Home
timer-ptimer-busy-loop-interrupt-signal-pending fail
Home
fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 35518ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 25611ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 34694ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 10324ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 16590ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 6960ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 29942ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 2492ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 8068ms
Home
cgroup_test_freezer_test_cgfreezer_ptrace fail
cgroup_test_freezer_test_cgfreezer_ptraced pass
Home
[ 49.905138] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 49.906032] Modules linked in:
[ 49.909913] CPU: 1 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G N 6.13.0-rc7 #1
[ 49.911115] Tainted: [N]=TEST
[ 49.911527] Hardware name: linux,dummy-virt (DT)
[ 49.912348] pstate: 82402009 (Nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 49.912941] pc : kunit_test_null_dereference+0x2c/0x114
[ 49.915141] lr : kunit_generic_run_threadfn_adapter+0x84/0x104
[ 49.915915] sp : ffff800080997dd0
[ 49.916493] x29: ffff800080997de0 x28: 0000000000000000 x27: 1ffe000018ffc001
[ 49.917910] x26: dfff800000000000 x25: ffffa01835508e14 x24: fff00000c7dcdca0
[ 49.919204] x23: 1ffe000018fb9b81 x22: dfff800000000000 x21: dfff800000000000
[ 49.919911] x20: ffffa0183551625c x19: fff00000c7dcdc08 x18: ffff800080097930
[ 49.921079] x17: ffff80008009792c x16: 0000000000000000 x15: 0000000000000001
[ 49.922221] x14: 1ffe000018ffc0f1 x13: 0000000000000000 x12: 0000000000000000
[ 49.923625] x11: fffd800018ffc0f2 x10: dfff800000000000 x9 : 1ffe000018fb9b82
[ 49.924704] x8 : 613d14029cd75600 x7 : ffffa018374cf9c0 x6 : 0000000000000003
[ 49.925802] x5 : ffffa018374d35a0 x4 : 0000000000000001 x3 : ffffa0183735ad58
[ 49.927124] x2 : 0000000000000001 x1 : 0000000000000001 x0 : ffff800080087af8
[ 49.928458] Call trace:
[ 49.929197] kunit_test_null_dereference+0x2c/0x114 (P)
[ 49.930200] kunit_generic_run_threadfn_adapter+0x84/0x104
[ 49.931324] kthread+0x25c/0x35c
[ 49.931868] ret_from_fork+0x10/0x20
[ 49.933319] Code: d2d00015 f9426508 f2fbfff5 f90007e8 (39c002a8)
[ 49.934406] ---[ end trace 0000000000000000 ]---
Home
[ 53.609672] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 53.610700] Modules linked in:
[ 53.614494] CPU: 0 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G N 6.13.0-rc7 #1
[ 53.615687] Tainted: [N]=TEST
[ 53.616147] Hardware name: linux,dummy-virt (DT)
[ 53.617558] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 53.618436] pc : kunit_test_null_dereference+0x68/0x160
[ 53.620376] lr : kunit_generic_run_threadfn_adapter+0x80/0xec
[ 53.620967] sp : ffff800080fd7db0
[ 53.621542] x29: ffff800080fd7e10 x28: 0000000000000000 x27: 0000000000000000
[ 53.623094] x26: 0000000000000000 x25: fff00000c7f33780 x24: fff00000c7ca0000
[ 53.624075] x23: fff00000c7cca700 x22: ffffa9f8489cc2c4 x21: fff00000c7cca708
[ 53.625124] x20: 1ffff000101fafb6 x19: ffff800080087a10 x18: 0000000000000000
[ 53.626153] x17: 1ffe00001b533168 x16: 0000000000000003 x15: ffffa9f84c5f1978
[ 53.627161] x14: 0000000000000416 x13: 00000000f1f1f1f1 x12: fffd800018fe67e2
[ 53.628559] x11: 1ffe000018fe67e1 x10: fffd800018fe67e1 x9 : dfff800000000000
[ 53.629648] x8 : fff00000c7f33f0c x7 : 0000000000000001 x6 : 0000000041b58ab3
[ 53.630734] x5 : ffff7000101fafb6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[ 53.631741] x2 : dfff800000000000 x1 : fff00000c7f33780 x0 : ffff800080087a10
[ 53.633384] Call trace:
[ 53.634092] kunit_test_null_dereference+0x68/0x160 (P)
[ 53.634999] kunit_generic_run_threadfn_adapter+0x80/0xec
[ 53.635941] kthread+0x2b4/0x338
[ 53.636592] ret_from_fork+0x10/0x20
[ 53.638234] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042)
[ 53.639456] ---[ end trace 0000000000000000 ]---
Home
[ 151.302698] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 151.304340] Modules linked in:
[ 151.305399] CPU: 1 UID: 0 PID: 620 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 151.308118] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 151.308749] Hardware name: linux,dummy-virt (DT)
[ 151.309782] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 151.310722] pc : kunit_test_null_dereference+0x70/0x170
[ 151.311992] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[ 151.313151] sp : ffff8000832b7dc0
[ 151.313865] x29: ffff8000832b7e20 x28: 0000000000000000 x27: 0000000000000000
[ 151.315450] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c6935480
[ 151.316923] x23: ffffb13a575c71b0 x22: ffffb13a575cfd70 x21: fff00000c6935488
[ 151.318279] x20: 1ffff00010656fb8 x19: ffff8000800879f0 x18: 000000008f91b15b
[ 151.319787] x17: 0000000000000001 x16: 0000000000000100 x15: 0000000077bc7169
[ 151.320863] x14: 1ffe00001b4a0d78 x13: fff00000da506c98 x12: fffd800019958b3a
[ 151.322043] x11: 1ffe000019958b39 x10: fffd800019958b39 x9 : ffffb13a575c7238
[ 151.323128] x8 : ffff8000832b7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[ 151.324146] x5 : ffff700010656fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[ 151.325311] x2 : dfff800000000000 x1 : fff00000ccac5100 x0 : ffff8000800879f0
[ 151.327628] Call trace:
[ 151.328134] kunit_test_null_dereference+0x70/0x170 (P)
[ 151.328805] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 151.329477] kthread+0x24c/0x2d0
[ 151.330181] ret_from_fork+0x10/0x20
[ 151.331628] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042)
[ 151.332879] ---[ end trace 0000000000000000 ]---
Home
[ 39.193956] ==================================================================
[ 39.195695] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[ 39.196944] Read of size 1 at addr ffff800080b37bdf by task kunit_try_catch/239
[ 39.197719]
[ 39.198384] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.200333] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.201437] Hardware name: linux,dummy-virt (DT)
[ 39.202451] Call trace:
[ 39.203628] show_stack+0x20/0x38 (C)
[ 39.204449] dump_stack_lvl+0x8c/0xd0
[ 39.205243] print_report+0x2fc/0x5e0
[ 39.206170] kasan_report+0xc8/0x118
[ 39.207487] __asan_report_load1_noabort+0x20/0x30
[ 39.208241] kasan_alloca_oob_left+0x2b8/0x310
[ 39.208905] kunit_try_run_case+0x14c/0x3d0
[ 39.210176] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.210993] kthread+0x24c/0x2d0
[ 39.212164] ret_from_fork+0x10/0x20
[ 39.212698]
[ 39.212969] The buggy address belongs to stack of task kunit_try_catch/239
[ 39.213889]
[ 39.214272] The buggy address belongs to the virtual mapping at
[ 39.214272] [ffff800080b30000, ffff800080b39000) created by:
[ 39.214272] kernel_clone+0x140/0x788
[ 39.217541]
[ 39.218134] The buggy address belongs to the physical page:
[ 39.219161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a44
[ 39.220565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.221635] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 39.222706] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 39.223804] page dumped because: kasan: bad access detected
[ 39.224991]
[ 39.225400] Memory state around the buggy address:
[ 39.226370] ffff800080b37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 39.227862] ffff800080b37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 39.229069] >ffff800080b37b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[ 39.230090] ^
[ 39.231212] ffff800080b37c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[ 39.232635] ffff800080b37c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[ 39.233553] ==================================================================
Home
[ 39.244820] ==================================================================
[ 39.246080] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[ 39.247271] Read of size 1 at addr ffff800080b77bea by task kunit_try_catch/241
[ 39.249407]
[ 39.250261] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.252076] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.252759] Hardware name: linux,dummy-virt (DT)
[ 39.253295] Call trace:
[ 39.253804] show_stack+0x20/0x38 (C)
[ 39.254508] dump_stack_lvl+0x8c/0xd0
[ 39.255154] print_report+0x2fc/0x5e0
[ 39.255754] kasan_report+0xc8/0x118
[ 39.256362] __asan_report_load1_noabort+0x20/0x30
[ 39.257058] kasan_alloca_oob_right+0x2e4/0x348
[ 39.258456] kunit_try_run_case+0x14c/0x3d0
[ 39.259146] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.260235] kthread+0x24c/0x2d0
[ 39.260817] ret_from_fork+0x10/0x20
[ 39.261560]
[ 39.261878] The buggy address belongs to stack of task kunit_try_catch/241
[ 39.263345]
[ 39.263907] The buggy address belongs to the virtual mapping at
[ 39.263907] [ffff800080b70000, ffff800080b79000) created by:
[ 39.263907] kernel_clone+0x140/0x788
[ 39.265877]
[ 39.266388] The buggy address belongs to the physical page:
[ 39.267824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106aa2
[ 39.268744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.269214] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 39.269837] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 39.270454] page dumped because: kasan: bad access detected
[ 39.271859]
[ 39.272179] Memory state around the buggy address:
[ 39.272672] ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 39.273409] ffff800080b77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 39.274912] >ffff800080b77b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[ 39.276421] ^
[ 39.277719] ffff800080b77c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[ 39.278806] ffff800080b77c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[ 39.279867] ==================================================================
Home
[ 36.626087] ==================================================================
[ 36.627885] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[ 36.629081] Free of addr fff00000c5a8fc00 by task kunit_try_catch/180
[ 36.629817]
[ 36.631408] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.633082] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.633987] Hardware name: linux,dummy-virt (DT)
[ 36.634645] Call trace:
[ 36.635230] show_stack+0x20/0x38 (C)
[ 36.636226] dump_stack_lvl+0x8c/0xd0
[ 36.636942] print_report+0x118/0x5e0
[ 36.637841] kasan_report_invalid_free+0xb0/0xd8
[ 36.638722] check_slab_allocation+0xd4/0x108
[ 36.640048] __kasan_slab_pre_free+0x2c/0x48
[ 36.641578] kfree+0xe8/0x3c8
[ 36.642563] kfree_sensitive+0x3c/0xb0
[ 36.643844] kmalloc_double_kzfree+0x168/0x308
[ 36.645138] kunit_try_run_case+0x14c/0x3d0
[ 36.646201] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.647563] kthread+0x24c/0x2d0
[ 36.648148] ret_from_fork+0x10/0x20
[ 36.649168]
[ 36.649634] Allocated by task 180:
[ 36.650485] kasan_save_stack+0x3c/0x68
[ 36.651620] kasan_save_track+0x20/0x40
[ 36.652312] kasan_save_alloc_info+0x40/0x58
[ 36.652963] __kasan_kmalloc+0xd4/0xd8
[ 36.653549] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.654179] kmalloc_double_kzfree+0xb8/0x308
[ 36.654813] kunit_try_run_case+0x14c/0x3d0
[ 36.656200] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.657230] kthread+0x24c/0x2d0
[ 36.657831] ret_from_fork+0x10/0x20
[ 36.658908]
[ 36.659725] Freed by task 180:
[ 36.660159] kasan_save_stack+0x3c/0x68
[ 36.660494] kasan_save_track+0x20/0x40
[ 36.660892] kasan_save_free_info+0x4c/0x78
[ 36.661203] __kasan_slab_free+0x6c/0x98
[ 36.661571] kfree+0x114/0x3c8
[ 36.662885] kfree_sensitive+0x80/0xb0
[ 36.663759] kmalloc_double_kzfree+0x11c/0x308
[ 36.664398] kunit_try_run_case+0x14c/0x3d0
[ 36.665565] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.666418] kthread+0x24c/0x2d0
[ 36.667355] ret_from_fork+0x10/0x20
[ 36.668464]
[ 36.669078] The buggy address belongs to the object at fff00000c5a8fc00
[ 36.669078] which belongs to the cache kmalloc-16 of size 16
[ 36.670846] The buggy address is located 0 bytes inside of
[ 36.670846] 16-byte region [fff00000c5a8fc00, fff00000c5a8fc10)
[ 36.672845]
[ 36.673502] The buggy address belongs to the physical page:
[ 36.674466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8f
[ 36.676030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.677730] page_type: f5(slab)
[ 36.678215] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 36.679875] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 36.681099] page dumped because: kasan: bad access detected
[ 36.682018]
[ 36.682353] Memory state around the buggy address:
[ 36.683007] fff00000c5a8fb00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[ 36.684700] fff00000c5a8fb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 36.685503] >fff00000c5a8fc00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.686399] ^
[ 36.687144] fff00000c5a8fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.688585] fff00000c5a8fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.689724] ==================================================================
Home
[ 37.316701] ==================================================================
[ 37.318489] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[ 37.319333] Free of addr fff00000c61c5000 by task kunit_try_catch/197
[ 37.320324]
[ 37.320721] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 37.323017] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 37.323698] Hardware name: linux,dummy-virt (DT)
[ 37.324387] Call trace:
[ 37.324862] show_stack+0x20/0x38 (C)
[ 37.325468] dump_stack_lvl+0x8c/0xd0
[ 37.326538] print_report+0x118/0x5e0
[ 37.327046] kasan_report_invalid_free+0xb0/0xd8
[ 37.328153] check_slab_allocation+0xd4/0x108
[ 37.329102] __kasan_slab_pre_free+0x2c/0x48
[ 37.330189] kmem_cache_free+0xf0/0x470
[ 37.330700] kmem_cache_double_free+0x190/0x3c8
[ 37.332285] kunit_try_run_case+0x14c/0x3d0
[ 37.333220] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.334238] kthread+0x24c/0x2d0
[ 37.334988] ret_from_fork+0x10/0x20
[ 37.335490]
[ 37.335978] Allocated by task 197:
[ 37.336352] kasan_save_stack+0x3c/0x68
[ 37.336811] kasan_save_track+0x20/0x40
[ 37.337573] kasan_save_alloc_info+0x40/0x58
[ 37.338459] __kasan_slab_alloc+0xa8/0xb0
[ 37.339119] kmem_cache_alloc_noprof+0x108/0x398
[ 37.339753] kmem_cache_double_free+0x12c/0x3c8
[ 37.340353] kunit_try_run_case+0x14c/0x3d0
[ 37.341022] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.341639] kthread+0x24c/0x2d0
[ 37.342198] ret_from_fork+0x10/0x20
[ 37.344323]
[ 37.344803] Freed by task 197:
[ 37.345263] kasan_save_stack+0x3c/0x68
[ 37.345881] kasan_save_track+0x20/0x40
[ 37.346586] kasan_save_free_info+0x4c/0x78
[ 37.347719] __kasan_slab_free+0x6c/0x98
[ 37.348404] kmem_cache_free+0x118/0x470
[ 37.349112] kmem_cache_double_free+0x140/0x3c8
[ 37.349929] kunit_try_run_case+0x14c/0x3d0
[ 37.351202] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.352302] kthread+0x24c/0x2d0
[ 37.352742] ret_from_fork+0x10/0x20
[ 37.353636]
[ 37.354075] The buggy address belongs to the object at fff00000c61c5000
[ 37.354075] which belongs to the cache test_cache of size 200
[ 37.356334] The buggy address is located 0 bytes inside of
[ 37.356334] 200-byte region [fff00000c61c5000, fff00000c61c50c8)
[ 37.357848]
[ 37.358240] The buggy address belongs to the physical page:
[ 37.359159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c5
[ 37.360235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 37.361481] page_type: f5(slab)
[ 37.362122] raw: 0bfffe0000000000 fff00000c5a86140 dead000000000122 0000000000000000
[ 37.363939] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[ 37.365507] page dumped because: kasan: bad access detected
[ 37.366136]
[ 37.366558] Memory state around the buggy address:
[ 37.368290] fff00000c61c4f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 37.369182] fff00000c61c4f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 37.371122] >fff00000c61c5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 37.372492] ^
[ 37.373077] fff00000c61c5080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 37.373962] fff00000c61c5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.375143] ==================================================================
Home
[ 38.797512] ==================================================================
[ 38.799742] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[ 38.801440] Free of addr fff00000c69d9800 by task kunit_try_catch/223
[ 38.802652]
[ 38.803154] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.804340] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.805546] Hardware name: linux,dummy-virt (DT)
[ 38.806145] Call trace:
[ 38.806500] show_stack+0x20/0x38 (C)
[ 38.807210] dump_stack_lvl+0x8c/0xd0
[ 38.808416] print_report+0x118/0x5e0
[ 38.809080] kasan_report_invalid_free+0xb0/0xd8
[ 38.809857] check_slab_allocation+0xd4/0x108
[ 38.810595] __kasan_mempool_poison_object+0x78/0x150
[ 38.811665] mempool_free+0x28c/0x328
[ 38.812232] mempool_double_free_helper+0x150/0x2e0
[ 38.812981] mempool_kmalloc_double_free+0xb8/0x110
[ 38.813811] kunit_try_run_case+0x14c/0x3d0
[ 38.814579] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.815375] kthread+0x24c/0x2d0
[ 38.816003] ret_from_fork+0x10/0x20
[ 38.816689]
[ 38.816999] Allocated by task 223:
[ 38.818217] kasan_save_stack+0x3c/0x68
[ 38.819354] kasan_save_track+0x20/0x40
[ 38.820200] kasan_save_alloc_info+0x40/0x58
[ 38.820715] __kasan_mempool_unpoison_object+0x11c/0x180
[ 38.821900] remove_element+0x130/0x1f8
[ 38.822471] mempool_alloc_preallocated+0x58/0xc0
[ 38.823542] mempool_double_free_helper+0x94/0x2e0
[ 38.824289] mempool_kmalloc_double_free+0xb8/0x110
[ 38.825149] kunit_try_run_case+0x14c/0x3d0
[ 38.825813] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.826564] kthread+0x24c/0x2d0
[ 38.827395] ret_from_fork+0x10/0x20
[ 38.828086]
[ 38.828505] Freed by task 223:
[ 38.829251] kasan_save_stack+0x3c/0x68
[ 38.829911] kasan_save_track+0x20/0x40
[ 38.830600] kasan_save_free_info+0x4c/0x78
[ 38.831445] __kasan_mempool_poison_object+0xc0/0x150
[ 38.832185] mempool_free+0x28c/0x328
[ 38.832724] mempool_double_free_helper+0x100/0x2e0
[ 38.834045] mempool_kmalloc_double_free+0xb8/0x110
[ 38.835162] kunit_try_run_case+0x14c/0x3d0
[ 38.835784] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.836472] kthread+0x24c/0x2d0
[ 38.837071] ret_from_fork+0x10/0x20
[ 38.837697]
[ 38.838007] The buggy address belongs to the object at fff00000c69d9800
[ 38.838007] which belongs to the cache kmalloc-128 of size 128
[ 38.840676] The buggy address is located 0 bytes inside of
[ 38.840676] 128-byte region [fff00000c69d9800, fff00000c69d9880)
[ 38.842006]
[ 38.842494] The buggy address belongs to the physical page:
[ 38.843353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d9
[ 38.844437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 38.845728] page_type: f5(slab)
[ 38.846247] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 38.847654] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 38.848362] page dumped because: kasan: bad access detected
[ 38.849098]
[ 38.849387] Memory state around the buggy address:
[ 38.850793] fff00000c69d9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 38.852498] fff00000c69d9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.853402] >fff00000c69d9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 38.854188] ^
[ 38.854798] fff00000c69d9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.856676] fff00000c69d9900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 38.857460] ==================================================================
Home
[ 38.918633] ==================================================================
[ 38.921066] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[ 38.921799] Free of addr fff00000c6a28000 by task kunit_try_catch/227
[ 38.922565]
[ 38.923039] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.925730] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.926990] Hardware name: linux,dummy-virt (DT)
[ 38.927676] Call trace:
[ 38.928046] show_stack+0x20/0x38 (C)
[ 38.928759] dump_stack_lvl+0x8c/0xd0
[ 38.929679] print_report+0x118/0x5e0
[ 38.930212] kasan_report_invalid_free+0xb0/0xd8
[ 38.931228] __kasan_mempool_poison_pages+0xe0/0xe8
[ 38.931925] mempool_free+0x24c/0x328
[ 38.932812] mempool_double_free_helper+0x150/0x2e0
[ 38.934041] mempool_page_alloc_double_free+0xb4/0x110
[ 38.935122] kunit_try_run_case+0x14c/0x3d0
[ 38.935658] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.936217] kthread+0x24c/0x2d0
[ 38.937177] ret_from_fork+0x10/0x20
[ 38.938018]
[ 38.938549] The buggy address belongs to the physical page:
[ 38.939243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a28
[ 38.940798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 38.942163] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 38.943994] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 38.945122] page dumped because: kasan: bad access detected
[ 38.945756]
[ 38.946172] Memory state around the buggy address:
[ 38.947369] fff00000c6a27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.948791] fff00000c6a27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.950699] >fff00000c6a28000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.951875] ^
[ 38.952264] fff00000c6a28080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.952874] fff00000c6a28100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.954377] ==================================================================
Home
[ 38.868645] ==================================================================
[ 38.869958] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[ 38.870884] Free of addr fff00000c6a5c000 by task kunit_try_catch/225
[ 38.871670]
[ 38.872085] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.873169] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.874489] Hardware name: linux,dummy-virt (DT)
[ 38.876097] Call trace:
[ 38.876901] show_stack+0x20/0x38 (C)
[ 38.877961] dump_stack_lvl+0x8c/0xd0
[ 38.878558] print_report+0x118/0x5e0
[ 38.879231] kasan_report_invalid_free+0xb0/0xd8
[ 38.880407] __kasan_mempool_poison_object+0x14c/0x150
[ 38.881238] mempool_free+0x28c/0x328
[ 38.881873] mempool_double_free_helper+0x150/0x2e0
[ 38.882592] mempool_kmalloc_large_double_free+0xb8/0x110
[ 38.883736] kunit_try_run_case+0x14c/0x3d0
[ 38.884679] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.885493] kthread+0x24c/0x2d0
[ 38.886092] ret_from_fork+0x10/0x20
[ 38.886757]
[ 38.887147] The buggy address belongs to the physical page:
[ 38.888355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a5c
[ 38.889842] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 38.891310] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 38.892244] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 38.893308] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 38.894298] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 38.895319] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 38.896633] head: 0bfffe0000000002 ffffc1ffc31a9701 ffffffffffffffff 0000000000000000
[ 38.897747] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 38.899147] page dumped because: kasan: bad access detected
[ 38.899971]
[ 38.900504] Memory state around the buggy address:
[ 38.901297] fff00000c6a5bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.902267] fff00000c6a5bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.903757] >fff00000c6a5c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.904921] ^
[ 38.905454] fff00000c6a5c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.906489] fff00000c6a5c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.907876] ==================================================================
Home
[ 39.084585] ==================================================================
[ 39.086087] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[ 39.087153] Read of size 1 at addr ffffb13a5dab202d by task kunit_try_catch/233
[ 39.087948]
[ 39.088508] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.089816] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.090314] Hardware name: linux,dummy-virt (DT)
[ 39.090988] Call trace:
[ 39.091474] show_stack+0x20/0x38 (C)
[ 39.092068] dump_stack_lvl+0x8c/0xd0
[ 39.092667] print_report+0x2fc/0x5e0
[ 39.093197] kasan_report+0xc8/0x118
[ 39.093928] __asan_report_load1_noabort+0x20/0x30
[ 39.094475] kasan_global_oob_right+0x230/0x270
[ 39.095285] kunit_try_run_case+0x14c/0x3d0
[ 39.095979] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.096806] kthread+0x24c/0x2d0
[ 39.097436] ret_from_fork+0x10/0x20
[ 39.098037]
[ 39.098456] The buggy address belongs to the variable:
[ 39.099235] global_array+0xd/0x40
[ 39.099879]
[ 39.100325] The buggy address belongs to the virtual mapping at
[ 39.100325] [ffffb13a5be10000, ffffb13a5db71000) created by:
[ 39.100325] paging_init+0x668/0x7c8
[ 39.102477]
[ 39.103246] The buggy address belongs to the physical page:
[ 39.104086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478b2
[ 39.105058] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[ 39.106012] raw: 03fffe0000002000 ffffc1ffc01e2c88 ffffc1ffc01e2c88 0000000000000000
[ 39.107046] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 39.107983] page dumped because: kasan: bad access detected
[ 39.108769]
[ 39.109171] Memory state around the buggy address:
[ 39.109721] ffffb13a5dab1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 39.110719] ffffb13a5dab1f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[ 39.111575] >ffffb13a5dab2000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[ 39.112424] ^
[ 39.113098] ffffb13a5dab2080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[ 39.114027] ffffb13a5dab2100: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[ 39.114901] ==================================================================
Home
[ 34.772690] ==================================================================
[ 34.774407] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[ 34.776854] Free of addr fff00000c6814001 by task kunit_try_catch/138
[ 34.777755]
[ 34.778252] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.779452] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.780845] Hardware name: linux,dummy-virt (DT)
[ 34.781507] Call trace:
[ 34.782262] show_stack+0x20/0x38 (C)
[ 34.783177] dump_stack_lvl+0x8c/0xd0
[ 34.784300] print_report+0x118/0x5e0
[ 34.784940] kasan_report_invalid_free+0xb0/0xd8
[ 34.785645] __kasan_kfree_large+0x5c/0xa8
[ 34.786275] free_large_kmalloc+0x58/0x140
[ 34.787258] kfree+0x270/0x3c8
[ 34.787920] kmalloc_large_invalid_free+0x108/0x270
[ 34.788594] kunit_try_run_case+0x14c/0x3d0
[ 34.789343] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.790239] kthread+0x24c/0x2d0
[ 34.790906] ret_from_fork+0x10/0x20
[ 34.792090]
[ 34.792693] The buggy address belongs to the physical page:
[ 34.793610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106814
[ 34.794637] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 34.796128] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 34.797054] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 34.798362] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 34.799167] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 34.800906] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 34.801753] head: 0bfffe0000000002 ffffc1ffc31a0501 ffffffffffffffff 0000000000000000
[ 34.802252] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 34.803129] page dumped because: kasan: bad access detected
[ 34.804313]
[ 34.804821] Memory state around the buggy address:
[ 34.805933] fff00000c6813f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.807730] fff00000c6813f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.809286] >fff00000c6814000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 34.810611] ^
[ 34.811146] fff00000c6814080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 34.812226] fff00000c6814100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 34.813086] ==================================================================
Home
[ 37.400708] ==================================================================
[ 37.401938] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[ 37.402996] Free of addr fff00000c61c2001 by task kunit_try_catch/199
[ 37.403798]
[ 37.404137] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 37.406102] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 37.406711] Hardware name: linux,dummy-virt (DT)
[ 37.408604] Call trace:
[ 37.409011] show_stack+0x20/0x38 (C)
[ 37.409782] dump_stack_lvl+0x8c/0xd0
[ 37.410410] print_report+0x118/0x5e0
[ 37.411595] kasan_report_invalid_free+0xb0/0xd8
[ 37.412260] check_slab_allocation+0xfc/0x108
[ 37.413113] __kasan_slab_pre_free+0x2c/0x48
[ 37.413714] kmem_cache_free+0xf0/0x470
[ 37.414403] kmem_cache_invalid_free+0x184/0x3b8
[ 37.415612] kunit_try_run_case+0x14c/0x3d0
[ 37.416194] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.417374] kthread+0x24c/0x2d0
[ 37.418574] ret_from_fork+0x10/0x20
[ 37.419584]
[ 37.420333] Allocated by task 199:
[ 37.420808] kasan_save_stack+0x3c/0x68
[ 37.421646] kasan_save_track+0x20/0x40
[ 37.422193] kasan_save_alloc_info+0x40/0x58
[ 37.423391] __kasan_slab_alloc+0xa8/0xb0
[ 37.423942] kmem_cache_alloc_noprof+0x108/0x398
[ 37.424683] kmem_cache_invalid_free+0x12c/0x3b8
[ 37.425455] kunit_try_run_case+0x14c/0x3d0
[ 37.426989] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.427843] kthread+0x24c/0x2d0
[ 37.428667] ret_from_fork+0x10/0x20
[ 37.429389]
[ 37.429756] The buggy address belongs to the object at fff00000c61c2000
[ 37.429756] which belongs to the cache test_cache of size 200
[ 37.431816] The buggy address is located 1 bytes inside of
[ 37.431816] 200-byte region [fff00000c61c2000, fff00000c61c20c8)
[ 37.434845]
[ 37.435739] The buggy address belongs to the physical page:
[ 37.436972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c2
[ 37.438146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 37.439255] page_type: f5(slab)
[ 37.440143] raw: 0bfffe0000000000 fff00000c5a86280 dead000000000122 0000000000000000
[ 37.442328] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[ 37.444307] page dumped because: kasan: bad access detected
[ 37.445157]
[ 37.445756] Memory state around the buggy address:
[ 37.446909] fff00000c61c1f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 37.448770] fff00000c61c1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.451000] >fff00000c61c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 37.452577] ^
[ 37.453657] fff00000c61c2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 37.455462] fff00000c61c2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.457436] ==================================================================
Home
[ 38.974681] ==================================================================
[ 38.976821] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[ 38.978080] Free of addr fff00000c69d9e01 by task kunit_try_catch/229
[ 38.979916]
[ 38.980427] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.982287] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.983550] Hardware name: linux,dummy-virt (DT)
[ 38.984252] Call trace:
[ 38.984789] show_stack+0x20/0x38 (C)
[ 38.985547] dump_stack_lvl+0x8c/0xd0
[ 38.986572] print_report+0x118/0x5e0
[ 38.987626] kasan_report_invalid_free+0xb0/0xd8
[ 38.988775] check_slab_allocation+0xfc/0x108
[ 38.989844] __kasan_mempool_poison_object+0x78/0x150
[ 38.990621] mempool_free+0x28c/0x328
[ 38.992016] mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[ 38.992660] mempool_kmalloc_invalid_free+0xb8/0x110
[ 38.993618] kunit_try_run_case+0x14c/0x3d0
[ 38.994442] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.995646] kthread+0x24c/0x2d0
[ 38.996301] ret_from_fork+0x10/0x20
[ 38.996947]
[ 38.997399] Allocated by task 229:
[ 38.997884] kasan_save_stack+0x3c/0x68
[ 38.998458] kasan_save_track+0x20/0x40
[ 38.998984] kasan_save_alloc_info+0x40/0x58
[ 38.999731] __kasan_mempool_unpoison_object+0x11c/0x180
[ 39.000932] remove_element+0x130/0x1f8
[ 39.001553] mempool_alloc_preallocated+0x58/0xc0
[ 39.002432] mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[ 39.003836] mempool_kmalloc_invalid_free+0xb8/0x110
[ 39.004748] kunit_try_run_case+0x14c/0x3d0
[ 39.005578] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.006460] kthread+0x24c/0x2d0
[ 39.007719] ret_from_fork+0x10/0x20
[ 39.008215]
[ 39.008574] The buggy address belongs to the object at fff00000c69d9e00
[ 39.008574] which belongs to the cache kmalloc-128 of size 128
[ 39.009820] The buggy address is located 1 bytes inside of
[ 39.009820] 128-byte region [fff00000c69d9e00, fff00000c69d9e80)
[ 39.011112]
[ 39.011602] The buggy address belongs to the physical page:
[ 39.012277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d9
[ 39.013969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.015190] page_type: f5(slab)
[ 39.015912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 39.016929] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 39.017925] page dumped because: kasan: bad access detected
[ 39.018730]
[ 39.019725] Memory state around the buggy address:
[ 39.020488] fff00000c69d9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 39.021479] fff00000c69d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.022468] >fff00000c69d9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 39.023701] ^
[ 39.023988] fff00000c69d9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.024412] fff00000c69d9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 39.024851] ==================================================================
Home
[ 39.038605] ==================================================================
[ 39.039971] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[ 39.041179] Free of addr fff00000c6a28001 by task kunit_try_catch/231
[ 39.042710]
[ 39.043097] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.044299] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.045016] Hardware name: linux,dummy-virt (DT)
[ 39.045883] Call trace:
[ 39.046329] show_stack+0x20/0x38 (C)
[ 39.047126] dump_stack_lvl+0x8c/0xd0
[ 39.047884] print_report+0x118/0x5e0
[ 39.048697] kasan_report_invalid_free+0xb0/0xd8
[ 39.049568] __kasan_mempool_poison_object+0xfc/0x150
[ 39.050250] mempool_free+0x28c/0x328
[ 39.050904] mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[ 39.051709] mempool_kmalloc_large_invalid_free+0xb8/0x110
[ 39.052104] kunit_try_run_case+0x14c/0x3d0
[ 39.052465] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.053422] kthread+0x24c/0x2d0
[ 39.054011] ret_from_fork+0x10/0x20
[ 39.054995]
[ 39.055429] The buggy address belongs to the physical page:
[ 39.056150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a28
[ 39.057645] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 39.058686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 39.059693] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 39.060539] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 39.061557] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 39.062456] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 39.063492] head: 0bfffe0000000002 ffffc1ffc31a8a01 ffffffffffffffff 0000000000000000
[ 39.064447] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 39.065337] page dumped because: kasan: bad access detected
[ 39.066037]
[ 39.066405] Memory state around the buggy address:
[ 39.067138] fff00000c6a27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 39.068190] fff00000c6a27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 39.069087] >fff00000c6a28000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 39.070090] ^
[ 39.070563] fff00000c6a28080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 39.071336] fff00000c6a28100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 39.072196] ==================================================================
Home
[ 36.231855] ==================================================================
[ 36.233467] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[ 36.234416] Read of size 18446744073709551614 at addr fff00000c618f984 by task kunit_try_catch/168
[ 36.235941]
[ 36.236389] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.237615] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.238169] Hardware name: linux,dummy-virt (DT)
[ 36.238693] Call trace:
[ 36.239218] show_stack+0x20/0x38 (C)
[ 36.239880] dump_stack_lvl+0x8c/0xd0
[ 36.240460] print_report+0x118/0x5e0
[ 36.241291] kasan_report+0xc8/0x118
[ 36.242060] kasan_check_range+0x100/0x1a8
[ 36.242783] __asan_memmove+0x3c/0x98
[ 36.243362] kmalloc_memmove_negative_size+0x154/0x2e0
[ 36.244093] kunit_try_run_case+0x14c/0x3d0
[ 36.244836] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.245582] kthread+0x24c/0x2d0
[ 36.246286] ret_from_fork+0x10/0x20
[ 36.246908]
[ 36.247211] Allocated by task 168:
[ 36.247820] kasan_save_stack+0x3c/0x68
[ 36.248490] kasan_save_track+0x20/0x40
[ 36.249304] kasan_save_alloc_info+0x40/0x58
[ 36.249892] __kasan_kmalloc+0xd4/0xd8
[ 36.250628] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.251360] kmalloc_memmove_negative_size+0xb0/0x2e0
[ 36.252175] kunit_try_run_case+0x14c/0x3d0
[ 36.252844] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.253683] kthread+0x24c/0x2d0
[ 36.254161] ret_from_fork+0x10/0x20
[ 36.254847]
[ 36.255259] The buggy address belongs to the object at fff00000c618f980
[ 36.255259] which belongs to the cache kmalloc-64 of size 64
[ 36.256706] The buggy address is located 4 bytes inside of
[ 36.256706] 64-byte region [fff00000c618f980, fff00000c618f9c0)
[ 36.258151]
[ 36.258565] The buggy address belongs to the physical page:
[ 36.259238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10618f
[ 36.260332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.261162] page_type: f5(slab)
[ 36.261698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 36.262874] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 36.263785] page dumped because: kasan: bad access detected
[ 36.264569]
[ 36.264847] Memory state around the buggy address:
[ 36.265563] fff00000c618f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 36.266595] fff00000c618f900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 36.267487] >fff00000c618f980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 36.268367] ^
[ 36.268917] fff00000c618fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.269862] fff00000c618fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.270693] ==================================================================
Home
[ 43.593741] ==================================================================
[ 43.596736] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[ 43.597840] Read of size 8 at addr fff00000c69d2a78 by task kunit_try_catch/269
[ 43.598831]
[ 43.599355] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.600634] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.601441] Hardware name: linux,dummy-virt (DT)
[ 43.601974] Call trace:
[ 43.602428] show_stack+0x20/0x38 (C)
[ 43.602943] dump_stack_lvl+0x8c/0xd0
[ 43.603776] print_report+0x118/0x5e0
[ 43.604937] kasan_report+0xc8/0x118
[ 43.605583] __asan_report_load8_noabort+0x20/0x30
[ 43.606246] copy_to_kernel_nofault+0x204/0x250
[ 43.607784] copy_to_kernel_nofault_oob+0x158/0x418
[ 43.608594] kunit_try_run_case+0x14c/0x3d0
[ 43.609160] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.610086] kthread+0x24c/0x2d0
[ 43.610639] ret_from_fork+0x10/0x20
[ 43.611312]
[ 43.611723] Allocated by task 269:
[ 43.612500] kasan_save_stack+0x3c/0x68
[ 43.613597] kasan_save_track+0x20/0x40
[ 43.614480] kasan_save_alloc_info+0x40/0x58
[ 43.615233] __kasan_kmalloc+0xd4/0xd8
[ 43.616304] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.616862] copy_to_kernel_nofault_oob+0xc8/0x418
[ 43.617885] kunit_try_run_case+0x14c/0x3d0
[ 43.619438] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.620724] kthread+0x24c/0x2d0
[ 43.621385] ret_from_fork+0x10/0x20
[ 43.622031]
[ 43.622345] The buggy address belongs to the object at fff00000c69d2a00
[ 43.622345] which belongs to the cache kmalloc-128 of size 128
[ 43.623919] The buggy address is located 0 bytes to the right of
[ 43.623919] allocated 120-byte region [fff00000c69d2a00, fff00000c69d2a78)
[ 43.625512]
[ 43.626240] The buggy address belongs to the physical page:
[ 43.627090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[ 43.628460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.629507] page_type: f5(slab)
[ 43.630068] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 43.631754] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 43.632468] page dumped because: kasan: bad access detected
[ 43.633613]
[ 43.634037] Memory state around the buggy address:
[ 43.634770] fff00000c69d2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 43.636400] fff00000c69d2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.637366] >fff00000c69d2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 43.638045] ^
[ 43.639986] fff00000c69d2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.641328] fff00000c69d2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.642285] ==================================================================
Home
[ 43.646087] ==================================================================
[ 43.647461] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[ 43.649255] Write of size 8 at addr fff00000c69d2a78 by task kunit_try_catch/269
[ 43.650474]
[ 43.651205] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.652629] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.653218] Hardware name: linux,dummy-virt (DT)
[ 43.653973] Call trace:
[ 43.654359] show_stack+0x20/0x38 (C)
[ 43.655177] dump_stack_lvl+0x8c/0xd0
[ 43.656374] print_report+0x118/0x5e0
[ 43.657070] kasan_report+0xc8/0x118
[ 43.657827] kasan_check_range+0x100/0x1a8
[ 43.658591] __kasan_check_write+0x20/0x30
[ 43.659186] copy_to_kernel_nofault+0x8c/0x250
[ 43.660309] copy_to_kernel_nofault_oob+0x1bc/0x418
[ 43.660998] kunit_try_run_case+0x14c/0x3d0
[ 43.661799] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.662580] kthread+0x24c/0x2d0
[ 43.663474] ret_from_fork+0x10/0x20
[ 43.664005]
[ 43.664470] Allocated by task 269:
[ 43.665186] kasan_save_stack+0x3c/0x68
[ 43.665902] kasan_save_track+0x20/0x40
[ 43.666463] kasan_save_alloc_info+0x40/0x58
[ 43.667437] __kasan_kmalloc+0xd4/0xd8
[ 43.667910] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.669566] copy_to_kernel_nofault_oob+0xc8/0x418
[ 43.671162] kunit_try_run_case+0x14c/0x3d0
[ 43.671571] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.671965] kthread+0x24c/0x2d0
[ 43.672234] ret_from_fork+0x10/0x20
[ 43.672629]
[ 43.673471] The buggy address belongs to the object at fff00000c69d2a00
[ 43.673471] which belongs to the cache kmalloc-128 of size 128
[ 43.676251] The buggy address is located 0 bytes to the right of
[ 43.676251] allocated 120-byte region [fff00000c69d2a00, fff00000c69d2a78)
[ 43.678013]
[ 43.678417] The buggy address belongs to the physical page:
[ 43.679189] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[ 43.681170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.681778] page_type: f5(slab)
[ 43.682747] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 43.684242] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 43.685205] page dumped because: kasan: bad access detected
[ 43.686112]
[ 43.686449] Memory state around the buggy address:
[ 43.687244] fff00000c69d2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 43.689011] fff00000c69d2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.690632] >fff00000c69d2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 43.691912] ^
[ 43.692852] fff00000c69d2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.693831] fff00000c69d2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.694858] ==================================================================
Home
[ 43.883824] ==================================================================
[ 43.884899] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[ 43.885388] Read of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[ 43.885848]
[ 43.886041] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.886633] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.887758] Hardware name: linux,dummy-virt (DT)
[ 43.888832] Call trace:
[ 43.889467] show_stack+0x20/0x38 (C)
[ 43.890480] dump_stack_lvl+0x8c/0xd0
[ 43.891344] print_report+0x118/0x5e0
[ 43.891924] kasan_report+0xc8/0x118
[ 43.892241] kasan_check_range+0x100/0x1a8
[ 43.892620] __kasan_check_read+0x20/0x30
[ 43.893361] copy_user_test_oob+0x3c8/0xec0
[ 43.894126] kunit_try_run_case+0x14c/0x3d0
[ 43.894944] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.895914] kthread+0x24c/0x2d0
[ 43.896705] ret_from_fork+0x10/0x20
[ 43.897580]
[ 43.898129] Allocated by task 273:
[ 43.898645] kasan_save_stack+0x3c/0x68
[ 43.899239] kasan_save_track+0x20/0x40
[ 43.899896] kasan_save_alloc_info+0x40/0x58
[ 43.900412] __kasan_kmalloc+0xd4/0xd8
[ 43.901110] __kmalloc_noprof+0x188/0x4c8
[ 43.901816] kunit_kmalloc_array+0x34/0x88
[ 43.902407] copy_user_test_oob+0xac/0xec0
[ 43.903125] kunit_try_run_case+0x14c/0x3d0
[ 43.903901] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.904643] kthread+0x24c/0x2d0
[ 43.905153] ret_from_fork+0x10/0x20
[ 43.905679]
[ 43.906101] The buggy address belongs to the object at fff00000c69d2d00
[ 43.906101] which belongs to the cache kmalloc-128 of size 128
[ 43.907466] The buggy address is located 0 bytes inside of
[ 43.907466] allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[ 43.908878]
[ 43.909211] The buggy address belongs to the physical page:
[ 43.910130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[ 43.911058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.912075] page_type: f5(slab)
[ 43.912637] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 43.913839] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 43.914859] page dumped because: kasan: bad access detected
[ 43.915552]
[ 43.915929] Memory state around the buggy address:
[ 43.916553] fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 43.917479] fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.918342] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 43.919285] ^
[ 43.920089] fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.920990] fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.921915] ==================================================================
---
[ 43.784611] ==================================================================
[ 43.785436] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[ 43.786412] Read of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[ 43.787717]
[ 43.788191] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.789423] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.790150] Hardware name: linux,dummy-virt (DT)
[ 43.791558] Call trace:
[ 43.792155] show_stack+0x20/0x38 (C)
[ 43.792786] dump_stack_lvl+0x8c/0xd0
[ 43.793334] print_report+0x118/0x5e0
[ 43.794017] kasan_report+0xc8/0x118
[ 43.794721] kasan_check_range+0x100/0x1a8
[ 43.795427] __kasan_check_read+0x20/0x30
[ 43.796433] copy_user_test_oob+0x728/0xec0
[ 43.797046] kunit_try_run_case+0x14c/0x3d0
[ 43.797708] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.798396] kthread+0x24c/0x2d0
[ 43.799581] ret_from_fork+0x10/0x20
[ 43.800137]
[ 43.800502] Allocated by task 273:
[ 43.801187] kasan_save_stack+0x3c/0x68
[ 43.801978] kasan_save_track+0x20/0x40
[ 43.802736] kasan_save_alloc_info+0x40/0x58
[ 43.804306] __kasan_kmalloc+0xd4/0xd8
[ 43.804845] __kmalloc_noprof+0x188/0x4c8
[ 43.805326] kunit_kmalloc_array+0x34/0x88
[ 43.806480] copy_user_test_oob+0xac/0xec0
[ 43.807678] kunit_try_run_case+0x14c/0x3d0
[ 43.808308] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.809117] kthread+0x24c/0x2d0
[ 43.809953] ret_from_fork+0x10/0x20
[ 43.810751]
[ 43.811346] The buggy address belongs to the object at fff00000c69d2d00
[ 43.811346] which belongs to the cache kmalloc-128 of size 128
[ 43.812829] The buggy address is located 0 bytes inside of
[ 43.812829] allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[ 43.814684]
[ 43.815596] The buggy address belongs to the physical page:
[ 43.816467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[ 43.817820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.819245] page_type: f5(slab)
[ 43.819778] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 43.821113] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 43.822029] page dumped because: kasan: bad access detected
[ 43.822738]
[ 43.823470] Memory state around the buggy address:
[ 43.824126] fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 43.825097] fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.826647] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 43.828316] ^
[ 43.829546] fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.830724] fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.832013] ==================================================================
---
[ 43.970054] ==================================================================
[ 43.971266] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[ 43.972293] Read of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[ 43.973291]
