+0x20/0x38 (C)
[ 30.887108] dump_stack_lvl+0x8c/0xd0
[ 30.887778] print_report+0x118/0x5e0
[ 30.888480] kasan_report+0xc8/0x118
[ 30.889048] kasan_check_range+0x100/0x1a8
[ 30.889720] __kasan_check_write+0x20/0x30
[ 30.890384] copy_user_test_oob+0x35c/0xec0
[ 30.891060] kunit_try_run_case+0x14c/0x3d0
[ 30.891705] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.892444] kthread+0x24c/0x2d0
[ 30.892971] ret_from_fork+0x10/0x20
[ 30.893529]
[ 30.893834] Allocated by task 274:
[ 30.894355] kasan_save_stack+0x3c/0x68
[ 30.894960] kasan_save_track+0x20/0x40
[ 30.895561] kasan_save_alloc_info+0x40/0x58
[ 30.896185] __kasan_kmalloc+0xd4/0xd8
[ 30.896795] __kmalloc_noprof+0x188/0x4c8
[ 30.897399] kunit_kmalloc_array+0x34/0x88
[ 30.898025] copy_user_test_oob+0xac/0xec0
[ 30.898654] kunit_try_run_case+0x14c/0x3d0
[ 30.899286] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.900015] kthread+0x24c/0x2d0
[ 30.900546] ret_from_fork+0x10/0x20
[ 30.901121]
[ 30.901468] The buggy address belongs to the object at fff00000c5d54b00
[ 30.901468] which belongs to the cache kmalloc-128 of size 128
[ 30.902831] The buggy address is located 0 bytes inside of
[ 30.902831] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[ 30.904156]
[ 30.904527] The buggy address belongs to the physical page:
[ 30.905303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[ 30.906205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.907087] page_type: f5(slab)
[ 30.907678] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 30.908595] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 30.909427] page dumped because: kasan: bad access detected
[ 30.910162]
[ 30.910513] Memory state around the buggy address:
[ 30.911174] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 30.912008] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.912870] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 30.913683] ^
[ 30.914510] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.915358] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.916171] ==================================================================
Home
[ 29.442210] ==================================================================
[ 29.443300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[ 29.444231] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.445237]
[ 29.445691] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.446856] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.447475] Hardware name: linux,dummy-virt (DT)
[ 29.448149] Call trace:
[ 29.448626] show_stack+0x20/0x38 (C)
[ 29.449279] dump_stack_lvl+0x8c/0xd0
[ 29.449946] print_report+0x118/0x5e0
[ 29.450595] kasan_report+0xc8/0x118
[ 29.451249] kasan_check_range+0x100/0x1a8
[ 29.451908] __kasan_check_read+0x20/0x30
[ 29.452580] kasan_atomics_helper+0xdd4/0x4858
[ 29.453288] kasan_atomics+0x198/0x2e8
[ 29.453803] kunit_try_run_case+0x14c/0x3d0
[ 29.454326] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.454973] kthread+0x24c/0x2d0
[ 29.455597] ret_from_fork+0x10/0x20
[ 29.456229]
[ 29.456588] Allocated by task 254:
[ 29.457187] kasan_save_stack+0x3c/0x68
[ 29.457858] kasan_save_track+0x20/0x40
[ 29.458407] kasan_save_alloc_info+0x40/0x58
[ 29.459128] __kasan_kmalloc+0xd4/0xd8
[ 29.459649] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.460362] kasan_atomics+0xb8/0x2e8
[ 29.460960] kunit_try_run_case+0x14c/0x3d0
[ 29.461571] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.462278] kthread+0x24c/0x2d0
[ 29.462837] ret_from_fork+0x10/0x20
[ 29.463377]
[ 29.463798] The buggy address belongs to the object at fff00000c5d53180
[ 29.463798] which belongs to the cache kmalloc-64 of size 64
[ 29.465146] The buggy address is located 0 bytes to the right of
[ 29.465146] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.466506]
[ 29.466836] The buggy address belongs to the physical page:
[ 29.467579] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.468519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.469321] page_type: f5(slab)
[ 29.469865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.470764] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.471609] page dumped because: kasan: bad access detected
[ 29.472275]
[ 29.472605] Memory state around the buggy address:
[ 29.473247] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.474138] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.475018] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.475831] ^
[ 29.476467] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.477312] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.478126] ==================================================================
---
[ 28.252662] ==================================================================
[ 28.253419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[ 28.254298] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.255506]
[ 28.255891] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.256821] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.257300] Hardware name: linux,dummy-virt (DT)
[ 28.258887] Call trace:
[ 28.259205] show_stack+0x20/0x38 (C)
[ 28.260197] dump_stack_lvl+0x8c/0xd0
[ 28.260983] print_report+0x118/0x5e0
[ 28.261551] kasan_report+0xc8/0x118
[ 28.262001] kasan_check_range+0x100/0x1a8
[ 28.262696] __kasan_check_read+0x20/0x30
[ 28.263727] kasan_atomics_helper+0x2b0/0x4858
[ 28.264346] kasan_atomics+0x198/0x2e8
[ 28.264994] kunit_try_run_case+0x14c/0x3d0
[ 28.265663] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.266437] kthread+0x24c/0x2d0
[ 28.267112] ret_from_fork+0x10/0x20
[ 28.267669]
[ 28.268027] Allocated by task 254:
[ 28.268609] kasan_save_stack+0x3c/0x68
[ 28.269283] kasan_save_track+0x20/0x40
[ 28.269868] kasan_save_alloc_info+0x40/0x58
[ 28.270509] __kasan_kmalloc+0xd4/0xd8
[ 28.271198] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.271858] kasan_atomics+0xb8/0x2e8
[ 28.272379] kunit_try_run_case+0x14c/0x3d0
[ 28.273094] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.273887] kthread+0x24c/0x2d0
[ 28.274408] ret_from_fork+0x10/0x20
[ 28.274969]
[ 28.275319] The buggy address belongs to the object at fff00000c5d53180
[ 28.275319] which belongs to the cache kmalloc-64 of size 64
[ 28.276759] The buggy address is located 0 bytes to the right of
[ 28.276759] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.278024]
[ 28.278356] The buggy address belongs to the physical page:
[ 28.279042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.280655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.281410] page_type: f5(slab)
[ 28.282150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.283321] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.284386] page dumped because: kasan: bad access detected
[ 28.285295]
[ 28.285610] Memory state around the buggy address:
[ 28.286390] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.287391] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.288555] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.289277] ^
[ 28.289954] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.290934] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.292059] ==================================================================
---
[ 28.168361] ==================================================================
[ 28.169061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[ 28.170922] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.171342]
[ 28.171600] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.172985] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.173786] Hardware name: linux,dummy-virt (DT)
[ 28.174359] Call trace:
[ 28.174877] show_stack+0x20/0x38 (C)
[ 28.175732] dump_stack_lvl+0x8c/0xd0
[ 28.176446] print_report+0x118/0x5e0
[ 28.177158] kasan_report+0xc8/0x118
[ 28.177789] kasan_check_range+0x100/0x1a8
[ 28.178495] __kasan_check_read+0x20/0x30
[ 28.179430] kasan_atomics_helper+0x1ec/0x4858
[ 28.180172] kasan_atomics+0x198/0x2e8
[ 28.180882] kunit_try_run_case+0x14c/0x3d0
[ 28.181418] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.182153] kthread+0x24c/0x2d0
[ 28.182819] ret_from_fork+0x10/0x20
[ 28.183402]
[ 28.184145] Allocated by task 254:
[ 28.184914] kasan_save_stack+0x3c/0x68
[ 28.185490] kasan_save_track+0x20/0x40
[ 28.186000] kasan_save_alloc_info+0x40/0x58
[ 28.186499] __kasan_kmalloc+0xd4/0xd8
[ 28.187234] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.188031] kasan_atomics+0xb8/0x2e8
[ 28.188673] kunit_try_run_case+0x14c/0x3d0
[ 28.189573] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.190263] kthread+0x24c/0x2d0
[ 28.191913] ret_from_fork+0x10/0x20
[ 28.192869]
[ 28.193416] The buggy address belongs to the object at fff00000c5d53180
[ 28.193416] which belongs to the cache kmalloc-64 of size 64
[ 28.194627] The buggy address is located 0 bytes to the right of
[ 28.194627] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.196511]
[ 28.196996] The buggy address belongs to the physical page:
[ 28.197755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.198615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.199807] page_type: f5(slab)
[ 28.200331] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.201269] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.202146] page dumped because: kasan: bad access detected
[ 28.202841]
[ 28.203233] Memory state around the buggy address:
[ 28.203673] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.205555] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.206310] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.207352] ^
[ 28.208164] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.208782] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.210320] ==================================================================
Home
[ 28.669299] ==================================================================
[ 28.670464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[ 28.671549] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.672608]
[ 28.673056] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.674226] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.674822] Hardware name: linux,dummy-virt (DT)
[ 28.675505] Call trace:
[ 28.675964] show_stack+0x20/0x38 (C)
[ 28.676632] dump_stack_lvl+0x8c/0xd0
[ 28.677239] print_report+0x118/0x5e0
[ 28.677757] kasan_report+0xc8/0x118
[ 28.678241] kasan_check_range+0x100/0x1a8
[ 28.678826] __kasan_check_write+0x20/0x30
[ 28.679535] kasan_atomics_helper+0x61c/0x4858
[ 28.680286] kasan_atomics+0x198/0x2e8
[ 28.680885] kunit_try_run_case+0x14c/0x3d0
[ 28.681504] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.682061] kthread+0x24c/0x2d0
[ 28.682430] ret_from_fork+0x10/0x20
[ 28.683365]
[ 28.683633] Allocated by task 254:
[ 28.684598] kasan_save_stack+0x3c/0x68
[ 28.685134] kasan_save_track+0x20/0x40
[ 28.685680] kasan_save_alloc_info+0x40/0x58
[ 28.686309] __kasan_kmalloc+0xd4/0xd8
[ 28.686848] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.687395] kasan_atomics+0xb8/0x2e8
[ 28.687911] kunit_try_run_case+0x14c/0x3d0
[ 28.688413] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.689116] kthread+0x24c/0x2d0
[ 28.689580] ret_from_fork+0x10/0x20
[ 28.690147]
[ 28.690507] The buggy address belongs to the object at fff00000c5d53180
[ 28.690507] which belongs to the cache kmalloc-64 of size 64
[ 28.691805] The buggy address is located 0 bytes to the right of
[ 28.691805] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.693057]
[ 28.693430] The buggy address belongs to the physical page:
[ 28.694044] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.694964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.695731] page_type: f5(slab)
[ 28.696210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.697043] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.697830] page dumped because: kasan: bad access detected
[ 28.698466]
[ 28.698823] Memory state around the buggy address:
[ 28.699424] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.700198] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.700972] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.701831] ^
[ 28.702465] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.703233] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.704039] ==================================================================
---
[ 28.817251] ==================================================================
[ 28.817986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[ 28.819046] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.819954]
[ 28.820326] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.821529] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.822113] Hardware name: linux,dummy-virt (DT)
[ 28.822708] Call trace:
[ 28.823162] show_stack+0x20/0x38 (C)
[ 28.823776] dump_stack_lvl+0x8c/0xd0
[ 28.824501] print_report+0x118/0x5e0
[ 28.825102] kasan_report+0xc8/0x118
[ 28.825796] kasan_check_range+0x100/0x1a8
[ 28.826488] __kasan_check_write+0x20/0x30
[ 28.827160] kasan_atomics_helper+0x7cc/0x4858
[ 28.827810] kasan_atomics+0x198/0x2e8
[ 28.828451] kunit_try_run_case+0x14c/0x3d0
[ 28.829113] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.829869] kthread+0x24c/0x2d0
[ 28.830431] ret_from_fork+0x10/0x20
[ 28.831055]
[ 28.831400] Allocated by task 254:
[ 28.831935] kasan_save_stack+0x3c/0x68
[ 28.832569] kasan_save_track+0x20/0x40
[ 28.833148] kasan_save_alloc_info+0x40/0x58
[ 28.833771] __kasan_kmalloc+0xd4/0xd8
[ 28.834341] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.835001] kasan_atomics+0xb8/0x2e8
[ 28.835565] kunit_try_run_case+0x14c/0x3d0
[ 28.836192] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.836890] kthread+0x24c/0x2d0
[ 28.837353] ret_from_fork+0x10/0x20
[ 28.837909]
[ 28.838244] The buggy address belongs to the object at fff00000c5d53180
[ 28.838244] which belongs to the cache kmalloc-64 of size 64
[ 28.839564] The buggy address is located 0 bytes to the right of
[ 28.839564] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.840911]
[ 28.841312] The buggy address belongs to the physical page:
[ 28.841975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.843047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.843885] page_type: f5(slab)
[ 28.844351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.845347] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.846217] page dumped because: kasan: bad access detected
[ 28.846925]
[ 28.847254] Memory state around the buggy address:
[ 28.847952] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.848789] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.849690] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.850502] ^
[ 28.851159] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.852015] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.852821] ==================================================================
---
[ 29.369036] ==================================================================
[ 29.369999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[ 29.370761] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.371576]
[ 29.371839] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.372633] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.373028] Hardware name: linux,dummy-virt (DT)
[ 29.373608] Call trace:
[ 29.373966] show_stack+0x20/0x38 (C)
[ 29.374440] dump_stack_lvl+0x8c/0xd0
[ 29.375065] print_report+0x118/0x5e0
[ 29.375640] kasan_report+0xc8/0x118
[ 29.376230] kasan_check_range+0x100/0x1a8
[ 29.376965] __kasan_check_write+0x20/0x30
[ 29.377588] kasan_atomics_helper+0xd3c/0x4858
[ 29.378185] kasan_atomics+0x198/0x2e8
[ 29.378701] kunit_try_run_case+0x14c/0x3d0
[ 29.379361] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.380045] kthread+0x24c/0x2d0
[ 29.380484] ret_from_fork+0x10/0x20
[ 29.381149]
[ 29.381473] Allocated by task 254:
[ 29.382013] kasan_save_stack+0x3c/0x68
[ 29.382584] kasan_save_track+0x20/0x40
[ 29.383166] kasan_save_alloc_info+0x40/0x58
[ 29.383759] __kasan_kmalloc+0xd4/0xd8
[ 29.384271] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.384823] kasan_atomics+0xb8/0x2e8
[ 29.385409] kunit_try_run_case+0x14c/0x3d0
[ 29.385979] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.386648] kthread+0x24c/0x2d0
[ 29.387162] ret_from_fork+0x10/0x20
[ 29.387733]
[ 29.388077] The buggy address belongs to the object at fff00000c5d53180
[ 29.388077] which belongs to the cache kmalloc-64 of size 64
[ 29.389267] The buggy address is located 0 bytes to the right of
[ 29.389267] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.390512]
[ 29.390910] The buggy address belongs to the physical page:
[ 29.391533] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.392382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.393146] page_type: f5(slab)
[ 29.393647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.394486] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.395341] page dumped because: kasan: bad access detected
[ 29.395948]
[ 29.396275] Memory state around the buggy address:
[ 29.396872] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.397631] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.398455] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.399241] ^
[ 29.399886] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.400624] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.401409] ==================================================================
---
[ 29.900908] ==================================================================
[ 29.901642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[ 29.903085] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.904218]
[ 29.904782] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.905736] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.906459] Hardware name: linux,dummy-virt (DT)
[ 29.907192] Call trace:
[ 29.907692] show_stack+0x20/0x38 (C)
[ 29.908413] dump_stack_lvl+0x8c/0xd0
[ 29.909072] print_report+0x118/0x5e0
[ 29.909756] kasan_report+0xc8/0x118
[ 29.910280] kasan_check_range+0x100/0x1a8
[ 29.910857] __kasan_check_write+0x20/0x30
[ 29.911429] kasan_atomics_helper+0x11f8/0x4858
[ 29.912384] kasan_atomics+0x198/0x2e8
[ 29.913099] kunit_try_run_case+0x14c/0x3d0
[ 29.913819] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.914646] kthread+0x24c/0x2d0
[ 29.915301] ret_from_fork+0x10/0x20
[ 29.915975]
[ 29.916448] Allocated by task 254:
[ 29.917062] kasan_save_stack+0x3c/0x68
[ 29.917722] kasan_save_track+0x20/0x40
[ 29.918405] kasan_save_alloc_info+0x40/0x58
[ 29.919123] __kasan_kmalloc+0xd4/0xd8
[ 29.919779] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.920502] kasan_atomics+0xb8/0x2e8
[ 29.921148] kunit_try_run_case+0x14c/0x3d0
[ 29.921690] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.922350] kthread+0x24c/0x2d0
[ 29.923123] ret_from_fork+0x10/0x20
[ 29.923763]
[ 29.924208] The buggy address belongs to the object at fff00000c5d53180
[ 29.924208] which belongs to the cache kmalloc-64 of size 64
[ 29.925776] The buggy address is located 0 bytes to the right of
[ 29.925776] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.927093]
[ 29.927567] The buggy address belongs to the physical page:
[ 29.928336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.929314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.930064] page_type: f5(slab)
[ 29.930518] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.931324] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.932402] page dumped because: kasan: bad access detected
[ 29.933170]
[ 29.933657] Memory state around the buggy address:
[ 29.934375] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.935301] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.936220] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.937128] ^
[ 29.937860] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.938814] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.939699] ==================================================================
---
[ 30.447263] ==================================================================
[ 30.447920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[ 30.448686] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.450096]
[ 30.450405] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.451492] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.452024] Hardware name: linux,dummy-virt (DT)
[ 30.452589] Call trace:
[ 30.452976] show_stack+0x20/0x38 (C)
[ 30.453508] dump_stack_lvl+0x8c/0xd0
[ 30.454192] print_report+0x118/0x5e0
[ 30.454733] kasan_report+0xc8/0x118
[ 30.455254] kasan_check_range+0x100/0x1a8
[ 30.455899] __kasan_check_write+0x20/0x30
[ 30.456444] kasan_atomics_helper+0x175c/0x4858
[ 30.457062] kasan_atomics+0x198/0x2e8
[ 30.457597] kunit_try_run_case+0x14c/0x3d0
[ 30.458588] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.459441] kthread+0x24c/0x2d0
[ 30.460095] ret_from_fork+0x10/0x20
[ 30.460631]
[ 30.460954] Allocated by task 254:
[ 30.461489] kasan_save_stack+0x3c/0x68
[ 30.461961] kasan_save_track+0x20/0x40
[ 30.462518] kasan_save_alloc_info+0x40/0x58
[ 30.463127] __kasan_kmalloc+0xd4/0xd8
[ 30.463720] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.464307] kasan_atomics+0xb8/0x2e8
[ 30.464856] kunit_try_run_case+0x14c/0x3d0
[ 30.465448] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.466144] kthread+0x24c/0x2d0
[ 30.466609] ret_from_fork+0x10/0x20
[ 30.467262]
[ 30.467554] The buggy address belongs to the object at fff00000c5d53180
[ 30.467554] which belongs to the cache kmalloc-64 of size 64
[ 30.468760] The buggy address is located 0 bytes to the right of
[ 30.468760] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.470022]
[ 30.470352] The buggy address belongs to the physical page:
[ 30.471047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.472042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.472790] page_type: f5(slab)
[ 30.473287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.474099] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.474947] page dumped because: kasan: bad access detected
[ 30.475551]
[ 30.475927] Memory state around the buggy address:
[ 30.476475] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.477227] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.477986] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.478859] ^
[ 30.479414] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.480242] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.481034] ==================================================================
---
[ 29.143326] ==================================================================
[ 29.144135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[ 29.144896] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.145554]
[ 29.145958] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.146921] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.147439] Hardware name: linux,dummy-virt (DT)
[ 29.148032] Call trace:
[ 29.148456] show_stack+0x20/0x38 (C)
[ 29.149080] dump_stack_lvl+0x8c/0xd0
[ 29.149676] print_report+0x118/0x5e0
[ 29.150264] kasan_report+0xc8/0x118
[ 29.150875] kasan_check_range+0x100/0x1a8
[ 29.151443] __kasan_check_write+0x20/0x30
[ 29.152091] kasan_atomics_helper+0xb70/0x4858
[ 29.152692] kasan_atomics+0x198/0x2e8
[ 29.153258] kunit_try_run_case+0x14c/0x3d0
[ 29.153886] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.154616] kthread+0x24c/0x2d0
[ 29.155196] ret_from_fork+0x10/0x20
[ 29.155704]
[ 29.156048] Allocated by task 254:
[ 29.156503] kasan_save_stack+0x3c/0x68
[ 29.157123] kasan_save_track+0x20/0x40
[ 29.157621] kasan_save_alloc_info+0x40/0x58
[ 29.158180] __kasan_kmalloc+0xd4/0xd8
[ 29.158697] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.159418] kasan_atomics+0xb8/0x2e8
[ 29.159911] kunit_try_run_case+0x14c/0x3d0
[ 29.160505] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.161141] kthread+0x24c/0x2d0
[ 29.161711] ret_from_fork+0x10/0x20
[ 29.162225]
[ 29.162508] The buggy address belongs to the object at fff00000c5d53180
[ 29.162508] which belongs to the cache kmalloc-64 of size 64
[ 29.163686] The buggy address is located 0 bytes to the right of
[ 29.163686] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.165038]
[ 29.165377] The buggy address belongs to the physical page:
[ 29.166071] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.166888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.167688] page_type: f5(slab)
[ 29.168153] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.169103] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.169899] page dumped because: kasan: bad access detected
[ 29.170578]
[ 29.170899] Memory state around the buggy address:
[ 29.171469] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.172243] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.173016] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.173833] ^
[ 29.174463] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.175200] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.176045] ==================================================================
---
[ 28.999916] ==================================================================
[ 29.000671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[ 29.001459] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.002225]
[ 29.002575] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.003524] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.004252] Hardware name: linux,dummy-virt (DT)
[ 29.004776] Call trace:
[ 29.005144] show_stack+0x20/0x38 (C)
[ 29.005637] dump_stack_lvl+0x8c/0xd0
[ 29.006208] print_report+0x118/0x5e0
[ 29.006673] kasan_report+0xc8/0x118
[ 29.007221] kasan_check_range+0x100/0x1a8
[ 29.007793] __kasan_check_write+0x20/0x30
[ 29.008454] kasan_atomics_helper+0xa04/0x4858
[ 29.009046] kasan_atomics+0x198/0x2e8
[ 29.009779] kunit_try_run_case+0x14c/0x3d0
[ 29.010472] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.011183] kthread+0x24c/0x2d0
[ 29.011822] ret_from_fork+0x10/0x20
[ 29.012457]
[ 29.012841] Allocated by task 254:
[ 29.013355] kasan_save_stack+0x3c/0x68
[ 29.013961] kasan_save_track+0x20/0x40
[ 29.014524] kasan_save_alloc_info+0x40/0x58
[ 29.015152] __kasan_kmalloc+0xd4/0xd8
[ 29.015699] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.016385] kasan_atomics+0xb8/0x2e8
[ 29.016860] kunit_try_run_case+0x14c/0x3d0
[ 29.017541] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.018299] kthread+0x24c/0x2d0
[ 29.018850] ret_from_fork+0x10/0x20
[ 29.019369]
[ 29.019728] The buggy address belongs to the object at fff00000c5d53180
[ 29.019728] which belongs to the cache kmalloc-64 of size 64
[ 29.021242] The buggy address is located 0 bytes to the right of
[ 29.021242] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.023051]
[ 29.023494] The buggy address belongs to the physical page:
[ 29.024128] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.024951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.025795] page_type: f5(slab)
[ 29.026258] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.027139] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.027999] page dumped because: kasan: bad access detected
[ 29.028651]
[ 29.028953] Memory state around the buggy address:
[ 29.029486] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.030323] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.031102] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.031919] ^
[ 29.032499] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.033346] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.034118] ==================================================================
---
[ 28.420504] ==================================================================
[ 28.421335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[ 28.422121] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.422996]
[ 28.423389] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.424710] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.425422] Hardware name: linux,dummy-virt (DT)
[ 28.426412] Call trace:
[ 28.426921] show_stack+0x20/0x38 (C)
[ 28.428024] dump_stack_lvl+0x8c/0xd0
[ 28.428844] print_report+0x118/0x5e0
[ 28.429625] kasan_report+0xc8/0x118
[ 28.430296] kasan_check_range+0x100/0x1a8
[ 28.430791] __kasan_check_write+0x20/0x30
[ 28.431892] kasan_atomics_helper+0x3ac/0x4858
[ 28.432803] kasan_atomics+0x198/0x2e8
[ 28.433309] kunit_try_run_case+0x14c/0x3d0
[ 28.433854] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.434506] kthread+0x24c/0x2d0
[ 28.435431] ret_from_fork+0x10/0x20
[ 28.435928]
[ 28.436194] Allocated by task 254:
[ 28.437253] kasan_save_stack+0x3c/0x68
[ 28.437933] kasan_save_track+0x20/0x40
[ 28.438518] kasan_save_alloc_info+0x40/0x58
[ 28.439335] __kasan_kmalloc+0xd4/0xd8
[ 28.440085] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.440727] kasan_atomics+0xb8/0x2e8
[ 28.441340] kunit_try_run_case+0x14c/0x3d0
[ 28.441968] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.442735] kthread+0x24c/0x2d0
[ 28.444578] ret_from_fork+0x10/0x20
[ 28.444975]
[ 28.445340] The buggy address belongs to the object at fff00000c5d53180
[ 28.445340] which belongs to the cache kmalloc-64 of size 64
[ 28.446641] The buggy address is located 0 bytes to the right of
[ 28.446641] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.448530]
[ 28.449313] The buggy address belongs to the physical page:
[ 28.449870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.450989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.452103] page_type: f5(slab)
[ 28.452608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.453493] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.454390] page dumped because: kasan: bad access detected
[ 28.455304]
[ 28.455631] Memory state around the buggy address:
[ 28.456137] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.456831] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.457385] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.458821] ^
[ 28.459607] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.460378] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.461420] ==================================================================
---
[ 29.290796] ==================================================================
[ 29.291627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[ 29.293150] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.293919]
[ 29.294160] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.295693] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.296499] Hardware name: linux,dummy-virt (DT)
[ 29.297172] Call trace:
[ 29.297556] show_stack+0x20/0x38 (C)
[ 29.298327] dump_stack_lvl+0x8c/0xd0
[ 29.299017] print_report+0x118/0x5e0
[ 29.299671] kasan_report+0xc8/0x118
[ 29.300366] kasan_check_range+0x100/0x1a8
[ 29.301107] __kasan_check_write+0x20/0x30
[ 29.301828] kasan_atomics_helper+0xca0/0x4858
[ 29.302391] kasan_atomics+0x198/0x2e8
[ 29.303129] kunit_try_run_case+0x14c/0x3d0
[ 29.303775] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.304586] kthread+0x24c/0x2d0
[ 29.305242] ret_from_fork+0x10/0x20
[ 29.305964]
[ 29.306405] Allocated by task 254:
[ 29.306960] kasan_save_stack+0x3c/0x68
[ 29.307421] kasan_save_track+0x20/0x40
[ 29.308698] kasan_save_alloc_info+0x40/0x58
[ 29.309135] __kasan_kmalloc+0xd4/0xd8
[ 29.309595] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.311229] kasan_atomics+0xb8/0x2e8
[ 29.311987] kunit_try_run_case+0x14c/0x3d0
[ 29.313085] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.314115] kthread+0x24c/0x2d0
[ 29.314495] ret_from_fork+0x10/0x20
[ 29.314930]
[ 29.315192] The buggy address belongs to the object at fff00000c5d53180
[ 29.315192] which belongs to the cache kmalloc-64 of size 64
[ 29.316913] The buggy address is located 0 bytes to the right of
[ 29.316913] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.318471]
[ 29.318795] The buggy address belongs to the physical page:
[ 29.319430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.320606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.321473] page_type: f5(slab)
[ 29.322104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.323121] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.324106] page dumped because: kasan: bad access detected
[ 29.324718]
[ 29.325033] Memory state around the buggy address:
[ 29.325595] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.326798] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.327736] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.328710] ^
[ 29.329524] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.330407] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.331263] ==================================================================
---
[ 28.705600] ==================================================================
[ 28.706376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[ 28.707285] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.708579]
[ 28.708943] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.710027] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.710737] Hardware name: linux,dummy-virt (DT)
[ 28.711393] Call trace:
[ 28.711841] show_stack+0x20/0x38 (C)
[ 28.712415] dump_stack_lvl+0x8c/0xd0
[ 28.712975] print_report+0x118/0x5e0
[ 28.713517] kasan_report+0xc8/0x118
[ 28.714044] kasan_check_range+0x100/0x1a8
[ 28.714700] __kasan_check_write+0x20/0x30
[ 28.715246] kasan_atomics_helper+0x684/0x4858
[ 28.715991] kasan_atomics+0x198/0x2e8
[ 28.716551] kunit_try_run_case+0x14c/0x3d0
[ 28.717176] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.717808] kthread+0x24c/0x2d0
[ 28.718378] ret_from_fork+0x10/0x20
[ 28.718944]
[ 28.719280] Allocated by task 254:
[ 28.719779] kasan_save_stack+0x3c/0x68
[ 28.720290] kasan_save_track+0x20/0x40
[ 28.720927] kasan_save_alloc_info+0x40/0x58
[ 28.721506] __kasan_kmalloc+0xd4/0xd8
[ 28.722058] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.722688] kasan_atomics+0xb8/0x2e8
[ 28.723313] kunit_try_run_case+0x14c/0x3d0
[ 28.723888] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.724698] kthread+0x24c/0x2d0
[ 28.725194] ret_from_fork+0x10/0x20
[ 28.725833]
[ 28.726164] The buggy address belongs to the object at fff00000c5d53180
[ 28.726164] which belongs to the cache kmalloc-64 of size 64
[ 28.727462] The buggy address is located 0 bytes to the right of
[ 28.727462] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.728773]
[ 28.729139] The buggy address belongs to the physical page:
[ 28.729839] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.730663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.731517] page_type: f5(slab)
[ 28.732009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.732914] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.733664] page dumped because: kasan: bad access detected
[ 28.734323]
[ 28.734668] Memory state around the buggy address:
[ 28.735295] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.736032] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.736910] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.737656] ^
[ 28.738567] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.739514] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.740424] ==================================================================
---
[ 28.963435] ==================================================================
[ 28.964151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[ 28.966261] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.967290]
[ 28.967649] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.968514] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.969094] Hardware name: linux,dummy-virt (DT)
[ 28.969669] Call trace:
[ 28.970069] show_stack+0x20/0x38 (C)
[ 28.970623] dump_stack_lvl+0x8c/0xd0
[ 28.971205] print_report+0x118/0x5e0
[ 28.971822] kasan_report+0xc8/0x118
[ 28.972417] kasan_check_range+0x100/0x1a8
[ 28.972997] __kasan_check_write+0x20/0x30
[ 28.973558] kasan_atomics_helper+0x99c/0x4858
[ 28.974141] kasan_atomics+0x198/0x2e8
[ 28.974773] kunit_try_run_case+0x14c/0x3d0
[ 28.975331] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.976046] kthread+0x24c/0x2d0
[ 28.976612] ret_from_fork+0x10/0x20
[ 28.977149]
[ 28.977526] Allocated by task 254:
[ 28.978005] kasan_save_stack+0x3c/0x68
[ 28.978511] kasan_save_track+0x20/0x40
[ 28.979127] kasan_save_alloc_info+0x40/0x58
[ 28.979724] __kasan_kmalloc+0xd4/0xd8
[ 28.980275] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.980932] kasan_atomics+0xb8/0x2e8
[ 28.981446] kunit_try_run_case+0x14c/0x3d0
[ 28.981992] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.982816] kthread+0x24c/0x2d0
[ 28.983247] ret_from_fork+0x10/0x20
[ 28.983794]
[ 28.984138] The buggy address belongs to the object at fff00000c5d53180
[ 28.984138] which belongs to the cache kmalloc-64 of size 64
[ 28.985250] The buggy address is located 0 bytes to the right of
[ 28.985250] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.986564]
[ 28.986907] The buggy address belongs to the physical page:
[ 28.987639] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.988444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.989299] page_type: f5(slab)
[ 28.989735] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.990695] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.991560] page dumped because: kasan: bad access detected
[ 28.992152]
[ 28.992489] Memory state around the buggy address:
[ 28.993060] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.993879] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.994688] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.995536] ^
[ 28.996128] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.996942] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.997762] ==================================================================
---
[ 29.517398] ==================================================================
[ 29.518727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[ 29.519540] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.520584]
[ 29.520906] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.522063] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.522840] Hardware name: linux,dummy-virt (DT)
[ 29.523461] Call trace:
[ 29.524011] show_stack+0x20/0x38 (C)
[ 29.524672] dump_stack_lvl+0x8c/0xd0
[ 29.525384] print_report+0x118/0x5e0
[ 29.526041] kasan_report+0xc8/0x118
[ 29.526696] kasan_check_range+0x100/0x1a8
[ 29.527419] __kasan_check_write+0x20/0x30
[ 29.528122] kasan_atomics_helper+0xe44/0x4858
[ 29.528852] kasan_atomics+0x198/0x2e8
[ 29.529527] kunit_try_run_case+0x14c/0x3d0
[ 29.530250] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.531046] kthread+0x24c/0x2d0
[ 29.531647] ret_from_fork+0x10/0x20
[ 29.532326]
[ 29.532821] Allocated by task 254:
[ 29.533395] kasan_save_stack+0x3c/0x68
[ 29.534046] kasan_save_track+0x20/0x40
[ 29.534695] kasan_save_alloc_info+0x40/0x58
[ 29.535297] __kasan_kmalloc+0xd4/0xd8
[ 29.536072] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.536805] kasan_atomics+0xb8/0x2e8
[ 29.537309] kunit_try_run_case+0x14c/0x3d0
[ 29.538093] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.538870] kthread+0x24c/0x2d0
[ 29.539466] ret_from_fork+0x10/0x20
[ 29.540170]
[ 29.540482] The buggy address belongs to the object at fff00000c5d53180
[ 29.540482] which belongs to the cache kmalloc-64 of size 64
[ 29.541707] The buggy address is located 0 bytes to the right of
[ 29.541707] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.543641]
[ 29.544153] The buggy address belongs to the physical page:
[ 29.544923] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.545906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.546703] page_type: f5(slab)
[ 29.547244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.548209] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.549091] page dumped because: kasan: bad access detected
[ 29.549759]
[ 29.550098] Memory state around the buggy address:
[ 29.550760] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.551509] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.552414] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.553221] ^
[ 29.553854] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.554707] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.555527] ==================================================================
---
[ 29.214098] ==================================================================
[ 29.214762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[ 29.215684] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.216802]
[ 29.217539] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.218529] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.219327] Hardware name: linux,dummy-virt (DT)
[ 29.220055] Call trace:
[ 29.220503] show_stack+0x20/0x38 (C)
[ 29.221058] dump_stack_lvl+0x8c/0xd0
[ 29.221649] print_report+0x118/0x5e0
[ 29.222192] kasan_report+0xc8/0x118
[ 29.222786] kasan_check_range+0x100/0x1a8
[ 29.223424] __kasan_check_write+0x20/0x30
[ 29.224001] kasan_atomics_helper+0xc08/0x4858
[ 29.224606] kasan_atomics+0x198/0x2e8
[ 29.225185] kunit_try_run_case+0x14c/0x3d0
[ 29.225717] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.226446] kthread+0x24c/0x2d0
[ 29.226987] ret_from_fork+0x10/0x20
[ 29.227554]
[ 29.227906] Allocated by task 254:
[ 29.228380] kasan_save_stack+0x3c/0x68
[ 29.228919] kasan_save_track+0x20/0x40
[ 29.229368] kasan_save_alloc_info+0x40/0x58
[ 29.230003] __kasan_kmalloc+0xd4/0xd8
[ 29.230514] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.231124] kasan_atomics+0xb8/0x2e8
[ 29.231668] kunit_try_run_case+0x14c/0x3d0
[ 29.232264] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.233196] kthread+0x24c/0x2d0
[ 29.233607] ret_from_fork+0x10/0x20
[ 29.234372]
[ 29.234876] The buggy address belongs to the object at fff00000c5d53180
[ 29.234876] which belongs to the cache kmalloc-64 of size 64
[ 29.236047] The buggy address is located 0 bytes to the right of
[ 29.236047] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.237309]
[ 29.237618] The buggy address belongs to the physical page:
[ 29.238295] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.239185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.239936] page_type: f5(slab)
[ 29.240459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.241342] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.242144] page dumped because: kasan: bad access detected
[ 29.242805]
[ 29.243114] Memory state around the buggy address:
[ 29.243693] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.244423] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.245253] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.246074] ^
[ 29.246657] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.247494] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.248252] ==================================================================
---
[ 29.036397] ==================================================================
[ 29.037058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[ 29.037673] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.039462]
[ 29.039726] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.040659] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.041249] Hardware name: linux,dummy-virt (DT)
[ 29.041841] Call trace:
[ 29.042238] show_stack+0x20/0x38 (C)
[ 29.042902] dump_stack_lvl+0x8c/0xd0
[ 29.043511] print_report+0x118/0x5e0
[ 29.044115] kasan_report+0xc8/0x118
[ 29.044642] kasan_check_range+0x100/0x1a8
[ 29.045242] __kasan_check_write+0x20/0x30
[ 29.045839] kasan_atomics_helper+0xa6c/0x4858
[ 29.046382] kasan_atomics+0x198/0x2e8
[ 29.047025] kunit_try_run_case+0x14c/0x3d0
[ 29.047651] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.048422] kthread+0x24c/0x2d0
[ 29.049016] ret_from_fork+0x10/0x20
[ 29.049567]
[ 29.049889] Allocated by task 254:
[ 29.050368] kasan_save_stack+0x3c/0x68
[ 29.050953] kasan_save_track+0x20/0x40
[ 29.051445] kasan_save_alloc_info+0x40/0x58
[ 29.052115] __kasan_kmalloc+0xd4/0xd8
[ 29.052639] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.053358] kasan_atomics+0xb8/0x2e8
[ 29.053912] kunit_try_run_case+0x14c/0x3d0
[ 29.054468] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.055037] kthread+0x24c/0x2d0
[ 29.055528] ret_from_fork+0x10/0x20
[ 29.056084]
[ 29.056385] The buggy address belongs to the object at fff00000c5d53180
[ 29.056385] which belongs to the cache kmalloc-64 of size 64
[ 29.057663] The buggy address is located 0 bytes to the right of
[ 29.057663] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.058893]
[ 29.059235] The buggy address belongs to the physical page:
[ 29.059957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.060779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.061516] page_type: f5(slab)
[ 29.061992] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.062828] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.063562] page dumped because: kasan: bad access detected
[ 29.064309]
[ 29.064680] Memory state around the buggy address:
[ 29.065280] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.066132] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.066897] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.067687] ^
[ 29.068315] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.069069] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.069816] ==================================================================
---
[ 29.860321] ==================================================================
[ 29.861563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[ 29.862525] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.863729]
[ 29.864019] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.864972] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.865504] Hardware name: linux,dummy-virt (DT)
[ 29.866403] Call trace:
[ 29.866957] show_stack+0x20/0x38 (C)
[ 29.867632] dump_stack_lvl+0x8c/0xd0
[ 29.868364] print_report+0x118/0x5e0
[ 29.869030] kasan_report+0xc8/0x118
[ 29.869700] kasan_check_range+0x100/0x1a8
[ 29.870415] __kasan_check_write+0x20/0x30
[ 29.871120] kasan_atomics_helper+0x1190/0x4858
[ 29.871869] kasan_atomics+0x198/0x2e8
[ 29.872407] kunit_try_run_case+0x14c/0x3d0
[ 29.873198] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.873982] kthread+0x24c/0x2d0
[ 29.874648] ret_from_fork+0x10/0x20
[ 29.875335]
[ 29.875802] Allocated by task 254:
[ 29.876264] kasan_save_stack+0x3c/0x68
[ 29.877156] kasan_save_track+0x20/0x40
[ 29.877612] kasan_save_alloc_info+0x40/0x58
[ 29.878334] __kasan_kmalloc+0xd4/0xd8
[ 29.878866] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.879446] kasan_atomics+0xb8/0x2e8
[ 29.880199] kunit_try_run_case+0x14c/0x3d0
[ 29.881066] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.881653] kthread+0x24c/0x2d0
[ 29.882292] ret_from_fork+0x10/0x20
[ 29.882957]
[ 29.883404] The buggy address belongs to the object at fff00000c5d53180
[ 29.883404] which belongs to the cache kmalloc-64 of size 64
[ 29.884894] The buggy address is located 0 bytes to the right of
[ 29.884894] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.886072]
[ 29.886383] The buggy address belongs to the physical page:
[ 29.887397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.888424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.889303] page_type: f5(slab)
[ 29.889968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.890970] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.891931] page dumped because: kasan: bad access detected
[ 29.892686]
[ 29.893194] Memory state around the buggy address:
[ 29.893941] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.894838] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.895769] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.896662] ^
[ 29.897253] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.898187] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.899118] ==================================================================
---
[ 28.628440] ==================================================================
[ 28.629565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[ 28.630485] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.631732]
[ 28.632134] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.633664] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.634213] Hardware name: linux,dummy-virt (DT)
[ 28.634797] Call trace:
[ 28.635473] show_stack+0x20/0x38 (C)
[ 28.636244] dump_stack_lvl+0x8c/0xd0
[ 28.636863] print_report+0x118/0x5e0
[ 28.637581] kasan_report+0xc8/0x118
[ 28.638269] kasan_check_range+0x100/0x1a8
[ 28.639005] __kasan_check_write+0x20/0x30
[ 28.639700] kasan_atomics_helper+0x5b4/0x4858
[ 28.640324] kasan_atomics+0x198/0x2e8
[ 28.640854] kunit_try_run_case+0x14c/0x3d0
[ 28.641412] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.642405] kthread+0x24c/0x2d0
[ 28.643082] ret_from_fork+0x10/0x20
[ 28.643775]
[ 28.644248] Allocated by task 254:
[ 28.644680] kasan_save_stack+0x3c/0x68
[ 28.645440] kasan_save_track+0x20/0x40
[ 28.646125] kasan_save_alloc_info+0x40/0x58
[ 28.646860] __kasan_kmalloc+0xd4/0xd8
[ 28.647541] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.648272] kasan_atomics+0xb8/0x2e8
[ 28.648940] kunit_try_run_case+0x14c/0x3d0
[ 28.649624] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.650419] kthread+0x24c/0x2d0
[ 28.650908] ret_from_fork+0x10/0x20
[ 28.651402]
[ 28.651702] The buggy address belongs to the object at fff00000c5d53180
[ 28.651702] which belongs to the cache kmalloc-64 of size 64
[ 28.653296] The buggy address is located 0 bytes to the right of
[ 28.653296] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.654792]
[ 28.655224] The buggy address belongs to the physical page:
[ 28.655966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.656979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.657852] page_type: f5(slab)
[ 28.658479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.659421] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.660333] page dumped because: kasan: bad access detected
[ 28.661100]
[ 28.661545] Memory state around the buggy address:
[ 28.662282] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.663219] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.664072] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.665029] ^
[ 28.665703] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.666483] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.667245] ==================================================================
---
[ 28.503770] ==================================================================
[ 28.505137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[ 28.506024] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.507232]
[ 28.507481] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.508332] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.509976] Hardware name: linux,dummy-virt (DT)
[ 28.510474] Call trace:
[ 28.511054] show_stack+0x20/0x38 (C)
[ 28.511770] dump_stack_lvl+0x8c/0xd0
[ 28.512427] print_report+0x118/0x5e0
[ 28.513113] kasan_report+0xc8/0x118
[ 28.513626] kasan_check_range+0x100/0x1a8
[ 28.514451] __kasan_check_write+0x20/0x30
[ 28.515232] kasan_atomics_helper+0x47c/0x4858
[ 28.515974] kasan_atomics+0x198/0x2e8
[ 28.516675] kunit_try_run_case+0x14c/0x3d0
[ 28.517406] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.518198] kthread+0x24c/0x2d0
[ 28.518816] ret_from_fork+0x10/0x20
[ 28.519376]
[ 28.519673] Allocated by task 254:
[ 28.520454] kasan_save_stack+0x3c/0x68
[ 28.521117] kasan_save_track+0x20/0x40
[ 28.521787] kasan_save_alloc_info+0x40/0x58
[ 28.522466] __kasan_kmalloc+0xd4/0xd8
[ 28.523150] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.524018] kasan_atomics+0xb8/0x2e8
[ 28.524449] kunit_try_run_case+0x14c/0x3d0
[ 28.525178] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.526011] kthread+0x24c/0x2d0
[ 28.526690] ret_from_fork+0x10/0x20
[ 28.527339]
[ 28.527663] The buggy address belongs to the object at fff00000c5d53180
[ 28.527663] which belongs to the cache kmalloc-64 of size 64
[ 28.529087] The buggy address is located 0 bytes to the right of
[ 28.529087] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.530659]
[ 28.531177] The buggy address belongs to the physical page:
[ 28.531824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.532659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.533647] page_type: f5(slab)
[ 28.534329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.535279] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.536285] page dumped because: kasan: bad access detected
[ 28.537127]
[ 28.537586] Memory state around the buggy address:
[ 28.538333] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.539259] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.540182] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.540945] ^
[ 28.541529] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.542642] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.543568] ==================================================================
---
[ 28.587689] ==================================================================
[ 28.588387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[ 28.589294] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.590391]
[ 28.590900] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.592039] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.592700] Hardware name: linux,dummy-virt (DT)
[ 28.593440] Call trace:
[ 28.593969] show_stack+0x20/0x38 (C)
[ 28.594506] dump_stack_lvl+0x8c/0xd0
[ 28.595061] print_report+0x118/0x5e0
[ 28.595585] kasan_report+0xc8/0x118
[ 28.596427] kasan_check_range+0x100/0x1a8
[ 28.597147] __kasan_check_write+0x20/0x30
[ 28.597860] kasan_atomics_helper+0x54c/0x4858
[ 28.598600] kasan_atomics+0x198/0x2e8
[ 28.599293] kunit_try_run_case+0x14c/0x3d0
[ 28.600010] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.600827] kthread+0x24c/0x2d0
[ 28.601460] ret_from_fork+0x10/0x20
[ 28.602199]
[ 28.602692] Allocated by task 254:
[ 28.603185] kasan_save_stack+0x3c/0x68
[ 28.603696] kasan_save_track+0x20/0x40
[ 28.604251] kasan_save_alloc_info+0x40/0x58
[ 28.605291] __kasan_kmalloc+0xd4/0xd8
[ 28.605767] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.606491] kasan_atomics+0xb8/0x2e8
[ 28.607167] kunit_try_run_case+0x14c/0x3d0
[ 28.607855] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.608647] kthread+0x24c/0x2d0
[ 28.609275] ret_from_fork+0x10/0x20
[ 28.609945]
[ 28.610479] The buggy address belongs to the object at fff00000c5d53180
[ 28.610479] which belongs to the cache kmalloc-64 of size 64
[ 28.611808] The buggy address is located 0 bytes to the right of
[ 28.611808] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.613226]
[ 28.613549] The buggy address belongs to the physical page:
[ 28.614514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.615573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.616340] page_type: f5(slab)
[ 28.616818] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.617610] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.618771] page dumped because: kasan: bad access detected
[ 28.619529]
[ 28.619993] Memory state around the buggy address:
[ 28.620683] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.621634] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.622598] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.623510] ^
[ 28.624231] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.625215] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.626129] ==================================================================
---
[ 29.629583] ==================================================================
[ 29.630214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[ 29.630996] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.631816]
[ 29.632120] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.633186] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.634206] Hardware name: linux,dummy-virt (DT)
[ 29.635254] Call trace:
[ 29.635940] show_stack+0x20/0x38 (C)
[ 29.636776] dump_stack_lvl+0x8c/0xd0
[ 29.637368] print_report+0x118/0x5e0
[ 29.637918] kasan_report+0xc8/0x118
[ 29.638505] kasan_check_range+0x100/0x1a8
[ 29.639104] __kasan_check_write+0x20/0x30
[ 29.639642] kasan_atomics_helper+0xf20/0x4858
[ 29.640336] kasan_atomics+0x198/0x2e8
[ 29.640941] kunit_try_run_case+0x14c/0x3d0
[ 29.641569] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.642255] kthread+0x24c/0x2d0
[ 29.642772] ret_from_fork+0x10/0x20
[ 29.643313]
[ 29.643618] Allocated by task 254:
[ 29.644050] kasan_save_stack+0x3c/0x68
[ 29.644641] kasan_save_track+0x20/0x40
[ 29.645248] kasan_save_alloc_info+0x40/0x58
[ 29.645833] __kasan_kmalloc+0xd4/0xd8
[ 29.646376] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.647016] kasan_atomics+0xb8/0x2e8
[ 29.647481] kunit_try_run_case+0x14c/0x3d0
[ 29.648145] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.648791] kthread+0x24c/0x2d0
[ 29.649375] ret_from_fork+0x10/0x20
[ 29.649883]
[ 29.650249] The buggy address belongs to the object at fff00000c5d53180
[ 29.650249] which belongs to the cache kmalloc-64 of size 64
[ 29.651477] The buggy address is located 0 bytes to the right of
[ 29.651477] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.652811]
[ 29.653133] The buggy address belongs to the physical page:
[ 29.653789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.654683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.655462] page_type: f5(slab)
[ 29.655994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.656874] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.657683] page dumped because: kasan: bad access detected
[ 29.658299]
[ 29.658635] Memory state around the buggy address:
[ 29.659197] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.659994] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.660870] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.661714] ^
[ 29.662423] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.663148] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.663985] ==================================================================
---
[ 28.855290] ==================================================================
[ 28.856112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[ 28.856878] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.857759]
[ 28.858170] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.859330] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.859984] Hardware name: linux,dummy-virt (DT)
[ 28.860580] Call trace:
[ 28.861067] show_stack+0x20/0x38 (C)
[ 28.861833] dump_stack_lvl+0x8c/0xd0
[ 28.862372] print_report+0x118/0x5e0
[ 28.862823] kasan_report+0xc8/0x118
[ 28.863228] kasan_check_range+0x100/0x1a8
[ 28.863661] __kasan_check_write+0x20/0x30
[ 28.864115] kasan_atomics_helper+0x894/0x4858
[ 28.864550] kasan_atomics+0x198/0x2e8
[ 28.864869] kunit_try_run_case+0x14c/0x3d0
[ 28.865564] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.867169] kthread+0x24c/0x2d0
[ 28.867533] ret_from_fork+0x10/0x20
[ 28.867839]
[ 28.867986] Allocated by task 254:
[ 28.868191] kasan_save_stack+0x3c/0x68
[ 28.868419] kasan_save_track+0x20/0x40
[ 28.868639] kasan_save_alloc_info+0x40/0x58
[ 28.869490] __kasan_kmalloc+0xd4/0xd8
[ 28.870468] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.871517] kasan_atomics+0xb8/0x2e8
[ 28.872114] kunit_try_run_case+0x14c/0x3d0
[ 28.872772] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.873575] kthread+0x24c/0x2d0
[ 28.874174] ret_from_fork+0x10/0x20
[ 28.874727]
[ 28.875145] The buggy address belongs to the object at fff00000c5d53180
[ 28.875145] which belongs to the cache kmalloc-64 of size 64
[ 28.876455] The buggy address is located 0 bytes to the right of
[ 28.876455] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.877661]
[ 28.877987] The buggy address belongs to the physical page:
[ 28.878605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.879594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.880277] page_type: f5(slab)
[ 28.880827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.881769] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.882604] page dumped because: kasan: bad access detected
[ 28.883267]
[ 28.883556] Memory state around the buggy address:
[ 28.884120] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.884927] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.885712] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.886460] ^
[ 28.887174] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.888016] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.888695] ==================================================================
---
[ 28.926393] ==================================================================
[ 28.927096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[ 28.927811] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.928466]
[ 28.928803] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.930710] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.932038] Hardware name: linux,dummy-virt (DT)
[ 28.932507] Call trace:
[ 28.932707] show_stack+0x20/0x38 (C)
[ 28.933279] dump_stack_lvl+0x8c/0xd0
[ 28.933807] print_report+0x118/0x5e0
[ 28.934416] kasan_report+0xc8/0x118
[ 28.934966] kasan_check_range+0x100/0x1a8
[ 28.935600] __kasan_check_write+0x20/0x30
[ 28.936235] kasan_atomics_helper+0x934/0x4858
[ 28.936823] kasan_atomics+0x198/0x2e8
[ 28.937374] kunit_try_run_case+0x14c/0x3d0
[ 28.937999] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.938737] kthread+0x24c/0x2d0
[ 28.939277] ret_from_fork+0x10/0x20
[ 28.939863]
[ 28.940239] Allocated by task 254:
[ 28.940729] kasan_save_stack+0x3c/0x68
[ 28.941330] kasan_save_track+0x20/0x40
[ 28.941939] kasan_save_alloc_info+0x40/0x58
[ 28.942498] __kasan_kmalloc+0xd4/0xd8
[ 28.943079] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.943662] kasan_atomics+0xb8/0x2e8
[ 28.944224] kunit_try_run_case+0x14c/0x3d0
[ 28.944831] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.945576] kthread+0x24c/0x2d0
[ 28.946162] ret_from_fork+0x10/0x20
[ 28.946684]
[ 28.947061] The buggy address belongs to the object at fff00000c5d53180
[ 28.947061] which belongs to the cache kmalloc-64 of size 64
[ 28.948326] The buggy address is located 0 bytes to the right of
[ 28.948326] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.949621]
[ 28.949954] The buggy address belongs to the physical page:
[ 28.950618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.951547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.952341] page_type: f5(slab)
[ 28.952825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.953643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.954473] page dumped because: kasan: bad access detected
[ 28.955187]
[ 28.955549] Memory state around the buggy address:
[ 28.956185] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.956970] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.957817] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.958650] ^
[ 28.959260] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.959992] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.960779] ==================================================================
---
[ 30.370198] ==================================================================
[ 30.370929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[ 30.371860] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.372875]
[ 30.373336] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.374561] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.375166] Hardware name: linux,dummy-virt (DT)
[ 30.375824] Call trace:
[ 30.376317] show_stack+0x20/0x38 (C)
[ 30.376979] dump_stack_lvl+0x8c/0xd0
[ 30.377617] print_report+0x118/0x5e0
[ 30.378255] kasan_report+0xc8/0x118
[ 30.378917] kasan_check_range+0x100/0x1a8
[ 30.379593] __kasan_check_write+0x20/0x30
[ 30.380290] kasan_atomics_helper+0x16d0/0x4858
[ 30.381008] kasan_atomics+0x198/0x2e8
[ 30.381648] kunit_try_run_case+0x14c/0x3d0
[ 30.382377] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.383096] kthread+0x24c/0x2d0
[ 30.383667] ret_from_fork+0x10/0x20
[ 30.384237]
[ 30.384512] Allocated by task 254:
[ 30.385467] kasan_save_stack+0x3c/0x68
[ 30.386206] kasan_save_track+0x20/0x40
[ 30.386872] kasan_save_alloc_info+0x40/0x58
[ 30.387568] __kasan_kmalloc+0xd4/0xd8
[ 30.388263] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.389025] kasan_atomics+0xb8/0x2e8
[ 30.389523] kunit_try_run_case+0x14c/0x3d0
[ 30.390285] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.391098] kthread+0x24c/0x2d0
[ 30.391567] ret_from_fork+0x10/0x20
[ 30.392285]
[ 30.392764] The buggy address belongs to the object at fff00000c5d53180
[ 30.392764] which belongs to the cache kmalloc-64 of size 64
[ 30.394254] The buggy address is located 0 bytes to the right of
[ 30.394254] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.395935]
[ 30.396247] The buggy address belongs to the physical page:
[ 30.397116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.398085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.398964] page_type: f5(slab)
[ 30.399589] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.400568] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.401530] page dumped because: kasan: bad access detected
[ 30.402165]
[ 30.402698] Memory state around the buggy address:
[ 30.403409] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.404365] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.405230] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.406040] ^
[ 30.406617] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.407511] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.408326] ==================================================================
---
[ 30.017883] ==================================================================
[ 30.018671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[ 30.019969] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.020705]
[ 30.021120] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.022040] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.022591] Hardware name: linux,dummy-virt (DT)
[ 30.023314] Call trace:
[ 30.023682] show_stack+0x20/0x38 (C)
[ 30.024293] dump_stack_lvl+0x8c/0xd0
[ 30.024878] print_report+0x118/0x5e0
[ 30.025480] kasan_report+0xc8/0x118
[ 30.026164] kasan_check_range+0x100/0x1a8
[ 30.026738] __kasan_check_write+0x20/0x30
[ 30.027465] kasan_atomics_helper+0x1384/0x4858
[ 30.028042] kasan_atomics+0x198/0x2e8
[ 30.028722] kunit_try_run_case+0x14c/0x3d0
[ 30.029291] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.029987] kthread+0x24c/0x2d0
[ 30.030581] ret_from_fork+0x10/0x20
[ 30.031234]
[ 30.031543] Allocated by task 254:
[ 30.032016] kasan_save_stack+0x3c/0x68
[ 30.032564] kasan_save_track+0x20/0x40
[ 30.033098] kasan_save_alloc_info+0x40/0x58
[ 30.033767] __kasan_kmalloc+0xd4/0xd8
[ 30.034338] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.034985] kasan_atomics+0xb8/0x2e8
[ 30.035507] kunit_try_run_case+0x14c/0x3d0
[ 30.036156] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.036839] kthread+0x24c/0x2d0
[ 30.037327] ret_from_fork+0x10/0x20
[ 30.037975]
[ 30.038303] The buggy address belongs to the object at fff00000c5d53180
[ 30.038303] which belongs to the cache kmalloc-64 of size 64
[ 30.039493] The buggy address is located 0 bytes to the right of
[ 30.039493] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.040764]
[ 30.041142] The buggy address belongs to the physical page:
[ 30.041680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.042610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.043330] page_type: f5(slab)
[ 30.043895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.044723] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.045536] page dumped because: kasan: bad access detected
[ 30.046197]
[ 30.046514] Memory state around the buggy address:
[ 30.047099] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.047885] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.048672] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.049480] ^
[ 30.050124] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.050906] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.051660] ==================================================================
---
[ 30.121878] ==================================================================
[ 30.122561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[ 30.123310] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.124126]
[ 30.124498] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.125499] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.126047] Hardware name: linux,dummy-virt (DT)
[ 30.126625] Call trace:
[ 30.127002] show_stack+0x20/0x38 (C)
[ 30.127540] dump_stack_lvl+0x8c/0xd0
[ 30.128109] print_report+0x118/0x5e0
[ 30.128703] kasan_report+0xc8/0x118
[ 30.129244] kasan_check_range+0x100/0x1a8
[ 30.129907] __kasan_check_write+0x20/0x30
[ 30.130451] kasan_atomics_helper+0x147c/0x4858
[ 30.131155] kasan_atomics+0x198/0x2e8
[ 30.131692] kunit_try_run_case+0x14c/0x3d0
[ 30.132303] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.133042] kthread+0x24c/0x2d0
[ 30.133577] ret_from_fork+0x10/0x20
[ 30.134137]
[ 30.134466] Allocated by task 254:
[ 30.134916] kasan_save_stack+0x3c/0x68
[ 30.135522] kasan_save_track+0x20/0x40
[ 30.136023] kasan_save_alloc_info+0x40/0x58
[ 30.136637] __kasan_kmalloc+0xd4/0xd8
[ 30.137280] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.137931] kasan_atomics+0xb8/0x2e8
[ 30.138468] kunit_try_run_case+0x14c/0x3d0
[ 30.139056] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.139594] kthread+0x24c/0x2d0
[ 30.139971] ret_from_fork+0x10/0x20
[ 30.140345]
[ 30.140569] The buggy address belongs to the object at fff00000c5d53180
[ 30.140569] which belongs to the cache kmalloc-64 of size 64
[ 30.141568] The buggy address is located 0 bytes to the right of
[ 30.141568] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.143031]
[ 30.143302] The buggy address belongs to the physical page:
[ 30.144100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.145043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.145899] page_type: f5(slab)
[ 30.146399] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.147272] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.148126] page dumped because: kasan: bad access detected
[ 30.148697]
[ 30.149070] Memory state around the buggy address:
[ 30.149732] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.150603] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.151371] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.152109] ^
[ 30.152758] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.153476] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.154333] ==================================================================
---
[ 28.464617] ==================================================================
[ 28.465394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[ 28.466349] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.467460]
[ 28.468302] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.469146] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.469559] Hardware name: linux,dummy-virt (DT)
[ 28.470589] Call trace:
[ 28.471291] show_stack+0x20/0x38 (C)
[ 28.472133] dump_stack_lvl+0x8c/0xd0
[ 28.472689] print_report+0x118/0x5e0
[ 28.473210] kasan_report+0xc8/0x118
[ 28.473701] kasan_check_range+0x100/0x1a8
[ 28.474303] __kasan_check_write+0x20/0x30
[ 28.474922] kasan_atomics_helper+0x414/0x4858
[ 28.475705] kasan_atomics+0x198/0x2e8
[ 28.476237] kunit_try_run_case+0x14c/0x3d0
[ 28.476684] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.477604] kthread+0x24c/0x2d0
[ 28.478075] ret_from_fork+0x10/0x20
[ 28.478476]
[ 28.478704] Allocated by task 254:
[ 28.479944] kasan_save_stack+0x3c/0x68
[ 28.480375] kasan_save_track+0x20/0x40
[ 28.480790] kasan_save_alloc_info+0x40/0x58
[ 28.481229] __kasan_kmalloc+0xd4/0xd8
[ 28.481623] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.483205] kasan_atomics+0xb8/0x2e8
[ 28.484274] kunit_try_run_case+0x14c/0x3d0
[ 28.484677] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.485074] kthread+0x24c/0x2d0
[ 28.485287] ret_from_fork+0x10/0x20
[ 28.485499]
[ 28.485635] The buggy address belongs to the object at fff00000c5d53180
[ 28.485635] which belongs to the cache kmalloc-64 of size 64
[ 28.487497] The buggy address is located 0 bytes to the right of
[ 28.487497] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.489409]
[ 28.489780] The buggy address belongs to the physical page:
[ 28.490402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.491173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.491923] page_type: f5(slab)
[ 28.492381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.493203] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.493940] page dumped because: kasan: bad access detected
[ 28.494662]
[ 28.495009] Memory state around the buggy address:
[ 28.495536] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.496870] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.497686] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.498653] ^
[ 28.499363] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.500620] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.501551] ==================================================================
---
[ 29.748340] ==================================================================
[ 29.749293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[ 29.749648] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.751002]
[ 29.751561] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.752587] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.753359] Hardware name: linux,dummy-virt (DT)
[ 29.754096] Call trace:
[ 29.754640] show_stack+0x20/0x38 (C)
[ 29.755345] dump_stack_lvl+0x8c/0xd0
[ 29.756022] print_report+0x118/0x5e0
[ 29.756576] kasan_report+0xc8/0x118
[ 29.757077] kasan_check_range+0x100/0x1a8
[ 29.757598] __kasan_check_write+0x20/0x30
[ 29.758217] kasan_atomics_helper+0x1058/0x4858
[ 29.758830] kasan_atomics+0x198/0x2e8
[ 29.759373] kunit_try_run_case+0x14c/0x3d0
[ 29.760038] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.760792] kthread+0x24c/0x2d0
[ 29.761347] ret_from_fork+0x10/0x20
[ 29.761852]
[ 29.762174] Allocated by task 254:
[ 29.762737] kasan_save_stack+0x3c/0x68
[ 29.763429] kasan_save_track+0x20/0x40
[ 29.763997] kasan_save_alloc_info+0x40/0x58
[ 29.764594] __kasan_kmalloc+0xd4/0xd8
[ 29.765150] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.765772] kasan_atomics+0xb8/0x2e8
[ 29.766258] kunit_try_run_case+0x14c/0x3d0
[ 29.766836] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.767546] kthread+0x24c/0x2d0
[ 29.768083] ret_from_fork+0x10/0x20
[ 29.768620]
[ 29.768954] The buggy address belongs to the object at fff00000c5d53180
[ 29.768954] which belongs to the cache kmalloc-64 of size 64
[ 29.770484] The buggy address is located 0 bytes to the right of
[ 29.770484] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.772252]
[ 29.772479] The buggy address belongs to the physical page:
[ 29.773194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.774181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.775094] page_type: f5(slab)
[ 29.775703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.776777] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.777765] page dumped because: kasan: bad access detected
[ 29.778573]
[ 29.779104] Memory state around the buggy address:
[ 29.779651] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.780401] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.781192] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.782257] ^
[ 29.783026] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.783972] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.784810] ==================================================================
---
[ 29.786605] ==================================================================
[ 29.787569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[ 29.788217] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.789617]
[ 29.790246] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.791100] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.791501] Hardware name: linux,dummy-virt (DT)
[ 29.792380] Call trace:
[ 29.793115] show_stack+0x20/0x38 (C)
[ 29.793637] dump_stack_lvl+0x8c/0xd0
[ 29.794283] print_report+0x118/0x5e0
[ 29.794580] kasan_report+0xc8/0x118
[ 29.794913] kasan_check_range+0x100/0x1a8
[ 29.795571] __kasan_check_write+0x20/0x30
[ 29.796262] kasan_atomics_helper+0x10c0/0x4858
[ 29.797053] kasan_atomics+0x198/0x2e8
[ 29.797621] kunit_try_run_case+0x14c/0x3d0
[ 29.798289] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.799167] kthread+0x24c/0x2d0
[ 29.799660] ret_from_fork+0x10/0x20
[ 29.800253]
[ 29.800582] Allocated by task 254:
[ 29.801102] kasan_save_stack+0x3c/0x68
[ 29.801676] kasan_save_track+0x20/0x40
[ 29.802232] kasan_save_alloc_info+0x40/0x58
[ 29.802798] __kasan_kmalloc+0xd4/0xd8
[ 29.803367] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.804018] kasan_atomics+0xb8/0x2e8
[ 29.804525] kunit_try_run_case+0x14c/0x3d0
[ 29.805062] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.805780] kthread+0x24c/0x2d0
[ 29.806226] ret_from_fork+0x10/0x20
[ 29.806736]
[ 29.807124] The buggy address belongs to the object at fff00000c5d53180
[ 29.807124] which belongs to the cache kmalloc-64 of size 64
[ 29.808301] The buggy address is located 0 bytes to the right of
[ 29.808301] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.809580]
[ 29.809933] The buggy address belongs to the physical page:
[ 29.810608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.811482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.812232] page_type: f5(slab)
[ 29.812774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.813590] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.814384] page dumped because: kasan: bad access detected
[ 29.815087]
[ 29.815391] Memory state around the buggy address:
[ 29.815965] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.816789] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.817777] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.818509] ^
[ 29.819147] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.819933] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.820773] ==================================================================
---
[ 30.086811] ==================================================================
[ 30.087479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[ 30.088385] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.089258]
[ 30.089614] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.090596] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.091191] Hardware name: linux,dummy-virt (DT)
[ 30.091733] Call trace:
[ 30.092118] show_stack+0x20/0x38 (C)
[ 30.092806] dump_stack_lvl+0x8c/0xd0
[ 30.093331] print_report+0x118/0x5e0
[ 30.093812] kasan_report+0xc8/0x118
[ 30.094444] kasan_check_range+0x100/0x1a8
[ 30.095138] __kasan_check_write+0x20/0x30
[ 30.095834] kasan_atomics_helper+0x1414/0x4858
[ 30.096450] kasan_atomics+0x198/0x2e8
[ 30.097077] kunit_try_run_case+0x14c/0x3d0
[ 30.097863] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.098444] kthread+0x24c/0x2d0
[ 30.098982] ret_from_fork+0x10/0x20
[ 30.099478]
[ 30.099864] Allocated by task 254:
[ 30.100330] kasan_save_stack+0x3c/0x68
[ 30.100896] kasan_save_track+0x20/0x40
[ 30.101422] kasan_save_alloc_info+0x40/0x58
[ 30.101959] __kasan_kmalloc+0xd4/0xd8
[ 30.102522] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.103211] kasan_atomics+0xb8/0x2e8
[ 30.103793] kunit_try_run_case+0x14c/0x3d0
[ 30.104392] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.105048] kthread+0x24c/0x2d0
[ 30.105523] ret_from_fork+0x10/0x20
[ 30.106116]
[ 30.106457] The buggy address belongs to the object at fff00000c5d53180
[ 30.106457] which belongs to the cache kmalloc-64 of size 64
[ 30.107592] The buggy address is located 0 bytes to the right of
[ 30.107592] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.108939]
[ 30.109260] The buggy address belongs to the physical page:
[ 30.109872] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.110835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.111555] page_type: f5(slab)
[ 30.112041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.112824] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.113702] page dumped because: kasan: bad access detected
[ 30.114342]
[ 30.114666] Memory state around the buggy address:
[ 30.115234] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.116000] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.116785] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.117580] ^
[ 30.118186] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.119028] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.119824] ==================================================================
---
[ 29.822280] ==================================================================
[ 29.822956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[ 29.824244] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.824935]
[ 29.825332] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.826376] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.826938] Hardware name: linux,dummy-virt (DT)
[ 29.827487] Call trace:
[ 29.827973] show_stack+0x20/0x38 (C)
[ 29.828550] dump_stack_lvl+0x8c/0xd0
[ 29.829191] print_report+0x118/0x5e0
[ 29.829800] kasan_report+0xc8/0x118
[ 29.830456] kasan_check_range+0x100/0x1a8
[ 29.831084] __kasan_check_write+0x20/0x30
[ 29.831704] kasan_atomics_helper+0x1128/0x4858
[ 29.832356] kasan_atomics+0x198/0x2e8
[ 29.832941] kunit_try_run_case+0x14c/0x3d0
[ 29.833626] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.834380] kthread+0x24c/0x2d0
[ 29.834959] ret_from_fork+0x10/0x20
[ 29.835571]
[ 29.835907] Allocated by task 254:
[ 29.836431] kasan_save_stack+0x3c/0x68
[ 29.837023] kasan_save_track+0x20/0x40
[ 29.837583] kasan_save_alloc_info+0x40/0x58
[ 29.838224] __kasan_kmalloc+0xd4/0xd8
[ 29.838801] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.839400] kasan_atomics+0xb8/0x2e8
[ 29.840020] kunit_try_run_case+0x14c/0x3d0
[ 29.840601] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.841334] kthread+0x24c/0x2d0
[ 29.841791] ret_from_fork+0x10/0x20
[ 29.842274]
[ 29.842621] The buggy address belongs to the object at fff00000c5d53180
[ 29.842621] which belongs to the cache kmalloc-64 of size 64
[ 29.843885] The buggy address is located 0 bytes to the right of
[ 29.843885] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.845220]
[ 29.845545] The buggy address belongs to the physical page:
[ 29.846331] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.847080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.847692] page_type: f5(slab)
[ 29.848646] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.849622] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.850582] page dumped because: kasan: bad access detected
[ 29.851368]
[ 29.851842] Memory state around the buggy address:
[ 29.852433] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.853411] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.854357] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.855263] ^
[ 29.856016] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.856777] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.857498] ==================================================================
---
[ 29.593208] ==================================================================
[ 29.593924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[ 29.594964] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.595901]
[ 29.596301] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.597497] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.598118] Hardware name: linux,dummy-virt (DT)
[ 29.598585] Call trace:
[ 29.599838] show_stack+0x20/0x38 (C)
[ 29.600635] dump_stack_lvl+0x8c/0xd0
[ 29.601081] print_report+0x118/0x5e0
[ 29.601495] kasan_report+0xc8/0x118
[ 29.601914] kasan_check_range+0x100/0x1a8
[ 29.602355] __kasan_check_write+0x20/0x30
[ 29.603728] kasan_atomics_helper+0xeb8/0x4858
[ 29.604380] kasan_atomics+0x198/0x2e8
[ 29.605097] kunit_try_run_case+0x14c/0x3d0
[ 29.605714] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.606432] kthread+0x24c/0x2d0
[ 29.606989] ret_from_fork+0x10/0x20
[ 29.607498]
[ 29.607832] Allocated by task 254:
[ 29.608274] kasan_save_stack+0x3c/0x68
[ 29.608880] kasan_save_track+0x20/0x40
[ 29.609416] kasan_save_alloc_info+0x40/0x58
[ 29.610040] __kasan_kmalloc+0xd4/0xd8
[ 29.610570] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.611179] kasan_atomics+0xb8/0x2e8
[ 29.611668] kunit_try_run_case+0x14c/0x3d0
[ 29.612233] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.612912] kthread+0x24c/0x2d0
[ 29.613367] ret_from_fork+0x10/0x20
[ 29.613877]
[ 29.614188] The buggy address belongs to the object at fff00000c5d53180
[ 29.614188] which belongs to the cache kmalloc-64 of size 64
[ 29.615436] The buggy address is located 0 bytes to the right of
[ 29.615436] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.616715]
[ 29.617089] The buggy address belongs to the physical page:
[ 29.617651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.618604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.619347] page_type: f5(slab)
[ 29.619822] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.620672] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.621520] page dumped because: kasan: bad access detected
[ 29.622171]
[ 29.622488] Memory state around the buggy address:
[ 29.623112] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.623918] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.624772] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.625531] ^
[ 29.626136] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.626929] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.627685] ==================================================================
---
[ 28.546380] ==================================================================
[ 28.547306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[ 28.548149] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.549426]
[ 28.549841] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.551318] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.552227] Hardware name: linux,dummy-virt (DT)
[ 28.552954] Call trace:
[ 28.553524] show_stack+0x20/0x38 (C)
[ 28.554204] dump_stack_lvl+0x8c/0xd0
[ 28.554901] print_report+0x118/0x5e0
[ 28.555423] kasan_report+0xc8/0x118
[ 28.556169] kasan_check_range+0x100/0x1a8
[ 28.556866] __kasan_check_write+0x20/0x30
[ 28.557561] kasan_atomics_helper+0x4e4/0x4858
[ 28.558295] kasan_atomics+0x198/0x2e8
[ 28.559006] kunit_try_run_case+0x14c/0x3d0
[ 28.559572] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.560257] kthread+0x24c/0x2d0
[ 28.561167] ret_from_fork+0x10/0x20
[ 28.561592]
[ 28.562108] Allocated by task 254:
[ 28.562763] kasan_save_stack+0x3c/0x68
[ 28.563444] kasan_save_track+0x20/0x40
[ 28.564119] kasan_save_alloc_info+0x40/0x58
[ 28.564820] __kasan_kmalloc+0xd4/0xd8
[ 28.565479] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.566190] kasan_atomics+0xb8/0x2e8
[ 28.566880] kunit_try_run_case+0x14c/0x3d0
[ 28.567546] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.568199] kthread+0x24c/0x2d0
[ 28.568657] ret_from_fork+0x10/0x20
[ 28.569172]
[ 28.569469] The buggy address belongs to the object at fff00000c5d53180
[ 28.569469] which belongs to the cache kmalloc-64 of size 64
[ 28.571079] The buggy address is located 0 bytes to the right of
[ 28.571079] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.572634]
[ 28.573096] The buggy address belongs to the physical page:
[ 28.573617] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.574690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.575618] page_type: f5(slab)
[ 28.576255] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.577232] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.578175] page dumped because: kasan: bad access detected
[ 28.579073]
[ 28.579520] Memory state around the buggy address:
[ 28.580102] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.581107] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.582063] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.582701] ^
[ 28.583491] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.584433] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.585332] ==================================================================
---
[ 28.338788] ==================================================================
[ 28.339343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[ 28.340881] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.342125]
[ 28.342480] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.343977] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.344709] Hardware name: linux,dummy-virt (DT)
[ 28.345457] Call trace:
[ 28.345865] show_stack+0x20/0x38 (C)
[ 28.346647] dump_stack_lvl+0x8c/0xd0
[ 28.347542] print_report+0x118/0x5e0
[ 28.348281] kasan_report+0xc8/0x118
[ 28.348828] kasan_check_range+0x100/0x1a8
[ 28.349617] __kasan_check_write+0x20/0x30
[ 28.350321] kasan_atomics_helper+0x32c/0x4858
[ 28.350928] kasan_atomics+0x198/0x2e8
[ 28.351440] kunit_try_run_case+0x14c/0x3d0
[ 28.352153] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.352835] kthread+0x24c/0x2d0
[ 28.353322] ret_from_fork+0x10/0x20
[ 28.354016]
[ 28.354404] Allocated by task 254:
[ 28.354994] kasan_save_stack+0x3c/0x68
[ 28.355629] kasan_save_track+0x20/0x40
[ 28.356259] kasan_save_alloc_info+0x40/0x58
[ 28.356807] __kasan_kmalloc+0xd4/0xd8
[ 28.357302] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.357898] kasan_atomics+0xb8/0x2e8
[ 28.358498] kunit_try_run_case+0x14c/0x3d0
[ 28.359126] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.359697] kthread+0x24c/0x2d0
[ 28.360197] ret_from_fork+0x10/0x20
[ 28.360845]
[ 28.361298] The buggy address belongs to the object at fff00000c5d53180
[ 28.361298] which belongs to the cache kmalloc-64 of size 64
[ 28.362578] The buggy address is located 0 bytes to the right of
[ 28.362578] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.364361]
[ 28.364690] The buggy address belongs to the physical page:
[ 28.365504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.366566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.367470] page_type: f5(slab)
[ 28.367999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.369005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.370011] page dumped because: kasan: bad access detected
[ 28.370542]
[ 28.371046] Memory state around the buggy address:
[ 28.371781] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.372733] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.373919] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.374692] ^
[ 28.375346] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.376251] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.376985] ==================================================================
---
[ 29.707298] ==================================================================
[ 29.707982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[ 29.708656] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.709547]
[ 29.710316] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.711247] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.712140] Hardware name: linux,dummy-virt (DT)
[ 29.712859] Call trace:
[ 29.713401] show_stack+0x20/0x38 (C)
[ 29.713973] dump_stack_lvl+0x8c/0xd0
[ 29.714680] print_report+0x118/0x5e0
[ 29.715393] kasan_report+0xc8/0x118
[ 29.716086] kasan_check_range+0x100/0x1a8
[ 29.716806] __kasan_check_write+0x20/0x30
[ 29.717399] kasan_atomics_helper+0xff0/0x4858
[ 29.718164] kasan_atomics+0x198/0x2e8
[ 29.718832] kunit_try_run_case+0x14c/0x3d0
[ 29.719548] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.720277] kthread+0x24c/0x2d0
[ 29.720765] ret_from_fork+0x10/0x20
[ 29.721278]
[ 29.721557] Allocated by task 254:
[ 29.722596] kasan_save_stack+0x3c/0x68
[ 29.723308] kasan_save_track+0x20/0x40
[ 29.724005] kasan_save_alloc_info+0x40/0x58
[ 29.724684] __kasan_kmalloc+0xd4/0xd8
[ 29.725373] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.726122] kasan_atomics+0xb8/0x2e8
[ 29.726794] kunit_try_run_case+0x14c/0x3d0
[ 29.727481] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.728150] kthread+0x24c/0x2d0
[ 29.728831] ret_from_fork+0x10/0x20
[ 29.729504]
[ 29.729985] The buggy address belongs to the object at fff00000c5d53180
[ 29.729985] which belongs to the cache kmalloc-64 of size 64
[ 29.731361] The buggy address is located 0 bytes to the right of
[ 29.731361] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.732887]
[ 29.733186] The buggy address belongs to the physical page:
[ 29.734095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.735079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.735929] page_type: f5(slab)
[ 29.736560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.737566] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.738399] page dumped because: kasan: bad access detected
[ 29.739256]
[ 29.739706] Memory state around the buggy address:
[ 29.740460] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.741383] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.742316] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.743094] ^
[ 29.743889] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.744829] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.745733] ==================================================================
---
[ 29.981976] ==================================================================
[ 29.982599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[ 29.983661] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.984923]
[ 29.985313] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.986892] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.987557] Hardware name: linux,dummy-virt (DT)
[ 29.988167] Call trace:
[ 29.988586] show_stack+0x20/0x38 (C)
[ 29.989176] dump_stack_lvl+0x8c/0xd0
[ 29.989726] print_report+0x118/0x5e0
[ 29.990331] kasan_report+0xc8/0x118
[ 29.990966] kasan_check_range+0x100/0x1a8
[ 29.991513] __kasan_check_write+0x20/0x30
[ 29.992160] kasan_atomics_helper+0x12d8/0x4858
[ 29.992733] kasan_atomics+0x198/0x2e8
[ 29.993358] kunit_try_run_case+0x14c/0x3d0
[ 29.993965] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.994651] kthread+0x24c/0x2d0
[ 29.995211] ret_from_fork+0x10/0x20
[ 29.995794]
[ 29.996092] Allocated by task 254:
[ 29.996575] kasan_save_stack+0x3c/0x68
[ 29.997185] kasan_save_track+0x20/0x40
[ 29.997729] kasan_save_alloc_info+0x40/0x58
[ 29.998328] __kasan_kmalloc+0xd4/0xd8
[ 29.998858] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.999527] kasan_atomics+0xb8/0x2e8
[ 30.000090] kunit_try_run_case+0x14c/0x3d0
[ 30.000666] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.001336] kthread+0x24c/0x2d0
[ 30.001815] ret_from_fork+0x10/0x20
[ 30.002289]
[ 30.002663] The buggy address belongs to the object at fff00000c5d53180
[ 30.002663] which belongs to the cache kmalloc-64 of size 64
[ 30.003955] The buggy address is located 0 bytes to the right of
[ 30.003955] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.005205]
[ 30.005528] The buggy address belongs to the physical page:
[ 30.006259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.007113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.007865] page_type: f5(slab)
[ 30.008329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.009089] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.009981] page dumped because: kasan: bad access detected
[ 30.010659]
[ 30.010990] Memory state around the buggy address:
[ 30.011820] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.012620] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.013422] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.014213] ^
[ 30.014785] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.015627] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.016430] ==================================================================
---
[ 29.072736] ==================================================================
[ 29.073414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[ 29.074186] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.074853]
[ 29.075208] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.076596] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.077214] Hardware name: linux,dummy-virt (DT)
[ 29.077820] Call trace:
[ 29.078183] show_stack+0x20/0x38 (C)
[ 29.078787] dump_stack_lvl+0x8c/0xd0
[ 29.079391] print_report+0x118/0x5e0
[ 29.079966] kasan_report+0xc8/0x118
[ 29.080578] kasan_check_range+0x100/0x1a8
[ 29.081187] __kasan_check_write+0x20/0x30
[ 29.081870] kasan_atomics_helper+0xad4/0x4858
[ 29.082496] kasan_atomics+0x198/0x2e8
[ 29.083084] kunit_try_run_case+0x14c/0x3d0
[ 29.083665] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.084343] kthread+0x24c/0x2d0
[ 29.084924] ret_from_fork+0x10/0x20
[ 29.085479]
[ 29.085830] Allocated by task 254:
[ 29.086299] kasan_save_stack+0x3c/0x68
[ 29.086919] kasan_save_track+0x20/0x40
[ 29.087394] kasan_save_alloc_info+0x40/0x58
[ 29.088055] __kasan_kmalloc+0xd4/0xd8
[ 29.088593] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.089262] kasan_atomics+0xb8/0x2e8
[ 29.089809] kunit_try_run_case+0x14c/0x3d0
[ 29.090435] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.091129] kthread+0x24c/0x2d0
[ 29.091585] ret_from_fork+0x10/0x20
[ 29.092171]
[ 29.092479] The buggy address belongs to the object at fff00000c5d53180
[ 29.092479] which belongs to the cache kmalloc-64 of size 64
[ 29.093812] The buggy address is located 0 bytes to the right of
[ 29.093812] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.095058]
[ 29.095417] The buggy address belongs to the physical page:
[ 29.096033] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.096916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.097591] page_type: f5(slab)
[ 29.098172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.099027] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.099923] page dumped because: kasan: bad access detected
[ 29.100428]
[ 29.100769] Memory state around the buggy address:
[ 29.101368] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.102247] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.103086] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.103848] ^
[ 29.104470] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.105254] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.106040] ==================================================================
---
[ 30.156108] ==================================================================
[ 30.156674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[ 30.157621] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.158290]
[ 30.158638] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.159832] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.160381] Hardware name: linux,dummy-virt (DT)
[ 30.160944] Call trace:
[ 30.161325] show_stack+0x20/0x38 (C)
[ 30.161915] dump_stack_lvl+0x8c/0xd0
[ 30.162445] print_report+0x118/0x5e0
[ 30.163122] kasan_report+0xc8/0x118
[ 30.163682] kasan_check_range+0x100/0x1a8
[ 30.164258] __kasan_check_write+0x20/0x30
[ 30.164861] kasan_atomics_helper+0x14e4/0x4858
[ 30.165458] kasan_atomics+0x198/0x2e8
[ 30.166034] kunit_try_run_case+0x14c/0x3d0
[ 30.166696] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.167336] kthread+0x24c/0x2d0
[ 30.167957] ret_from_fork+0x10/0x20
[ 30.168489]
[ 30.168796] Allocated by task 254:
[ 30.169360] kasan_save_stack+0x3c/0x68
[ 30.169932] kasan_save_track+0x20/0x40
[ 30.170360] kasan_save_alloc_info+0x40/0x58
[ 30.170924] __kasan_kmalloc+0xd4/0xd8
[ 30.171462] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.172184] kasan_atomics+0xb8/0x2e8
[ 30.172684] kunit_try_run_case+0x14c/0x3d0
[ 30.173227] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.174072] kthread+0x24c/0x2d0
[ 30.174585] ret_from_fork+0x10/0x20
[ 30.175139]