[ 43.973842] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.975047] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.975760] Hardware name: linux,dummy-virt (DT)
[ 43.976487] Call trace:
[ 43.977012] show_stack+0x20/0x38 (C)
[ 43.977882] dump_stack_lvl+0x8c/0xd0
[ 43.978583] print_report+0x118/0x5e0
[ 43.979263] kasan_report+0xc8/0x118
[ 43.979942] kasan_check_range+0x100/0x1a8
[ 43.980677] __kasan_check_read+0x20/0x30
[ 43.981391] copy_user_test_oob+0x4a0/0xec0
[ 43.982125] kunit_try_run_case+0x14c/0x3d0
[ 43.982976] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.983842] kthread+0x24c/0x2d0
[ 43.984457] ret_from_fork+0x10/0x20
[ 43.985099]
[ 43.985422] Allocated by task 273:
[ 43.986137] kasan_save_stack+0x3c/0x68
[ 43.986856] kasan_save_track+0x20/0x40
[ 43.987564] kasan_save_alloc_info+0x40/0x58
[ 43.988306] __kasan_kmalloc+0xd4/0xd8
[ 43.988936] __kmalloc_noprof+0x188/0x4c8
[ 43.989651] kunit_kmalloc_array+0x34/0x88
[ 43.990303] copy_user_test_oob+0xac/0xec0
[ 43.990963] kunit_try_run_case+0x14c/0x3d0
[ 43.991717] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.992573] kthread+0x24c/0x2d0
[ 43.993144] ret_from_fork+0x10/0x20
[ 43.993863]
[ 43.994220] The buggy address belongs to the object at fff00000c69d2d00
[ 43.994220] which belongs to the cache kmalloc-128 of size 128
[ 43.995855] The buggy address is located 0 bytes inside of
[ 43.995855] allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[ 43.997386]
[ 43.997939] The buggy address belongs to the physical page:
[ 43.998730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[ 43.999870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 44.000797] page_type: f5(slab)
[ 44.001362] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 44.002437] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 44.003487] page dumped because: kasan: bad access detected
[ 44.004391]
[ 44.004771] Memory state around the buggy address:
[ 44.005610] fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 44.006650] fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.007749] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 44.008667] ^
[ 44.009652] fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.010738] fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.011682] ==================================================================
Home
[ 43.840727] ==================================================================
[ 43.841604] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[ 43.842626] Write of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[ 43.843621]
[ 43.844015] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.845237] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.846084] Hardware name: linux,dummy-virt (DT)
[ 43.846981] Call trace:
[ 43.847545] show_stack+0x20/0x38 (C)
[ 43.848184] dump_stack_lvl+0x8c/0xd0
[ 43.848883] print_report+0x118/0x5e0
[ 43.849653] kasan_report+0xc8/0x118
[ 43.850345] kasan_check_range+0x100/0x1a8
[ 43.851132] __kasan_check_write+0x20/0x30
[ 43.851927] copy_user_test_oob+0x35c/0xec0
[ 43.852701] kunit_try_run_case+0x14c/0x3d0
[ 43.853478] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.854290] kthread+0x24c/0x2d0
[ 43.854886] ret_from_fork+0x10/0x20
[ 43.855673]
[ 43.856067] Allocated by task 273:
[ 43.856808] kasan_save_stack+0x3c/0x68
[ 43.857419] kasan_save_track+0x20/0x40
[ 43.858225] kasan_save_alloc_info+0x40/0x58
[ 43.858901] __kasan_kmalloc+0xd4/0xd8
[ 43.859575] __kmalloc_noprof+0x188/0x4c8
[ 43.860169] kunit_kmalloc_array+0x34/0x88
[ 43.860727] copy_user_test_oob+0xac/0xec0
[ 43.861556] kunit_try_run_case+0x14c/0x3d0
[ 43.862214] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.862896] kthread+0x24c/0x2d0
[ 43.863574] ret_from_fork+0x10/0x20
[ 43.864086]
[ 43.864449] The buggy address belongs to the object at fff00000c69d2d00
[ 43.864449] which belongs to the cache kmalloc-128 of size 128
[ 43.865804] The buggy address is located 0 bytes inside of
[ 43.865804] allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[ 43.867398]
[ 43.867804] The buggy address belongs to the physical page:
[ 43.868652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[ 43.869592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.870573] page_type: f5(slab)
[ 43.871065] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 43.872414] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 43.873596] page dumped because: kasan: bad access detected
[ 43.874566]
[ 43.874950] Memory state around the buggy address:
[ 43.875579] fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 43.876428] fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.877742] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 43.878688] ^
[ 43.879663] fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.880889] fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.881886] ==================================================================
---
[ 43.729360] ==================================================================
[ 43.731745] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[ 43.732893] Write of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[ 43.733769]
[ 43.734211] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.735736] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.736463] Hardware name: linux,dummy-virt (DT)
[ 43.737754] Call trace:
[ 43.738173] show_stack+0x20/0x38 (C)
[ 43.738831] dump_stack_lvl+0x8c/0xd0
[ 43.739555] print_report+0x118/0x5e0
[ 43.740170] kasan_report+0xc8/0x118
[ 43.740956] kasan_check_range+0x100/0x1a8
[ 43.741548] __kasan_check_write+0x20/0x30
[ 43.742298] copy_user_test_oob+0x234/0xec0
[ 43.743229] kunit_try_run_case+0x14c/0x3d0
[ 43.744282] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.745110] kthread+0x24c/0x2d0
[ 43.745705] ret_from_fork+0x10/0x20
[ 43.746206]
[ 43.746501] Allocated by task 273:
[ 43.747273] kasan_save_stack+0x3c/0x68
[ 43.748127] kasan_save_track+0x20/0x40
[ 43.748951] kasan_save_alloc_info+0x40/0x58
[ 43.749564] __kasan_kmalloc+0xd4/0xd8
[ 43.750177] __kmalloc_noprof+0x188/0x4c8
[ 43.750916] kunit_kmalloc_array+0x34/0x88
[ 43.751857] copy_user_test_oob+0xac/0xec0
[ 43.752559] kunit_try_run_case+0x14c/0x3d0
[ 43.753056] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.754384] kthread+0x24c/0x2d0
[ 43.754880] ret_from_fork+0x10/0x20
[ 43.755765]
[ 43.756087] The buggy address belongs to the object at fff00000c69d2d00
[ 43.756087] which belongs to the cache kmalloc-128 of size 128
[ 43.757833] The buggy address is located 0 bytes inside of
[ 43.757833] allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[ 43.759412]
[ 43.759905] The buggy address belongs to the physical page:
[ 43.761458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[ 43.763145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.764026] page_type: f5(slab)
[ 43.764513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 43.765073] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 43.765612] page dumped because: kasan: bad access detected
[ 43.766627]
[ 43.767207] Memory state around the buggy address:
[ 43.768228] fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 43.769654] fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.770386] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 43.772014] ^
[ 43.773130] fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.774148] fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.775970] ==================================================================
---
[ 43.924588] ==================================================================
[ 43.925603] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[ 43.927805] Write of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[ 43.928562]
[ 43.929053] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.930706] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.931374] Hardware name: linux,dummy-virt (DT)
[ 43.932154] Call trace:
[ 43.932679] show_stack+0x20/0x38 (C)
[ 43.933468] dump_stack_lvl+0x8c/0xd0
[ 43.934372] print_report+0x118/0x5e0
[ 43.935012] kasan_report+0xc8/0x118
[ 43.935820] kasan_check_range+0x100/0x1a8
[ 43.936467] __kasan_check_write+0x20/0x30
[ 43.937194] copy_user_test_oob+0x434/0xec0
[ 43.937906] kunit_try_run_case+0x14c/0x3d0
[ 43.938645] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.939467] kthread+0x24c/0x2d0
[ 43.940120] ret_from_fork+0x10/0x20
[ 43.940783]
[ 43.941137] Allocated by task 273:
[ 43.941825] kasan_save_stack+0x3c/0x68
[ 43.942542] kasan_save_track+0x20/0x40
[ 43.943257] kasan_save_alloc_info+0x40/0x58
[ 43.943899] __kasan_kmalloc+0xd4/0xd8
[ 43.944610] __kmalloc_noprof+0x188/0x4c8
[ 43.945326] kunit_kmalloc_array+0x34/0x88
[ 43.946007] copy_user_test_oob+0xac/0xec0
[ 43.946764] kunit_try_run_case+0x14c/0x3d0
[ 43.947486] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.948360] kthread+0x24c/0x2d0
[ 43.948933] ret_from_fork+0x10/0x20
[ 43.949658]
[ 43.950078] The buggy address belongs to the object at fff00000c69d2d00
[ 43.950078] which belongs to the cache kmalloc-128 of size 128
[ 43.951654] The buggy address is located 0 bytes inside of
[ 43.951654] allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[ 43.953181]
[ 43.953665] The buggy address belongs to the physical page:
[ 43.955049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[ 43.955988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.956957] page_type: f5(slab)
[ 43.957738] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 43.958808] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 43.959809] page dumped because: kasan: bad access detected
[ 43.960590]
[ 43.960969] Memory state around the buggy address:
[ 43.961787] fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 43.962799] fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.963872] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 43.964893] ^
[ 43.965872] fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.966844] fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.967825] ==================================================================
Home
[ 42.305696] ==================================================================
[ 42.306563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[ 42.308217] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.309122]
[ 42.309439] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.312095] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.312745] Hardware name: linux,dummy-virt (DT)
[ 42.313483] Call trace:
[ 42.313890] show_stack+0x20/0x38 (C)
[ 42.314481] dump_stack_lvl+0x8c/0xd0
[ 42.315196] print_report+0x118/0x5e0
[ 42.315903] kasan_report+0xc8/0x118
[ 42.316590] __asan_report_store8_noabort+0x20/0x30
[ 42.317223] kasan_atomics_helper+0x3e5c/0x4858
[ 42.318051] kasan_atomics+0x198/0x2e8
[ 42.319019] kunit_try_run_case+0x14c/0x3d0
[ 42.319707] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.320508] kthread+0x24c/0x2d0
[ 42.321075] ret_from_fork+0x10/0x20
[ 42.321633]
[ 42.322048] Allocated by task 253:
[ 42.322618] kasan_save_stack+0x3c/0x68
[ 42.323202] kasan_save_track+0x20/0x40
[ 42.323979] kasan_save_alloc_info+0x40/0x58
[ 42.324684] __kasan_kmalloc+0xd4/0xd8
[ 42.325382] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.326144] kasan_atomics+0xb8/0x2e8
[ 42.326677] kunit_try_run_case+0x14c/0x3d0
[ 42.327464] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.328160] kthread+0x24c/0x2d0
[ 42.328817] ret_from_fork+0x10/0x20
[ 42.329503]
[ 42.329824] The buggy address belongs to the object at fff00000c6998980
[ 42.329824] which belongs to the cache kmalloc-64 of size 64
[ 42.331355] The buggy address is located 0 bytes to the right of
[ 42.331355] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.332953]
[ 42.333359] The buggy address belongs to the physical page:
[ 42.334277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.335123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.336163] page_type: f5(slab)
[ 42.336715] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.337657] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.338684] page dumped because: kasan: bad access detected
[ 42.339436]
[ 42.339774] Memory state around the buggy address:
[ 42.340342] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.341380] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.342373] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.343301] ^
[ 42.343904] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.344883] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.345685] ==================================================================
---
[ 40.675850] ==================================================================
[ 40.676988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[ 40.677978] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 40.679397]
[ 40.679969] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.683150] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.684664] Hardware name: linux,dummy-virt (DT)
[ 40.685481] Call trace:
[ 40.686154] show_stack+0x20/0x38 (C)
[ 40.687171] dump_stack_lvl+0x8c/0xd0
[ 40.687946] print_report+0x118/0x5e0
[ 40.688578] kasan_report+0xc8/0x118
[ 40.689119] __asan_report_store4_noabort+0x20/0x30
[ 40.690000] kasan_atomics_helper+0x3f7c/0x4858
[ 40.690698] kasan_atomics+0x198/0x2e8
[ 40.691830] kunit_try_run_case+0x14c/0x3d0
[ 40.692535] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.693346] kthread+0x24c/0x2d0
[ 40.693868] ret_from_fork+0x10/0x20
[ 40.694482]
[ 40.694845] Allocated by task 253:
[ 40.696102] kasan_save_stack+0x3c/0x68
[ 40.697560] kasan_save_track+0x20/0x40
[ 40.698276] kasan_save_alloc_info+0x40/0x58
[ 40.699016] __kasan_kmalloc+0xd4/0xd8
[ 40.699845] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.700698] kasan_atomics+0xb8/0x2e8
[ 40.701117] kunit_try_run_case+0x14c/0x3d0
[ 40.701851] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.703246] kthread+0x24c/0x2d0
[ 40.703800] ret_from_fork+0x10/0x20
[ 40.704327]
[ 40.704704] The buggy address belongs to the object at fff00000c6998980
[ 40.704704] which belongs to the cache kmalloc-64 of size 64
[ 40.706120] The buggy address is located 0 bytes to the right of
[ 40.706120] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 40.708590]
[ 40.708982] The buggy address belongs to the physical page:
[ 40.709674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 40.710434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.711189] page_type: f5(slab)
[ 40.712355] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 40.713791] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 40.715090] page dumped because: kasan: bad access detected
[ 40.715849]
[ 40.716316] Memory state around the buggy address:
[ 40.716956] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.717943] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.718820] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 40.720131] ^
[ 40.721126] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.722098] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.724044] ==================================================================
---
[ 40.978113] ==================================================================
[ 40.978970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[ 40.981497] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 40.982406]
[ 40.982745] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.984363] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.985138] Hardware name: linux,dummy-virt (DT)
[ 40.986008] Call trace:
[ 40.986589] show_stack+0x20/0x38 (C)
[ 40.987559] dump_stack_lvl+0x8c/0xd0
[ 40.988421] print_report+0x118/0x5e0
[ 40.988970] kasan_report+0xc8/0x118
[ 40.989595] __asan_report_store4_noabort+0x20/0x30
[ 40.990462] kasan_atomics_helper+0x3f94/0x4858
[ 40.991087] kasan_atomics+0x198/0x2e8
[ 40.991999] kunit_try_run_case+0x14c/0x3d0
[ 40.992908] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.993657] kthread+0x24c/0x2d0
[ 40.994280] ret_from_fork+0x10/0x20
[ 40.994908]
[ 40.995306] Allocated by task 253:
[ 40.995880] kasan_save_stack+0x3c/0x68
[ 40.996688] kasan_save_track+0x20/0x40
[ 40.997336] kasan_save_alloc_info+0x40/0x58
[ 40.998255] __kasan_kmalloc+0xd4/0xd8
[ 40.999004] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.999677] kasan_atomics+0xb8/0x2e8
[ 41.000580] kunit_try_run_case+0x14c/0x3d0
[ 41.001480] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.002030] kthread+0x24c/0x2d0
[ 41.002561] ret_from_fork+0x10/0x20
[ 41.003993]
[ 41.004695] The buggy address belongs to the object at fff00000c6998980
[ 41.004695] which belongs to the cache kmalloc-64 of size 64
[ 41.006436] The buggy address is located 0 bytes to the right of
[ 41.006436] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.008471]
[ 41.008790] The buggy address belongs to the physical page:
[ 41.010071] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.011612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.012803] page_type: f5(slab)
[ 41.013344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.014227] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.015679] page dumped because: kasan: bad access detected
[ 41.016942]
[ 41.017639] Memory state around the buggy address:
[ 41.018464] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.019755] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.021164] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.022397] ^
[ 41.023092] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.024812] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.025825] ==================================================================
Home
[ 43.361173] ==================================================================
[ 43.362187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[ 43.363259] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 43.364173]
[ 43.364735] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.365997] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.366945] Hardware name: linux,dummy-virt (DT)
[ 43.367716] Call trace:
[ 43.368306] show_stack+0x20/0x38 (C)
[ 43.369035] dump_stack_lvl+0x8c/0xd0
[ 43.369803] print_report+0x118/0x5e0
[ 43.370465] kasan_report+0xc8/0x118
[ 43.371129] __asan_report_load8_noabort+0x20/0x30
[ 43.371889] kasan_atomics_helper+0x3e20/0x4858
[ 43.372627] kasan_atomics+0x198/0x2e8
[ 43.373379] kunit_try_run_case+0x14c/0x3d0
[ 43.374087] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.374987] kthread+0x24c/0x2d0
[ 43.375607] ret_from_fork+0x10/0x20
[ 43.376269]
[ 43.376651] Allocated by task 253:
[ 43.377371] kasan_save_stack+0x3c/0x68
[ 43.378025] kasan_save_track+0x20/0x40
[ 43.378634] kasan_save_alloc_info+0x40/0x58
[ 43.379396] __kasan_kmalloc+0xd4/0xd8
[ 43.380267] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.380930] kasan_atomics+0xb8/0x2e8
[ 43.381467] kunit_try_run_case+0x14c/0x3d0
[ 43.382003] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.383040] kthread+0x24c/0x2d0
[ 43.383497] ret_from_fork+0x10/0x20
[ 43.384257]
[ 43.384703] The buggy address belongs to the object at fff00000c6998980
[ 43.384703] which belongs to the cache kmalloc-64 of size 64
[ 43.386090] The buggy address is located 0 bytes to the right of
[ 43.386090] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 43.387712]
[ 43.388088] The buggy address belongs to the physical page:
[ 43.388699] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 43.389841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.390758] page_type: f5(slab)
[ 43.391364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 43.392315] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 43.393284] page dumped because: kasan: bad access detected
[ 43.394089]
[ 43.394415] Memory state around the buggy address:
[ 43.395087] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.395943] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.396824] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 43.397768] ^
[ 43.398463] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.399439] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.400391] ==================================================================
---
[ 42.221391] ==================================================================
[ 42.222220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[ 42.223851] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.224873]
[ 42.225327] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.226405] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.227194] Hardware name: linux,dummy-virt (DT)
[ 42.227891] Call trace:
[ 42.228247] show_stack+0x20/0x38 (C)
[ 42.228934] dump_stack_lvl+0x8c/0xd0
[ 42.229660] print_report+0x118/0x5e0
[ 42.230214] kasan_report+0xc8/0x118
[ 42.230753] __asan_report_load8_noabort+0x20/0x30
[ 42.231432] kasan_atomics_helper+0x3f58/0x4858
[ 42.232257] kasan_atomics+0x198/0x2e8
[ 42.232823] kunit_try_run_case+0x14c/0x3d0
[ 42.233679] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.234386] kthread+0x24c/0x2d0
[ 42.235027] ret_from_fork+0x10/0x20
[ 42.235738]
[ 42.236051] Allocated by task 253:
[ 42.236509] kasan_save_stack+0x3c/0x68
[ 42.237247] kasan_save_track+0x20/0x40
[ 42.237860] kasan_save_alloc_info+0x40/0x58
[ 42.238749] __kasan_kmalloc+0xd4/0xd8
[ 42.239374] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.239919] kasan_atomics+0xb8/0x2e8
[ 42.240624] kunit_try_run_case+0x14c/0x3d0
[ 42.241563] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.242319] kthread+0x24c/0x2d0
[ 42.242780] ret_from_fork+0x10/0x20
[ 42.243454]
[ 42.244099] The buggy address belongs to the object at fff00000c6998980
[ 42.244099] which belongs to the cache kmalloc-64 of size 64
[ 42.245565] The buggy address is located 0 bytes to the right of
[ 42.245565] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.247032]
[ 42.247348] The buggy address belongs to the physical page:
[ 42.248059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.249300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.250179] page_type: f5(slab)
[ 42.250876] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.251879] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.252986] page dumped because: kasan: bad access detected
[ 42.253675]
[ 42.254055] Memory state around the buggy address:
[ 42.254733] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.255665] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.256612] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.257593] ^
[ 42.258170] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.259057] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.260053] ==================================================================
---
[ 43.271674] ==================================================================
[ 43.272619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[ 43.274812] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 43.276066]
[ 43.276457] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.278233] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.279027] Hardware name: linux,dummy-virt (DT)
[ 43.279922] Call trace:
[ 43.280563] show_stack+0x20/0x38 (C)
[ 43.281384] dump_stack_lvl+0x8c/0xd0
[ 43.282235] print_report+0x118/0x5e0
[ 43.283042] kasan_report+0xc8/0x118
[ 43.283623] __asan_report_load8_noabort+0x20/0x30
[ 43.284290] kasan_atomics_helper+0x3e10/0x4858
[ 43.284961] kasan_atomics+0x198/0x2e8
[ 43.285815] kunit_try_run_case+0x14c/0x3d0
[ 43.286433] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.287159] kthread+0x24c/0x2d0
[ 43.287697] ret_from_fork+0x10/0x20
[ 43.288468]
[ 43.288828] Allocated by task 253:
[ 43.289453] kasan_save_stack+0x3c/0x68
[ 43.290188] kasan_save_track+0x20/0x40
[ 43.290838] kasan_save_alloc_info+0x40/0x58
[ 43.291644] __kasan_kmalloc+0xd4/0xd8
[ 43.292355] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.293117] kasan_atomics+0xb8/0x2e8
[ 43.293816] kunit_try_run_case+0x14c/0x3d0
[ 43.294496] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.295294] kthread+0x24c/0x2d0
[ 43.295849] ret_from_fork+0x10/0x20
[ 43.296559]
[ 43.296931] The buggy address belongs to the object at fff00000c6998980
[ 43.296931] which belongs to the cache kmalloc-64 of size 64
[ 43.298583] The buggy address is located 0 bytes to the right of
[ 43.298583] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 43.300178]
[ 43.300697] The buggy address belongs to the physical page:
[ 43.301470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 43.302655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.303577] page_type: f5(slab)
[ 43.304097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 43.305189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 43.306211] page dumped because: kasan: bad access detected
[ 43.307053]
[ 43.307386] Memory state around the buggy address:
[ 43.308202] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.309314] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.310417] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 43.311423] ^
[ 43.312138] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.313156] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.314129] ==================================================================
---
[ 40.873039] ==================================================================
[ 40.873992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[ 40.875550] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 40.878254]
[ 40.878709] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.880387] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.880985] Hardware name: linux,dummy-virt (DT)
[ 40.881994] Call trace:
[ 40.882321] show_stack+0x20/0x38 (C)
[ 40.883547] dump_stack_lvl+0x8c/0xd0
[ 40.884159] print_report+0x118/0x5e0
[ 40.884774] kasan_report+0xc8/0x118
[ 40.886039] __asan_report_load4_noabort+0x20/0x30
[ 40.886758] kasan_atomics_helper+0x40fc/0x4858
[ 40.887539] kasan_atomics+0x198/0x2e8
[ 40.888489] kunit_try_run_case+0x14c/0x3d0
[ 40.889264] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.890042] kthread+0x24c/0x2d0
[ 40.890678] ret_from_fork+0x10/0x20
[ 40.891391]
[ 40.892390] Allocated by task 253:
[ 40.892839] kasan_save_stack+0x3c/0x68
[ 40.893676] kasan_save_track+0x20/0x40
[ 40.894451] kasan_save_alloc_info+0x40/0x58
[ 40.895486] __kasan_kmalloc+0xd4/0xd8
[ 40.896266] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.897244] kasan_atomics+0xb8/0x2e8
[ 40.898620] kunit_try_run_case+0x14c/0x3d0
[ 40.899992] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.901120] kthread+0x24c/0x2d0
[ 40.902004] ret_from_fork+0x10/0x20
[ 40.902854]
[ 40.903466] The buggy address belongs to the object at fff00000c6998980
[ 40.903466] which belongs to the cache kmalloc-64 of size 64
[ 40.905928] The buggy address is located 0 bytes to the right of
[ 40.905928] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 40.908245]
[ 40.908934] The buggy address belongs to the physical page:
[ 40.909844] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 40.910849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.911699] page_type: f5(slab)
[ 40.912192] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 40.913105] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 40.914269] page dumped because: kasan: bad access detected
[ 40.915364]
[ 40.915687] Memory state around the buggy address:
[ 40.916499] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.917731] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.918832] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 40.920012] ^
[ 40.921446] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.922685] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.923932] ==================================================================
---
[ 43.105812] ==================================================================
[ 43.107549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[ 43.108635] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 43.109805]
[ 43.110413] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.111892] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.112672] Hardware name: linux,dummy-virt (DT)
[ 43.113417] Call trace:
[ 43.113881] show_stack+0x20/0x38 (C)
[ 43.114458] dump_stack_lvl+0x8c/0xd0
[ 43.115047] print_report+0x118/0x5e0
[ 43.115902] kasan_report+0xc8/0x118
[ 43.116688] __asan_report_load8_noabort+0x20/0x30
[ 43.117360] kasan_atomics_helper+0x3db0/0x4858
[ 43.118238] kasan_atomics+0x198/0x2e8
[ 43.118974] kunit_try_run_case+0x14c/0x3d0
[ 43.119651] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.120587] kthread+0x24c/0x2d0
[ 43.121251] ret_from_fork+0x10/0x20
[ 43.121825]
[ 43.122315] Allocated by task 253:
[ 43.123069] kasan_save_stack+0x3c/0x68
[ 43.123747] kasan_save_track+0x20/0x40
[ 43.124361] kasan_save_alloc_info+0x40/0x58
[ 43.125150] __kasan_kmalloc+0xd4/0xd8
[ 43.125901] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.126480] kasan_atomics+0xb8/0x2e8
[ 43.127232] kunit_try_run_case+0x14c/0x3d0
[ 43.128013] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.128914] kthread+0x24c/0x2d0
[ 43.129480] ret_from_fork+0x10/0x20
[ 43.130472]
[ 43.130879] The buggy address belongs to the object at fff00000c6998980
[ 43.130879] which belongs to the cache kmalloc-64 of size 64
[ 43.132680] The buggy address is located 0 bytes to the right of
[ 43.132680] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 43.134272]
[ 43.134676] The buggy address belongs to the physical page:
[ 43.135432] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 43.136203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.137231] page_type: f5(slab)
[ 43.137909] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 43.139029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 43.139968] page dumped because: kasan: bad access detected
[ 43.140776]
[ 43.141151] Memory state around the buggy address:
[ 43.141876] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.142853] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.143658] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 43.144630] ^
[ 43.145376] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.146219] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.147032] ==================================================================
---
[ 41.964893] ==================================================================
[ 41.965654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[ 41.966694] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.968318]
[ 41.968935] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.970161] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.970828] Hardware name: linux,dummy-virt (DT)
[ 41.971536] Call trace:
[ 41.971993] show_stack+0x20/0x38 (C)
[ 41.972704] dump_stack_lvl+0x8c/0xd0
[ 41.973281] print_report+0x118/0x5e0
[ 41.974115] kasan_report+0xc8/0x118
[ 41.974846] __asan_report_load4_noabort+0x20/0x30
[ 41.975669] kasan_atomics_helper+0x3de4/0x4858
[ 41.976408] kasan_atomics+0x198/0x2e8
[ 41.977094] kunit_try_run_case+0x14c/0x3d0
[ 41.977819] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.978649] kthread+0x24c/0x2d0
[ 41.979258] ret_from_fork+0x10/0x20
[ 41.979938]
[ 41.980304] Allocated by task 253:
[ 41.980919] kasan_save_stack+0x3c/0x68
[ 41.981712] kasan_save_track+0x20/0x40
[ 41.982352] kasan_save_alloc_info+0x40/0x58
[ 41.983032] __kasan_kmalloc+0xd4/0xd8
[ 41.983704] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.984335] kasan_atomics+0xb8/0x2e8
[ 41.985108] kunit_try_run_case+0x14c/0x3d0
[ 41.985744] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.986497] kthread+0x24c/0x2d0
[ 41.987485] ret_from_fork+0x10/0x20
[ 41.988224]
[ 41.988630] The buggy address belongs to the object at fff00000c6998980
[ 41.988630] which belongs to the cache kmalloc-64 of size 64
[ 41.990401] The buggy address is located 0 bytes to the right of
[ 41.990401] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.992016]
[ 41.992697] The buggy address belongs to the physical page:
[ 41.993415] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.994763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.995848] page_type: f5(slab)
[ 41.996378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.997339] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.998211] page dumped because: kasan: bad access detected
[ 41.999062]
[ 41.999491] Memory state around the buggy address:
[ 42.000237] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.001181] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.002270] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.003185] ^
[ 42.003924] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.004881] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.005840] ==================================================================
---
[ 41.803462] ==================================================================
[ 41.804393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[ 41.805422] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.806199]
[ 41.806606] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.807871] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.808425] Hardware name: linux,dummy-virt (DT)
[ 41.809152] Call trace:
[ 41.809676] show_stack+0x20/0x38 (C)
[ 41.810421] dump_stack_lvl+0x8c/0xd0
[ 41.811596] print_report+0x118/0x5e0
[ 41.812842] kasan_report+0xc8/0x118
[ 41.813417] __asan_report_load4_noabort+0x20/0x30
[ 41.814200] kasan_atomics_helper+0x3dcc/0x4858
[ 41.814848] kasan_atomics+0x198/0x2e8
[ 41.815439] kunit_try_run_case+0x14c/0x3d0
[ 41.816070] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.816844] kthread+0x24c/0x2d0
[ 41.817312] ret_from_fork+0x10/0x20
[ 41.818001]
[ 41.818358] Allocated by task 253:
[ 41.818830] kasan_save_stack+0x3c/0x68
[ 41.819566] kasan_save_track+0x20/0x40
[ 41.820224] kasan_save_alloc_info+0x40/0x58
[ 41.820910] __kasan_kmalloc+0xd4/0xd8
[ 41.821470] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.822092] kasan_atomics+0xb8/0x2e8
[ 41.822788] kunit_try_run_case+0x14c/0x3d0
[ 41.823387] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.824253] kthread+0x24c/0x2d0
[ 41.824808] ret_from_fork+0x10/0x20
[ 41.825403]
[ 41.825872] The buggy address belongs to the object at fff00000c6998980
[ 41.825872] which belongs to the cache kmalloc-64 of size 64
[ 41.827349] The buggy address is located 0 bytes to the right of
[ 41.827349] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.828843]
[ 41.829198] The buggy address belongs to the physical page:
[ 41.829919] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.830901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.831902] page_type: f5(slab)
[ 41.832428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.833417] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.834389] page dumped because: kasan: bad access detected
[ 41.835048]
[ 41.835444] Memory state around the buggy address:
[ 41.836101] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.836892] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.837841] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.838837] ^
[ 41.839421] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.840373] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.841244] ==================================================================
---
[ 42.858689] ==================================================================
[ 42.859543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[ 42.860677] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.862325]
[ 42.862813] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.863886] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.864695] Hardware name: linux,dummy-virt (DT)
[ 42.865454] Call trace:
[ 42.866067] show_stack+0x20/0x38 (C)
[ 42.866867] dump_stack_lvl+0x8c/0xd0
[ 42.867617] print_report+0x118/0x5e0
[ 42.868254] kasan_report+0xc8/0x118
[ 42.869011] __asan_report_load8_noabort+0x20/0x30
[ 42.869900] kasan_atomics_helper+0x3f04/0x4858
[ 42.870623] kasan_atomics+0x198/0x2e8
[ 42.871295] kunit_try_run_case+0x14c/0x3d0
[ 42.872026] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.872907] kthread+0x24c/0x2d0
[ 42.873408] ret_from_fork+0x10/0x20
[ 42.874018]
[ 42.874340] Allocated by task 253:
[ 42.874855] kasan_save_stack+0x3c/0x68
[ 42.875503] kasan_save_track+0x20/0x40
[ 42.876244] kasan_save_alloc_info+0x40/0x58
[ 42.876971] __kasan_kmalloc+0xd4/0xd8
[ 42.877576] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.878247] kasan_atomics+0xb8/0x2e8
[ 42.878982] kunit_try_run_case+0x14c/0x3d0
[ 42.879558] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.880383] kthread+0x24c/0x2d0
[ 42.881012] ret_from_fork+0x10/0x20
[ 42.881703]
[ 42.882022] The buggy address belongs to the object at fff00000c6998980
[ 42.882022] which belongs to the cache kmalloc-64 of size 64
[ 42.883545] The buggy address is located 0 bytes to the right of
[ 42.883545] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.885002]
[ 42.885369] The buggy address belongs to the physical page:
[ 42.886001] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.886986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.887938] page_type: f5(slab)
[ 42.888546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.889443] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.890418] page dumped because: kasan: bad access detected
[ 42.891222]
[ 42.891596] Memory state around the buggy address:
[ 42.892243] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.893150] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.893976] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.894953] ^
[ 42.895555] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.896558] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.897473] ==================================================================
---
[ 42.135608] ==================================================================
[ 42.136444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[ 42.137336] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.138188]
[ 42.138682] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.139762] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.140462] Hardware name: linux,dummy-virt (DT)
[ 42.141371] Call trace:
[ 42.141825] show_stack+0x20/0x38 (C)
[ 42.142366] dump_stack_lvl+0x8c/0xd0
[ 42.143194] print_report+0x118/0x5e0
[ 42.143697] kasan_report+0xc8/0x118
[ 42.144395] __asan_report_load4_noabort+0x20/0x30
[ 42.145115] kasan_atomics_helper+0x3e04/0x4858
[ 42.145723] kasan_atomics+0x198/0x2e8
[ 42.146592] kunit_try_run_case+0x14c/0x3d0
[ 42.147323] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.147965] kthread+0x24c/0x2d0
[ 42.148587] ret_from_fork+0x10/0x20
[ 42.149506]
[ 42.150021] Allocated by task 253:
[ 42.150620] kasan_save_stack+0x3c/0x68
[ 42.151340] kasan_save_track+0x20/0x40
[ 42.151972] kasan_save_alloc_info+0x40/0x58
[ 42.152808] __kasan_kmalloc+0xd4/0xd8
[ 42.153366] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.154165] kasan_atomics+0xb8/0x2e8
[ 42.154978] kunit_try_run_case+0x14c/0x3d0
[ 42.155586] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.156444] kthread+0x24c/0x2d0
[ 42.157071] ret_from_fork+0x10/0x20
[ 42.157914]
[ 42.158329] The buggy address belongs to the object at fff00000c6998980
[ 42.158329] which belongs to the cache kmalloc-64 of size 64
[ 42.159903] The buggy address is located 0 bytes to the right of
[ 42.159903] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.161423]
[ 42.161781] The buggy address belongs to the physical page:
[ 42.162488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.163484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.164318] page_type: f5(slab)
[ 42.164855] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.165900] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.166854] page dumped because: kasan: bad access detected
[ 42.167642]
[ 42.168011] Memory state around the buggy address:
[ 42.168815] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.169776] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.170874] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.171926] ^
[ 42.172875] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.173871] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.175135] ==================================================================
---
[ 42.052791] ==================================================================
[ 42.054077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[ 42.055799] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.056738]
[ 42.057158] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.058386] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.059118] Hardware name: linux,dummy-virt (DT)
[ 42.059786] Call trace:
[ 42.060307] show_stack+0x20/0x38 (C)
[ 42.060937] dump_stack_lvl+0x8c/0xd0
[ 42.061613] print_report+0x118/0x5e0
[ 42.062087] kasan_report+0xc8/0x118
[ 42.062804] __asan_report_load4_noabort+0x20/0x30
[ 42.063512] kasan_atomics_helper+0x3dd8/0x4858
[ 42.064315] kasan_atomics+0x198/0x2e8
[ 42.064919] kunit_try_run_case+0x14c/0x3d0
[ 42.065829] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.066689] kthread+0x24c/0x2d0
[ 42.067385] ret_from_fork+0x10/0x20
[ 42.068049]
[ 42.068388] Allocated by task 253:
[ 42.069043] kasan_save_stack+0x3c/0x68
[ 42.069714] kasan_save_track+0x20/0x40
[ 42.070400] kasan_save_alloc_info+0x40/0x58
[ 42.071087] __kasan_kmalloc+0xd4/0xd8
[ 42.071877] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.072630] kasan_atomics+0xb8/0x2e8
[ 42.073246] kunit_try_run_case+0x14c/0x3d0
[ 42.074115] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.074870] kthread+0x24c/0x2d0
[ 42.075540] ret_from_fork+0x10/0x20
[ 42.076059]
[ 42.076386] The buggy address belongs to the object at fff00000c6998980
[ 42.076386] which belongs to the cache kmalloc-64 of size 64
[ 42.077916] The buggy address is located 0 bytes to the right of
[ 42.077916] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.079426]
[ 42.079907] The buggy address belongs to the physical page:
[ 42.080580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.081657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.082594] page_type: f5(slab)
[ 42.083168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.084063] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.085088] page dumped because: kasan: bad access detected
[ 42.085913]
[ 42.086350] Memory state around the buggy address:
[ 42.087109] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.087611] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.088386] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.089558] ^
[ 42.090213] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.091134] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.091939] ==================================================================
---
[ 41.559576] ==================================================================
[ 41.560447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[ 41.561789] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.563006]
[ 41.564039] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.565237] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.566028] Hardware name: linux,dummy-virt (DT)
[ 41.567182] Call trace:
[ 41.567708] show_stack+0x20/0x38 (C)
[ 41.568349] dump_stack_lvl+0x8c/0xd0
[ 41.569486] print_report+0x118/0x5e0
[ 41.570192] kasan_report+0xc8/0x118
[ 41.570882] __asan_report_load4_noabort+0x20/0x30
[ 41.571593] kasan_atomics_helper+0x42d8/0x4858
[ 41.572239] kasan_atomics+0x198/0x2e8
[ 41.573010] kunit_try_run_case+0x14c/0x3d0
[ 41.573643] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.574492] kthread+0x24c/0x2d0
[ 41.575035] ret_from_fork+0x10/0x20
[ 41.575728]
[ 41.576125] Allocated by task 253:
[ 41.576690] kasan_save_stack+0x3c/0x68
[ 41.577305] kasan_save_track+0x20/0x40
[ 41.577871] kasan_save_alloc_info+0x40/0x58
[ 41.578694] __kasan_kmalloc+0xd4/0xd8
[ 41.579258] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.579859] kasan_atomics+0xb8/0x2e8
[ 41.580651] kunit_try_run_case+0x14c/0x3d0
[ 41.581242] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.582230] kthread+0x24c/0x2d0
[ 41.582865] ret_from_fork+0x10/0x20
[ 41.583570]
[ 41.583912] The buggy address belongs to the object at fff00000c6998980
[ 41.583912] which belongs to the cache kmalloc-64 of size 64
[ 41.585260] The buggy address is located 0 bytes to the right of
[ 41.585260] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.586836]
[ 41.587175] The buggy address belongs to the physical page:
[ 41.587964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.588905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.589878] page_type: f5(slab)
[ 41.590351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.591430] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.592191] page dumped because: kasan: bad access detected
[ 41.593084]
[ 41.593426] Memory state around the buggy address:
[ 41.594126] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.595154] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.596109] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.597005] ^
[ 41.597773] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.598696] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.599629] ==================================================================
---
[ 43.190729] ==================================================================
[ 43.191923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[ 43.193404] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 43.194347]
[ 43.194609] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.195692] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.196264] Hardware name: linux,dummy-virt (DT)
[ 43.196833] Call trace:
[ 43.197352] show_stack+0x20/0x38 (C)
[ 43.197949] dump_stack_lvl+0x8c/0xd0
[ 43.198750] print_report+0x118/0x5e0
[ 43.199391] kasan_report+0xc8/0x118
[ 43.199921] __asan_report_load8_noabort+0x20/0x30
[ 43.200706] kasan_atomics_helper+0x3df4/0x4858
[ 43.201334] kasan_atomics+0x198/0x2e8
[ 43.201969] kunit_try_run_case+0x14c/0x3d0
[ 43.202778] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.203500] kthread+0x24c/0x2d0
[ 43.204130] ret_from_fork+0x10/0x20
[ 43.204700]
[ 43.205156] Allocated by task 253:
[ 43.205743] kasan_save_stack+0x3c/0x68
[ 43.206421] kasan_save_track+0x20/0x40
[ 43.207121] kasan_save_alloc_info+0x40/0x58
[ 43.207825] __kasan_kmalloc+0xd4/0xd8
[ 43.208452] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.209136] kasan_atomics+0xb8/0x2e8
[ 43.209684] kunit_try_run_case+0x14c/0x3d0
[ 43.210471] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.211158] kthread+0x24c/0x2d0
[ 43.211794] ret_from_fork+0x10/0x20
[ 43.212327]
[ 43.212771] The buggy address belongs to the object at fff00000c6998980
[ 43.212771] which belongs to the cache kmalloc-64 of size 64
[ 43.214193] The buggy address is located 0 bytes to the right of
[ 43.214193] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 43.215734]
[ 43.216248] The buggy address belongs to the physical page:
[ 43.216980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 43.217967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.218805] page_type: f5(slab)
[ 43.219382] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 43.220460] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 43.221415] page dumped because: kasan: bad access detected
[ 43.222120]
[ 43.222414] Memory state around the buggy address:
[ 43.223222] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.223910] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.224945] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 43.225907] ^
[ 43.226691] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.227587] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.228455] ==================================================================
---
[ 40.629473] ==================================================================
[ 40.631073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[ 40.631928] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 40.632999]
[ 40.633589] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.634820] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.635394] Hardware name: linux,dummy-virt (DT)
[ 40.636021] Call trace:
[ 40.636625] show_stack+0x20/0x38 (C)
[ 40.637191] dump_stack_lvl+0x8c/0xd0
[ 40.638050] print_report+0x118/0x5e0
[ 40.638885] kasan_report+0xc8/0x118
[ 40.639806] __asan_report_load4_noabort+0x20/0x30
[ 40.640839] kasan_atomics_helper+0x40a8/0x4858
[ 40.642296] kasan_atomics+0x198/0x2e8
[ 40.643059] kunit_try_run_case+0x14c/0x3d0
[ 40.643776] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.644564] kthread+0x24c/0x2d0
[ 40.645164] ret_from_fork+0x10/0x20
[ 40.645889]
[ 40.646201] Allocated by task 253:
[ 40.646827] kasan_save_stack+0x3c/0x68
[ 40.647476] kasan_save_track+0x20/0x40
[ 40.648727] kasan_save_alloc_info+0x40/0x58
[ 40.649558] __kasan_kmalloc+0xd4/0xd8
[ 40.650235] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.650985] kasan_atomics+0xb8/0x2e8
[ 40.652021] kunit_try_run_case+0x14c/0x3d0
[ 40.652581] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.653332] kthread+0x24c/0x2d0
[ 40.654133] ret_from_fork+0x10/0x20
[ 40.654881]
[ 40.655379] The buggy address belongs to the object at fff00000c6998980
[ 40.655379] which belongs to the cache kmalloc-64 of size 64
[ 40.657597] The buggy address is located 0 bytes to the right of
[ 40.657597] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 40.659180]
[ 40.660333] The buggy address belongs to the physical page:
[ 40.661341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 40.662333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.663584] page_type: f5(slab)
[ 40.664096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 40.665174] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 40.666051] page dumped because: kasan: bad access detected
[ 40.666881]
[ 40.667241] Memory state around the buggy address:
[ 40.667994] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.669442] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.670281] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 40.671656] ^
[ 40.672300] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.673202] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.674430] ==================================================================
---
[ 41.883552] ==================================================================
[ 41.884387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[ 41.885488] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.886632]
[ 41.887094] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.888213] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.888779] Hardware name: linux,dummy-virt (DT)
[ 41.889597] Call trace:
[ 41.890080] show_stack+0x20/0x38 (C)
[ 41.890727] dump_stack_lvl+0x8c/0xd0
[ 41.891347] print_report+0x118/0x5e0
[ 41.892098] kasan_report+0xc8/0x118
[ 41.892475] __asan_report_load4_noabort+0x20/0x30
[ 41.892863] kasan_atomics_helper+0x3dbc/0x4858
[ 41.893198] kasan_atomics+0x198/0x2e8
[ 41.893608] kunit_try_run_case+0x14c/0x3d0
[ 41.894831] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.895998] kthread+0x24c/0x2d0
[ 41.896787] ret_from_fork+0x10/0x20
[ 41.897408]
[ 41.897879] Allocated by task 253:
[ 41.898475] kasan_save_stack+0x3c/0x68
[ 41.899060] kasan_save_track+0x20/0x40
[ 41.899846] kasan_save_alloc_info+0x40/0x58
[ 41.900413] __kasan_kmalloc+0xd4/0xd8
[ 41.901143] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.901864] kasan_atomics+0xb8/0x2e8
[ 41.902381] kunit_try_run_case+0x14c/0x3d0
[ 41.903176] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.903809] kthread+0x24c/0x2d0
[ 41.904459] ret_from_fork+0x10/0x20
[ 41.905061]
[ 41.905548] The buggy address belongs to the object at fff00000c6998980
[ 41.905548] which belongs to the cache kmalloc-64 of size 64
[ 41.906925] The buggy address is located 0 bytes to the right of
[ 41.906925] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.908552]
[ 41.908885] The buggy address belongs to the physical page:
[ 41.909846] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.910813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.911687] page_type: f5(slab)
[ 41.912302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.913314] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.914306] page dumped because: kasan: bad access detected
[ 41.915143]
[ 41.915476] Memory state around the buggy address:
[ 41.916148] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.917042] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.917959] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.918816] ^
[ 41.919569] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.920565] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.921583] ==================================================================
Home
[ 42.513202] ==================================================================
[ 42.514223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[ 42.515752] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.516905]
[ 42.517331] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.518360] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.519007] Hardware name: linux,dummy-virt (DT)
[ 42.519922] Call trace:
[ 42.520283] show_stack+0x20/0x38 (C)
[ 42.520990] dump_stack_lvl+0x8c/0xd0
[ 42.521570] print_report+0x118/0x5e0
[ 42.522365] kasan_report+0xc8/0x118
[ 42.522968] kasan_check_range+0x100/0x1a8
[ 42.523717] __kasan_check_write+0x20/0x30
[ 42.524283] kasan_atomics_helper+0x1058/0x4858
[ 42.524971] kasan_atomics+0x198/0x2e8
[ 42.525612] kunit_try_run_case+0x14c/0x3d0
[ 42.526209] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.527636] kthread+0x24c/0x2d0
[ 42.528422] ret_from_fork+0x10/0x20
[ 42.529179]
[ 42.529800] Allocated by task 253:
[ 42.530592] kasan_save_stack+0x3c/0x68
[ 42.531375] kasan_save_track+0x20/0x40
[ 42.532224] kasan_save_alloc_info+0x40/0x58
[ 42.533092] __kasan_kmalloc+0xd4/0xd8
[ 42.533998] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.534760] kasan_atomics+0xb8/0x2e8
[ 42.535688] kunit_try_run_case+0x14c/0x3d0
[ 42.536566] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.537566] kthread+0x24c/0x2d0
[ 42.538132] ret_from_fork+0x10/0x20
[ 42.539079]
[ 42.539502] The buggy address belongs to the object at fff00000c6998980
[ 42.539502] which belongs to the cache kmalloc-64 of size 64
[ 42.540791] The buggy address is located 0 bytes to the right of
[ 42.540791] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.542174]
[ 42.542622] The buggy address belongs to the physical page:
[ 42.543292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.544323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.545200] page_type: f5(slab)
[ 42.545696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.546715] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.547779] page dumped because: kasan: bad access detected
[ 42.548438]
[ 42.548871] Memory state around the buggy address:
[ 42.549484] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.550490] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.551347] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.552240] ^
[ 42.552995] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.553844] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.554766] ==================================================================
---
[ 42.939770] ==================================================================
[ 42.940712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[ 42.941623] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.942844]
[ 42.943206] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.945020] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.946309] Hardware name: linux,dummy-virt (DT)
[ 42.947144] Call trace:
[ 42.947626] show_stack+0x20/0x38 (C)
[ 42.948320] dump_stack_lvl+0x8c/0xd0
[ 42.949007] print_report+0x118/0x5e0
[ 42.949708] kasan_report+0xc8/0x118
[ 42.950030] kasan_check_range+0x100/0x1a8
[ 42.950354] __kasan_check_write+0x20/0x30
[ 42.951099] kasan_atomics_helper+0x147c/0x4858
[ 42.951764] kasan_atomics+0x198/0x2e8
[ 42.952364] kunit_try_run_case+0x14c/0x3d0
[ 42.952967] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.953979] kthread+0x24c/0x2d0
[ 42.954672] ret_from_fork+0x10/0x20
[ 42.955318]
[ 42.955643] Allocated by task 253:
[ 42.956246] kasan_save_stack+0x3c/0x68
[ 42.956865] kasan_save_track+0x20/0x40
[ 42.957429] kasan_save_alloc_info+0x40/0x58
[ 42.958304] __kasan_kmalloc+0xd4/0xd8
[ 42.959017] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.959707] kasan_atomics+0xb8/0x2e8
[ 42.960337] kunit_try_run_case+0x14c/0x3d0
[ 42.961033] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.961679] kthread+0x24c/0x2d0
[ 42.962425] ret_from_fork+0x10/0x20
[ 42.963111]
[ 42.963487] The buggy address belongs to the object at fff00000c6998980
[ 42.963487] which belongs to the cache kmalloc-64 of size 64
[ 42.965096] The buggy address is located 0 bytes to the right of
[ 42.965096] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.966763]
[ 42.967181] The buggy address belongs to the physical page:
[ 42.967914] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.968988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.969877] page_type: f5(slab)
[ 42.970375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.971339] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.972309] page dumped because: kasan: bad access detected
[ 42.973028]
[ 42.973375] Memory state around the buggy address:
[ 42.974065] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.974808] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.975869] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.976793] ^
[ 42.977574] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.978475] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.979333] ==================================================================
---
[ 41.601598] ==================================================================
[ 41.602565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[ 41.603443] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.604339]
[ 41.604776] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.605949] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.606481] Hardware name: linux,dummy-virt (DT)
[ 41.607254] Call trace:
[ 41.607646] show_stack+0x20/0x38 (C)
[ 41.608383] dump_stack_lvl+0x8c/0xd0
[ 41.608978] print_report+0x118/0x5e0
[ 41.609660] kasan_report+0xc8/0x118
[ 41.610240] kasan_check_range+0x100/0x1a8
[ 41.611039] __kasan_check_write+0x20/0x30
[ 41.611775] kasan_atomics_helper+0x934/0x4858
[ 41.612366] kasan_atomics+0x198/0x2e8
[ 41.612986] kunit_try_run_case+0x14c/0x3d0
[ 41.613720] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.614448] kthread+0x24c/0x2d0
[ 41.615024] ret_from_fork+0x10/0x20
[ 41.615611]
[ 41.616017] Allocated by task 253:
[ 41.616511] kasan_save_stack+0x3c/0x68
[ 41.617451] kasan_save_track+0x20/0x40
[ 41.618127] kasan_save_alloc_info+0x40/0x58
[ 41.618869] __kasan_kmalloc+0xd4/0xd8
[ 41.619681] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.620433] kasan_atomics+0xb8/0x2e8
[ 41.620977] kunit_try_run_case+0x14c/0x3d0
[ 41.621588] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.622320] kthread+0x24c/0x2d0
[ 41.622997] ret_from_fork+0x10/0x20
[ 41.623629]
[ 41.623956] The buggy address belongs to the object at fff00000c6998980
[ 41.623956] which belongs to the cache kmalloc-64 of size 64
[ 41.625328] The buggy address is located 0 bytes to the right of
[ 41.625328] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.626838]
[ 41.627177] The buggy address belongs to the physical page:
[ 41.627839] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.628817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.629675] page_type: f5(slab)
[ 41.630273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.631233] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.632150] page dumped because: kasan: bad access detected
[ 41.632932]
[ 41.633261] Memory state around the buggy address:
[ 41.633974] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.634816] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.635870] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.636760] ^
[ 41.637360] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.638226] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.639217] ==================================================================
---
[ 41.519706] ==================================================================
[ 41.520775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[ 41.521321] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.521951]
[ 41.522413] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.523771] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.524577] Hardware name: linux,dummy-virt (DT)
[ 41.525409] Call trace:
[ 41.526073] show_stack+0x20/0x38 (C)
[ 41.526838] dump_stack_lvl+0x8c/0xd0
[ 41.527446] print_report+0x118/0x5e0
[ 41.528148] kasan_report+0xc8/0x118
[ 41.528763] kasan_check_range+0x100/0x1a8
[ 41.529398] __kasan_check_write+0x20/0x30
[ 41.530070] kasan_atomics_helper+0x894/0x4858
[ 41.530789] kasan_atomics+0x198/0x2e8
[ 41.531281] kunit_try_run_case+0x14c/0x3d0
[ 41.532014] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.532731] kthread+0x24c/0x2d0
[ 41.533351] ret_from_fork+0x10/0x20
[ 41.534043]
[ 41.534442] Allocated by task 253:
[ 41.535014] kasan_save_stack+0x3c/0x68
[ 41.535662] kasan_save_track+0x20/0x40
[ 41.536175] kasan_save_alloc_info+0x40/0x58
[ 41.536918] __kasan_kmalloc+0xd4/0xd8
[ 41.537532] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.538164] kasan_atomics+0xb8/0x2e8
[ 41.538722] kunit_try_run_case+0x14c/0x3d0
[ 41.539372] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.540097] kthread+0x24c/0x2d0
[ 41.540695] ret_from_fork+0x10/0x20
[ 41.541237]
[ 41.541632] The buggy address belongs to the object at fff00000c6998980
[ 41.541632] which belongs to the cache kmalloc-64 of size 64
[ 41.543110] The buggy address is located 0 bytes to the right of
[ 41.543110] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.544499]
[ 41.544893] The buggy address belongs to the physical page:
[ 41.545673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.546586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.547406] page_type: f5(slab)
[ 41.548114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.549087] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.550151] page dumped because: kasan: bad access detected
[ 41.550958]
[ 41.551293] Memory state around the buggy address:
[ 41.551917] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.552813] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.553754] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.554816] ^
[ 41.555399] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.556262] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.557192] ==================================================================
---
[ 41.431810] ==================================================================
[ 41.432889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[ 41.433740] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.434717]
[ 41.435105] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.436845] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.437484] Hardware name: linux,dummy-virt (DT)
[ 41.438258] Call trace:
[ 41.438683] show_stack+0x20/0x38 (C)
[ 41.439505] dump_stack_lvl+0x8c/0xd0
[ 41.440191] print_report+0x118/0x5e0
[ 41.441060] kasan_report+0xc8/0x118
[ 41.441802] kasan_check_range+0x100/0x1a8
[ 41.442605] __kasan_check_write+0x20/0x30
[ 41.443288] kasan_atomics_helper+0x760/0x4858
[ 41.445301] kasan_atomics+0x198/0x2e8
[ 41.446027] kunit_try_run_case+0x14c/0x3d0
[ 41.446859] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.447432] kthread+0x24c/0x2d0
[ 41.447909] ret_from_fork+0x10/0x20
[ 41.449775]
[ 41.450180] Allocated by task 253:
[ 41.451205] kasan_save_stack+0x3c/0x68
[ 41.452034] kasan_save_track+0x20/0x40
[ 41.452791] kasan_save_alloc_info+0x40/0x58
[ 41.453634] __kasan_kmalloc+0xd4/0xd8
[ 41.453940] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.454270] kasan_atomics+0xb8/0x2e8
[ 41.454595] kunit_try_run_case+0x14c/0x3d0
[ 41.455074] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.456050] kthread+0x24c/0x2d0
[ 41.456747] ret_from_fork+0x10/0x20
[ 41.457407]
[ 41.457838] The buggy address belongs to the object at fff00000c6998980
[ 41.457838] which belongs to the cache kmalloc-64 of size 64
[ 41.459096] The buggy address is located 0 bytes to the right of
[ 41.459096] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.460415]
[ 41.460760] The buggy address belongs to the physical page:
[ 41.461693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.462594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.463567] page_type: f5(slab)
[ 41.464201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.465101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.465946] page dumped because: kasan: bad access detected
[ 41.466793]
[ 41.467245] Memory state around the buggy address:
[ 41.467985] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.468847] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.469771] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.470665] ^
[ 41.471419] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.472278] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.473218] ==================================================================
---
[ 41.346730] ==================================================================
[ 41.347459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[ 41.348857] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.349863]
[ 41.350433] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.351710] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.352409] Hardware name: linux,dummy-virt (DT)
[ 41.353154] Call trace:
[ 41.353671] show_stack+0x20/0x38 (C)
[ 41.354408] dump_stack_lvl+0x8c/0xd0
[ 41.355131] print_report+0x118/0x5e0
[ 41.355803] kasan_report+0xc8/0x118
[ 41.356440] kasan_check_range+0x100/0x1a8
[ 41.357174] __kasan_check_write+0x20/0x30
[ 41.357915] kasan_atomics_helper+0x684/0x4858
[ 41.358618] kasan_atomics+0x198/0x2e8
[ 41.359282] kunit_try_run_case+0x14c/0x3d0
[ 41.360010] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.360850] kthread+0x24c/0x2d0
[ 41.361470] ret_from_fork+0x10/0x20
[ 41.362132]
[ 41.362578] Allocated by task 253:
[ 41.363231] kasan_save_stack+0x3c/0x68
[ 41.363781] kasan_save_track+0x20/0x40
[ 41.364573] kasan_save_alloc_info+0x40/0x58
[ 41.365336] __kasan_kmalloc+0xd4/0xd8
[ 41.366075] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.366808] kasan_atomics+0xb8/0x2e8
[ 41.367470] kunit_try_run_case+0x14c/0x3d0
[ 41.368257] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.368961] kthread+0x24c/0x2d0
[ 41.369477] ret_from_fork+0x10/0x20
[ 41.370035]
[ 41.370368] The buggy address belongs to the object at fff00000c6998980
[ 41.370368] which belongs to the cache kmalloc-64 of size 64
[ 41.371686] The buggy address is located 0 bytes to the right of
[ 41.371686] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.373144]
[ 41.373569] The buggy address belongs to the physical page:
[ 41.374415] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.375538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.376497] page_type: f5(slab)
[ 41.377061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.378190] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.379201] page dumped because: kasan: bad access detected
[ 41.380035]
[ 41.380387] Memory state around the buggy address:
[ 41.381138] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.382129] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.383111] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.384089] ^
[ 41.384786] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.385752] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.386674] ==================================================================
---
[ 41.079212] ==================================================================
[ 41.080565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[ 41.081233] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.082402]
[ 41.083001] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.084352] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.085241] Hardware name: linux,dummy-virt (DT)
[ 41.086370] Call trace:
[ 41.086905] show_stack+0x20/0x38 (C)
[ 41.087609] dump_stack_lvl+0x8c/0xd0
[ 41.088441] print_report+0x118/0x5e0
[ 41.089165] kasan_report+0xc8/0x118
[ 41.089792] kasan_check_range+0x100/0x1a8
[ 41.090511] __kasan_check_write+0x20/0x30
[ 41.091285] kasan_atomics_helper+0x414/0x4858
[ 41.092185] kasan_atomics+0x198/0x2e8
[ 41.093044] kunit_try_run_case+0x14c/0x3d0
[ 41.094169] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.094746] kthread+0x24c/0x2d0
[ 41.096000] ret_from_fork+0x10/0x20
[ 41.096686]
[ 41.097131] Allocated by task 253:
[ 41.097786] kasan_save_stack+0x3c/0x68
[ 41.098345] kasan_save_track+0x20/0x40
[ 41.099677] kasan_save_alloc_info+0x40/0x58
[ 41.100174] __kasan_kmalloc+0xd4/0xd8
[ 41.101173] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.102202] kasan_atomics+0xb8/0x2e8
[ 41.102881] kunit_try_run_case+0x14c/0x3d0
[ 41.103862] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.105162] kthread+0x24c/0x2d0
[ 41.106450] ret_from_fork+0x10/0x20
[ 41.107504]
[ 41.107907] The buggy address belongs to the object at fff00000c6998980
[ 41.107907] which belongs to the cache kmalloc-64 of size 64
[ 41.109503] The buggy address is located 0 bytes to the right of
[ 41.109503] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.111297]
[ 41.112188] The buggy address belongs to the physical page:
[ 41.112969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.113791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.114932] page_type: f5(slab)
[ 41.116072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.116991] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.118048] page dumped because: kasan: bad access detected
[ 41.119337]
[ 41.119696] Memory state around the buggy address:
[ 41.120761] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.121835] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.123297] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.124672] ^
[ 41.126154] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.127379] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.128305] ==================================================================
---
[ 42.473906] ==================================================================
[ 42.474885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[ 42.475828] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.476938]
[ 42.477511] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.478871] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.479721] Hardware name: linux,dummy-virt (DT)
[ 42.480412] Call trace:
[ 42.480883] show_stack+0x20/0x38 (C)
[ 42.481566] dump_stack_lvl+0x8c/0xd0
[ 42.482165] print_report+0x118/0x5e0
[ 42.482824] kasan_report+0xc8/0x118
[ 42.483398] kasan_check_range+0x100/0x1a8
[ 42.484033] __kasan_check_write+0x20/0x30
[ 42.484708] kasan_atomics_helper+0xff0/0x4858
[ 42.485372] kasan_atomics+0x198/0x2e8
[ 42.486059] kunit_try_run_case+0x14c/0x3d0
[ 42.486710] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.487543] kthread+0x24c/0x2d0
[ 42.488065] ret_from_fork+0x10/0x20
[ 42.488722]
[ 42.489122] Allocated by task 253:
[ 42.489707] kasan_save_stack+0x3c/0x68
[ 42.490283] kasan_save_track+0x20/0x40
[ 42.490962] kasan_save_alloc_info+0x40/0x58
[ 42.491626] __kasan_kmalloc+0xd4/0xd8
[ 42.492128] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.492869] kasan_atomics+0xb8/0x2e8
[ 42.493445] kunit_try_run_case+0x14c/0x3d0
[ 42.493971] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.494834] kthread+0x24c/0x2d0
[ 42.495356] ret_from_fork+0x10/0x20
[ 42.495937]
[ 42.496280] The buggy address belongs to the object at fff00000c6998980
[ 42.496280] which belongs to the cache kmalloc-64 of size 64
[ 42.497802] The buggy address is located 0 bytes to the right of
[ 42.497802] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.499256]
[ 42.499780] The buggy address belongs to the physical page:
[ 42.500360] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.501451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.502170] page_type: f5(slab)
[ 42.502781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.503694] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.504725] page dumped because: kasan: bad access detected
[ 42.505490]
[ 42.505877] Memory state around the buggy address:
[ 42.506495] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.507381] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.508231] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.509172] ^
[ 42.509877] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.510834] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.511670] ==================================================================
---
[ 42.431108] ==================================================================
[ 42.432183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[ 42.433120] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.434339]
[ 42.434713] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.435846] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.436550] Hardware name: linux,dummy-virt (DT)
[ 42.437175] Call trace:
[ 42.437751] show_stack+0x20/0x38 (C)
[ 42.438443] dump_stack_lvl+0x8c/0xd0
[ 42.438998] print_report+0x118/0x5e0
[ 42.439705] kasan_report+0xc8/0x118
[ 42.440231] kasan_check_range+0x100/0x1a8
[ 42.441125] __kasan_check_write+0x20/0x30
[ 42.441971] kasan_atomics_helper+0xf88/0x4858
[ 42.442679] kasan_atomics+0x198/0x2e8
[ 42.443221] kunit_try_run_case+0x14c/0x3d0
[ 42.443993] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.444768] kthread+0x24c/0x2d0
[ 42.445468] ret_from_fork+0x10/0x20
[ 42.446190]
[ 42.446496] Allocated by task 253:
[ 42.447173] kasan_save_stack+0x3c/0x68
[ 42.447871] kasan_save_track+0x20/0x40
[ 42.448560] kasan_save_alloc_info+0x40/0x58
[ 42.449153] __kasan_kmalloc+0xd4/0xd8
[ 42.449734] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.450359] kasan_atomics+0xb8/0x2e8
[ 42.451043] kunit_try_run_case+0x14c/0x3d0
[ 42.451618] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.452577] kthread+0x24c/0x2d0
[ 42.453210] ret_from_fork+0x10/0x20
[ 42.453782]
[ 42.454183] The buggy address belongs to the object at fff00000c6998980
[ 42.454183] which belongs to the cache kmalloc-64 of size 64
[ 42.455668] The buggy address is located 0 bytes to the right of
[ 42.455668] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.457099]
[ 42.457466] The buggy address belongs to the physical page:
[ 42.458410] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.459297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.460228] page_type: f5(slab)
[ 42.461172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.462268] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.463174] page dumped because: kasan: bad access detected
[ 42.463947]
[ 42.464319] Memory state around the buggy address:
[ 42.465354] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.466399] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.467435] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.468491] ^
[ 42.469328] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.470567] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.471507] ==================================================================
---
[ 41.301000] ==================================================================
[ 41.302426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[ 41.304274] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.306465]
[ 41.307005] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.308257] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.309010] Hardware name: linux,dummy-virt (DT)
[ 41.309730] Call trace:
[ 41.310227] show_stack+0x20/0x38 (C)
[ 41.310881] dump_stack_lvl+0x8c/0xd0
[ 41.311671] print_report+0x118/0x5e0
[ 41.312312] kasan_report+0xc8/0x118
[ 41.312965] kasan_check_range+0x100/0x1a8
[ 41.313712] __kasan_check_write+0x20/0x30
[ 41.314430] kasan_atomics_helper+0x61c/0x4858
[ 41.315190] kasan_atomics+0x198/0x2e8
[ 41.315903] kunit_try_run_case+0x14c/0x3d0
[ 41.316607] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.317568] kthread+0x24c/0x2d0
[ 41.318255] ret_from_fork+0x10/0x20
[ 41.318974]
[ 41.319563] Allocated by task 253:
[ 41.320250] kasan_save_stack+0x3c/0x68
[ 41.320947] kasan_save_track+0x20/0x40
[ 41.321635] kasan_save_alloc_info+0x40/0x58
[ 41.322350] __kasan_kmalloc+0xd4/0xd8
[ 41.322971] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.323732] kasan_atomics+0xb8/0x2e8
[ 41.324418] kunit_try_run_case+0x14c/0x3d0
[ 41.325191] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.326101] kthread+0x24c/0x2d0
[ 41.326689] ret_from_fork+0x10/0x20
[ 41.327342]
[ 41.327802] The buggy address belongs to the object at fff00000c6998980
[ 41.327802] which belongs to the cache kmalloc-64 of size 64
[ 41.329323] The buggy address is located 0 bytes to the right of
[ 41.329323] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.330907]
[ 41.331428] The buggy address belongs to the physical page:
[ 41.332296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.333389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.334346] page_type: f5(slab)
[ 41.335045] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.336194] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.337207] page dumped because: kasan: bad access detected
[ 41.338032]
[ 41.338574] Memory state around the buggy address:
[ 41.339298] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.340361] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.341329] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.342280] ^
[ 41.343126] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.344099] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.345105] ==================================================================
---
[ 42.981631] ==================================================================
[ 42.982542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[ 42.983494] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.984380]
[ 42.984716] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.986198] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.986698] Hardware name: linux,dummy-virt (DT)
[ 42.987331] Call trace:
[ 42.987929] show_stack+0x20/0x38 (C)
[ 42.988779] dump_stack_lvl+0x8c/0xd0
[ 42.989463] print_report+0x118/0x5e0
[ 42.990182] kasan_report+0xc8/0x118
[ 42.990746] kasan_check_range+0x100/0x1a8
[ 42.991469] __kasan_check_write+0x20/0x30
[ 42.992170] kasan_atomics_helper+0x14e4/0x4858
[ 42.993081] kasan_atomics+0x198/0x2e8
[ 42.993767] kunit_try_run_case+0x14c/0x3d0
[ 42.994572] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.995239] kthread+0x24c/0x2d0
[ 42.995860] ret_from_fork+0x10/0x20
[ 42.996441]
[ 42.996797] Allocated by task 253:
[ 42.997396] kasan_save_stack+0x3c/0x68
[ 42.998055] kasan_save_track+0x20/0x40
[ 42.998607] kasan_save_alloc_info+0x40/0x58
[ 42.999289] __kasan_kmalloc+0xd4/0xd8
[ 42.999847] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.000630] kasan_atomics+0xb8/0x2e8
[ 43.001199] kunit_try_run_case+0x14c/0x3d0
[ 43.001969] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.002762] kthread+0x24c/0x2d0
[ 43.003367] ret_from_fork+0x10/0x20
[ 43.003910]
[ 43.004268] The buggy address belongs to the object at fff00000c6998980
[ 43.004268] which belongs to the cache kmalloc-64 of size 64
[ 43.005716] The buggy address is located 0 bytes to the right of
[ 43.005716] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 43.007169]
[ 43.007553] The buggy address belongs to the physical page:
[ 43.008175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 43.009209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.010074] page_type: f5(slab)
[ 43.010744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 43.011671] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 43.012634] page dumped because: kasan: bad access detected
[ 43.013462]
[ 43.013782] Memory state around the buggy address:
[ 43.014419] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.015455] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.016347] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 43.017325] ^
[ 43.018124] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.019115] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.019893] ==================================================================
---
[ 41.475403] ==================================================================
[ 41.476759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[ 41.477833] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.478650]
[ 41.479193] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.480496] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.481162] Hardware name: linux,dummy-virt (DT)
[ 41.481923] Call trace:
[ 41.482551] show_stack+0x20/0x38 (C)
[ 41.483277] dump_stack_lvl+0x8c/0xd0
[ 41.483938] print_report+0x118/0x5e0
[ 41.484613] kasan_report+0xc8/0x118
[ 41.485223] kasan_check_range+0x100/0x1a8
[ 41.486176] __kasan_check_write+0x20/0x30
[ 41.486694] kasan_atomics_helper+0x7cc/0x4858
[ 41.487189] kasan_atomics+0x198/0x2e8
[ 41.488744] kunit_try_run_case+0x14c/0x3d0
[ 41.489646] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.490560] kthread+0x24c/0x2d0
[ 41.491352] ret_from_fork+0x10/0x20
[ 41.492081]
[ 41.492561] Allocated by task 253:
[ 41.493184] kasan_save_stack+0x3c/0x68
[ 41.493930] kasan_save_track+0x20/0x40
[ 41.494816] kasan_save_alloc_info+0x40/0x58
[ 41.495613] __kasan_kmalloc+0xd4/0xd8
[ 41.496315] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.497097] kasan_atomics+0xb8/0x2e8
[ 41.497717] kunit_try_run_case+0x14c/0x3d0
[ 41.498303] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.499028] kthread+0x24c/0x2d0
[ 41.499610] ret_from_fork+0x10/0x20
[ 41.500179]
[ 41.500475] The buggy address belongs to the object at fff00000c6998980
[ 41.500475] which belongs to the cache kmalloc-64 of size 64
[ 41.502249] The buggy address is located 0 bytes to the right of
[ 41.502249] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.504273]
[ 41.504751] The buggy address belongs to the physical page:
[ 41.505376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.506646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.507626] page_type: f5(slab)
[ 41.508299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.509216] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.510186] page dumped because: kasan: bad access detected
[ 41.511045]
[ 41.511481] Memory state around the buggy address:
[ 41.512202] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.513224] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.514168] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.515083] ^
[ 41.515837] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.516781] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.517768] ==================================================================
---
[ 42.813391] ==================================================================
[ 42.814368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[ 42.816289] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.817486]
[ 42.818035] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.820268] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.820974] Hardware name: linux,dummy-virt (DT)
[ 42.821824] Call trace:
[ 42.822242] show_stack+0x20/0x38 (C)
[ 42.823070] dump_stack_lvl+0x8c/0xd0
[ 42.823742] print_report+0x118/0x5e0
[ 42.824374] kasan_report+0xc8/0x118
[ 42.824995] kasan_check_range+0x100/0x1a8
[ 42.825655] __kasan_check_write+0x20/0x30
[ 42.826321] kasan_atomics_helper+0x1384/0x4858
[ 42.827141] kasan_atomics+0x198/0x2e8
[ 42.827827] kunit_try_run_case+0x14c/0x3d0
[ 42.828559] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.829334] kthread+0x24c/0x2d0
[ 42.829880] ret_from_fork+0x10/0x20
[ 42.830596]
[ 42.830991] Allocated by task 253:
[ 42.831697] kasan_save_stack+0x3c/0x68
[ 42.832428] kasan_save_track+0x20/0x40
[ 42.833139] kasan_save_alloc_info+0x40/0x58
[ 42.833923] __kasan_kmalloc+0xd4/0xd8
[ 42.834587] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.835380] kasan_atomics+0xb8/0x2e8
[ 42.836194] kunit_try_run_case+0x14c/0x3d0
[ 42.836918] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.837783] kthread+0x24c/0x2d0
[ 42.838328] ret_from_fork+0x10/0x20
[ 42.839004]
[ 42.839432] The buggy address belongs to the object at fff00000c6998980
[ 42.839432] which belongs to the cache kmalloc-64 of size 64
[ 42.841052] The buggy address is located 0 bytes to the right of
[ 42.841052] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.842757]
[ 42.843269] The buggy address belongs to the physical page:
[ 42.844011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.845118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.846026] page_type: f5(slab)
[ 42.846586] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.847756] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.848826] page dumped because: kasan: bad access detected
[ 42.849644]
[ 42.850075] Memory state around the buggy address:
[ 42.851010] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.852020] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.852985] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.853988] ^
[ 42.854732] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.855677] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.856600] ==================================================================
---
[ 41.842831] ==================================================================
[ 41.844156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[ 41.845560] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.846442]
[ 41.846790] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.847900] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.848497] Hardware name: linux,dummy-virt (DT)
[ 41.849326] Call trace:
[ 41.849832] show_stack+0x20/0x38 (C)
[ 41.850356] dump_stack_lvl+0x8c/0xd0
[ 41.851056] print_report+0x118/0x5e0
[ 41.851706] kasan_report+0xc8/0x118
[ 41.852237] kasan_check_range+0x100/0x1a8
[ 41.853045] __kasan_check_write+0x20/0x30
[ 41.853798] kasan_atomics_helper+0xb70/0x4858
[ 41.854631] kasan_atomics+0x198/0x2e8
[ 41.855381] kunit_try_run_case+0x14c/0x3d0
[ 41.856055] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.856833] kthread+0x24c/0x2d0
[ 41.857431] ret_from_fork+0x10/0x20
[ 41.858036]
[ 41.858368] Allocated by task 253:
[ 41.859023] kasan_save_stack+0x3c/0x68
[ 41.859697] kasan_save_track+0x20/0x40
[ 41.860354] kasan_save_alloc_info+0x40/0x58
[ 41.861029] __kasan_kmalloc+0xd4/0xd8
[ 41.861616] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.862281] kasan_atomics+0xb8/0x2e8
[ 41.862852] kunit_try_run_case+0x14c/0x3d0
[ 41.863449] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.864234] kthread+0x24c/0x2d0
[ 41.864769] ret_from_fork+0x10/0x20
[ 41.865306]
[ 41.865629] The buggy address belongs to the object at fff00000c6998980
[ 41.865629] which belongs to the cache kmalloc-64 of size 64
[ 41.867152] The buggy address is located 0 bytes to the right of
[ 41.867152] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.868668]
[ 41.869035] The buggy address belongs to the physical page:
[ 41.869834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.870749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.871818] page_type: f5(slab)
[ 41.872433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.873400] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.874432] page dumped because: kasan: bad access detected
[ 41.875220]
[ 41.875631] Memory state around the buggy address:
[ 41.876249] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.877140] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.878155] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.879147] ^
[ 41.879926] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.880927] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.881883] ==================================================================
---
[ 42.093480] ==================================================================
[ 42.094582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[ 42.096844] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.098278]
[ 42.098877] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.100163] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.100677] Hardware name: linux,dummy-virt (DT)
[ 42.101451] Call trace:
[ 42.101906] show_stack+0x20/0x38 (C)
[ 42.102759] dump_stack_lvl+0x8c/0xd0
[ 42.103373] print_report+0x118/0x5e0
[ 42.104203] kasan_report+0xc8/0x118
[ 42.104866] kasan_check_range+0x100/0x1a8
[ 42.105503] __kasan_check_write+0x20/0x30
[ 42.106148] kasan_atomics_helper+0xd3c/0x4858
[ 42.106894] kasan_atomics+0x198/0x2e8
[ 42.107351] kunit_try_run_case+0x14c/0x3d0
[ 42.107851] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.108405] kthread+0x24c/0x2d0
[ 42.108848] ret_from_fork+0x10/0x20
[ 42.109421]
[ 42.109884] Allocated by task 253:
[ 42.110655] kasan_save_stack+0x3c/0x68
[ 42.111193] kasan_save_track+0x20/0x40
[ 42.111890] kasan_save_alloc_info+0x40/0x58
[ 42.112437] __kasan_kmalloc+0xd4/0xd8
[ 42.113145] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.113816] kasan_atomics+0xb8/0x2e8
[ 42.114287] kunit_try_run_case+0x14c/0x3d0
[ 42.115333] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.116283] kthread+0x24c/0x2d0
[ 42.116799] ret_from_fork+0x10/0x20
[ 42.117232]
[ 42.117555] The buggy address belongs to the object at fff00000c6998980
[ 42.117555] which belongs to the cache kmalloc-64 of size 64
[ 42.118927] The buggy address is located 0 bytes to the right of
[ 42.118927] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.120396]
[ 42.120949] The buggy address belongs to the physical page:
[ 42.121792] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.123000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.123913] page_type: f5(slab)
[ 42.124628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.125540] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.126656] page dumped because: kasan: bad access detected
[ 42.127398]
[ 42.127700] Memory state around the buggy address:
[ 42.128166] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.129248] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.130117] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.131126] ^
[ 42.131830] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.132924] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.133804] ==================================================================
---
[ 41.388506] ==================================================================
[ 41.389861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[ 41.390847] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.391791]
[ 41.392352] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.393566] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.394194] Hardware name: linux,dummy-virt (DT)
[ 41.394939] Call trace:
[ 41.395435] show_stack+0x20/0x38 (C)
[ 41.396157] dump_stack_lvl+0x8c/0xd0
[ 41.396830] print_report+0x118/0x5e0
[ 41.397513] kasan_report+0xc8/0x118
[ 41.398238] kasan_check_range+0x100/0x1a8
[ 41.398966] __kasan_check_write+0x20/0x30
[ 41.399673] kasan_atomics_helper+0x6ec/0x4858
[ 41.400344] kasan_atomics+0x198/0x2e8
[ 41.400975] kunit_try_run_case+0x14c/0x3d0
[ 41.401837] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.402807] kthread+0x24c/0x2d0
[ 41.403361] ret_from_fork+0x10/0x20
[ 41.404125]
[ 41.404490] Allocated by task 253:
[ 41.405112] kasan_save_stack+0x3c/0x68
[ 41.405878] kasan_save_track+0x20/0x40
[ 41.406559] kasan_save_alloc_info+0x40/0x58
[ 41.407274] __kasan_kmalloc+0xd4/0xd8
[ 41.407863] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.408586] kasan_atomics+0xb8/0x2e8
[ 41.409349] kunit_try_run_case+0x14c/0x3d0
[ 41.410004] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.410888] kthread+0x24c/0x2d0
[ 41.411569] ret_from_fork+0x10/0x20
[ 41.412300]
[ 41.412659] The buggy address belongs to the object at fff00000c6998980
[ 41.412659] which belongs to the cache kmalloc-64 of size 64
[ 41.414322] The buggy address is located 0 bytes to the right of
[ 41.414322] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.415959]
[ 41.416423] The buggy address belongs to the physical page:
[ 41.417207] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.418302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.419199] page_type: f5(slab)
[ 41.419787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.420823] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.421927] page dumped because: kasan: bad access detected
[ 41.422751]
[ 41.423242] Memory state around the buggy address:
[ 41.423891] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.424993] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.426070] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.427007] ^
[ 41.427758] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.428754] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.429727] ==================================================================
---
[ 41.218146] ==================================================================
[ 41.219058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[ 41.220076] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.221077]
[ 41.221624] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.222837] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.223611] Hardware name: linux,dummy-virt (DT)
[ 41.224252] Call trace:
[ 41.224692] show_stack+0x20/0x38 (C)
[ 41.225447] dump_stack_lvl+0x8c/0xd0
[ 41.226297] print_report+0x118/0x5e0
[ 41.227008] kasan_report+0xc8/0x118
[ 41.227639] kasan_check_range+0x100/0x1a8
[ 41.228279] __kasan_check_write+0x20/0x30
[ 41.228902] kasan_atomics_helper+0x54c/0x4858
[ 41.229547] kasan_atomics+0x198/0x2e8
[ 41.230165] kunit_try_run_case+0x14c/0x3d0
[ 41.230879] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.231875] kthread+0x24c/0x2d0
[ 41.232564] ret_from_fork+0x10/0x20
[ 41.233247]
[ 41.233642] Allocated by task 253:
[ 41.234299] kasan_save_stack+0x3c/0x68
[ 41.234983] kasan_save_track+0x20/0x40
[ 41.235495] kasan_save_alloc_info+0x40/0x58
[ 41.236194] __kasan_kmalloc+0xd4/0xd8
[ 41.236842] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.237613] kasan_atomics+0xb8/0x2e8
[ 41.238225] kunit_try_run_case+0x14c/0x3d0
[ 41.238946] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.239724] kthread+0x24c/0x2d0
[ 41.240262] ret_from_fork+0x10/0x20
[ 41.240823]
[ 41.241129] The buggy address belongs to the object at fff00000c6998980
[ 41.241129] which belongs to the cache kmalloc-64 of size 64
[ 41.242775] The buggy address is located 0 bytes to the right of
[ 41.242775] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.244330]
[ 41.244723] The buggy address belongs to the physical page:
[ 41.245558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.246504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.247470] page_type: f5(slab)
[ 41.248138] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.249042] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.250010] page dumped because: kasan: bad access detected
[ 41.250616]
[ 41.251011] Memory state around the buggy address:
[ 41.251612] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.252678] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.253577] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.254415] ^
[ 41.255229] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.256109] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.257010] ==================================================================
---
[ 42.557569] ==================================================================
[ 42.558696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[ 42.560610] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.561469]
[ 42.561894] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.563092] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.563661] Hardware name: linux,dummy-virt (DT)
[ 42.564377] Call trace:
[ 42.564910] show_stack+0x20/0x38 (C)
[ 42.565480] dump_stack_lvl+0x8c/0xd0
[ 42.566241] print_report+0x118/0x5e0
[ 42.566897] kasan_report+0xc8/0x118
[ 42.567465] kasan_check_range+0x100/0x1a8
[ 42.568144] __kasan_check_write+0x20/0x30
[ 42.568677] kasan_atomics_helper+0x10c0/0x4858
[ 42.569483] kasan_atomics+0x198/0x2e8
[ 42.570205] kunit_try_run_case+0x14c/0x3d0
[ 42.570795] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.571499] kthread+0x24c/0x2d0
[ 42.572173] ret_from_fork+0x10/0x20
[ 42.572976]
[ 42.573310] Allocated by task 253:
[ 42.573975] kasan_save_stack+0x3c/0x68
[ 42.574598] kasan_save_track+0x20/0x40
[ 42.575139] kasan_save_alloc_info+0x40/0x58
[ 42.575835] __kasan_kmalloc+0xd4/0xd8
[ 42.576364] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.577134] kasan_atomics+0xb8/0x2e8
[ 42.577728] kunit_try_run_case+0x14c/0x3d0
[ 42.578335] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.579109] kthread+0x24c/0x2d0
[ 42.579687] ret_from_fork+0x10/0x20
[ 42.580275]
[ 42.580596] The buggy address belongs to the object at fff00000c6998980
[ 42.580596] which belongs to the cache kmalloc-64 of size 64
[ 42.581882] The buggy address is located 0 bytes to the right of
[ 42.581882] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.583378]
[ 42.583720] The buggy address belongs to the physical page:
[ 42.584585] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.585542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.586348] page_type: f5(slab)
[ 42.586968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.587880] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.588883] page dumped because: kasan: bad access detected
[ 42.589638]
[ 42.590010] Memory state around the buggy address:
[ 42.590660] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.591783] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.592641] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.593723] ^
[ 42.594339] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.595172] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.596285] ==================================================================
---
[ 41.130456] ==================================================================
[ 41.131780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[ 41.133011] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.134007]
[ 41.134585] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.135897] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.136795] Hardware name: linux,dummy-virt (DT)
[ 41.137371] Call trace:
[ 41.137876] show_stack+0x20/0x38 (C)
[ 41.138778] dump_stack_lvl+0x8c/0xd0
[ 41.139312] print_report+0x118/0x5e0
[ 41.140181] kasan_report+0xc8/0x118
[ 41.141060] kasan_check_range+0x100/0x1a8
[ 41.141737] __kasan_check_write+0x20/0x30
[ 41.142605] kasan_atomics_helper+0x47c/0x4858
[ 41.143578] kasan_atomics+0x198/0x2e8
[ 41.144462] kunit_try_run_case+0x14c/0x3d0
[ 41.145204] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.146082] kthread+0x24c/0x2d0
[ 41.146728] ret_from_fork+0x10/0x20
[ 41.147405]
[ 41.147886] Allocated by task 253:
[ 41.148428] kasan_save_stack+0x3c/0x68
[ 41.149223] kasan_save_track+0x20/0x40
[ 41.149925] kasan_save_alloc_info+0x40/0x58
[ 41.150618] __kasan_kmalloc+0xd4/0xd8
[ 41.151331] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.152018] kasan_atomics+0xb8/0x2e8
[ 41.152729] kunit_try_run_case+0x14c/0x3d0
[ 41.153447] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.154335] kthread+0x24c/0x2d0
[ 41.154918] ret_from_fork+0x10/0x20
[ 41.155550]
[ 41.156005] The buggy address belongs to the object at fff00000c6998980
[ 41.156005] which belongs to the cache kmalloc-64 of size 64
[ 41.157557] The buggy address is located 0 bytes to the right of
[ 41.157557] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.159134]
[ 41.159673] The buggy address belongs to the physical page:
[ 41.160541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.161631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.162570] page_type: f5(slab)
[ 41.163095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.164229] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.165101] page dumped because: kasan: bad access detected
[ 41.165858]
[ 41.166225] Memory state around the buggy address:
[ 41.166921] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.167863] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.168664] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.169687] ^
[ 41.170295] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.171386] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.172273] ==================================================================
---
[ 43.021604] ==================================================================
[ 43.022424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[ 43.023840] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 43.024941]
[ 43.025396] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.026671] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.027208] Hardware name: linux,dummy-virt (DT)
[ 43.028002] Call trace:
[ 43.028389] show_stack+0x20/0x38 (C)
[ 43.029088] dump_stack_lvl+0x8c/0xd0
[ 43.029780] print_report+0x118/0x5e0
[ 43.030364] kasan_report+0xc8/0x118
[ 43.030949] kasan_check_range+0x100/0x1a8
[ 43.031563] __kasan_check_write+0x20/0x30
[ 43.032304] kasan_atomics_helper+0x154c/0x4858
[ 43.032942] kasan_atomics+0x198/0x2e8
[ 43.033698] kunit_try_run_case+0x14c/0x3d0
[ 43.034313] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.035230] kthread+0x24c/0x2d0
[ 43.035808] ret_from_fork+0x10/0x20
[ 43.036483]
[ 43.036883] Allocated by task 253:
[ 43.037408] kasan_save_stack+0x3c/0x68
[ 43.038028] kasan_save_track+0x20/0x40
[ 43.038679] kasan_save_alloc_info+0x40/0x58
[ 43.039354] __kasan_kmalloc+0xd4/0xd8
[ 43.039930] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.040617] kasan_atomics+0xb8/0x2e8
[ 43.041199] kunit_try_run_case+0x14c/0x3d0
[ 43.041871] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.042647] kthread+0x24c/0x2d0
[ 43.043182] ret_from_fork+0x10/0x20
[ 43.043700]
[ 43.044152] The buggy address belongs to the object at fff00000c6998980
[ 43.044152] which belongs to the cache kmalloc-64 of size 64
[ 43.045588] The buggy address is located 0 bytes to the right of
[ 43.045588] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 43.047069]
[ 43.047429] The buggy address belongs to the physical page:
[ 43.048335] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 43.049312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.050263] page_type: f5(slab)
[ 43.050724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 43.051797] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 43.052738] page dumped because: kasan: bad access detected
[ 43.053468]
[ 43.053845] Memory state around the buggy address:
[ 43.054487] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.055563] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.056442] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 43.057395] ^
[ 43.058138] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.059077] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.059962] ==================================================================
---
[ 40.777771] ==================================================================
[ 40.778807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[ 40.780437] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 40.781809]
[ 40.782220] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.783830] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.784448] Hardware name: linux,dummy-virt (DT)
[ 40.785078] Call trace:
[ 40.785438] show_stack+0x20/0x38 (C)
[ 40.785953] dump_stack_lvl+0x8c/0xd0
[ 40.786585] print_report+0x118/0x5e0
[ 40.787432] kasan_report+0xc8/0x118
[ 40.787961] kasan_check_range+0x100/0x1a8
[ 40.789101] __kasan_check_write+0x20/0x30
[ 40.790012] kasan_atomics_helper+0x24c/0x4858
[ 40.790754] kasan_atomics+0x198/0x2e8
[ 40.792005] kunit_try_run_case+0x14c/0x3d0
[ 40.792776] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.793571] kthread+0x24c/0x2d0
[ 40.794176] ret_from_fork+0x10/0x20
[ 40.794952]
[ 40.795510] Allocated by task 253:
[ 40.796278] kasan_save_stack+0x3c/0x68
[ 40.796788] kasan_save_track+0x20/0x40
[ 40.797762] kasan_save_alloc_info+0x40/0x58
[ 40.799428] __kasan_kmalloc+0xd4/0xd8
[ 40.800091] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.800729] kasan_atomics+0xb8/0x2e8
[ 40.802101] kunit_try_run_case+0x14c/0x3d0
[ 40.802757] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.803834] kthread+0x24c/0x2d0
[ 40.804738] ret_from_fork+0x10/0x20
[ 40.806060]
[ 40.806487] The buggy address belongs to the object at fff00000c6998980
[ 40.806487] which belongs to the cache kmalloc-64 of size 64
[ 40.808436] The buggy address is located 0 bytes to the right of
[ 40.808436] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 40.810419]
[ 40.811178] The buggy address belongs to the physical page:
[ 40.811940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 40.812737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.813735] page_type: f5(slab)
[ 40.814247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 40.815214] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 40.816415] page dumped because: kasan: bad access detected
[ 40.817050]
[ 40.817480] Memory state around the buggy address:
[ 40.819241] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.820049] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.820622] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 40.821572] ^
[ 40.822198] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.823050] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.824257] ==================================================================
---
[ 41.681386] ==================================================================
[ 41.684126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[ 41.685181] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.686185]
[ 41.686597] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.687731] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.688345] Hardware name: linux,dummy-virt (DT)
[ 41.689111] Call trace:
[ 41.689694] show_stack+0x20/0x38 (C)
[ 41.690378] dump_stack_lvl+0x8c/0xd0
[ 41.691009] print_report+0x118/0x5e0
[ 41.691748] kasan_report+0xc8/0x118
[ 41.692262] kasan_check_range+0x100/0x1a8
[ 41.693029] __kasan_check_write+0x20/0x30
[ 41.693741] kasan_atomics_helper+0xa04/0x4858
[ 41.694618] kasan_atomics+0x198/0x2e8
[ 41.695207] kunit_try_run_case+0x14c/0x3d0
[ 41.695957] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.696677] kthread+0x24c/0x2d0
[ 41.697353] ret_from_fork+0x10/0x20
[ 41.697950]
[ 41.698333] Allocated by task 253:
[ 41.698862] kasan_save_stack+0x3c/0x68
[ 41.699391] kasan_save_track+0x20/0x40
[ 41.700115] kasan_save_alloc_info+0x40/0x58
[ 41.700788] __kasan_kmalloc+0xd4/0xd8
[ 41.701493] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.702140] kasan_atomics+0xb8/0x2e8
[ 41.702620] kunit_try_run_case+0x14c/0x3d0
[ 41.703345] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.704077] kthread+0x24c/0x2d0
[ 41.704729] ret_from_fork+0x10/0x20
[ 41.705394]
[ 41.705760] The buggy address belongs to the object at fff00000c6998980
[ 41.705760] which belongs to the cache kmalloc-64 of size 64
[ 41.707190] The buggy address is located 0 bytes to the right of
[ 41.707190] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.708747]
[ 41.709116] The buggy address belongs to the physical page:
[ 41.709888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.710902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.711785] page_type: f5(slab)
[ 41.712313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.713214] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.714197] page dumped because: kasan: bad access detected
[ 41.714993]
[ 41.715371] Memory state around the buggy address:
[ 41.715979] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.716887] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.717755] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.718613] ^
[ 41.719345] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.720311] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.721311] ==================================================================
---
[ 42.685942] ==================================================================
[ 42.687342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[ 42.688861] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.690150]
[ 42.690468] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.691275] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.692347] Hardware name: linux,dummy-virt (DT)
[ 42.693171] Call trace:
[ 42.693703] show_stack+0x20/0x38 (C)
[ 42.694550] dump_stack_lvl+0x8c/0xd0
[ 42.695378] print_report+0x118/0x5e0
[ 42.696162] kasan_report+0xc8/0x118
[ 42.696930] kasan_check_range+0x100/0x1a8
[ 42.697724] __kasan_check_write+0x20/0x30
[ 42.698442] kasan_atomics_helper+0x11f8/0x4858
[ 42.699266] kasan_atomics+0x198/0x2e8
[ 42.699900] kunit_try_run_case+0x14c/0x3d0
[ 42.700557] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.701454] kthread+0x24c/0x2d0
[ 42.702000] ret_from_fork+0x10/0x20
[ 42.702569]
[ 42.702850] Allocated by task 253:
[ 42.703480] kasan_save_stack+0x3c/0x68
[ 42.704215] kasan_save_track+0x20/0x40
[ 42.705055] kasan_save_alloc_info+0x40/0x58
[ 42.705862] __kasan_kmalloc+0xd4/0xd8
[ 42.706420] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.707155] kasan_atomics+0xb8/0x2e8
[ 42.707730] kunit_try_run_case+0x14c/0x3d0
[ 42.708329] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.709138] kthread+0x24c/0x2d0
[ 42.709699] ret_from_fork+0x10/0x20
[ 42.710340]
[ 42.710678] The buggy address belongs to the object at fff00000c6998980
[ 42.710678] which belongs to the cache kmalloc-64 of size 64
[ 42.712061] The buggy address is located 0 bytes to the right of
[ 42.712061] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.713651]
[ 42.714084] The buggy address belongs to the physical page:
[ 42.714862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.715883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.716907] page_type: f5(slab)
[ 42.717541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.718466] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.719340] page dumped because: kasan: bad access detected
[ 42.720088]
[ 42.720435] Memory state around the buggy address:
[ 42.721080] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.722119] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.723183] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.723944] ^
[ 42.724756] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.725714] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.726565] ==================================================================
---
[ 40.926024] ==================================================================
[ 40.927375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[ 40.929162] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 40.930161]
[ 40.930905] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.934183] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.934999] Hardware name: linux,dummy-virt (DT)
[ 40.936119] Call trace:
[ 40.936573] show_stack+0x20/0x38 (C)
[ 40.937326] dump_stack_lvl+0x8c/0xd0
[ 40.937951] print_report+0x118/0x5e0
[ 40.938591] kasan_report+0xc8/0x118
[ 40.939555] kasan_check_range+0x100/0x1a8
[ 40.940265] __kasan_check_write+0x20/0x30
[ 40.940991] kasan_atomics_helper+0x32c/0x4858
[ 40.941734] kasan_atomics+0x198/0x2e8
[ 40.942407] kunit_try_run_case+0x14c/0x3d0
[ 40.943327] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.944257] kthread+0x24c/0x2d0
[ 40.944806] ret_from_fork+0x10/0x20
[ 40.945703]
[ 40.946082] Allocated by task 253:
[ 40.946644] kasan_save_stack+0x3c/0x68
[ 40.947471] kasan_save_track+0x20/0x40
[ 40.948113] kasan_save_alloc_info+0x40/0x58
[ 40.948747] __kasan_kmalloc+0xd4/0xd8
[ 40.949620] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.950170] kasan_atomics+0xb8/0x2e8
[ 40.951078] kunit_try_run_case+0x14c/0x3d0
[ 40.952152] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.952979] kthread+0x24c/0x2d0
[ 40.953729] ret_from_fork+0x10/0x20
[ 40.954271]
[ 40.954585] The buggy address belongs to the object at fff00000c6998980
[ 40.954585] which belongs to the cache kmalloc-64 of size 64
[ 40.956709] The buggy address is located 0 bytes to the right of
[ 40.956709] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 40.958183]
[ 40.958593] The buggy address belongs to the physical page:
[ 40.959577] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 40.960985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.962390] page_type: f5(slab)
[ 40.963229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 40.964567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 40.966010] page dumped because: kasan: bad access detected
[ 40.967101]
[ 40.967606] Memory state around the buggy address:
[ 40.968938] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.970912] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.972185] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 40.973253] ^
[ 40.974018] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.975511] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.976308] ==================================================================
---
[ 41.027984] ==================================================================
[ 41.028838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[ 41.030127] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.031482]
[ 41.032441] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.033103] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.033420] Hardware name: linux,dummy-virt (DT)
[ 41.034927] Call trace:
[ 41.035636] show_stack+0x20/0x38 (C)
[ 41.036730] dump_stack_lvl+0x8c/0xd0
[ 41.037746] print_report+0x118/0x5e0
[ 41.038645] kasan_report+0xc8/0x118
[ 41.039705] kasan_check_range+0x100/0x1a8
[ 41.040486] __kasan_check_write+0x20/0x30
[ 41.041272] kasan_atomics_helper+0x3ac/0x4858
[ 41.042178] kasan_atomics+0x198/0x2e8
[ 41.042932] kunit_try_run_case+0x14c/0x3d0
[ 41.043632] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.044405] kthread+0x24c/0x2d0
[ 41.045037] ret_from_fork+0x10/0x20
[ 41.045722]
[ 41.046155] Allocated by task 253:
[ 41.047119] kasan_save_stack+0x3c/0x68
[ 41.048069] kasan_save_track+0x20/0x40
[ 41.048578] kasan_save_alloc_info+0x40/0x58
[ 41.049344] __kasan_kmalloc+0xd4/0xd8
[ 41.050002] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.050593] kasan_atomics+0xb8/0x2e8
[ 41.052230] kunit_try_run_case+0x14c/0x3d0
[ 41.053934] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.054772] kthread+0x24c/0x2d0
[ 41.055560] ret_from_fork+0x10/0x20
[ 41.056446]
[ 41.056803] The buggy address belongs to the object at fff00000c6998980
[ 41.056803] which belongs to the cache kmalloc-64 of size 64
[ 41.058338] The buggy address is located 0 bytes to the right of
[ 41.058338] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.060992]
[ 41.061604] The buggy address belongs to the physical page:
[ 41.062325] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.064318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.064992] page_type: f5(slab)
[ 41.065592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.066638] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.068178] page dumped because: kasan: bad access detected
[ 41.068814]
[ 41.069189] Memory state around the buggy address:
[ 41.069890] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.071908] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.072716] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.073472] ^
[ 41.074225] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.075118] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.077149] ==================================================================
---
[ 41.761803] ==================================================================
[ 41.762764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[ 41.764057] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.765052]
[ 41.765409] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.768285] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.768982] Hardware name: linux,dummy-virt (DT)
[ 41.769869] Call trace:
[ 41.770265] show_stack+0x20/0x38 (C)
[ 41.770905] dump_stack_lvl+0x8c/0xd0
[ 41.771468] print_report+0x118/0x5e0
[ 41.772051] kasan_report+0xc8/0x118
[ 41.772793] kasan_check_range+0x100/0x1a8
[ 41.773628] __kasan_check_write+0x20/0x30
[ 41.774245] kasan_atomics_helper+0xad4/0x4858
[ 41.774895] kasan_atomics+0x198/0x2e8
[ 41.775566] kunit_try_run_case+0x14c/0x3d0
[ 41.776252] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.776996] kthread+0x24c/0x2d0
[ 41.777641] ret_from_fork+0x10/0x20
[ 41.778264]
[ 41.778646] Allocated by task 253:
[ 41.779178] kasan_save_stack+0x3c/0x68
[ 41.779735] kasan_save_track+0x20/0x40
[ 41.780400] kasan_save_alloc_info+0x40/0x58
[ 41.781019] __kasan_kmalloc+0xd4/0xd8
[ 41.781652] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.782315] kasan_atomics+0xb8/0x2e8
[ 41.783080] kunit_try_run_case+0x14c/0x3d0
[ 41.783606] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.784427] kthread+0x24c/0x2d0
[ 41.785046] ret_from_fork+0x10/0x20
[ 41.785791]
[ 41.786131] The buggy address belongs to the object at fff00000c6998980
[ 41.786131] which belongs to the cache kmalloc-64 of size 64
[ 41.787474] The buggy address is located 0 bytes to the right of
[ 41.787474] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.789062]
[ 41.789424] The buggy address belongs to the physical page:
[ 41.790237] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.791182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.792087] page_type: f5(slab)
[ 41.792600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.793678] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.794462] page dumped because: kasan: bad access detected
[ 41.795249]
[ 41.795671] Memory state around the buggy address:
[ 41.796292] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.797067] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.798118] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.798852] ^
[ 41.799667] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.800597] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.801458] ==================================================================
---
[ 42.261662] ==================================================================
[ 42.263242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[ 42.264697] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.265387]
[ 42.265875] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.266928] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.267709] Hardware name: linux,dummy-virt (DT)
[ 42.268426] Call trace:
[ 42.268954] show_stack+0x20/0x38 (C)
[ 42.269486] dump_stack_lvl+0x8c/0xd0
[ 42.270213] print_report+0x118/0x5e0
[ 42.270756] kasan_report+0xc8/0x118
[ 42.271593] kasan_check_range+0x100/0x1a8
[ 42.272329] __kasan_check_write+0x20/0x30
[ 42.272972] kasan_atomics_helper+0xe44/0x4858
[ 42.273847] kasan_atomics+0x198/0x2e8
[ 42.274591] kunit_try_run_case+0x14c/0x3d0
[ 42.275355] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.276182] kthread+0x24c/0x2d0
[ 42.276832] ret_from_fork+0x10/0x20
[ 42.277499]
[ 42.277861] Allocated by task 253:
[ 42.278509] kasan_save_stack+0x3c/0x68
[ 42.279217] kasan_save_track+0x20/0x40
[ 42.279859] kasan_save_alloc_info+0x40/0x58
[ 42.280679] __kasan_kmalloc+0xd4/0xd8
[ 42.281320] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.281951] kasan_atomics+0xb8/0x2e8
[ 42.282557] kunit_try_run_case+0x14c/0x3d0
[ 42.283289] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.284161] kthread+0x24c/0x2d0
[ 42.284792] ret_from_fork+0x10/0x20
[ 42.285445]
[ 42.285836] The buggy address belongs to the object at fff00000c6998980
[ 42.285836] which belongs to the cache kmalloc-64 of size 64
[ 42.287303] The buggy address is located 0 bytes to the right of
[ 42.287303] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.288941]
[ 42.289480] The buggy address belongs to the physical page:
[ 42.290250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.291362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.292273] page_type: f5(slab)
[ 42.292913] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.294029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.295050] page dumped because: kasan: bad access detected
[ 42.295713]
[ 42.296109] Memory state around the buggy address:
[ 42.296998] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.298023] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.298981] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.300030] ^
[ 42.300788] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.301895] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.302927] ==================================================================
---
[ 42.642277] ==================================================================
[ 42.643338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[ 42.644312] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.645179]
[ 42.645805] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.647039] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.647719] Hardware name: linux,dummy-virt (DT)
[ 42.648415] Call trace:
[ 42.648789] show_stack+0x20/0x38 (C)
[ 42.649706] dump_stack_lvl+0x8c/0xd0
[ 42.650590] print_report+0x118/0x5e0
[ 42.651383] kasan_report+0xc8/0x118
[ 42.651976] kasan_check_range+0x100/0x1a8
[ 42.652861] __kasan_check_write+0x20/0x30
[ 42.653470] kasan_atomics_helper+0x1190/0x4858
[ 42.654376] kasan_atomics+0x198/0x2e8
[ 42.655085] kunit_try_run_case+0x14c/0x3d0
[ 42.655957] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.656752] kthread+0x24c/0x2d0
[ 42.657247] ret_from_fork+0x10/0x20
[ 42.658125]
[ 42.658653] Allocated by task 253:
[ 42.659381] kasan_save_stack+0x3c/0x68
[ 42.660160] kasan_save_track+0x20/0x40
[ 42.660813] kasan_save_alloc_info+0x40/0x58
[ 42.661603] __kasan_kmalloc+0xd4/0xd8
[ 42.662292] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.663034] kasan_atomics+0xb8/0x2e8
[ 42.663648] kunit_try_run_case+0x14c/0x3d0
[ 42.664397] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.665284] kthread+0x24c/0x2d0
[ 42.665898] ret_from_fork+0x10/0x20
[ 42.666574]
[ 42.667019] The buggy address belongs to the object at fff00000c6998980
[ 42.667019] which belongs to the cache kmalloc-64 of size 64
[ 42.668474] The buggy address is located 0 bytes to the right of
[ 42.668474] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.670183]
[ 42.670640] The buggy address belongs to the physical page:
[ 42.671692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.672774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.673821] page_type: f5(slab)
[ 42.674330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.675424] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.676275] page dumped because: kasan: bad access detected
[ 42.676992]
[ 42.677374] Memory state around the buggy address:
[ 42.678192] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.679139] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.680213] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.681177] ^
[ 42.681974] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.682895] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.683943] ==================================================================
---
[ 42.768655] ==================================================================
[ 42.770175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[ 42.772060] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.773092]
[ 42.773494] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.775125] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.775803] Hardware name: linux,dummy-virt (DT)
[ 42.776693] Call trace:
[ 42.777166] show_stack+0x20/0x38 (C)
[ 42.777819] dump_stack_lvl+0x8c/0xd0
[ 42.778353] print_report+0x118/0x5e0
[ 42.778945] kasan_report+0xc8/0x118
[ 42.779596] kasan_check_range+0x100/0x1a8
[ 42.780451] __kasan_check_write+0x20/0x30
[ 42.781311] kasan_atomics_helper+0x12d8/0x4858
[ 42.782157] kasan_atomics+0x198/0x2e8
[ 42.782841] kunit_try_run_case+0x14c/0x3d0
[ 42.783641] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.784451] kthread+0x24c/0x2d0
[ 42.785076] ret_from_fork+0x10/0x20
[ 42.785763]
[ 42.786128] Allocated by task 253:
[ 42.786757] kasan_save_stack+0x3c/0x68
[ 42.787485] kasan_save_track+0x20/0x40
[ 42.788145] kasan_save_alloc_info+0x40/0x58
[ 42.788781] __kasan_kmalloc+0xd4/0xd8
[ 42.789488] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.790133] kasan_atomics+0xb8/0x2e8
[ 42.790806] kunit_try_run_case+0x14c/0x3d0
[ 42.791513] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.792457] kthread+0x24c/0x2d0
[ 42.793021] ret_from_fork+0x10/0x20
[ 42.793745]
[ 42.794165] The buggy address belongs to the object at fff00000c6998980
[ 42.794165] which belongs to the cache kmalloc-64 of size 64
[ 42.795733] The buggy address is located 0 bytes to the right of
[ 42.795733] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.797291]
[ 42.797830] The buggy address belongs to the physical page:
[ 42.798715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.799915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.800823] page_type: f5(slab)
[ 42.801377] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.802491] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.803473] page dumped because: kasan: bad access detected
[ 42.804172]
[ 42.804474] Memory state around the buggy address:
[ 42.805292] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.806321] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.807288] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.808249] ^
[ 42.808988] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.810060] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.811081] ==================================================================
---
[ 43.230411] ==================================================================
[ 43.231273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[ 43.232339] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 43.233501]
[ 43.233930] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.235255] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.235977] Hardware name: linux,dummy-virt (DT)
[ 43.236740] Call trace:
[ 43.237240] show_stack+0x20/0x38 (C)
[ 43.237905] dump_stack_lvl+0x8c/0xd0
[ 43.238551] print_report+0x118/0x5e0
[ 43.239315] kasan_report+0xc8/0x118
[ 43.239917] kasan_check_range+0x100/0x1a8
[ 43.240660] __kasan_check_write+0x20/0x30
[ 43.241326] kasan_atomics_helper+0x16d0/0x4858
[ 43.242011] kasan_atomics+0x198/0x2e8
[ 43.242603] kunit_try_run_case+0x14c/0x3d0
[ 43.243396] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.244112] kthread+0x24c/0x2d0
[ 43.244851] ret_from_fork+0x10/0x20
[ 43.245494]
[ 43.245825] Allocated by task 253:
[ 43.246427] kasan_save_stack+0x3c/0x68
[ 43.246994] kasan_save_track+0x20/0x40
[ 43.247627] kasan_save_alloc_info+0x40/0x58
[ 43.248346] __kasan_kmalloc+0xd4/0xd8
[ 43.248920] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.249823] kasan_atomics+0xb8/0x2e8
[ 43.250484] kunit_try_run_case+0x14c/0x3d0
[ 43.251237] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.252049] kthread+0x24c/0x2d0
[ 43.252651] ret_from_fork+0x10/0x20
[ 43.253186]
[ 43.253612] The buggy address belongs to the object at fff00000c6998980
[ 43.253612] which belongs to the cache kmalloc-64 of size 64
[ 43.255369] The buggy address is located 0 bytes to the right of
[ 43.255369] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 43.257081]
[ 43.257499] The buggy address belongs to the physical page:
[ 43.258410] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 43.259413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.260292] page_type: f5(slab)
[ 43.260826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 43.261941] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 43.262951] page dumped because: kasan: bad access detected
[ 43.263643]
[ 43.264031] Memory state around the buggy address:
[ 43.264622] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.265670] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.266617] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 43.267498] ^
[ 43.268273] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.269154] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.270133] ==================================================================
---
[ 42.389434] ==================================================================
[ 42.390216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[ 42.391430] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.392280]
[ 42.392792] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.393760] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.394439] Hardware name: linux,dummy-virt (DT)
[ 42.395064] Call trace:
[ 42.395543] show_stack+0x20/0x38 (C)
[ 42.396309] dump_stack_lvl+0x8c/0xd0
[ 42.396963] print_report+0x118/0x5e0
[ 42.397698] kasan_report+0xc8/0x118
[ 42.398388] kasan_check_range+0x100/0x1a8
[ 42.399149] __kasan_check_write+0x20/0x30
[ 42.399912] kasan_atomics_helper+0xf20/0x4858
[ 42.400668] kasan_atomics+0x198/0x2e8
[ 42.401557] kunit_try_run_case+0x14c/0x3d0
[ 42.402136] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.403112] kthread+0x24c/0x2d0
[ 42.403830] ret_from_fork+0x10/0x20
[ 42.404425]
[ 42.404839] Allocated by task 253:
[ 42.405412] kasan_save_stack+0x3c/0x68
[ 42.406136] kasan_save_track+0x20/0x40
[ 42.406710] kasan_save_alloc_info+0x40/0x58
[ 42.407454] __kasan_kmalloc+0xd4/0xd8
[ 42.408212] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.408833] kasan_atomics+0xb8/0x2e8
[ 42.409624] kunit_try_run_case+0x14c/0x3d0
[ 42.410232] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.410904] kthread+0x24c/0x2d0
[ 42.411581] ret_from_fork+0x10/0x20
[ 42.412207]
[ 42.412630] The buggy address belongs to the object at fff00000c6998980
[ 42.412630] which belongs to the cache kmalloc-64 of size 64
[ 42.414106] The buggy address is located 0 bytes to the right of
[ 42.414106] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.415625]
[ 42.416043] The buggy address belongs to the physical page:
[ 42.416686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.417760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.418612] page_type: f5(slab)
[ 42.419219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.420155] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.421106] page dumped because: kasan: bad access detected
[ 42.421889]
[ 42.422200] Memory state around the buggy address:
[ 42.422918] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.423781] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.424586] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.425611] ^
[ 42.426322] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.427292] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.428057] ==================================================================
---
[ 41.923462] ==================================================================
[ 41.925542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[ 41.926781] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.927857]
[ 41.928302] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.929453] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.930040] Hardware name: linux,dummy-virt (DT)
[ 41.930653] Call trace:
[ 41.931111] show_stack+0x20/0x38 (C)
[ 41.931741] dump_stack_lvl+0x8c/0xd0
[ 41.932450] print_report+0x118/0x5e0
[ 41.933036] kasan_report+0xc8/0x118
[ 41.933573] kasan_check_range+0x100/0x1a8
[ 41.934308] __kasan_check_write+0x20/0x30
[ 41.935053] kasan_atomics_helper+0xc08/0x4858
[ 41.935732] kasan_atomics+0x198/0x2e8
[ 41.936343] kunit_try_run_case+0x14c/0x3d0
[ 41.936922] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.937774] kthread+0x24c/0x2d0
[ 41.938441] ret_from_fork+0x10/0x20
[ 41.939031]
[ 41.939371] Allocated by task 253:
[ 41.939957] kasan_save_stack+0x3c/0x68
[ 41.940591] kasan_save_track+0x20/0x40
[ 41.941154] kasan_save_alloc_info+0x40/0x58
[ 41.941770] __kasan_kmalloc+0xd4/0xd8
[ 41.942410] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.943062] kasan_atomics+0xb8/0x2e8
[ 41.943613] kunit_try_run_case+0x14c/0x3d0
[ 41.944193] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.945158] kthread+0x24c/0x2d0
[ 41.945766] ret_from_fork+0x10/0x20
[ 41.946349]
[ 41.946725] The buggy address belongs to the object at fff00000c6998980
[ 41.946725] which belongs to the cache kmalloc-64 of size 64
[ 41.948147] The buggy address is located 0 bytes to the right of
[ 41.948147] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.949647]
[ 41.949999] The buggy address belongs to the physical page:
[ 41.950954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.951901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.952852] page_type: f5(slab)
[ 41.953334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.954392] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.955394] page dumped because: kasan: bad access detected
[ 41.956207]
[ 41.956478] Memory state around the buggy address:
[ 41.957647] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.958700] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.959700] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.960651] ^
[ 41.961017] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.961462] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.962720] ==================================================================
---
[ 42.728304] ==================================================================
[ 42.729200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[ 42.730266] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.731308]
[ 42.731681] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.732997] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.733587] Hardware name: linux,dummy-virt (DT)
[ 42.734367] Call trace:
[ 42.734764] show_stack+0x20/0x38 (C)
[ 42.735507] dump_stack_lvl+0x8c/0xd0
[ 42.736094] print_report+0x118/0x5e0
[ 42.736949] kasan_report+0xc8/0x118
[ 42.737535] kasan_check_range+0x100/0x1a8
[ 42.738392] __kasan_check_write+0x20/0x30
[ 42.739067] kasan_atomics_helper+0x126c/0x4858
[ 42.739771] kasan_atomics+0x198/0x2e8
[ 42.740342] kunit_try_run_case+0x14c/0x3d0
[ 42.741095] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.741871] kthread+0x24c/0x2d0
[ 42.742511] ret_from_fork+0x10/0x20
[ 42.743097]
[ 42.743444] Allocated by task 253:
[ 42.744061] kasan_save_stack+0x3c/0x68
[ 42.744779] kasan_save_track+0x20/0x40
[ 42.745570] kasan_save_alloc_info+0x40/0x58
[ 42.746214] __kasan_kmalloc+0xd4/0xd8
[ 42.746777] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.747567] kasan_atomics+0xb8/0x2e8
[ 42.748104] kunit_try_run_case+0x14c/0x3d0
[ 42.748977] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.749687] kthread+0x24c/0x2d0
[ 42.750253] ret_from_fork+0x10/0x20
[ 42.751002]
[ 42.751381] The buggy address belongs to the object at fff00000c6998980
[ 42.751381] which belongs to the cache kmalloc-64 of size 64
[ 42.752764] The buggy address is located 0 bytes to the right of
[ 42.752764] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.754150]
[ 42.754587] The buggy address belongs to the physical page:
[ 42.755173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.756365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.757150] page_type: f5(slab)
[ 42.757899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.758904] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.759922] page dumped because: kasan: bad access detected
[ 42.760718]
[ 42.761039] Memory state around the buggy address:
[ 42.761665] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.762688] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.763500] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.764441] ^
[ 42.765178] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.766155] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.767019] ==================================================================
---
[ 42.899327] ==================================================================
[ 42.900600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[ 42.901499] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.902568]
[ 42.903171] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.904351] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.904977] Hardware name: linux,dummy-virt (DT)
[ 42.905509] Call trace:
[ 42.905976] show_stack+0x20/0x38 (C)
[ 42.906688] dump_stack_lvl+0x8c/0xd0
[ 42.907430] print_report+0x118/0x5e0
[ 42.907999] kasan_report+0xc8/0x118
[ 42.908836] kasan_check_range+0x100/0x1a8
[ 42.909603] __kasan_check_write+0x20/0x30
[ 42.910223] kasan_atomics_helper+0x1414/0x4858
[ 42.911036] kasan_atomics+0x198/0x2e8
[ 42.911622] kunit_try_run_case+0x14c/0x3d0
[ 42.912284] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.913154] kthread+0x24c/0x2d0
[ 42.913684] ret_from_fork+0x10/0x20
[ 42.914339]
[ 42.914722] Allocated by task 253:
[ 42.915346] kasan_save_stack+0x3c/0x68
[ 42.915937] kasan_save_track+0x20/0x40
[ 42.916588] kasan_save_alloc_info+0x40/0x58
[ 42.917154] __kasan_kmalloc+0xd4/0xd8
[ 42.917794] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.918606] kasan_atomics+0xb8/0x2e8
[ 42.919160] kunit_try_run_case+0x14c/0x3d0
[ 42.919945] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.920736] kthread+0x24c/0x2d0
[ 42.921365] ret_from_fork+0x10/0x20
[ 42.921840]
[ 42.922324] The buggy address belongs to the object at fff00000c6998980
[ 42.922324] which belongs to the cache kmalloc-64 of size 64
[ 42.923760] The buggy address is located 0 bytes to the right of
[ 42.923760] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.925201]
[ 42.925591] The buggy address belongs to the physical page:
[ 42.926308] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.927201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.928200] page_type: f5(slab)
[ 42.928731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.929685] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.930695] page dumped because: kasan: bad access detected
[ 42.931394]
[ 42.931731] Memory state around the buggy address:
[ 42.932450] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.933445] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.934462] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.935418] ^
[ 42.936086] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.936982] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.937943] ==================================================================
---
[ 41.258545] ==================================================================
[ 41.259362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[ 41.260393] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.261774]
[ 41.262217] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.263378] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.263858] Hardware name: linux,dummy-virt (DT)
[ 41.264638] Call trace:
[ 41.265010] show_stack+0x20/0x38 (C)
[ 41.265853] dump_stack_lvl+0x8c/0xd0
[ 41.266483] print_report+0x118/0x5e0
[ 41.267053] kasan_report+0xc8/0x118
[ 41.267785] kasan_check_range+0x100/0x1a8
[ 41.268372] __kasan_check_write+0x20/0x30
[ 41.269112] kasan_atomics_helper+0x5b4/0x4858
[ 41.270029] kasan_atomics+0x198/0x2e8
[ 41.270691] kunit_try_run_case+0x14c/0x3d0
[ 41.271223] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.272135] kthread+0x24c/0x2d0
[ 41.272725] ret_from_fork+0x10/0x20
[ 41.273279]
[ 41.273773] Allocated by task 253:
[ 41.274372] kasan_save_stack+0x3c/0x68
[ 41.274927] kasan_save_track+0x20/0x40
[ 41.275636] kasan_save_alloc_info+0x40/0x58
[ 41.276160] __kasan_kmalloc+0xd4/0xd8
[ 41.276615] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.277083] kasan_atomics+0xb8/0x2e8
[ 41.277417] kunit_try_run_case+0x14c/0x3d0
[ 41.278916] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.279699] kthread+0x24c/0x2d0
[ 41.280197] ret_from_fork+0x10/0x20
[ 41.280711]
[ 41.281113] The buggy address belongs to the object at fff00000c6998980
[ 41.281113] which belongs to the cache kmalloc-64 of size 64
[ 41.282817] The buggy address is located 0 bytes to the right of
[ 41.282817] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.284360]
[ 41.284896] The buggy address belongs to the physical page:
[ 41.285632] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.286793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.287735] page_type: f5(slab)
[ 41.288388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.289475] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.290469] page dumped because: kasan: bad access detected
[ 41.291275]
[ 41.291781] Memory state around the buggy address:
[ 41.292459] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.293476] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.294453] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.295410] ^
[ 41.296268] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.297255] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.298291] ==================================================================
---
[ 41.722984] ==================================================================
[ 41.723782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[ 41.724962] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.726261]
[ 41.726609] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.727293] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.727686] Hardware name: linux,dummy-virt (DT)
[ 41.728134] Call trace:
[ 41.728467] show_stack+0x20/0x38 (C)
[ 41.729052] dump_stack_lvl+0x8c/0xd0
[ 41.729765] print_report+0x118/0x5e0
[ 41.730385] kasan_report+0xc8/0x118
[ 41.731084] kasan_check_range+0x100/0x1a8
[ 41.731834] __kasan_check_write+0x20/0x30
[ 41.732512] kasan_atomics_helper+0xa6c/0x4858
[ 41.733194] kasan_atomics+0x198/0x2e8
[ 41.733837] kunit_try_run_case+0x14c/0x3d0
[ 41.734411] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.735460] kthread+0x24c/0x2d0
[ 41.736182] ret_from_fork+0x10/0x20
[ 41.736877]
[ 41.737177] Allocated by task 253:
[ 41.737779] kasan_save_stack+0x3c/0x68
[ 41.738326] kasan_save_track+0x20/0x40
[ 41.738987] kasan_save_alloc_info+0x40/0x58
[ 41.739658] __kasan_kmalloc+0xd4/0xd8
[ 41.740236] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.740896] kasan_atomics+0xb8/0x2e8
[ 41.741443] kunit_try_run_case+0x14c/0x3d0
[ 41.742202] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.742924] kthread+0x24c/0x2d0
[ 41.743512] ret_from_fork+0x10/0x20
[ 41.744118]
[ 41.744492] The buggy address belongs to the object at fff00000c6998980
[ 41.744492] which belongs to the cache kmalloc-64 of size 64
[ 41.746013] The buggy address is located 0 bytes to the right of
[ 41.746013] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.747495]
[ 41.747830] The buggy address belongs to the physical page:
[ 41.748572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.749549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.750395] page_type: f5(slab)
[ 41.751060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.752012] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.753034] page dumped because: kasan: bad access detected
[ 41.753734]
[ 41.754048] Memory state around the buggy address:
[ 41.754764] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.755636] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.756499] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.757474] ^
[ 41.758177] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.759156] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.760084] ==================================================================
---
[ 41.174267] ==================================================================
[ 41.175217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[ 41.176891] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.178007]
[ 41.178348] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.179700] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.180239] Hardware name: linux,dummy-virt (DT)
[ 41.181280] Call trace:
[ 41.181912] show_stack+0x20/0x38 (C)
[ 41.182572] dump_stack_lvl+0x8c/0xd0
[ 41.184084] print_report+0x118/0x5e0
[ 41.185247] kasan_report+0xc8/0x118
[ 41.185964] kasan_check_range+0x100/0x1a8
[ 41.186874] __kasan_check_write+0x20/0x30
[ 41.187562] kasan_atomics_helper+0x4e4/0x4858
[ 41.188236] kasan_atomics+0x198/0x2e8
[ 41.188869] kunit_try_run_case+0x14c/0x3d0
[ 41.189580] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.190417] kthread+0x24c/0x2d0
[ 41.191057] ret_from_fork+0x10/0x20
[ 41.191748]
[ 41.192086] Allocated by task 253:
[ 41.192784] kasan_save_stack+0x3c/0x68
[ 41.193396] kasan_save_track+0x20/0x40
[ 41.194147] kasan_save_alloc_info+0x40/0x58
[ 41.194935] __kasan_kmalloc+0xd4/0xd8
[ 41.195663] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.196332] kasan_atomics+0xb8/0x2e8
[ 41.196977] kunit_try_run_case+0x14c/0x3d0
[ 41.197666] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.198441] kthread+0x24c/0x2d0
[ 41.199106] ret_from_fork+0x10/0x20
[ 41.199665]
[ 41.200086] The buggy address belongs to the object at fff00000c6998980
[ 41.200086] which belongs to the cache kmalloc-64 of size 64
[ 41.201560] The buggy address is located 0 bytes to the right of
[ 41.201560] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.203208]
[ 41.203652] The buggy address belongs to the physical page:
[ 41.204360] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.205411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.206222] page_type: f5(slab)
[ 41.206832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.207863] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.208731] page dumped because: kasan: bad access detected
[ 41.209499]
[ 41.209965] Memory state around the buggy address:
[ 41.210659] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.211566] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.212457] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.213512] ^
[ 41.214190] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.214962] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.216007] ==================================================================
---
[ 41.641358] ==================================================================
[ 41.642404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[ 41.643401] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 41.644239]
[ 41.644633] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 41.645942] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 41.646572] Hardware name: linux,dummy-virt (DT)