[ 30.175455] The buggy address belongs to the object at fff00000c5d53180
[ 30.175455] which belongs to the cache kmalloc-64 of size 64
[ 30.176579] The buggy address is located 0 bytes to the right of
[ 30.176579] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.177805]
[ 30.178139] The buggy address belongs to the physical page:
[ 30.178775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.179572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.180433] page_type: f5(slab)
[ 30.180918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.181821] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.182604] page dumped because: kasan: bad access detected
[ 30.183255]
[ 30.183573] Memory state around the buggy address:
[ 30.184075] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.184851] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.185611] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.186458] ^
[ 30.187088] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.187854] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.188644] ==================================================================
---
[ 30.519366] ==================================================================
[ 30.520031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[ 30.520898] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.521734]
[ 30.522116] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.523336] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.524000] Hardware name: linux,dummy-virt (DT)
[ 30.524606] Call trace:
[ 30.525107] show_stack+0x20/0x38 (C)
[ 30.525770] dump_stack_lvl+0x8c/0xd0
[ 30.526312] print_report+0x118/0x5e0
[ 30.526856] kasan_report+0xc8/0x118
[ 30.527421] kasan_check_range+0x100/0x1a8
[ 30.528004] __kasan_check_write+0x20/0x30
[ 30.528687] kasan_atomics_helper+0x17ec/0x4858
[ 30.529360] kasan_atomics+0x198/0x2e8
[ 30.529990] kunit_try_run_case+0x14c/0x3d0
[ 30.530621] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.531406] kthread+0x24c/0x2d0
[ 30.531968] ret_from_fork+0x10/0x20
[ 30.532511]
[ 30.532920] Allocated by task 254:
[ 30.533468] kasan_save_stack+0x3c/0x68
[ 30.534046] kasan_save_track+0x20/0x40
[ 30.534639] kasan_save_alloc_info+0x40/0x58
[ 30.535303] __kasan_kmalloc+0xd4/0xd8
[ 30.535964] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.536559] kasan_atomics+0xb8/0x2e8
[ 30.537268] kunit_try_run_case+0x14c/0x3d0
[ 30.537832] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.538620] kthread+0x24c/0x2d0
[ 30.539201] ret_from_fork+0x10/0x20
[ 30.539738]
[ 30.540111] The buggy address belongs to the object at fff00000c5d53180
[ 30.540111] which belongs to the cache kmalloc-64 of size 64
[ 30.541362] The buggy address is located 0 bytes to the right of
[ 30.541362] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.542717]
[ 30.543146] The buggy address belongs to the physical page:
[ 30.543908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.544916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.545678] page_type: f5(slab)
[ 30.546117] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.546931] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.547793] page dumped because: kasan: bad access detected
[ 30.548430]
[ 30.548817] Memory state around the buggy address:
[ 30.549515] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.550503] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.551348] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.552203] ^
[ 30.552844] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.553693] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.554512] ==================================================================
---
[ 28.779540] ==================================================================
[ 28.780653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[ 28.781533] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.782344]
[ 28.782727] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.783935] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.784494] Hardware name: linux,dummy-virt (DT)
[ 28.785120] Call trace:
[ 28.785511] show_stack+0x20/0x38 (C)
[ 28.786174] dump_stack_lvl+0x8c/0xd0
[ 28.786926] print_report+0x118/0x5e0
[ 28.787503] kasan_report+0xc8/0x118
[ 28.788214] kasan_check_range+0x100/0x1a8
[ 28.788913] __kasan_check_write+0x20/0x30
[ 28.789515] kasan_atomics_helper+0x760/0x4858
[ 28.790212] kasan_atomics+0x198/0x2e8
[ 28.790834] kunit_try_run_case+0x14c/0x3d0
[ 28.791464] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.792221] kthread+0x24c/0x2d0
[ 28.792807] ret_from_fork+0x10/0x20
[ 28.793422]
[ 28.793776] Allocated by task 254:
[ 28.794384] kasan_save_stack+0x3c/0x68
[ 28.795061] kasan_save_track+0x20/0x40
[ 28.795584] kasan_save_alloc_info+0x40/0x58
[ 28.796262] __kasan_kmalloc+0xd4/0xd8
[ 28.796867] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.797498] kasan_atomics+0xb8/0x2e8
[ 28.798082] kunit_try_run_case+0x14c/0x3d0
[ 28.798684] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.799429] kthread+0x24c/0x2d0
[ 28.799965] ret_from_fork+0x10/0x20
[ 28.800510]
[ 28.800870] The buggy address belongs to the object at fff00000c5d53180
[ 28.800870] which belongs to the cache kmalloc-64 of size 64
[ 28.802213] The buggy address is located 0 bytes to the right of
[ 28.802213] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.803534]
[ 28.803918] The buggy address belongs to the physical page:
[ 28.804681] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.805615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.806456] page_type: f5(slab)
[ 28.807034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.807930] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.808796] page dumped because: kasan: bad access detected
[ 28.809481]
[ 28.809817] Memory state around the buggy address:
[ 28.810488] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.811290] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.812245] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.813069] ^
[ 28.813680] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.814558] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.815389] ==================================================================
---
[ 30.224308] ==================================================================
[ 30.225012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[ 30.226092] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.226816]
[ 30.227271] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.228294] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.228939] Hardware name: linux,dummy-virt (DT)
[ 30.229476] Call trace:
[ 30.229908] show_stack+0x20/0x38 (C)
[ 30.230593] dump_stack_lvl+0x8c/0xd0
[ 30.231323] print_report+0x118/0x5e0
[ 30.231879] kasan_report+0xc8/0x118
[ 30.232864] kasan_check_range+0x100/0x1a8
[ 30.233340] __kasan_check_write+0x20/0x30
[ 30.233787] kasan_atomics_helper+0x15b4/0x4858
[ 30.234812] kasan_atomics+0x198/0x2e8
[ 30.235504] kunit_try_run_case+0x14c/0x3d0
[ 30.236162] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.236996] kthread+0x24c/0x2d0
[ 30.237456] ret_from_fork+0x10/0x20
[ 30.237967]
[ 30.238252] Allocated by task 254:
[ 30.238706] kasan_save_stack+0x3c/0x68
[ 30.239251] kasan_save_track+0x20/0x40
[ 30.239849] kasan_save_alloc_info+0x40/0x58
[ 30.240660] __kasan_kmalloc+0xd4/0xd8
[ 30.241275] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.242014] kasan_atomics+0xb8/0x2e8
[ 30.242619] kunit_try_run_case+0x14c/0x3d0
[ 30.243325] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.244054] kthread+0x24c/0x2d0
[ 30.244625] ret_from_fork+0x10/0x20
[ 30.245292]
[ 30.245511] The buggy address belongs to the object at fff00000c5d53180
[ 30.245511] which belongs to the cache kmalloc-64 of size 64
[ 30.246998] The buggy address is located 0 bytes to the right of
[ 30.246998] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.248522]
[ 30.248964] The buggy address belongs to the physical page:
[ 30.249630] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.250620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.251424] page_type: f5(slab)
[ 30.251961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.252851] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.253698] page dumped because: kasan: bad access detected
[ 30.254352]
[ 30.254722] Memory state around the buggy address:
[ 30.255355] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.256162] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.256912] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.257635] ^
[ 30.258341] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.259188] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.260003] ==================================================================
---
[ 28.212292] ==================================================================
[ 28.212939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[ 28.213566] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.215854]
[ 28.216148] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.216984] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.217407] Hardware name: linux,dummy-virt (DT)
[ 28.217891] Call trace:
[ 28.218601] show_stack+0x20/0x38 (C)
[ 28.219842] dump_stack_lvl+0x8c/0xd0
[ 28.220108] print_report+0x118/0x5e0
[ 28.220342] kasan_report+0xc8/0x118
[ 28.220570] kasan_check_range+0x100/0x1a8
[ 28.220853] __kasan_check_write+0x20/0x30
[ 28.221106] kasan_atomics_helper+0x24c/0x4858
[ 28.221359] kasan_atomics+0x198/0x2e8
[ 28.221588] kunit_try_run_case+0x14c/0x3d0
[ 28.222002] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.222533] kthread+0x24c/0x2d0
[ 28.222941] ret_from_fork+0x10/0x20
[ 28.225237]
[ 28.226163] Allocated by task 254:
[ 28.226802] kasan_save_stack+0x3c/0x68
[ 28.227493] kasan_save_track+0x20/0x40
[ 28.228386] kasan_save_alloc_info+0x40/0x58
[ 28.228942] __kasan_kmalloc+0xd4/0xd8
[ 28.229411] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.230009] kasan_atomics+0xb8/0x2e8
[ 28.230561] kunit_try_run_case+0x14c/0x3d0
[ 28.231417] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.232069] kthread+0x24c/0x2d0
[ 28.232434] ret_from_fork+0x10/0x20
[ 28.232836]
[ 28.233062] The buggy address belongs to the object at fff00000c5d53180
[ 28.233062] which belongs to the cache kmalloc-64 of size 64
[ 28.235999] The buggy address is located 0 bytes to the right of
[ 28.235999] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.237691]
[ 28.237988] The buggy address belongs to the physical page:
[ 28.238492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.239865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.240772] page_type: f5(slab)
[ 28.241404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.242283] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.243514] page dumped because: kasan: bad access detected
[ 28.244170]
[ 28.244570] Memory state around the buggy address:
[ 28.245337] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.246119] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.246955] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.248127] ^
[ 28.248802] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.249725] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.250638] ==================================================================
---
[ 30.189930] ==================================================================
[ 30.190651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[ 30.191585] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.192315]
[ 30.192653] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.193808] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.194381] Hardware name: linux,dummy-virt (DT)
[ 30.194945] Call trace:
[ 30.195352] show_stack+0x20/0x38 (C)
[ 30.195942] dump_stack_lvl+0x8c/0xd0
[ 30.196506] print_report+0x118/0x5e0
[ 30.197012] kasan_report+0xc8/0x118
[ 30.197571] kasan_check_range+0x100/0x1a8
[ 30.198183] __kasan_check_write+0x20/0x30
[ 30.198785] kasan_atomics_helper+0x154c/0x4858
[ 30.199383] kasan_atomics+0x198/0x2e8
[ 30.199976] kunit_try_run_case+0x14c/0x3d0
[ 30.200613] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.201365] kthread+0x24c/0x2d0
[ 30.201911] ret_from_fork+0x10/0x20
[ 30.202468]
[ 30.202783] Allocated by task 254:
[ 30.203313] kasan_save_stack+0x3c/0x68
[ 30.203793] kasan_save_track+0x20/0x40
[ 30.204424] kasan_save_alloc_info+0x40/0x58
[ 30.204998] __kasan_kmalloc+0xd4/0xd8
[ 30.205530] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.206157] kasan_atomics+0xb8/0x2e8
[ 30.206679] kunit_try_run_case+0x14c/0x3d0
[ 30.207243] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.207864] kthread+0x24c/0x2d0
[ 30.208414] ret_from_fork+0x10/0x20
[ 30.208942]
[ 30.209246] The buggy address belongs to the object at fff00000c5d53180
[ 30.209246] which belongs to the cache kmalloc-64 of size 64
[ 30.210347] The buggy address is located 0 bytes to the right of
[ 30.210347] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.211670]
[ 30.212004] The buggy address belongs to the physical page:
[ 30.212599] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.213492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.214304] page_type: f5(slab)
[ 30.214796] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.215645] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.216470] page dumped because: kasan: bad access detected
[ 30.217140]
[ 30.217437] Memory state around the buggy address:
[ 30.218068] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.218861] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.219643] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.220419] ^
[ 30.221026] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.221842] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.222591] ==================================================================
---
[ 29.941339] ==================================================================
[ 29.942388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[ 29.943679] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.944633]
[ 29.945171] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.946283] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.946810] Hardware name: linux,dummy-virt (DT)
[ 29.947361] Call trace:
[ 29.948157] show_stack+0x20/0x38 (C)
[ 29.948614] dump_stack_lvl+0x8c/0xd0
[ 29.949316] print_report+0x118/0x5e0
[ 29.950003] kasan_report+0xc8/0x118
[ 29.950651] kasan_check_range+0x100/0x1a8
[ 29.951360] __kasan_check_write+0x20/0x30
[ 29.952066] kasan_atomics_helper+0x126c/0x4858
[ 29.952803] kasan_atomics+0x198/0x2e8
[ 29.953478] kunit_try_run_case+0x14c/0x3d0
[ 29.954232] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.954917] kthread+0x24c/0x2d0
[ 29.955408] ret_from_fork+0x10/0x20
[ 29.955925]
[ 29.956216] Allocated by task 254:
[ 29.956632] kasan_save_stack+0x3c/0x68
[ 29.957602] kasan_save_track+0x20/0x40
[ 29.958293] kasan_save_alloc_info+0x40/0x58
[ 29.959003] __kasan_kmalloc+0xd4/0xd8
[ 29.959652] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.960409] kasan_atomics+0xb8/0x2e8
[ 29.961082] kunit_try_run_case+0x14c/0x3d0
[ 29.961778] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.962577] kthread+0x24c/0x2d0
[ 29.963213] ret_from_fork+0x10/0x20
[ 29.963895]
[ 29.964378] The buggy address belongs to the object at fff00000c5d53180
[ 29.964378] which belongs to the cache kmalloc-64 of size 64
[ 29.965836] The buggy address is located 0 bytes to the right of
[ 29.965836] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.967257]
[ 29.967567] The buggy address belongs to the physical page:
[ 29.968452] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.969434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.970248] page_type: f5(slab)
[ 29.970718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.971548] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.972685] page dumped because: kasan: bad access detected
[ 29.973410]
[ 29.973911] Memory state around the buggy address:
[ 29.974443] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.975466] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.976215] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.977180] ^
[ 29.977911] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.978889] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.979730] ==================================================================
---
[ 30.294709] ==================================================================
[ 30.295379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[ 30.296520] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.297346]
[ 30.297719] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.298693] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.299339] Hardware name: linux,dummy-virt (DT)
[ 30.299908] Call trace:
[ 30.300379] show_stack+0x20/0x38 (C)
[ 30.300944] dump_stack_lvl+0x8c/0xd0
[ 30.301527] print_report+0x118/0x5e0
[ 30.302178] kasan_report+0xc8/0x118
[ 30.302732] kasan_check_range+0x100/0x1a8
[ 30.303426] __kasan_check_write+0x20/0x30
[ 30.304368] kasan_atomics_helper+0x1644/0x4858
[ 30.304976] kasan_atomics+0x198/0x2e8
[ 30.305510] kunit_try_run_case+0x14c/0x3d0
[ 30.306166] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.306871] kthread+0x24c/0x2d0
[ 30.307446] ret_from_fork+0x10/0x20
[ 30.307940]
[ 30.308256] Allocated by task 254:
[ 30.308768] kasan_save_stack+0x3c/0x68
[ 30.309261] kasan_save_track+0x20/0x40
[ 30.309881] kasan_save_alloc_info+0x40/0x58
[ 30.310465] __kasan_kmalloc+0xd4/0xd8
[ 30.311134] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.311662] kasan_atomics+0xb8/0x2e8
[ 30.312234] kunit_try_run_case+0x14c/0x3d0
[ 30.312870] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.313589] kthread+0x24c/0x2d0
[ 30.314115] ret_from_fork+0x10/0x20
[ 30.314624]
[ 30.314954] The buggy address belongs to the object at fff00000c5d53180
[ 30.314954] which belongs to the cache kmalloc-64 of size 64
[ 30.316124] The buggy address is located 0 bytes to the right of
[ 30.316124] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.317404]
[ 30.317731] The buggy address belongs to the physical page:
[ 30.318378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.319636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.320446] page_type: f5(slab)
[ 30.320953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.321807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.322596] page dumped because: kasan: bad access detected
[ 30.323276]
[ 30.323560] Memory state around the buggy address:
[ 30.324132] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.324933] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.325708] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.326541] ^
[ 30.327128] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.327911] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.328724] ==================================================================
---
[ 28.743446] ==================================================================
[ 28.744308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[ 28.744691] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.745630]
[ 28.746319] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.747602] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.748134] Hardware name: linux,dummy-virt (DT)
[ 28.748663] Call trace:
[ 28.749079] show_stack+0x20/0x38 (C)
[ 28.749756] dump_stack_lvl+0x8c/0xd0
[ 28.750323] print_report+0x118/0x5e0
[ 28.750861] kasan_report+0xc8/0x118
[ 28.751450] kasan_check_range+0x100/0x1a8
[ 28.752087] __kasan_check_write+0x20/0x30
[ 28.752827] kasan_atomics_helper+0x6ec/0x4858
[ 28.753417] kasan_atomics+0x198/0x2e8
[ 28.753957] kunit_try_run_case+0x14c/0x3d0
[ 28.754621] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.755317] kthread+0x24c/0x2d0
[ 28.755908] ret_from_fork+0x10/0x20
[ 28.756438]
[ 28.756758] Allocated by task 254:
[ 28.757196] kasan_save_stack+0x3c/0x68
[ 28.757806] kasan_save_track+0x20/0x40
[ 28.758433] kasan_save_alloc_info+0x40/0x58
[ 28.759036] __kasan_kmalloc+0xd4/0xd8
[ 28.759538] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.760129] kasan_atomics+0xb8/0x2e8
[ 28.760695] kunit_try_run_case+0x14c/0x3d0
[ 28.761351] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.761949] kthread+0x24c/0x2d0
[ 28.762529] ret_from_fork+0x10/0x20
[ 28.763089]
[ 28.763438] The buggy address belongs to the object at fff00000c5d53180
[ 28.763438] which belongs to the cache kmalloc-64 of size 64
[ 28.764709] The buggy address is located 0 bytes to the right of
[ 28.764709] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.766058]
[ 28.766401] The buggy address belongs to the physical page:
[ 28.767034] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.768066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.768874] page_type: f5(slab)
[ 28.769300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.770232] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.771160] page dumped because: kasan: bad access detected
[ 28.771861]
[ 28.772188] Memory state around the buggy address:
[ 28.772903] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.773689] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.774589] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.775489] ^
[ 28.776127] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.776929] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.777707] ==================================================================
---
[ 29.665503] ==================================================================
[ 29.666313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[ 29.667924] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.668610]
[ 29.668874] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.669679] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.671044] Hardware name: linux,dummy-virt (DT)
[ 29.671581] Call trace:
[ 29.671974] show_stack+0x20/0x38 (C)
[ 29.672486] dump_stack_lvl+0x8c/0xd0
[ 29.673388] print_report+0x118/0x5e0
[ 29.674114] kasan_report+0xc8/0x118
[ 29.674791] kasan_check_range+0x100/0x1a8
[ 29.675518] __kasan_check_write+0x20/0x30
[ 29.676262] kasan_atomics_helper+0xf88/0x4858
[ 29.676905] kasan_atomics+0x198/0x2e8
[ 29.677639] kunit_try_run_case+0x14c/0x3d0
[ 29.678367] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.679193] kthread+0x24c/0x2d0
[ 29.679879] ret_from_fork+0x10/0x20
[ 29.680558]
[ 29.681037] Allocated by task 254:
[ 29.681598] kasan_save_stack+0x3c/0x68
[ 29.682278] kasan_save_track+0x20/0x40
[ 29.682960] kasan_save_alloc_info+0x40/0x58
[ 29.683673] __kasan_kmalloc+0xd4/0xd8
[ 29.684380] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.685223] kasan_atomics+0xb8/0x2e8
[ 29.685903] kunit_try_run_case+0x14c/0x3d0
[ 29.686613] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.687354] kthread+0x24c/0x2d0
[ 29.687780] ret_from_fork+0x10/0x20
[ 29.688247]
[ 29.688538] The buggy address belongs to the object at fff00000c5d53180
[ 29.688538] which belongs to the cache kmalloc-64 of size 64
[ 29.690433] The buggy address is located 0 bytes to the right of
[ 29.690433] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.692095]
[ 29.692561] The buggy address belongs to the physical page:
[ 29.693323] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.694343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.695244] page_type: f5(slab)
[ 29.695719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.696800] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.697814] page dumped because: kasan: bad access detected
[ 29.698458]
[ 29.699026] Memory state around the buggy address:
[ 29.699697] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.700576] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.701376] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.702344] ^
[ 29.703089] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.704027] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.704985] ==================================================================
Home
[ 28.890342] ==================================================================
[ 28.891387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[ 28.893202] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.894106]
[ 28.894356] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.895812] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.896376] Hardware name: linux,dummy-virt (DT)
[ 28.897007] Call trace:
[ 28.897363] show_stack+0x20/0x38 (C)
[ 28.897965] dump_stack_lvl+0x8c/0xd0
[ 28.898537] print_report+0x118/0x5e0
[ 28.899102] kasan_report+0xc8/0x118
[ 28.899690] __asan_report_load4_noabort+0x20/0x30
[ 28.900331] kasan_atomics_helper+0x42d8/0x4858
[ 28.900898] kasan_atomics+0x198/0x2e8
[ 28.901536] kunit_try_run_case+0x14c/0x3d0
[ 28.902101] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.902862] kthread+0x24c/0x2d0
[ 28.903382] ret_from_fork+0x10/0x20
[ 28.903996]
[ 28.904363] Allocated by task 254:
[ 28.904812] kasan_save_stack+0x3c/0x68
[ 28.905371] kasan_save_track+0x20/0x40
[ 28.906026] kasan_save_alloc_info+0x40/0x58
[ 28.906597] __kasan_kmalloc+0xd4/0xd8
[ 28.907150] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.907655] kasan_atomics+0xb8/0x2e8
[ 28.908235] kunit_try_run_case+0x14c/0x3d0
[ 28.908885] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.909602] kthread+0x24c/0x2d0
[ 28.910221] ret_from_fork+0x10/0x20
[ 28.910731]
[ 28.911086] The buggy address belongs to the object at fff00000c5d53180
[ 28.911086] which belongs to the cache kmalloc-64 of size 64
[ 28.912260] The buggy address is located 0 bytes to the right of
[ 28.912260] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.913557]
[ 28.913894] The buggy address belongs to the physical page:
[ 28.914500] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.915454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.916257] page_type: f5(slab)
[ 28.916723] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.917663] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.918419] page dumped because: kasan: bad access detected
[ 28.919116]
[ 28.919425] Memory state around the buggy address:
[ 28.919995] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.920840] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.921628] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.922456] ^
[ 28.923102] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.923911] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.924790] ==================================================================
---
[ 29.107779] ==================================================================
[ 29.108512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[ 29.109220] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.110075]
[ 29.110416] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.111925] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.112437] Hardware name: linux,dummy-virt (DT)
[ 29.113367] Call trace:
[ 29.113921] show_stack+0x20/0x38 (C)
[ 29.114501] dump_stack_lvl+0x8c/0xd0
[ 29.115066] print_report+0x118/0x5e0
[ 29.115592] kasan_report+0xc8/0x118
[ 29.116213] __asan_report_load4_noabort+0x20/0x30
[ 29.116886] kasan_atomics_helper+0x3dcc/0x4858
[ 29.117483] kasan_atomics+0x198/0x2e8
[ 29.118056] kunit_try_run_case+0x14c/0x3d0
[ 29.118703] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.119404] kthread+0x24c/0x2d0
[ 29.119921] ret_from_fork+0x10/0x20
[ 29.120495]
[ 29.120827] Allocated by task 254:
[ 29.121251] kasan_save_stack+0x3c/0x68
[ 29.121849] kasan_save_track+0x20/0x40
[ 29.122358] kasan_save_alloc_info+0x40/0x58
[ 29.123011] __kasan_kmalloc+0xd4/0xd8
[ 29.123491] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.124201] kasan_atomics+0xb8/0x2e8
[ 29.124700] kunit_try_run_case+0x14c/0x3d0
[ 29.125289] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.125944] kthread+0x24c/0x2d0
[ 29.126476] ret_from_fork+0x10/0x20
[ 29.127064]
[ 29.127379] The buggy address belongs to the object at fff00000c5d53180
[ 29.127379] which belongs to the cache kmalloc-64 of size 64
[ 29.128526] The buggy address is located 0 bytes to the right of
[ 29.128526] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.129714]
[ 29.130059] The buggy address belongs to the physical page:
[ 29.130722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.131661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.132389] page_type: f5(slab)
[ 29.132890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.133799] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.134563] page dumped because: kasan: bad access detected
[ 29.135224]
[ 29.135525] Memory state around the buggy address:
[ 29.136055] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.136940] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.137728] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.138498] ^
[ 29.139194] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.139976] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.140809] ==================================================================
---
[ 29.250041] ==================================================================
[ 29.250651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[ 29.251797] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.252728]
[ 29.253101] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.254733] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.255458] Hardware name: linux,dummy-virt (DT)
[ 29.256239] Call trace:
[ 29.256803] show_stack+0x20/0x38 (C)
[ 29.257474] dump_stack_lvl+0x8c/0xd0
[ 29.258170] print_report+0x118/0x5e0
[ 29.258884] kasan_report+0xc8/0x118
[ 29.259515] __asan_report_load4_noabort+0x20/0x30
[ 29.260102] kasan_atomics_helper+0x3de4/0x4858
[ 29.260680] kasan_atomics+0x198/0x2e8
[ 29.261604] kunit_try_run_case+0x14c/0x3d0
[ 29.262339] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.263195] kthread+0x24c/0x2d0
[ 29.263854] ret_from_fork+0x10/0x20
[ 29.264514]
[ 29.264820] Allocated by task 254:
[ 29.265307] kasan_save_stack+0x3c/0x68
[ 29.266137] kasan_save_track+0x20/0x40
[ 29.266782] kasan_save_alloc_info+0x40/0x58
[ 29.267327] __kasan_kmalloc+0xd4/0xd8
[ 29.267977] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.268676] kasan_atomics+0xb8/0x2e8
[ 29.269337] kunit_try_run_case+0x14c/0x3d0
[ 29.270056] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.270877] kthread+0x24c/0x2d0
[ 29.271480] ret_from_fork+0x10/0x20
[ 29.271993]
[ 29.272306] The buggy address belongs to the object at fff00000c5d53180
[ 29.272306] which belongs to the cache kmalloc-64 of size 64
[ 29.273847] The buggy address is located 0 bytes to the right of
[ 29.273847] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.275282]
[ 29.275796] The buggy address belongs to the physical page:
[ 29.276534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.277535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.278373] page_type: f5(slab)
[ 29.279043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.280046] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.281010] page dumped because: kasan: bad access detected
[ 29.281648]
[ 29.282210] Memory state around the buggy address:
[ 29.282929] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.283823] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.284768] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.285506] ^
[ 29.286304] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.287244] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.288145] ==================================================================
---
[ 30.052844] ==================================================================
[ 30.053534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[ 30.054356] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.055278]
[ 30.055647] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.056694] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.057171] Hardware name: linux,dummy-virt (DT)
[ 30.057783] Call trace:
[ 30.058180] show_stack+0x20/0x38 (C)
[ 30.058704] dump_stack_lvl+0x8c/0xd0
[ 30.059297] print_report+0x118/0x5e0
[ 30.059835] kasan_report+0xc8/0x118
[ 30.060351] __asan_report_load8_noabort+0x20/0x30
[ 30.060992] kasan_atomics_helper+0x3f04/0x4858
[ 30.061658] kasan_atomics+0x198/0x2e8
[ 30.062254] kunit_try_run_case+0x14c/0x3d0
[ 30.062882] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.063595] kthread+0x24c/0x2d0
[ 30.064187] ret_from_fork+0x10/0x20
[ 30.064726]
[ 30.065077] Allocated by task 254:
[ 30.065539] kasan_save_stack+0x3c/0x68
[ 30.066134] kasan_save_track+0x20/0x40
[ 30.066666] kasan_save_alloc_info+0x40/0x58
[ 30.067250] __kasan_kmalloc+0xd4/0xd8
[ 30.067837] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.068421] kasan_atomics+0xb8/0x2e8
[ 30.068982] kunit_try_run_case+0x14c/0x3d0
[ 30.069623] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.070237] kthread+0x24c/0x2d0
[ 30.070820] ret_from_fork+0x10/0x20
[ 30.071376]
[ 30.071661] The buggy address belongs to the object at fff00000c5d53180
[ 30.071661] which belongs to the cache kmalloc-64 of size 64
[ 30.072919] The buggy address is located 0 bytes to the right of
[ 30.072919] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.074131]
[ 30.074446] The buggy address belongs to the physical page:
[ 30.075013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.076042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.076734] page_type: f5(slab)
[ 30.077249] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.078074] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.078913] page dumped because: kasan: bad access detected
[ 30.079612]
[ 30.079956] Memory state around the buggy address:
[ 30.080525] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.081321] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.082084] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.082844] ^
[ 30.083479] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.084240] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.085003] ==================================================================
---
[ 30.261554] ==================================================================
[ 30.262506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[ 30.263557] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.264557]
[ 30.265012] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.265479] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.265694] Hardware name: linux,dummy-virt (DT)
[ 30.265955] Call trace:
[ 30.266117] show_stack+0x20/0x38 (C)
[ 30.266350] dump_stack_lvl+0x8c/0xd0
[ 30.266597] print_report+0x118/0x5e0
[ 30.267180] kasan_report+0xc8/0x118
[ 30.268109] __asan_report_load8_noabort+0x20/0x30
[ 30.269074] kasan_atomics_helper+0x3db0/0x4858
[ 30.269936] kasan_atomics+0x198/0x2e8
[ 30.270588] kunit_try_run_case+0x14c/0x3d0
[ 30.271246] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.271936] kthread+0x24c/0x2d0
[ 30.272428] ret_from_fork+0x10/0x20
[ 30.272972]
[ 30.273293] Allocated by task 254:
[ 30.273771] kasan_save_stack+0x3c/0x68
[ 30.274295] kasan_save_track+0x20/0x40
[ 30.274884] kasan_save_alloc_info+0x40/0x58
[ 30.275394] __kasan_kmalloc+0xd4/0xd8
[ 30.275988] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.276576] kasan_atomics+0xb8/0x2e8
[ 30.277114] kunit_try_run_case+0x14c/0x3d0
[ 30.277659] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.278301] kthread+0x24c/0x2d0
[ 30.278808] ret_from_fork+0x10/0x20
[ 30.279322]
[ 30.279625] The buggy address belongs to the object at fff00000c5d53180
[ 30.279625] which belongs to the cache kmalloc-64 of size 64
[ 30.280844] The buggy address is located 0 bytes to the right of
[ 30.280844] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.282125]
[ 30.282468] The buggy address belongs to the physical page:
[ 30.283125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.284063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.284926] page_type: f5(slab)
[ 30.285388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.286324] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.287156] page dumped because: kasan: bad access detected
[ 30.287790]
[ 30.288104] Memory state around the buggy address:
[ 30.288629] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.289507] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.290280] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.291090] ^
[ 30.291719] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.292511] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.293247] ==================================================================
---
[ 28.084279] ==================================================================
[ 28.085889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[ 28.086670] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.087289]
[ 28.088483] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.089645] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.090301] Hardware name: linux,dummy-virt (DT)
[ 28.091138] Call trace:
[ 28.091648] show_stack+0x20/0x38 (C)
[ 28.092078] dump_stack_lvl+0x8c/0xd0
[ 28.092483] print_report+0x118/0x5e0
[ 28.092913] kasan_report+0xc8/0x118
[ 28.093720] __asan_report_load4_noabort+0x20/0x30
[ 28.094374] kasan_atomics_helper+0x40a8/0x4858
[ 28.094914] kasan_atomics+0x198/0x2e8
[ 28.095627] kunit_try_run_case+0x14c/0x3d0
[ 28.096298] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.097398] kthread+0x24c/0x2d0
[ 28.098019] ret_from_fork+0x10/0x20
[ 28.098767]
[ 28.099398] Allocated by task 254:
[ 28.099943] kasan_save_stack+0x3c/0x68
[ 28.100583] kasan_save_track+0x20/0x40
[ 28.101314] kasan_save_alloc_info+0x40/0x58
[ 28.102022] __kasan_kmalloc+0xd4/0xd8
[ 28.102705] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.103592] kasan_atomics+0xb8/0x2e8
[ 28.104274] kunit_try_run_case+0x14c/0x3d0
[ 28.104932] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.105766] kthread+0x24c/0x2d0
[ 28.106244] ret_from_fork+0x10/0x20
[ 28.106963]
[ 28.108389] The buggy address belongs to the object at fff00000c5d53180
[ 28.108389] which belongs to the cache kmalloc-64 of size 64
[ 28.109833] The buggy address is located 0 bytes to the right of
[ 28.109833] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.111428]
[ 28.111736] The buggy address belongs to the physical page:
[ 28.112717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.113596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.114394] page_type: f5(slab)
[ 28.114918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.116105] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.116968] page dumped because: kasan: bad access detected
[ 28.117551]
[ 28.117921] Memory state around the buggy address:
[ 28.118472] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.119609] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.120427] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.121246] ^
[ 28.121825] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.122612] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.123813] ==================================================================
---
[ 29.179945] ==================================================================
[ 29.180641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[ 29.181415] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.182190]
[ 29.182576] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.183814] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.184229] Hardware name: linux,dummy-virt (DT)
[ 29.184663] Call trace:
[ 29.184987] show_stack+0x20/0x38 (C)
[ 29.185398] dump_stack_lvl+0x8c/0xd0
[ 29.185865] print_report+0x118/0x5e0
[ 29.187195] kasan_report+0xc8/0x118
[ 29.187798] __asan_report_load4_noabort+0x20/0x30
[ 29.188237] kasan_atomics_helper+0x3dbc/0x4858
[ 29.188701] kasan_atomics+0x198/0x2e8
[ 29.189137] kunit_try_run_case+0x14c/0x3d0
[ 29.189849] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.190525] kthread+0x24c/0x2d0
[ 29.191044] ret_from_fork+0x10/0x20
[ 29.191612]
[ 29.191947] Allocated by task 254:
[ 29.192400] kasan_save_stack+0x3c/0x68
[ 29.193004] kasan_save_track+0x20/0x40
[ 29.193493] kasan_save_alloc_info+0x40/0x58
[ 29.194177] __kasan_kmalloc+0xd4/0xd8
[ 29.194712] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.195262] kasan_atomics+0xb8/0x2e8
[ 29.195833] kunit_try_run_case+0x14c/0x3d0
[ 29.196481] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.197220] kthread+0x24c/0x2d0
[ 29.197695] ret_from_fork+0x10/0x20
[ 29.198300]
[ 29.198666] The buggy address belongs to the object at fff00000c5d53180
[ 29.198666] which belongs to the cache kmalloc-64 of size 64
[ 29.199820] The buggy address is located 0 bytes to the right of
[ 29.199820] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.201207]
[ 29.201553] The buggy address belongs to the physical page:
[ 29.202602] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.203473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.204276] page_type: f5(slab)
[ 29.204713] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.205622] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.206490] page dumped because: kasan: bad access detected
[ 29.207174]
[ 29.207482] Memory state around the buggy address:
[ 29.208055] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.208849] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.209568] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.210418] ^
[ 29.211032] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.211791] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.212587] ==================================================================
---
[ 30.409722] ==================================================================
[ 30.410760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[ 30.411763] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.412641]
[ 30.413090] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.414125] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.414602] Hardware name: linux,dummy-virt (DT)
[ 30.415168] Call trace:
[ 30.415577] show_stack+0x20/0x38 (C)
[ 30.416229] dump_stack_lvl+0x8c/0xd0
[ 30.416738] print_report+0x118/0x5e0
[ 30.417442] kasan_report+0xc8/0x118
[ 30.418097] __asan_report_load8_noabort+0x20/0x30
[ 30.418958] kasan_atomics_helper+0x3e10/0x4858
[ 30.419643] kasan_atomics+0x198/0x2e8
[ 30.420204] kunit_try_run_case+0x14c/0x3d0
[ 30.420906] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.421540] kthread+0x24c/0x2d0
[ 30.422183] ret_from_fork+0x10/0x20
[ 30.422858]
[ 30.423218] Allocated by task 254:
[ 30.423688] kasan_save_stack+0x3c/0x68
[ 30.424362] kasan_save_track+0x20/0x40
[ 30.424992] kasan_save_alloc_info+0x40/0x58
[ 30.425647] __kasan_kmalloc+0xd4/0xd8
[ 30.426229] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.426867] kasan_atomics+0xb8/0x2e8
[ 30.427425] kunit_try_run_case+0x14c/0x3d0
[ 30.427980] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.428723] kthread+0x24c/0x2d0
[ 30.429352] ret_from_fork+0x10/0x20
[ 30.429943]
[ 30.430288] The buggy address belongs to the object at fff00000c5d53180
[ 30.430288] which belongs to the cache kmalloc-64 of size 64
[ 30.431637] The buggy address is located 0 bytes to the right of
[ 30.431637] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.432992]
[ 30.433364] The buggy address belongs to the physical page:
[ 30.434114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.435027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.435945] page_type: f5(slab)
[ 30.436452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.437387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.438256] page dumped because: kasan: bad access detected
[ 30.438981]
[ 30.439302] Memory state around the buggy address:
[ 30.439933] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.440799] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.441661] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.442398] ^
[ 30.443020] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.443814] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.444607] ==================================================================
---
[ 29.333593] ==================================================================
[ 29.334205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[ 29.334868] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.336773]
[ 29.337110] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.338207] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.338819] Hardware name: linux,dummy-virt (DT)
[ 29.339418] Call trace:
[ 29.339886] show_stack+0x20/0x38 (C)
[ 29.340508] dump_stack_lvl+0x8c/0xd0
[ 29.341130] print_report+0x118/0x5e0
[ 29.341791] kasan_report+0xc8/0x118
[ 29.342394] __asan_report_load4_noabort+0x20/0x30
[ 29.343125] kasan_atomics_helper+0x3dd8/0x4858
[ 29.343825] kasan_atomics+0x198/0x2e8
[ 29.344434] kunit_try_run_case+0x14c/0x3d0
[ 29.345101] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.345845] kthread+0x24c/0x2d0
[ 29.346363] ret_from_fork+0x10/0x20
[ 29.346974]
[ 29.347200] Allocated by task 254:
[ 29.347822] kasan_save_stack+0x3c/0x68
[ 29.348407] kasan_save_track+0x20/0x40
[ 29.349052] kasan_save_alloc_info+0x40/0x58
[ 29.349715] __kasan_kmalloc+0xd4/0xd8
[ 29.350289] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.350931] kasan_atomics+0xb8/0x2e8
[ 29.351483] kunit_try_run_case+0x14c/0x3d0
[ 29.351915] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.352393] kthread+0x24c/0x2d0
[ 29.352776] ret_from_fork+0x10/0x20
[ 29.353207]
[ 29.353484] The buggy address belongs to the object at fff00000c5d53180
[ 29.353484] which belongs to the cache kmalloc-64 of size 64
[ 29.355064] The buggy address is located 0 bytes to the right of
[ 29.355064] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.356029]
[ 29.356284] The buggy address belongs to the physical page:
[ 29.357390] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.358528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.359326] page_type: f5(slab)
[ 29.359686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.360450] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.361205] page dumped because: kasan: bad access detected
[ 29.361700]
[ 29.362044] Memory state around the buggy address:
[ 29.363260] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.364075] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.364790] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.365362] ^
[ 29.365926] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.366826] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.367616] ==================================================================
---
[ 28.293551] ==================================================================
[ 28.294338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[ 28.295586] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.296643]
[ 28.298093] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.299180] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.299816] Hardware name: linux,dummy-virt (DT)
[ 28.300389] Call trace:
[ 28.300769] show_stack+0x20/0x38 (C)
[ 28.301297] dump_stack_lvl+0x8c/0xd0
[ 28.302444] print_report+0x118/0x5e0
[ 28.302884] kasan_report+0xc8/0x118
[ 28.303654] __asan_report_load4_noabort+0x20/0x30
[ 28.304438] kasan_atomics_helper+0x40fc/0x4858
[ 28.305209] kasan_atomics+0x198/0x2e8
[ 28.305909] kunit_try_run_case+0x14c/0x3d0
[ 28.306622] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.307629] kthread+0x24c/0x2d0
[ 28.308318] ret_from_fork+0x10/0x20
[ 28.309212]
[ 28.309658] Allocated by task 254:
[ 28.310330] kasan_save_stack+0x3c/0x68
[ 28.310799] kasan_save_track+0x20/0x40
[ 28.311454] kasan_save_alloc_info+0x40/0x58
[ 28.312366] __kasan_kmalloc+0xd4/0xd8
[ 28.313007] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.313762] kasan_atomics+0xb8/0x2e8
[ 28.314429] kunit_try_run_case+0x14c/0x3d0
[ 28.316070] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.316421] kthread+0x24c/0x2d0
[ 28.316633] ret_from_fork+0x10/0x20
[ 28.317766]
[ 28.318230] The buggy address belongs to the object at fff00000c5d53180
[ 28.318230] which belongs to the cache kmalloc-64 of size 64
[ 28.320046] The buggy address is located 0 bytes to the right of
[ 28.320046] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.321335]
[ 28.321625] The buggy address belongs to the physical page:
[ 28.322726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.323985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.324928] page_type: f5(slab)
[ 28.325573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.326587] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.327871] page dumped because: kasan: bad access detected
[ 28.328717]
[ 28.329204] Memory state around the buggy address:
[ 28.329833] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.330867] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.331812] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.332967] ^
[ 28.333554] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.334610] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.336526] ==================================================================
---
[ 30.330377] ==================================================================
[ 30.332270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[ 30.333032] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.334073]
[ 30.334709] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.335909] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.336478] Hardware name: linux,dummy-virt (DT)
[ 30.337136] Call trace:
[ 30.337678] show_stack+0x20/0x38 (C)
[ 30.338337] dump_stack_lvl+0x8c/0xd0
[ 30.339035] print_report+0x118/0x5e0
[ 30.339660] kasan_report+0xc8/0x118
[ 30.340296] __asan_report_load8_noabort+0x20/0x30
[ 30.341047] kasan_atomics_helper+0x3df4/0x4858
[ 30.341730] kasan_atomics+0x198/0x2e8
[ 30.342394] kunit_try_run_case+0x14c/0x3d0
[ 30.343093] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.343849] kthread+0x24c/0x2d0
[ 30.344461] ret_from_fork+0x10/0x20
[ 30.345094]
[ 30.345465] Allocated by task 254:
[ 30.346094] kasan_save_stack+0x3c/0x68