[ 41.647214] Call trace:
[ 41.647845] show_stack+0x20/0x38 (C)
[ 41.648460] dump_stack_lvl+0x8c/0xd0
[ 41.649155] print_report+0x118/0x5e0
[ 41.649788] kasan_report+0xc8/0x118
[ 41.650329] kasan_check_range+0x100/0x1a8
[ 41.651011] __kasan_check_write+0x20/0x30
[ 41.651840] kasan_atomics_helper+0x99c/0x4858
[ 41.652502] kasan_atomics+0x198/0x2e8
[ 41.653105] kunit_try_run_case+0x14c/0x3d0
[ 41.653784] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.654612] kthread+0x24c/0x2d0
[ 41.655153] ret_from_fork+0x10/0x20
[ 41.655831]
[ 41.656285] Allocated by task 253:
[ 41.656851] kasan_save_stack+0x3c/0x68
[ 41.657427] kasan_save_track+0x20/0x40
[ 41.658192] kasan_save_alloc_info+0x40/0x58
[ 41.658866] __kasan_kmalloc+0xd4/0xd8
[ 41.659352] __kmalloc_cache_noprof+0x15c/0x3c0
[ 41.660144] kasan_atomics+0xb8/0x2e8
[ 41.660713] kunit_try_run_case+0x14c/0x3d0
[ 41.661237] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 41.662129] kthread+0x24c/0x2d0
[ 41.662638] ret_from_fork+0x10/0x20
[ 41.663356]
[ 41.663775] The buggy address belongs to the object at fff00000c6998980
[ 41.663775] which belongs to the cache kmalloc-64 of size 64
[ 41.665170] The buggy address is located 0 bytes to the right of
[ 41.665170] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 41.666740]
[ 41.667114] The buggy address belongs to the physical page:
[ 41.667882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 41.668841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 41.669801] page_type: f5(slab)
[ 41.670258] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 41.671216] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 41.672293] page dumped because: kasan: bad access detected
[ 41.673222]
[ 41.673645] Memory state around the buggy address:
[ 41.674307] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.675107] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 41.676091] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 41.677016] ^
[ 41.677787] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.678701] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 41.679577] ==================================================================
---
[ 43.063301] ==================================================================
[ 43.064211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[ 43.064933] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 43.065907]
[ 43.066356] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.067447] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.068032] Hardware name: linux,dummy-virt (DT)
[ 43.069246] Call trace:
[ 43.069793] show_stack+0x20/0x38 (C)
[ 43.070403] dump_stack_lvl+0x8c/0xd0
[ 43.071051] print_report+0x118/0x5e0
[ 43.071612] kasan_report+0xc8/0x118
[ 43.072217] kasan_check_range+0x100/0x1a8
[ 43.072865] __kasan_check_write+0x20/0x30
[ 43.073564] kasan_atomics_helper+0x15b4/0x4858
[ 43.074249] kasan_atomics+0x198/0x2e8
[ 43.074903] kunit_try_run_case+0x14c/0x3d0
[ 43.075556] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.076272] kthread+0x24c/0x2d0
[ 43.076851] ret_from_fork+0x10/0x20
[ 43.077431]
[ 43.077846] Allocated by task 253:
[ 43.078415] kasan_save_stack+0x3c/0x68
[ 43.079004] kasan_save_track+0x20/0x40
[ 43.079864] kasan_save_alloc_info+0x40/0x58
[ 43.080442] __kasan_kmalloc+0xd4/0xd8
[ 43.081115] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.081834] kasan_atomics+0xb8/0x2e8
[ 43.082369] kunit_try_run_case+0x14c/0x3d0
[ 43.083311] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.084116] kthread+0x24c/0x2d0
[ 43.084781] ret_from_fork+0x10/0x20
[ 43.085691]
[ 43.086285] The buggy address belongs to the object at fff00000c6998980
[ 43.086285] which belongs to the cache kmalloc-64 of size 64
[ 43.087718] The buggy address is located 0 bytes to the right of
[ 43.087718] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 43.089811]
[ 43.090362] The buggy address belongs to the physical page:
[ 43.091217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 43.092345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.093356] page_type: f5(slab)
[ 43.094029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 43.095153] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 43.096225] page dumped because: kasan: bad access detected
[ 43.097124]
[ 43.097561] Memory state around the buggy address:
[ 43.098335] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.099389] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.100422] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 43.101419] ^
[ 43.102032] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.102956] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.104067] ==================================================================
---
[ 43.148902] ==================================================================
[ 43.149728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[ 43.151307] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 43.152285]
[ 43.152746] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.153914] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.154489] Hardware name: linux,dummy-virt (DT)
[ 43.155103] Call trace:
[ 43.155642] show_stack+0x20/0x38 (C)
[ 43.156259] dump_stack_lvl+0x8c/0xd0
[ 43.156971] print_report+0x118/0x5e0
[ 43.157572] kasan_report+0xc8/0x118
[ 43.158247] kasan_check_range+0x100/0x1a8
[ 43.158906] __kasan_check_write+0x20/0x30
[ 43.159502] kasan_atomics_helper+0x1644/0x4858
[ 43.160308] kasan_atomics+0x198/0x2e8
[ 43.160995] kunit_try_run_case+0x14c/0x3d0
[ 43.161797] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.162568] kthread+0x24c/0x2d0
[ 43.163218] ret_from_fork+0x10/0x20
[ 43.163879]
[ 43.164246] Allocated by task 253:
[ 43.164764] kasan_save_stack+0x3c/0x68
[ 43.165391] kasan_save_track+0x20/0x40
[ 43.166046] kasan_save_alloc_info+0x40/0x58
[ 43.166751] __kasan_kmalloc+0xd4/0xd8
[ 43.167314] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.167980] kasan_atomics+0xb8/0x2e8
[ 43.168506] kunit_try_run_case+0x14c/0x3d0
[ 43.169143] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.170108] kthread+0x24c/0x2d0
[ 43.170676] ret_from_fork+0x10/0x20
[ 43.171367]
[ 43.171724] The buggy address belongs to the object at fff00000c6998980
[ 43.171724] which belongs to the cache kmalloc-64 of size 64
[ 43.173070] The buggy address is located 0 bytes to the right of
[ 43.173070] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 43.174740]
[ 43.175121] The buggy address belongs to the physical page:
[ 43.175850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 43.176873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.177727] page_type: f5(slab)
[ 43.178403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 43.179421] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 43.180302] page dumped because: kasan: bad access detected
[ 43.181036]
[ 43.181376] Memory state around the buggy address:
[ 43.182045] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.182938] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.183870] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 43.184742] ^
[ 43.185389] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.186478] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.187399] ==================================================================
---
[ 43.317810] ==================================================================
[ 43.318713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[ 43.319411] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 43.320484]
[ 43.321219] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.322809] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.323600] Hardware name: linux,dummy-virt (DT)
[ 43.324331] Call trace:
[ 43.324840] show_stack+0x20/0x38 (C)
[ 43.325616] dump_stack_lvl+0x8c/0xd0
[ 43.326307] print_report+0x118/0x5e0
[ 43.326983] kasan_report+0xc8/0x118
[ 43.327643] kasan_check_range+0x100/0x1a8
[ 43.328343] __kasan_check_write+0x20/0x30
[ 43.329058] kasan_atomics_helper+0x175c/0x4858
[ 43.329822] kasan_atomics+0x198/0x2e8
[ 43.330460] kunit_try_run_case+0x14c/0x3d0
[ 43.331224] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.332066] kthread+0x24c/0x2d0
[ 43.332749] ret_from_fork+0x10/0x20
[ 43.333373]
[ 43.333841] Allocated by task 253:
[ 43.334551] kasan_save_stack+0x3c/0x68
[ 43.335173] kasan_save_track+0x20/0x40
[ 43.335908] kasan_save_alloc_info+0x40/0x58
[ 43.336719] __kasan_kmalloc+0xd4/0xd8
[ 43.337398] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.338164] kasan_atomics+0xb8/0x2e8
[ 43.338844] kunit_try_run_case+0x14c/0x3d0
[ 43.339556] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.340372] kthread+0x24c/0x2d0
[ 43.340916] ret_from_fork+0x10/0x20
[ 43.341626]
[ 43.342083] The buggy address belongs to the object at fff00000c6998980
[ 43.342083] which belongs to the cache kmalloc-64 of size 64
[ 43.343644] The buggy address is located 0 bytes to the right of
[ 43.343644] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 43.345361]
[ 43.345971] The buggy address belongs to the physical page:
[ 43.346799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 43.347888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.348826] page_type: f5(slab)
[ 43.349336] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 43.350068] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 43.351154] page dumped because: kasan: bad access detected
[ 43.352043]
[ 43.352343] Memory state around the buggy address:
[ 43.353353] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.354334] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.355388] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 43.356344] ^
[ 43.357072] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.358179] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.359114] ==================================================================
---
[ 43.402549] ==================================================================
[ 43.403510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[ 43.404243] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 43.405980]
[ 43.406355] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 43.407809] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 43.408539] Hardware name: linux,dummy-virt (DT)
[ 43.409155] Call trace:
[ 43.409699] show_stack+0x20/0x38 (C)
[ 43.410346] dump_stack_lvl+0x8c/0xd0
[ 43.411003] print_report+0x118/0x5e0
[ 43.411691] kasan_report+0xc8/0x118
[ 43.412356] kasan_check_range+0x100/0x1a8
[ 43.413112] __kasan_check_write+0x20/0x30
[ 43.413912] kasan_atomics_helper+0x17ec/0x4858
[ 43.414557] kasan_atomics+0x198/0x2e8
[ 43.415117] kunit_try_run_case+0x14c/0x3d0
[ 43.415697] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.416643] kthread+0x24c/0x2d0
[ 43.417228] ret_from_fork+0x10/0x20
[ 43.418004]
[ 43.418305] Allocated by task 253:
[ 43.418919] kasan_save_stack+0x3c/0x68
[ 43.419416] kasan_save_track+0x20/0x40
[ 43.420073] kasan_save_alloc_info+0x40/0x58
[ 43.420743] __kasan_kmalloc+0xd4/0xd8
[ 43.421294] __kmalloc_cache_noprof+0x15c/0x3c0
[ 43.422084] kasan_atomics+0xb8/0x2e8
[ 43.422817] kunit_try_run_case+0x14c/0x3d0
[ 43.423391] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 43.424401] kthread+0x24c/0x2d0
[ 43.424949] ret_from_fork+0x10/0x20
[ 43.425463]
[ 43.425934] The buggy address belongs to the object at fff00000c6998980
[ 43.425934] which belongs to the cache kmalloc-64 of size 64
[ 43.427346] The buggy address is located 0 bytes to the right of
[ 43.427346] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 43.428801]
[ 43.429196] The buggy address belongs to the physical page:
[ 43.429909] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 43.431059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 43.431953] page_type: f5(slab)
[ 43.432479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 43.433462] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 43.434406] page dumped because: kasan: bad access detected
[ 43.435170]
[ 43.435573] Memory state around the buggy address:
[ 43.436281] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.437203] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 43.438086] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 43.439019] ^
[ 43.439706] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.440675] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 43.441597] ==================================================================
---
[ 42.598013] ==================================================================
[ 42.599034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[ 42.600258] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.600961]
[ 42.601344] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.602884] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.603397] Hardware name: linux,dummy-virt (DT)
[ 42.604069] Call trace:
[ 42.604791] show_stack+0x20/0x38 (C)
[ 42.605688] dump_stack_lvl+0x8c/0xd0
[ 42.606388] print_report+0x118/0x5e0
[ 42.607061] kasan_report+0xc8/0x118
[ 42.607727] kasan_check_range+0x100/0x1a8
[ 42.608440] __kasan_check_write+0x20/0x30
[ 42.609248] kasan_atomics_helper+0x1128/0x4858
[ 42.609944] kasan_atomics+0x198/0x2e8
[ 42.610738] kunit_try_run_case+0x14c/0x3d0
[ 42.611468] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.612307] kthread+0x24c/0x2d0
[ 42.612934] ret_from_fork+0x10/0x20
[ 42.613651]
[ 42.614007] Allocated by task 253:
[ 42.614666] kasan_save_stack+0x3c/0x68
[ 42.615257] kasan_save_track+0x20/0x40
[ 42.616023] kasan_save_alloc_info+0x40/0x58
[ 42.616771] __kasan_kmalloc+0xd4/0xd8
[ 42.617380] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.618165] kasan_atomics+0xb8/0x2e8
[ 42.618866] kunit_try_run_case+0x14c/0x3d0
[ 42.619573] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.620326] kthread+0x24c/0x2d0
[ 42.621164] ret_from_fork+0x10/0x20
[ 42.621844]
[ 42.622140] The buggy address belongs to the object at fff00000c6998980
[ 42.622140] which belongs to the cache kmalloc-64 of size 64
[ 42.624145] The buggy address is located 0 bytes to the right of
[ 42.624145] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.625671]
[ 42.626008] The buggy address belongs to the physical page:
[ 42.626729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.627983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.628900] page_type: f5(slab)
[ 42.629712] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.630794] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.631760] page dumped because: kasan: bad access detected
[ 42.632680]
[ 42.633074] Memory state around the buggy address:
[ 42.633851] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.635463] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.636413] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.637351] ^
[ 42.638415] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.639271] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.639871] ==================================================================
---
[ 42.347226] ==================================================================
[ 42.348588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[ 42.350494] Write of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.352097]
[ 42.352436] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.353497] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.354104] Hardware name: linux,dummy-virt (DT)
[ 42.354796] Call trace:
[ 42.355305] show_stack+0x20/0x38 (C)
[ 42.355945] dump_stack_lvl+0x8c/0xd0
[ 42.356661] print_report+0x118/0x5e0
[ 42.357298] kasan_report+0xc8/0x118
[ 42.358023] kasan_check_range+0x100/0x1a8
[ 42.358646] __kasan_check_write+0x20/0x30
[ 42.359368] kasan_atomics_helper+0xeb8/0x4858
[ 42.360026] kasan_atomics+0x198/0x2e8
[ 42.360595] kunit_try_run_case+0x14c/0x3d0
[ 42.361284] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.362216] kthread+0x24c/0x2d0
[ 42.362768] ret_from_fork+0x10/0x20
[ 42.363397]
[ 42.363814] Allocated by task 253:
[ 42.364355] kasan_save_stack+0x3c/0x68
[ 42.365327] kasan_save_track+0x20/0x40
[ 42.365886] kasan_save_alloc_info+0x40/0x58
[ 42.366553] __kasan_kmalloc+0xd4/0xd8
[ 42.367148] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.367773] kasan_atomics+0xb8/0x2e8
[ 42.368472] kunit_try_run_case+0x14c/0x3d0
[ 42.369075] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.369837] kthread+0x24c/0x2d0
[ 42.370362] ret_from_fork+0x10/0x20
[ 42.371041]
[ 42.371352] The buggy address belongs to the object at fff00000c6998980
[ 42.371352] which belongs to the cache kmalloc-64 of size 64
[ 42.372749] The buggy address is located 0 bytes to the right of
[ 42.372749] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.374462]
[ 42.374824] The buggy address belongs to the physical page:
[ 42.375426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.376724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.377686] page_type: f5(slab)
[ 42.378300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.379387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.380426] page dumped because: kasan: bad access detected
[ 42.381170]
[ 42.381636] Memory state around the buggy address:
[ 42.382360] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.383332] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.384243] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.385161] ^
[ 42.385832] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.386833] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.387724] ==================================================================
---
[ 42.007461] ==================================================================
[ 42.008621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[ 42.009742] Write of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.010932]
[ 42.011357] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.012645] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.013537] Hardware name: linux,dummy-virt (DT)
[ 42.014148] Call trace:
[ 42.014847] show_stack+0x20/0x38 (C)
[ 42.015610] dump_stack_lvl+0x8c/0xd0
[ 42.016331] print_report+0x118/0x5e0
[ 42.017116] kasan_report+0xc8/0x118
[ 42.017851] kasan_check_range+0x100/0x1a8
[ 42.018606] __kasan_check_write+0x20/0x30
[ 42.019229] kasan_atomics_helper+0xca0/0x4858
[ 42.020000] kasan_atomics+0x198/0x2e8
[ 42.020683] kunit_try_run_case+0x14c/0x3d0
[ 42.021390] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.022283] kthread+0x24c/0x2d0
[ 42.022985] ret_from_fork+0x10/0x20
[ 42.023680]
[ 42.024240] Allocated by task 253:
[ 42.025069] kasan_save_stack+0x3c/0x68
[ 42.025640] kasan_save_track+0x20/0x40
[ 42.026217] kasan_save_alloc_info+0x40/0x58
[ 42.026850] __kasan_kmalloc+0xd4/0xd8
[ 42.027443] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.028607] kasan_atomics+0xb8/0x2e8
[ 42.029408] kunit_try_run_case+0x14c/0x3d0
[ 42.030182] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.031103] kthread+0x24c/0x2d0
[ 42.031800] ret_from_fork+0x10/0x20
[ 42.032565]
[ 42.033088] The buggy address belongs to the object at fff00000c6998980
[ 42.033088] which belongs to the cache kmalloc-64 of size 64
[ 42.034459] The buggy address is located 0 bytes to the right of
[ 42.034459] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.036574]
[ 42.037074] The buggy address belongs to the physical page:
[ 42.037991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.039075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.040045] page_type: f5(slab)
[ 42.040481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.041651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.042698] page dumped because: kasan: bad access detected
[ 42.043468]
[ 42.043846] Memory state around the buggy address:
[ 42.044637] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.045764] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.046947] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.048112] ^
[ 42.048788] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.049850] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.050640] ==================================================================
Home
[ 40.727659] ==================================================================
[ 40.729401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[ 40.730224] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 40.730987]
[ 40.731963] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.733440] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.734593] Hardware name: linux,dummy-virt (DT)
[ 40.735247] Call trace:
[ 40.735730] show_stack+0x20/0x38 (C)
[ 40.737057] dump_stack_lvl+0x8c/0xd0
[ 40.737767] print_report+0x118/0x5e0
[ 40.738091] kasan_report+0xc8/0x118
[ 40.738387] kasan_check_range+0x100/0x1a8
[ 40.739027] __kasan_check_read+0x20/0x30
[ 40.740187] kasan_atomics_helper+0x1ec/0x4858
[ 40.741437] kasan_atomics+0x198/0x2e8
[ 40.742257] kunit_try_run_case+0x14c/0x3d0
[ 40.743048] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.744254] kthread+0x24c/0x2d0
[ 40.744885] ret_from_fork+0x10/0x20
[ 40.745666]
[ 40.746017] Allocated by task 253:
[ 40.747009] kasan_save_stack+0x3c/0x68
[ 40.747845] kasan_save_track+0x20/0x40
[ 40.748314] kasan_save_alloc_info+0x40/0x58
[ 40.748816] __kasan_kmalloc+0xd4/0xd8
[ 40.749438] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.750386] kasan_atomics+0xb8/0x2e8
[ 40.752072] kunit_try_run_case+0x14c/0x3d0
[ 40.753008] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.753803] kthread+0x24c/0x2d0
[ 40.754284] ret_from_fork+0x10/0x20
[ 40.755057]
[ 40.755616] The buggy address belongs to the object at fff00000c6998980
[ 40.755616] which belongs to the cache kmalloc-64 of size 64
[ 40.757106] The buggy address is located 0 bytes to the right of
[ 40.757106] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 40.758823]
[ 40.759239] The buggy address belongs to the physical page:
[ 40.760341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 40.761641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.762999] page_type: f5(slab)
[ 40.763745] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 40.764691] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 40.765752] page dumped because: kasan: bad access detected
[ 40.766401]
[ 40.766804] Memory state around the buggy address:
[ 40.767984] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.768864] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.771268] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 40.772297] ^
[ 40.772912] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.773963] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.775061] ==================================================================
---
[ 42.177780] ==================================================================
[ 42.179797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[ 42.181415] Read of size 8 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 42.182632]
[ 42.183245] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 42.184602] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 42.185364] Hardware name: linux,dummy-virt (DT)
[ 42.186225] Call trace:
[ 42.186681] show_stack+0x20/0x38 (C)
[ 42.187688] dump_stack_lvl+0x8c/0xd0
[ 42.188421] print_report+0x118/0x5e0
[ 42.189185] kasan_report+0xc8/0x118
[ 42.189860] kasan_check_range+0x100/0x1a8
[ 42.190467] __kasan_check_read+0x20/0x30
[ 42.191088] kasan_atomics_helper+0xdd4/0x4858
[ 42.192120] kasan_atomics+0x198/0x2e8
[ 42.192737] kunit_try_run_case+0x14c/0x3d0
[ 42.193373] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.194366] kthread+0x24c/0x2d0
[ 42.195025] ret_from_fork+0x10/0x20
[ 42.195597]
[ 42.195989] Allocated by task 253:
[ 42.196582] kasan_save_stack+0x3c/0x68
[ 42.197109] kasan_save_track+0x20/0x40
[ 42.197873] kasan_save_alloc_info+0x40/0x58
[ 42.198478] __kasan_kmalloc+0xd4/0xd8
[ 42.199007] __kmalloc_cache_noprof+0x15c/0x3c0
[ 42.199813] kasan_atomics+0xb8/0x2e8
[ 42.200293] kunit_try_run_case+0x14c/0x3d0
[ 42.201019] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 42.201767] kthread+0x24c/0x2d0
[ 42.202402] ret_from_fork+0x10/0x20
[ 42.202971]
[ 42.203434] The buggy address belongs to the object at fff00000c6998980
[ 42.203434] which belongs to the cache kmalloc-64 of size 64
[ 42.204931] The buggy address is located 0 bytes to the right of
[ 42.204931] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 42.206434]
[ 42.206782] The buggy address belongs to the physical page:
[ 42.207780] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 42.208684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 42.209750] page_type: f5(slab)
[ 42.210242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 42.211301] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 42.212301] page dumped because: kasan: bad access detected
[ 42.213130]
[ 42.213495] Memory state around the buggy address:
[ 42.214281] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.215137] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 42.216088] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 42.216960] ^
[ 42.217830] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.218620] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 42.219675] ==================================================================
---
[ 40.826180] ==================================================================
[ 40.827690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[ 40.828935] Read of size 4 at addr fff00000c69989b0 by task kunit_try_catch/253
[ 40.829721]
[ 40.830430] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.832473] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.833105] Hardware name: linux,dummy-virt (DT)
[ 40.833788] Call trace:
[ 40.834205] show_stack+0x20/0x38 (C)
[ 40.834929] dump_stack_lvl+0x8c/0xd0
[ 40.835506] print_report+0x118/0x5e0
[ 40.836664] kasan_report+0xc8/0x118
[ 40.837383] kasan_check_range+0x100/0x1a8
[ 40.838071] __kasan_check_read+0x20/0x30
[ 40.838506] kasan_atomics_helper+0x2b0/0x4858
[ 40.839688] kasan_atomics+0x198/0x2e8
[ 40.840277] kunit_try_run_case+0x14c/0x3d0
[ 40.840923] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.841988] kthread+0x24c/0x2d0
[ 40.842650] ret_from_fork+0x10/0x20
[ 40.843654]
[ 40.844033] Allocated by task 253:
[ 40.844455] kasan_save_stack+0x3c/0x68
[ 40.845128] kasan_save_track+0x20/0x40
[ 40.845696] kasan_save_alloc_info+0x40/0x58
[ 40.846430] __kasan_kmalloc+0xd4/0xd8
[ 40.847418] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.848067] kasan_atomics+0xb8/0x2e8
[ 40.848683] kunit_try_run_case+0x14c/0x3d0
[ 40.849173] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.850955] kthread+0x24c/0x2d0
[ 40.851790] ret_from_fork+0x10/0x20
[ 40.852089]
[ 40.852267] The buggy address belongs to the object at fff00000c6998980
[ 40.852267] which belongs to the cache kmalloc-64 of size 64
[ 40.852948] The buggy address is located 0 bytes to the right of
[ 40.852948] allocated 48-byte region [fff00000c6998980, fff00000c69989b0)
[ 40.853775]
[ 40.854078] The buggy address belongs to the physical page:
[ 40.854921] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106998
[ 40.856792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.857752] page_type: f5(slab)
[ 40.858343] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 40.859793] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 40.860977] page dumped because: kasan: bad access detected
[ 40.861838]
[ 40.862177] Memory state around the buggy address:
[ 40.862912] fff00000c6998880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.864231] fff00000c6998900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 40.865241] >fff00000c6998980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 40.866368] ^
[ 40.868286] fff00000c6998a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.869705] fff00000c6998a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.870830] ==================================================================
Home
[ 40.003559] ==================================================================
[ 40.004482] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[ 40.006559] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.007620]
[ 40.008122] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.009399] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.010186] Hardware name: linux,dummy-virt (DT)
[ 40.010906] Call trace:
[ 40.011345] show_stack+0x20/0x38 (C)
[ 40.012145] dump_stack_lvl+0x8c/0xd0
[ 40.012838] print_report+0x118/0x5e0
[ 40.013489] kasan_report+0xc8/0x118
[ 40.014153] kasan_check_range+0x100/0x1a8
[ 40.014854] __kasan_check_write+0x20/0x30
[ 40.015591] kasan_bitops_modify.constprop.0+0x320/0xbc8
[ 40.016507] kasan_bitops_generic+0x110/0x1c8
[ 40.017243] kunit_try_run_case+0x14c/0x3d0
[ 40.018024] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.018977] kthread+0x24c/0x2d0
[ 40.019710] ret_from_fork+0x10/0x20
[ 40.020394]
[ 40.020828] Allocated by task 249:
[ 40.021569] kasan_save_stack+0x3c/0x68
[ 40.022240] kasan_save_track+0x20/0x40
[ 40.022994] kasan_save_alloc_info+0x40/0x58
[ 40.023727] __kasan_kmalloc+0xd4/0xd8
[ 40.024466] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.025223] kasan_bitops_generic+0xa0/0x1c8
[ 40.025982] kunit_try_run_case+0x14c/0x3d0
[ 40.026675] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.027463] kthread+0x24c/0x2d0
[ 40.028050] ret_from_fork+0x10/0x20
[ 40.028623]
[ 40.029090] The buggy address belongs to the object at fff00000c6114ee0
[ 40.029090] which belongs to the cache kmalloc-16 of size 16
[ 40.030702] The buggy address is located 8 bytes inside of
[ 40.030702] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.032234]
[ 40.032798] The buggy address belongs to the physical page:
[ 40.033635] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.034668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.035579] page_type: f5(slab)
[ 40.036102] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.037220] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.038342] page dumped because: kasan: bad access detected
[ 40.039260]
[ 40.039789] Memory state around the buggy address:
[ 40.040545] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.041486] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.042472] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.043458] ^
[ 40.044392] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.045359] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.046305] ==================================================================
---
[ 39.956006] ==================================================================
[ 39.956915] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[ 39.958309] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 39.959123]
[ 39.959468] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.960807] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.962589] Hardware name: linux,dummy-virt (DT)
[ 39.963322] Call trace:
[ 39.963976] show_stack+0x20/0x38 (C)
[ 39.965011] dump_stack_lvl+0x8c/0xd0
[ 39.965809] print_report+0x118/0x5e0
[ 39.966504] kasan_report+0xc8/0x118
[ 39.967189] kasan_check_range+0x100/0x1a8
[ 39.967987] __kasan_check_write+0x20/0x30
[ 39.968716] kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[ 39.969483] kasan_bitops_generic+0x110/0x1c8
[ 39.970231] kunit_try_run_case+0x14c/0x3d0
[ 39.970978] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.971844] kthread+0x24c/0x2d0
[ 39.972541] ret_from_fork+0x10/0x20
[ 39.973211]
[ 39.973702] Allocated by task 249:
[ 39.974305] kasan_save_stack+0x3c/0x68
[ 39.975062] kasan_save_track+0x20/0x40
[ 39.975943] kasan_save_alloc_info+0x40/0x58
[ 39.976711] __kasan_kmalloc+0xd4/0xd8
[ 39.977359] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.978091] kasan_bitops_generic+0xa0/0x1c8
[ 39.978827] kunit_try_run_case+0x14c/0x3d0
[ 39.979532] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.980353] kthread+0x24c/0x2d0
[ 39.980947] ret_from_fork+0x10/0x20
[ 39.981579]
[ 39.982014] The buggy address belongs to the object at fff00000c6114ee0
[ 39.982014] which belongs to the cache kmalloc-16 of size 16
[ 39.983570] The buggy address is located 8 bytes inside of
[ 39.983570] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 39.985044]
[ 39.985556] The buggy address belongs to the physical page:
[ 39.986404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 39.987563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.988448] page_type: f5(slab)
[ 39.989202] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 39.990331] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 39.991319] page dumped because: kasan: bad access detected
[ 39.992161]
[ 39.992668] Memory state around the buggy address:
[ 39.993347] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 39.994383] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 39.995320] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 39.996292] ^
[ 39.997212] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.998351] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.999273] ==================================================================
---
[ 39.862151] ==================================================================
[ 39.863384] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[ 39.864277] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 39.866546]
[ 39.866869] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.868051] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.868843] Hardware name: linux,dummy-virt (DT)
[ 39.869647] Call trace:
[ 39.870225] show_stack+0x20/0x38 (C)
[ 39.870926] dump_stack_lvl+0x8c/0xd0
[ 39.871487] print_report+0x118/0x5e0
[ 39.872176] kasan_report+0xc8/0x118
[ 39.872786] kasan_check_range+0x100/0x1a8
[ 39.873716] __kasan_check_write+0x20/0x30
[ 39.874354] kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[ 39.875287] kasan_bitops_generic+0x110/0x1c8
[ 39.876041] kunit_try_run_case+0x14c/0x3d0
[ 39.876721] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.877548] kthread+0x24c/0x2d0
[ 39.878175] ret_from_fork+0x10/0x20
[ 39.878743]
[ 39.879158] Allocated by task 249:
[ 39.879710] kasan_save_stack+0x3c/0x68
[ 39.880389] kasan_save_track+0x20/0x40
[ 39.881051] kasan_save_alloc_info+0x40/0x58
[ 39.881768] __kasan_kmalloc+0xd4/0xd8
[ 39.882323] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.883034] kasan_bitops_generic+0xa0/0x1c8
[ 39.883783] kunit_try_run_case+0x14c/0x3d0
[ 39.884348] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.885277] kthread+0x24c/0x2d0
[ 39.885913] ret_from_fork+0x10/0x20
[ 39.886695]
[ 39.887078] The buggy address belongs to the object at fff00000c6114ee0
[ 39.887078] which belongs to the cache kmalloc-16 of size 16
[ 39.888597] The buggy address is located 8 bytes inside of
[ 39.888597] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 39.890018]
[ 39.890396] The buggy address belongs to the physical page:
[ 39.891162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 39.892434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.893357] page_type: f5(slab)
[ 39.894071] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 39.894994] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 39.895941] page dumped because: kasan: bad access detected
[ 39.896725]
[ 39.897113] Memory state around the buggy address:
[ 39.897729] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 39.898920] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 39.900035] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 39.900936] ^
[ 39.902125] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.903095] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.903982] ==================================================================
---
[ 40.142005] ==================================================================
[ 40.143005] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[ 40.145939] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.147885]
[ 40.148773] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.150084] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.150729] Hardware name: linux,dummy-virt (DT)
[ 40.151466] Call trace:
[ 40.151909] show_stack+0x20/0x38 (C)
[ 40.152474] dump_stack_lvl+0x8c/0xd0
[ 40.153208] print_report+0x118/0x5e0
[ 40.153949] kasan_report+0xc8/0x118
[ 40.154578] kasan_check_range+0x100/0x1a8
[ 40.155155] __kasan_check_write+0x20/0x30
[ 40.155881] kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[ 40.156788] kasan_bitops_generic+0x110/0x1c8
[ 40.157445] kunit_try_run_case+0x14c/0x3d0
[ 40.158134] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.158914] kthread+0x24c/0x2d0
[ 40.159430] ret_from_fork+0x10/0x20
[ 40.160095]
[ 40.160428] Allocated by task 249:
[ 40.160871] kasan_save_stack+0x3c/0x68
[ 40.161653] kasan_save_track+0x20/0x40
[ 40.162188] kasan_save_alloc_info+0x40/0x58
[ 40.162878] __kasan_kmalloc+0xd4/0xd8
[ 40.163632] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.164282] kasan_bitops_generic+0xa0/0x1c8
[ 40.164896] kunit_try_run_case+0x14c/0x3d0
[ 40.165464] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.166147] kthread+0x24c/0x2d0
[ 40.166769] ret_from_fork+0x10/0x20
[ 40.167371]
[ 40.167804] The buggy address belongs to the object at fff00000c6114ee0
[ 40.167804] which belongs to the cache kmalloc-16 of size 16
[ 40.169416] The buggy address is located 8 bytes inside of
[ 40.169416] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.170960]
[ 40.171308] The buggy address belongs to the physical page:
[ 40.172177] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.173092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.174020] page_type: f5(slab)
[ 40.174576] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.175578] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.176541] page dumped because: kasan: bad access detected
[ 40.177171]
[ 40.177564] Memory state around the buggy address:
[ 40.178218] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.178953] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.179895] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.180903] ^
[ 40.181739] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.182671] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.183533] ==================================================================
---
[ 39.777025] ==================================================================
[ 39.778366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[ 39.779372] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 39.780418]
[ 39.781621] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.783171] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.783922] Hardware name: linux,dummy-virt (DT)
[ 39.784762] Call trace:
[ 39.785272] show_stack+0x20/0x38 (C)
[ 39.785987] dump_stack_lvl+0x8c/0xd0
[ 39.786683] print_report+0x118/0x5e0
[ 39.787326] kasan_report+0xc8/0x118
[ 39.787935] kasan_check_range+0x100/0x1a8
[ 39.788591] __kasan_check_write+0x20/0x30
[ 39.789363] kasan_bitops_modify.constprop.0+0x100/0xbc8
[ 39.790001] kasan_bitops_generic+0x110/0x1c8
[ 39.790615] kunit_try_run_case+0x14c/0x3d0
[ 39.791369] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.792123] kthread+0x24c/0x2d0
[ 39.792823] ret_from_fork+0x10/0x20
[ 39.793407]
[ 39.793816] Allocated by task 249:
[ 39.794317] kasan_save_stack+0x3c/0x68
[ 39.795126] kasan_save_track+0x20/0x40
[ 39.795735] kasan_save_alloc_info+0x40/0x58
[ 39.796597] __kasan_kmalloc+0xd4/0xd8
[ 39.797225] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.797798] kasan_bitops_generic+0xa0/0x1c8
[ 39.798468] kunit_try_run_case+0x14c/0x3d0
[ 39.799051] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.799772] kthread+0x24c/0x2d0
[ 39.800353] ret_from_fork+0x10/0x20
[ 39.800983]
[ 39.801287] The buggy address belongs to the object at fff00000c6114ee0
[ 39.801287] which belongs to the cache kmalloc-16 of size 16
[ 39.802853] The buggy address is located 8 bytes inside of
[ 39.802853] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 39.804268]
[ 39.804714] The buggy address belongs to the physical page:
[ 39.805578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 39.806645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.807478] page_type: f5(slab)
[ 39.808148] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 39.809050] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 39.810021] page dumped because: kasan: bad access detected
[ 39.810816]
[ 39.811191] Memory state around the buggy address:
[ 39.811729] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 39.812854] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 39.813838] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 39.814712] ^
[ 39.815707] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.816591] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.817589] ==================================================================
---
[ 40.092199] ==================================================================
[ 40.093192] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[ 40.094809] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.096175]
[ 40.097062] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.098180] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.099730] Hardware name: linux,dummy-virt (DT)
[ 40.100619] Call trace:
[ 40.101068] show_stack+0x20/0x38 (C)
[ 40.101434] dump_stack_lvl+0x8c/0xd0
[ 40.101782] print_report+0x118/0x5e0
[ 40.102083] kasan_report+0xc8/0x118
[ 40.102381] kasan_check_range+0x100/0x1a8
[ 40.103170] __kasan_check_write+0x20/0x30
[ 40.104142] kasan_bitops_modify.constprop.0+0x344/0xbc8
[ 40.105235] kasan_bitops_generic+0x110/0x1c8
[ 40.106008] kunit_try_run_case+0x14c/0x3d0
[ 40.106354] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.106860] kthread+0x24c/0x2d0
[ 40.107492] ret_from_fork+0x10/0x20
[ 40.108104]
[ 40.108394] Allocated by task 249:
[ 40.110158] kasan_save_stack+0x3c/0x68
[ 40.110809] kasan_save_track+0x20/0x40
[ 40.111381] kasan_save_alloc_info+0x40/0x58
[ 40.112223] __kasan_kmalloc+0xd4/0xd8
[ 40.113015] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.114033] kasan_bitops_generic+0xa0/0x1c8
[ 40.115057] kunit_try_run_case+0x14c/0x3d0
[ 40.116297] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.117138] kthread+0x24c/0x2d0
[ 40.117762] ret_from_fork+0x10/0x20
[ 40.118598]
[ 40.119133] The buggy address belongs to the object at fff00000c6114ee0
[ 40.119133] which belongs to the cache kmalloc-16 of size 16
[ 40.121137] The buggy address is located 8 bytes inside of
[ 40.121137] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.123116]
[ 40.123760] The buggy address belongs to the physical page:
[ 40.124715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.125756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.126852] page_type: f5(slab)
[ 40.127793] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.128843] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.129906] page dumped because: kasan: bad access detected
[ 40.130858]
[ 40.131417] Memory state around the buggy address:
[ 40.132230] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.133885] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.135913] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.137462] ^
[ 40.138417] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.139268] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.140224] ==================================================================
Home
[ 39.820851] ==================================================================
[ 39.821739] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[ 39.822565] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 39.823545]
[ 39.823951] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.825300] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.825885] Hardware name: linux,dummy-virt (DT)
[ 39.826490] Call trace:
[ 39.827064] show_stack+0x20/0x38 (C)
[ 39.827871] dump_stack_lvl+0x8c/0xd0
[ 39.828566] print_report+0x118/0x5e0
[ 39.829212] kasan_report+0xc8/0x118
[ 39.829914] __asan_report_load8_noabort+0x20/0x30
[ 39.830569] kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[ 39.831346] kasan_bitops_generic+0x110/0x1c8
[ 39.832135] kunit_try_run_case+0x14c/0x3d0
[ 39.832838] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.833656] kthread+0x24c/0x2d0
[ 39.834232] ret_from_fork+0x10/0x20
[ 39.834926]
[ 39.835286] Allocated by task 249:
[ 39.836004] kasan_save_stack+0x3c/0x68
[ 39.836694] kasan_save_track+0x20/0x40
[ 39.837277] kasan_save_alloc_info+0x40/0x58
[ 39.838034] __kasan_kmalloc+0xd4/0xd8
[ 39.838631] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.839255] kasan_bitops_generic+0xa0/0x1c8
[ 39.839928] kunit_try_run_case+0x14c/0x3d0
[ 39.840499] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.841379] kthread+0x24c/0x2d0
[ 39.841851] ret_from_fork+0x10/0x20
[ 39.842544]
[ 39.843022] The buggy address belongs to the object at fff00000c6114ee0
[ 39.843022] which belongs to the cache kmalloc-16 of size 16
[ 39.844596] The buggy address is located 8 bytes inside of
[ 39.844596] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 39.846002]
[ 39.846458] The buggy address belongs to the physical page:
[ 39.847325] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 39.848334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.849230] page_type: f5(slab)
[ 39.849882] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 39.850794] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 39.851697] page dumped because: kasan: bad access detected
[ 39.852493]
[ 39.852820] Memory state around the buggy address:
[ 39.853646] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 39.854577] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 39.855461] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 39.856322] ^
[ 39.857278] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.858225] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.859142] ==================================================================
---
[ 40.185562] ==================================================================
[ 40.186409] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[ 40.188486] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.190393]
[ 40.190921] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.192271] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.192972] Hardware name: linux,dummy-virt (DT)
[ 40.193707] Call trace:
[ 40.194130] show_stack+0x20/0x38 (C)
[ 40.194770] dump_stack_lvl+0x8c/0xd0
[ 40.195371] print_report+0x118/0x5e0
[ 40.195881] kasan_report+0xc8/0x118
[ 40.196625] __asan_report_load8_noabort+0x20/0x30
[ 40.197686] kasan_bitops_modify.constprop.0+0xa28/0xbc8
[ 40.198504] kasan_bitops_generic+0x110/0x1c8
[ 40.199311] kunit_try_run_case+0x14c/0x3d0
[ 40.200017] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.200898] kthread+0x24c/0x2d0
[ 40.201503] ret_from_fork+0x10/0x20
[ 40.202205]
[ 40.202626] Allocated by task 249:
[ 40.203232] kasan_save_stack+0x3c/0x68
[ 40.203963] kasan_save_track+0x20/0x40
[ 40.204702] kasan_save_alloc_info+0x40/0x58
[ 40.205352] __kasan_kmalloc+0xd4/0xd8
[ 40.205970] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.206720] kasan_bitops_generic+0xa0/0x1c8
[ 40.207396] kunit_try_run_case+0x14c/0x3d0
[ 40.208128] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.208931] kthread+0x24c/0x2d0
[ 40.209554] ret_from_fork+0x10/0x20
[ 40.210202]
[ 40.210618] The buggy address belongs to the object at fff00000c6114ee0
[ 40.210618] which belongs to the cache kmalloc-16 of size 16
[ 40.212165] The buggy address is located 8 bytes inside of
[ 40.212165] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.213712]
[ 40.214176] The buggy address belongs to the physical page:
[ 40.214998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.216216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.217148] page_type: f5(slab)
[ 40.217722] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.218881] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.219910] page dumped because: kasan: bad access detected
[ 40.220785]
[ 40.221162] Memory state around the buggy address:
[ 40.221967] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.222984] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.223956] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.224868] ^
[ 40.225781] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.226745] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.227683] ==================================================================
---
[ 40.048371] ==================================================================
[ 40.049390] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[ 40.050558] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.051806]
[ 40.052140] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.053631] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.054386] Hardware name: linux,dummy-virt (DT)
[ 40.055105] Call trace:
[ 40.055659] show_stack+0x20/0x38 (C)
[ 40.056385] dump_stack_lvl+0x8c/0xd0
[ 40.057138] print_report+0x118/0x5e0
[ 40.057902] kasan_report+0xc8/0x118
[ 40.058690] __asan_report_load8_noabort+0x20/0x30
[ 40.059557] kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[ 40.060375] kasan_bitops_generic+0x110/0x1c8
[ 40.061059] kunit_try_run_case+0x14c/0x3d0
[ 40.061912] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.062751] kthread+0x24c/0x2d0
[ 40.063358] ret_from_fork+0x10/0x20
[ 40.064011]
[ 40.064410] Allocated by task 249:
[ 40.065076] kasan_save_stack+0x3c/0x68
[ 40.065832] kasan_save_track+0x20/0x40
[ 40.066500] kasan_save_alloc_info+0x40/0x58
[ 40.067207] __kasan_kmalloc+0xd4/0xd8
[ 40.067937] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.068687] kasan_bitops_generic+0xa0/0x1c8
[ 40.069440] kunit_try_run_case+0x14c/0x3d0
[ 40.070287] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.071136] kthread+0x24c/0x2d0
[ 40.071780] ret_from_fork+0x10/0x20
[ 40.072463]
[ 40.072837] The buggy address belongs to the object at fff00000c6114ee0
[ 40.072837] which belongs to the cache kmalloc-16 of size 16
[ 40.074482] The buggy address is located 8 bytes inside of
[ 40.074482] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.076108]
[ 40.076657] The buggy address belongs to the physical page:
[ 40.077494] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.078564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.079578] page_type: f5(slab)
[ 40.080173] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.081235] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.082218] page dumped because: kasan: bad access detected
[ 40.083139]
[ 40.083606] Memory state around the buggy address:
[ 40.084274] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.085356] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.086319] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.087226] ^
[ 40.088219] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.089171] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.090135] ==================================================================
---
[ 39.907468] ==================================================================
[ 39.908446] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[ 39.909945] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 39.910814]
[ 39.911441] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.913404] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.914041] Hardware name: linux,dummy-virt (DT)
[ 39.914402] Call trace:
[ 39.914648] show_stack+0x20/0x38 (C)
[ 39.915936] dump_stack_lvl+0x8c/0xd0
[ 39.916772] print_report+0x118/0x5e0
[ 39.917389] kasan_report+0xc8/0x118
[ 39.917940] __asan_report_load8_noabort+0x20/0x30
[ 39.918563] kasan_bitops_modify.constprop.0+0xa88/0xbc8
[ 39.919548] kasan_bitops_generic+0x110/0x1c8
[ 39.920679] kunit_try_run_case+0x14c/0x3d0
[ 39.921499] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.922319] kthread+0x24c/0x2d0
[ 39.923622] ret_from_fork+0x10/0x20
[ 39.924254]
[ 39.924668] Allocated by task 249:
[ 39.925132] kasan_save_stack+0x3c/0x68
[ 39.925824] kasan_save_track+0x20/0x40
[ 39.926608] kasan_save_alloc_info+0x40/0x58
[ 39.927871] __kasan_kmalloc+0xd4/0xd8
[ 39.928458] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.929143] kasan_bitops_generic+0xa0/0x1c8
[ 39.930963] kunit_try_run_case+0x14c/0x3d0
[ 39.931788] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.932902] kthread+0x24c/0x2d0
[ 39.933761] ret_from_fork+0x10/0x20
[ 39.934454]
[ 39.935057] The buggy address belongs to the object at fff00000c6114ee0
[ 39.935057] which belongs to the cache kmalloc-16 of size 16
[ 39.936794] The buggy address is located 8 bytes inside of
[ 39.936794] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 39.938629]
[ 39.939068] The buggy address belongs to the physical page:
[ 39.940105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 39.941172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.942324] page_type: f5(slab)
[ 39.942859] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 39.944159] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 39.945393] page dumped because: kasan: bad access detected
[ 39.946364]
[ 39.946926] Memory state around the buggy address:
[ 39.947781] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 39.948930] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 39.950120] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 39.951070] ^
[ 39.952343] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.953041] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.953823] ==================================================================
Home
[ 40.529174] ==================================================================
[ 40.530450] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[ 40.531835] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.532842]
[ 40.533211] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.534305] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.534889] Hardware name: linux,dummy-virt (DT)
[ 40.535597] Call trace:
[ 40.536022] show_stack+0x20/0x38 (C)
[ 40.536755] dump_stack_lvl+0x8c/0xd0
[ 40.537335] print_report+0x118/0x5e0
[ 40.537916] kasan_report+0xc8/0x118
[ 40.538766] __asan_report_load8_noabort+0x20/0x30
[ 40.539412] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[ 40.540328] kasan_bitops_generic+0x11c/0x1c8
[ 40.540903] kunit_try_run_case+0x14c/0x3d0
[ 40.541667] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.542395] kthread+0x24c/0x2d0
[ 40.542972] ret_from_fork+0x10/0x20
[ 40.543662]
[ 40.543999] Allocated by task 249:
[ 40.544441] kasan_save_stack+0x3c/0x68
[ 40.545227] kasan_save_track+0x20/0x40
[ 40.545885] kasan_save_alloc_info+0x40/0x58
[ 40.546482] __kasan_kmalloc+0xd4/0xd8
[ 40.547242] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.547978] kasan_bitops_generic+0xa0/0x1c8
[ 40.548577] kunit_try_run_case+0x14c/0x3d0
[ 40.549280] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.550061] kthread+0x24c/0x2d0
[ 40.550594] ret_from_fork+0x10/0x20
[ 40.551101]
[ 40.551581] The buggy address belongs to the object at fff00000c6114ee0
[ 40.551581] which belongs to the cache kmalloc-16 of size 16
[ 40.553061] The buggy address is located 8 bytes inside of
[ 40.553061] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.554804]
[ 40.555248] The buggy address belongs to the physical page:
[ 40.555972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.556806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.557809] page_type: f5(slab)
[ 40.558370] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.559313] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.560343] page dumped because: kasan: bad access detected
[ 40.561017]
[ 40.561427] Memory state around the buggy address:
[ 40.562072] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.562991] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.563892] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.564852] ^
[ 40.565731] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.566601] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.567628] ==================================================================
---
[ 40.277026] ==================================================================
[ 40.277915] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[ 40.278860] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.279807]
[ 40.280292] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.281615] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.282415] Hardware name: linux,dummy-virt (DT)
[ 40.283087] Call trace:
[ 40.283540] show_stack+0x20/0x38 (C)
[ 40.284292] dump_stack_lvl+0x8c/0xd0
[ 40.284848] print_report+0x118/0x5e0
[ 40.285492] kasan_report+0xc8/0x118
[ 40.286199] __asan_report_load8_noabort+0x20/0x30
[ 40.287020] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[ 40.287876] kasan_bitops_generic+0x11c/0x1c8
[ 40.289100] kunit_try_run_case+0x14c/0x3d0
[ 40.289712] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.290723] kthread+0x24c/0x2d0
[ 40.291560] ret_from_fork+0x10/0x20
[ 40.292359]
[ 40.292896] Allocated by task 249:
[ 40.293590] kasan_save_stack+0x3c/0x68
[ 40.294294] kasan_save_track+0x20/0x40
[ 40.295127] kasan_save_alloc_info+0x40/0x58
[ 40.295941] __kasan_kmalloc+0xd4/0xd8
[ 40.296749] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.297409] kasan_bitops_generic+0xa0/0x1c8
[ 40.298439] kunit_try_run_case+0x14c/0x3d0
[ 40.299310] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.300073] kthread+0x24c/0x2d0
[ 40.300908] ret_from_fork+0x10/0x20
[ 40.301683]
[ 40.302051] The buggy address belongs to the object at fff00000c6114ee0
[ 40.302051] which belongs to the cache kmalloc-16 of size 16
[ 40.303696] The buggy address is located 8 bytes inside of
[ 40.303696] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.304396]
[ 40.304691] The buggy address belongs to the physical page:
[ 40.306360] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.307615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.308655] page_type: f5(slab)
[ 40.309430] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.310579] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.311666] page dumped because: kasan: bad access detected
[ 40.312654]
[ 40.313032] Memory state around the buggy address:
[ 40.313725] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.314625] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.315487] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.317052] ^
[ 40.317838] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.318781] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.319777] ==================================================================
---
[ 40.569389] ==================================================================
[ 40.570704] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[ 40.571894] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.572774]
[ 40.573248] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.574402] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.574996] Hardware name: linux,dummy-virt (DT)
[ 40.575620] Call trace:
[ 40.575964] show_stack+0x20/0x38 (C)
[ 40.576750] dump_stack_lvl+0x8c/0xd0
[ 40.577301] print_report+0x118/0x5e0
[ 40.578155] kasan_report+0xc8/0x118
[ 40.578891] __asan_report_load8_noabort+0x20/0x30
[ 40.579771] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[ 40.580433] kasan_bitops_generic+0x11c/0x1c8
[ 40.581214] kunit_try_run_case+0x14c/0x3d0
[ 40.581822] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.582711] kthread+0x24c/0x2d0
[ 40.583248] ret_from_fork+0x10/0x20
[ 40.583852]
[ 40.584174] Allocated by task 249:
[ 40.584738] kasan_save_stack+0x3c/0x68
[ 40.585373] kasan_save_track+0x20/0x40
[ 40.586381] kasan_save_alloc_info+0x40/0x58
[ 40.586910] __kasan_kmalloc+0xd4/0xd8
[ 40.587538] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.588241] kasan_bitops_generic+0xa0/0x1c8
[ 40.588955] kunit_try_run_case+0x14c/0x3d0
[ 40.589622] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.590373] kthread+0x24c/0x2d0
[ 40.590985] ret_from_fork+0x10/0x20
[ 40.591545]
[ 40.592013] The buggy address belongs to the object at fff00000c6114ee0
[ 40.592013] which belongs to the cache kmalloc-16 of size 16
[ 40.593492] The buggy address is located 8 bytes inside of
[ 40.593492] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.594944]
[ 40.595319] The buggy address belongs to the physical page:
[ 40.596024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.597086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.598065] page_type: f5(slab)
[ 40.598624] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.599749] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.600646] page dumped because: kasan: bad access detected
[ 40.601318]
[ 40.601737] Memory state around the buggy address:
[ 40.602331] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.603271] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.604197] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.605113] ^
[ 40.606071] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.607075] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.607969] ==================================================================
---
[ 40.362597] ==================================================================
[ 40.365031] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[ 40.366175] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.367196]
[ 40.367566] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.368554] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.369221] Hardware name: linux,dummy-virt (DT)
[ 40.369873] Call trace:
[ 40.370297] show_stack+0x20/0x38 (C)
[ 40.371011] dump_stack_lvl+0x8c/0xd0
[ 40.371575] print_report+0x118/0x5e0
[ 40.372272] kasan_report+0xc8/0x118
[ 40.372871] __asan_report_load8_noabort+0x20/0x30
[ 40.373738] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[ 40.374609] kasan_bitops_generic+0x11c/0x1c8
[ 40.375263] kunit_try_run_case+0x14c/0x3d0
[ 40.375971] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.376692] kthread+0x24c/0x2d0
[ 40.377297] ret_from_fork+0x10/0x20
[ 40.377868]
[ 40.378271] Allocated by task 249:
[ 40.378842] kasan_save_stack+0x3c/0x68
[ 40.379407] kasan_save_track+0x20/0x40
[ 40.380093] kasan_save_alloc_info+0x40/0x58
[ 40.380781] __kasan_kmalloc+0xd4/0xd8
[ 40.381357] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.382050] kasan_bitops_generic+0xa0/0x1c8
[ 40.382759] kunit_try_run_case+0x14c/0x3d0
[ 40.383593] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.384362] kthread+0x24c/0x2d0
[ 40.384847] ret_from_fork+0x10/0x20
[ 40.385559]
[ 40.385890] The buggy address belongs to the object at fff00000c6114ee0
[ 40.385890] which belongs to the cache kmalloc-16 of size 16
[ 40.387261] The buggy address is located 8 bytes inside of
[ 40.387261] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.388763]
[ 40.389121] The buggy address belongs to the physical page:
[ 40.389802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.390739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.391683] page_type: f5(slab)
[ 40.392301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.393243] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.394110] page dumped because: kasan: bad access detected
[ 40.394853]
[ 40.395237] Memory state around the buggy address:
[ 40.395940] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.396871] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.397733] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.398682] ^
[ 40.399535] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.400413] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.401397] ==================================================================
---
[ 40.442886] ==================================================================
[ 40.443713] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[ 40.445144] Read of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.446231]
[ 40.446790] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.447957] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.448539] Hardware name: linux,dummy-virt (DT)
[ 40.449155] Call trace:
[ 40.449560] show_stack+0x20/0x38 (C)
[ 40.450227] dump_stack_lvl+0x8c/0xd0
[ 40.450835] print_report+0x118/0x5e0
[ 40.451468] kasan_report+0xc8/0x118
[ 40.451983] __asan_report_load8_noabort+0x20/0x30
[ 40.452864] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[ 40.453585] kasan_bitops_generic+0x11c/0x1c8
[ 40.454336] kunit_try_run_case+0x14c/0x3d0
[ 40.454967] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.455857] kthread+0x24c/0x2d0
[ 40.456463] ret_from_fork+0x10/0x20
[ 40.457136]
[ 40.457504] Allocated by task 249:
[ 40.457959] kasan_save_stack+0x3c/0x68
[ 40.458818] kasan_save_track+0x20/0x40
[ 40.459444] kasan_save_alloc_info+0x40/0x58
[ 40.460064] __kasan_kmalloc+0xd4/0xd8
[ 40.460622] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.461185] kasan_bitops_generic+0xa0/0x1c8
[ 40.461835] kunit_try_run_case+0x14c/0x3d0
[ 40.462406] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.463236] kthread+0x24c/0x2d0
[ 40.463763] ret_from_fork+0x10/0x20
[ 40.464370]
[ 40.464724] The buggy address belongs to the object at fff00000c6114ee0
[ 40.464724] which belongs to the cache kmalloc-16 of size 16
[ 40.466190] The buggy address is located 8 bytes inside of
[ 40.466190] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.467623]
[ 40.468108] The buggy address belongs to the physical page:
[ 40.468838] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.469782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.470877] page_type: f5(slab)
[ 40.471428] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.472294] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.473255] page dumped because: kasan: bad access detected
[ 40.474083]
[ 40.474419] Memory state around the buggy address:
[ 40.475044] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.475881] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.476850] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.477815] ^
[ 40.478755] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.479572] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.480579] ==================================================================
Home
[ 40.231027] ==================================================================
[ 40.231987] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[ 40.233090] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.233814]
[ 40.234255] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.235727] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.236397] Hardware name: linux,dummy-virt (DT)
[ 40.237573] Call trace:
[ 40.238127] show_stack+0x20/0x38 (C)
[ 40.239123] dump_stack_lvl+0x8c/0xd0
[ 40.239964] print_report+0x118/0x5e0
[ 40.240717] kasan_report+0xc8/0x118
[ 40.241456] kasan_check_range+0x100/0x1a8
[ 40.242291] __kasan_check_write+0x20/0x30
[ 40.243082] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[ 40.244026] kasan_bitops_generic+0x11c/0x1c8
[ 40.244837] kunit_try_run_case+0x14c/0x3d0
[ 40.245654] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.246506] kthread+0x24c/0x2d0
[ 40.247204] ret_from_fork+0x10/0x20
[ 40.247941]
[ 40.248301] Allocated by task 249:
[ 40.249026] kasan_save_stack+0x3c/0x68
[ 40.249882] kasan_save_track+0x20/0x40
[ 40.250645] kasan_save_alloc_info+0x40/0x58
[ 40.251378] __kasan_kmalloc+0xd4/0xd8
[ 40.252072] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.252816] kasan_bitops_generic+0xa0/0x1c8
[ 40.253662] kunit_try_run_case+0x14c/0x3d0
[ 40.254538] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.255369] kthread+0x24c/0x2d0
[ 40.255897] ret_from_fork+0x10/0x20
[ 40.256429]
[ 40.256817] The buggy address belongs to the object at fff00000c6114ee0
[ 40.256817] which belongs to the cache kmalloc-16 of size 16
[ 40.258631] The buggy address is located 8 bytes inside of
[ 40.258631] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.260138]
[ 40.260504] The buggy address belongs to the physical page:
[ 40.261582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.262638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.263691] page_type: f5(slab)
[ 40.264295] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.265152] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.266285] page dumped because: kasan: bad access detected
[ 40.267188]
[ 40.267655] Memory state around the buggy address:
[ 40.268452] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.269353] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.270387] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.271411] ^
[ 40.272368] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.273364] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.274306] ==================================================================
---
[ 40.483672] ==================================================================
[ 40.484738] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[ 40.485677] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.486626]
[ 40.487625] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.489002] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.489819] Hardware name: linux,dummy-virt (DT)
[ 40.490441] Call trace:
[ 40.490747] show_stack+0x20/0x38 (C)
[ 40.491657] dump_stack_lvl+0x8c/0xd0
[ 40.492574] print_report+0x118/0x5e0
[ 40.493267] kasan_report+0xc8/0x118
[ 40.494040] kasan_check_range+0x100/0x1a8
[ 40.494806] __kasan_check_write+0x20/0x30
[ 40.495581] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[ 40.496591] kasan_bitops_generic+0x11c/0x1c8
[ 40.497413] kunit_try_run_case+0x14c/0x3d0
[ 40.498254] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.499144] kthread+0x24c/0x2d0
[ 40.499874] ret_from_fork+0x10/0x20
[ 40.500603]
[ 40.500986] Allocated by task 249:
[ 40.501710] kasan_save_stack+0x3c/0x68
[ 40.502452] kasan_save_track+0x20/0x40
[ 40.503171] kasan_save_alloc_info+0x40/0x58
[ 40.504001] __kasan_kmalloc+0xd4/0xd8
[ 40.504614] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.505282] kasan_bitops_generic+0xa0/0x1c8
[ 40.506070] kunit_try_run_case+0x14c/0x3d0
[ 40.506842] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.507703] kthread+0x24c/0x2d0
[ 40.508355] ret_from_fork+0x10/0x20
[ 40.509034]
[ 40.509488] The buggy address belongs to the object at fff00000c6114ee0
[ 40.509488] which belongs to the cache kmalloc-16 of size 16
[ 40.511230] The buggy address is located 8 bytes inside of
[ 40.511230] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.512802]
[ 40.513158] The buggy address belongs to the physical page:
[ 40.514309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.515581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.516637] page_type: f5(slab)
[ 40.517257] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.518401] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.519405] page dumped because: kasan: bad access detected
[ 40.520281]
[ 40.520633] Memory state around the buggy address:
[ 40.521265] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.522664] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.523679] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.524768] ^
[ 40.525195] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.525749] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.527359] ==================================================================
---
[ 40.403637] ==================================================================
[ 40.404458] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[ 40.405307] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.406263]
[ 40.406601] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.407579] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.408358] Hardware name: linux,dummy-virt (DT)
[ 40.409114] Call trace:
[ 40.409601] show_stack+0x20/0x38 (C)
[ 40.410176] dump_stack_lvl+0x8c/0xd0
[ 40.410940] print_report+0x118/0x5e0
[ 40.411439] kasan_report+0xc8/0x118
[ 40.412206] kasan_check_range+0x100/0x1a8
[ 40.412812] __kasan_check_write+0x20/0x30
[ 40.413641] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[ 40.414437] kasan_bitops_generic+0x11c/0x1c8
[ 40.415209] kunit_try_run_case+0x14c/0x3d0
[ 40.415772] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.416562] kthread+0x24c/0x2d0
[ 40.417192] ret_from_fork+0x10/0x20
[ 40.417814]
[ 40.418104] Allocated by task 249:
[ 40.418761] kasan_save_stack+0x3c/0x68
[ 40.419273] kasan_save_track+0x20/0x40
[ 40.419956] kasan_save_alloc_info+0x40/0x58
[ 40.420739] __kasan_kmalloc+0xd4/0xd8
[ 40.421297] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.422006] kasan_bitops_generic+0xa0/0x1c8
[ 40.422608] kunit_try_run_case+0x14c/0x3d0
[ 40.423357] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.424000] kthread+0x24c/0x2d0
[ 40.424637] ret_from_fork+0x10/0x20
[ 40.425232]
[ 40.425650] The buggy address belongs to the object at fff00000c6114ee0
[ 40.425650] which belongs to the cache kmalloc-16 of size 16
[ 40.427041] The buggy address is located 8 bytes inside of
[ 40.427041] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.428412]
[ 40.428803] The buggy address belongs to the physical page:
[ 40.429602] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.430606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.431443] page_type: f5(slab)
[ 40.432055] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.432937] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.433927] page dumped because: kasan: bad access detected
[ 40.434544]
[ 40.434931] Memory state around the buggy address:
[ 40.435494] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.436605] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.437427] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.438323] ^
[ 40.439143] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.440184] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.441136] ==================================================================
---
[ 40.321940] ==================================================================
[ 40.323060] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[ 40.324083] Write of size 8 at addr fff00000c6114ee8 by task kunit_try_catch/249
[ 40.325035]
[ 40.325430] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 40.326574] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 40.327214] Hardware name: linux,dummy-virt (DT)
[ 40.327896] Call trace:
[ 40.328385] show_stack+0x20/0x38 (C)
[ 40.328983] dump_stack_lvl+0x8c/0xd0
[ 40.329857] print_report+0x118/0x5e0
[ 40.330480] kasan_report+0xc8/0x118
[ 40.331270] kasan_check_range+0x100/0x1a8
[ 40.331976] __kasan_check_write+0x20/0x30
[ 40.332609] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[ 40.333343] kasan_bitops_generic+0x11c/0x1c8
[ 40.334210] kunit_try_run_case+0x14c/0x3d0
[ 40.335063] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.335653] kthread+0x24c/0x2d0
[ 40.336323] ret_from_fork+0x10/0x20
[ 40.336898]
[ 40.337292] Allocated by task 249:
[ 40.337811] kasan_save_stack+0x3c/0x68
[ 40.338389] kasan_save_track+0x20/0x40
[ 40.339189] kasan_save_alloc_info+0x40/0x58
[ 40.339815] __kasan_kmalloc+0xd4/0xd8
[ 40.340273] __kmalloc_cache_noprof+0x15c/0x3c0
[ 40.341196] kasan_bitops_generic+0xa0/0x1c8
[ 40.341968] kunit_try_run_case+0x14c/0x3d0
[ 40.342493] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 40.343281] kthread+0x24c/0x2d0
[ 40.343960] ret_from_fork+0x10/0x20
[ 40.344510]
[ 40.344833] The buggy address belongs to the object at fff00000c6114ee0
[ 40.344833] which belongs to the cache kmalloc-16 of size 16
[ 40.346217] The buggy address is located 8 bytes inside of
[ 40.346217] allocated 9-byte region [fff00000c6114ee0, fff00000c6114ee9)
[ 40.347661]
[ 40.348133] The buggy address belongs to the physical page:
[ 40.348940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 40.350134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 40.350875] page_type: f5(slab)
[ 40.351487] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 40.352419] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 40.353438] page dumped because: kasan: bad access detected
[ 40.354265]
[ 40.354663] Memory state around the buggy address:
[ 40.355382] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 40.356262] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 40.357229] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 40.358117] ^
[ 40.358928] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.359975] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 40.360783] ==================================================================
Home
[ 34.608921] ==================================================================
[ 34.610357] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[ 34.612488] Write of size 1 at addr fff00000c68d1f00 by task kunit_try_catch/132
[ 34.613499]
[ 34.613910] CPU: 0 UID: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.614969] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.615557] Hardware name: linux,dummy-virt (DT)
[ 34.616123] Call trace:
[ 34.616825] show_stack+0x20/0x38 (C)
[ 34.617393] dump_stack_lvl+0x8c/0xd0
[ 34.618621] print_report+0x118/0x5e0
[ 34.619859] kasan_report+0xc8/0x118
[ 34.620686] __asan_report_store1_noabort+0x20/0x30
[ 34.621383] kmalloc_big_oob_right+0x2a4/0x2f0
[ 34.622156] kunit_try_run_case+0x14c/0x3d0
[ 34.622893] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.623904] kthread+0x24c/0x2d0
[ 34.624819] ret_from_fork+0x10/0x20
[ 34.625599]
[ 34.625904] Allocated by task 132:
[ 34.626416] kasan_save_stack+0x3c/0x68
[ 34.626891] kasan_save_track+0x20/0x40
[ 34.627570] kasan_save_alloc_info+0x40/0x58
[ 34.628438] __kasan_kmalloc+0xd4/0xd8
[ 34.629094] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.629582] kmalloc_big_oob_right+0xb8/0x2f0
[ 34.630432] kunit_try_run_case+0x14c/0x3d0
[ 34.631635] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.633189] kthread+0x24c/0x2d0
[ 34.634465] ret_from_fork+0x10/0x20
[ 34.635798]
[ 34.636435] The buggy address belongs to the object at fff00000c68d0000
[ 34.636435] which belongs to the cache kmalloc-8k of size 8192
[ 34.638267] The buggy address is located 0 bytes to the right of
[ 34.638267] allocated 7936-byte region [fff00000c68d0000, fff00000c68d1f00)
[ 34.640157]
[ 34.640712] The buggy address belongs to the physical page:
[ 34.641686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068d0
[ 34.642974] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 34.643829] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 34.645303] page_type: f5(slab)
[ 34.645771] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[ 34.646869] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[ 34.647792] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[ 34.649183] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[ 34.651102] head: 0bfffe0000000003 ffffc1ffc31a3401 ffffffffffffffff 0000000000000000
[ 34.652806] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[ 34.654105] page dumped because: kasan: bad access detected
[ 34.654967]
[ 34.655353] Memory state around the buggy address:
[ 34.656016] fff00000c68d1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 34.657127] fff00000c68d1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 34.658572] >fff00000c68d1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.660082] ^
[ 34.660387] fff00000c68d1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.660964] fff00000c68d2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.662233] ==================================================================
Home
[ 34.675674] ==================================================================
[ 34.677134] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[ 34.677988] Write of size 1 at addr fff00000c681600a by task kunit_try_catch/134
[ 34.679245]
[ 34.679658] CPU: 0 UID: 0 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.681831] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.682706] Hardware name: linux,dummy-virt (DT)
[ 34.683452] Call trace:
[ 34.684690] show_stack+0x20/0x38 (C)
[ 34.685359] dump_stack_lvl+0x8c/0xd0
[ 34.686022] print_report+0x118/0x5e0
[ 34.686633] kasan_report+0xc8/0x118
[ 34.687209] __asan_report_store1_noabort+0x20/0x30
[ 34.688268] kmalloc_large_oob_right+0x278/0x2b8
[ 34.689448] kunit_try_run_case+0x14c/0x3d0
[ 34.690129] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.690951] kthread+0x24c/0x2d0
[ 34.691699] ret_from_fork+0x10/0x20
[ 34.692300]
[ 34.692787] The buggy address belongs to the physical page:
[ 34.693890] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106814
[ 34.695448] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 34.696743] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 34.697485] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 34.698675] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 34.699901] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 34.701171] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 34.703135] head: 0bfffe0000000002 ffffc1ffc31a0501 ffffffffffffffff 0000000000000000
[ 34.704461] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 34.705587] page dumped because: kasan: bad access detected
[ 34.706404]
[ 34.707023] Memory state around the buggy address:
[ 34.707961] fff00000c6815f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 34.708900] fff00000c6815f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 34.709905] >fff00000c6816000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 34.710921] ^
[ 34.711428] fff00000c6816080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 34.712834] fff00000c6816100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 34.713844] ==================================================================
Home
[ 36.282690] ==================================================================
[ 36.284489] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[ 36.285356] Read of size 64 at addr fff00000c618fb04 by task kunit_try_catch/170
[ 36.286394]
[ 36.287350] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.288567] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.289059] Hardware name: linux,dummy-virt (DT)
[ 36.289827] Call trace:
[ 36.290258] show_stack+0x20/0x38 (C)
[ 36.290899] dump_stack_lvl+0x8c/0xd0
[ 36.291750] print_report+0x118/0x5e0
[ 36.292266] kasan_report+0xc8/0x118
[ 36.293079] kasan_check_range+0x100/0x1a8
[ 36.293662] __asan_memmove+0x3c/0x98
[ 36.294314] kmalloc_memmove_invalid_size+0x154/0x2e8
[ 36.295470] kunit_try_run_case+0x14c/0x3d0
[ 36.296093] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.297352] kthread+0x24c/0x2d0
[ 36.297928] ret_from_fork+0x10/0x20
[ 36.298600]
[ 36.299006] Allocated by task 170:
[ 36.299420] kasan_save_stack+0x3c/0x68
[ 36.300226] kasan_save_track+0x20/0x40
[ 36.301106] kasan_save_alloc_info+0x40/0x58
[ 36.301602] __kasan_kmalloc+0xd4/0xd8
[ 36.302247] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.303500] kmalloc_memmove_invalid_size+0xb0/0x2e8
[ 36.304215] kunit_try_run_case+0x14c/0x3d0
[ 36.304896] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.305798] kthread+0x24c/0x2d0
[ 36.306324] ret_from_fork+0x10/0x20
[ 36.306894]
[ 36.307277] The buggy address belongs to the object at fff00000c618fb00
[ 36.307277] which belongs to the cache kmalloc-64 of size 64
[ 36.308827] The buggy address is located 4 bytes inside of
[ 36.308827] allocated 64-byte region [fff00000c618fb00, fff00000c618fb40)
[ 36.310913]
[ 36.311465] The buggy address belongs to the physical page:
[ 36.312137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10618f
[ 36.314018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.315338] page_type: f5(slab)
[ 36.316080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 36.316987] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 36.317945] page dumped because: kasan: bad access detected
[ 36.318566]
[ 36.318948] Memory state around the buggy address:
[ 36.320117] fff00000c618fa00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[ 36.321194] fff00000c618fa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 36.322234] >fff00000c618fb00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 36.323123] ^
[ 36.324151] fff00000c618fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.326140] fff00000c618fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.327067] ==================================================================
Home
[ 34.448290] ==================================================================
[ 34.449827] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[ 34.450659] Read of size 1 at addr fff00000c64fb000 by task kunit_try_catch/128
[ 34.451735]
[ 34.452157] CPU: 1 UID: 0 PID: 128 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.454363] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.455431] Hardware name: linux,dummy-virt (DT)
[ 34.456410] Call trace:
[ 34.456856] show_stack+0x20/0x38 (C)
[ 34.457602] dump_stack_lvl+0x8c/0xd0
[ 34.458186] print_report+0x118/0x5e0
[ 34.459099] kasan_report+0xc8/0x118
[ 34.459806] __asan_report_load1_noabort+0x20/0x30
[ 34.460447] kmalloc_node_oob_right+0x2f4/0x330
[ 34.461114] kunit_try_run_case+0x14c/0x3d0
[ 34.462155] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.463672] kthread+0x24c/0x2d0
[ 34.464823] ret_from_fork+0x10/0x20
[ 34.465738]
[ 34.466126] Allocated by task 128:
[ 34.466638] kasan_save_stack+0x3c/0x68
[ 34.468132] kasan_save_track+0x20/0x40
[ 34.468477] kasan_save_alloc_info+0x40/0x58
[ 34.468928] __kasan_kmalloc+0xd4/0xd8
[ 34.469614] __kmalloc_cache_node_noprof+0x168/0x3d0
[ 34.470601] kmalloc_node_oob_right+0xbc/0x330
[ 34.471202] kunit_try_run_case+0x14c/0x3d0
[ 34.472576] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.473404] kthread+0x24c/0x2d0
[ 34.473935] ret_from_fork+0x10/0x20
[ 34.474568]
[ 34.475295] The buggy address belongs to the object at fff00000c64fa000
[ 34.475295] which belongs to the cache kmalloc-4k of size 4096
[ 34.476599] The buggy address is located 0 bytes to the right of
[ 34.476599] allocated 4096-byte region [fff00000c64fa000, fff00000c64fb000)
[ 34.478089]
[ 34.478511] The buggy address belongs to the physical page:
[ 34.479920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f8
[ 34.481266] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 34.482151] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 34.483434] page_type: f5(slab)
[ 34.483939] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[ 34.485377] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[ 34.486467] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[ 34.487540] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[ 34.488920] head: 0bfffe0000000003 ffffc1ffc3193e01 ffffffffffffffff 0000000000000000
[ 34.490018] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[ 34.491853] page dumped because: kasan: bad access detected
[ 34.492817]
[ 34.493212] Memory state around the buggy address:
[ 34.493858] fff00000c64faf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 34.495042] fff00000c64faf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 34.496695] >fff00000c64fb000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.497147] ^
[ 34.497399] fff00000c64fb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.498513] fff00000c64fb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.499583] ==================================================================
Home
[ 35.807884] ==================================================================
[ 35.808985] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[ 35.810095] Write of size 16 at addr fff00000c6114e40 by task kunit_try_catch/154
[ 35.811429]
[ 35.811997] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.813841] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.815301] Hardware name: linux,dummy-virt (DT)
[ 35.815908] Call trace:
[ 35.816642] show_stack+0x20/0x38 (C)
[ 35.817696] dump_stack_lvl+0x8c/0xd0
[ 35.818229] print_report+0x118/0x5e0
[ 35.818827] kasan_report+0xc8/0x118
[ 35.819402] __asan_report_store16_noabort+0x20/0x30
[ 35.820109] kmalloc_oob_16+0x3a0/0x3f8
[ 35.820590] kunit_try_run_case+0x14c/0x3d0
[ 35.821265] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.822215] kthread+0x24c/0x2d0
[ 35.822793] ret_from_fork+0x10/0x20
[ 35.823274]
[ 35.823661] Allocated by task 154:
[ 35.824218] kasan_save_stack+0x3c/0x68
[ 35.825059] kasan_save_track+0x20/0x40
[ 35.825838] kasan_save_alloc_info+0x40/0x58
[ 35.826686] __kasan_kmalloc+0xd4/0xd8
[ 35.827205] __kmalloc_cache_noprof+0x15c/0x3c0
[ 35.828054] kmalloc_oob_16+0xb4/0x3f8
[ 35.828616] kunit_try_run_case+0x14c/0x3d0
[ 35.829282] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.830080] kthread+0x24c/0x2d0
[ 35.830603] ret_from_fork+0x10/0x20
[ 35.831091]
[ 35.831594] The buggy address belongs to the object at fff00000c6114e40
[ 35.831594] which belongs to the cache kmalloc-16 of size 16
[ 35.833041] The buggy address is located 0 bytes inside of
[ 35.833041] allocated 13-byte region [fff00000c6114e40, fff00000c6114e4d)
[ 35.834550]
[ 35.834959] The buggy address belongs to the physical page:
[ 35.835869] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 35.837123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 35.838151] page_type: f5(slab)
[ 35.838716] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 35.840161] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 35.841334] page dumped because: kasan: bad access detected
[ 35.842172]
[ 35.842603] Memory state around the buggy address:
[ 35.843331] fff00000c6114d00: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc
[ 35.844406] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 35.845378] >fff00000c6114e00: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[ 35.846305] ^
[ 35.847128] fff00000c6114e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.848081] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.848978] ==================================================================
Home
[ 35.928844] ==================================================================
[ 35.929917] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[ 35.930838] Write of size 128 at addr fff00000c6158600 by task kunit_try_catch/158
[ 35.932234]
[ 35.932737] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.934472] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.935983] Hardware name: linux,dummy-virt (DT)
[ 35.937262] Call trace:
[ 35.937725] show_stack+0x20/0x38 (C)
[ 35.938498] dump_stack_lvl+0x8c/0xd0
[ 35.940267] print_report+0x118/0x5e0
[ 35.940969] kasan_report+0xc8/0x118
[ 35.941724] kasan_check_range+0x100/0x1a8
[ 35.942313] __asan_memset+0x34/0x78
[ 35.942905] kmalloc_oob_in_memset+0x144/0x2d0
[ 35.943772] kunit_try_run_case+0x14c/0x3d0
[ 35.944413] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.945676] kthread+0x24c/0x2d0
[ 35.946325] ret_from_fork+0x10/0x20
[ 35.947665]
[ 35.948031] Allocated by task 158:
[ 35.948603] kasan_save_stack+0x3c/0x68
[ 35.949379] kasan_save_track+0x20/0x40
[ 35.950107] kasan_save_alloc_info+0x40/0x58
[ 35.950906] __kasan_kmalloc+0xd4/0xd8
[ 35.951774] __kmalloc_cache_noprof+0x15c/0x3c0
[ 35.952299] kmalloc_oob_in_memset+0xb0/0x2d0
[ 35.953266] kunit_try_run_case+0x14c/0x3d0
[ 35.954015] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.954866] kthread+0x24c/0x2d0
[ 35.955699] ret_from_fork+0x10/0x20
[ 35.956171]
[ 35.956599] The buggy address belongs to the object at fff00000c6158600
[ 35.956599] which belongs to the cache kmalloc-128 of size 128
[ 35.958104] The buggy address is located 0 bytes inside of
[ 35.958104] allocated 120-byte region [fff00000c6158600, fff00000c6158678)
[ 35.959851]
[ 35.960191] The buggy address belongs to the physical page:
[ 35.961382] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106158
[ 35.962670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 35.963841] page_type: f5(slab)
[ 35.964502] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 35.965333] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.966646] page dumped because: kasan: bad access detected
[ 35.967934]
[ 35.968414] Memory state around the buggy address:
[ 35.969073] fff00000c6158500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 35.970100] fff00000c6158580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.971393] >fff00000c6158600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 35.972805] ^
[ 35.974169] fff00000c6158680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.975446] fff00000c6158700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.977485] ==================================================================
Home
[ 34.372968] ==================================================================
[ 34.374425] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[ 34.376771] Read of size 1 at addr fff00000c6114e1f by task kunit_try_catch/126
[ 34.378257]
[ 34.379300] CPU: 1 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.380344] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.380926] Hardware name: linux,dummy-virt (DT)
[ 34.381488] Call trace:
[ 34.382092] show_stack+0x20/0x38 (C)
[ 34.382832] dump_stack_lvl+0x8c/0xd0
[ 34.383435] print_report+0x118/0x5e0
[ 34.384574] kasan_report+0xc8/0x118
[ 34.385175] __asan_report_load1_noabort+0x20/0x30
[ 34.385736] kmalloc_oob_left+0x2ec/0x320
[ 34.386163] kunit_try_run_case+0x14c/0x3d0
[ 34.386655] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.387847] kthread+0x24c/0x2d0
[ 34.388384] ret_from_fork+0x10/0x20
[ 34.389251]
[ 34.389570] Allocated by task 28:
[ 34.390186] kasan_save_stack+0x3c/0x68
[ 34.390883] kasan_save_track+0x20/0x40
[ 34.391683] kasan_save_alloc_info+0x40/0x58
[ 34.392137] __kasan_kmalloc+0xd4/0xd8
[ 34.393484] __kmalloc_node_track_caller_noprof+0x184/0x4b8
[ 34.394647] kstrdup+0x54/0xc8
[ 34.395408] devtmpfs_work_loop+0x384/0x590
[ 34.396835] devtmpfsd+0x50/0x58
[ 34.398071] kthread+0x24c/0x2d0
[ 34.398812] ret_from_fork+0x10/0x20
[ 34.400646]
[ 34.401179] Freed by task 28:
[ 34.401760] kasan_save_stack+0x3c/0x68
[ 34.402631] kasan_save_track+0x20/0x40
[ 34.403444] kasan_save_free_info+0x4c/0x78
[ 34.404418] __kasan_slab_free+0x6c/0x98
[ 34.405491] kfree+0x114/0x3c8
[ 34.406199] devtmpfs_work_loop+0x498/0x590
[ 34.407160] devtmpfsd+0x50/0x58
[ 34.407598] kthread+0x24c/0x2d0
[ 34.407970] ret_from_fork+0x10/0x20
[ 34.408398]
[ 34.408873] The buggy address belongs to the object at fff00000c6114e00
[ 34.408873] which belongs to the cache kmalloc-16 of size 16
[ 34.411006] The buggy address is located 15 bytes to the right of
[ 34.411006] allocated 16-byte region [fff00000c6114e00, fff00000c6114e10)
[ 34.413614]
[ 34.414179] The buggy address belongs to the physical page:
[ 34.415582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 34.417781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.419038] page_type: f5(slab)
[ 34.419796] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 34.421572] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 34.423198] page dumped because: kasan: bad access detected
[ 34.425008]
[ 34.425325] Memory state around the buggy address:
[ 34.426099] fff00000c6114d00: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc
[ 34.427627] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 34.429502] >fff00000c6114e00: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[ 34.430226] ^
[ 34.431151] fff00000c6114e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.432681] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.434201] ==================================================================
Home
[ 36.170704] ==================================================================
[ 36.172482] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[ 36.173947] Write of size 16 at addr fff00000c6158c69 by task kunit_try_catch/166
[ 36.174885]
[ 36.175315] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.176652] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.177148] Hardware name: linux,dummy-virt (DT)
[ 36.177791] Call trace:
[ 36.178276] show_stack+0x20/0x38 (C)
[ 36.179046] dump_stack_lvl+0x8c/0xd0
[ 36.180249] print_report+0x118/0x5e0
[ 36.180932] kasan_report+0xc8/0x118
[ 36.181631] kasan_check_range+0x100/0x1a8
[ 36.182329] __asan_memset+0x34/0x78
[ 36.183047] kmalloc_oob_memset_16+0x150/0x2f8
[ 36.183787] kunit_try_run_case+0x14c/0x3d0
[ 36.184435] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.185313] kthread+0x24c/0x2d0
[ 36.185957] ret_from_fork+0x10/0x20
[ 36.186657]
[ 36.187350] Allocated by task 166:
[ 36.187831] kasan_save_stack+0x3c/0x68
[ 36.189431] kasan_save_track+0x20/0x40
[ 36.190181] kasan_save_alloc_info+0x40/0x58
[ 36.190942] __kasan_kmalloc+0xd4/0xd8
[ 36.191884] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.192750] kmalloc_oob_memset_16+0xb0/0x2f8
[ 36.193328] kunit_try_run_case+0x14c/0x3d0
[ 36.194049] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.194983] kthread+0x24c/0x2d0
[ 36.195422] ret_from_fork+0x10/0x20
[ 36.196076]
[ 36.196455] The buggy address belongs to the object at fff00000c6158c00
[ 36.196455] which belongs to the cache kmalloc-128 of size 128
[ 36.198079] The buggy address is located 105 bytes inside of
[ 36.198079] allocated 120-byte region [fff00000c6158c00, fff00000c6158c78)
[ 36.200784]
[ 36.201308] The buggy address belongs to the physical page:
[ 36.202107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106158
[ 36.203540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.204637] page_type: f5(slab)
[ 36.205106] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 36.206225] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 36.206977] page dumped because: kasan: bad access detected
[ 36.207668]
[ 36.207919] Memory state around the buggy address:
[ 36.208351] fff00000c6158b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 36.210463] fff00000c6158b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.211848] >fff00000c6158c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 36.212473] ^
[ 36.213995] fff00000c6158c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.215950] fff00000c6158d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.217647] ==================================================================
Home
[ 35.989027] ==================================================================
[ 35.990347] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[ 35.991924] Write of size 2 at addr fff00000c6158777 by task kunit_try_catch/160