[ 30.346785] kasan_save_track+0x20/0x40
[ 30.347420] kasan_save_alloc_info+0x40/0x58
[ 30.348132] __kasan_kmalloc+0xd4/0xd8
[ 30.348769] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.349315] kasan_atomics+0xb8/0x2e8
[ 30.349794] kunit_try_run_case+0x14c/0x3d0
[ 30.350302] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.350976] kthread+0x24c/0x2d0
[ 30.351390] ret_from_fork+0x10/0x20
[ 30.352123]
[ 30.352468] The buggy address belongs to the object at fff00000c5d53180
[ 30.352468] which belongs to the cache kmalloc-64 of size 64
[ 30.354041] The buggy address is located 0 bytes to the right of
[ 30.354041] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.355547]
[ 30.356046] The buggy address belongs to the physical page:
[ 30.356824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.357830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.358662] page_type: f5(slab)
[ 30.359258] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.360196] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.361098] page dumped because: kasan: bad access detected
[ 30.361821]
[ 30.362045] Memory state around the buggy address:
[ 30.362859] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.363820] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.364760] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.365596] ^
[ 30.366256] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.367138] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.367978] ==================================================================
---
[ 30.482315] ==================================================================
[ 30.483093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[ 30.483933] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 30.484901]
[ 30.485306] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 30.486272] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 30.486884] Hardware name: linux,dummy-virt (DT)
[ 30.487332] Call trace:
[ 30.487801] show_stack+0x20/0x38 (C)
[ 30.488328] dump_stack_lvl+0x8c/0xd0
[ 30.489462] print_report+0x118/0x5e0
[ 30.489992] kasan_report+0xc8/0x118
[ 30.490594] __asan_report_load8_noabort+0x20/0x30
[ 30.491286] kasan_atomics_helper+0x3e20/0x4858
[ 30.491932] kasan_atomics+0x198/0x2e8
[ 30.492515] kunit_try_run_case+0x14c/0x3d0
[ 30.493152] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.493810] kthread+0x24c/0x2d0
[ 30.494418] ret_from_fork+0x10/0x20
[ 30.494993]
[ 30.495366] Allocated by task 254:
[ 30.495913] kasan_save_stack+0x3c/0x68
[ 30.496560] kasan_save_track+0x20/0x40
[ 30.497220] kasan_save_alloc_info+0x40/0x58
[ 30.497852] __kasan_kmalloc+0xd4/0xd8
[ 30.498423] __kmalloc_cache_noprof+0x15c/0x3c0
[ 30.498997] kasan_atomics+0xb8/0x2e8
[ 30.499638] kunit_try_run_case+0x14c/0x3d0
[ 30.500219] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 30.500962] kthread+0x24c/0x2d0
[ 30.501573] ret_from_fork+0x10/0x20
[ 30.502191]
[ 30.502514] The buggy address belongs to the object at fff00000c5d53180
[ 30.502514] which belongs to the cache kmalloc-64 of size 64
[ 30.503906] The buggy address is located 0 bytes to the right of
[ 30.503906] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 30.505261]
[ 30.505587] The buggy address belongs to the physical page:
[ 30.506324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 30.507176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 30.508012] page_type: f5(slab)
[ 30.508545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 30.509410] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 30.510277] page dumped because: kasan: bad access detected
[ 30.511029]
[ 30.511390] Memory state around the buggy address:
[ 30.512003] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.512891] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 30.513628] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 30.514513] ^
[ 30.515054] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.515993] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 30.516842] ==================================================================
---
[ 29.403330] ==================================================================
[ 29.404720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[ 29.405121] Read of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.405455]
[ 29.405605] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.407784] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.408692] Hardware name: linux,dummy-virt (DT)
[ 29.409151] Call trace:
[ 29.409341] show_stack+0x20/0x38 (C)
[ 29.409584] dump_stack_lvl+0x8c/0xd0
[ 29.409926] print_report+0x118/0x5e0
[ 29.410604] kasan_report+0xc8/0x118
[ 29.411627] __asan_report_load4_noabort+0x20/0x30
[ 29.412595] kasan_atomics_helper+0x3e04/0x4858
[ 29.413361] kasan_atomics+0x198/0x2e8
[ 29.413975] kunit_try_run_case+0x14c/0x3d0
[ 29.414502] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.415238] kthread+0x24c/0x2d0
[ 29.415927] ret_from_fork+0x10/0x20
[ 29.416618]
[ 29.417040] Allocated by task 254:
[ 29.417658] kasan_save_stack+0x3c/0x68
[ 29.418414] kasan_save_track+0x20/0x40
[ 29.419117] kasan_save_alloc_info+0x40/0x58
[ 29.419815] __kasan_kmalloc+0xd4/0xd8
[ 29.420434] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.421163] kasan_atomics+0xb8/0x2e8
[ 29.421772] kunit_try_run_case+0x14c/0x3d0
[ 29.422489] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.423273] kthread+0x24c/0x2d0
[ 29.423868] ret_from_fork+0x10/0x20
[ 29.424510]
[ 29.424960] The buggy address belongs to the object at fff00000c5d53180
[ 29.424960] which belongs to the cache kmalloc-64 of size 64
[ 29.426339] The buggy address is located 0 bytes to the right of
[ 29.426339] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.427823]
[ 29.428285] The buggy address belongs to the physical page:
[ 29.429092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.430094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.430958] page_type: f5(slab)
[ 29.431517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.432486] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.433431] page dumped because: kasan: bad access detected
[ 29.434165]
[ 29.434614] Memory state around the buggy address:
[ 29.435278] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.436008] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.436716] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.437501] ^
[ 29.438279] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.439192] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.440074] ==================================================================
---
[ 29.479760] ==================================================================
[ 29.480401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[ 29.481333] Read of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.482493]
[ 29.482925] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.484061] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.484672] Hardware name: linux,dummy-virt (DT)
[ 29.485334] Call trace:
[ 29.485775] show_stack+0x20/0x38 (C)
[ 29.486442] dump_stack_lvl+0x8c/0xd0
[ 29.487062] print_report+0x118/0x5e0
[ 29.487681] kasan_report+0xc8/0x118
[ 29.488334] __asan_report_load8_noabort+0x20/0x30
[ 29.489022] kasan_atomics_helper+0x3f58/0x4858
[ 29.489688] kasan_atomics+0x198/0x2e8
[ 29.490318] kunit_try_run_case+0x14c/0x3d0
[ 29.490993] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.491720] kthread+0x24c/0x2d0
[ 29.492311] ret_from_fork+0x10/0x20
[ 29.492912]
[ 29.493237] Allocated by task 254:
[ 29.493789] kasan_save_stack+0x3c/0x68
[ 29.494438] kasan_save_track+0x20/0x40
[ 29.495036] kasan_save_alloc_info+0x40/0x58
[ 29.495704] __kasan_kmalloc+0xd4/0xd8
[ 29.496306] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.496963] kasan_atomics+0xb8/0x2e8
[ 29.497486] kunit_try_run_case+0x14c/0x3d0
[ 29.498155] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.498908] kthread+0x24c/0x2d0
[ 29.499420] ret_from_fork+0x10/0x20
[ 29.500011]
[ 29.500402] The buggy address belongs to the object at fff00000c5d53180
[ 29.500402] which belongs to the cache kmalloc-64 of size 64
[ 29.501707] The buggy address is located 0 bytes to the right of
[ 29.501707] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.503105]
[ 29.503481] The buggy address belongs to the physical page:
[ 29.504192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.504985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.505865] page_type: f5(slab)
[ 29.506414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.507378] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.508249] page dumped because: kasan: bad access detected
[ 29.508934]
[ 29.509258] Memory state around the buggy address:
[ 29.509897] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.510829] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.511683] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.512471] ^
[ 29.513151] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.514001] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.514816] ==================================================================
Home
[ 29.557197] ==================================================================
[ 29.557896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[ 29.559080] Write of size 8 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 29.559694]
[ 29.560047] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 29.560989] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.561550] Hardware name: linux,dummy-virt (DT)
[ 29.562175] Call trace:
[ 29.562672] show_stack+0x20/0x38 (C)
[ 29.563202] dump_stack_lvl+0x8c/0xd0
[ 29.563661] print_report+0x118/0x5e0
[ 29.564354] kasan_report+0xc8/0x118
[ 29.565020] __asan_report_store8_noabort+0x20/0x30
[ 29.565796] kasan_atomics_helper+0x3e5c/0x4858
[ 29.566409] kasan_atomics+0x198/0x2e8
[ 29.567101] kunit_try_run_case+0x14c/0x3d0
[ 29.567889] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.568599] kthread+0x24c/0x2d0
[ 29.569218] ret_from_fork+0x10/0x20
[ 29.569844]
[ 29.570179] Allocated by task 254:
[ 29.570709] kasan_save_stack+0x3c/0x68
[ 29.571374] kasan_save_track+0x20/0x40
[ 29.572015] kasan_save_alloc_info+0x40/0x58
[ 29.572629] __kasan_kmalloc+0xd4/0xd8
[ 29.573204] __kmalloc_cache_noprof+0x15c/0x3c0
[ 29.573872] kasan_atomics+0xb8/0x2e8
[ 29.574408] kunit_try_run_case+0x14c/0x3d0
[ 29.575061] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 29.575813] kthread+0x24c/0x2d0
[ 29.576324] ret_from_fork+0x10/0x20
[ 29.576962]
[ 29.577355] The buggy address belongs to the object at fff00000c5d53180
[ 29.577355] which belongs to the cache kmalloc-64 of size 64
[ 29.578595] The buggy address is located 0 bytes to the right of
[ 29.578595] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 29.580031]
[ 29.580403] The buggy address belongs to the physical page:
[ 29.581059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 29.582022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 29.582869] page_type: f5(slab)
[ 29.583408] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 29.584326] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 29.585176] page dumped because: kasan: bad access detected
[ 29.585852]
[ 29.586195] Memory state around the buggy address:
[ 29.586836] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.587644] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.588549] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.589363] ^
[ 29.589988] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.590853] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.591655] ==================================================================
---
[ 28.126159] ==================================================================
[ 28.126871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[ 28.128593] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.129298]
[ 28.129613] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.131524] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.132009] Hardware name: linux,dummy-virt (DT)
[ 28.132580] Call trace:
[ 28.132951] show_stack+0x20/0x38 (C)
[ 28.133465] dump_stack_lvl+0x8c/0xd0
[ 28.134508] print_report+0x118/0x5e0
[ 28.135220] kasan_report+0xc8/0x118
[ 28.136135] __asan_report_store4_noabort+0x20/0x30
[ 28.136905] kasan_atomics_helper+0x3f7c/0x4858
[ 28.137826] kasan_atomics+0x198/0x2e8
[ 28.138497] kunit_try_run_case+0x14c/0x3d0
[ 28.139509] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.140317] kthread+0x24c/0x2d0
[ 28.140974] ret_from_fork+0x10/0x20
[ 28.141659]
[ 28.142143] Allocated by task 254:
[ 28.142775] kasan_save_stack+0x3c/0x68
[ 28.143478] kasan_save_track+0x20/0x40
[ 28.144416] kasan_save_alloc_info+0x40/0x58
[ 28.145152] __kasan_kmalloc+0xd4/0xd8
[ 28.145823] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.146393] kasan_atomics+0xb8/0x2e8
[ 28.146920] kunit_try_run_case+0x14c/0x3d0
[ 28.148519] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.149210] kthread+0x24c/0x2d0
[ 28.149698] ret_from_fork+0x10/0x20
[ 28.150269]
[ 28.150605] The buggy address belongs to the object at fff00000c5d53180
[ 28.150605] which belongs to the cache kmalloc-64 of size 64
[ 28.152227] The buggy address is located 0 bytes to the right of
[ 28.152227] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.153504]
[ 28.153890] The buggy address belongs to the physical page:
[ 28.154540] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.155848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.156621] page_type: f5(slab)
[ 28.157113] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.157998] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.158820] page dumped because: kasan: bad access detected
[ 28.159713]
[ 28.160025] Memory state around the buggy address:
[ 28.160554] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.161398] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.162262] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.163113] ^
[ 28.164016] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.164820] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.165574] ==================================================================
---
[ 28.378410] ==================================================================
[ 28.379143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[ 28.379880] Write of size 4 at addr fff00000c5d531b0 by task kunit_try_catch/254
[ 28.380673]
[ 28.381472] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.382559] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.383760] Hardware name: linux,dummy-virt (DT)
[ 28.384757] Call trace:
[ 28.385221] show_stack+0x20/0x38 (C)
[ 28.385528] dump_stack_lvl+0x8c/0xd0
[ 28.385821] print_report+0x118/0x5e0
[ 28.386424] kasan_report+0xc8/0x118
[ 28.387489] __asan_report_store4_noabort+0x20/0x30
[ 28.388770] kasan_atomics_helper+0x3f94/0x4858
[ 28.389292] kasan_atomics+0x198/0x2e8
[ 28.389704] kunit_try_run_case+0x14c/0x3d0
[ 28.390604] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.391924] kthread+0x24c/0x2d0
[ 28.392652] ret_from_fork+0x10/0x20
[ 28.393180]
[ 28.393489] Allocated by task 254:
[ 28.393990] kasan_save_stack+0x3c/0x68
[ 28.394481] kasan_save_track+0x20/0x40
[ 28.396904] kasan_save_alloc_info+0x40/0x58
[ 28.397679] __kasan_kmalloc+0xd4/0xd8
[ 28.398350] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.398975] kasan_atomics+0xb8/0x2e8
[ 28.399440] kunit_try_run_case+0x14c/0x3d0
[ 28.400055] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.400793] kthread+0x24c/0x2d0
[ 28.401350] ret_from_fork+0x10/0x20
[ 28.401987]
[ 28.402392] The buggy address belongs to the object at fff00000c5d53180
[ 28.402392] which belongs to the cache kmalloc-64 of size 64
[ 28.404163] The buggy address is located 0 bytes to the right of
[ 28.404163] allocated 48-byte region [fff00000c5d53180, fff00000c5d531b0)
[ 28.405808]
[ 28.406187] The buggy address belongs to the physical page:
[ 28.406928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d53
[ 28.408120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.409133] page_type: f5(slab)
[ 28.409676] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 28.410597] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 28.411857] page dumped because: kasan: bad access detected
[ 28.412664]
[ 28.413028] Memory state around the buggy address:
[ 28.413554] fff00000c5d53080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.414449] fff00000c5d53100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.415788] >fff00000c5d53180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.416466] ^
[ 28.417156] fff00000c5d53200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.417696] fff00000c5d53280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.419124] ==================================================================
Home
[ 27.398146] ==================================================================
[ 27.398780] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[ 27.400533] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.401461]
[ 27.401813] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.402934] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.404358] Hardware name: linux,dummy-virt (DT)
[ 27.404919] Call trace:
[ 27.405359] show_stack+0x20/0x38 (C)
[ 27.405931] dump_stack_lvl+0x8c/0xd0
[ 27.406576] print_report+0x118/0x5e0
[ 27.407299] kasan_report+0xc8/0x118
[ 27.407935] kasan_check_range+0x100/0x1a8
[ 27.408475] __kasan_check_write+0x20/0x30
[ 27.409011] kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[ 27.409618] kasan_bitops_generic+0x110/0x1c8
[ 27.411856] kunit_try_run_case+0x14c/0x3d0
[ 27.412323] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.413283] kthread+0x24c/0x2d0
[ 27.413929] ret_from_fork+0x10/0x20
[ 27.414635]
[ 27.415574] Allocated by task 250:
[ 27.415982] kasan_save_stack+0x3c/0x68
[ 27.416505] kasan_save_track+0x20/0x40
[ 27.417047] kasan_save_alloc_info+0x40/0x58
[ 27.417577] __kasan_kmalloc+0xd4/0xd8
[ 27.418204] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.418704] kasan_bitops_generic+0xa0/0x1c8
[ 27.419476] kunit_try_run_case+0x14c/0x3d0
[ 27.420308] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.420781] kthread+0x24c/0x2d0
[ 27.422028] ret_from_fork+0x10/0x20
[ 27.422426]
[ 27.422649] The buggy address belongs to the object at fff00000c5b73360
[ 27.422649] which belongs to the cache kmalloc-16 of size 16
[ 27.424523] The buggy address is located 8 bytes inside of
[ 27.424523] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.425920]
[ 27.426218] The buggy address belongs to the physical page:
[ 27.426861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.428267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.428599] page_type: f5(slab)
[ 27.428838] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.429186] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.429513] page dumped because: kasan: bad access detected
[ 27.429837]
[ 27.430209] Memory state around the buggy address:
[ 27.432078] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.432985] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.434005] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.434970] ^
[ 27.435662] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.437260] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.438164] ==================================================================
---
[ 27.481475] ==================================================================
[ 27.482203] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[ 27.483163] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.485168]
[ 27.485509] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.486669] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.487632] Hardware name: linux,dummy-virt (DT)
[ 27.488174] Call trace:
[ 27.488642] show_stack+0x20/0x38 (C)
[ 27.489290] dump_stack_lvl+0x8c/0xd0
[ 27.490001] print_report+0x118/0x5e0
[ 27.490525] kasan_report+0xc8/0x118
[ 27.491215] kasan_check_range+0x100/0x1a8
[ 27.492045] __kasan_check_write+0x20/0x30
[ 27.493050] kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[ 27.494138] kasan_bitops_generic+0x110/0x1c8
[ 27.495043] kunit_try_run_case+0x14c/0x3d0
[ 27.495726] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.496404] kthread+0x24c/0x2d0
[ 27.496870] ret_from_fork+0x10/0x20
[ 27.497364]
[ 27.497642] Allocated by task 250:
[ 27.498636] kasan_save_stack+0x3c/0x68
[ 27.499458] kasan_save_track+0x20/0x40
[ 27.500219] kasan_save_alloc_info+0x40/0x58
[ 27.501319] __kasan_kmalloc+0xd4/0xd8
[ 27.501859] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.502619] kasan_bitops_generic+0xa0/0x1c8
[ 27.503368] kunit_try_run_case+0x14c/0x3d0
[ 27.503954] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.505466] kthread+0x24c/0x2d0
[ 27.505852] ret_from_fork+0x10/0x20
[ 27.506236]
[ 27.506459] The buggy address belongs to the object at fff00000c5b73360
[ 27.506459] which belongs to the cache kmalloc-16 of size 16
[ 27.507553] The buggy address is located 8 bytes inside of
[ 27.507553] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.509334]
[ 27.509703] The buggy address belongs to the physical page:
[ 27.510238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.512396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.513986] page_type: f5(slab)
[ 27.514918] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.516148] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.516673] page dumped because: kasan: bad access detected
[ 27.517186]
[ 27.517597] Memory state around the buggy address:
[ 27.518529] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.519577] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.520421] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.521726] ^
[ 27.522606] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.523541] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.524349] ==================================================================
---
[ 27.658141] ==================================================================
[ 27.658880] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[ 27.659945] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.661046]
[ 27.661397] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.662404] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.663161] Hardware name: linux,dummy-virt (DT)
[ 27.663622] Call trace:
[ 27.664255] show_stack+0x20/0x38 (C)
[ 27.664950] dump_stack_lvl+0x8c/0xd0
[ 27.665635] print_report+0x118/0x5e0
[ 27.666334] kasan_report+0xc8/0x118
[ 27.667015] kasan_check_range+0x100/0x1a8
[ 27.667717] __kasan_check_write+0x20/0x30
[ 27.668426] kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[ 27.669231] kasan_bitops_generic+0x110/0x1c8
[ 27.669953] kunit_try_run_case+0x14c/0x3d0
[ 27.670528] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.671247] kthread+0x24c/0x2d0
[ 27.672228] ret_from_fork+0x10/0x20
[ 27.672665]
[ 27.673144] Allocated by task 250:
[ 27.673773] kasan_save_stack+0x3c/0x68
[ 27.674431] kasan_save_track+0x20/0x40
[ 27.675136] kasan_save_alloc_info+0x40/0x58
[ 27.675848] __kasan_kmalloc+0xd4/0xd8
[ 27.676491] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.677224] kasan_bitops_generic+0xa0/0x1c8
[ 27.677944] kunit_try_run_case+0x14c/0x3d0
[ 27.678680] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.679347] kthread+0x24c/0x2d0
[ 27.679822] ret_from_fork+0x10/0x20
[ 27.680327]
[ 27.680630] The buggy address belongs to the object at fff00000c5b73360
[ 27.680630] which belongs to the cache kmalloc-16 of size 16
[ 27.682478] The buggy address is located 8 bytes inside of
[ 27.682478] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.683829]
[ 27.684312] The buggy address belongs to the physical page:
[ 27.685060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.686025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.686912] page_type: f5(slab)
[ 27.687545] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.688500] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.689445] page dumped because: kasan: bad access detected
[ 27.690072]
[ 27.690377] Memory state around the buggy address:
[ 27.691003] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.692272] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.692996] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.693902] ^
[ 27.694786] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.695729] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.696639] ==================================================================
---
[ 27.616110] ==================================================================
[ 27.617282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[ 27.618299] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.618941]
[ 27.620268] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.621419] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.622068] Hardware name: linux,dummy-virt (DT)
[ 27.622827] Call trace:
[ 27.623377] show_stack+0x20/0x38 (C)
[ 27.624072] dump_stack_lvl+0x8c/0xd0
[ 27.624710] print_report+0x118/0x5e0
[ 27.625366] kasan_report+0xc8/0x118
[ 27.625944] kasan_check_range+0x100/0x1a8
[ 27.626769] __kasan_check_write+0x20/0x30
[ 27.627472] kasan_bitops_modify.constprop.0+0x344/0xbc8
[ 27.628371] kasan_bitops_generic+0x110/0x1c8
[ 27.629014] kunit_try_run_case+0x14c/0x3d0
[ 27.629539] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.630521] kthread+0x24c/0x2d0
[ 27.631158] ret_from_fork+0x10/0x20
[ 27.631848]
[ 27.632312] Allocated by task 250:
[ 27.632920] kasan_save_stack+0x3c/0x68
[ 27.633577] kasan_save_track+0x20/0x40
[ 27.634236] kasan_save_alloc_info+0x40/0x58
[ 27.634965] __kasan_kmalloc+0xd4/0xd8
[ 27.635475] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.636068] kasan_bitops_generic+0xa0/0x1c8
[ 27.636621] kunit_try_run_case+0x14c/0x3d0
[ 27.637517] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.638353] kthread+0x24c/0x2d0
[ 27.639019] ret_from_fork+0x10/0x20
[ 27.639686]
[ 27.640157] The buggy address belongs to the object at fff00000c5b73360
[ 27.640157] which belongs to the cache kmalloc-16 of size 16
[ 27.641468] The buggy address is located 8 bytes inside of
[ 27.641468] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.643094]
[ 27.643482] The buggy address belongs to the physical page:
[ 27.644266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.645119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.646128] page_type: f5(slab)
[ 27.646843] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.647820] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.648779] page dumped because: kasan: bad access detected
[ 27.649554]
[ 27.649995] Memory state around the buggy address:
[ 27.650772] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.651632] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.652529] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.653283] ^
[ 27.654000] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.655217] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.655928] ==================================================================
---
[ 27.527724] ==================================================================
[ 27.528434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[ 27.529419] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.530294]
[ 27.530663] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.531759] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.532497] Hardware name: linux,dummy-virt (DT)
[ 27.534039] Call trace:
[ 27.534826] show_stack+0x20/0x38 (C)
[ 27.536413] dump_stack_lvl+0x8c/0xd0
[ 27.537613] print_report+0x118/0x5e0
[ 27.538423] kasan_report+0xc8/0x118
[ 27.539204] kasan_check_range+0x100/0x1a8
[ 27.539786] __kasan_check_write+0x20/0x30
[ 27.540625] kasan_bitops_modify.constprop.0+0x320/0xbc8
[ 27.541334] kasan_bitops_generic+0x110/0x1c8
[ 27.542160] kunit_try_run_case+0x14c/0x3d0
[ 27.542902] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.543803] kthread+0x24c/0x2d0
[ 27.544483] ret_from_fork+0x10/0x20
[ 27.545097]
[ 27.545736] Allocated by task 250:
[ 27.546206] kasan_save_stack+0x3c/0x68
[ 27.546779] kasan_save_track+0x20/0x40
[ 27.547932] kasan_save_alloc_info+0x40/0x58
[ 27.548580] __kasan_kmalloc+0xd4/0xd8
[ 27.549203] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.549956] kasan_bitops_generic+0xa0/0x1c8
[ 27.550484] kunit_try_run_case+0x14c/0x3d0
[ 27.551385] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.552669] kthread+0x24c/0x2d0
[ 27.553278] ret_from_fork+0x10/0x20
[ 27.553907]
[ 27.554322] The buggy address belongs to the object at fff00000c5b73360
[ 27.554322] which belongs to the cache kmalloc-16 of size 16
[ 27.556090] The buggy address is located 8 bytes inside of
[ 27.556090] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.557518]
[ 27.558012] The buggy address belongs to the physical page:
[ 27.558646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.559614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.561237] page_type: f5(slab)
[ 27.561898] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.562890] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.563885] page dumped because: kasan: bad access detected
[ 27.564507]
[ 27.565370] Memory state around the buggy address:
[ 27.566177] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.567098] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.568419] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.569443] ^
[ 27.570310] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.571715] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.572687] ==================================================================
---
[ 27.317309] ==================================================================
[ 27.318162] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[ 27.319067] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.320996]
[ 27.321454] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.322441] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.322996] Hardware name: linux,dummy-virt (DT)
[ 27.323827] Call trace:
[ 27.324166] show_stack+0x20/0x38 (C)
[ 27.324840] dump_stack_lvl+0x8c/0xd0
[ 27.325569] print_report+0x118/0x5e0
[ 27.326250] kasan_report+0xc8/0x118
[ 27.326805] kasan_check_range+0x100/0x1a8
[ 27.327724] __kasan_check_write+0x20/0x30
[ 27.328361] kasan_bitops_modify.constprop.0+0x100/0xbc8
[ 27.329156] kasan_bitops_generic+0x110/0x1c8
[ 27.329811] kunit_try_run_case+0x14c/0x3d0
[ 27.330536] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.331562] kthread+0x24c/0x2d0
[ 27.332102] ret_from_fork+0x10/0x20
[ 27.332516]
[ 27.332734] Allocated by task 250:
[ 27.333211] kasan_save_stack+0x3c/0x68
[ 27.334162] kasan_save_track+0x20/0x40
[ 27.334724] kasan_save_alloc_info+0x40/0x58
[ 27.335676] __kasan_kmalloc+0xd4/0xd8
[ 27.336159] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.336756] kasan_bitops_generic+0xa0/0x1c8
[ 27.337361] kunit_try_run_case+0x14c/0x3d0
[ 27.337967] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.338634] kthread+0x24c/0x2d0
[ 27.339380] ret_from_fork+0x10/0x20
[ 27.339863]
[ 27.340199] The buggy address belongs to the object at fff00000c5b73360
[ 27.340199] which belongs to the cache kmalloc-16 of size 16
[ 27.341485] The buggy address is located 8 bytes inside of
[ 27.341485] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.342912]
[ 27.343603] The buggy address belongs to the physical page:
[ 27.344191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.345194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.345978] page_type: f5(slab)
[ 27.346443] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.347601] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.348443] page dumped because: kasan: bad access detected
[ 27.349043]
[ 27.349372] Memory state around the buggy address:
[ 27.350312] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.351064] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.352188] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.352902] ^
[ 27.353573] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.354246] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.355213] ==================================================================
Home
[ 27.358213] ==================================================================
[ 27.359471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[ 27.360092] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.360437]
[ 27.360589] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.361380] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.362084] Hardware name: linux,dummy-virt (DT)
[ 27.362858] Call trace:
[ 27.363275] show_stack+0x20/0x38 (C)
[ 27.364546] dump_stack_lvl+0x8c/0xd0
[ 27.365817] print_report+0x118/0x5e0
[ 27.366409] kasan_report+0xc8/0x118
[ 27.367188] __asan_report_load8_noabort+0x20/0x30
[ 27.367962] kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[ 27.368591] kasan_bitops_generic+0x110/0x1c8
[ 27.369256] kunit_try_run_case+0x14c/0x3d0
[ 27.369814] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.370471] kthread+0x24c/0x2d0
[ 27.371837] ret_from_fork+0x10/0x20
[ 27.372404]
[ 27.372704] Allocated by task 250:
[ 27.373197] kasan_save_stack+0x3c/0x68
[ 27.373734] kasan_save_track+0x20/0x40
[ 27.374303] kasan_save_alloc_info+0x40/0x58
[ 27.374902] __kasan_kmalloc+0xd4/0xd8
[ 27.375403] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.376347] kasan_bitops_generic+0xa0/0x1c8
[ 27.376949] kunit_try_run_case+0x14c/0x3d0
[ 27.377535] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.378421] kthread+0x24c/0x2d0
[ 27.379764] ret_from_fork+0x10/0x20
[ 27.380369]
[ 27.380679] The buggy address belongs to the object at fff00000c5b73360
[ 27.380679] which belongs to the cache kmalloc-16 of size 16
[ 27.381885] The buggy address is located 8 bytes inside of
[ 27.381885] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.383197]
[ 27.383979] The buggy address belongs to the physical page:
[ 27.384568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.385515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.386302] page_type: f5(slab)
[ 27.386804] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.388420] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.389320] page dumped because: kasan: bad access detected
[ 27.389916]
[ 27.390249] Memory state around the buggy address:
[ 27.390845] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.391601] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.392858] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.393621] ^
[ 27.394423] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.395898] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.396587] ==================================================================
---
[ 27.574496] ==================================================================
[ 27.575943] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[ 27.577233] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.577991]
[ 27.578153] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.578586] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.578921] Hardware name: linux,dummy-virt (DT)
[ 27.580134] Call trace:
[ 27.580722] show_stack+0x20/0x38 (C)
[ 27.581519] dump_stack_lvl+0x8c/0xd0
[ 27.582308] print_report+0x118/0x5e0
[ 27.582889] kasan_report+0xc8/0x118
[ 27.583763] __asan_report_load8_noabort+0x20/0x30
[ 27.584409] kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[ 27.585081] kasan_bitops_generic+0x110/0x1c8
[ 27.585665] kunit_try_run_case+0x14c/0x3d0
[ 27.586322] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.587113] kthread+0x24c/0x2d0
[ 27.587761] ret_from_fork+0x10/0x20
[ 27.588305]
[ 27.588601] Allocated by task 250:
[ 27.589098] kasan_save_stack+0x3c/0x68
[ 27.590058] kasan_save_track+0x20/0x40
[ 27.590731] kasan_save_alloc_info+0x40/0x58
[ 27.591849] __kasan_kmalloc+0xd4/0xd8
[ 27.592695] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.593767] kasan_bitops_generic+0xa0/0x1c8
[ 27.594464] kunit_try_run_case+0x14c/0x3d0
[ 27.595471] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.596276] kthread+0x24c/0x2d0
[ 27.596905] ret_from_fork+0x10/0x20
[ 27.597300]
[ 27.597522] The buggy address belongs to the object at fff00000c5b73360
[ 27.597522] which belongs to the cache kmalloc-16 of size 16
[ 27.598580] The buggy address is located 8 bytes inside of
[ 27.598580] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.600716]
[ 27.601057] The buggy address belongs to the physical page:
[ 27.601660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.603843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.604662] page_type: f5(slab)
[ 27.605111] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.606152] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.607113] page dumped because: kasan: bad access detected
[ 27.608418]
[ 27.608646] Memory state around the buggy address:
[ 27.609059] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.609847] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.610721] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.611686] ^
[ 27.612524] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.613411] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.614280] ==================================================================
---
[ 27.439872] ==================================================================
[ 27.440620] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[ 27.442126] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.444506]
[ 27.445046] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.446237] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.446467] Hardware name: linux,dummy-virt (DT)
[ 27.446725] Call trace:
[ 27.447243] show_stack+0x20/0x38 (C)
[ 27.448495] dump_stack_lvl+0x8c/0xd0
[ 27.449274] print_report+0x118/0x5e0
[ 27.449835] kasan_report+0xc8/0x118
[ 27.450482] __asan_report_load8_noabort+0x20/0x30
[ 27.451181] kasan_bitops_modify.constprop.0+0xa88/0xbc8
[ 27.451973] kasan_bitops_generic+0x110/0x1c8
[ 27.452590] kunit_try_run_case+0x14c/0x3d0
[ 27.453368] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.454145] kthread+0x24c/0x2d0
[ 27.454768] ret_from_fork+0x10/0x20
[ 27.455428]
[ 27.456238] Allocated by task 250:
[ 27.456813] kasan_save_stack+0x3c/0x68
[ 27.457468] kasan_save_track+0x20/0x40
[ 27.458154] kasan_save_alloc_info+0x40/0x58
[ 27.458793] __kasan_kmalloc+0xd4/0xd8
[ 27.459872] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.460438] kasan_bitops_generic+0xa0/0x1c8
[ 27.461054] kunit_try_run_case+0x14c/0x3d0
[ 27.461629] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.462521] kthread+0x24c/0x2d0
[ 27.463017] ret_from_fork+0x10/0x20
[ 27.463518]
[ 27.463878] The buggy address belongs to the object at fff00000c5b73360
[ 27.463878] which belongs to the cache kmalloc-16 of size 16
[ 27.465098] The buggy address is located 8 bytes inside of
[ 27.465098] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.466262]
[ 27.466619] The buggy address belongs to the physical page:
[ 27.468169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.469085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.469886] page_type: f5(slab)
[ 27.470501] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.471496] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.472645] page dumped because: kasan: bad access detected
[ 27.473468]
[ 27.473803] Memory state around the buggy address:
[ 27.474475] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.475430] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.476513] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.477416] ^
[ 27.478132] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.478936] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.480067] ==================================================================
---
[ 27.699017] ==================================================================
[ 27.699730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[ 27.700606] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.701713]
[ 27.702175] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.703395] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.703984] Hardware name: linux,dummy-virt (DT)
[ 27.704514] Call trace:
[ 27.704925] show_stack+0x20/0x38 (C)
[ 27.705486] dump_stack_lvl+0x8c/0xd0
[ 27.706151] print_report+0x118/0x5e0
[ 27.706814] kasan_report+0xc8/0x118
[ 27.707352] __asan_report_load8_noabort+0x20/0x30
[ 27.708099] kasan_bitops_modify.constprop.0+0xa28/0xbc8
[ 27.708785] kasan_bitops_generic+0x110/0x1c8
[ 27.709425] kunit_try_run_case+0x14c/0x3d0
[ 27.710108] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.710842] kthread+0x24c/0x2d0
[ 27.711363] ret_from_fork+0x10/0x20
[ 27.711900]
[ 27.712184] Allocated by task 250:
[ 27.712646] kasan_save_stack+0x3c/0x68
[ 27.713553] kasan_save_track+0x20/0x40
[ 27.714166] kasan_save_alloc_info+0x40/0x58
[ 27.714720] __kasan_kmalloc+0xd4/0xd8
[ 27.715591] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.716345] kasan_bitops_generic+0xa0/0x1c8
[ 27.717078] kunit_try_run_case+0x14c/0x3d0
[ 27.717796] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.718622] kthread+0x24c/0x2d0
[ 27.719118] ret_from_fork+0x10/0x20
[ 27.719617]
[ 27.720199] The buggy address belongs to the object at fff00000c5b73360
[ 27.720199] which belongs to the cache kmalloc-16 of size 16
[ 27.721803] The buggy address is located 8 bytes inside of
[ 27.721803] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.723055]
[ 27.723486] The buggy address belongs to the physical page:
[ 27.724017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.725143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.726034] page_type: f5(slab)
[ 27.726679] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.727649] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.728440] page dumped because: kasan: bad access detected
[ 27.729263]
[ 27.729705] Memory state around the buggy address:
[ 27.730418] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.731427] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.732343] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.733234] ^
[ 27.734119] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.734883] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.735625] ==================================================================
Home
[ 27.815848] ==================================================================
[ 27.816542] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[ 27.817969] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.818608]
[ 27.819027] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.819905] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.820408] Hardware name: linux,dummy-virt (DT)
[ 27.820983] Call trace:
[ 27.821423] show_stack+0x20/0x38 (C)
[ 27.822007] dump_stack_lvl+0x8c/0xd0
[ 27.822592] print_report+0x118/0x5e0
[ 27.823118] kasan_report+0xc8/0x118
[ 27.823697] kasan_check_range+0x100/0x1a8
[ 27.824317] __kasan_check_write+0x20/0x30
[ 27.824908] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[ 27.825641] kasan_bitops_generic+0x11c/0x1c8
[ 27.826301] kunit_try_run_case+0x14c/0x3d0
[ 27.826959] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.827672] kthread+0x24c/0x2d0
[ 27.828223] ret_from_fork+0x10/0x20
[ 27.828788]
[ 27.829116] Allocated by task 250:
[ 27.829638] kasan_save_stack+0x3c/0x68
[ 27.830123] kasan_save_track+0x20/0x40
[ 27.830783] kasan_save_alloc_info+0x40/0x58
[ 27.831360] __kasan_kmalloc+0xd4/0xd8
[ 27.831852] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.832451] kasan_bitops_generic+0xa0/0x1c8
[ 27.832992] kunit_try_run_case+0x14c/0x3d0
[ 27.833640] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.834329] kthread+0x24c/0x2d0
[ 27.834811] ret_from_fork+0x10/0x20
[ 27.835308]
[ 27.835588] The buggy address belongs to the object at fff00000c5b73360
[ 27.835588] which belongs to the cache kmalloc-16 of size 16
[ 27.836853] The buggy address is located 8 bytes inside of
[ 27.836853] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.838036]
[ 27.838392] The buggy address belongs to the physical page:
[ 27.838976] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.839957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.840677] page_type: f5(slab)
[ 27.841188] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.842022] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.842819] page dumped because: kasan: bad access detected
[ 27.843403]
[ 27.843761] Memory state around the buggy address:
[ 27.844350] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.845207] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.846033] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.846844] ^
[ 27.847612] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.848430] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.849280] ==================================================================
---
[ 27.885664] ==================================================================
[ 27.886601] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[ 27.887928] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.888684]
[ 27.889134] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.890155] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.890842] Hardware name: linux,dummy-virt (DT)
[ 27.891414] Call trace:
[ 27.891824] show_stack+0x20/0x38 (C)
[ 27.892382] dump_stack_lvl+0x8c/0xd0
[ 27.892931] print_report+0x118/0x5e0
[ 27.893562] kasan_report+0xc8/0x118
[ 27.894117] kasan_check_range+0x100/0x1a8
[ 27.894773] __kasan_check_write+0x20/0x30
[ 27.895376] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[ 27.896080] kasan_bitops_generic+0x11c/0x1c8
[ 27.896737] kunit_try_run_case+0x14c/0x3d0
[ 27.897347] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.898067] kthread+0x24c/0x2d0
[ 27.898587] ret_from_fork+0x10/0x20
[ 27.899196]
[ 27.899529] Allocated by task 250:
[ 27.900022] kasan_save_stack+0x3c/0x68
[ 27.900525] kasan_save_track+0x20/0x40
[ 27.901130] kasan_save_alloc_info+0x40/0x58
[ 27.901651] __kasan_kmalloc+0xd4/0xd8
[ 27.902229] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.902780] kasan_bitops_generic+0xa0/0x1c8
[ 27.903432] kunit_try_run_case+0x14c/0x3d0
[ 27.904007] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.904702] kthread+0x24c/0x2d0
[ 27.905248] ret_from_fork+0x10/0x20
[ 27.905735]
[ 27.906097] The buggy address belongs to the object at fff00000c5b73360
[ 27.906097] which belongs to the cache kmalloc-16 of size 16
[ 27.907379] The buggy address is located 8 bytes inside of
[ 27.907379] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.908580]
[ 27.908954] The buggy address belongs to the physical page:
[ 27.909603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.910504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.911314] page_type: f5(slab)
[ 27.911883] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.912693] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.913489] page dumped because: kasan: bad access detected
[ 27.914185]
[ 27.914567] Memory state around the buggy address:
[ 27.915192] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.916006] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.916759] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.917557] ^
[ 27.918369] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.919181] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.919981] ==================================================================
---
[ 27.738593] ==================================================================
[ 27.739374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[ 27.740551] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.741502]
[ 27.742146] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.743264] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.743955] Hardware name: linux,dummy-virt (DT)
[ 27.744640] Call trace:
[ 27.745033] show_stack+0x20/0x38 (C)
[ 27.745568] dump_stack_lvl+0x8c/0xd0
[ 27.746329] print_report+0x118/0x5e0
[ 27.746999] kasan_report+0xc8/0x118
[ 27.747649] kasan_check_range+0x100/0x1a8
[ 27.748338] __kasan_check_write+0x20/0x30
[ 27.749049] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[ 27.749909] kasan_bitops_generic+0x11c/0x1c8
[ 27.750480] kunit_try_run_case+0x14c/0x3d0
[ 27.751078] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.751728] kthread+0x24c/0x2d0
[ 27.752589] ret_from_fork+0x10/0x20
[ 27.753254]
[ 27.753780] Allocated by task 250:
[ 27.754390] kasan_save_stack+0x3c/0x68
[ 27.755033] kasan_save_track+0x20/0x40
[ 27.755671] kasan_save_alloc_info+0x40/0x58
[ 27.756399] __kasan_kmalloc+0xd4/0xd8
[ 27.757080] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.757784] kasan_bitops_generic+0xa0/0x1c8
[ 27.758503] kunit_try_run_case+0x14c/0x3d0
[ 27.759083] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.759724] kthread+0x24c/0x2d0
[ 27.760214] ret_from_fork+0x10/0x20
[ 27.760713]
[ 27.761473] The buggy address belongs to the object at fff00000c5b73360
[ 27.761473] which belongs to the cache kmalloc-16 of size 16
[ 27.762772] The buggy address is located 8 bytes inside of
[ 27.762772] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.764458]
[ 27.764690] The buggy address belongs to the physical page:
[ 27.765395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.766468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.767327] page_type: f5(slab)
[ 27.767970] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.768948] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.769893] page dumped because: kasan: bad access detected
[ 27.770667]
[ 27.770986] Memory state around the buggy address:
[ 27.771558] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.772311] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.773428] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.774388] ^
[ 27.775301] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.776212] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.777094] ==================================================================
---
[ 27.957579] ==================================================================
[ 27.958249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[ 27.959385] Write of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.960217]
[ 27.960622] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.961596] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.962171] Hardware name: linux,dummy-virt (DT)
[ 27.962888] Call trace:
[ 27.963333] show_stack+0x20/0x38 (C)
[ 27.963970] dump_stack_lvl+0x8c/0xd0
[ 27.964578] print_report+0x118/0x5e0
[ 27.965112] kasan_report+0xc8/0x118
[ 27.965757] kasan_check_range+0x100/0x1a8
[ 27.966321] __kasan_check_write+0x20/0x30
[ 27.966909] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[ 27.967722] kasan_bitops_generic+0x11c/0x1c8
[ 27.968355] kunit_try_run_case+0x14c/0x3d0
[ 27.969004] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.969680] kthread+0x24c/0x2d0
[ 27.970201] ret_from_fork+0x10/0x20
[ 27.970765]
[ 27.971080] Allocated by task 250:
[ 27.971573] kasan_save_stack+0x3c/0x68
[ 27.972190] kasan_save_track+0x20/0x40
[ 27.972710] kasan_save_alloc_info+0x40/0x58
[ 27.973301] __kasan_kmalloc+0xd4/0xd8
[ 27.973930] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.974511] kasan_bitops_generic+0xa0/0x1c8
[ 27.975184] kunit_try_run_case+0x14c/0x3d0
[ 27.975713] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.976361] kthread+0x24c/0x2d0
[ 27.976841] ret_from_fork+0x10/0x20
[ 27.977475]
[ 27.977860] The buggy address belongs to the object at fff00000c5b73360
[ 27.977860] which belongs to the cache kmalloc-16 of size 16
[ 27.979110] The buggy address is located 8 bytes inside of
[ 27.979110] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.980298]
[ 27.980655] The buggy address belongs to the physical page:
[ 27.981302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.982198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.982981] page_type: f5(slab)
[ 27.983545] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.984347] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.985259] page dumped because: kasan: bad access detected
[ 27.985874]
[ 27.986195] Memory state around the buggy address:
[ 27.986762] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.987553] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.988395] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.989158] ^
[ 27.989904] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.990729] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.991547] ==================================================================
Home
[ 27.993686] ==================================================================
[ 27.994363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[ 27.995284] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.996023]
[ 27.996405] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.997420] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.998038] Hardware name: linux,dummy-virt (DT)
[ 27.998589] Call trace:
[ 27.999094] show_stack+0x20/0x38 (C)
[ 27.999689] dump_stack_lvl+0x8c/0xd0
[ 28.000244] print_report+0x118/0x5e0
[ 28.000766] kasan_report+0xc8/0x118
[ 28.001339] __asan_report_load8_noabort+0x20/0x30
[ 28.002088] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[ 28.002863] kasan_bitops_generic+0x11c/0x1c8
[ 28.003490] kunit_try_run_case+0x14c/0x3d0
[ 28.004040] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.004957] kthread+0x24c/0x2d0
[ 28.005969] ret_from_fork+0x10/0x20
[ 28.006405]
[ 28.006664] Allocated by task 250:
[ 28.007052] kasan_save_stack+0x3c/0x68
[ 28.007471] kasan_save_track+0x20/0x40
[ 28.008547] kasan_save_alloc_info+0x40/0x58
[ 28.009071] __kasan_kmalloc+0xd4/0xd8
[ 28.009546] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.010240] kasan_bitops_generic+0xa0/0x1c8
[ 28.010913] kunit_try_run_case+0x14c/0x3d0
[ 28.011513] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.012177] kthread+0x24c/0x2d0
[ 28.012791] ret_from_fork+0x10/0x20
[ 28.013276]
[ 28.013661] The buggy address belongs to the object at fff00000c5b73360
[ 28.013661] which belongs to the cache kmalloc-16 of size 16
[ 28.015037] The buggy address is located 8 bytes inside of
[ 28.015037] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 28.016310]
[ 28.016699] The buggy address belongs to the physical page:
[ 28.017319] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 28.017989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.018855] page_type: f5(slab)
[ 28.019443] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 28.020516] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 28.021373] page dumped because: kasan: bad access detected
[ 28.022165]
[ 28.022495] Memory state around the buggy address:
[ 28.023101] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 28.024005] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 28.024849] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 28.025710] ^
[ 28.026498] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.027253] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.027964] ==================================================================
---
[ 28.030361] ==================================================================
[ 28.031170] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[ 28.032103] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 28.032728]
[ 28.034263] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 28.035732] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.036411] Hardware name: linux,dummy-virt (DT)
[ 28.037141] Call trace:
[ 28.037508] show_stack+0x20/0x38 (C)
[ 28.038046] dump_stack_lvl+0x8c/0xd0
[ 28.038559] print_report+0x118/0x5e0
[ 28.039495] kasan_report+0xc8/0x118
[ 28.040176] __asan_report_load8_noabort+0x20/0x30
[ 28.040971] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[ 28.041817] kasan_bitops_generic+0x11c/0x1c8
[ 28.042491] kunit_try_run_case+0x14c/0x3d0
[ 28.043225] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.044108] kthread+0x24c/0x2d0
[ 28.044780] ret_from_fork+0x10/0x20
[ 28.045433]
[ 28.046080] Allocated by task 250:
[ 28.046509] kasan_save_stack+0x3c/0x68
[ 28.047203] kasan_save_track+0x20/0x40
[ 28.047864] kasan_save_alloc_info+0x40/0x58
[ 28.048557] __kasan_kmalloc+0xd4/0xd8
[ 28.049239] __kmalloc_cache_noprof+0x15c/0x3c0
[ 28.050005] kasan_bitops_generic+0xa0/0x1c8
[ 28.050701] kunit_try_run_case+0x14c/0x3d0
[ 28.051278] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 28.051937] kthread+0x24c/0x2d0
[ 28.052387] ret_from_fork+0x10/0x20
[ 28.053319]
[ 28.053597] The buggy address belongs to the object at fff00000c5b73360
[ 28.053597] which belongs to the cache kmalloc-16 of size 16
[ 28.055220] The buggy address is located 8 bytes inside of
[ 28.055220] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 28.056517]
[ 28.056869] The buggy address belongs to the physical page:
[ 28.057527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 28.058599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 28.059404] page_type: f5(slab)
[ 28.059845] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 28.060617] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 28.061334] page dumped because: kasan: bad access detected
[ 28.061981]
[ 28.062273] Memory state around the buggy address:
[ 28.062971] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 28.063713] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 28.064793] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 28.065527] ^
[ 28.066470] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.067311] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.068335] ==================================================================
---
[ 27.850688] ==================================================================
[ 27.852112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[ 27.852790] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.853523]
[ 27.853951] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.855687] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.856360] Hardware name: linux,dummy-virt (DT)
[ 27.857096] Call trace:
[ 27.857480] show_stack+0x20/0x38 (C)
[ 27.858157] dump_stack_lvl+0x8c/0xd0
[ 27.858686] print_report+0x118/0x5e0
[ 27.859335] kasan_report+0xc8/0x118
[ 27.859879] __asan_report_load8_noabort+0x20/0x30
[ 27.860850] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[ 27.861652] kasan_bitops_generic+0x11c/0x1c8
[ 27.862325] kunit_try_run_case+0x14c/0x3d0
[ 27.862608] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.862922] kthread+0x24c/0x2d0
[ 27.863143] ret_from_fork+0x10/0x20
[ 27.863366]
[ 27.863498] Allocated by task 250:
[ 27.863694] kasan_save_stack+0x3c/0x68
[ 27.864120] kasan_save_track+0x20/0x40
[ 27.864570] kasan_save_alloc_info+0x40/0x58
[ 27.865112] __kasan_kmalloc+0xd4/0xd8
[ 27.865551] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.866054] kasan_bitops_generic+0xa0/0x1c8
[ 27.866834] kunit_try_run_case+0x14c/0x3d0
[ 27.867426] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.868291] kthread+0x24c/0x2d0
[ 27.868829] ret_from_fork+0x10/0x20
[ 27.869339]
[ 27.869735] The buggy address belongs to the object at fff00000c5b73360
[ 27.869735] which belongs to the cache kmalloc-16 of size 16
[ 27.871095] The buggy address is located 8 bytes inside of
[ 27.871095] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.872504]
[ 27.872871] The buggy address belongs to the physical page:
[ 27.873547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.874478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.875275] page_type: f5(slab)
[ 27.875815] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.876716] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.877568] page dumped because: kasan: bad access detected
[ 27.878217]
[ 27.878604] Memory state around the buggy address:
[ 27.879282] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.880077] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.880780] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.881557] ^
[ 27.882362] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.883477] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.884223] ==================================================================
---
[ 27.779427] ==================================================================
[ 27.780223] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[ 27.781118] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.781835]
[ 27.782339] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.783505] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.784218] Hardware name: linux,dummy-virt (DT)
[ 27.784865] Call trace:
[ 27.785385] show_stack+0x20/0x38 (C)
[ 27.785982] dump_stack_lvl+0x8c/0xd0
[ 27.786721] print_report+0x118/0x5e0
[ 27.787354] kasan_report+0xc8/0x118
[ 27.787938] __asan_report_load8_noabort+0x20/0x30
[ 27.788598] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[ 27.789455] kasan_bitops_generic+0x11c/0x1c8
[ 27.790097] kunit_try_run_case+0x14c/0x3d0
[ 27.790730] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.791543] kthread+0x24c/0x2d0
[ 27.792095] ret_from_fork+0x10/0x20
[ 27.792659]
[ 27.792984] Allocated by task 250:
[ 27.793446] kasan_save_stack+0x3c/0x68
[ 27.794017] kasan_save_track+0x20/0x40
[ 27.794538] kasan_save_alloc_info+0x40/0x58
[ 27.795349] __kasan_kmalloc+0xd4/0xd8
[ 27.796042] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.796687] kasan_bitops_generic+0xa0/0x1c8
[ 27.797358] kunit_try_run_case+0x14c/0x3d0
[ 27.798058] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.798854] kthread+0x24c/0x2d0
[ 27.799413] ret_from_fork+0x10/0x20
[ 27.799845]
[ 27.800257] The buggy address belongs to the object at fff00000c5b73360
[ 27.800257] which belongs to the cache kmalloc-16 of size 16
[ 27.801664] The buggy address is located 8 bytes inside of
[ 27.801664] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.803129]
[ 27.803503] The buggy address belongs to the physical page:
[ 27.804161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.805136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.805859] page_type: f5(slab)
[ 27.806367] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.807205] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.808087] page dumped because: kasan: bad access detected
[ 27.808702]
[ 27.809022] Memory state around the buggy address:
[ 27.809590] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.810377] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.811216] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.811990] ^
[ 27.812721] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.813539] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.814331] ==================================================================
---
[ 27.921723] ==================================================================
[ 27.922356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[ 27.923472] Read of size 8 at addr fff00000c5b73368 by task kunit_try_catch/250
[ 27.924255]
[ 27.924627] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.925675] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.926221] Hardware name: linux,dummy-virt (DT)
[ 27.926830] Call trace:
[ 27.927262] show_stack+0x20/0x38 (C)
[ 27.927865] dump_stack_lvl+0x8c/0xd0
[ 27.928466] print_report+0x118/0x5e0
[ 27.929096] kasan_report+0xc8/0x118
[ 27.929681] __asan_report_load8_noabort+0x20/0x30
[ 27.930312] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[ 27.931082] kasan_bitops_generic+0x11c/0x1c8
[ 27.931655] kunit_try_run_case+0x14c/0x3d0
[ 27.932225] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.932953] kthread+0x24c/0x2d0
[ 27.933429] ret_from_fork+0x10/0x20
[ 27.934047]
[ 27.934362] Allocated by task 250:
[ 27.934921] kasan_save_stack+0x3c/0x68
[ 27.935545] kasan_save_track+0x20/0x40
[ 27.936051] kasan_save_alloc_info+0x40/0x58
[ 27.936685] __kasan_kmalloc+0xd4/0xd8
[ 27.937356] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.937924] kasan_bitops_generic+0xa0/0x1c8
[ 27.938647] kunit_try_run_case+0x14c/0x3d0
[ 27.939186] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.939987] kthread+0x24c/0x2d0
[ 27.940480] ret_from_fork+0x10/0x20
[ 27.940984]
[ 27.941341] The buggy address belongs to the object at fff00000c5b73360
[ 27.941341] which belongs to the cache kmalloc-16 of size 16
[ 27.942604] The buggy address is located 8 bytes inside of
[ 27.942604] allocated 9-byte region [fff00000c5b73360, fff00000c5b73369)
[ 27.943859]
[ 27.944216] The buggy address belongs to the physical page:
[ 27.944886] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 27.945701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.946414] page_type: f5(slab)
[ 27.946968] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 27.947771] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 27.948610] page dumped because: kasan: bad access detected
[ 27.949370]
[ 27.949666] Memory state around the buggy address:
[ 27.950254] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.951139] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 27.951944] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 27.952700] ^
[ 27.953468] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.954224] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.955027] ==================================================================
Home
[ 23.075618] ==================================================================
[ 23.077098] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[ 23.077774] Write of size 1 at addr fff00000c6025f00 by task kunit_try_catch/133
[ 23.078971]
[ 23.079398] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.080784] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.081312] Hardware name: linux,dummy-virt (DT)
[ 23.082104] Call trace:
[ 23.082647] show_stack+0x20/0x38 (C)
[ 23.083520] dump_stack_lvl+0x8c/0xd0
[ 23.084237] print_report+0x118/0x5e0
[ 23.084790] kasan_report+0xc8/0x118
[ 23.085502] __asan_report_store1_noabort+0x20/0x30
[ 23.086256] kmalloc_big_oob_right+0x2a4/0x2f0
[ 23.087202] kunit_try_run_case+0x14c/0x3d0
[ 23.087726] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.088377] kthread+0x24c/0x2d0
[ 23.089248] ret_from_fork+0x10/0x20
[ 23.089935]
[ 23.090376] Allocated by task 133:
[ 23.091353] kasan_save_stack+0x3c/0x68
[ 23.091805] kasan_save_track+0x20/0x40
[ 23.092217] kasan_save_alloc_info+0x40/0x58
[ 23.092655] __kasan_kmalloc+0xd4/0xd8
[ 23.093067] __kmalloc_cache_noprof+0x15c/0x3c0
[ 23.093510] kmalloc_big_oob_right+0xb8/0x2f0
[ 23.094963] kunit_try_run_case+0x14c/0x3d0
[ 23.095799] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.096517] kthread+0x24c/0x2d0
[ 23.097409] ret_from_fork+0x10/0x20
[ 23.098050]
[ 23.098387] The buggy address belongs to the object at fff00000c6024000
[ 23.098387] which belongs to the cache kmalloc-8k of size 8192
[ 23.100600] The buggy address is located 0 bytes to the right of
[ 23.100600] allocated 7936-byte region [fff00000c6024000, fff00000c6025f00)
[ 23.101957]
[ 23.102275] The buggy address belongs to the physical page:
[ 23.103028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020
[ 23.104338] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.105131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.106232] page_type: f5(slab)
[ 23.106928] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[ 23.108105] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[ 23.109109] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[ 23.110092] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[ 23.111066] head: 0bfffe0000000003 ffffc1ffc3180801 ffffffffffffffff 0000000000000000
[ 23.112209] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[ 23.113177] page dumped because: kasan: bad access detected
[ 23.113800]
[ 23.114352] Memory state around the buggy address:
[ 23.115166] fff00000c6025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.115810] fff00000c6025e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.117477] >fff00000c6025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.118221] ^
[ 23.118921] fff00000c6025f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.119731] fff00000c6026000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.120487] ==================================================================
Home
[ 23.130398] ==================================================================
[ 23.131835] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[ 23.133911] Write of size 1 at addr fff00000c65fe00a by task kunit_try_catch/135
[ 23.134586]
[ 23.134847] CPU: 0 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.137071] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.137490] Hardware name: linux,dummy-virt (DT)
[ 23.137939] Call trace:
[ 23.138232] show_stack+0x20/0x38 (C)
[ 23.138662] dump_stack_lvl+0x8c/0xd0
[ 23.140361] print_report+0x118/0x5e0
[ 23.141181] kasan_report+0xc8/0x118
[ 23.141682] __asan_report_store1_noabort+0x20/0x30
[ 23.142275] kmalloc_large_oob_right+0x278/0x2b8
[ 23.143016] kunit_try_run_case+0x14c/0x3d0
[ 23.143759] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.144968] kthread+0x24c/0x2d0
[ 23.145562] ret_from_fork+0x10/0x20
[ 23.146146]
[ 23.146592] The buggy address belongs to the physical page:
[ 23.147858] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc
[ 23.148302] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.148634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.149190] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.150787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.152228] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.152948] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.153929] head: 0bfffe0000000002 ffffc1ffc3197f01 ffffffffffffffff 0000000000000000
[ 23.154869] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.156000] page dumped because: kasan: bad access detected
[ 23.156576]
[ 23.156814] Memory state around the buggy address:
[ 23.157203] fff00000c65fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.158850] fff00000c65fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.159967] >fff00000c65fe000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.161047] ^
[ 23.161680] fff00000c65fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.162634] fff00000c65fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.163799] ==================================================================
Home
[ 24.424155] ==================================================================
[ 24.425358] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[ 24.426465] Read of size 64 at addr fff00000c5c98984 by task kunit_try_catch/171
[ 24.427491]
[ 24.428339] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.429234] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.429645] Hardware name: linux,dummy-virt (DT)
[ 24.430226] Call trace:
[ 24.430587] show_stack+0x20/0x38 (C)
[ 24.431691] dump_stack_lvl+0x8c/0xd0
[ 24.432224] print_report+0x118/0x5e0
[ 24.432761] kasan_report+0xc8/0x118
[ 24.433304] kasan_check_range+0x100/0x1a8
[ 24.433833] __asan_memmove+0x3c/0x98
[ 24.434425] kmalloc_memmove_invalid_size+0x154/0x2e8
[ 24.435158] kunit_try_run_case+0x14c/0x3d0
[ 24.435772] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.436565] kthread+0x24c/0x2d0
[ 24.437849] ret_from_fork+0x10/0x20
[ 24.438365]
[ 24.438689] Allocated by task 171:
[ 24.439677] kasan_save_stack+0x3c/0x68
[ 24.440255] kasan_save_track+0x20/0x40
[ 24.440779] kasan_save_alloc_info+0x40/0x58
[ 24.441392] __kasan_kmalloc+0xd4/0xd8
[ 24.441936] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.442572] kmalloc_memmove_invalid_size+0xb0/0x2e8
[ 24.444121] kunit_try_run_case+0x14c/0x3d0
[ 24.444670] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.445353] kthread+0x24c/0x2d0
[ 24.445864] ret_from_fork+0x10/0x20
[ 24.446448]
[ 24.446847] The buggy address belongs to the object at fff00000c5c98980
[ 24.446847] which belongs to the cache kmalloc-64 of size 64
[ 24.448358] The buggy address is located 4 bytes inside of
[ 24.448358] allocated 64-byte region [fff00000c5c98980, fff00000c5c989c0)
[ 24.449398]
[ 24.449616] The buggy address belongs to the physical page:
[ 24.450615] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c98
[ 24.452402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.453296] page_type: f5(slab)
[ 24.454030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 24.455387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 24.456838] page dumped because: kasan: bad access detected
[ 24.457828]
[ 24.457973] Memory state around the buggy address:
[ 24.458229] fff00000c5c98880: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[ 24.458566] fff00000c5c98900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 24.459839] >fff00000c5c98980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 24.461360] ^
[ 24.462216] fff00000c5c98a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.463302] fff00000c5c98a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.464151] ==================================================================
Home
[ 22.931824] ==================================================================
[ 22.932714] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[ 22.933857] Read of size 1 at addr fff00000c6619000 by task kunit_try_catch/129
[ 22.935265]
[ 22.935649] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 22.936972] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.937608] Hardware name: linux,dummy-virt (DT)
[ 22.938293] Call trace:
[ 22.938812] show_stack+0x20/0x38 (C)
[ 22.939334] dump_stack_lvl+0x8c/0xd0
[ 22.939839] print_report+0x118/0x5e0
[ 22.940339] kasan_report+0xc8/0x118
[ 22.941133] __asan_report_load1_noabort+0x20/0x30
[ 22.942115] kmalloc_node_oob_right+0x2f4/0x330
[ 22.942862] kunit_try_run_case+0x14c/0x3d0
[ 22.943589] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 22.944139] kthread+0x24c/0x2d0
[ 22.944824] ret_from_fork+0x10/0x20
[ 22.945540]
[ 22.945964] Allocated by task 129:
[ 22.946631] kasan_save_stack+0x3c/0x68
[ 22.947431] kasan_save_track+0x20/0x40
[ 22.947838] kasan_save_alloc_info+0x40/0x58
[ 22.948642] __kasan_kmalloc+0xd4/0xd8
[ 22.949374] __kmalloc_cache_node_noprof+0x168/0x3d0
[ 22.950091] kmalloc_node_oob_right+0xbc/0x330
[ 22.950821] kunit_try_run_case+0x14c/0x3d0
[ 22.951689] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 22.952430] kthread+0x24c/0x2d0
[ 22.952962] ret_from_fork+0x10/0x20
[ 22.953602]
[ 22.954038] The buggy address belongs to the object at fff00000c6618000
[ 22.954038] which belongs to the cache kmalloc-4k of size 4096
[ 22.955561] The buggy address is located 0 bytes to the right of
[ 22.955561] allocated 4096-byte region [fff00000c6618000, fff00000c6619000)
[ 22.956672]
[ 22.957799] The buggy address belongs to the physical page:
[ 22.958550] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106618
[ 22.959931] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 22.960845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 22.961699] page_type: f5(slab)
[ 22.962262] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[ 22.963636] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[ 22.964455] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[ 22.965345] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[ 22.966244] head: 0bfffe0000000003 ffffc1ffc3198601 ffffffffffffffff 0000000000000000
[ 22.967169] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[ 22.968278] page dumped because: kasan: bad access detected
[ 22.968964]
[ 22.969290] Memory state around the buggy address:
[ 22.969949] fff00000c6618f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 22.970817] fff00000c6618f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 22.971873] >fff00000c6619000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.972758] ^
[ 22.973275] fff00000c6619080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.974102] fff00000c6619100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.974949] ==================================================================
Home
[ 24.024487] ==================================================================
[ 24.025374] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[ 24.026043] Write of size 16 at addr fff00000c5b732c0 by task kunit_try_catch/155
[ 24.026973]
[ 24.027341] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.029661] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.030203] Hardware name: linux,dummy-virt (DT)
[ 24.030980] Call trace:
[ 24.031517] show_stack+0x20/0x38 (C)
[ 24.032778] dump_stack_lvl+0x8c/0xd0
[ 24.033313] print_report+0x118/0x5e0
[ 24.033915] kasan_report+0xc8/0x118
[ 24.034446] __asan_report_store16_noabort+0x20/0x30
[ 24.035848] kmalloc_oob_16+0x3a0/0x3f8
[ 24.036248] kunit_try_run_case+0x14c/0x3d0
[ 24.037190] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.038000] kthread+0x24c/0x2d0
[ 24.038477] ret_from_fork+0x10/0x20
[ 24.039302]
[ 24.039944] Allocated by task 155:
[ 24.040384] kasan_save_stack+0x3c/0x68
[ 24.040902] kasan_save_track+0x20/0x40
[ 24.041366] kasan_save_alloc_info+0x40/0x58
[ 24.042267] __kasan_kmalloc+0xd4/0xd8
[ 24.042851] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.044281] kmalloc_oob_16+0xb4/0x3f8
[ 24.044987] kunit_try_run_case+0x14c/0x3d0
[ 24.045708] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.046349] kthread+0x24c/0x2d0
[ 24.047396] ret_from_fork+0x10/0x20
[ 24.047800]
[ 24.048383] The buggy address belongs to the object at fff00000c5b732c0
[ 24.048383] which belongs to the cache kmalloc-16 of size 16
[ 24.050018] The buggy address is located 0 bytes inside of
[ 24.050018] allocated 13-byte region [fff00000c5b732c0, fff00000c5b732cd)
[ 24.052287]
[ 24.052518] The buggy address belongs to the physical page:
[ 24.053426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 24.054226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.055244] page_type: f5(slab)
[ 24.056128] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 24.057049] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 24.057914] page dumped because: kasan: bad access detected
[ 24.058644]
[ 24.059024] Memory state around the buggy address:
[ 24.060356] fff00000c5b73180: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[ 24.061344] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 24.062149] >fff00000c5b73280: 00 04 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[ 24.063230] ^
[ 24.063779] fff00000c5b73300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.064680] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.065460] ==================================================================
Home
[ 24.132150] ==================================================================
[ 24.133023] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[ 24.133849] Write of size 128 at addr fff00000c5ca2b00 by task kunit_try_catch/159
[ 24.134779]
[ 24.135111] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.136619] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.137123] Hardware name: linux,dummy-virt (DT)
[ 24.137837] Call trace:
[ 24.138316] show_stack+0x20/0x38 (C)
[ 24.138996] dump_stack_lvl+0x8c/0xd0
[ 24.139937] print_report+0x118/0x5e0
[ 24.140454] kasan_report+0xc8/0x118
[ 24.140990] kasan_check_range+0x100/0x1a8
[ 24.141675] __asan_memset+0x34/0x78
[ 24.142291] kmalloc_oob_in_memset+0x144/0x2d0
[ 24.143301] kunit_try_run_case+0x14c/0x3d0
[ 24.143808] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.144540] kthread+0x24c/0x2d0
[ 24.145114] ret_from_fork+0x10/0x20
[ 24.145721]
[ 24.146077] Allocated by task 159:
[ 24.146682] kasan_save_stack+0x3c/0x68
[ 24.147565] kasan_save_track+0x20/0x40
[ 24.148120] kasan_save_alloc_info+0x40/0x58
[ 24.148781] __kasan_kmalloc+0xd4/0xd8
[ 24.149372] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.150074] kmalloc_oob_in_memset+0xb0/0x2d0
[ 24.150659] kunit_try_run_case+0x14c/0x3d0
[ 24.151261] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.152220] kthread+0x24c/0x2d0
[ 24.152771] ret_from_fork+0x10/0x20
[ 24.153294]
[ 24.153687] The buggy address belongs to the object at fff00000c5ca2b00
[ 24.153687] which belongs to the cache kmalloc-128 of size 128
[ 24.155025] The buggy address is located 0 bytes inside of
[ 24.155025] allocated 120-byte region [fff00000c5ca2b00, fff00000c5ca2b78)
[ 24.156720]
[ 24.157067] The buggy address belongs to the physical page:
[ 24.157692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2
[ 24.158727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.159698] page_type: f5(slab)
[ 24.160711] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 24.161614] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.162417] page dumped because: kasan: bad access detected
[ 24.163106]
[ 24.163726] Memory state around the buggy address:
[ 24.164316] fff00000c5ca2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 24.165025] fff00000c5ca2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.165722] >fff00000c5ca2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 24.166653] ^
[ 24.167834] fff00000c5ca2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.168539] fff00000c5ca2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.169191] ==================================================================
Home
[ 24.326101] ==================================================================
[ 24.327315] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[ 24.328594] Write of size 16 at addr fff00000c5ca3969 by task kunit_try_catch/167
[ 24.330166]
[ 24.330472] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.331775] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.332390] Hardware name: linux,dummy-virt (DT)
[ 24.332985] Call trace:
[ 24.333377] show_stack+0x20/0x38 (C)
[ 24.333940] dump_stack_lvl+0x8c/0xd0
[ 24.334511] print_report+0x118/0x5e0
[ 24.335346] kasan_report+0xc8/0x118
[ 24.335840] kasan_check_range+0x100/0x1a8
[ 24.336263] __asan_memset+0x34/0x78
[ 24.336658] kmalloc_oob_memset_16+0x150/0x2f8
[ 24.337092] kunit_try_run_case+0x14c/0x3d0
[ 24.337536] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.338830] kthread+0x24c/0x2d0
[ 24.339964] ret_from_fork+0x10/0x20
[ 24.340663]
[ 24.340970] Allocated by task 167:
[ 24.341417] kasan_save_stack+0x3c/0x68
[ 24.342014] kasan_save_track+0x20/0x40
[ 24.342495] kasan_save_alloc_info+0x40/0x58
[ 24.343399] __kasan_kmalloc+0xd4/0xd8
[ 24.343854] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.344425] kmalloc_oob_memset_16+0xb0/0x2f8
[ 24.344986] kunit_try_run_case+0x14c/0x3d0
[ 24.345532] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.346675] kthread+0x24c/0x2d0
[ 24.347573] ret_from_fork+0x10/0x20
[ 24.347882]
[ 24.348367] The buggy address belongs to the object at fff00000c5ca3900
[ 24.348367] which belongs to the cache kmalloc-128 of size 128
[ 24.349584] The buggy address is located 105 bytes inside of
[ 24.349584] allocated 120-byte region [fff00000c5ca3900, fff00000c5ca3978)
[ 24.350774]
[ 24.351110] The buggy address belongs to the physical page:
[ 24.351697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca3
[ 24.352809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.353511] page_type: f5(slab)
[ 24.354401] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 24.355387] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.356499] page dumped because: kasan: bad access detected
[ 24.357280]
[ 24.357730] Memory state around the buggy address:
[ 24.358407] fff00000c5ca3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 24.359399] fff00000c5ca3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.360398] >fff00000c5ca3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 24.361090] ^
[ 24.362413] fff00000c5ca3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.363156] fff00000c5ca3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.364321] ==================================================================
Home
[ 24.178839] ==================================================================
[ 24.180707] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[ 24.181616] Write of size 2 at addr fff00000c5ca2c77 by task kunit_try_catch/161
[ 24.182423]
[ 24.182782] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.183833] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.184733] Hardware name: linux,dummy-virt (DT)
[ 24.185357] Call trace:
[ 24.186530] show_stack+0x20/0x38 (C)
[ 24.187248] dump_stack_lvl+0x8c/0xd0
[ 24.187825] print_report+0x118/0x5e0
[ 24.188417] kasan_report+0xc8/0x118
[ 24.188969] kasan_check_range+0x100/0x1a8
[ 24.189514] __asan_memset+0x34/0x78
[ 24.190108] kmalloc_oob_memset_2+0x150/0x2f8
[ 24.190782] kunit_try_run_case+0x14c/0x3d0
[ 24.191385] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.192542] kthread+0x24c/0x2d0
[ 24.193058] ret_from_fork+0x10/0x20
[ 24.193572]
[ 24.194170] Allocated by task 161:
[ 24.194514] kasan_save_stack+0x3c/0x68
[ 24.195558] kasan_save_track+0x20/0x40
[ 24.196849] kasan_save_alloc_info+0x40/0x58
[ 24.197539] __kasan_kmalloc+0xd4/0xd8
[ 24.198212] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.198810] kmalloc_oob_memset_2+0xb0/0x2f8
[ 24.199735] kunit_try_run_case+0x14c/0x3d0
[ 24.200432] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.201229] kthread+0x24c/0x2d0
[ 24.201683] ret_from_fork+0x10/0x20
[ 24.202184]
[ 24.202478] The buggy address belongs to the object at fff00000c5ca2c00
[ 24.202478] which belongs to the cache kmalloc-128 of size 128
[ 24.204083] The buggy address is located 119 bytes inside of
[ 24.204083] allocated 120-byte region [fff00000c5ca2c00, fff00000c5ca2c78)
[ 24.205492]
[ 24.206122] The buggy address belongs to the physical page:
[ 24.206816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2
[ 24.208026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.208907] page_type: f5(slab)
[ 24.209352] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 24.210164] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.211389] page dumped because: kasan: bad access detected
[ 24.211877]
[ 24.212441] Memory state around the buggy address:
[ 24.213254] fff00000c5ca2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.214140] fff00000c5ca2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.215386] >fff00000c5ca2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 24.216093] ^
[ 24.216869] fff00000c5ca2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.217624] fff00000c5ca2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.219531] ==================================================================
Home
[ 24.228263] ==================================================================
[ 24.229276] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[ 24.229943] Write of size 4 at addr fff00000c5ca2d75 by task kunit_try_catch/163
[ 24.230853]
[ 24.231257] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.232544] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.233022] Hardware name: linux,dummy-virt (DT)
[ 24.233690] Call trace:
[ 24.235218] show_stack+0x20/0x38 (C)
[ 24.235865] dump_stack_lvl+0x8c/0xd0
[ 24.236249] print_report+0x118/0x5e0
[ 24.236863] kasan_report+0xc8/0x118
[ 24.237408] kasan_check_range+0x100/0x1a8
[ 24.238048] __asan_memset+0x34/0x78
[ 24.238558] kmalloc_oob_memset_4+0x150/0x300
[ 24.239219] kunit_try_run_case+0x14c/0x3d0
[ 24.239807] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.240783] kthread+0x24c/0x2d0
[ 24.241281] ret_from_fork+0x10/0x20
[ 24.241905]
[ 24.242181] Allocated by task 163:
[ 24.242675] kasan_save_stack+0x3c/0x68
[ 24.243314] kasan_save_track+0x20/0x40
[ 24.243939] kasan_save_alloc_info+0x40/0x58
[ 24.244849] __kasan_kmalloc+0xd4/0xd8
[ 24.245571] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.246115] kmalloc_oob_memset_4+0xb0/0x300
[ 24.246629] kunit_try_run_case+0x14c/0x3d0
[ 24.248192] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.248861] kthread+0x24c/0x2d0
[ 24.249574] ret_from_fork+0x10/0x20
[ 24.250240]
[ 24.250566] The buggy address belongs to the object at fff00000c5ca2d00
[ 24.250566] which belongs to the cache kmalloc-128 of size 128
[ 24.251687] The buggy address is located 117 bytes inside of
[ 24.251687] allocated 120-byte region [fff00000c5ca2d00, fff00000c5ca2d78)
[ 24.252547]
[ 24.252991] The buggy address belongs to the physical page:
[ 24.254951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2
[ 24.257384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.258351] page_type: f5(slab)
[ 24.258776] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 24.260016] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.260919] page dumped because: kasan: bad access detected
[ 24.261687]
[ 24.262146] Memory state around the buggy address:
[ 24.262785] fff00000c5ca2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.264109] fff00000c5ca2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.264782] >fff00000c5ca2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 24.265884] ^
[ 24.266660] fff00000c5ca2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.267482] fff00000c5ca2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.268238] ==================================================================
Home
[ 24.278185] ==================================================================
[ 24.279925] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[ 24.280847] Write of size 8 at addr fff00000c5ca2e71 by task kunit_try_catch/165
[ 24.281773]
[ 24.282177] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.283310] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.283854] Hardware name: linux,dummy-virt (DT)
[ 24.284498] Call trace:
[ 24.285015] show_stack+0x20/0x38 (C)
[ 24.285620] dump_stack_lvl+0x8c/0xd0
[ 24.286275] print_report+0x118/0x5e0
[ 24.286923] kasan_report+0xc8/0x118
[ 24.287570] kasan_check_range+0x100/0x1a8
[ 24.288174] __asan_memset+0x34/0x78
[ 24.288825] kmalloc_oob_memset_8+0x150/0x2f8
[ 24.289511] kunit_try_run_case+0x14c/0x3d0
[ 24.290228] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.290980] kthread+0x24c/0x2d0
[ 24.291574] ret_from_fork+0x10/0x20
[ 24.292231]
[ 24.292545] Allocated by task 165:
[ 24.294378] kasan_save_stack+0x3c/0x68
[ 24.295786] kasan_save_track+0x20/0x40
[ 24.296323] kasan_save_alloc_info+0x40/0x58
[ 24.296905] __kasan_kmalloc+0xd4/0xd8
[ 24.297399] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.297996] kmalloc_oob_memset_8+0xb0/0x2f8
[ 24.298530] kunit_try_run_case+0x14c/0x3d0
[ 24.299255] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.299804] kthread+0x24c/0x2d0
[ 24.300343] ret_from_fork+0x10/0x20
[ 24.300898]
[ 24.301207] The buggy address belongs to the object at fff00000c5ca2e00
[ 24.301207] which belongs to the cache kmalloc-128 of size 128
[ 24.303046] The buggy address is located 113 bytes inside of
[ 24.303046] allocated 120-byte region [fff00000c5ca2e00, fff00000c5ca2e78)
[ 24.304230]
[ 24.304598] The buggy address belongs to the physical page:
[ 24.305238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca2
[ 24.306351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.307250] page_type: f5(slab)
[ 24.307711] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 24.308633] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.309437] page dumped because: kasan: bad access detected
[ 24.310111]
[ 24.310387] Memory state around the buggy address:
[ 24.310993] fff00000c5ca2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.311785] fff00000c5ca2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.312500] >fff00000c5ca2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 24.313311] ^
[ 24.314081] fff00000c5ca2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.314966] fff00000c5ca2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.315772] ==================================================================
Home
[ 22.746188] ==================================================================
[ 22.747310] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[ 22.749280] Write of size 1 at addr fff00000c6352873 by task kunit_try_catch/125
[ 22.749898]
[ 22.751649] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.13.0-rc7 #1
[ 22.753082] Tainted: [N]=TEST
[ 22.753661] Hardware name: linux,dummy-virt (DT)
[ 22.754655] Call trace:
[ 22.755509] show_stack+0x20/0x38 (C)
[ 22.756078] dump_stack_lvl+0x8c/0xd0
[ 22.756524] print_report+0x118/0x5e0
[ 22.757452] kasan_report+0xc8/0x118
[ 22.758098] __asan_report_store1_noabort+0x20/0x30
[ 22.758758] kmalloc_oob_right+0x5a4/0x660
[ 22.759563] kunit_try_run_case+0x14c/0x3d0
[ 22.760243] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 22.760953] kthread+0x24c/0x2d0
[ 22.761417] ret_from_fork+0x10/0x20
[ 22.762306]
[ 22.762756] Allocated by task 125:
[ 22.763664] kasan_save_stack+0x3c/0x68
[ 22.764243] kasan_save_track+0x20/0x40
[ 22.764756] kasan_save_alloc_info+0x40/0x58
[ 22.765318] __kasan_kmalloc+0xd4/0xd8
[ 22.766208] __kmalloc_cache_noprof+0x15c/0x3c0
[ 22.766899] kmalloc_oob_right+0xb0/0x660
[ 22.767405] kunit_try_run_case+0x14c/0x3d0
[ 22.768255] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 22.768903] kthread+0x24c/0x2d0
[ 22.769340] ret_from_fork+0x10/0x20
[ 22.770256]
[ 22.771208] The buggy address belongs to the object at fff00000c6352800
[ 22.771208] which belongs to the cache kmalloc-128 of size 128
[ 22.772569] The buggy address is located 0 bytes to the right of
[ 22.772569] allocated 115-byte region [fff00000c6352800, fff00000c6352873)
[ 22.773685]
[ 22.774619] The buggy address belongs to the physical page:
[ 22.776119] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352
[ 22.777296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 22.778443] page_type: f5(slab)
[ 22.779496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 22.780271] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 22.781420] page dumped because: kasan: bad access detected
[ 22.782093]
[ 22.782406] Memory state around the buggy address:
[ 22.783519] fff00000c6352700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 22.784471] fff00000c6352780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.785352] >fff00000c6352800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 22.786047] ^
[ 22.786788] fff00000c6352880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.788549] fff00000c6352900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.789269] ==================================================================
Home
[ 22.792408] ==================================================================
[ 22.793645] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[ 22.794309] Write of size 1 at addr fff00000c6352878 by task kunit_try_catch/125
[ 22.795763]
[ 22.796797] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 22.797964] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.798609] Hardware name: linux,dummy-virt (DT)
[ 22.799551] Call trace:
[ 22.800094] show_stack+0x20/0x38 (C)
[ 22.800804] dump_stack_lvl+0x8c/0xd0
[ 22.801450] print_report+0x118/0x5e0
[ 22.802136] kasan_report+0xc8/0x118
[ 22.802689] __asan_report_store1_noabort+0x20/0x30
[ 22.803906] kmalloc_oob_right+0x538/0x660
[ 22.804372] kunit_try_run_case+0x14c/0x3d0
[ 22.805115] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 22.805920] kthread+0x24c/0x2d0
[ 22.806570] ret_from_fork+0x10/0x20
[ 22.807542]
[ 22.807826] Allocated by task 125:
[ 22.808267] kasan_save_stack+0x3c/0x68
[ 22.808767] kasan_save_track+0x20/0x40
[ 22.809270] kasan_save_alloc_info+0x40/0x58
[ 22.810346] __kasan_kmalloc+0xd4/0xd8
[ 22.810807] __kmalloc_cache_noprof+0x15c/0x3c0
[ 22.811663] kmalloc_oob_right+0xb0/0x660
[ 22.812358] kunit_try_run_case+0x14c/0x3d0
[ 22.813117] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 22.814066] kthread+0x24c/0x2d0
[ 22.814689] ret_from_fork+0x10/0x20
[ 22.815402]
[ 22.815985] The buggy address belongs to the object at fff00000c6352800
[ 22.815985] which belongs to the cache kmalloc-128 of size 128
[ 22.817441] The buggy address is located 5 bytes to the right of
[ 22.817441] allocated 115-byte region [fff00000c6352800, fff00000c6352873)
[ 22.818921]
[ 22.819252] The buggy address belongs to the physical page:
[ 22.820255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352
[ 22.821236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 22.822117] page_type: f5(slab)
[ 22.822778] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 22.823972] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 22.824946] page dumped because: kasan: bad access detected
[ 22.825722]
[ 22.826168] Memory state around the buggy address:
[ 22.826821] fff00000c6352700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 22.827973] fff00000c6352780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.828954] >fff00000c6352800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 22.829874] ^
[ 22.830808] fff00000c6352880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.831817] fff00000c6352900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.832646] ==================================================================
Home
[ 22.835760] ==================================================================
[ 22.836535] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[ 22.837471] Read of size 1 at addr fff00000c6352880 by task kunit_try_catch/125
[ 22.838887]
[ 22.839535] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 22.840617] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.841342] Hardware name: linux,dummy-virt (DT)
[ 22.842052] Call trace:
[ 22.842582] show_stack+0x20/0x38 (C)
[ 22.843506] dump_stack_lvl+0x8c/0xd0
[ 22.844066] print_report+0x118/0x5e0
[ 22.844573] kasan_report+0xc8/0x118
[ 22.845100] __asan_report_load1_noabort+0x20/0x30
[ 22.845697] kmalloc_oob_right+0x5d0/0x660
[ 22.846696] kunit_try_run_case+0x14c/0x3d0
[ 22.847414] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 22.848364] kthread+0x24c/0x2d0
[ 22.848836] ret_from_fork+0x10/0x20
[ 22.849318]
[ 22.849596] Allocated by task 125:
[ 22.850046] kasan_save_stack+0x3c/0x68
[ 22.850598] kasan_save_track+0x20/0x40
[ 22.851809] kasan_save_alloc_info+0x40/0x58
[ 22.852445] __kasan_kmalloc+0xd4/0xd8
[ 22.853067] __kmalloc_cache_noprof+0x15c/0x3c0
[ 22.853735] kmalloc_oob_right+0xb0/0x660
[ 22.854353] kunit_try_run_case+0x14c/0x3d0
[ 22.855134] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 22.855891] kthread+0x24c/0x2d0
[ 22.856453] ret_from_fork+0x10/0x20
[ 22.857076]
[ 22.857478] The buggy address belongs to the object at fff00000c6352800
[ 22.857478] which belongs to the cache kmalloc-128 of size 128
[ 22.858903] The buggy address is located 13 bytes to the right of
[ 22.858903] allocated 115-byte region [fff00000c6352800, fff00000c6352873)
[ 22.860469]
[ 22.860612] The buggy address belongs to the physical page:
[ 22.860931] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352
[ 22.861290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 22.861595] page_type: f5(slab)
[ 22.861933] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 22.863353] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 22.864827] page dumped because: kasan: bad access detected
[ 22.865635]
[ 22.865873] Memory state around the buggy address:
[ 22.866814] fff00000c6352780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.868021] fff00000c6352800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 22.868657] >fff00000c6352880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.869254] ^
[ 22.869980] fff00000c6352900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.870863] fff00000c6352980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.871874] ==================================================================
Home
[ 23.025461] ==================================================================
[ 23.026319] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[ 23.027703] Write of size 1 at addr fff00000c5cac578 by task kunit_try_catch/131
[ 23.028898]
[ 23.029152] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.030108] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.030792] Hardware name: linux,dummy-virt (DT)
[ 23.032102] Call trace:
[ 23.032526] show_stack+0x20/0x38 (C)
[ 23.033131] dump_stack_lvl+0x8c/0xd0
[ 23.034019] print_report+0x118/0x5e0
[ 23.034702] kasan_report+0xc8/0x118