[ 35.993733]
[ 35.994104] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.996441] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.997498] Hardware name: linux,dummy-virt (DT)
[ 35.998417] Call trace:
[ 35.998887] show_stack+0x20/0x38 (C)
[ 35.999591] dump_stack_lvl+0x8c/0xd0
[ 36.000092] print_report+0x118/0x5e0
[ 36.001176] kasan_report+0xc8/0x118
[ 36.002154] kasan_check_range+0x100/0x1a8
[ 36.002625] __asan_memset+0x34/0x78
[ 36.003302] kmalloc_oob_memset_2+0x150/0x2f8
[ 36.004513] kunit_try_run_case+0x14c/0x3d0
[ 36.005242] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.006164] kthread+0x24c/0x2d0
[ 36.007285] ret_from_fork+0x10/0x20
[ 36.007915]
[ 36.008166] Allocated by task 160:
[ 36.008643] kasan_save_stack+0x3c/0x68
[ 36.010030] kasan_save_track+0x20/0x40
[ 36.010746] kasan_save_alloc_info+0x40/0x58
[ 36.011933] __kasan_kmalloc+0xd4/0xd8
[ 36.012863] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.013544] kmalloc_oob_memset_2+0xb0/0x2f8
[ 36.014104] kunit_try_run_case+0x14c/0x3d0
[ 36.014839] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.015781] kthread+0x24c/0x2d0
[ 36.016558] ret_from_fork+0x10/0x20
[ 36.017099]
[ 36.017436] The buggy address belongs to the object at fff00000c6158700
[ 36.017436] which belongs to the cache kmalloc-128 of size 128
[ 36.019019] The buggy address is located 119 bytes inside of
[ 36.019019] allocated 120-byte region [fff00000c6158700, fff00000c6158778)
[ 36.020066]
[ 36.020592] The buggy address belongs to the physical page:
[ 36.021294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106158
[ 36.022315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.023924] page_type: f5(slab)
[ 36.024407] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 36.025181] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 36.026176] page dumped because: kasan: bad access detected
[ 36.027119]
[ 36.027705] Memory state around the buggy address:
[ 36.028768] fff00000c6158600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.030576] fff00000c6158680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.031357] >fff00000c6158700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 36.033209] ^
[ 36.034175] fff00000c6158780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.036136] fff00000c6158800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.036952] ==================================================================
---
[ 36.049733] ==================================================================
[ 36.051603] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[ 36.052502] Write of size 4 at addr fff00000c6158875 by task kunit_try_catch/162
[ 36.053558]
[ 36.053900] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.055081] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.055894] Hardware name: linux,dummy-virt (DT)
[ 36.056554] Call trace:
[ 36.057076] show_stack+0x20/0x38 (C)
[ 36.057653] dump_stack_lvl+0x8c/0xd0
[ 36.058314] print_report+0x118/0x5e0
[ 36.058980] kasan_report+0xc8/0x118
[ 36.059799] kasan_check_range+0x100/0x1a8
[ 36.060507] __asan_memset+0x34/0x78
[ 36.061294] kmalloc_oob_memset_4+0x150/0x300
[ 36.062085] kunit_try_run_case+0x14c/0x3d0
[ 36.062740] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.063461] kthread+0x24c/0x2d0
[ 36.064029] ret_from_fork+0x10/0x20
[ 36.064598]
[ 36.065032] Allocated by task 162:
[ 36.065511] kasan_save_stack+0x3c/0x68
[ 36.066030] kasan_save_track+0x20/0x40
[ 36.066725] kasan_save_alloc_info+0x40/0x58
[ 36.067249] __kasan_kmalloc+0xd4/0xd8
[ 36.067956] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.068601] kmalloc_oob_memset_4+0xb0/0x300
[ 36.069129] kunit_try_run_case+0x14c/0x3d0
[ 36.069911] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.070632] kthread+0x24c/0x2d0
[ 36.071136] ret_from_fork+0x10/0x20
[ 36.071792]
[ 36.072127] The buggy address belongs to the object at fff00000c6158800
[ 36.072127] which belongs to the cache kmalloc-128 of size 128
[ 36.073425] The buggy address is located 117 bytes inside of
[ 36.073425] allocated 120-byte region [fff00000c6158800, fff00000c6158878)
[ 36.074835]
[ 36.075269] The buggy address belongs to the physical page:
[ 36.076027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106158
[ 36.077041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.078063] page_type: f5(slab)
[ 36.078597] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 36.079627] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 36.080506] page dumped because: kasan: bad access detected
[ 36.081228]
[ 36.081646] Memory state around the buggy address:
[ 36.082283] fff00000c6158700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.083106] fff00000c6158780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.084050] >fff00000c6158800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 36.084928] ^
[ 36.085842] fff00000c6158880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.086898] fff00000c6158900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.087766] ==================================================================
Home
[ 36.099489] ==================================================================
[ 36.100868] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[ 36.101559] Write of size 8 at addr fff00000c6192a71 by task kunit_try_catch/164
[ 36.102253]
[ 36.102594] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.104908] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.105985] Hardware name: linux,dummy-virt (DT)
[ 36.107677] Call trace:
[ 36.108351] show_stack+0x20/0x38 (C)
[ 36.108870] dump_stack_lvl+0x8c/0xd0
[ 36.109716] print_report+0x118/0x5e0
[ 36.110389] kasan_report+0xc8/0x118
[ 36.111945] kasan_check_range+0x100/0x1a8
[ 36.112724] __asan_memset+0x34/0x78
[ 36.113512] kmalloc_oob_memset_8+0x150/0x2f8
[ 36.114230] kunit_try_run_case+0x14c/0x3d0
[ 36.115465] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.116480] kthread+0x24c/0x2d0
[ 36.117285] ret_from_fork+0x10/0x20
[ 36.118076]
[ 36.118657] Allocated by task 164:
[ 36.119735] kasan_save_stack+0x3c/0x68
[ 36.120674] kasan_save_track+0x20/0x40
[ 36.121576] kasan_save_alloc_info+0x40/0x58
[ 36.122380] __kasan_kmalloc+0xd4/0xd8
[ 36.123001] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.123823] kmalloc_oob_memset_8+0xb0/0x2f8
[ 36.124587] kunit_try_run_case+0x14c/0x3d0
[ 36.125175] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.126089] kthread+0x24c/0x2d0
[ 36.126776] ret_from_fork+0x10/0x20
[ 36.127585]
[ 36.128006] The buggy address belongs to the object at fff00000c6192a00
[ 36.128006] which belongs to the cache kmalloc-128 of size 128
[ 36.129870] The buggy address is located 113 bytes inside of
[ 36.129870] allocated 120-byte region [fff00000c6192a00, fff00000c6192a78)
[ 36.131651]
[ 36.131949] The buggy address belongs to the physical page:
[ 36.133121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106192
[ 36.134081] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.135617] page_type: f5(slab)
[ 36.136131] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 36.137474] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 36.138455] page dumped because: kasan: bad access detected
[ 36.139011]
[ 36.139322] Memory state around the buggy address:
[ 36.140329] fff00000c6192900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 36.141261] fff00000c6192980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.142730] >fff00000c6192a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 36.143693] ^
[ 36.144389] fff00000c6192a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.145822] fff00000c6192b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.147066] ==================================================================
Home
[ 34.210693] ==================================================================
[ 34.212734] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[ 34.215629] Write of size 1 at addr fff00000c6166573 by task kunit_try_catch/124
[ 34.216968]
[ 34.218577] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G N 6.13.0-rc7 #1
[ 34.220204] Tainted: [N]=TEST
[ 34.220780] Hardware name: linux,dummy-virt (DT)
[ 34.222041] Call trace:
[ 34.222809] show_stack+0x20/0x38 (C)
[ 34.223910] dump_stack_lvl+0x8c/0xd0
[ 34.224549] print_report+0x118/0x5e0
[ 34.225151] kasan_report+0xc8/0x118
[ 34.225705] __asan_report_store1_noabort+0x20/0x30
[ 34.226534] kmalloc_oob_right+0x5a4/0x660
[ 34.227665] kunit_try_run_case+0x14c/0x3d0
[ 34.228320] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.229093] kthread+0x24c/0x2d0
[ 34.229577] ret_from_fork+0x10/0x20
[ 34.230407]
[ 34.231510] Allocated by task 124:
[ 34.232383] kasan_save_stack+0x3c/0x68
[ 34.233096] kasan_save_track+0x20/0x40
[ 34.233582] kasan_save_alloc_info+0x40/0x58
[ 34.234613] __kasan_kmalloc+0xd4/0xd8
[ 34.235619] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.236740] kmalloc_oob_right+0xb0/0x660
[ 34.237471] kunit_try_run_case+0x14c/0x3d0
[ 34.237849] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.238200] kthread+0x24c/0x2d0
[ 34.238461] ret_from_fork+0x10/0x20
[ 34.239879]
[ 34.240330] The buggy address belongs to the object at fff00000c6166500
[ 34.240330] which belongs to the cache kmalloc-128 of size 128
[ 34.241928] The buggy address is located 0 bytes to the right of
[ 34.241928] allocated 115-byte region [fff00000c6166500, fff00000c6166573)
[ 34.244564]
[ 34.245158] The buggy address belongs to the physical page:
[ 34.246538] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106166
[ 34.248248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.249871] page_type: f5(slab)
[ 34.251274] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 34.252409] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 34.253272] page dumped because: kasan: bad access detected
[ 34.253915]
[ 34.254348] Memory state around the buggy address:
[ 34.255902] fff00000c6166400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 34.257160] fff00000c6166480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.258616] >fff00000c6166500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 34.260593] ^
[ 34.261577] fff00000c6166580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.262387] fff00000c6166600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.263818] ==================================================================
Home
[ 34.268198] ==================================================================
[ 34.269904] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[ 34.270769] Write of size 1 at addr fff00000c6166578 by task kunit_try_catch/124
[ 34.272438]
[ 34.272836] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.274513] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.276229] Hardware name: linux,dummy-virt (DT)
[ 34.276828] Call trace:
[ 34.277282] show_stack+0x20/0x38 (C)
[ 34.278011] dump_stack_lvl+0x8c/0xd0
[ 34.278541] print_report+0x118/0x5e0
[ 34.279329] kasan_report+0xc8/0x118
[ 34.280445] __asan_report_store1_noabort+0x20/0x30
[ 34.281211] kmalloc_oob_right+0x538/0x660
[ 34.281864] kunit_try_run_case+0x14c/0x3d0
[ 34.282443] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.283734] kthread+0x24c/0x2d0
[ 34.284297] ret_from_fork+0x10/0x20
[ 34.284889]
[ 34.285253] Allocated by task 124:
[ 34.286266] kasan_save_stack+0x3c/0x68
[ 34.286844] kasan_save_track+0x20/0x40
[ 34.287538] kasan_save_alloc_info+0x40/0x58
[ 34.288148] __kasan_kmalloc+0xd4/0xd8
[ 34.288805] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.289817] kmalloc_oob_right+0xb0/0x660
[ 34.290573] kunit_try_run_case+0x14c/0x3d0
[ 34.291831] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.292546] kthread+0x24c/0x2d0
[ 34.292943] ret_from_fork+0x10/0x20
[ 34.293350]
[ 34.293745] The buggy address belongs to the object at fff00000c6166500
[ 34.293745] which belongs to the cache kmalloc-128 of size 128
[ 34.296062] The buggy address is located 5 bytes to the right of
[ 34.296062] allocated 115-byte region [fff00000c6166500, fff00000c6166573)
[ 34.297827]
[ 34.298256] The buggy address belongs to the physical page:
[ 34.299070] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106166
[ 34.300601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.301433] page_type: f5(slab)
[ 34.302089] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 34.303279] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 34.304216] page dumped because: kasan: bad access detected
[ 34.304926]
[ 34.305318] Memory state around the buggy address:
[ 34.306124] fff00000c6166400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.307237] fff00000c6166480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.307976] >fff00000c6166500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 34.308813] ^
[ 34.309984] fff00000c6166580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.310734] fff00000c6166600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.312269] ==================================================================
Home
[ 34.316273] ==================================================================
[ 34.317195] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[ 34.318497] Read of size 1 at addr fff00000c6166580 by task kunit_try_catch/124
[ 34.320153]
[ 34.320758] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.321908] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.322467] Hardware name: linux,dummy-virt (DT)
[ 34.323866] Call trace:
[ 34.324322] show_stack+0x20/0x38 (C)
[ 34.324964] dump_stack_lvl+0x8c/0xd0
[ 34.325658] print_report+0x118/0x5e0
[ 34.326273] kasan_report+0xc8/0x118
[ 34.327395] __asan_report_load1_noabort+0x20/0x30
[ 34.328150] kmalloc_oob_right+0x5d0/0x660
[ 34.328802] kunit_try_run_case+0x14c/0x3d0
[ 34.329402] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.330375] kthread+0x24c/0x2d0
[ 34.331346] ret_from_fork+0x10/0x20
[ 34.332073]
[ 34.332538] Allocated by task 124:
[ 34.333190] kasan_save_stack+0x3c/0x68
[ 34.333920] kasan_save_track+0x20/0x40
[ 34.334598] kasan_save_alloc_info+0x40/0x58
[ 34.335314] __kasan_kmalloc+0xd4/0xd8
[ 34.337135] __kmalloc_cache_noprof+0x15c/0x3c0
[ 34.338736] kmalloc_oob_right+0xb0/0x660
[ 34.339808] kunit_try_run_case+0x14c/0x3d0
[ 34.340704] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.341503] kthread+0x24c/0x2d0
[ 34.342072] ret_from_fork+0x10/0x20
[ 34.342572]
[ 34.342980] The buggy address belongs to the object at fff00000c6166500
[ 34.342980] which belongs to the cache kmalloc-128 of size 128
[ 34.344915] The buggy address is located 13 bytes to the right of
[ 34.344915] allocated 115-byte region [fff00000c6166500, fff00000c6166573)
[ 34.346360]
[ 34.347300] The buggy address belongs to the physical page:
[ 34.348150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106166
[ 34.349129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.350053] page_type: f5(slab)
[ 34.350698] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 34.352128] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 34.352954] page dumped because: kasan: bad access detected
[ 34.353311]
[ 34.353505] Memory state around the buggy address:
[ 34.354317] fff00000c6166480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.355605] fff00000c6166500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 34.356667] >fff00000c6166580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.357664] ^
[ 34.358300] fff00000c6166600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.359838] fff00000c6166680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.360813] ==================================================================
Home
[ 34.512385] ==================================================================
[ 34.513944] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[ 34.515327] Write of size 1 at addr fff00000c61c1678 by task kunit_try_catch/130
[ 34.517639]
[ 34.518361] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.520238] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.521598] Hardware name: linux,dummy-virt (DT)
[ 34.522348] Call trace:
[ 34.522757] show_stack+0x20/0x38 (C)
[ 34.523695] dump_stack_lvl+0x8c/0xd0
[ 34.524277] print_report+0x118/0x5e0
[ 34.525660] kasan_report+0xc8/0x118
[ 34.526413] __asan_report_store1_noabort+0x20/0x30
[ 34.527749] kmalloc_track_caller_oob_right+0x414/0x490
[ 34.529001] kunit_try_run_case+0x14c/0x3d0
[ 34.529970] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.530817] kthread+0x24c/0x2d0
[ 34.532141] ret_from_fork+0x10/0x20
[ 34.533106]
[ 34.533447] Allocated by task 130:
[ 34.533890] kasan_save_stack+0x3c/0x68
[ 34.534395] kasan_save_track+0x20/0x40
[ 34.535087] kasan_save_alloc_info+0x40/0x58
[ 34.535939] __kasan_kmalloc+0xd4/0xd8
[ 34.536493] __kmalloc_node_track_caller_noprof+0x184/0x4b8
[ 34.538048] kmalloc_track_caller_oob_right+0xa8/0x490
[ 34.538676] kunit_try_run_case+0x14c/0x3d0
[ 34.539996] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.540622] kthread+0x24c/0x2d0
[ 34.541224] ret_from_fork+0x10/0x20
[ 34.542273]
[ 34.542616] The buggy address belongs to the object at fff00000c61c1600
[ 34.542616] which belongs to the cache kmalloc-128 of size 128
[ 34.543950] The buggy address is located 0 bytes to the right of
[ 34.543950] allocated 120-byte region [fff00000c61c1600, fff00000c61c1678)
[ 34.545873]
[ 34.546358] The buggy address belongs to the physical page:
[ 34.547711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c1
[ 34.548743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.549694] page_type: f5(slab)
[ 34.550285] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 34.551177] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 34.552575] page dumped because: kasan: bad access detected
[ 34.553620]
[ 34.553992] Memory state around the buggy address:
[ 34.554667] fff00000c61c1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 34.556549] fff00000c61c1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.557609] >fff00000c61c1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 34.558556] ^
[ 34.560056] fff00000c61c1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.561020] fff00000c61c1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.562038] ==================================================================
Home
[ 37.213303] ==================================================================
[ 37.214671] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[ 37.215960] Read of size 1 at addr fff00000c61c80c8 by task kunit_try_catch/195
[ 37.216826]
[ 37.218553] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 37.221232] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 37.221775] Hardware name: linux,dummy-virt (DT)
[ 37.222428] Call trace:
[ 37.222737] show_stack+0x20/0x38 (C)
[ 37.223716] dump_stack_lvl+0x8c/0xd0
[ 37.224584] print_report+0x118/0x5e0
[ 37.225615] kasan_report+0xc8/0x118
[ 37.226380] __asan_report_load1_noabort+0x20/0x30
[ 37.227217] kmem_cache_oob+0x33c/0x428
[ 37.228256] kunit_try_run_case+0x14c/0x3d0
[ 37.229626] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.230215] kthread+0x24c/0x2d0
[ 37.230644] ret_from_fork+0x10/0x20
[ 37.231830]
[ 37.232222] Allocated by task 195:
[ 37.232674] kasan_save_stack+0x3c/0x68
[ 37.233262] kasan_save_track+0x20/0x40
[ 37.234110] kasan_save_alloc_info+0x40/0x58
[ 37.234959] __kasan_slab_alloc+0xa8/0xb0
[ 37.236736] kmem_cache_alloc_noprof+0x108/0x398
[ 37.237253] kmem_cache_oob+0x12c/0x428
[ 37.237622] kunit_try_run_case+0x14c/0x3d0
[ 37.237950] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.238305] kthread+0x24c/0x2d0
[ 37.238685] ret_from_fork+0x10/0x20
[ 37.241065]
[ 37.241651] The buggy address belongs to the object at fff00000c61c8000
[ 37.241651] which belongs to the cache test_cache of size 200
[ 37.243212] The buggy address is located 0 bytes to the right of
[ 37.243212] allocated 200-byte region [fff00000c61c8000, fff00000c61c80c8)
[ 37.244981]
[ 37.245342] The buggy address belongs to the physical page:
[ 37.246372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c8
[ 37.247654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 37.248664] page_type: f5(slab)
[ 37.249163] raw: 0bfffe0000000000 fff00000c1763500 dead000000000122 0000000000000000
[ 37.250199] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[ 37.251167] page dumped because: kasan: bad access detected
[ 37.252169]
[ 37.252678] Memory state around the buggy address:
[ 37.253570] fff00000c61c7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 37.254697] fff00000c61c8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 37.256880] >fff00000c61c8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 37.258003] ^
[ 37.259032] fff00000c61c8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.260004] fff00000c61c8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.260629] ==================================================================
Home
[ 35.464340] ==================================================================
[ 35.465554] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[ 35.466274] Write of size 1 at addr fff00000c69120d0 by task kunit_try_catch/150
[ 35.468390]
[ 35.468776] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.470348] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.470895] Hardware name: linux,dummy-virt (DT)
[ 35.472642] Call trace:
[ 35.473156] show_stack+0x20/0x38 (C)
[ 35.473792] dump_stack_lvl+0x8c/0xd0
[ 35.474282] print_report+0x118/0x5e0
[ 35.475157] kasan_report+0xc8/0x118
[ 35.475693] __asan_report_store1_noabort+0x20/0x30
[ 35.476439] krealloc_less_oob_helper+0xb9c/0xc50
[ 35.477793] krealloc_large_less_oob+0x20/0x38
[ 35.478391] kunit_try_run_case+0x14c/0x3d0
[ 35.480434] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.481643] kthread+0x24c/0x2d0
[ 35.482234] ret_from_fork+0x10/0x20
[ 35.483123]
[ 35.483872] The buggy address belongs to the physical page:
[ 35.484986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106910
[ 35.486270] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.487315] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.488553] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.489261] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.490259] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.491312] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.492830] head: 0bfffe0000000002 ffffc1ffc31a4401 ffffffffffffffff 0000000000000000
[ 35.494107] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 35.496264] page dumped because: kasan: bad access detected
[ 35.497359]
[ 35.497865] Memory state around the buggy address:
[ 35.498998] fff00000c6911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.499933] fff00000c6912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.500791] >fff00000c6912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 35.501896] ^
[ 35.502635] fff00000c6912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.503855] fff00000c6912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.505703] ==================================================================
Home
[ 35.062252] ==================================================================
[ 35.063326] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[ 35.064509] Write of size 1 at addr fff00000c1dfd8d0 by task kunit_try_catch/146
[ 35.066975]
[ 35.067377] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.069096] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.069644] Hardware name: linux,dummy-virt (DT)
[ 35.070356] Call trace:
[ 35.070743] show_stack+0x20/0x38 (C)
[ 35.072595] dump_stack_lvl+0x8c/0xd0
[ 35.073176] print_report+0x118/0x5e0
[ 35.073660] kasan_report+0xc8/0x118
[ 35.074401] __asan_report_store1_noabort+0x20/0x30
[ 35.075265] krealloc_less_oob_helper+0xb9c/0xc50
[ 35.076117] krealloc_less_oob+0x20/0x38
[ 35.077562] kunit_try_run_case+0x14c/0x3d0
[ 35.078492] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.079688] kthread+0x24c/0x2d0
[ 35.080703] ret_from_fork+0x10/0x20
[ 35.081108]
[ 35.081284] Allocated by task 146:
[ 35.081700] kasan_save_stack+0x3c/0x68
[ 35.083132] kasan_save_track+0x20/0x40
[ 35.084183] kasan_save_alloc_info+0x40/0x58
[ 35.084955] __kasan_krealloc+0x118/0x178
[ 35.085693] krealloc_noprof+0x128/0x360
[ 35.086457] krealloc_less_oob_helper+0x168/0xc50
[ 35.087443] krealloc_less_oob+0x20/0x38
[ 35.088000] kunit_try_run_case+0x14c/0x3d0
[ 35.089250] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.090492] kthread+0x24c/0x2d0
[ 35.090972] ret_from_fork+0x10/0x20
[ 35.091907]
[ 35.092219] The buggy address belongs to the object at fff00000c1dfd800
[ 35.092219] which belongs to the cache kmalloc-256 of size 256
[ 35.094478] The buggy address is located 7 bytes to the right of
[ 35.094478] allocated 201-byte region [fff00000c1dfd800, fff00000c1dfd8c9)
[ 35.096703]
[ 35.097243] The buggy address belongs to the physical page:
[ 35.098184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[ 35.099986] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.100969] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.101856] page_type: f5(slab)
[ 35.102420] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.104097] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.106211] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.107112] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.108317] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[ 35.110058] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 35.111418] page dumped because: kasan: bad access detected
[ 35.112039]
[ 35.113671] Memory state around the buggy address:
[ 35.114235] fff00000c1dfd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.115725] fff00000c1dfd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.116845] >fff00000c1dfd880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 35.118079] ^
[ 35.119239] fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.121308] fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.122212] ==================================================================
Home
[ 35.423955] ==================================================================
[ 35.425180] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[ 35.426018] Write of size 1 at addr fff00000c69120c9 by task kunit_try_catch/150
[ 35.426956]
[ 35.427361] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.430065] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.430999] Hardware name: linux,dummy-virt (DT)
[ 35.431961] Call trace:
[ 35.432388] show_stack+0x20/0x38 (C)
[ 35.432965] dump_stack_lvl+0x8c/0xd0
[ 35.433799] print_report+0x118/0x5e0
[ 35.434334] kasan_report+0xc8/0x118
[ 35.434815] __asan_report_store1_noabort+0x20/0x30
[ 35.436107] krealloc_less_oob_helper+0xa48/0xc50
[ 35.436972] krealloc_large_less_oob+0x20/0x38
[ 35.437447] kunit_try_run_case+0x14c/0x3d0
[ 35.438386] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.439311] kthread+0x24c/0x2d0
[ 35.440435] ret_from_fork+0x10/0x20
[ 35.441140]
[ 35.441402] The buggy address belongs to the physical page:
[ 35.442109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106910
[ 35.443616] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.444861] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.445505] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.446658] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.447688] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.448656] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.450634] head: 0bfffe0000000002 ffffc1ffc31a4401 ffffffffffffffff 0000000000000000
[ 35.451749] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 35.453096] page dumped because: kasan: bad access detected
[ 35.453919]
[ 35.454270] Memory state around the buggy address:
[ 35.454932] fff00000c6911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.456416] fff00000c6912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.457143] >fff00000c6912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 35.458252] ^
[ 35.459296] fff00000c6912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.460208] fff00000c6912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.461087] ==================================================================
Home
[ 35.183782] ==================================================================
[ 35.184875] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[ 35.185586] Write of size 1 at addr fff00000c1dfd8ea by task kunit_try_catch/146
[ 35.186612]
[ 35.187053] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.187939] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.189326] Hardware name: linux,dummy-virt (DT)
[ 35.190643] Call trace:
[ 35.192042] show_stack+0x20/0x38 (C)
[ 35.192588] dump_stack_lvl+0x8c/0xd0
[ 35.193023] print_report+0x118/0x5e0
[ 35.194106] kasan_report+0xc8/0x118
[ 35.195095] __asan_report_store1_noabort+0x20/0x30
[ 35.196271] krealloc_less_oob_helper+0xae4/0xc50
[ 35.197615] krealloc_less_oob+0x20/0x38
[ 35.198512] kunit_try_run_case+0x14c/0x3d0
[ 35.199140] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.200235] kthread+0x24c/0x2d0
[ 35.201095] ret_from_fork+0x10/0x20
[ 35.202063]
[ 35.203039] Allocated by task 146:
[ 35.204433] kasan_save_stack+0x3c/0x68
[ 35.205077] kasan_save_track+0x20/0x40
[ 35.205749] kasan_save_alloc_info+0x40/0x58
[ 35.206355] __kasan_krealloc+0x118/0x178
[ 35.207099] krealloc_noprof+0x128/0x360
[ 35.207817] krealloc_less_oob_helper+0x168/0xc50
[ 35.208847] krealloc_less_oob+0x20/0x38
[ 35.209655] kunit_try_run_case+0x14c/0x3d0
[ 35.210510] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.211898] kthread+0x24c/0x2d0
[ 35.212684] ret_from_fork+0x10/0x20
[ 35.213957]
[ 35.214399] The buggy address belongs to the object at fff00000c1dfd800
[ 35.214399] which belongs to the cache kmalloc-256 of size 256
[ 35.216441] The buggy address is located 33 bytes to the right of
[ 35.216441] allocated 201-byte region [fff00000c1dfd800, fff00000c1dfd8c9)
[ 35.219323]
[ 35.219698] The buggy address belongs to the physical page:
[ 35.220840] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[ 35.222620] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.223299] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.224445] page_type: f5(slab)
[ 35.225285] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.226126] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.227340] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.229022] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.230219] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[ 35.232188] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 35.233970] page dumped because: kasan: bad access detected
[ 35.235969]
[ 35.237106] Memory state around the buggy address:
[ 35.238099] fff00000c1dfd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.239745] fff00000c1dfd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.241082] >fff00000c1dfd880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 35.242015] ^
[ 35.243883] fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.245054] fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.246057] ==================================================================
Home
[ 35.508531] ==================================================================
[ 35.509473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[ 35.510462] Write of size 1 at addr fff00000c69120da by task kunit_try_catch/150
[ 35.511899]
[ 35.513336] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.514553] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.515540] Hardware name: linux,dummy-virt (DT)
[ 35.516769] Call trace:
[ 35.517167] show_stack+0x20/0x38 (C)
[ 35.517792] dump_stack_lvl+0x8c/0xd0
[ 35.518459] print_report+0x118/0x5e0
[ 35.519539] kasan_report+0xc8/0x118
[ 35.520688] __asan_report_store1_noabort+0x20/0x30
[ 35.521959] krealloc_less_oob_helper+0xa80/0xc50
[ 35.522675] krealloc_large_less_oob+0x20/0x38
[ 35.523628] kunit_try_run_case+0x14c/0x3d0
[ 35.524204] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.525674] kthread+0x24c/0x2d0
[ 35.526469] ret_from_fork+0x10/0x20
[ 35.527074]
[ 35.528544] The buggy address belongs to the physical page:
[ 35.529341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106910
[ 35.530624] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.532351] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.533608] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.534661] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.536444] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.537970] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.539538] head: 0bfffe0000000002 ffffc1ffc31a4401 ffffffffffffffff 0000000000000000
[ 35.540856] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 35.542054] page dumped because: kasan: bad access detected
[ 35.543568]
[ 35.544097] Memory state around the buggy address:
[ 35.544629] fff00000c6911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.545245] fff00000c6912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.546552] >fff00000c6912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 35.547696] ^
[ 35.548769] fff00000c6912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.550180] fff00000c6912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.551611] ==================================================================
Home
[ 35.248884] ==================================================================
[ 35.249705] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[ 35.250638] Write of size 1 at addr fff00000c1dfd8eb by task kunit_try_catch/146
[ 35.253229]
[ 35.253984] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.255188] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.256203] Hardware name: linux,dummy-virt (DT)
[ 35.257229] Call trace:
[ 35.257678] show_stack+0x20/0x38 (C)
[ 35.258467] dump_stack_lvl+0x8c/0xd0
[ 35.259738] print_report+0x118/0x5e0
[ 35.260464] kasan_report+0xc8/0x118
[ 35.261251] __asan_report_store1_noabort+0x20/0x30
[ 35.262152] krealloc_less_oob_helper+0xa58/0xc50
[ 35.262864] krealloc_less_oob+0x20/0x38
[ 35.263443] kunit_try_run_case+0x14c/0x3d0
[ 35.264703] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.265255] kthread+0x24c/0x2d0
[ 35.265941] ret_from_fork+0x10/0x20
[ 35.266818]
[ 35.267172] Allocated by task 146:
[ 35.268319] kasan_save_stack+0x3c/0x68
[ 35.268892] kasan_save_track+0x20/0x40
[ 35.269714] kasan_save_alloc_info+0x40/0x58
[ 35.270316] __kasan_krealloc+0x118/0x178
[ 35.271554] krealloc_noprof+0x128/0x360
[ 35.272937] krealloc_less_oob_helper+0x168/0xc50
[ 35.273346] krealloc_less_oob+0x20/0x38
[ 35.274266] kunit_try_run_case+0x14c/0x3d0
[ 35.275653] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.277635] kthread+0x24c/0x2d0
[ 35.278284] ret_from_fork+0x10/0x20
[ 35.278925]
[ 35.280013] The buggy address belongs to the object at fff00000c1dfd800
[ 35.280013] which belongs to the cache kmalloc-256 of size 256
[ 35.283280] The buggy address is located 34 bytes to the right of
[ 35.283280] allocated 201-byte region [fff00000c1dfd800, fff00000c1dfd8c9)
[ 35.284862]
[ 35.285269] The buggy address belongs to the physical page:
[ 35.286239] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[ 35.287128] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.288567] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.289873] page_type: f5(slab)
[ 35.290591] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.291997] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.292683] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.293139] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.293680] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[ 35.295292] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 35.296376] page dumped because: kasan: bad access detected
[ 35.297571]
[ 35.297880] Memory state around the buggy address:
[ 35.298792] fff00000c1dfd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.300832] fff00000c1dfd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.301830] >fff00000c1dfd880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 35.303424] ^
[ 35.304301] fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.305137] fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.306061] ==================================================================
Home
[ 35.602325] ==================================================================
[ 35.603221] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[ 35.605169] Write of size 1 at addr fff00000c69120eb by task kunit_try_catch/150
[ 35.607031]
[ 35.607381] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.608230] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.608601] Hardware name: linux,dummy-virt (DT)
[ 35.609763] Call trace:
[ 35.610448] show_stack+0x20/0x38 (C)
[ 35.611763] dump_stack_lvl+0x8c/0xd0
[ 35.612426] print_report+0x118/0x5e0
[ 35.612914] kasan_report+0xc8/0x118
[ 35.613572] __asan_report_store1_noabort+0x20/0x30
[ 35.614481] krealloc_less_oob_helper+0xa58/0xc50
[ 35.615149] krealloc_large_less_oob+0x20/0x38
[ 35.616576] kunit_try_run_case+0x14c/0x3d0
[ 35.617454] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.618263] kthread+0x24c/0x2d0
[ 35.618935] ret_from_fork+0x10/0x20
[ 35.619506]
[ 35.620020] The buggy address belongs to the physical page:
[ 35.620487] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106910
[ 35.621741] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.622558] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.623807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.625182] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.626210] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.627472] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.628403] head: 0bfffe0000000002 ffffc1ffc31a4401 ffffffffffffffff 0000000000000000
[ 35.629752] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 35.630772] page dumped because: kasan: bad access detected
[ 35.631308]
[ 35.631777] Memory state around the buggy address:
[ 35.633314] fff00000c6911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.634131] fff00000c6912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.636209] >fff00000c6912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 35.637149] ^
[ 35.638326] fff00000c6912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.639707] fff00000c6912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.640539] ==================================================================
Home
[ 35.554758] ==================================================================
[ 35.555565] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[ 35.556395] Write of size 1 at addr fff00000c69120ea by task kunit_try_catch/150
[ 35.559663]
[ 35.560091] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.561243] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.562045] Hardware name: linux,dummy-virt (DT)
[ 35.562725] Call trace:
[ 35.563646] show_stack+0x20/0x38 (C)
[ 35.565015] dump_stack_lvl+0x8c/0xd0
[ 35.565590] print_report+0x118/0x5e0
[ 35.566424] kasan_report+0xc8/0x118
[ 35.567647] __asan_report_store1_noabort+0x20/0x30
[ 35.569221] krealloc_less_oob_helper+0xae4/0xc50
[ 35.569986] krealloc_large_less_oob+0x20/0x38
[ 35.570716] kunit_try_run_case+0x14c/0x3d0
[ 35.571704] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.573046] kthread+0x24c/0x2d0
[ 35.573623] ret_from_fork+0x10/0x20
[ 35.574333]
[ 35.574710] The buggy address belongs to the physical page:
[ 35.575882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106910
[ 35.578263] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.579420] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.580970] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.582120] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.583199] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.584922] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.586344] head: 0bfffe0000000002 ffffc1ffc31a4401 ffffffffffffffff 0000000000000000
[ 35.588129] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 35.588969] page dumped because: kasan: bad access detected
[ 35.589775]
[ 35.590226] Memory state around the buggy address:
[ 35.591250] fff00000c6911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.592930] fff00000c6912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.593973] >fff00000c6912080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[ 35.595159] ^
[ 35.596761] fff00000c6912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.597881] fff00000c6912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.599580] ==================================================================
Home
[ 35.004261] ==================================================================
[ 35.005845] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[ 35.007050] Write of size 1 at addr fff00000c1dfd8c9 by task kunit_try_catch/146
[ 35.008745]
[ 35.009313] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.011226] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.011947] Hardware name: linux,dummy-virt (DT)
[ 35.012615] Call trace:
[ 35.012967] show_stack+0x20/0x38 (C)
[ 35.013820] dump_stack_lvl+0x8c/0xd0
[ 35.014398] print_report+0x118/0x5e0
[ 35.015501] kasan_report+0xc8/0x118
[ 35.016255] __asan_report_store1_noabort+0x20/0x30
[ 35.016842] krealloc_less_oob_helper+0xa48/0xc50
[ 35.017452] krealloc_less_oob+0x20/0x38
[ 35.018310] kunit_try_run_case+0x14c/0x3d0
[ 35.019818] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.020762] kthread+0x24c/0x2d0
[ 35.021283] ret_from_fork+0x10/0x20
[ 35.021725]
[ 35.022261] Allocated by task 146:
[ 35.023166] kasan_save_stack+0x3c/0x68
[ 35.024149] kasan_save_track+0x20/0x40
[ 35.024634] kasan_save_alloc_info+0x40/0x58
[ 35.026108] __kasan_krealloc+0x118/0x178
[ 35.026926] krealloc_noprof+0x128/0x360
[ 35.027871] krealloc_less_oob_helper+0x168/0xc50
[ 35.028912] krealloc_less_oob+0x20/0x38
[ 35.030213] kunit_try_run_case+0x14c/0x3d0
[ 35.031061] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.032237] kthread+0x24c/0x2d0
[ 35.032783] ret_from_fork+0x10/0x20
[ 35.033847]
[ 35.034098] The buggy address belongs to the object at fff00000c1dfd800
[ 35.034098] which belongs to the cache kmalloc-256 of size 256
[ 35.036286] The buggy address is located 0 bytes to the right of
[ 35.036286] allocated 201-byte region [fff00000c1dfd800, fff00000c1dfd8c9)
[ 35.037776]
[ 35.038269] The buggy address belongs to the physical page:
[ 35.038893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[ 35.040074] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.041387] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.042097] page_type: f5(slab)
[ 35.042491] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.044080] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.045093] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.046942] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.048397] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[ 35.049699] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 35.050581] page dumped because: kasan: bad access detected
[ 35.051247]
[ 35.051788] Memory state around the buggy address:
[ 35.052450] fff00000c1dfd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.053588] fff00000c1dfd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.055449] >fff00000c1dfd880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 35.056945] ^
[ 35.058059] fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.058922] fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.060596] ==================================================================
Home
[ 35.125191] ==================================================================
[ 35.126164] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[ 35.127404] Write of size 1 at addr fff00000c1dfd8da by task kunit_try_catch/146
[ 35.128077]
[ 35.128551] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.130069] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.132014] Hardware name: linux,dummy-virt (DT)
[ 35.132732] Call trace:
[ 35.133157] show_stack+0x20/0x38 (C)
[ 35.133809] dump_stack_lvl+0x8c/0xd0
[ 35.134567] print_report+0x118/0x5e0
[ 35.135191] kasan_report+0xc8/0x118
[ 35.135798] __asan_report_store1_noabort+0x20/0x30
[ 35.137811] krealloc_less_oob_helper+0xa80/0xc50
[ 35.138425] krealloc_less_oob+0x20/0x38
[ 35.139280] kunit_try_run_case+0x14c/0x3d0
[ 35.140822] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.141843] kthread+0x24c/0x2d0
[ 35.142347] ret_from_fork+0x10/0x20
[ 35.143951]
[ 35.144569] Allocated by task 146:
[ 35.145028] kasan_save_stack+0x3c/0x68
[ 35.145899] kasan_save_track+0x20/0x40
[ 35.146399] kasan_save_alloc_info+0x40/0x58
[ 35.147332] __kasan_krealloc+0x118/0x178
[ 35.148339] krealloc_noprof+0x128/0x360
[ 35.149061] krealloc_less_oob_helper+0x168/0xc50
[ 35.149810] krealloc_less_oob+0x20/0x38
[ 35.150664] kunit_try_run_case+0x14c/0x3d0
[ 35.151436] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.152932] kthread+0x24c/0x2d0
[ 35.153618] ret_from_fork+0x10/0x20
[ 35.154667]
[ 35.155078] The buggy address belongs to the object at fff00000c1dfd800
[ 35.155078] which belongs to the cache kmalloc-256 of size 256
[ 35.157169] The buggy address is located 17 bytes to the right of
[ 35.157169] allocated 201-byte region [fff00000c1dfd800, fff00000c1dfd8c9)
[ 35.159190]
[ 35.159969] The buggy address belongs to the physical page:
[ 35.160687] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[ 35.161825] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.162697] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.164154] page_type: f5(slab)
[ 35.164786] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.165776] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.166733] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.167812] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.169590] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[ 35.170271] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 35.171509] page dumped because: kasan: bad access detected
[ 35.172356]
[ 35.172854] Memory state around the buggy address:
[ 35.173495] fff00000c1dfd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.174742] fff00000c1dfd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.176396] >fff00000c1dfd880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 35.177768] ^
[ 35.178538] fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.180313] fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.181340] ==================================================================
Home
[ 35.362935] ==================================================================
[ 35.364693] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[ 35.365970] Write of size 1 at addr fff00000c68a60f0 by task kunit_try_catch/148
[ 35.368345]
[ 35.368749] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.370247] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.371588] Hardware name: linux,dummy-virt (DT)
[ 35.372309] Call trace:
[ 35.372844] show_stack+0x20/0x38 (C)
[ 35.373459] dump_stack_lvl+0x8c/0xd0
[ 35.374186] print_report+0x118/0x5e0
[ 35.374789] kasan_report+0xc8/0x118
[ 35.375643] __asan_report_store1_noabort+0x20/0x30
[ 35.376845] krealloc_more_oob_helper+0x5c8/0x680
[ 35.377590] krealloc_large_more_oob+0x20/0x38
[ 35.378241] kunit_try_run_case+0x14c/0x3d0
[ 35.379403] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.380211] kthread+0x24c/0x2d0
[ 35.380726] ret_from_fork+0x10/0x20
[ 35.381946]
[ 35.382553] The buggy address belongs to the physical page:
[ 35.384080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068a4
[ 35.386200] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.388149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.389900] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.390975] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.393078] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.394440] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.396767] head: 0bfffe0000000002 ffffc1ffc31a2901 ffffffffffffffff 0000000000000000
[ 35.398244] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 35.400085] page dumped because: kasan: bad access detected
[ 35.400830]
[ 35.402300] Memory state around the buggy address:
[ 35.403471] fff00000c68a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.404764] fff00000c68a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.405936] >fff00000c68a6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 35.407233] ^
[ 35.409038] fff00000c68a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.410680] fff00000c68a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.412103] ==================================================================
Home
[ 34.936288] ==================================================================
[ 34.937834] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[ 34.939741] Write of size 1 at addr fff00000c47c84f0 by task kunit_try_catch/144
[ 34.940627]
[ 34.941026] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.942185] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.942841] Hardware name: linux,dummy-virt (DT)
[ 34.943891] Call trace:
[ 34.944471] show_stack+0x20/0x38 (C)
[ 34.945118] dump_stack_lvl+0x8c/0xd0