[ 23.035474] __asan_report_store1_noabort+0x20/0x30
[ 23.036153] kmalloc_track_caller_oob_right+0x420/0x490
[ 23.036999] kunit_try_run_case+0x14c/0x3d0
[ 23.037569] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.038386] kthread+0x24c/0x2d0
[ 23.039064] ret_from_fork+0x10/0x20
[ 23.039916]
[ 23.040199] Allocated by task 131:
[ 23.040636] kasan_save_stack+0x3c/0x68
[ 23.041144] kasan_save_track+0x20/0x40
[ 23.041604] kasan_save_alloc_info+0x40/0x58
[ 23.042566] __kasan_kmalloc+0xd4/0xd8
[ 23.043875] __kmalloc_node_track_caller_noprof+0x184/0x4b8
[ 23.044551] kmalloc_track_caller_oob_right+0x184/0x490
[ 23.045431] kunit_try_run_case+0x14c/0x3d0
[ 23.046109] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.046945] kthread+0x24c/0x2d0
[ 23.048102] ret_from_fork+0x10/0x20
[ 23.048766]
[ 23.049090] The buggy address belongs to the object at fff00000c5cac500
[ 23.049090] which belongs to the cache kmalloc-128 of size 128
[ 23.050570] The buggy address is located 0 bytes to the right of
[ 23.050570] allocated 120-byte region [fff00000c5cac500, fff00000c5cac578)
[ 23.052454]
[ 23.052924] The buggy address belongs to the physical page:
[ 23.053659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cac
[ 23.054552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 23.056179] page_type: f5(slab)
[ 23.056935] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 23.057915] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.058917] page dumped because: kasan: bad access detected
[ 23.059732]
[ 23.060402] Memory state around the buggy address:
[ 23.060911] fff00000c5cac400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 23.061905] fff00000c5cac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.062680] >fff00000c5cac500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 23.064167] ^
[ 23.065131] fff00000c5cac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.066037] fff00000c5cac600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.066804] ==================================================================
Home
[ 22.984827] ==================================================================
[ 22.985882] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[ 22.986703] Write of size 1 at addr fff00000c5cac478 by task kunit_try_catch/131
[ 22.987332]
[ 22.987707] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 22.988578] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.988968] Hardware name: linux,dummy-virt (DT)
[ 22.989371] Call trace:
[ 22.989661] show_stack+0x20/0x38 (C)
[ 22.990269] dump_stack_lvl+0x8c/0xd0
[ 22.991055] print_report+0x118/0x5e0
[ 22.991665] kasan_report+0xc8/0x118
[ 22.992285] __asan_report_store1_noabort+0x20/0x30
[ 22.993098] kmalloc_track_caller_oob_right+0x414/0x490
[ 22.993918] kunit_try_run_case+0x14c/0x3d0
[ 22.995680] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 22.996443] kthread+0x24c/0x2d0
[ 22.997002] ret_from_fork+0x10/0x20
[ 22.997454]
[ 22.997833] Allocated by task 131:
[ 22.998445] kasan_save_stack+0x3c/0x68
[ 22.999177] kasan_save_track+0x20/0x40
[ 22.999938] kasan_save_alloc_info+0x40/0x58
[ 23.001003] __kasan_kmalloc+0xd4/0xd8
[ 23.001545] __kmalloc_node_track_caller_noprof+0x184/0x4b8
[ 23.002258] kmalloc_track_caller_oob_right+0xa8/0x490
[ 23.002960] kunit_try_run_case+0x14c/0x3d0
[ 23.003466] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.004526] kthread+0x24c/0x2d0
[ 23.004914] ret_from_fork+0x10/0x20
[ 23.005319]
[ 23.005728] The buggy address belongs to the object at fff00000c5cac400
[ 23.005728] which belongs to the cache kmalloc-128 of size 128
[ 23.007834] The buggy address is located 0 bytes to the right of
[ 23.007834] allocated 120-byte region [fff00000c5cac400, fff00000c5cac478)
[ 23.009661]
[ 23.010051] The buggy address belongs to the physical page:
[ 23.010715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cac
[ 23.012050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 23.012714] page_type: f5(slab)
[ 23.013155] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 23.014236] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.014992] page dumped because: kasan: bad access detected
[ 23.015890]
[ 23.016253] Memory state around the buggy address:
[ 23.017410] fff00000c5cac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 23.018227] fff00000c5cac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.019525] >fff00000c5cac400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 23.020390] ^
[ 23.020735] fff00000c5cac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.021859] fff00000c5cac500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.022787] ==================================================================
Home
[ 25.221635] ==================================================================
[ 25.222639] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[ 25.223298] Read of size 1 at addr fff00000c5ce80c8 by task kunit_try_catch/196
[ 25.225353]
[ 25.225610] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 25.226441] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.228116] Hardware name: linux,dummy-virt (DT)
[ 25.228612] Call trace:
[ 25.228975] show_stack+0x20/0x38 (C)
[ 25.229630] dump_stack_lvl+0x8c/0xd0
[ 25.230249] print_report+0x118/0x5e0
[ 25.230839] kasan_report+0xc8/0x118
[ 25.231374] __asan_report_load1_noabort+0x20/0x30
[ 25.232115] kmem_cache_oob+0x33c/0x428
[ 25.232652] kunit_try_run_case+0x14c/0x3d0
[ 25.233539] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.234271] kthread+0x24c/0x2d0
[ 25.234801] ret_from_fork+0x10/0x20
[ 25.235618]
[ 25.235913] Allocated by task 196:
[ 25.236374] kasan_save_stack+0x3c/0x68
[ 25.236948] kasan_save_track+0x20/0x40
[ 25.237457] kasan_save_alloc_info+0x40/0x58
[ 25.238048] __kasan_slab_alloc+0xa8/0xb0
[ 25.238600] kmem_cache_alloc_noprof+0x108/0x398
[ 25.239526] kmem_cache_oob+0x12c/0x428
[ 25.240021] kunit_try_run_case+0x14c/0x3d0
[ 25.240642] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.241276] kthread+0x24c/0x2d0
[ 25.241799] ret_from_fork+0x10/0x20
[ 25.242321]
[ 25.242662] The buggy address belongs to the object at fff00000c5ce8000
[ 25.242662] which belongs to the cache test_cache of size 200
[ 25.244684] The buggy address is located 0 bytes to the right of
[ 25.244684] allocated 200-byte region [fff00000c5ce8000, fff00000c5ce80c8)
[ 25.246535]
[ 25.246819] The buggy address belongs to the physical page:
[ 25.247834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce8
[ 25.248714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 25.249435] page_type: f5(slab)
[ 25.249994] raw: 0bfffe0000000000 fff00000c565a640 dead000000000122 0000000000000000
[ 25.250825] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[ 25.251900] page dumped because: kasan: bad access detected
[ 25.252535]
[ 25.252848] Memory state around the buggy address:
[ 25.253369] fff00000c5ce7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.254205] fff00000c5ce8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 25.255284] >fff00000c5ce8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 25.256082] ^
[ 25.256758] fff00000c5ce8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.257549] fff00000c5ce8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.258353] ==================================================================
Home
[ 23.593897] ==================================================================
[ 23.594802] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[ 23.596043] Write of size 1 at addr fff00000c6364aeb by task kunit_try_catch/147
[ 23.596668]
[ 23.597021] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.599462] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.600515] Hardware name: linux,dummy-virt (DT)
[ 23.601865] Call trace:
[ 23.602254] show_stack+0x20/0x38 (C)
[ 23.602892] dump_stack_lvl+0x8c/0xd0
[ 23.603619] print_report+0x118/0x5e0
[ 23.604543] kasan_report+0xc8/0x118
[ 23.605391] __asan_report_store1_noabort+0x20/0x30
[ 23.606110] krealloc_less_oob_helper+0xa58/0xc50
[ 23.606806] krealloc_less_oob+0x20/0x38
[ 23.607536] kunit_try_run_case+0x14c/0x3d0
[ 23.608443] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.609805] kthread+0x24c/0x2d0
[ 23.610481] ret_from_fork+0x10/0x20
[ 23.611569]
[ 23.611806] Allocated by task 147:
[ 23.612672] kasan_save_stack+0x3c/0x68
[ 23.613322] kasan_save_track+0x20/0x40
[ 23.613993] kasan_save_alloc_info+0x40/0x58
[ 23.614727] __kasan_krealloc+0x118/0x178
[ 23.615448] krealloc_noprof+0x128/0x360
[ 23.616237] krealloc_less_oob_helper+0x168/0xc50
[ 23.616644] krealloc_less_oob+0x20/0x38
[ 23.617050] kunit_try_run_case+0x14c/0x3d0
[ 23.617625] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.618385] kthread+0x24c/0x2d0
[ 23.618864] ret_from_fork+0x10/0x20
[ 23.619484]
[ 23.619817] The buggy address belongs to the object at fff00000c6364a00
[ 23.619817] which belongs to the cache kmalloc-256 of size 256
[ 23.621367] The buggy address is located 34 bytes to the right of
[ 23.621367] allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9)
[ 23.622643]
[ 23.623521] The buggy address belongs to the physical page:
[ 23.624276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[ 23.625096] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.626209] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.627488] page_type: f5(slab)
[ 23.627715] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.628088] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.628424] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.628839] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.630074] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[ 23.631177] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.632989] page dumped because: kasan: bad access detected
[ 23.633605]
[ 23.633950] Memory state around the buggy address:
[ 23.634609] fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.635713] fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.636661] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 23.637574] ^
[ 23.638369] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.639285] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.640342] ==================================================================
Home
[ 23.438823] ==================================================================
[ 23.439844] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[ 23.440431] Write of size 1 at addr fff00000c6364ad0 by task kunit_try_catch/147
[ 23.440979]
[ 23.441394] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.442523] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.443599] Hardware name: linux,dummy-virt (DT)
[ 23.444432] Call trace:
[ 23.444737] show_stack+0x20/0x38 (C)
[ 23.445265] dump_stack_lvl+0x8c/0xd0
[ 23.445693] print_report+0x118/0x5e0
[ 23.446681] kasan_report+0xc8/0x118
[ 23.447354] __asan_report_store1_noabort+0x20/0x30
[ 23.448813] krealloc_less_oob_helper+0xb9c/0xc50
[ 23.450038] krealloc_less_oob+0x20/0x38
[ 23.450732] kunit_try_run_case+0x14c/0x3d0
[ 23.451419] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.452579] kthread+0x24c/0x2d0
[ 23.453361] ret_from_fork+0x10/0x20
[ 23.453960]
[ 23.454304] Allocated by task 147:
[ 23.454855] kasan_save_stack+0x3c/0x68
[ 23.455605] kasan_save_track+0x20/0x40
[ 23.456145] kasan_save_alloc_info+0x40/0x58
[ 23.456662] __kasan_krealloc+0x118/0x178
[ 23.457241] krealloc_noprof+0x128/0x360
[ 23.458362] krealloc_less_oob_helper+0x168/0xc50
[ 23.459178] krealloc_less_oob+0x20/0x38
[ 23.460097] kunit_try_run_case+0x14c/0x3d0
[ 23.460823] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.461431] kthread+0x24c/0x2d0
[ 23.462096] ret_from_fork+0x10/0x20
[ 23.462574]
[ 23.463020] The buggy address belongs to the object at fff00000c6364a00
[ 23.463020] which belongs to the cache kmalloc-256 of size 256
[ 23.465349] The buggy address is located 7 bytes to the right of
[ 23.465349] allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9)
[ 23.466845]
[ 23.467374] The buggy address belongs to the physical page:
[ 23.468238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[ 23.469416] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.470342] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.472112] page_type: f5(slab)
[ 23.472710] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.473785] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.474789] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.476135] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.476979] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[ 23.478302] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.480060] page dumped because: kasan: bad access detected
[ 23.480794]
[ 23.481090] Memory state around the buggy address:
[ 23.481674] fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.482427] fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.484112] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 23.485081] ^
[ 23.485910] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.486887] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.487686] ==================================================================
Home
[ 23.793187] ==================================================================
[ 23.793888] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[ 23.794585] Write of size 1 at addr fff00000c66060da by task kunit_try_catch/151
[ 23.795607]
[ 23.797134] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.798255] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.798783] Hardware name: linux,dummy-virt (DT)
[ 23.799331] Call trace:
[ 23.799731] show_stack+0x20/0x38 (C)
[ 23.800842] dump_stack_lvl+0x8c/0xd0
[ 23.801371] print_report+0x118/0x5e0
[ 23.801912] kasan_report+0xc8/0x118
[ 23.802454] __asan_report_store1_noabort+0x20/0x30
[ 23.804092] krealloc_less_oob_helper+0xa80/0xc50
[ 23.804580] krealloc_large_less_oob+0x20/0x38
[ 23.805309] kunit_try_run_case+0x14c/0x3d0
[ 23.806009] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.806737] kthread+0x24c/0x2d0
[ 23.807787] ret_from_fork+0x10/0x20
[ 23.808316]
[ 23.808626] The buggy address belongs to the physical page:
[ 23.809245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604
[ 23.810863] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.811979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.813536] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.814332] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.816056] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.817124] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.818130] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000
[ 23.819095] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.820250] page dumped because: kasan: bad access detected
[ 23.821186]
[ 23.821427] Memory state around the buggy address:
[ 23.822146] fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.822925] fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.823895] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 23.825001] ^
[ 23.825891] fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.826704] fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.827829] ==================================================================
Home
[ 23.864868] ==================================================================
[ 23.865561] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[ 23.866498] Write of size 1 at addr fff00000c66060eb by task kunit_try_catch/151
[ 23.867396]
[ 23.867981] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.869046] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.869538] Hardware name: linux,dummy-virt (DT)
[ 23.870309] Call trace:
[ 23.870766] show_stack+0x20/0x38 (C)
[ 23.872187] dump_stack_lvl+0x8c/0xd0
[ 23.872857] print_report+0x118/0x5e0
[ 23.873452] kasan_report+0xc8/0x118
[ 23.874045] __asan_report_store1_noabort+0x20/0x30
[ 23.874918] krealloc_less_oob_helper+0xa58/0xc50
[ 23.875981] krealloc_large_less_oob+0x20/0x38
[ 23.876706] kunit_try_run_case+0x14c/0x3d0
[ 23.877431] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.878256] kthread+0x24c/0x2d0
[ 23.878925] ret_from_fork+0x10/0x20
[ 23.879645]
[ 23.879950] The buggy address belongs to the physical page:
[ 23.880556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604
[ 23.882115] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.883533] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.885040] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.886164] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.886895] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.888499] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.889511] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000
[ 23.890553] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.891712] page dumped because: kasan: bad access detected
[ 23.892332]
[ 23.892621] Memory state around the buggy address:
[ 23.894041] fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.894983] fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.895965] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 23.896709] ^
[ 23.897417] fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.898842] fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.899857] ==================================================================
Home
[ 23.828918] ==================================================================
[ 23.829570] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[ 23.830968] Write of size 1 at addr fff00000c66060ea by task kunit_try_catch/151
[ 23.832405]
[ 23.832623] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.833310] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.833712] Hardware name: linux,dummy-virt (DT)
[ 23.835998] Call trace:
[ 23.836492] show_stack+0x20/0x38 (C)
[ 23.837204] dump_stack_lvl+0x8c/0xd0
[ 23.837875] print_report+0x118/0x5e0
[ 23.838492] kasan_report+0xc8/0x118
[ 23.839367] __asan_report_store1_noabort+0x20/0x30
[ 23.839958] krealloc_less_oob_helper+0xae4/0xc50
[ 23.840528] krealloc_large_less_oob+0x20/0x38
[ 23.841829] kunit_try_run_case+0x14c/0x3d0
[ 23.842104] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.842383] kthread+0x24c/0x2d0
[ 23.842610] ret_from_fork+0x10/0x20
[ 23.843543]
[ 23.844102] The buggy address belongs to the physical page:
[ 23.845015] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604
[ 23.846187] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.847284] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.848247] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.849697] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.850694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.851679] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.852780] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000
[ 23.853816] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.854793] page dumped because: kasan: bad access detected
[ 23.855616]
[ 23.856554] Memory state around the buggy address:
[ 23.857099] fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.857978] fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.858923] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 23.860192] ^
[ 23.860930] fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.861776] fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.862535] ==================================================================
Home
[ 23.490520] ==================================================================
[ 23.491247] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[ 23.492348] Write of size 1 at addr fff00000c6364ada by task kunit_try_catch/147
[ 23.493612]
[ 23.494099] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.495287] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.495938] Hardware name: linux,dummy-virt (DT)
[ 23.496825] Call trace:
[ 23.497599] show_stack+0x20/0x38 (C)
[ 23.498461] dump_stack_lvl+0x8c/0xd0
[ 23.499070] print_report+0x118/0x5e0
[ 23.500039] kasan_report+0xc8/0x118
[ 23.500561] __asan_report_store1_noabort+0x20/0x30
[ 23.501169] krealloc_less_oob_helper+0xa80/0xc50
[ 23.501733] krealloc_less_oob+0x20/0x38
[ 23.502761] kunit_try_run_case+0x14c/0x3d0
[ 23.503519] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.504407] kthread+0x24c/0x2d0
[ 23.505679] ret_from_fork+0x10/0x20
[ 23.506408]
[ 23.506881] Allocated by task 147:
[ 23.507517] kasan_save_stack+0x3c/0x68
[ 23.508043] kasan_save_track+0x20/0x40
[ 23.508519] kasan_save_alloc_info+0x40/0x58
[ 23.509664] __kasan_krealloc+0x118/0x178
[ 23.510268] krealloc_noprof+0x128/0x360
[ 23.510885] krealloc_less_oob_helper+0x168/0xc50
[ 23.512420] krealloc_less_oob+0x20/0x38
[ 23.512980] kunit_try_run_case+0x14c/0x3d0
[ 23.513229] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.513499] kthread+0x24c/0x2d0
[ 23.513697] ret_from_fork+0x10/0x20
[ 23.514439]
[ 23.515525] The buggy address belongs to the object at fff00000c6364a00
[ 23.515525] which belongs to the cache kmalloc-256 of size 256
[ 23.516865] The buggy address is located 17 bytes to the right of
[ 23.516865] allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9)
[ 23.518410]
[ 23.518712] The buggy address belongs to the physical page:
[ 23.519344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[ 23.521167] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.522563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.523732] page_type: f5(slab)
[ 23.524366] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.525148] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.526324] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.527208] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.528247] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[ 23.530306] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.531352] page dumped because: kasan: bad access detected
[ 23.531830]
[ 23.532125] Memory state around the buggy address:
[ 23.533574] fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.534310] fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.536037] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 23.537005] ^
[ 23.537879] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.538833] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.539767] ==================================================================
Home
[ 23.390653] ==================================================================
[ 23.391570] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[ 23.393162] Write of size 1 at addr fff00000c6364ac9 by task kunit_try_catch/147
[ 23.393733]
[ 23.394034] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.395693] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.396300] Hardware name: linux,dummy-virt (DT)
[ 23.397274] Call trace:
[ 23.397600] show_stack+0x20/0x38 (C)
[ 23.398249] dump_stack_lvl+0x8c/0xd0
[ 23.399074] print_report+0x118/0x5e0
[ 23.399728] kasan_report+0xc8/0x118
[ 23.400135] __asan_report_store1_noabort+0x20/0x30
[ 23.400590] krealloc_less_oob_helper+0xa48/0xc50
[ 23.401618] krealloc_less_oob+0x20/0x38
[ 23.402180] kunit_try_run_case+0x14c/0x3d0
[ 23.402794] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.403349] kthread+0x24c/0x2d0
[ 23.404477] ret_from_fork+0x10/0x20
[ 23.405024]
[ 23.405340] Allocated by task 147:
[ 23.405854] kasan_save_stack+0x3c/0x68
[ 23.406354] kasan_save_track+0x20/0x40
[ 23.407809] kasan_save_alloc_info+0x40/0x58
[ 23.408594] __kasan_krealloc+0x118/0x178
[ 23.409099] krealloc_noprof+0x128/0x360
[ 23.409620] krealloc_less_oob_helper+0x168/0xc50
[ 23.410214] krealloc_less_oob+0x20/0x38
[ 23.410779] kunit_try_run_case+0x14c/0x3d0
[ 23.411797] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.412485] kthread+0x24c/0x2d0
[ 23.412954] ret_from_fork+0x10/0x20
[ 23.413488]
[ 23.414243] The buggy address belongs to the object at fff00000c6364a00
[ 23.414243] which belongs to the cache kmalloc-256 of size 256
[ 23.415968] The buggy address is located 0 bytes to the right of
[ 23.415968] allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9)
[ 23.417145]
[ 23.417427] The buggy address belongs to the physical page:
[ 23.419284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[ 23.420480] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.421559] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.422420] page_type: f5(slab)
[ 23.422922] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.424820] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.425531] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.426408] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.427546] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[ 23.428345] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.429028] page dumped because: kasan: bad access detected
[ 23.429528]
[ 23.429776] Memory state around the buggy address:
[ 23.430606] fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.432447] fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.433224] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 23.434015] ^
[ 23.434608] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.435290] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.436294] ==================================================================
Home
[ 23.723495] ==================================================================
[ 23.724550] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[ 23.725338] Write of size 1 at addr fff00000c66060c9 by task kunit_try_catch/151
[ 23.726714]
[ 23.727142] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.728232] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.729609] Hardware name: linux,dummy-virt (DT)
[ 23.730239] Call trace:
[ 23.730790] show_stack+0x20/0x38 (C)
[ 23.731561] dump_stack_lvl+0x8c/0xd0
[ 23.732457] print_report+0x118/0x5e0
[ 23.733010] kasan_report+0xc8/0x118
[ 23.733500] __asan_report_store1_noabort+0x20/0x30
[ 23.734271] krealloc_less_oob_helper+0xa48/0xc50
[ 23.735011] krealloc_large_less_oob+0x20/0x38
[ 23.736594] kunit_try_run_case+0x14c/0x3d0
[ 23.737281] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.738070] kthread+0x24c/0x2d0
[ 23.738667] ret_from_fork+0x10/0x20
[ 23.739839]
[ 23.740212] The buggy address belongs to the physical page:
[ 23.741028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604
[ 23.741995] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.743198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.743888] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.744563] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.746647] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.747805] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.748562] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000
[ 23.749826] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.750693] page dumped because: kasan: bad access detected
[ 23.751471]
[ 23.752708] Memory state around the buggy address:
[ 23.753317] fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.754135] fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.755031] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 23.755931] ^
[ 23.756545] fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.757854] fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.758674] ==================================================================
Home
[ 23.542292] ==================================================================
[ 23.543021] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[ 23.544105] Write of size 1 at addr fff00000c6364aea by task kunit_try_catch/147
[ 23.545863]
[ 23.546332] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.547517] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.548408] Hardware name: linux,dummy-virt (DT)
[ 23.549320] Call trace:
[ 23.549855] show_stack+0x20/0x38 (C)
[ 23.550596] dump_stack_lvl+0x8c/0xd0
[ 23.551481] print_report+0x118/0x5e0
[ 23.551995] kasan_report+0xc8/0x118
[ 23.552474] __asan_report_store1_noabort+0x20/0x30
[ 23.553956] krealloc_less_oob_helper+0xae4/0xc50
[ 23.554240] krealloc_less_oob+0x20/0x38
[ 23.554472] kunit_try_run_case+0x14c/0x3d0
[ 23.554737] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.556344] kthread+0x24c/0x2d0
[ 23.556837] ret_from_fork+0x10/0x20
[ 23.557626]
[ 23.558126] Allocated by task 147:
[ 23.558688] kasan_save_stack+0x3c/0x68
[ 23.559373] kasan_save_track+0x20/0x40
[ 23.560222] kasan_save_alloc_info+0x40/0x58
[ 23.560852] __kasan_krealloc+0x118/0x178
[ 23.561859] krealloc_noprof+0x128/0x360
[ 23.562366] krealloc_less_oob_helper+0x168/0xc50
[ 23.563591] krealloc_less_oob+0x20/0x38
[ 23.564111] kunit_try_run_case+0x14c/0x3d0
[ 23.564882] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.565558] kthread+0x24c/0x2d0
[ 23.565830] ret_from_fork+0x10/0x20
[ 23.566517]
[ 23.566847] The buggy address belongs to the object at fff00000c6364a00
[ 23.566847] which belongs to the cache kmalloc-256 of size 256
[ 23.568378] The buggy address is located 33 bytes to the right of
[ 23.568378] allocated 201-byte region [fff00000c6364a00, fff00000c6364ac9)
[ 23.569587]
[ 23.570513] The buggy address belongs to the physical page:
[ 23.571278] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[ 23.572559] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.574453] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.575675] page_type: f5(slab)
[ 23.576493] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.577500] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.578505] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.580281] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.581137] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[ 23.582027] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.582898] page dumped because: kasan: bad access detected
[ 23.583854]
[ 23.584123] Memory state around the buggy address:
[ 23.584861] fff00000c6364980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.585724] fff00000c6364a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.586595] >fff00000c6364a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 23.587891] ^
[ 23.588437] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.590201] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.591085] ==================================================================
Home
[ 23.760427] ==================================================================
[ 23.761173] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[ 23.762189] Write of size 1 at addr fff00000c66060d0 by task kunit_try_catch/151
[ 23.763045]
[ 23.763460] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.764352] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.765619] Hardware name: linux,dummy-virt (DT)
[ 23.766367] Call trace:
[ 23.766841] show_stack+0x20/0x38 (C)
[ 23.767569] dump_stack_lvl+0x8c/0xd0
[ 23.768474] print_report+0x118/0x5e0
[ 23.768871] kasan_report+0xc8/0x118
[ 23.769279] __asan_report_store1_noabort+0x20/0x30
[ 23.770038] krealloc_less_oob_helper+0xb9c/0xc50
[ 23.770792] krealloc_large_less_oob+0x20/0x38
[ 23.771995] kunit_try_run_case+0x14c/0x3d0
[ 23.772540] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.773124] kthread+0x24c/0x2d0
[ 23.773662] ret_from_fork+0x10/0x20
[ 23.774157]
[ 23.774495] The buggy address belongs to the physical page:
[ 23.776226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604
[ 23.776990] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.777904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.778779] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.779993] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.780961] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.781809] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.782582] head: 0bfffe0000000002 ffffc1ffc3198101 ffffffffffffffff 0000000000000000
[ 23.783650] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.784523] page dumped because: kasan: bad access detected
[ 23.785052]
[ 23.785263] Memory state around the buggy address:
[ 23.785719] fff00000c6605f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.786836] fff00000c6606000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.787571] >fff00000c6606080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 23.788219] ^
[ 23.790203] fff00000c6606100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.790932] fff00000c6606180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.792034] ==================================================================
Home
[ 23.685568] ==================================================================
[ 23.686377] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[ 23.687279] Write of size 1 at addr fff00000c66020f0 by task kunit_try_catch/149
[ 23.688343]
[ 23.688837] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.689964] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.690581] Hardware name: linux,dummy-virt (DT)
[ 23.691229] Call trace:
[ 23.691714] show_stack+0x20/0x38 (C)
[ 23.692366] dump_stack_lvl+0x8c/0xd0
[ 23.693015] print_report+0x118/0x5e0
[ 23.693576] kasan_report+0xc8/0x118
[ 23.694328] __asan_report_store1_noabort+0x20/0x30
[ 23.695131] krealloc_more_oob_helper+0x5c8/0x680
[ 23.695891] krealloc_large_more_oob+0x20/0x38
[ 23.696536] kunit_try_run_case+0x14c/0x3d0
[ 23.697169] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.697899] kthread+0x24c/0x2d0
[ 23.698407] ret_from_fork+0x10/0x20
[ 23.699057]
[ 23.699404] The buggy address belongs to the physical page:
[ 23.700088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600
[ 23.701066] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.701939] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.702823] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.703685] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.704541] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.705409] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.706348] head: 0bfffe0000000002 ffffc1ffc3198001 ffffffffffffffff 0000000000000000
[ 23.707311] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.708086] page dumped because: kasan: bad access detected
[ 23.708673]
[ 23.708958] Memory state around the buggy address:
[ 23.709456] fff00000c6601f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.710361] fff00000c6602000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.711110] >fff00000c6602080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 23.711929] ^
[ 23.712616] fff00000c6602100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.713446] fff00000c6602180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.714273] ==================================================================
Home
[ 23.649316] ==================================================================
[ 23.650361] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[ 23.652588] Write of size 1 at addr fff00000c66020eb by task kunit_try_catch/149
[ 23.653422]
[ 23.653778] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.654880] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.655765] Hardware name: linux,dummy-virt (DT)
[ 23.656317] Call trace:
[ 23.656666] show_stack+0x20/0x38 (C)
[ 23.657408] dump_stack_lvl+0x8c/0xd0
[ 23.658069] print_report+0x118/0x5e0
[ 23.658932] kasan_report+0xc8/0x118
[ 23.659439] __asan_report_store1_noabort+0x20/0x30
[ 23.660307] krealloc_more_oob_helper+0x614/0x680
[ 23.661088] krealloc_large_more_oob+0x20/0x38
[ 23.661689] kunit_try_run_case+0x14c/0x3d0
[ 23.662334] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.663061] kthread+0x24c/0x2d0
[ 23.663697] ret_from_fork+0x10/0x20
[ 23.664225]
[ 23.664523] The buggy address belongs to the physical page:
[ 23.665669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600
[ 23.666339] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.667836] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.668674] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.669649] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.670559] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 23.671686] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 23.672775] head: 0bfffe0000000002 ffffc1ffc3198001 ffffffffffffffff 0000000000000000
[ 23.673766] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 23.674719] page dumped because: kasan: bad access detected
[ 23.675789]
[ 23.676243] Memory state around the buggy address:
[ 23.677049] fff00000c6601f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.677775] fff00000c6602000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.678724] >fff00000c6602080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 23.679673] ^
[ 23.680388] fff00000c6602100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.681510] fff00000c6602180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 23.682651] ==================================================================
Home
[ 23.288500] ==================================================================
[ 23.289455] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[ 23.290162] Write of size 1 at addr fff00000c096ceeb by task kunit_try_catch/145
[ 23.290924]
[ 23.291610] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.292645] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.293220] Hardware name: linux,dummy-virt (DT)
[ 23.293721] Call trace:
[ 23.294199] show_stack+0x20/0x38 (C)
[ 23.294792] dump_stack_lvl+0x8c/0xd0
[ 23.295331] print_report+0x118/0x5e0
[ 23.295918] kasan_report+0xc8/0x118
[ 23.296509] __asan_report_store1_noabort+0x20/0x30
[ 23.297270] krealloc_more_oob_helper+0x614/0x680
[ 23.298038] krealloc_more_oob+0x20/0x38
[ 23.298585] kunit_try_run_case+0x14c/0x3d0
[ 23.299529] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.300376] kthread+0x24c/0x2d0
[ 23.301145] ret_from_fork+0x10/0x20
[ 23.301663]
[ 23.301981] Allocated by task 145:
[ 23.302457] kasan_save_stack+0x3c/0x68
[ 23.303371] kasan_save_track+0x20/0x40
[ 23.304487] kasan_save_alloc_info+0x40/0x58
[ 23.305088] __kasan_krealloc+0x118/0x178
[ 23.305649] krealloc_noprof+0x128/0x360
[ 23.306215] krealloc_more_oob_helper+0x168/0x680
[ 23.306892] krealloc_more_oob+0x20/0x38
[ 23.307563] kunit_try_run_case+0x14c/0x3d0
[ 23.308265] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.309000] kthread+0x24c/0x2d0
[ 23.309534] ret_from_fork+0x10/0x20
[ 23.310109]
[ 23.310486] The buggy address belongs to the object at fff00000c096ce00
[ 23.310486] which belongs to the cache kmalloc-256 of size 256
[ 23.311918] The buggy address is located 0 bytes to the right of
[ 23.311918] allocated 235-byte region [fff00000c096ce00, fff00000c096ceeb)
[ 23.313387]
[ 23.313980] The buggy address belongs to the physical page:
[ 23.315304] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10096c
[ 23.316408] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.317554] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.318445] page_type: f5(slab)
[ 23.319234] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.320134] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.320985] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.321856] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.322786] head: 0bfffe0000000001 ffffc1ffc3025b01 ffffffffffffffff 0000000000000000
[ 23.324017] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.324929] page dumped because: kasan: bad access detected
[ 23.325627]
[ 23.325977] Memory state around the buggy address:
[ 23.326556] fff00000c096cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.327531] fff00000c096ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.328660] >fff00000c096ce80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 23.329578] ^
[ 23.330155] fff00000c096cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.330478] fff00000c096cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.330900] ==================================================================
Home
[ 23.334731] ==================================================================
[ 23.335660] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[ 23.337187] Write of size 1 at addr fff00000c096cef0 by task kunit_try_catch/145
[ 23.337833]
[ 23.338204] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.340404] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.340923] Hardware name: linux,dummy-virt (DT)
[ 23.341472] Call trace:
[ 23.342141] show_stack+0x20/0x38 (C)
[ 23.342760] dump_stack_lvl+0x8c/0xd0
[ 23.343602] print_report+0x118/0x5e0
[ 23.344293] kasan_report+0xc8/0x118
[ 23.344824] __asan_report_store1_noabort+0x20/0x30
[ 23.345415] krealloc_more_oob_helper+0x5c8/0x680
[ 23.346243] krealloc_more_oob+0x20/0x38
[ 23.346945] kunit_try_run_case+0x14c/0x3d0
[ 23.347733] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.348583] kthread+0x24c/0x2d0
[ 23.348989] ret_from_fork+0x10/0x20
[ 23.349385]
[ 23.349602] Allocated by task 145:
[ 23.349971] kasan_save_stack+0x3c/0x68
[ 23.350380] kasan_save_track+0x20/0x40
[ 23.352024] kasan_save_alloc_info+0x40/0x58
[ 23.352658] __kasan_krealloc+0x118/0x178
[ 23.353686] krealloc_noprof+0x128/0x360
[ 23.354081] krealloc_more_oob_helper+0x168/0x680
[ 23.355322] krealloc_more_oob+0x20/0x38
[ 23.356027] kunit_try_run_case+0x14c/0x3d0
[ 23.356276] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.356546] kthread+0x24c/0x2d0
[ 23.356790] ret_from_fork+0x10/0x20
[ 23.357656]
[ 23.358093] The buggy address belongs to the object at fff00000c096ce00
[ 23.358093] which belongs to the cache kmalloc-256 of size 256
[ 23.359554] The buggy address is located 5 bytes to the right of
[ 23.359554] allocated 235-byte region [fff00000c096ce00, fff00000c096ceeb)
[ 23.361166]
[ 23.361515] The buggy address belongs to the physical page:
[ 23.362277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10096c
[ 23.363248] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.364195] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.365022] page_type: f5(slab)
[ 23.365463] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.366824] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.367963] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.368868] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.369857] head: 0bfffe0000000001 ffffc1ffc3025b01 ffffffffffffffff 0000000000000000
[ 23.370863] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.371693] page dumped because: kasan: bad access detected
[ 23.372658]
[ 23.373755] Memory state around the buggy address:
[ 23.374510] fff00000c096cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.375926] fff00000c096ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.376792] >fff00000c096ce80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 23.377518] ^
[ 23.378586] fff00000c096cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.379512] fff00000c096cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.380534] ==================================================================
Home
[ 24.835570] ==================================================================
[ 24.836164] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[ 24.837353] Read of size 1 at addr fff00000c5cd657f by task kunit_try_catch/183
[ 24.838178]
[ 24.838593] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.839574] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.840383] Hardware name: linux,dummy-virt (DT)
[ 24.841549] Call trace:
[ 24.841985] show_stack+0x20/0x38 (C)
[ 24.842611] dump_stack_lvl+0x8c/0xd0
[ 24.843236] print_report+0x118/0x5e0
[ 24.844361] kasan_report+0xc8/0x118
[ 24.844903] __asan_report_load1_noabort+0x20/0x30
[ 24.845556] ksize_unpoisons_memory+0x6a0/0x750
[ 24.846276] kunit_try_run_case+0x14c/0x3d0
[ 24.846977] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.847714] kthread+0x24c/0x2d0
[ 24.848968] ret_from_fork+0x10/0x20
[ 24.849519]
[ 24.849879] Allocated by task 183:
[ 24.850380] kasan_save_stack+0x3c/0x68
[ 24.851435] kasan_save_track+0x20/0x40
[ 24.851937] kasan_save_alloc_info+0x40/0x58
[ 24.852469] __kasan_kmalloc+0xd4/0xd8
[ 24.852961] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.853495] ksize_unpoisons_memory+0xc0/0x750
[ 24.854873] kunit_try_run_case+0x14c/0x3d0
[ 24.856356] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.857109] kthread+0x24c/0x2d0
[ 24.857632] ret_from_fork+0x10/0x20
[ 24.858173]
[ 24.858551] The buggy address belongs to the object at fff00000c5cd6500
[ 24.858551] which belongs to the cache kmalloc-128 of size 128
[ 24.860096] The buggy address is located 12 bytes to the right of
[ 24.860096] allocated 115-byte region [fff00000c5cd6500, fff00000c5cd6573)
[ 24.861320]
[ 24.861604] The buggy address belongs to the physical page:
[ 24.862619] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[ 24.863506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.864554] page_type: f5(slab)
[ 24.864923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 24.865356] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.865693] page dumped because: kasan: bad access detected
[ 24.866993]
[ 24.867263] Memory state around the buggy address:
[ 24.867816] fff00000c5cd6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 24.868619] fff00000c5cd6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.869876] >fff00000c5cd6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 24.870642] ^
[ 24.872185] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.872840] fff00000c5cd6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.873555] ==================================================================
Home
[ 24.749796] ==================================================================
[ 24.750660] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[ 24.751441] Read of size 1 at addr fff00000c5cd6573 by task kunit_try_catch/183
[ 24.752971]
[ 24.753448] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.754241] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.755456] Hardware name: linux,dummy-virt (DT)
[ 24.756157] Call trace:
[ 24.756850] show_stack+0x20/0x38 (C)
[ 24.757531] dump_stack_lvl+0x8c/0xd0
[ 24.758247] print_report+0x118/0x5e0
[ 24.758802] kasan_report+0xc8/0x118
[ 24.759431] __asan_report_load1_noabort+0x20/0x30
[ 24.760447] ksize_unpoisons_memory+0x638/0x750
[ 24.761309] kunit_try_run_case+0x14c/0x3d0
[ 24.761993] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.762805] kthread+0x24c/0x2d0
[ 24.763673] ret_from_fork+0x10/0x20
[ 24.764291]
[ 24.764625] Allocated by task 183:
[ 24.765176] kasan_save_stack+0x3c/0x68
[ 24.765807] kasan_save_track+0x20/0x40
[ 24.766450] kasan_save_alloc_info+0x40/0x58
[ 24.767032] __kasan_kmalloc+0xd4/0xd8
[ 24.767866] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.768393] ksize_unpoisons_memory+0xc0/0x750
[ 24.768947] kunit_try_run_case+0x14c/0x3d0
[ 24.769455] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.770951] kthread+0x24c/0x2d0
[ 24.771827] ret_from_fork+0x10/0x20
[ 24.772381]
[ 24.772732] The buggy address belongs to the object at fff00000c5cd6500
[ 24.772732] which belongs to the cache kmalloc-128 of size 128
[ 24.774119] The buggy address is located 0 bytes to the right of
[ 24.774119] allocated 115-byte region [fff00000c5cd6500, fff00000c5cd6573)
[ 24.775817]
[ 24.776050] The buggy address belongs to the physical page:
[ 24.777153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[ 24.778319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.779628] page_type: f5(slab)
[ 24.780012] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 24.781019] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.781775] page dumped because: kasan: bad access detected
[ 24.782370]
[ 24.782669] Memory state around the buggy address:
[ 24.783225] fff00000c5cd6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 24.785024] fff00000c5cd6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.785950] >fff00000c5cd6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 24.786611] ^
[ 24.788067] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.788892] fff00000c5cd6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.789688] ==================================================================
Home
[ 24.791133] ==================================================================
[ 24.792135] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[ 24.792827] Read of size 1 at addr fff00000c5cd6578 by task kunit_try_catch/183
[ 24.793469]
[ 24.793705] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.796147] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.796569] Hardware name: linux,dummy-virt (DT)
[ 24.797032] Call trace:
[ 24.797313] show_stack+0x20/0x38 (C)
[ 24.797738] dump_stack_lvl+0x8c/0xd0
[ 24.799576] print_report+0x118/0x5e0
[ 24.800592] kasan_report+0xc8/0x118
[ 24.801216] __asan_report_load1_noabort+0x20/0x30
[ 24.802007] ksize_unpoisons_memory+0x628/0x750
[ 24.802735] kunit_try_run_case+0x14c/0x3d0
[ 24.803530] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.804224] kthread+0x24c/0x2d0
[ 24.804713] ret_from_fork+0x10/0x20
[ 24.805253]
[ 24.805539] Allocated by task 183:
[ 24.806792] kasan_save_stack+0x3c/0x68
[ 24.807520] kasan_save_track+0x20/0x40
[ 24.808782] kasan_save_alloc_info+0x40/0x58
[ 24.809516] __kasan_kmalloc+0xd4/0xd8
[ 24.810195] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.810966] ksize_unpoisons_memory+0xc0/0x750
[ 24.811722] kunit_try_run_case+0x14c/0x3d0
[ 24.812292] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.812946] kthread+0x24c/0x2d0
[ 24.813404] ret_from_fork+0x10/0x20
[ 24.814302]
[ 24.814587] The buggy address belongs to the object at fff00000c5cd6500
[ 24.814587] which belongs to the cache kmalloc-128 of size 128
[ 24.816866] The buggy address is located 5 bytes to the right of
[ 24.816866] allocated 115-byte region [fff00000c5cd6500, fff00000c5cd6573)
[ 24.817636]
[ 24.818330] The buggy address belongs to the physical page:
[ 24.819305] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[ 24.820566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.821374] page_type: f5(slab)
[ 24.821814] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 24.822560] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.823985] page dumped because: kasan: bad access detected
[ 24.824876]
[ 24.825887] Memory state around the buggy address:
[ 24.826516] fff00000c5cd6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 24.827694] fff00000c5cd6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.828755] >fff00000c5cd6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 24.829680] ^
[ 24.830641] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.831605] fff00000c5cd6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.833672] ==================================================================
Home
[ 26.938896] ==================================================================
[ 26.939926] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[ 26.940525] Read of size 1 at addr fff00000c5d0e118 by task kunit_try_catch/244
[ 26.941330]
[ 26.941645] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.942541] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.943368] Hardware name: linux,dummy-virt (DT)
[ 26.944315] Call trace:
[ 26.945178] show_stack+0x20/0x38 (C)
[ 26.945882] dump_stack_lvl+0x8c/0xd0
[ 26.946390] print_report+0x118/0x5e0
[ 26.946921] kasan_report+0xc8/0x118
[ 26.947419] __asan_report_load1_noabort+0x20/0x30
[ 26.948644] memchr+0x78/0x88
[ 26.949268] kasan_memchr+0x148/0x2d8
[ 26.949971] kunit_try_run_case+0x14c/0x3d0
[ 26.950696] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.951700] kthread+0x24c/0x2d0
[ 26.952365] ret_from_fork+0x10/0x20
[ 26.953083]
[ 26.953384] Allocated by task 244:
[ 26.954097] kasan_save_stack+0x3c/0x68
[ 26.954773] kasan_save_track+0x20/0x40
[ 26.955500] kasan_save_alloc_info+0x40/0x58
[ 26.956314] __kasan_kmalloc+0xd4/0xd8
[ 26.956866] __kmalloc_cache_noprof+0x15c/0x3c0
[ 26.957660] kasan_memchr+0xb0/0x2d8
[ 26.958332] kunit_try_run_case+0x14c/0x3d0
[ 26.959248] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.959878] kthread+0x24c/0x2d0
[ 26.960795] ret_from_fork+0x10/0x20
[ 26.961475]
[ 26.961960] The buggy address belongs to the object at fff00000c5d0e100
[ 26.961960] which belongs to the cache kmalloc-32 of size 32
[ 26.963555] The buggy address is located 0 bytes to the right of
[ 26.963555] allocated 24-byte region [fff00000c5d0e100, fff00000c5d0e118)
[ 26.964771]
[ 26.965068] The buggy address belongs to the physical page:
[ 26.965681] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[ 26.966663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.967878] page_type: f5(slab)
[ 26.968391] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 26.969327] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 26.970203] page dumped because: kasan: bad access detected
[ 26.970962]
[ 26.971345] Memory state around the buggy address:
[ 26.972001] fff00000c5d0e000: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 26.972801] fff00000c5d0e080: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 26.973737] >fff00000c5d0e100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.974652] ^
[ 26.975395] fff00000c5d0e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.976052] fff00000c5d0e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.976693] ==================================================================
Home
[ 26.985881] ==================================================================
[ 26.986881] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[ 26.988445] Read of size 1 at addr fff00000c5d0e1d8 by task kunit_try_catch/246
[ 26.989454]
[ 26.989843] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.990883] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.992112] Hardware name: linux,dummy-virt (DT)
[ 26.992773] Call trace:
[ 26.993222] show_stack+0x20/0x38 (C)
[ 26.993884] dump_stack_lvl+0x8c/0xd0
[ 26.994429] print_report+0x118/0x5e0
[ 26.995734] kasan_report+0xc8/0x118
[ 26.996311] __asan_report_load1_noabort+0x20/0x30
[ 26.996981] memcmp+0x198/0x1d8
[ 26.997505] kasan_memcmp+0x16c/0x300
[ 26.998079] kunit_try_run_case+0x14c/0x3d0
[ 26.998711] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.999834] kthread+0x24c/0x2d0
[ 27.000324] ret_from_fork+0x10/0x20
[ 27.001001]
[ 27.001339] Allocated by task 246:
[ 27.001889] kasan_save_stack+0x3c/0x68
[ 27.002458] kasan_save_track+0x20/0x40
[ 27.003985] kasan_save_alloc_info+0x40/0x58
[ 27.004551] __kasan_kmalloc+0xd4/0xd8
[ 27.004820] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.005085] kasan_memcmp+0xbc/0x300
[ 27.005299] kunit_try_run_case+0x14c/0x3d0
[ 27.005535] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.005916] kthread+0x24c/0x2d0
[ 27.006318] ret_from_fork+0x10/0x20
[ 27.006726]
[ 27.008229] The buggy address belongs to the object at fff00000c5d0e1c0
[ 27.008229] which belongs to the cache kmalloc-32 of size 32
[ 27.009344] The buggy address is located 0 bytes to the right of
[ 27.009344] allocated 24-byte region [fff00000c5d0e1c0, fff00000c5d0e1d8)
[ 27.010717]
[ 27.011156] The buggy address belongs to the physical page:
[ 27.012373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[ 27.013261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.014109] page_type: f5(slab)
[ 27.014668] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 27.015763] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 27.016737] page dumped because: kasan: bad access detected
[ 27.017533]
[ 27.017865] Memory state around the buggy address:
[ 27.018500] fff00000c5d0e080: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 27.019645] fff00000c5d0e100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 27.020765] >fff00000c5d0e180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 27.021512] ^
[ 27.021901] fff00000c5d0e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.022887] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.024041] ==================================================================
Home
[ 26.270466] ==================================================================
[ 26.271633] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[ 26.273073] Read of size 1 at addr fff00000c5c7b2bb by task kunit_try_catch/214
[ 26.274530]
[ 26.275379] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.276403] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.277131] Hardware name: linux,dummy-virt (DT)
[ 26.277712] Call trace:
[ 26.278075] show_stack+0x20/0x38 (C)
[ 26.278650] dump_stack_lvl+0x8c/0xd0
[ 26.279586] print_report+0x118/0x5e0
[ 26.280368] kasan_report+0xc8/0x118
[ 26.280849] __asan_report_load1_noabort+0x20/0x30
[ 26.281412] mempool_oob_right_helper+0x2ac/0x2f0
[ 26.282179] mempool_slab_oob_right+0xb8/0x110
[ 26.282998] kunit_try_run_case+0x14c/0x3d0
[ 26.283877] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.284639] kthread+0x24c/0x2d0
[ 26.285256] ret_from_fork+0x10/0x20
[ 26.285938]
[ 26.286161] Allocated by task 214:
[ 26.286918] kasan_save_stack+0x3c/0x68
[ 26.287543] kasan_save_track+0x20/0x40
[ 26.288882] kasan_save_alloc_info+0x40/0x58
[ 26.289566] __kasan_mempool_unpoison_object+0xbc/0x180
[ 26.290340] remove_element+0x16c/0x1f8
[ 26.290986] mempool_alloc_preallocated+0x58/0xc0
[ 26.291811] mempool_oob_right_helper+0x98/0x2f0
[ 26.292679] mempool_slab_oob_right+0xb8/0x110
[ 26.293388] kunit_try_run_case+0x14c/0x3d0
[ 26.294060] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.294817] kthread+0x24c/0x2d0
[ 26.295523] ret_from_fork+0x10/0x20
[ 26.296041]
[ 26.296457] The buggy address belongs to the object at fff00000c5c7b240
[ 26.296457] which belongs to the cache test_cache of size 123
[ 26.297878] The buggy address is located 0 bytes to the right of
[ 26.297878] allocated 123-byte region [fff00000c5c7b240, fff00000c5c7b2bb)
[ 26.299619]
[ 26.299983] The buggy address belongs to the physical page:
[ 26.300616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c7b
[ 26.301462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.302471] page_type: f5(slab)
[ 26.302941] raw: 0bfffe0000000000 fff00000c565aa00 dead000000000122 0000000000000000
[ 26.303965] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[ 26.304727] page dumped because: kasan: bad access detected
[ 26.305424]
[ 26.305759] Memory state around the buggy address:
[ 26.306332] fff00000c5c7b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.307877] fff00000c5c7b200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[ 26.308737] >fff00000c5c7b280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[ 26.309690] ^
[ 26.310300] fff00000c5c7b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.311210] fff00000c5c7b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.311988] ==================================================================
Home
[ 26.228227] ==================================================================
[ 26.229554] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[ 26.230422] Read of size 1 at addr fff00000c66de001 by task kunit_try_catch/212
[ 26.232712]
[ 26.233112] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.233612] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.234036] Hardware name: linux,dummy-virt (DT)
[ 26.234527] Call trace:
[ 26.235053] show_stack+0x20/0x38 (C)
[ 26.235648] dump_stack_lvl+0x8c/0xd0
[ 26.236514] print_report+0x118/0x5e0
[ 26.237516] kasan_report+0xc8/0x118
[ 26.238157] __asan_report_load1_noabort+0x20/0x30
[ 26.238768] mempool_oob_right_helper+0x2ac/0x2f0
[ 26.239712] mempool_kmalloc_large_oob_right+0xbc/0x118
[ 26.240246] kunit_try_run_case+0x14c/0x3d0
[ 26.240935] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.242474] kthread+0x24c/0x2d0
[ 26.243487] ret_from_fork+0x10/0x20
[ 26.244501]
[ 26.244817] The buggy address belongs to the physical page:
[ 26.245428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc
[ 26.246184] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 26.247258] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 26.248018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 26.248691] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.249956] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 26.250860] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.251644] head: 0bfffe0000000002 ffffc1ffc319b701 ffffffffffffffff 0000000000000000
[ 26.252763] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 26.253620] page dumped because: kasan: bad access detected
[ 26.254264]
[ 26.254623] Memory state around the buggy address:
[ 26.255533] fff00000c66ddf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.256183] fff00000c66ddf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.256852] >fff00000c66de000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 26.257485] ^
[ 26.258333] fff00000c66de080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 26.260044] fff00000c66de100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 26.260764] ==================================================================
Home
[ 26.179022] ==================================================================
[ 26.180544] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[ 26.181394] Read of size 1 at addr fff00000c5d0c473 by task kunit_try_catch/210
[ 26.182178]
[ 26.182511] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.183615] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.184186] Hardware name: linux,dummy-virt (DT)
[ 26.184863] Call trace:
[ 26.185266] show_stack+0x20/0x38 (C)
[ 26.185806] dump_stack_lvl+0x8c/0xd0
[ 26.186404] print_report+0x118/0x5e0
[ 26.187253] kasan_report+0xc8/0x118
[ 26.187996] __asan_report_load1_noabort+0x20/0x30
[ 26.188572] mempool_oob_right_helper+0x2ac/0x2f0
[ 26.189242] mempool_kmalloc_oob_right+0xbc/0x118
[ 26.189821] kunit_try_run_case+0x14c/0x3d0
[ 26.190438] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.191472] kthread+0x24c/0x2d0
[ 26.192031] ret_from_fork+0x10/0x20
[ 26.192607]
[ 26.192963] Allocated by task 210:
[ 26.193419] kasan_save_stack+0x3c/0x68
[ 26.194017] kasan_save_track+0x20/0x40
[ 26.194500] kasan_save_alloc_info+0x40/0x58
[ 26.195246] __kasan_mempool_unpoison_object+0x11c/0x180
[ 26.196263] remove_element+0x130/0x1f8
[ 26.196841] mempool_alloc_preallocated+0x58/0xc0
[ 26.197642] mempool_oob_right_helper+0x98/0x2f0
[ 26.198245] mempool_kmalloc_oob_right+0xbc/0x118
[ 26.198710] kunit_try_run_case+0x14c/0x3d0
[ 26.199320] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.200275] kthread+0x24c/0x2d0
[ 26.200824] ret_from_fork+0x10/0x20
[ 26.201275]
[ 26.201639] The buggy address belongs to the object at fff00000c5d0c400
[ 26.201639] which belongs to the cache kmalloc-128 of size 128
[ 26.203414] The buggy address is located 0 bytes to the right of
[ 26.203414] allocated 115-byte region [fff00000c5d0c400, fff00000c5d0c473)
[ 26.204727]
[ 26.205046] The buggy address belongs to the physical page:
[ 26.205707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0c
[ 26.206694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.207832] page_type: f5(slab)
[ 26.208287] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 26.209223] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 26.209992] page dumped because: kasan: bad access detected
[ 26.210622]
[ 26.211395] Memory state around the buggy address:
[ 26.211974] fff00000c5d0c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.212719] fff00000c5d0c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.213451] >fff00000c5d0c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 26.214304] ^
[ 26.215633] fff00000c5d0c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.216514] fff00000c5d0c500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 26.217379] ==================================================================
Home
[ 31.041330] ==================================================================
[ 31.042426] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[ 31.043657] Write of size 121 at addr fff00000c5d54b00 by task kunit_try_catch/274
[ 31.044950]
[ 31.045458] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.046601] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.047319] Hardware name: linux,dummy-virt (DT)
[ 31.048095] Call trace:
[ 31.048639] show_stack+0x20/0x38 (C)
[ 31.049237] dump_stack_lvl+0x8c/0xd0
[ 31.050138] print_report+0x118/0x5e0
[ 31.050584] kasan_report+0xc8/0x118
[ 31.051265] kasan_check_range+0x100/0x1a8
[ 31.051992] __kasan_check_write+0x20/0x30
[ 31.052642] strncpy_from_user+0x3c/0x2a0
[ 31.053371] copy_user_test_oob+0x5c0/0xec0
[ 31.053963] kunit_try_run_case+0x14c/0x3d0
[ 31.054517] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.055512] kthread+0x24c/0x2d0
[ 31.056102] ret_from_fork+0x10/0x20
[ 31.056819]
[ 31.057311] Allocated by task 274:
[ 31.057773] kasan_save_stack+0x3c/0x68
[ 31.058536] kasan_save_track+0x20/0x40
[ 31.059205] kasan_save_alloc_info+0x40/0x58
[ 31.059782] __kasan_kmalloc+0xd4/0xd8
[ 31.060294] __kmalloc_noprof+0x188/0x4c8
[ 31.060835] kunit_kmalloc_array+0x34/0x88
[ 31.061375] copy_user_test_oob+0xac/0xec0
[ 31.062306] kunit_try_run_case+0x14c/0x3d0
[ 31.062979] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.063665] kthread+0x24c/0x2d0
[ 31.064344] ret_from_fork+0x10/0x20
[ 31.064984]
[ 31.065430] The buggy address belongs to the object at fff00000c5d54b00
[ 31.065430] which belongs to the cache kmalloc-128 of size 128
[ 31.066785] The buggy address is located 0 bytes inside of
[ 31.066785] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[ 31.068369]
[ 31.068681] The buggy address belongs to the physical page:
[ 31.069600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[ 31.070607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 31.071495] page_type: f5(slab)
[ 31.072146] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 31.073063] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 31.074033] page dumped because: kasan: bad access detected
[ 31.074815]
[ 31.075305] Memory state around the buggy address:
[ 31.075886] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 31.076624] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.077735] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 31.078639] ^
[ 31.079560] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.080499] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.081411] ==================================================================
Home
[ 31.083895] ==================================================================
[ 31.084646] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[ 31.085453] Write of size 1 at addr fff00000c5d54b78 by task kunit_try_catch/274
[ 31.086379]
[ 31.086787] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 31.087788] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 31.088492] Hardware name: linux,dummy-virt (DT)
[ 31.089153] Call trace:
[ 31.089674] show_stack+0x20/0x38 (C)
[ 31.090426] dump_stack_lvl+0x8c/0xd0
[ 31.090966] print_report+0x118/0x5e0
[ 31.091491] kasan_report+0xc8/0x118
[ 31.092133] __asan_report_store1_noabort+0x20/0x30
[ 31.092811] strncpy_from_user+0x270/0x2a0
[ 31.093472] copy_user_test_oob+0x5c0/0xec0
[ 31.094146] kunit_try_run_case+0x14c/0x3d0
[ 31.094818] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.095566] kthread+0x24c/0x2d0
[ 31.096157] ret_from_fork+0x10/0x20
[ 31.096713]
[ 31.097075] Allocated by task 274:
[ 31.097536] kasan_save_stack+0x3c/0x68
[ 31.098024] kasan_save_track+0x20/0x40
[ 31.098592] kasan_save_alloc_info+0x40/0x58
[ 31.099138] __kasan_kmalloc+0xd4/0xd8
[ 31.099702] __kmalloc_noprof+0x188/0x4c8
[ 31.100289] kunit_kmalloc_array+0x34/0x88
[ 31.100866] copy_user_test_oob+0xac/0xec0
[ 31.101358] kunit_try_run_case+0x14c/0x3d0
[ 31.101949] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 31.102617] kthread+0x24c/0x2d0
[ 31.103134] ret_from_fork+0x10/0x20
[ 31.103607]
[ 31.103961] The buggy address belongs to the object at fff00000c5d54b00
[ 31.103961] which belongs to the cache kmalloc-128 of size 128
[ 31.105126] The buggy address is located 0 bytes to the right of
[ 31.105126] allocated 120-byte region [fff00000c5d54b00, fff00000c5d54b78)
[ 31.106415]
[ 31.106776] The buggy address belongs to the physical page:
[ 31.107396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d54
[ 31.108298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 31.109100] page_type: f5(slab)
[ 31.109588] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 31.110401] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 31.111202] page dumped because: kasan: bad access detected
[ 31.111908]
[ 31.112249] Memory state around the buggy address:
[ 31.112867] fff00000c5d54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 31.113736] fff00000c5d54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.114480] >fff00000c5d54b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 31.115363] ^
[ 31.116320] fff00000c5d54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.117183] fff00000c5d54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 31.117949] ==================================================================
Home
[ 27.174205] ==================================================================
[ 27.174928] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8
[ 27.176602] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[ 27.177603]
[ 27.177946] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.179288] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.180029] Hardware name: linux,dummy-virt (DT)
[ 27.180606] Call trace:
[ 27.181047] show_stack+0x20/0x38 (C)
[ 27.181597] dump_stack_lvl+0x8c/0xd0
[ 27.182238] print_report+0x118/0x5e0
[ 27.182833] kasan_report+0xc8/0x118
[ 27.183533] __asan_report_load1_noabort+0x20/0x30
[ 27.184271] kasan_strings+0x858/0x8f8
[ 27.184893] kunit_try_run_case+0x14c/0x3d0
[ 27.185340] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.186006] kthread+0x24c/0x2d0
[ 27.186474] ret_from_fork+0x10/0x20
[ 27.187029]
[ 27.187301] Allocated by task 248:
[ 27.187879] kasan_save_stack+0x3c/0x68
[ 27.188558] kasan_save_track+0x20/0x40
[ 27.189114] kasan_save_alloc_info+0x40/0x58
[ 27.189722] __kasan_kmalloc+0xd4/0xd8
[ 27.190393] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.191091] kasan_strings+0xb4/0x8f8
[ 27.191566] kunit_try_run_case+0x14c/0x3d0
[ 27.192282] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.193020] kthread+0x24c/0x2d0
[ 27.193539] ret_from_fork+0x10/0x20
[ 27.194059]
[ 27.194433] Freed by task 248:
[ 27.194954] kasan_save_stack+0x3c/0x68
[ 27.195478] kasan_save_track+0x20/0x40
[ 27.196112] kasan_save_free_info+0x4c/0x78
[ 27.196734] __kasan_slab_free+0x6c/0x98
[ 27.197345] kfree+0x114/0x3c8
[ 27.197913] kasan_strings+0x128/0x8f8
[ 27.198474] kunit_try_run_case+0x14c/0x3d0
[ 27.199006] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.199828] kthread+0x24c/0x2d0
[ 27.200405] ret_from_fork+0x10/0x20
[ 27.200977]
[ 27.201324] The buggy address belongs to the object at fff00000c5d0e240
[ 27.201324] which belongs to the cache kmalloc-32 of size 32
[ 27.202756] The buggy address is located 16 bytes inside of
[ 27.202756] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[ 27.204050]
[ 27.204409] The buggy address belongs to the physical page:
[ 27.205089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[ 27.206014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.206815] page_type: f5(slab)
[ 27.207348] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 27.208269] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 27.209104] page dumped because: kasan: bad access detected
[ 27.209777]
[ 27.210107] Memory state around the buggy address:
[ 27.210765] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.211645] fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.212564] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.213394] ^
[ 27.214053] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.215236] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.215935] ==================================================================
Home
[ 24.643144] ==================================================================
[ 24.644515] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[ 24.645474] Read of size 1 at addr fff00000c63157c0 by task kunit_try_catch/181
[ 24.646382]
[ 24.646771] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.648137] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.648566] Hardware name: linux,dummy-virt (DT)
[ 24.649050] Call trace:
[ 24.649343] show_stack+0x20/0x38 (C)
[ 24.649815] dump_stack_lvl+0x8c/0xd0
[ 24.650868] print_report+0x118/0x5e0
[ 24.651583] kasan_report+0xc8/0x118
[ 24.652449] __kasan_check_byte+0x54/0x70
[ 24.653163] kfree_sensitive+0x30/0xb0
[ 24.653675] kmalloc_double_kzfree+0x168/0x308
[ 24.654235] kunit_try_run_case+0x14c/0x3d0
[ 24.654828] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.656121] kthread+0x24c/0x2d0
[ 24.656763] ret_from_fork+0x10/0x20
[ 24.657256]
[ 24.657541] Allocated by task 181:
[ 24.658014] kasan_save_stack+0x3c/0x68
[ 24.658502] kasan_save_track+0x20/0x40
[ 24.659068] kasan_save_alloc_info+0x40/0x58
[ 24.659592] __kasan_kmalloc+0xd4/0xd8
[ 24.660344] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.661280] kmalloc_double_kzfree+0xb8/0x308
[ 24.661982] kunit_try_run_case+0x14c/0x3d0
[ 24.662651] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.663659] kthread+0x24c/0x2d0
[ 24.664444] ret_from_fork+0x10/0x20
[ 24.665247]
[ 24.665555] Freed by task 181:
[ 24.666004] kasan_save_stack+0x3c/0x68
[ 24.666494] kasan_save_track+0x20/0x40
[ 24.667331] kasan_save_free_info+0x4c/0x78
[ 24.668120] __kasan_slab_free+0x6c/0x98
[ 24.668866] kfree+0x114/0x3c8
[ 24.669442] kfree_sensitive+0x80/0xb0
[ 24.670119] kmalloc_double_kzfree+0x11c/0x308
[ 24.670819] kunit_try_run_case+0x14c/0x3d0
[ 24.671469] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.672269] kthread+0x24c/0x2d0
[ 24.672910] ret_from_fork+0x10/0x20
[ 24.673503]
[ 24.673944] The buggy address belongs to the object at fff00000c63157c0
[ 24.673944] which belongs to the cache kmalloc-16 of size 16
[ 24.675421] The buggy address is located 0 bytes inside of
[ 24.675421] freed 16-byte region [fff00000c63157c0, fff00000c63157d0)
[ 24.676958]
[ 24.677346] The buggy address belongs to the physical page:
[ 24.678155] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106315
[ 24.679294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.680007] page_type: f5(slab)
[ 24.680432] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 24.681268] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 24.682275] page dumped because: kasan: bad access detected
[ 24.683000]
[ 24.683682] Memory state around the buggy address:
[ 24.684248] fff00000c6315680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 24.685016] fff00000c6315700: fa fb fc fc fa fb fc fc 00 05 fc fc 00 05 fc fc
[ 24.685713] >fff00000c6315780: 00 00 fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 24.686401] ^
[ 24.687091] fff00000c6315800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.688061] fff00000c6315880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.689004] ==================================================================
Home
[ 24.075771] ==================================================================
[ 24.076980] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[ 24.077809] Read of size 16 at addr fff00000c5b73320 by task kunit_try_catch/157
[ 24.078658]
[ 24.079146] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.080216] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.080897] Hardware name: linux,dummy-virt (DT)
[ 24.081605] Call trace:
[ 24.081941] show_stack+0x20/0x38 (C)
[ 24.082599] dump_stack_lvl+0x8c/0xd0
[ 24.083466] print_report+0x118/0x5e0
[ 24.083932] kasan_report+0xc8/0x118
[ 24.085207] __asan_report_load16_noabort+0x20/0x30
[ 24.086085] kmalloc_uaf_16+0x3bc/0x438
[ 24.086651] kunit_try_run_case+0x14c/0x3d0
[ 24.087647] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.088398] kthread+0x24c/0x2d0
[ 24.088927] ret_from_fork+0x10/0x20
[ 24.089502]
[ 24.089841] Allocated by task 157:
[ 24.090314] kasan_save_stack+0x3c/0x68
[ 24.091797] kasan_save_track+0x20/0x40
[ 24.092198] kasan_save_alloc_info+0x40/0x58
[ 24.092923] __kasan_kmalloc+0xd4/0xd8
[ 24.093476] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.094114] kmalloc_uaf_16+0x140/0x438
[ 24.094679] kunit_try_run_case+0x14c/0x3d0
[ 24.096053] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.096798] kthread+0x24c/0x2d0
[ 24.097273] ret_from_fork+0x10/0x20
[ 24.097887]
[ 24.098234] Freed by task 157:
[ 24.098654] kasan_save_stack+0x3c/0x68
[ 24.100060] kasan_save_track+0x20/0x40
[ 24.100637] kasan_save_free_info+0x4c/0x78
[ 24.101268] __kasan_slab_free+0x6c/0x98
[ 24.101908] kfree+0x114/0x3c8
[ 24.102397] kmalloc_uaf_16+0x190/0x438
[ 24.103377] kunit_try_run_case+0x14c/0x3d0
[ 24.103952] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.104687] kthread+0x24c/0x2d0
[ 24.105253] ret_from_fork+0x10/0x20
[ 24.105874]
[ 24.106208] The buggy address belongs to the object at fff00000c5b73320
[ 24.106208] which belongs to the cache kmalloc-16 of size 16
[ 24.108219] The buggy address is located 0 bytes inside of
[ 24.108219] freed 16-byte region [fff00000c5b73320, fff00000c5b73330)
[ 24.109556]
[ 24.109946] The buggy address belongs to the physical page:
[ 24.110610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 24.111729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.112831] page_type: f5(slab)
[ 24.113334] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 24.114196] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 24.115217] page dumped because: kasan: bad access detected
[ 24.116168]
[ 24.116415] Memory state around the buggy address:
[ 24.117071] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 24.118041] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 24.118840] >fff00000c5b73300: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 24.119980] ^
[ 24.120661] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.121641] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.122510] ==================================================================
Home
[ 24.473275] ==================================================================
[ 24.474279] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[ 24.475582] Read of size 1 at addr fff00000c5b73348 by task kunit_try_catch/173
[ 24.476261]
[ 24.476629] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.477775] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.478296] Hardware name: linux,dummy-virt (DT)
[ 24.478838] Call trace:
[ 24.479291] show_stack+0x20/0x38 (C)
[ 24.480090] dump_stack_lvl+0x8c/0xd0
[ 24.480736] print_report+0x118/0x5e0
[ 24.481365] kasan_report+0xc8/0x118
[ 24.481938] __asan_report_load1_noabort+0x20/0x30
[ 24.482570] kmalloc_uaf+0x300/0x338
[ 24.483354] kunit_try_run_case+0x14c/0x3d0
[ 24.483956] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.484677] kthread+0x24c/0x2d0
[ 24.485362] ret_from_fork+0x10/0x20
[ 24.485944]
[ 24.486247] Allocated by task 173:
[ 24.486723] kasan_save_stack+0x3c/0x68
[ 24.487803] kasan_save_track+0x20/0x40
[ 24.488304] kasan_save_alloc_info+0x40/0x58
[ 24.488785] __kasan_kmalloc+0xd4/0xd8
[ 24.489256] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.489835] kmalloc_uaf+0xb8/0x338
[ 24.490321] kunit_try_run_case+0x14c/0x3d0
[ 24.490997] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.492123] kthread+0x24c/0x2d0
[ 24.492572] ret_from_fork+0x10/0x20
[ 24.493075]
[ 24.493377] Freed by task 173:
[ 24.493868] kasan_save_stack+0x3c/0x68
[ 24.494464] kasan_save_track+0x20/0x40
[ 24.495309] kasan_save_free_info+0x4c/0x78
[ 24.495887] __kasan_slab_free+0x6c/0x98
[ 24.496305] kfree+0x114/0x3c8
[ 24.496652] kmalloc_uaf+0x11c/0x338
[ 24.497679] kunit_try_run_case+0x14c/0x3d0
[ 24.498610] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.499439] kthread+0x24c/0x2d0
[ 24.500127] ret_from_fork+0x10/0x20
[ 24.500678]
[ 24.501034] The buggy address belongs to the object at fff00000c5b73340
[ 24.501034] which belongs to the cache kmalloc-16 of size 16
[ 24.502276] The buggy address is located 8 bytes inside of
[ 24.502276] freed 16-byte region [fff00000c5b73340, fff00000c5b73350)
[ 24.503598]
[ 24.503862] The buggy address belongs to the physical page:
[ 24.505067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b73
[ 24.505879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.506695] page_type: f5(slab)
[ 24.507351] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 24.508293] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 24.508630] page dumped because: kasan: bad access detected
[ 24.508914]
[ 24.509044] Memory state around the buggy address:
[ 24.509283] fff00000c5b73200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 24.509597] fff00000c5b73280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 24.510287] >fff00000c5b73300: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 24.510954] ^
[ 24.511683] fff00000c5b73380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.513083] fff00000c5b73400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.514078] ==================================================================
Home
[ 24.581253] ==================================================================
[ 24.582224] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[ 24.583185] Read of size 1 at addr fff00000c5ca6e28 by task kunit_try_catch/177
[ 24.584325]
[ 24.584649] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.585622] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.587546] Hardware name: linux,dummy-virt (DT)
[ 24.588069] Call trace:
[ 24.588594] show_stack+0x20/0x38 (C)
[ 24.589301] dump_stack_lvl+0x8c/0xd0
[ 24.589998] print_report+0x118/0x5e0
[ 24.590664] kasan_report+0xc8/0x118
[ 24.591646] __asan_report_load1_noabort+0x20/0x30
[ 24.592184] kmalloc_uaf2+0x3f4/0x468
[ 24.592850] kunit_try_run_case+0x14c/0x3d0
[ 24.593437] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.594320] kthread+0x24c/0x2d0
[ 24.594986] ret_from_fork+0x10/0x20
[ 24.595698]
[ 24.596280] Allocated by task 177:
[ 24.596724] kasan_save_stack+0x3c/0x68
[ 24.597527] kasan_save_track+0x20/0x40
[ 24.598077] kasan_save_alloc_info+0x40/0x58
[ 24.598861] __kasan_kmalloc+0xd4/0xd8
[ 24.599559] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.600849] kmalloc_uaf2+0xc4/0x468
[ 24.601490] kunit_try_run_case+0x14c/0x3d0
[ 24.602214] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.602889] kthread+0x24c/0x2d0
[ 24.603781] ret_from_fork+0x10/0x20
[ 24.604455]
[ 24.604930] Freed by task 177:
[ 24.605448] kasan_save_stack+0x3c/0x68
[ 24.606013] kasan_save_track+0x20/0x40
[ 24.606755] kasan_save_free_info+0x4c/0x78
[ 24.607478] __kasan_slab_free+0x6c/0x98
[ 24.608288] kfree+0x114/0x3c8
[ 24.608919] kmalloc_uaf2+0x134/0x468
[ 24.609572] kunit_try_run_case+0x14c/0x3d0
[ 24.610150] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.611003] kthread+0x24c/0x2d0
[ 24.611758] ret_from_fork+0x10/0x20
[ 24.612429]
[ 24.612959] The buggy address belongs to the object at fff00000c5ca6e00
[ 24.612959] which belongs to the cache kmalloc-64 of size 64
[ 24.614391] The buggy address is located 40 bytes inside of
[ 24.614391] freed 64-byte region [fff00000c5ca6e00, fff00000c5ca6e40)
[ 24.615901]
[ 24.616045] The buggy address belongs to the physical page:
[ 24.616306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca6
[ 24.616663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.617006] page_type: f5(slab)
[ 24.617213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 24.617555] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 24.619142] page dumped because: kasan: bad access detected
[ 24.619736]
[ 24.620497] Memory state around the buggy address:
[ 24.621483] fff00000c5ca6d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 24.622387] fff00000c5ca6d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 24.623735] >fff00000c5ca6e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 24.624508] ^
[ 24.625134] fff00000c5ca6e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[ 24.625998] fff00000c5ca6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.626856] ==================================================================
Home
[ 24.524416] ==================================================================
[ 24.525443] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[ 24.526186] Write of size 33 at addr fff00000c5ca6d00 by task kunit_try_catch/175
[ 24.526826]
[ 24.528163] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.529533] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.529993] Hardware name: linux,dummy-virt (DT)
[ 24.530830] Call trace:
[ 24.531399] show_stack+0x20/0x38 (C)
[ 24.532175] dump_stack_lvl+0x8c/0xd0
[ 24.532842] print_report+0x118/0x5e0
[ 24.533500] kasan_report+0xc8/0x118
[ 24.534144] kasan_check_range+0x100/0x1a8
[ 24.534735] __asan_memset+0x34/0x78
[ 24.535632] kmalloc_uaf_memset+0x170/0x310
[ 24.536353] kunit_try_run_case+0x14c/0x3d0
[ 24.537082] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.537760] kthread+0x24c/0x2d0
[ 24.538441] ret_from_fork+0x10/0x20
[ 24.539432]
[ 24.539658] Allocated by task 175:
[ 24.540081] kasan_save_stack+0x3c/0x68
[ 24.540619] kasan_save_track+0x20/0x40
[ 24.541154] kasan_save_alloc_info+0x40/0x58
[ 24.541703] __kasan_kmalloc+0xd4/0xd8
[ 24.542794] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.543649] kmalloc_uaf_memset+0xb8/0x310
[ 24.544331] kunit_try_run_case+0x14c/0x3d0
[ 24.545019] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.545821] kthread+0x24c/0x2d0
[ 24.546425] ret_from_fork+0x10/0x20
[ 24.547287]
[ 24.547493] Freed by task 175:
[ 24.547810] kasan_save_stack+0x3c/0x68
[ 24.548210] kasan_save_track+0x20/0x40
[ 24.548610] kasan_save_free_info+0x4c/0x78
[ 24.550343] __kasan_slab_free+0x6c/0x98
[ 24.551224] kfree+0x114/0x3c8
[ 24.551581] kmalloc_uaf_memset+0x11c/0x310
[ 24.552030] kunit_try_run_case+0x14c/0x3d0
[ 24.552473] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.553818] kthread+0x24c/0x2d0
[ 24.554474] ret_from_fork+0x10/0x20
[ 24.555481]
[ 24.555825] The buggy address belongs to the object at fff00000c5ca6d00
[ 24.555825] which belongs to the cache kmalloc-64 of size 64
[ 24.556967] The buggy address is located 0 bytes inside of
[ 24.556967] freed 64-byte region [fff00000c5ca6d00, fff00000c5ca6d40)
[ 24.558632]
[ 24.559290] The buggy address belongs to the physical page:
[ 24.559843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ca6
[ 24.560562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.561200] page_type: f5(slab)
[ 24.561562] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 24.563534] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 24.564352] page dumped because: kasan: bad access detected
[ 24.565208]
[ 24.565436] Memory state around the buggy address:
[ 24.566357] fff00000c5ca6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 24.567992] fff00000c5ca6c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 24.568639] >fff00000c5ca6d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 24.569877] ^
[ 24.570489] fff00000c5ca6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.571628] fff00000c5ca6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.572537] ==================================================================
Home
[ 25.569579] ==================================================================
[ 25.570170] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[ 25.570526] Read of size 1 at addr fff00000c565a8c0 by task kunit_try_catch/204
[ 25.571361]
[ 25.571718] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 25.572635] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.573114] Hardware name: linux,dummy-virt (DT)
[ 25.574046] Call trace:
[ 25.574643] show_stack+0x20/0x38 (C)
[ 25.575885] dump_stack_lvl+0x8c/0xd0
[ 25.576467] print_report+0x118/0x5e0
[ 25.577178] kasan_report+0xc8/0x118
[ 25.577926] __kasan_check_byte+0x54/0x70
[ 25.578587] kmem_cache_destroy+0x34/0x218
[ 25.578975] kmem_cache_double_destroy+0x17c/0x2f8
[ 25.579948] kunit_try_run_case+0x14c/0x3d0
[ 25.580668] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.581489] kthread+0x24c/0x2d0
[ 25.582163] ret_from_fork+0x10/0x20
[ 25.582854]
[ 25.583384] Allocated by task 204:
[ 25.583938] kasan_save_stack+0x3c/0x68
[ 25.584178] kasan_save_track+0x20/0x40
[ 25.584400] kasan_save_alloc_info+0x40/0x58
[ 25.584631] __kasan_slab_alloc+0xa8/0xb0
[ 25.584878] kmem_cache_alloc_noprof+0x108/0x398
[ 25.585130] __kmem_cache_create_args+0x18c/0x2b0
[ 25.585373] kmem_cache_double_destroy+0xc8/0x2f8
[ 25.585612] kunit_try_run_case+0x14c/0x3d0
[ 25.586293] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.587329] kthread+0x24c/0x2d0
[ 25.588387] ret_from_fork+0x10/0x20
[ 25.588970]
[ 25.589356] Freed by task 204:
[ 25.589951] kasan_save_stack+0x3c/0x68
[ 25.590714] kasan_save_track+0x20/0x40
[ 25.591789] kasan_save_free_info+0x4c/0x78
[ 25.592374] __kasan_slab_free+0x6c/0x98
[ 25.593001] kmem_cache_free+0x118/0x470
[ 25.593594] slab_kmem_cache_release+0x38/0x50
[ 25.594271] kmem_cache_release+0x1c/0x30
[ 25.594870] kobject_put+0x17c/0x430
[ 25.595562] sysfs_slab_release+0x1c/0x30
[ 25.596129] kmem_cache_destroy+0x118/0x218
[ 25.596644] kmem_cache_double_destroy+0x130/0x2f8
[ 25.597300] kunit_try_run_case+0x14c/0x3d0
[ 25.597898] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.598600] kthread+0x24c/0x2d0
[ 25.599219] ret_from_fork+0x10/0x20
[ 25.599987]
[ 25.600410] The buggy address belongs to the object at fff00000c565a8c0
[ 25.600410] which belongs to the cache kmem_cache of size 208
[ 25.601720] The buggy address is located 0 bytes inside of
[ 25.601720] freed 208-byte region [fff00000c565a8c0, fff00000c565a990)
[ 25.603064]
[ 25.603677] The buggy address belongs to the physical page:
[ 25.604341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10565a
[ 25.605299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 25.606117] page_type: f5(slab)
[ 25.606641] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[ 25.607832] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[ 25.608521] page dumped because: kasan: bad access detected
[ 25.609017]
[ 25.609234] Memory state around the buggy address:
[ 25.609705] fff00000c565a780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.610992] fff00000c565a800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 25.611832] >fff00000c565a880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 25.613202] ^
[ 25.614090] fff00000c565a900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.614998] fff00000c565a980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.616136] ==================================================================
Home
[ 25.475931] ==================================================================
[ 25.476854] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[ 25.477688] Read of size 1 at addr fff00000c5d09000 by task kunit_try_catch/202
[ 25.478418]
[ 25.478805] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 25.480327] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.481278] Hardware name: linux,dummy-virt (DT)
[ 25.481888] Call trace:
[ 25.482262] show_stack+0x20/0x38 (C)
[ 25.482807] dump_stack_lvl+0x8c/0xd0
[ 25.483528] print_report+0x118/0x5e0
[ 25.484102] kasan_report+0xc8/0x118
[ 25.484674] __asan_report_load1_noabort+0x20/0x30
[ 25.485513] kmem_cache_rcu_uaf+0x390/0x468
[ 25.486133] kunit_try_run_case+0x14c/0x3d0
[ 25.486774] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.487666] kthread+0x24c/0x2d0
[ 25.488086] ret_from_fork+0x10/0x20
[ 25.488902]
[ 25.489316] Allocated by task 202:
[ 25.489831] kasan_save_stack+0x3c/0x68
[ 25.490421] kasan_save_track+0x20/0x40
[ 25.491106] kasan_save_alloc_info+0x40/0x58
[ 25.491666] __kasan_slab_alloc+0xa8/0xb0
[ 25.492551] kmem_cache_alloc_noprof+0x108/0x398
[ 25.493112] kmem_cache_rcu_uaf+0x12c/0x468
[ 25.493621] kunit_try_run_case+0x14c/0x3d0
[ 25.494144] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.495480] kthread+0x24c/0x2d0
[ 25.496063] ret_from_fork+0x10/0x20
[ 25.496357]
[ 25.496492] Freed by task 0:
[ 25.496681] kasan_save_stack+0x3c/0x68
[ 25.497074] kasan_save_track+0x20/0x40
[ 25.497470] kasan_save_free_info+0x4c/0x78
[ 25.499099] __kasan_slab_free+0x6c/0x98
[ 25.499862] slab_free_after_rcu_debug+0xd4/0x2f8
[ 25.500692] rcu_core+0x9f4/0x1e20
[ 25.501401] rcu_core_si+0x18/0x30
[ 25.502050] handle_softirqs+0x374/0xb20
[ 25.502772] __do_softirq+0x1c/0x28
[ 25.504099]
[ 25.504607] Last potentially related work creation:
[ 25.505307] kasan_save_stack+0x3c/0x68
[ 25.505972] __kasan_record_aux_stack+0xbc/0xe8
[ 25.506692] kasan_record_aux_stack_noalloc+0x14/0x20
[ 25.507698] kmem_cache_free+0x28c/0x470
[ 25.509046] kmem_cache_rcu_uaf+0x16c/0x468
[ 25.509528] kunit_try_run_case+0x14c/0x3d0
[ 25.509977] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.510491] kthread+0x24c/0x2d0
[ 25.512214] ret_from_fork+0x10/0x20
[ 25.512589]
[ 25.513093] The buggy address belongs to the object at fff00000c5d09000
[ 25.513093] which belongs to the cache test_cache of size 200
[ 25.513898] The buggy address is located 0 bytes inside of
[ 25.513898] freed 200-byte region [fff00000c5d09000, fff00000c5d090c8)
[ 25.514389]
[ 25.514525] The buggy address belongs to the physical page:
[ 25.516034] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d09
[ 25.517042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 25.517902] page_type: f5(slab)
[ 25.518529] raw: 0bfffe0000000000 fff00000c5d07000 dead000000000122 0000000000000000
[ 25.520365] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[ 25.521066] page dumped because: kasan: bad access detected
[ 25.521887]
[ 25.522362] Memory state around the buggy address:
[ 25.523078] fff00000c5d08f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.524013] fff00000c5d08f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.524769] >fff00000c5d09000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.525464] ^
[ 25.526626] fff00000c5d09080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 25.528381] fff00000c5d09100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.529079] ==================================================================
Home
[ 23.965007] ==================================================================
[ 23.965810] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[ 23.966695] Read of size 1 at addr fff00000c6364c00 by task kunit_try_catch/153
[ 23.967724]
[ 23.968144] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.969479] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.970159] Hardware name: linux,dummy-virt (DT)
[ 23.970887] Call trace:
[ 23.971537] show_stack+0x20/0x38 (C)
[ 23.972236] dump_stack_lvl+0x8c/0xd0
[ 23.972936] print_report+0x118/0x5e0
[ 23.973480] kasan_report+0xc8/0x118
[ 23.974191] __asan_report_load1_noabort+0x20/0x30
[ 23.975044] krealloc_uaf+0x4c8/0x520
[ 23.975809] kunit_try_run_case+0x14c/0x3d0
[ 23.976415] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.977077] kthread+0x24c/0x2d0
[ 23.977536] ret_from_fork+0x10/0x20
[ 23.978442]
[ 23.978993] Allocated by task 153:
[ 23.979829] kasan_save_stack+0x3c/0x68
[ 23.980507] kasan_save_track+0x20/0x40
[ 23.981159] kasan_save_alloc_info+0x40/0x58
[ 23.981876] __kasan_kmalloc+0xd4/0xd8
[ 23.982520] __kmalloc_cache_noprof+0x15c/0x3c0
[ 23.983585] krealloc_uaf+0xc8/0x520
[ 23.984282] kunit_try_run_case+0x14c/0x3d0
[ 23.984895] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.985569] kthread+0x24c/0x2d0
[ 23.986036] ret_from_fork+0x10/0x20
[ 23.986594]
[ 23.986985] Freed by task 153:
[ 23.987406] kasan_save_stack+0x3c/0x68
[ 23.988623] kasan_save_track+0x20/0x40
[ 23.989336] kasan_save_free_info+0x4c/0x78
[ 23.989799] __kasan_slab_free+0x6c/0x98
[ 23.990700] kfree+0x114/0x3c8
[ 23.991435] krealloc_uaf+0x12c/0x520
[ 23.992426] kunit_try_run_case+0x14c/0x3d0
[ 23.992954] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.993616] kthread+0x24c/0x2d0
[ 23.994100] ret_from_fork+0x10/0x20
[ 23.994563]
[ 23.994913] The buggy address belongs to the object at fff00000c6364c00
[ 23.994913] which belongs to the cache kmalloc-256 of size 256
[ 23.996268] The buggy address is located 0 bytes inside of
[ 23.996268] freed 256-byte region [fff00000c6364c00, fff00000c6364d00)
[ 23.997476]
[ 23.997915] The buggy address belongs to the physical page:
[ 23.998598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[ 23.999935] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 24.000872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 24.001737] page_type: f5(slab)
[ 24.002255] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 24.003325] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.004240] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 24.005103] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.005984] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[ 24.006877] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 24.008700] page dumped because: kasan: bad access detected
[ 24.009507]
[ 24.009726] Memory state around the buggy address:
[ 24.010495] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.011525] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.012190] >fff00000c6364c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.013334] ^
[ 24.014157] fff00000c6364c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.014974] fff00000c6364d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.015998] ==================================================================
Home
[ 23.910637] ==================================================================
[ 23.911904] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[ 23.912639] Read of size 1 at addr fff00000c6364c00 by task kunit_try_catch/153
[ 23.913982]
[ 23.914457] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.916186] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.916838] Hardware name: linux,dummy-virt (DT)
[ 23.917523] Call trace:
[ 23.917986] show_stack+0x20/0x38 (C)
[ 23.918630] dump_stack_lvl+0x8c/0xd0
[ 23.919458] print_report+0x118/0x5e0
[ 23.920226] kasan_report+0xc8/0x118
[ 23.920778] __kasan_check_byte+0x54/0x70
[ 23.921318] krealloc_noprof+0x44/0x360
[ 23.922182] krealloc_uaf+0x180/0x520
[ 23.922942] kunit_try_run_case+0x14c/0x3d0
[ 23.923445] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.924125] kthread+0x24c/0x2d0
[ 23.924583] ret_from_fork+0x10/0x20
[ 23.925672]
[ 23.925997] Allocated by task 153:
[ 23.926465] kasan_save_stack+0x3c/0x68
[ 23.926996] kasan_save_track+0x20/0x40
[ 23.927506] kasan_save_alloc_info+0x40/0x58
[ 23.929050] __kasan_kmalloc+0xd4/0xd8
[ 23.929585] __kmalloc_cache_noprof+0x15c/0x3c0
[ 23.930191] krealloc_uaf+0xc8/0x520
[ 23.930637] kunit_try_run_case+0x14c/0x3d0
[ 23.931311] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.932612] kthread+0x24c/0x2d0
[ 23.933007] ret_from_fork+0x10/0x20
[ 23.933465]
[ 23.933821] Freed by task 153:
[ 23.934239] kasan_save_stack+0x3c/0x68
[ 23.934713] kasan_save_track+0x20/0x40
[ 23.935797] kasan_save_free_info+0x4c/0x78
[ 23.936406] __kasan_slab_free+0x6c/0x98
[ 23.937117] kfree+0x114/0x3c8
[ 23.937724] krealloc_uaf+0x12c/0x520
[ 23.938397] kunit_try_run_case+0x14c/0x3d0
[ 23.939339] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.940113] kthread+0x24c/0x2d0
[ 23.940691] ret_from_fork+0x10/0x20
[ 23.941379]
[ 23.941792] The buggy address belongs to the object at fff00000c6364c00
[ 23.941792] which belongs to the cache kmalloc-256 of size 256
[ 23.943503] The buggy address is located 0 bytes inside of
[ 23.943503] freed 256-byte region [fff00000c6364c00, fff00000c6364d00)
[ 23.944957]
[ 23.945393] The buggy address belongs to the physical page:
[ 23.946169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106364
[ 23.947381] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 23.948196] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 23.949280] page_type: f5(slab)
[ 23.949622] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.950049] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.950463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 23.952219] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 23.953337] head: 0bfffe0000000001 ffffc1ffc318d901 ffffffffffffffff 0000000000000000
[ 23.954293] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 23.955085] page dumped because: kasan: bad access detected
[ 23.955669]
[ 23.956352] Memory state around the buggy address:
[ 23.957027] fff00000c6364b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.958119] fff00000c6364b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.959210] >fff00000c6364c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 23.960146] ^
[ 23.960352] fff00000c6364c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 23.960668] fff00000c6364d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.961684] ==================================================================
Home
[ 24.988172] ==================================================================
[ 24.988905] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[ 24.989713] Read of size 1 at addr fff00000c5cd6678 by task kunit_try_catch/185
[ 24.990781]
[ 24.991636] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.993275] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.993817] Hardware name: linux,dummy-virt (DT)
[ 24.994430] Call trace:
[ 24.994911] show_stack+0x20/0x38 (C)
[ 24.995490] dump_stack_lvl+0x8c/0xd0
[ 24.996485] print_report+0x118/0x5e0
[ 24.997084] kasan_report+0xc8/0x118
[ 24.997644] __asan_report_load1_noabort+0x20/0x30
[ 24.998265] ksize_uaf+0x548/0x600
[ 24.998846] kunit_try_run_case+0x14c/0x3d0
[ 24.999699] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.000409] kthread+0x24c/0x2d0
[ 25.001382] ret_from_fork+0x10/0x20
[ 25.001975]
[ 25.002274] Allocated by task 185:
[ 25.002692] kasan_save_stack+0x3c/0x68
[ 25.003725] kasan_save_track+0x20/0x40
[ 25.004325] kasan_save_alloc_info+0x40/0x58
[ 25.004873] __kasan_kmalloc+0xd4/0xd8
[ 25.005374] __kmalloc_cache_noprof+0x15c/0x3c0
[ 25.006029] ksize_uaf+0xb8/0x600
[ 25.006621] kunit_try_run_case+0x14c/0x3d0
[ 25.008157] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.008909] kthread+0x24c/0x2d0
[ 25.009331] ret_from_fork+0x10/0x20
[ 25.010283]
[ 25.010500] Freed by task 185:
[ 25.011140] kasan_save_stack+0x3c/0x68
[ 25.012148] kasan_save_track+0x20/0x40
[ 25.012876] kasan_save_free_info+0x4c/0x78
[ 25.013604] __kasan_slab_free+0x6c/0x98
[ 25.014279] kfree+0x114/0x3c8
[ 25.014944] ksize_uaf+0x11c/0x600
[ 25.016035] kunit_try_run_case+0x14c/0x3d0
[ 25.016537] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.017501] kthread+0x24c/0x2d0
[ 25.018322] ret_from_fork+0x10/0x20
[ 25.019565]
[ 25.019920] The buggy address belongs to the object at fff00000c5cd6600
[ 25.019920] which belongs to the cache kmalloc-128 of size 128
[ 25.021041] The buggy address is located 120 bytes inside of
[ 25.021041] freed 128-byte region [fff00000c5cd6600, fff00000c5cd6680)
[ 25.022700]
[ 25.023777] The buggy address belongs to the physical page:
[ 25.024397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[ 25.025240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 25.026578] page_type: f5(slab)
[ 25.027625] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 25.028372] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 25.029346] page dumped because: kasan: bad access detected
[ 25.030140]
[ 25.030599] Memory state around the buggy address:
[ 25.032036] fff00000c5cd6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.032916] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.033674] >fff00000c5cd6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.034422] ^
[ 25.035615] fff00000c5cd6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.036295] fff00000c5cd6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.037117] ==================================================================
Home
[ 24.937564] ==================================================================
[ 24.938240] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[ 24.939229] Read of size 1 at addr fff00000c5cd6600 by task kunit_try_catch/185
[ 24.940581]
[ 24.940924] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.942052] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.942883] Hardware name: linux,dummy-virt (DT)
[ 24.944284] Call trace:
[ 24.944572] show_stack+0x20/0x38 (C)
[ 24.945261] dump_stack_lvl+0x8c/0xd0
[ 24.945996] print_report+0x118/0x5e0
[ 24.946665] kasan_report+0xc8/0x118
[ 24.947353] __asan_report_load1_noabort+0x20/0x30
[ 24.947993] ksize_uaf+0x59c/0x600
[ 24.948500] kunit_try_run_case+0x14c/0x3d0
[ 24.949206] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.950332] kthread+0x24c/0x2d0
[ 24.951067] ret_from_fork+0x10/0x20
[ 24.951564]
[ 24.952203] Allocated by task 185:
[ 24.953717] kasan_save_stack+0x3c/0x68
[ 24.954231] kasan_save_track+0x20/0x40
[ 24.954658] kasan_save_alloc_info+0x40/0x58
[ 24.955053] __kasan_kmalloc+0xd4/0xd8
[ 24.955991] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.956654] ksize_uaf+0xb8/0x600
[ 24.957123] kunit_try_run_case+0x14c/0x3d0
[ 24.957635] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.958396] kthread+0x24c/0x2d0
[ 24.959078] ret_from_fork+0x10/0x20
[ 24.959830]
[ 24.960152] Freed by task 185:
[ 24.960909] kasan_save_stack+0x3c/0x68
[ 24.961830] kasan_save_track+0x20/0x40
[ 24.962252] kasan_save_free_info+0x4c/0x78
[ 24.962691] __kasan_slab_free+0x6c/0x98
[ 24.963402] kfree+0x114/0x3c8
[ 24.964512] ksize_uaf+0x11c/0x600
[ 24.965210] kunit_try_run_case+0x14c/0x3d0
[ 24.965644] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.966176] kthread+0x24c/0x2d0
[ 24.966549] ret_from_fork+0x10/0x20
[ 24.968440]
[ 24.968758] The buggy address belongs to the object at fff00000c5cd6600
[ 24.968758] which belongs to the cache kmalloc-128 of size 128
[ 24.970001] The buggy address is located 0 bytes inside of
[ 24.970001] freed 128-byte region [fff00000c5cd6600, fff00000c5cd6680)
[ 24.971640]
[ 24.972343] The buggy address belongs to the physical page:
[ 24.973249] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[ 24.974278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.975411] page_type: f5(slab)
[ 24.975832] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 24.976407] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.977494] page dumped because: kasan: bad access detected
[ 24.978355]
[ 24.978624] Memory state around the buggy address:
[ 24.979296] fff00000c5cd6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.981003] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.981927] >fff00000c5cd6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.982838] ^
[ 24.983461] fff00000c5cd6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.984896] fff00000c5cd6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.985811] ==================================================================
Home
[ 24.882566] ==================================================================
[ 24.883875] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[ 24.884491] Read of size 1 at addr fff00000c5cd6600 by task kunit_try_catch/185
[ 24.886228]
[ 24.886580] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 24.888201] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.889252] Hardware name: linux,dummy-virt (DT)
[ 24.889689] Call trace:
[ 24.890314] show_stack+0x20/0x38 (C)
[ 24.891374] dump_stack_lvl+0x8c/0xd0
[ 24.892084] print_report+0x118/0x5e0
[ 24.892726] kasan_report+0xc8/0x118
[ 24.893435] __kasan_check_byte+0x54/0x70
[ 24.893997] ksize+0x30/0x88
[ 24.894438] ksize_uaf+0x168/0x600
[ 24.894968] kunit_try_run_case+0x14c/0x3d0
[ 24.896334] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.897190] kthread+0x24c/0x2d0
[ 24.897708] ret_from_fork+0x10/0x20
[ 24.898254]
[ 24.898550] Allocated by task 185:
[ 24.899685] kasan_save_stack+0x3c/0x68
[ 24.900366] kasan_save_track+0x20/0x40
[ 24.901028] kasan_save_alloc_info+0x40/0x58
[ 24.901768] __kasan_kmalloc+0xd4/0xd8
[ 24.902302] __kmalloc_cache_noprof+0x15c/0x3c0
[ 24.902858] ksize_uaf+0xb8/0x600
[ 24.903337] kunit_try_run_case+0x14c/0x3d0
[ 24.904894] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.905443] kthread+0x24c/0x2d0
[ 24.906003] ret_from_fork+0x10/0x20
[ 24.906663]
[ 24.907216] Freed by task 185:
[ 24.908013] kasan_save_stack+0x3c/0x68
[ 24.908504] kasan_save_track+0x20/0x40
[ 24.909187] kasan_save_free_info+0x4c/0x78
[ 24.909820] __kasan_slab_free+0x6c/0x98
[ 24.910419] kfree+0x114/0x3c8
[ 24.910969] ksize_uaf+0x11c/0x600
[ 24.911578] kunit_try_run_case+0x14c/0x3d0
[ 24.912496] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 24.913151] kthread+0x24c/0x2d0
[ 24.913596] ret_from_fork+0x10/0x20
[ 24.914116]
[ 24.914428] The buggy address belongs to the object at fff00000c5cd6600
[ 24.914428] which belongs to the cache kmalloc-128 of size 128
[ 24.916760] The buggy address is located 0 bytes inside of
[ 24.916760] freed 128-byte region [fff00000c5cd6600, fff00000c5cd6680)
[ 24.918316]
[ 24.918623] The buggy address belongs to the physical page:
[ 24.919303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cd6
[ 24.920557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 24.921329] page_type: f5(slab)
[ 24.922294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 24.923340] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 24.924627] page dumped because: kasan: bad access detected
[ 24.925460]
[ 24.925944] Memory state around the buggy address:
[ 24.926427] fff00000c5cd6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.927959] fff00000c5cd6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.928711] >fff00000c5cd6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.930049] ^
[ 24.930675] fff00000c5cd6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.931882] fff00000c5cd6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.933101] ==================================================================
Home
[ 26.436441] ==================================================================
[ 26.437874] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[ 26.438529] Read of size 1 at addr fff00000c5d27240 by task kunit_try_catch/220
[ 26.439170]
[ 26.440100] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.441465] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.442127] Hardware name: linux,dummy-virt (DT)
[ 26.442835] Call trace:
[ 26.443818] show_stack+0x20/0x38 (C)
[ 26.444244] dump_stack_lvl+0x8c/0xd0
[ 26.444729] print_report+0x118/0x5e0
[ 26.445235] kasan_report+0xc8/0x118
[ 26.446113] __asan_report_load1_noabort+0x20/0x30
[ 26.446589] mempool_uaf_helper+0x314/0x340
[ 26.447377] mempool_slab_uaf+0xb8/0x110
[ 26.447954] kunit_try_run_case+0x14c/0x3d0
[ 26.448495] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.450119] kthread+0x24c/0x2d0
[ 26.450790] ret_from_fork+0x10/0x20
[ 26.451968]
[ 26.452407] Allocated by task 220:
[ 26.453007] kasan_save_stack+0x3c/0x68
[ 26.453544] kasan_save_track+0x20/0x40
[ 26.454141] kasan_save_alloc_info+0x40/0x58
[ 26.454828] __kasan_mempool_unpoison_object+0xbc/0x180
[ 26.456056] remove_element+0x16c/0x1f8
[ 26.456504] mempool_alloc_preallocated+0x58/0xc0
[ 26.457092] mempool_uaf_helper+0xa4/0x340
[ 26.457591] mempool_slab_uaf+0xb8/0x110
[ 26.458477] kunit_try_run_case+0x14c/0x3d0
[ 26.459391] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.460693] kthread+0x24c/0x2d0
[ 26.461330] ret_from_fork+0x10/0x20
[ 26.462004]
[ 26.462444] Freed by task 220:
[ 26.463361] kasan_save_stack+0x3c/0x68
[ 26.463880] kasan_save_track+0x20/0x40
[ 26.464993] kasan_save_free_info+0x4c/0x78
[ 26.465723] __kasan_mempool_poison_object+0xc0/0x150
[ 26.466486] mempool_free+0x28c/0x328
[ 26.467789] mempool_uaf_helper+0x104/0x340
[ 26.468396] mempool_slab_uaf+0xb8/0x110
[ 26.468871] kunit_try_run_case+0x14c/0x3d0
[ 26.469661] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.470341] kthread+0x24c/0x2d0
[ 26.470782] ret_from_fork+0x10/0x20
[ 26.471899]
[ 26.472366] The buggy address belongs to the object at fff00000c5d27240
[ 26.472366] which belongs to the cache test_cache of size 123
[ 26.473788] The buggy address is located 0 bytes inside of
[ 26.473788] freed 123-byte region [fff00000c5d27240, fff00000c5d272bb)
[ 26.475896]
[ 26.476231] The buggy address belongs to the physical page:
[ 26.477004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d27
[ 26.477956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.478789] page_type: f5(slab)
[ 26.479484] raw: 0bfffe0000000000 fff00000c5d073c0 dead000000000122 0000000000000000
[ 26.480589] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[ 26.481552] page dumped because: kasan: bad access detected
[ 26.482209]
[ 26.482735] Memory state around the buggy address:
[ 26.483586] fff00000c5d27100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.484559] fff00000c5d27180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.485265] >fff00000c5d27200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 26.486834] ^
[ 26.487664] fff00000c5d27280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.488719] fff00000c5d27300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.489707] ==================================================================
Home
[ 26.328831] ==================================================================
[ 26.330047] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[ 26.330804] Read of size 1 at addr fff00000c5d02a00 by task kunit_try_catch/216
[ 26.332808]
[ 26.333292] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.334428] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.334947] Hardware name: linux,dummy-virt (DT)
[ 26.335503] Call trace:
[ 26.335868] show_stack+0x20/0x38 (C)
[ 26.336352] dump_stack_lvl+0x8c/0xd0
[ 26.337329] print_report+0x118/0x5e0
[ 26.338127] kasan_report+0xc8/0x118
[ 26.338828] __asan_report_load1_noabort+0x20/0x30
[ 26.340118] mempool_uaf_helper+0x314/0x340
[ 26.340876] mempool_kmalloc_uaf+0xbc/0x118
[ 26.341603] kunit_try_run_case+0x14c/0x3d0
[ 26.342340] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.343001] kthread+0x24c/0x2d0
[ 26.343486] ret_from_fork+0x10/0x20
[ 26.344974]
[ 26.345407] Allocated by task 216:
[ 26.345900] kasan_save_stack+0x3c/0x68
[ 26.346575] kasan_save_track+0x20/0x40
[ 26.347119] kasan_save_alloc_info+0x40/0x58
[ 26.348047] __kasan_mempool_unpoison_object+0x11c/0x180
[ 26.349185] remove_element+0x130/0x1f8
[ 26.349574] mempool_alloc_preallocated+0x58/0xc0
[ 26.350116] mempool_uaf_helper+0xa4/0x340
[ 26.350787] mempool_kmalloc_uaf+0xbc/0x118
[ 26.352096] kunit_try_run_case+0x14c/0x3d0
[ 26.352586] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.353122] kthread+0x24c/0x2d0
[ 26.353485] ret_from_fork+0x10/0x20
[ 26.354732]
[ 26.355228] Freed by task 216:
[ 26.355806] kasan_save_stack+0x3c/0x68
[ 26.356201] kasan_save_track+0x20/0x40
[ 26.356800] kasan_save_free_info+0x4c/0x78
[ 26.357903] __kasan_mempool_poison_object+0xc0/0x150
[ 26.358680] mempool_free+0x28c/0x328
[ 26.359517] mempool_uaf_helper+0x104/0x340
[ 26.360206] mempool_kmalloc_uaf+0xbc/0x118
[ 26.360637] kunit_try_run_case+0x14c/0x3d0
[ 26.361092] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.361620] kthread+0x24c/0x2d0
[ 26.362828] ret_from_fork+0x10/0x20
[ 26.363511]
[ 26.364873] The buggy address belongs to the object at fff00000c5d02a00
[ 26.364873] which belongs to the cache kmalloc-128 of size 128
[ 26.366376] The buggy address is located 0 bytes inside of
[ 26.366376] freed 128-byte region [fff00000c5d02a00, fff00000c5d02a80)
[ 26.367998]
[ 26.368298] The buggy address belongs to the physical page:
[ 26.369373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d02
[ 26.370195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.370835] page_type: f5(slab)
[ 26.372664] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 26.373535] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 26.374495] page dumped because: kasan: bad access detected
[ 26.375571]
[ 26.375821] Memory state around the buggy address:
[ 26.376831] fff00000c5d02900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.377756] fff00000c5d02980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.378664] >fff00000c5d02a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 26.379634] ^
[ 26.380999] fff00000c5d02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.382025] fff00000c5d02b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.382943] ==================================================================
Home
[ 25.067602] ==================================================================
[ 25.068539] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[ 25.069636] Read of size 4 at addr fff00000c634edc0 by task swapper/1/0
[ 25.070272]
[ 25.070712] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.13.0-rc7 #1
[ 25.071632] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.072190] Hardware name: linux,dummy-virt (DT)
[ 25.073246] Call trace:
[ 25.073826] show_stack+0x20/0x38 (C)
[ 25.074433] dump_stack_lvl+0x8c/0xd0
[ 25.075114] print_report+0x118/0x5e0
[ 25.075959] kasan_report+0xc8/0x118
[ 25.076552] __asan_report_load4_noabort+0x20/0x30
[ 25.077227] rcu_uaf_reclaim+0x64/0x70
[ 25.077840] rcu_core+0x9f4/0x1e20
[ 25.078393] rcu_core_si+0x18/0x30
[ 25.079324] handle_softirqs+0x374/0xb20
[ 25.079834] __do_softirq+0x1c/0x28
[ 25.080419] ____do_softirq+0x18/0x30
[ 25.081068] call_on_irq_stack+0x24/0x58
[ 25.081692] do_softirq_own_stack+0x24/0x38
[ 25.082319] __irq_exit_rcu+0x1fc/0x318
[ 25.083270] irq_exit_rcu+0x1c/0x80
[ 25.083738] el1_interrupt+0x38/0x58
[ 25.084287] el1h_64_irq_handler+0x18/0x28
[ 25.084885] el1h_64_irq+0x6c/0x70
[ 25.085563] arch_local_irq_enable+0x4/0x8 (P)
[ 25.086229] do_idle+0x384/0x4e8
[ 25.086710] cpu_startup_entry+0x68/0x80
[ 25.087730] secondary_start_kernel+0x288/0x340
[ 25.088375] __secondary_switched+0xc0/0xc8
[ 25.089020]
[ 25.089326] Allocated by task 187:
[ 25.089876] kasan_save_stack+0x3c/0x68
[ 25.090367] kasan_save_track+0x20/0x40
[ 25.091811] kasan_save_alloc_info+0x40/0x58
[ 25.092277] __kasan_kmalloc+0xd4/0xd8
[ 25.092736] __kmalloc_cache_noprof+0x15c/0x3c0
[ 25.093388] rcu_uaf+0xb0/0x2d0
[ 25.093931] kunit_try_run_case+0x14c/0x3d0
[ 25.094486] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.095526] kthread+0x24c/0x2d0
[ 25.096002] ret_from_fork+0x10/0x20
[ 25.096523]
[ 25.096867] Freed by task 0:
[ 25.097286] kasan_save_stack+0x3c/0x68
[ 25.097899] kasan_save_track+0x20/0x40
[ 25.098465] kasan_save_free_info+0x4c/0x78
[ 25.099419] __kasan_slab_free+0x6c/0x98
[ 25.100001] kfree+0x114/0x3c8
[ 25.100455] rcu_uaf_reclaim+0x28/0x70
[ 25.100975] rcu_core+0x9f4/0x1e20
[ 25.101429] rcu_core_si+0x18/0x30
[ 25.101910] handle_softirqs+0x374/0xb20
[ 25.102516] __do_softirq+0x1c/0x28
[ 25.103429]
[ 25.103804] Last potentially related work creation:
[ 25.104368] kasan_save_stack+0x3c/0x68
[ 25.104997] __kasan_record_aux_stack+0xbc/0xe8
[ 25.105519] kasan_record_aux_stack_noalloc+0x14/0x20
[ 25.106365] __call_rcu_common.constprop.0+0x74/0xa10
[ 25.107338] call_rcu+0x18/0x30
[ 25.107788] rcu_uaf+0x14c/0x2d0
[ 25.108262] kunit_try_run_case+0x14c/0x3d0
[ 25.108843] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.109462] kthread+0x24c/0x2d0
[ 25.110008] ret_from_fork+0x10/0x20
[ 25.110514]
[ 25.110916] The buggy address belongs to the object at fff00000c634edc0
[ 25.110916] which belongs to the cache kmalloc-32 of size 32
[ 25.113250] The buggy address is located 0 bytes inside of
[ 25.113250] freed 32-byte region [fff00000c634edc0, fff00000c634ede0)
[ 25.114380]
[ 25.114783] The buggy address belongs to the physical page:
[ 25.115426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10634e
[ 25.116720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 25.117595] page_type: f5(slab)
[ 25.118088] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 25.118440] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 25.118892] page dumped because: kasan: bad access detected
[ 25.120052]
[ 25.120405] Memory state around the buggy address:
[ 25.120942] fff00000c634ec80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.121779] fff00000c634ed00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.122600] >fff00000c634ed80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.123464] ^
[ 25.124105] fff00000c634ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.125063] fff00000c634ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.125783] ==================================================================
Home
[ 27.033764] ==================================================================
[ 27.034786] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[ 27.035687] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[ 27.036288]
[ 27.036630] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.037587] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.038002] Hardware name: linux,dummy-virt (DT)
[ 27.038462] Call trace:
[ 27.039627] show_stack+0x20/0x38 (C)
[ 27.040367] dump_stack_lvl+0x8c/0xd0
[ 27.041069] print_report+0x118/0x5e0
[ 27.041799] kasan_report+0xc8/0x118
[ 27.042426] __asan_report_load1_noabort+0x20/0x30
[ 27.043197] strchr+0xcc/0xd8
[ 27.043995] kasan_strings+0x180/0x8f8
[ 27.044610] kunit_try_run_case+0x14c/0x3d0
[ 27.045188] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.045963] kthread+0x24c/0x2d0
[ 27.046522] ret_from_fork+0x10/0x20
[ 27.047317]
[ 27.047539] Allocated by task 248:
[ 27.047919] kasan_save_stack+0x3c/0x68
[ 27.048641] kasan_save_track+0x20/0x40
[ 27.049164] kasan_save_alloc_info+0x40/0x58
[ 27.049838] __kasan_kmalloc+0xd4/0xd8
[ 27.050507] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.051381] kasan_strings+0xb4/0x8f8
[ 27.051820] kunit_try_run_case+0x14c/0x3d0
[ 27.052428] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.053354] kthread+0x24c/0x2d0
[ 27.053965] ret_from_fork+0x10/0x20
[ 27.054575]
[ 27.054978] Freed by task 248:
[ 27.056051] kasan_save_stack+0x3c/0x68
[ 27.056547] kasan_save_track+0x20/0x40
[ 27.057051] kasan_save_free_info+0x4c/0x78
[ 27.057554] __kasan_slab_free+0x6c/0x98
[ 27.059033] kfree+0x114/0x3c8
[ 27.059615] kasan_strings+0x128/0x8f8
[ 27.060181] kunit_try_run_case+0x14c/0x3d0
[ 27.060896] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.061612] kthread+0x24c/0x2d0
[ 27.062181] ret_from_fork+0x10/0x20
[ 27.062802]
[ 27.063215] The buggy address belongs to the object at fff00000c5d0e240
[ 27.063215] which belongs to the cache kmalloc-32 of size 32
[ 27.064621] The buggy address is located 16 bytes inside of
[ 27.064621] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[ 27.066130]
[ 27.066480] The buggy address belongs to the physical page:
[ 27.067284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[ 27.068168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.069006] page_type: f5(slab)
[ 27.069441] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 27.070237] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 27.071019] page dumped because: kasan: bad access detected
[ 27.071702]
[ 27.072111] Memory state around the buggy address:
[ 27.072775] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.073699] fff00000c5d0e180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.074566] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.075555] ^
[ 27.076231] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.077169] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.078018] ==================================================================
Home
[ 27.127433] ==================================================================
[ 27.128069] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[ 27.128391] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[ 27.128721]
[ 27.129018] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.130779] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.132054] Hardware name: linux,dummy-virt (DT)
[ 27.132730] Call trace:
[ 27.133161] show_stack+0x20/0x38 (C)
[ 27.133872] dump_stack_lvl+0x8c/0xd0
[ 27.134483] print_report+0x118/0x5e0
[ 27.135096] kasan_report+0xc8/0x118
[ 27.135953] __asan_report_load1_noabort+0x20/0x30
[ 27.136653] strcmp+0xc0/0xc8
[ 27.137254] kasan_strings+0x248/0x8f8
[ 27.137880] kunit_try_run_case+0x14c/0x3d0
[ 27.138510] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.139406] kthread+0x24c/0x2d0
[ 27.140224] ret_from_fork+0x10/0x20
[ 27.140847]
[ 27.141204] Allocated by task 248:
[ 27.141774] kasan_save_stack+0x3c/0x68
[ 27.142378] kasan_save_track+0x20/0x40
[ 27.143004] kasan_save_alloc_info+0x40/0x58
[ 27.143772] __kasan_kmalloc+0xd4/0xd8
[ 27.144264] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.144814] kasan_strings+0xb4/0x8f8
[ 27.145286] kunit_try_run_case+0x14c/0x3d0
[ 27.145849] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.146626] kthread+0x24c/0x2d0
[ 27.147356] ret_from_fork+0x10/0x20
[ 27.147836]
[ 27.148057] Freed by task 248:
[ 27.148404] kasan_save_stack+0x3c/0x68
[ 27.149608] kasan_save_track+0x20/0x40
[ 27.150326] kasan_save_free_info+0x4c/0x78
[ 27.151199] __kasan_slab_free+0x6c/0x98
[ 27.151576] kfree+0x114/0x3c8
[ 27.152589] kasan_strings+0x128/0x8f8
[ 27.154037] kunit_try_run_case+0x14c/0x3d0
[ 27.154683] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.155517] kthread+0x24c/0x2d0
[ 27.156154] ret_from_fork+0x10/0x20
[ 27.156719]
[ 27.157085] The buggy address belongs to the object at fff00000c5d0e240
[ 27.157085] which belongs to the cache kmalloc-32 of size 32
[ 27.158425] The buggy address is located 16 bytes inside of
[ 27.158425] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[ 27.159756]
[ 27.160108] The buggy address belongs to the physical page:
[ 27.160897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[ 27.161857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.162675] page_type: f5(slab)
[ 27.163300] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 27.164189] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 27.165046] page dumped because: kasan: bad access detected
[ 27.165719]
[ 27.166102] Memory state around the buggy address:
[ 27.166768] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.167577] fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.168405] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.169274] ^
[ 27.170045] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.170901] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.171734] ==================================================================
Home
[ 27.220382] ==================================================================
[ 27.221147] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[ 27.222048] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[ 27.223393]
[ 27.223558] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.223997] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.224223] Hardware name: linux,dummy-virt (DT)
[ 27.224458] Call trace:
[ 27.224621] show_stack+0x20/0x38 (C)
[ 27.226234] dump_stack_lvl+0x8c/0xd0
[ 27.227422] print_report+0x118/0x5e0
[ 27.228170] kasan_report+0xc8/0x118
[ 27.228664] __asan_report_load1_noabort+0x20/0x30
[ 27.229738] strlen+0xa8/0xb0
[ 27.230227] kasan_strings+0x320/0x8f8
[ 27.230758] kunit_try_run_case+0x14c/0x3d0
[ 27.231684] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.232643] kthread+0x24c/0x2d0
[ 27.233228] ret_from_fork+0x10/0x20
[ 27.234033]
[ 27.234271] Allocated by task 248:
[ 27.234829] kasan_save_stack+0x3c/0x68
[ 27.235387] kasan_save_track+0x20/0x40
[ 27.236392] kasan_save_alloc_info+0x40/0x58
[ 27.237344] __kasan_kmalloc+0xd4/0xd8
[ 27.237996] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.238737] kasan_strings+0xb4/0x8f8
[ 27.239411] kunit_try_run_case+0x14c/0x3d0
[ 27.239977] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.240617] kthread+0x24c/0x2d0
[ 27.241546] ret_from_fork+0x10/0x20
[ 27.242256]
[ 27.242692] Freed by task 248:
[ 27.244052] kasan_save_stack+0x3c/0x68
[ 27.244757] kasan_save_track+0x20/0x40
[ 27.245257] kasan_save_free_info+0x4c/0x78
[ 27.245837] __kasan_slab_free+0x6c/0x98
[ 27.246408] kfree+0x114/0x3c8
[ 27.246902] kasan_strings+0x128/0x8f8
[ 27.247430] kunit_try_run_case+0x14c/0x3d0
[ 27.248005] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.248647] kthread+0x24c/0x2d0
[ 27.249155] ret_from_fork+0x10/0x20
[ 27.249641]
[ 27.249989] The buggy address belongs to the object at fff00000c5d0e240
[ 27.249989] which belongs to the cache kmalloc-32 of size 32
[ 27.251247] The buggy address is located 16 bytes inside of
[ 27.251247] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[ 27.252454]
[ 27.252824] The buggy address belongs to the physical page:
[ 27.253445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[ 27.254428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.255210] page_type: f5(slab)
[ 27.255768] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 27.256571] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 27.257449] page dumped because: kasan: bad access detected
[ 27.258073]
[ 27.258405] Memory state around the buggy address:
[ 27.259059] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.259832] fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.260578] >fff00000c5d0e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.261460] ^
[ 27.262136] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.262979] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.263771] ==================================================================
Home
[ 27.266492] ==================================================================
[ 27.267382] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[ 27.268116] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[ 27.269411]
[ 27.269847] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.271328] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.271888] Hardware name: linux,dummy-virt (DT)
[ 27.272432] Call trace:
[ 27.272871] show_stack+0x20/0x38 (C)
[ 27.273814] dump_stack_lvl+0x8c/0xd0
[ 27.274538] print_report+0x118/0x5e0
[ 27.275288] kasan_report+0xc8/0x118
[ 27.275851] __asan_report_load1_noabort+0x20/0x30
[ 27.276392] strnlen+0x80/0x88
[ 27.276970] kasan_strings+0x380/0x8f8
[ 27.277515] kunit_try_run_case+0x14c/0x3d0
[ 27.278065] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.278830] kthread+0x24c/0x2d0
[ 27.279387] ret_from_fork+0x10/0x20
[ 27.279998]
[ 27.280324] Allocated by task 248:
[ 27.280788] kasan_save_stack+0x3c/0x68
[ 27.281396] kasan_save_track+0x20/0x40
[ 27.282034] kasan_save_alloc_info+0x40/0x58
[ 27.282676] __kasan_kmalloc+0xd4/0xd8
[ 27.283206] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.283870] kasan_strings+0xb4/0x8f8
[ 27.284420] kunit_try_run_case+0x14c/0x3d0
[ 27.285065] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.285674] kthread+0x24c/0x2d0
[ 27.286228] ret_from_fork+0x10/0x20
[ 27.286724]
[ 27.287070] Freed by task 248:
[ 27.287594] kasan_save_stack+0x3c/0x68
[ 27.288149] kasan_save_track+0x20/0x40
[ 27.288691] kasan_save_free_info+0x4c/0x78
[ 27.289230] __kasan_slab_free+0x6c/0x98
[ 27.289853] kfree+0x114/0x3c8
[ 27.290305] kasan_strings+0x128/0x8f8
[ 27.290839] kunit_try_run_case+0x14c/0x3d0
[ 27.291429] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.292209] kthread+0x24c/0x2d0
[ 27.292701] ret_from_fork+0x10/0x20
[ 27.293203]
[ 27.293568] The buggy address belongs to the object at fff00000c5d0e240
[ 27.293568] which belongs to the cache kmalloc-32 of size 32
[ 27.294789] The buggy address is located 16 bytes inside of
[ 27.294789] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[ 27.296005]
[ 27.296323] The buggy address belongs to the physical page:
[ 27.297021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[ 27.297889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.298783] page_type: f5(slab)
[ 27.299242] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 27.300200] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 27.301016] page dumped because: kasan: bad access detected
[ 27.301663]
[ 27.301962] Memory state around the buggy address:
[ 27.302527] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.303410] fff00000c5d0e180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.304216] >fff00000c5d0e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.305044] ^
[ 27.305735] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.306578] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.307380] ==================================================================
Home
[ 27.080661] ==================================================================
[ 27.081408] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[ 27.082920] Read of size 1 at addr fff00000c5d0e250 by task kunit_try_catch/248
[ 27.084093]
[ 27.084344] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 27.085176] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.085588] Hardware name: linux,dummy-virt (DT)
[ 27.087239] Call trace:
[ 27.087709] show_stack+0x20/0x38 (C)
[ 27.088314] dump_stack_lvl+0x8c/0xd0
[ 27.088950] print_report+0x118/0x5e0
[ 27.089459] kasan_report+0xc8/0x118
[ 27.090131] __asan_report_load1_noabort+0x20/0x30
[ 27.090788] strrchr+0x6c/0x78
[ 27.091367] kasan_strings+0x1e0/0x8f8
[ 27.091971] kunit_try_run_case+0x14c/0x3d0
[ 27.092624] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.093359] kthread+0x24c/0x2d0
[ 27.093931] ret_from_fork+0x10/0x20
[ 27.094564]
[ 27.095024] Allocated by task 248:
[ 27.095535] kasan_save_stack+0x3c/0x68
[ 27.096208] kasan_save_track+0x20/0x40
[ 27.096716] kasan_save_alloc_info+0x40/0x58
[ 27.097476] __kasan_kmalloc+0xd4/0xd8
[ 27.098097] __kmalloc_cache_noprof+0x15c/0x3c0
[ 27.098785] kasan_strings+0xb4/0x8f8
[ 27.099368] kunit_try_run_case+0x14c/0x3d0
[ 27.100043] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.100804] kthread+0x24c/0x2d0
[ 27.101364] ret_from_fork+0x10/0x20
[ 27.101900]
[ 27.102288] Freed by task 248:
[ 27.102834] kasan_save_stack+0x3c/0x68
[ 27.103398] kasan_save_track+0x20/0x40
[ 27.104060] kasan_save_free_info+0x4c/0x78
[ 27.104675] __kasan_slab_free+0x6c/0x98
[ 27.105329] kfree+0x114/0x3c8
[ 27.105862] kasan_strings+0x128/0x8f8
[ 27.106466] kunit_try_run_case+0x14c/0x3d0
[ 27.107130] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 27.107885] kthread+0x24c/0x2d0
[ 27.108463] ret_from_fork+0x10/0x20
[ 27.109069]
[ 27.109423] The buggy address belongs to the object at fff00000c5d0e240
[ 27.109423] which belongs to the cache kmalloc-32 of size 32
[ 27.110765] The buggy address is located 16 bytes inside of
[ 27.110765] freed 32-byte region [fff00000c5d0e240, fff00000c5d0e260)
[ 27.112094]
[ 27.112422] The buggy address belongs to the physical page:
[ 27.113081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d0e
[ 27.114075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 27.114911] page_type: f5(slab)
[ 27.115516] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 27.116454] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 27.117313] page dumped because: kasan: bad access detected
[ 27.118023]
[ 27.118350] Memory state around the buggy address:
[ 27.118981] fff00000c5d0e100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.119923] fff00000c5d0e180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.120781] >fff00000c5d0e200: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 27.121569] ^
[ 27.122272] fff00000c5d0e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.123152] fff00000c5d0e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.124022] ==================================================================
Home
[ 25.140583] ==================================================================
[ 25.142505] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[ 25.143953] Read of size 8 at addr fff00000c634ee80 by task kunit_try_catch/189
[ 25.144897]
[ 25.145219] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 25.146916] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.147466] Hardware name: linux,dummy-virt (DT)
[ 25.147983] Call trace:
[ 25.148396] show_stack+0x20/0x38 (C)
[ 25.149370] dump_stack_lvl+0x8c/0xd0
[ 25.149929] print_report+0x118/0x5e0
[ 25.150497] kasan_report+0xc8/0x118
[ 25.151394] __asan_report_load8_noabort+0x20/0x30
[ 25.151951] workqueue_uaf+0x480/0x4a8
[ 25.152568] kunit_try_run_case+0x14c/0x3d0
[ 25.153241] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.153922] kthread+0x24c/0x2d0
[ 25.154443] ret_from_fork+0x10/0x20
[ 25.155333]
[ 25.155551] Allocated by task 189:
[ 25.155933] kasan_save_stack+0x3c/0x68
[ 25.156356] kasan_save_track+0x20/0x40
[ 25.156801] kasan_save_alloc_info+0x40/0x58
[ 25.157285] __kasan_kmalloc+0xd4/0xd8
[ 25.157833] __kmalloc_cache_noprof+0x15c/0x3c0
[ 25.158410] workqueue_uaf+0x13c/0x4a8
[ 25.158890] kunit_try_run_case+0x14c/0x3d0
[ 25.159883] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.160426] kthread+0x24c/0x2d0
[ 25.160804] ret_from_fork+0x10/0x20
[ 25.161190]
[ 25.161406] Freed by task 31:
[ 25.161776] kasan_save_stack+0x3c/0x68
[ 25.162645] kasan_save_track+0x20/0x40
[ 25.163364] kasan_save_free_info+0x4c/0x78
[ 25.165104] __kasan_slab_free+0x6c/0x98
[ 25.165929] kfree+0x114/0x3c8
[ 25.166577] workqueue_uaf_work+0x18/0x30
[ 25.167763] process_one_work+0x530/0xf98
[ 25.168286] worker_thread+0x614/0xf28
[ 25.168762] kthread+0x24c/0x2d0
[ 25.169175] ret_from_fork+0x10/0x20
[ 25.169625]
[ 25.169955] Last potentially related work creation:
[ 25.171226] kasan_save_stack+0x3c/0x68
[ 25.171712] __kasan_record_aux_stack+0xbc/0xe8
[ 25.172607] kasan_record_aux_stack_noalloc+0x14/0x20
[ 25.173390] __queue_work+0x65c/0xfd8
[ 25.173902] queue_work_on+0xbc/0xf8
[ 25.174625] workqueue_uaf+0x210/0x4a8
[ 25.175479] kunit_try_run_case+0x14c/0x3d0
[ 25.175935] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 25.176457] kthread+0x24c/0x2d0
[ 25.177551] ret_from_fork+0x10/0x20
[ 25.177943]
[ 25.178534] The buggy address belongs to the object at fff00000c634ee80
[ 25.178534] which belongs to the cache kmalloc-32 of size 32
[ 25.180149] The buggy address is located 0 bytes inside of
[ 25.180149] freed 32-byte region [fff00000c634ee80, fff00000c634eea0)
[ 25.181307]
[ 25.181608] The buggy address belongs to the physical page:
[ 25.182710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10634e
[ 25.184642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 25.185971] page_type: f5(slab)
[ 25.186369] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 25.187703] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 25.188711] page dumped because: kasan: bad access detected
[ 25.189509]
[ 25.190013] Memory state around the buggy address:
[ 25.190726] fff00000c634ed80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.191734] fff00000c634ee00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 25.192497] >fff00000c634ee80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.193634] ^
[ 25.194307] fff00000c634ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.195427] fff00000c634ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.196101] ==================================================================
Home
[ 26.816963] ==================================================================
[ 26.818334] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[ 26.819277] Read of size 1 at addr ffff800080a07cba by task kunit_try_catch/238
[ 26.820419]
[ 26.820718] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.821807] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.822346] Hardware name: linux,dummy-virt (DT)
[ 26.823052] Call trace:
[ 26.823724] show_stack+0x20/0x38 (C)
[ 26.824266] dump_stack_lvl+0x8c/0xd0
[ 26.824890] print_report+0x2fc/0x5e0
[ 26.825447] kasan_report+0xc8/0x118
[ 26.826062] __asan_report_load1_noabort+0x20/0x30
[ 26.826760] kasan_stack_oob+0x230/0x268
[ 26.827582] kunit_try_run_case+0x14c/0x3d0
[ 26.828315] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.829047] kthread+0x24c/0x2d0
[ 26.829550] ret_from_fork+0x10/0x20
[ 26.830180]
[ 26.830596] The buggy address belongs to stack of task kunit_try_catch/238
[ 26.832039] and is located at offset 138 in frame:
[ 26.832564] kasan_stack_oob+0x0/0x268
[ 26.833379]
[ 26.833635] This frame has 4 objects:
[ 26.834630] [48, 49) '__assertion'
[ 26.834712] [64, 72) 'array'
[ 26.835296] [96, 112) '__assertion'
[ 26.835970] [128, 138) 'stack_array'
[ 26.836630]
[ 26.837918] The buggy address belongs to the virtual mapping at
[ 26.837918] [ffff800080a00000, ffff800080a09000) created by:
[ 26.837918] kernel_clone+0x140/0x788
[ 26.839711]
[ 26.840078] The buggy address belongs to the physical page:
[ 26.841300] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d22
[ 26.842099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.843055] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 26.844190] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.845166] page dumped because: kasan: bad access detected
[ 26.846006]
[ 26.846454] Memory state around the buggy address:
[ 26.847203] ffff800080a07b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 26.848342] ffff800080a07c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[ 26.849249] >ffff800080a07c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[ 26.849998] ^
[ 26.850578] ffff800080a07d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[ 26.851853] ffff800080a07d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[ 26.852721] ==================================================================
Home
[ 23.173386] ==================================================================
[ 23.174467] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[ 23.175690] Read of size 1 at addr fff00000c65fc000 by task kunit_try_catch/137
[ 23.177095]
[ 23.177359] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 23.178167] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.178574] Hardware name: linux,dummy-virt (DT)
[ 23.180310] Call trace:
[ 23.180836] show_stack+0x20/0x38 (C)
[ 23.181537] dump_stack_lvl+0x8c/0xd0
[ 23.182288] print_report+0x118/0x5e0
[ 23.182990] kasan_report+0xc8/0x118
[ 23.183524] __asan_report_load1_noabort+0x20/0x30
[ 23.184124] kmalloc_large_uaf+0x2cc/0x2f8
[ 23.184652] kunit_try_run_case+0x14c/0x3d0
[ 23.186175] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 23.186972] kthread+0x24c/0x2d0
[ 23.187788] ret_from_fork+0x10/0x20
[ 23.188484]
[ 23.188961] The buggy address belongs to the physical page:
[ 23.189674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc
[ 23.190483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 23.191638] raw: 0bfffe0000000000 ffffc1ffc3198008 fff00000da4e7f80 0000000000000000
[ 23.192569] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 23.193604] page dumped because: kasan: bad access detected
[ 23.194406]
[ 23.194915] Memory state around the buggy address:
[ 23.195927] fff00000c65fbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.196577] fff00000c65fbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.197223] >fff00000c65fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 23.198613] ^
[ 23.198988] fff00000c65fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 23.200268] fff00000c65fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 23.201348] ==================================================================
Home
[ 26.392273] ==================================================================
[ 26.393291] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[ 26.394041] Read of size 1 at addr fff00000c66f0000 by task kunit_try_catch/218
[ 26.394651]
[ 26.395844] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.396997] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.397675] Hardware name: linux,dummy-virt (DT)
[ 26.398403] Call trace:
[ 26.399172] show_stack+0x20/0x38 (C)
[ 26.399866] dump_stack_lvl+0x8c/0xd0
[ 26.400610] print_report+0x118/0x5e0
[ 26.401270] kasan_report+0xc8/0x118
[ 26.401948] __asan_report_load1_noabort+0x20/0x30
[ 26.402716] mempool_uaf_helper+0x314/0x340
[ 26.403483] mempool_kmalloc_large_uaf+0xbc/0x118
[ 26.404386] kunit_try_run_case+0x14c/0x3d0
[ 26.405112] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.405956] kthread+0x24c/0x2d0
[ 26.406605] ret_from_fork+0x10/0x20
[ 26.407381]
[ 26.407610] The buggy address belongs to the physical page:
[ 26.408138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f0
[ 26.409482] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 26.410319] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 26.411485] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 26.412185] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.412891] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 26.413586] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.415216] head: 0bfffe0000000002 ffffc1ffc319bc01 ffffffffffffffff 0000000000000000
[ 26.416431] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 26.417569] page dumped because: kasan: bad access detected
[ 26.418414]
[ 26.418880] Memory state around the buggy address:
[ 26.419684] fff00000c66eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.420633] fff00000c66eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.421502] >fff00000c66f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.422234] ^
[ 26.422661] fff00000c66f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.423848] fff00000c66f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.424761] ==================================================================
Home
[ 26.504301] ==================================================================
[ 26.505546] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[ 26.506412] Read of size 1 at addr fff00000c66dc000 by task kunit_try_catch/222
[ 26.507085]
[ 26.507603] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 26.509142] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.509808] Hardware name: linux,dummy-virt (DT)
[ 26.511261] Call trace:
[ 26.511921] show_stack+0x20/0x38 (C)
[ 26.512486] dump_stack_lvl+0x8c/0xd0
[ 26.513091] print_report+0x118/0x5e0
[ 26.513674] kasan_report+0xc8/0x118
[ 26.514223] __asan_report_load1_noabort+0x20/0x30
[ 26.514895] mempool_uaf_helper+0x314/0x340
[ 26.515542] mempool_page_alloc_uaf+0xb8/0x118
[ 26.516704] kunit_try_run_case+0x14c/0x3d0
[ 26.517337] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 26.518045] kthread+0x24c/0x2d0
[ 26.518525] ret_from_fork+0x10/0x20
[ 26.519172]
[ 26.519506] The buggy address belongs to the physical page:
[ 26.520151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066dc
[ 26.521152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 26.521973] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 26.523316] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 26.524315] page dumped because: kasan: bad access detected
[ 26.524918]
[ 26.525221] Memory state around the buggy address:
[ 26.526222] fff00000c66dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.527094] fff00000c66dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.527956] >fff00000c66dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.528787] ^
[ 26.529386] fff00000c66dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.530341] fff00000c66dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 26.531486] ==================================================================
Home
------------[ cut here ]------------
[ 45.539347] WARNING: CPU: 0 PID: 466 at mm/util.c:657 __kvmalloc_node_noprof+0x11c/0x124
[ 45.543061] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 45.547182] CPU: 0 UID: 0 PID: 466 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 45.548455] Hardware name: linux,dummy-virt (DT)
[ 45.549602] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 45.550644] pc : __kvmalloc_node_noprof+0x11c/0x124
[ 45.550982] lr : __kvmalloc_node_noprof+0x50/0x124
[ 45.551279] sp : ffff800080a53ce0
[ 45.551517] x29: ffff800080a53cf0 x28: fff00000c0e35b40 x27: 0000000000000000
[ 45.552279] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 45.553197] x23: 0000000080001000 x22: 31bfa36ae295c980 x21: 0000000200001e00
[ 45.553748] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 45.554407] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 45.555313] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 45.556174] x11: 0000000000000040 x10: 34a6fab19f720800 x9 : 34a6fab19f720800
[ 45.557097] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 45.557830] x5 : 0000000000000000 x4 : ffff800080a53cb0 x3 : 0000000000000000
[ 45.558588] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 45.559550] Call trace:
[ 45.560255] __kvmalloc_node_noprof+0x11c/0x124 (P)
[ 45.561206] alloc_fdtable+0x74/0x118
[ 45.561692] expand_files+0x114/0x2e0
[ 45.562112] ksys_dup3+0x64/0xe8
[ 45.562502] __arm64_sys_dup3+0x20/0x30
[ 45.563010] invoke_syscall+0x40/0xf8
[ 45.563434] el0_svc_common+0xa8/0xd8
[ 45.563845] do_el0_svc+0x1c/0x28
[ 45.564214] el0_svc+0x38/0x68
[ 45.564458] el0t_64_sync_handler+0x78/0x108
[ 45.564969] el0t_64_sync+0x198/0x19c
[ 45.565702] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 41.899753] WARNING: CPU: 1 PID: 467 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[ 41.900944] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 41.904817] CPU: 1 UID: 0 PID: 467 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 41.906345] Hardware name: linux,dummy-virt (DT)
[ 41.907415] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 41.908448] pc : __kvmalloc_node_noprof+0x138/0x148
[ 41.909212] lr : __kvmalloc_node_noprof+0x64/0x148
[ 41.909704] sp : ffff800080aebcd0
[ 41.910387] x29: ffff800080aebce0 x28: fff00000c62ca480 x27: 0000000000000000
[ 41.911637] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c013ec00
[ 41.912933] x23: fff00000c013ec80 x22: d68fa1093c13b6bc x21: 0000000200001e00
[ 41.913779] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[ 41.915021] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 41.916238] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 41.917295] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 41.918609] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[ 41.919199] x5 : 0000000000000000 x4 : fff00000c62ca480 x3 : 0000000000000000
[ 41.919993] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 41.921287] Call trace:
[ 41.922062] __kvmalloc_node_noprof+0x138/0x148 (P)
[ 41.923227] alloc_fdtable+0x84/0x128
[ 41.924119] expand_files+0x78/0x2ec
[ 41.924589] ksys_dup3+0x60/0x120
[ 41.924809] __arm64_sys_dup3+0x20/0x30
[ 41.925059] invoke_syscall+0x48/0x10c
[ 41.925298] el0_svc_common.constprop.0+0x40/0xe0
[ 41.925861] do_el0_svc+0x1c/0x28
[ 41.926721] el0_svc+0x30/0xcc
[ 41.927272] el0t_64_sync_handler+0x10c/0x138
[ 41.927949] el0t_64_sync+0x198/0x19c
[ 41.929054] ---[ end trace 0000000000000000 ]---