[ 34.945725] print_report+0x118/0x5e0
[ 34.946295] kasan_report+0xc8/0x118
[ 34.947362] __asan_report_store1_noabort+0x20/0x30
[ 34.948076] krealloc_more_oob_helper+0x5c8/0x680
[ 34.948879] krealloc_more_oob+0x20/0x38
[ 34.949397] kunit_try_run_case+0x14c/0x3d0
[ 34.950210] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.951002] kthread+0x24c/0x2d0
[ 34.951727] ret_from_fork+0x10/0x20
[ 34.952799]
[ 34.953180] Allocated by task 144:
[ 34.953700] kasan_save_stack+0x3c/0x68
[ 34.954543] kasan_save_track+0x20/0x40
[ 34.955231] kasan_save_alloc_info+0x40/0x58
[ 34.956313] __kasan_krealloc+0x118/0x178
[ 34.957254] krealloc_noprof+0x128/0x360
[ 34.957794] krealloc_more_oob_helper+0x168/0x680
[ 34.959110] krealloc_more_oob+0x20/0x38
[ 34.959633] kunit_try_run_case+0x14c/0x3d0
[ 34.960619] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.961591] kthread+0x24c/0x2d0
[ 34.962388] ret_from_fork+0x10/0x20
[ 34.962998]
[ 34.963354] The buggy address belongs to the object at fff00000c47c8400
[ 34.963354] which belongs to the cache kmalloc-256 of size 256
[ 34.965240] The buggy address is located 5 bytes to the right of
[ 34.965240] allocated 235-byte region [fff00000c47c8400, fff00000c47c84eb)
[ 34.967381]
[ 34.967678] The buggy address belongs to the physical page:
[ 34.968887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047c8
[ 34.970144] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 34.971327] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 34.972734] page_type: f5(slab)
[ 34.973212] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 34.974576] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 34.976866] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 34.977855] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 34.979582] head: 0bfffe0000000001 ffffc1ffc311f201 ffffffffffffffff 0000000000000000
[ 34.981032] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 34.982156] page dumped because: kasan: bad access detected
[ 34.983006]
[ 34.983381] Memory state around the buggy address:
[ 34.984570] fff00000c47c8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.985509] fff00000c47c8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 34.986898] >fff00000c47c8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 34.988239] ^
[ 34.989345] fff00000c47c8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.990545] fff00000c47c8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.991823] ==================================================================
Home
[ 34.880876] ==================================================================
[ 34.882040] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[ 34.883357] Write of size 1 at addr fff00000c47c84eb by task kunit_try_catch/144
[ 34.884604]
[ 34.885375] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.886680] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.887883] Hardware name: linux,dummy-virt (DT)
[ 34.888444] Call trace:
[ 34.889183] show_stack+0x20/0x38 (C)
[ 34.890051] dump_stack_lvl+0x8c/0xd0
[ 34.890981] print_report+0x118/0x5e0
[ 34.891456] kasan_report+0xc8/0x118
[ 34.892309] __asan_report_store1_noabort+0x20/0x30
[ 34.893010] krealloc_more_oob_helper+0x614/0x680
[ 34.893979] krealloc_more_oob+0x20/0x38
[ 34.894583] kunit_try_run_case+0x14c/0x3d0
[ 34.895303] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.896124] kthread+0x24c/0x2d0
[ 34.897007] ret_from_fork+0x10/0x20
[ 34.897730]
[ 34.898028] Allocated by task 144:
[ 34.899160] kasan_save_stack+0x3c/0x68
[ 34.899875] kasan_save_track+0x20/0x40
[ 34.900392] kasan_save_alloc_info+0x40/0x58
[ 34.901059] __kasan_krealloc+0x118/0x178
[ 34.901633] krealloc_noprof+0x128/0x360
[ 34.902288] krealloc_more_oob_helper+0x168/0x680
[ 34.903167] krealloc_more_oob+0x20/0x38
[ 34.903825] kunit_try_run_case+0x14c/0x3d0
[ 34.904422] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.906553] kthread+0x24c/0x2d0
[ 34.907082] ret_from_fork+0x10/0x20
[ 34.907798]
[ 34.908143] The buggy address belongs to the object at fff00000c47c8400
[ 34.908143] which belongs to the cache kmalloc-256 of size 256
[ 34.910398] The buggy address is located 0 bytes to the right of
[ 34.910398] allocated 235-byte region [fff00000c47c8400, fff00000c47c84eb)
[ 34.912463]
[ 34.912931] The buggy address belongs to the physical page:
[ 34.914095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047c8
[ 34.915673] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 34.916450] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 34.917209] page_type: f5(slab)
[ 34.917721] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 34.918872] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 34.920232] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 34.921154] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 34.922121] head: 0bfffe0000000001 ffffc1ffc311f201 ffffffffffffffff 0000000000000000
[ 34.923786] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 34.925142] page dumped because: kasan: bad access detected
[ 34.926277]
[ 34.926586] Memory state around the buggy address:
[ 34.928503] fff00000c47c8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.929693] fff00000c47c8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 34.930548] >fff00000c47c8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 34.932080] ^
[ 34.932665] fff00000c47c8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.933293] fff00000c47c8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.934189] ==================================================================
Home
[ 35.318369] ==================================================================
[ 35.320385] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[ 35.321111] Write of size 1 at addr fff00000c68a60eb by task kunit_try_catch/148
[ 35.321772]
[ 35.322158] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.324861] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.325663] Hardware name: linux,dummy-virt (DT)
[ 35.326538] Call trace:
[ 35.327373] show_stack+0x20/0x38 (C)
[ 35.328077] dump_stack_lvl+0x8c/0xd0
[ 35.328835] print_report+0x118/0x5e0
[ 35.330055] kasan_report+0xc8/0x118
[ 35.331621] __asan_report_store1_noabort+0x20/0x30
[ 35.332543] krealloc_more_oob_helper+0x614/0x680
[ 35.333352] krealloc_large_more_oob+0x20/0x38
[ 35.334287] kunit_try_run_case+0x14c/0x3d0
[ 35.335336] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.337349] kthread+0x24c/0x2d0
[ 35.338699] ret_from_fork+0x10/0x20
[ 35.339669]
[ 35.340378] The buggy address belongs to the physical page:
[ 35.341717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068a4
[ 35.342760] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.343831] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.344557] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.345598] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.346350] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 35.348281] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 35.349047] head: 0bfffe0000000002 ffffc1ffc31a2901 ffffffffffffffff 0000000000000000
[ 35.349591] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 35.350760] page dumped because: kasan: bad access detected
[ 35.351856]
[ 35.352301] Memory state around the buggy address:
[ 35.353175] fff00000c68a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.355439] fff00000c68a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 35.356124] >fff00000c68a6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[ 35.356991] ^
[ 35.358310] fff00000c68a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.359768] fff00000c68a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 35.360561] ==================================================================
Home
[ 36.704725] ==================================================================
[ 36.706221] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[ 36.707756] Read of size 1 at addr fff00000c61bc473 by task kunit_try_catch/182
[ 36.708980]
[ 36.709464] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.710865] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.711429] Hardware name: linux,dummy-virt (DT)
[ 36.712392] Call trace:
[ 36.712896] show_stack+0x20/0x38 (C)
[ 36.713832] dump_stack_lvl+0x8c/0xd0
[ 36.714418] print_report+0x118/0x5e0
[ 36.714991] kasan_report+0xc8/0x118
[ 36.715662] __asan_report_load1_noabort+0x20/0x30
[ 36.716572] ksize_unpoisons_memory+0x638/0x750
[ 36.717042] kunit_try_run_case+0x14c/0x3d0
[ 36.717375] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.718165] kthread+0x24c/0x2d0
[ 36.719697] ret_from_fork+0x10/0x20
[ 36.720468]
[ 36.720804] Allocated by task 182:
[ 36.721538] kasan_save_stack+0x3c/0x68
[ 36.722025] kasan_save_track+0x20/0x40
[ 36.723231] kasan_save_alloc_info+0x40/0x58
[ 36.723885] __kasan_kmalloc+0xd4/0xd8
[ 36.724597] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.725139] ksize_unpoisons_memory+0xc0/0x750
[ 36.725888] kunit_try_run_case+0x14c/0x3d0
[ 36.726548] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.728310] kthread+0x24c/0x2d0
[ 36.729369] ret_from_fork+0x10/0x20
[ 36.730386]
[ 36.730828] The buggy address belongs to the object at fff00000c61bc400
[ 36.730828] which belongs to the cache kmalloc-128 of size 128
[ 36.733463] The buggy address is located 0 bytes to the right of
[ 36.733463] allocated 115-byte region [fff00000c61bc400, fff00000c61bc473)
[ 36.734988]
[ 36.735349] The buggy address belongs to the physical page:
[ 36.735964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[ 36.737095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.738045] page_type: f5(slab)
[ 36.738512] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 36.739496] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 36.740557] page dumped because: kasan: bad access detected
[ 36.741254]
[ 36.741651] Memory state around the buggy address:
[ 36.742288] fff00000c61bc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 36.743191] fff00000c61bc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.744114] >fff00000c61bc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 36.744956] ^
[ 36.745841] fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.746847] fff00000c61bc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.747763] ==================================================================
Home
[ 36.796616] ==================================================================
[ 36.797475] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[ 36.799022] Read of size 1 at addr fff00000c61bc47f by task kunit_try_catch/182
[ 36.800091]
[ 36.800488] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.801885] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.802685] Hardware name: linux,dummy-virt (DT)
[ 36.803364] Call trace:
[ 36.803947] show_stack+0x20/0x38 (C)
[ 36.804702] dump_stack_lvl+0x8c/0xd0
[ 36.805470] print_report+0x118/0x5e0
[ 36.806255] kasan_report+0xc8/0x118
[ 36.806927] __asan_report_load1_noabort+0x20/0x30
[ 36.807630] ksize_unpoisons_memory+0x6a0/0x750
[ 36.808454] kunit_try_run_case+0x14c/0x3d0
[ 36.809270] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.810203] kthread+0x24c/0x2d0
[ 36.810972] ret_from_fork+0x10/0x20
[ 36.811792]
[ 36.812147] Allocated by task 182:
[ 36.812633] kasan_save_stack+0x3c/0x68
[ 36.813226] kasan_save_track+0x20/0x40
[ 36.814327] kasan_save_alloc_info+0x40/0x58
[ 36.815030] __kasan_kmalloc+0xd4/0xd8
[ 36.815686] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.816182] ksize_unpoisons_memory+0xc0/0x750
[ 36.816916] kunit_try_run_case+0x14c/0x3d0
[ 36.817814] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.818404] kthread+0x24c/0x2d0
[ 36.819078] ret_from_fork+0x10/0x20
[ 36.819645]
[ 36.819941] The buggy address belongs to the object at fff00000c61bc400
[ 36.819941] which belongs to the cache kmalloc-128 of size 128
[ 36.821399] The buggy address is located 12 bytes to the right of
[ 36.821399] allocated 115-byte region [fff00000c61bc400, fff00000c61bc473)
[ 36.823064]
[ 36.823390] The buggy address belongs to the physical page:
[ 36.824032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[ 36.825139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.826097] page_type: f5(slab)
[ 36.826712] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 36.827620] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 36.828487] page dumped because: kasan: bad access detected
[ 36.829614]
[ 36.829904] Memory state around the buggy address:
[ 36.830470] fff00000c61bc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.832508] fff00000c61bc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.833240] >fff00000c61bc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 36.834428] ^
[ 36.835358] fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.836440] fff00000c61bc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.837267] ==================================================================
Home
[ 36.750031] ==================================================================
[ 36.750820] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[ 36.753400] Read of size 1 at addr fff00000c61bc478 by task kunit_try_catch/182
[ 36.755649]
[ 36.756452] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.757481] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.757817] Hardware name: linux,dummy-virt (DT)
[ 36.758125] Call trace:
[ 36.758336] show_stack+0x20/0x38 (C)
[ 36.758783] dump_stack_lvl+0x8c/0xd0
[ 36.759337] print_report+0x118/0x5e0
[ 36.760039] kasan_report+0xc8/0x118
[ 36.761078] __asan_report_load1_noabort+0x20/0x30
[ 36.762061] ksize_unpoisons_memory+0x628/0x750
[ 36.762761] kunit_try_run_case+0x14c/0x3d0
[ 36.763585] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.764439] kthread+0x24c/0x2d0
[ 36.765157] ret_from_fork+0x10/0x20
[ 36.765828]
[ 36.766195] Allocated by task 182:
[ 36.766817] kasan_save_stack+0x3c/0x68
[ 36.767632] kasan_save_track+0x20/0x40
[ 36.768311] kasan_save_alloc_info+0x40/0x58
[ 36.769004] __kasan_kmalloc+0xd4/0xd8
[ 36.769656] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.770282] ksize_unpoisons_memory+0xc0/0x750
[ 36.771094] kunit_try_run_case+0x14c/0x3d0
[ 36.771819] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.772793] kthread+0x24c/0x2d0
[ 36.773296] ret_from_fork+0x10/0x20
[ 36.774016]
[ 36.774498] The buggy address belongs to the object at fff00000c61bc400
[ 36.774498] which belongs to the cache kmalloc-128 of size 128
[ 36.776175] The buggy address is located 5 bytes to the right of
[ 36.776175] allocated 115-byte region [fff00000c61bc400, fff00000c61bc473)
[ 36.777939]
[ 36.778400] The buggy address belongs to the physical page:
[ 36.779227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[ 36.780303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.781228] page_type: f5(slab)
[ 36.781747] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 36.782841] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 36.783851] page dumped because: kasan: bad access detected
[ 36.784679]
[ 36.785126] Memory state around the buggy address:
[ 36.785903] fff00000c61bc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[ 36.786916] fff00000c61bc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.787909] >fff00000c61bc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 36.788867] ^
[ 36.789887] fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.790821] fff00000c61bc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.791843] ==================================================================
Home
[ 39.292342] ==================================================================
[ 39.294076] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[ 39.295105] Read of size 1 at addr fff00000c69eb218 by task kunit_try_catch/243
[ 39.296131]
[ 39.297621] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.299903] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.300448] Hardware name: linux,dummy-virt (DT)
[ 39.301059] Call trace:
[ 39.301298] show_stack+0x20/0x38 (C)
[ 39.301947] dump_stack_lvl+0x8c/0xd0
[ 39.303174] print_report+0x118/0x5e0
[ 39.304030] kasan_report+0xc8/0x118
[ 39.304898] __asan_report_load1_noabort+0x20/0x30
[ 39.305728] memchr+0x78/0x88
[ 39.306680] kasan_memchr+0x148/0x2d8
[ 39.307425] kunit_try_run_case+0x14c/0x3d0
[ 39.308100] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.309624] kthread+0x24c/0x2d0
[ 39.310800] ret_from_fork+0x10/0x20
[ 39.311634]
[ 39.312066] Allocated by task 243:
[ 39.312980] kasan_save_stack+0x3c/0x68
[ 39.313813] kasan_save_track+0x20/0x40
[ 39.314405] kasan_save_alloc_info+0x40/0x58
[ 39.315652] __kasan_kmalloc+0xd4/0xd8
[ 39.317110] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.318023] kasan_memchr+0xb0/0x2d8
[ 39.318551] kunit_try_run_case+0x14c/0x3d0
[ 39.319625] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.320736] kthread+0x24c/0x2d0
[ 39.321504] ret_from_fork+0x10/0x20
[ 39.322079]
[ 39.322386] The buggy address belongs to the object at fff00000c69eb200
[ 39.322386] which belongs to the cache kmalloc-32 of size 32
[ 39.324228] The buggy address is located 0 bytes to the right of
[ 39.324228] allocated 24-byte region [fff00000c69eb200, fff00000c69eb218)
[ 39.326502]
[ 39.327357] The buggy address belongs to the physical page:
[ 39.328140] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[ 39.329036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.329502] page_type: f5(slab)
[ 39.330323] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 39.332097] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 39.333546] page dumped because: kasan: bad access detected
[ 39.334291]
[ 39.334659] Memory state around the buggy address:
[ 39.335463] fff00000c69eb100: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 39.337286] fff00000c69eb180: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 39.338397] >fff00000c69eb200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.339732] ^
[ 39.340636] fff00000c69eb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.341616] fff00000c69eb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.342711] ==================================================================
Home
[ 39.353259] ==================================================================
[ 39.355641] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[ 39.357110] Read of size 1 at addr fff00000c69eb358 by task kunit_try_catch/245
[ 39.358832]
[ 39.360192] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.361277] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.362001] Hardware name: linux,dummy-virt (DT)
[ 39.362589] Call trace:
[ 39.363074] show_stack+0x20/0x38 (C)
[ 39.363940] dump_stack_lvl+0x8c/0xd0
[ 39.364722] print_report+0x118/0x5e0
[ 39.365220] kasan_report+0xc8/0x118
[ 39.366087] __asan_report_load1_noabort+0x20/0x30
[ 39.367160] memcmp+0x198/0x1d8
[ 39.367682] kasan_memcmp+0x16c/0x300
[ 39.368256] kunit_try_run_case+0x14c/0x3d0
[ 39.368892] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.369694] kthread+0x24c/0x2d0
[ 39.370311] ret_from_fork+0x10/0x20
[ 39.371406]
[ 39.371774] Allocated by task 245:
[ 39.372249] kasan_save_stack+0x3c/0x68
[ 39.372984] kasan_save_track+0x20/0x40
[ 39.373614] kasan_save_alloc_info+0x40/0x58
[ 39.374333] __kasan_kmalloc+0xd4/0xd8
[ 39.375931] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.376713] kasan_memcmp+0xbc/0x300
[ 39.377227] kunit_try_run_case+0x14c/0x3d0
[ 39.378063] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.379239] kthread+0x24c/0x2d0
[ 39.380154] ret_from_fork+0x10/0x20
[ 39.380892]
[ 39.381196] The buggy address belongs to the object at fff00000c69eb340
[ 39.381196] which belongs to the cache kmalloc-32 of size 32
[ 39.382818] The buggy address is located 0 bytes to the right of
[ 39.382818] allocated 24-byte region [fff00000c69eb340, fff00000c69eb358)
[ 39.384905]
[ 39.385432] The buggy address belongs to the physical page:
[ 39.386560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[ 39.388039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.389020] page_type: f5(slab)
[ 39.389572] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 39.390506] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 39.391977] page dumped because: kasan: bad access detected
[ 39.392915]
[ 39.393247] Memory state around the buggy address:
[ 39.393992] fff00000c69eb200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 39.395071] fff00000c69eb280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 39.396022] >fff00000c69eb300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 39.397275] ^
[ 39.398170] fff00000c69eb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.398906] fff00000c69eb400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.400359] ==================================================================
Home
[ 38.460038] ==================================================================
[ 38.461733] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[ 38.462785] Read of size 1 at addr fff00000c699f2bb by task kunit_try_catch/213
[ 38.465438]
[ 38.465777] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.467369] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.468268] Hardware name: linux,dummy-virt (DT)
[ 38.469133] Call trace:
[ 38.469651] show_stack+0x20/0x38 (C)
[ 38.470141] dump_stack_lvl+0x8c/0xd0
[ 38.472411] print_report+0x118/0x5e0
[ 38.473339] kasan_report+0xc8/0x118
[ 38.473829] __asan_report_load1_noabort+0x20/0x30
[ 38.474897] mempool_oob_right_helper+0x2ac/0x2f0
[ 38.476082] mempool_slab_oob_right+0xb8/0x110
[ 38.477513] kunit_try_run_case+0x14c/0x3d0
[ 38.478584] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.479682] kthread+0x24c/0x2d0
[ 38.480245] ret_from_fork+0x10/0x20
[ 38.481555]
[ 38.481883] Allocated by task 213:
[ 38.482267] kasan_save_stack+0x3c/0x68
[ 38.482739] kasan_save_track+0x20/0x40
[ 38.484442] kasan_save_alloc_info+0x40/0x58
[ 38.485210] __kasan_mempool_unpoison_object+0xbc/0x180
[ 38.486130] remove_element+0x16c/0x1f8
[ 38.486939] mempool_alloc_preallocated+0x58/0xc0
[ 38.487946] mempool_oob_right_helper+0x98/0x2f0
[ 38.488912] mempool_slab_oob_right+0xb8/0x110
[ 38.489901] kunit_try_run_case+0x14c/0x3d0
[ 38.490650] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.492340] kthread+0x24c/0x2d0
[ 38.492970] ret_from_fork+0x10/0x20
[ 38.494230]
[ 38.495172] The buggy address belongs to the object at fff00000c699f240
[ 38.495172] which belongs to the cache test_cache of size 123
[ 38.497161] The buggy address is located 0 bytes to the right of
[ 38.497161] allocated 123-byte region [fff00000c699f240, fff00000c699f2bb)
[ 38.498927]
[ 38.499705] The buggy address belongs to the physical page:
[ 38.500398] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10699f
[ 38.501976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 38.503190] page_type: f5(slab)
[ 38.503741] raw: 0bfffe0000000000 fff00000c17638c0 dead000000000122 0000000000000000
[ 38.505560] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[ 38.506709] page dumped because: kasan: bad access detected
[ 38.507612]
[ 38.508546] Memory state around the buggy address:
[ 38.509088] fff00000c699f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 38.510161] fff00000c699f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[ 38.511563] >fff00000c699f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[ 38.512444] ^
[ 38.513316] fff00000c699f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.514199] fff00000c699f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.515352] ==================================================================
Home
[ 38.404422] ==================================================================
[ 38.406066] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[ 38.407661] Read of size 1 at addr fff00000c6a26001 by task kunit_try_catch/211
[ 38.408354]
[ 38.408801] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.409794] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.410284] Hardware name: linux,dummy-virt (DT)
[ 38.411077] Call trace:
[ 38.411578] show_stack+0x20/0x38 (C)
[ 38.412284] dump_stack_lvl+0x8c/0xd0
[ 38.413011] print_report+0x118/0x5e0
[ 38.413648] kasan_report+0xc8/0x118
[ 38.414254] __asan_report_load1_noabort+0x20/0x30
[ 38.416329] mempool_oob_right_helper+0x2ac/0x2f0
[ 38.417070] mempool_kmalloc_large_oob_right+0xbc/0x118
[ 38.417949] kunit_try_run_case+0x14c/0x3d0
[ 38.418968] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.420405] kthread+0x24c/0x2d0
[ 38.421252] ret_from_fork+0x10/0x20
[ 38.421906]
[ 38.422587] The buggy address belongs to the physical page:
[ 38.424944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a24
[ 38.426011] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 38.427085] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 38.428676] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 38.429843] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 38.431945] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 38.433091] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 38.434009] head: 0bfffe0000000002 ffffc1ffc31a8901 ffffffffffffffff 0000000000000000
[ 38.435257] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 38.436131] page dumped because: kasan: bad access detected
[ 38.436935]
[ 38.437262] Memory state around the buggy address:
[ 38.437859] fff00000c6a25f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 38.439622] fff00000c6a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 38.440721] >fff00000c6a26000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 38.442055] ^
[ 38.442436] fff00000c6a26080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 38.444136] fff00000c6a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 38.445127] ==================================================================
Home
[ 38.343431] ==================================================================
[ 38.344882] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[ 38.345915] Read of size 1 at addr fff00000c6196673 by task kunit_try_catch/209
[ 38.346660]
[ 38.347188] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.348367] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.349476] Hardware name: linux,dummy-virt (DT)
[ 38.350175] Call trace:
[ 38.350656] show_stack+0x20/0x38 (C)
[ 38.351672] dump_stack_lvl+0x8c/0xd0
[ 38.352181] print_report+0x118/0x5e0
[ 38.352923] kasan_report+0xc8/0x118
[ 38.353487] __asan_report_load1_noabort+0x20/0x30
[ 38.354146] mempool_oob_right_helper+0x2ac/0x2f0
[ 38.355308] mempool_kmalloc_oob_right+0xbc/0x118
[ 38.355979] kunit_try_run_case+0x14c/0x3d0
[ 38.356635] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.357476] kthread+0x24c/0x2d0
[ 38.358152] ret_from_fork+0x10/0x20
[ 38.358705]
[ 38.359562] Allocated by task 209:
[ 38.360117] kasan_save_stack+0x3c/0x68
[ 38.360809] kasan_save_track+0x20/0x40
[ 38.361890] kasan_save_alloc_info+0x40/0x58
[ 38.362683] __kasan_mempool_unpoison_object+0x11c/0x180
[ 38.364291] remove_element+0x130/0x1f8
[ 38.364927] mempool_alloc_preallocated+0x58/0xc0
[ 38.365682] mempool_oob_right_helper+0x98/0x2f0
[ 38.366330] mempool_kmalloc_oob_right+0xbc/0x118
[ 38.367452] kunit_try_run_case+0x14c/0x3d0
[ 38.368294] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.369092] kthread+0x24c/0x2d0
[ 38.369766] ret_from_fork+0x10/0x20
[ 38.370609]
[ 38.371166] The buggy address belongs to the object at fff00000c6196600
[ 38.371166] which belongs to the cache kmalloc-128 of size 128
[ 38.372659] The buggy address is located 0 bytes to the right of
[ 38.372659] allocated 115-byte region [fff00000c6196600, fff00000c6196673)
[ 38.373732]
[ 38.374219] The buggy address belongs to the physical page:
[ 38.375391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106196
[ 38.376154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 38.376798] page_type: f5(slab)
[ 38.377538] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 38.378567] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 38.380059] page dumped because: kasan: bad access detected
[ 38.380963]
[ 38.381220] Memory state around the buggy address:
[ 38.382071] fff00000c6196500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 38.382802] fff00000c6196580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.384447] >fff00000c6196600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 38.385491] ^
[ 38.387546] fff00000c6196680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.388591] fff00000c6196700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[ 38.389433] ==================================================================
Home
[ 44.060138] ==================================================================
[ 44.061030] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[ 44.061976] Write of size 1 at addr fff00000c69d2d78 by task kunit_try_catch/273
[ 44.063224]
[ 44.063667] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 44.065069] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 44.065956] Hardware name: linux,dummy-virt (DT)
[ 44.066812] Call trace:
[ 44.067320] show_stack+0x20/0x38 (C)
[ 44.068109] dump_stack_lvl+0x8c/0xd0
[ 44.068828] print_report+0x118/0x5e0
[ 44.069581] kasan_report+0xc8/0x118
[ 44.070283] __asan_report_store1_noabort+0x20/0x30
[ 44.071137] strncpy_from_user+0x270/0x2a0
[ 44.071908] copy_user_test_oob+0x5c0/0xec0
[ 44.072695] kunit_try_run_case+0x14c/0x3d0
[ 44.073315] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 44.074185] kthread+0x24c/0x2d0
[ 44.074858] ret_from_fork+0x10/0x20
[ 44.075775]
[ 44.076258] Allocated by task 273:
[ 44.076829] kasan_save_stack+0x3c/0x68
[ 44.077595] kasan_save_track+0x20/0x40
[ 44.078306] kasan_save_alloc_info+0x40/0x58
[ 44.079020] __kasan_kmalloc+0xd4/0xd8
[ 44.079902] __kmalloc_noprof+0x188/0x4c8
[ 44.080720] kunit_kmalloc_array+0x34/0x88
[ 44.081433] copy_user_test_oob+0xac/0xec0
[ 44.082150] kunit_try_run_case+0x14c/0x3d0
[ 44.083013] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 44.083797] kthread+0x24c/0x2d0
[ 44.084430] ret_from_fork+0x10/0x20
[ 44.085100]
[ 44.085500] The buggy address belongs to the object at fff00000c69d2d00
[ 44.085500] which belongs to the cache kmalloc-128 of size 128
[ 44.087105] The buggy address is located 0 bytes to the right of
[ 44.087105] allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[ 44.088877]
[ 44.089345] The buggy address belongs to the physical page:
[ 44.090199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[ 44.091238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 44.092113] page_type: f5(slab)
[ 44.092779] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 44.093829] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 44.094876] page dumped because: kasan: bad access detected
[ 44.095736]
[ 44.096236] Memory state around the buggy address:
[ 44.097029] fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 44.098126] fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.099116] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 44.100114] ^
[ 44.101063] fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.102066] fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.103024] ==================================================================
Home
[ 44.013872] ==================================================================
[ 44.015055] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[ 44.015504] Write of size 121 at addr fff00000c69d2d00 by task kunit_try_catch/273
[ 44.016325]
[ 44.016921] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 44.018399] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 44.019147] Hardware name: linux,dummy-virt (DT)
[ 44.020063] Call trace:
[ 44.020712] show_stack+0x20/0x38 (C)
[ 44.021439] dump_stack_lvl+0x8c/0xd0
[ 44.022206] print_report+0x118/0x5e0
[ 44.022995] kasan_report+0xc8/0x118
[ 44.023571] kasan_check_range+0x100/0x1a8
[ 44.024236] __kasan_check_write+0x20/0x30
[ 44.024957] strncpy_from_user+0x3c/0x2a0
[ 44.025727] copy_user_test_oob+0x5c0/0xec0
[ 44.026437] kunit_try_run_case+0x14c/0x3d0
[ 44.027189] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 44.028008] kthread+0x24c/0x2d0
[ 44.028628] ret_from_fork+0x10/0x20
[ 44.029395]
[ 44.029755] Allocated by task 273:
[ 44.030431] kasan_save_stack+0x3c/0x68
[ 44.031156] kasan_save_track+0x20/0x40
[ 44.031951] kasan_save_alloc_info+0x40/0x58
[ 44.032654] __kasan_kmalloc+0xd4/0xd8
[ 44.033307] __kmalloc_noprof+0x188/0x4c8
[ 44.033981] kunit_kmalloc_array+0x34/0x88
[ 44.034792] copy_user_test_oob+0xac/0xec0
[ 44.035470] kunit_try_run_case+0x14c/0x3d0
[ 44.036310] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 44.037161] kthread+0x24c/0x2d0
[ 44.037847] ret_from_fork+0x10/0x20
[ 44.038470]
[ 44.038908] The buggy address belongs to the object at fff00000c69d2d00
[ 44.038908] which belongs to the cache kmalloc-128 of size 128
[ 44.040543] The buggy address is located 0 bytes inside of
[ 44.040543] allocated 120-byte region [fff00000c69d2d00, fff00000c69d2d78)
[ 44.042266]
[ 44.042760] The buggy address belongs to the physical page:
[ 44.043534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d2
[ 44.044709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 44.045666] page_type: f5(slab)
[ 44.046202] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 44.047325] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 44.048387] page dumped because: kasan: bad access detected
[ 44.049237]
[ 44.049683] Memory state around the buggy address:
[ 44.050544] fff00000c69d2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 44.051703] fff00000c69d2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.052774] >fff00000c69d2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 44.053847] ^
[ 44.054739] fff00000c69d2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.055692] fff00000c69d2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 44.056468] ==================================================================
Home
[ 39.588179] ==================================================================
[ 39.589160] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8
[ 39.590019] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[ 39.592588]
[ 39.593266] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.594640] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.595442] Hardware name: linux,dummy-virt (DT)
[ 39.596691] Call trace:
[ 39.597503] show_stack+0x20/0x38 (C)
[ 39.598354] dump_stack_lvl+0x8c/0xd0
[ 39.599112] print_report+0x118/0x5e0
[ 39.600043] kasan_report+0xc8/0x118
[ 39.601453] __asan_report_load1_noabort+0x20/0x30
[ 39.602262] kasan_strings+0x858/0x8f8
[ 39.603059] kunit_try_run_case+0x14c/0x3d0
[ 39.603802] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.604940] kthread+0x24c/0x2d0
[ 39.605589] ret_from_fork+0x10/0x20
[ 39.606316]
[ 39.607380] Allocated by task 247:
[ 39.608183] kasan_save_stack+0x3c/0x68
[ 39.608694] kasan_save_track+0x20/0x40
[ 39.609787] kasan_save_alloc_info+0x40/0x58
[ 39.610761] __kasan_kmalloc+0xd4/0xd8
[ 39.611405] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.612606] kasan_strings+0xb4/0x8f8
[ 39.613027] kunit_try_run_case+0x14c/0x3d0
[ 39.613579] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.614300] kthread+0x24c/0x2d0
[ 39.615855] ret_from_fork+0x10/0x20
[ 39.616671]
[ 39.617057] Freed by task 247:
[ 39.617684] kasan_save_stack+0x3c/0x68
[ 39.618346] kasan_save_track+0x20/0x40
[ 39.619250] kasan_save_free_info+0x4c/0x78
[ 39.620402] __kasan_slab_free+0x6c/0x98
[ 39.621258] kfree+0x114/0x3c8
[ 39.622082] kasan_strings+0x128/0x8f8
[ 39.623269] kunit_try_run_case+0x14c/0x3d0
[ 39.624213] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.625214] kthread+0x24c/0x2d0
[ 39.625710] ret_from_fork+0x10/0x20
[ 39.626331]
[ 39.626694] The buggy address belongs to the object at fff00000c69eb480
[ 39.626694] which belongs to the cache kmalloc-32 of size 32
[ 39.628066] The buggy address is located 16 bytes inside of
[ 39.628066] freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[ 39.630180]
[ 39.630617] The buggy address belongs to the physical page:
[ 39.632878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[ 39.634124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.635202] page_type: f5(slab)
[ 39.636105] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 39.636918] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 39.638107] page dumped because: kasan: bad access detected
[ 39.638940]
[ 39.639794] Memory state around the buggy address:
[ 39.640545] fff00000c69eb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 39.641502] fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 39.642636] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.644005] ^
[ 39.644858] fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.645319] fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.645869] ==================================================================
Home
[ 36.566071] ==================================================================
[ 36.568509] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[ 36.569925] Read of size 1 at addr fff00000c5a8fc00 by task kunit_try_catch/180
[ 36.571794]
[ 36.572220] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.573352] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.574059] Hardware name: linux,dummy-virt (DT)
[ 36.574661] Call trace:
[ 36.575246] show_stack+0x20/0x38 (C)
[ 36.575832] dump_stack_lvl+0x8c/0xd0
[ 36.576706] print_report+0x118/0x5e0
[ 36.577297] kasan_report+0xc8/0x118
[ 36.577987] __kasan_check_byte+0x54/0x70
[ 36.578645] kfree_sensitive+0x30/0xb0
[ 36.579504] kmalloc_double_kzfree+0x168/0x308
[ 36.580396] kunit_try_run_case+0x14c/0x3d0
[ 36.581270] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.582032] kthread+0x24c/0x2d0
[ 36.582688] ret_from_fork+0x10/0x20
[ 36.583324]
[ 36.584252] Allocated by task 180:
[ 36.584714] kasan_save_stack+0x3c/0x68
[ 36.585177] kasan_save_track+0x20/0x40
[ 36.586001] kasan_save_alloc_info+0x40/0x58
[ 36.587738] __kasan_kmalloc+0xd4/0xd8
[ 36.588654] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.589572] kmalloc_double_kzfree+0xb8/0x308
[ 36.590488] kunit_try_run_case+0x14c/0x3d0
[ 36.591495] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.592401] kthread+0x24c/0x2d0
[ 36.593376] ret_from_fork+0x10/0x20
[ 36.594188]
[ 36.594598] Freed by task 180:
[ 36.595461] kasan_save_stack+0x3c/0x68
[ 36.596276] kasan_save_track+0x20/0x40
[ 36.596999] kasan_save_free_info+0x4c/0x78
[ 36.597642] __kasan_slab_free+0x6c/0x98
[ 36.598244] kfree+0x114/0x3c8
[ 36.598722] kfree_sensitive+0x80/0xb0
[ 36.600153] kmalloc_double_kzfree+0x11c/0x308
[ 36.601181] kunit_try_run_case+0x14c/0x3d0
[ 36.601746] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.602850] kthread+0x24c/0x2d0
[ 36.603366] ret_from_fork+0x10/0x20
[ 36.604095]
[ 36.604457] The buggy address belongs to the object at fff00000c5a8fc00
[ 36.604457] which belongs to the cache kmalloc-16 of size 16
[ 36.606475] The buggy address is located 0 bytes inside of
[ 36.606475] freed 16-byte region [fff00000c5a8fc00, fff00000c5a8fc10)
[ 36.608372]
[ 36.609553] The buggy address belongs to the physical page:
[ 36.610453] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8f
[ 36.612093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.612925] page_type: f5(slab)
[ 36.613387] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 36.614767] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 36.616631] page dumped because: kasan: bad access detected
[ 36.617380]
[ 36.617778] Memory state around the buggy address:
[ 36.618438] fff00000c5a8fb00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[ 36.619596] fff00000c5a8fb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 36.620111] >fff00000c5a8fc00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.620554] ^
[ 36.621035] fff00000c5a8fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.622128] fff00000c5a8fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.623595] ==================================================================
Home
[ 35.861122] ==================================================================
[ 35.862752] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[ 35.864546] Read of size 16 at addr fff00000c6114ea0 by task kunit_try_catch/156
[ 35.865386]
[ 35.865812] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.867404] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.868284] Hardware name: linux,dummy-virt (DT)
[ 35.868952] Call trace:
[ 35.869466] show_stack+0x20/0x38 (C)
[ 35.870033] dump_stack_lvl+0x8c/0xd0
[ 35.870650] print_report+0x118/0x5e0
[ 35.871378] kasan_report+0xc8/0x118
[ 35.871867] __asan_report_load16_noabort+0x20/0x30
[ 35.872635] kmalloc_uaf_16+0x3bc/0x438
[ 35.873447] kunit_try_run_case+0x14c/0x3d0
[ 35.873957] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.875000] kthread+0x24c/0x2d0
[ 35.875541] ret_from_fork+0x10/0x20
[ 35.876211]
[ 35.876713] Allocated by task 156:
[ 35.877435] kasan_save_stack+0x3c/0x68
[ 35.878386] kasan_save_track+0x20/0x40
[ 35.878977] kasan_save_alloc_info+0x40/0x58
[ 35.879505] __kasan_kmalloc+0xd4/0xd8
[ 35.880043] __kmalloc_cache_noprof+0x15c/0x3c0
[ 35.881390] kmalloc_uaf_16+0x140/0x438
[ 35.882383] kunit_try_run_case+0x14c/0x3d0
[ 35.883876] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.884884] kthread+0x24c/0x2d0
[ 35.885381] ret_from_fork+0x10/0x20
[ 35.885963]
[ 35.886277] Freed by task 156:
[ 35.887643] kasan_save_stack+0x3c/0x68
[ 35.888593] kasan_save_track+0x20/0x40
[ 35.889126] kasan_save_free_info+0x4c/0x78
[ 35.889808] __kasan_slab_free+0x6c/0x98
[ 35.890326] kfree+0x114/0x3c8
[ 35.891218] kmalloc_uaf_16+0x190/0x438
[ 35.892346] kunit_try_run_case+0x14c/0x3d0
[ 35.892941] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.893818] kthread+0x24c/0x2d0
[ 35.894450] ret_from_fork+0x10/0x20
[ 35.894953]
[ 35.895566] The buggy address belongs to the object at fff00000c6114ea0
[ 35.895566] which belongs to the cache kmalloc-16 of size 16
[ 35.896978] The buggy address is located 0 bytes inside of
[ 35.896978] freed 16-byte region [fff00000c6114ea0, fff00000c6114eb0)
[ 35.899387]
[ 35.900141] The buggy address belongs to the physical page:
[ 35.901537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 35.903012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 35.904852] page_type: f5(slab)
[ 35.905821] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 35.906696] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 35.908264] page dumped because: kasan: bad access detected
[ 35.908812]
[ 35.909245] Memory state around the buggy address:
[ 35.909979] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 35.911238] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 35.912173] >fff00000c6114e80: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 35.913512] ^
[ 35.914106] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.915133] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.916476] ==================================================================
Home
[ 36.481808] ==================================================================
[ 36.484439] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[ 36.485452] Read of size 1 at addr fff00000c682b728 by task kunit_try_catch/176
[ 36.486509]
[ 36.486976] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.488282] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.489194] Hardware name: linux,dummy-virt (DT)
[ 36.491395] Call trace:
[ 36.492296] show_stack+0x20/0x38 (C)
[ 36.493441] dump_stack_lvl+0x8c/0xd0
[ 36.494223] print_report+0x118/0x5e0
[ 36.495326] kasan_report+0xc8/0x118
[ 36.496356] __asan_report_load1_noabort+0x20/0x30
[ 36.497136] kmalloc_uaf2+0x3f4/0x468
[ 36.497476] kunit_try_run_case+0x14c/0x3d0
[ 36.497993] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.499468] kthread+0x24c/0x2d0
[ 36.500021] ret_from_fork+0x10/0x20
[ 36.500440]
[ 36.500721] Allocated by task 176:
[ 36.501134] kasan_save_stack+0x3c/0x68
[ 36.501657] kasan_save_track+0x20/0x40
[ 36.502109] kasan_save_alloc_info+0x40/0x58
[ 36.504092] __kasan_kmalloc+0xd4/0xd8
[ 36.504726] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.505487] kmalloc_uaf2+0xc4/0x468
[ 36.506207] kunit_try_run_case+0x14c/0x3d0
[ 36.506661] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.508263] kthread+0x24c/0x2d0
[ 36.509252] ret_from_fork+0x10/0x20
[ 36.510374]
[ 36.511701] Freed by task 176:
[ 36.512900] kasan_save_stack+0x3c/0x68
[ 36.513770] kasan_save_track+0x20/0x40
[ 36.514351] kasan_save_free_info+0x4c/0x78
[ 36.515286] __kasan_slab_free+0x6c/0x98
[ 36.516002] kfree+0x114/0x3c8
[ 36.516854] kmalloc_uaf2+0x134/0x468
[ 36.517698] kunit_try_run_case+0x14c/0x3d0
[ 36.518494] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.519790] kthread+0x24c/0x2d0
[ 36.520230] ret_from_fork+0x10/0x20
[ 36.520647]
[ 36.520896] The buggy address belongs to the object at fff00000c682b700
[ 36.520896] which belongs to the cache kmalloc-64 of size 64
[ 36.521702] The buggy address is located 40 bytes inside of
[ 36.521702] freed 64-byte region [fff00000c682b700, fff00000c682b740)
[ 36.522959]
[ 36.523268] The buggy address belongs to the physical page:
[ 36.524416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10682b
[ 36.527050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.528774] page_type: f5(slab)
[ 36.530048] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 36.531309] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 36.532550] page dumped because: kasan: bad access detected
[ 36.533543]
[ 36.534118] Memory state around the buggy address:
[ 36.535007] fff00000c682b600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 36.536823] fff00000c682b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 36.538309] >fff00000c682b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 36.540365] ^
[ 36.541074] fff00000c682b780: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[ 36.542440] fff00000c682b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.543828] ==================================================================
Home
[ 36.339480] ==================================================================
[ 36.340817] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[ 36.341600] Read of size 1 at addr fff00000c6114ec8 by task kunit_try_catch/172
[ 36.342398]
[ 36.342917] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.345602] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.346211] Hardware name: linux,dummy-virt (DT)
[ 36.346781] Call trace:
[ 36.347947] show_stack+0x20/0x38 (C)
[ 36.348602] dump_stack_lvl+0x8c/0xd0
[ 36.349278] print_report+0x118/0x5e0
[ 36.349982] kasan_report+0xc8/0x118
[ 36.351494] __asan_report_load1_noabort+0x20/0x30
[ 36.352184] kmalloc_uaf+0x300/0x338
[ 36.352891] kunit_try_run_case+0x14c/0x3d0
[ 36.353677] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.354615] kthread+0x24c/0x2d0
[ 36.355370] ret_from_fork+0x10/0x20
[ 36.356240]
[ 36.356638] Allocated by task 172:
[ 36.357250] kasan_save_stack+0x3c/0x68
[ 36.357929] kasan_save_track+0x20/0x40
[ 36.358665] kasan_save_alloc_info+0x40/0x58
[ 36.359723] __kasan_kmalloc+0xd4/0xd8
[ 36.361096] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.362056] kmalloc_uaf+0xb8/0x338
[ 36.362536] kunit_try_run_case+0x14c/0x3d0
[ 36.364320] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.365636] kthread+0x24c/0x2d0
[ 36.365933] ret_from_fork+0x10/0x20
[ 36.366208]
[ 36.366378] Freed by task 172:
[ 36.366696] kasan_save_stack+0x3c/0x68
[ 36.367564] kasan_save_track+0x20/0x40
[ 36.368237] kasan_save_free_info+0x4c/0x78
[ 36.368890] __kasan_slab_free+0x6c/0x98
[ 36.369948] kfree+0x114/0x3c8
[ 36.371553] kmalloc_uaf+0x11c/0x338
[ 36.372489] kunit_try_run_case+0x14c/0x3d0
[ 36.373706] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.374360] kthread+0x24c/0x2d0
[ 36.375111] ret_from_fork+0x10/0x20
[ 36.375997]
[ 36.376390] The buggy address belongs to the object at fff00000c6114ec0
[ 36.376390] which belongs to the cache kmalloc-16 of size 16
[ 36.377736] The buggy address is located 8 bytes inside of
[ 36.377736] freed 16-byte region [fff00000c6114ec0, fff00000c6114ed0)
[ 36.379923]
[ 36.380483] The buggy address belongs to the physical page:
[ 36.381355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106114
[ 36.382043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.382664] page_type: f5(slab)
[ 36.383056] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[ 36.384885] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[ 36.386340] page dumped because: kasan: bad access detected
[ 36.386931]
[ 36.387218] Memory state around the buggy address:
[ 36.389464] fff00000c6114d80: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[ 36.391278] fff00000c6114e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 36.393177] >fff00000c6114e80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 36.393893] ^
[ 36.394598] fff00000c6114f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.396687] fff00000c6114f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.398160] ==================================================================
Home
[ 36.408982] ==================================================================
[ 36.409998] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[ 36.411444] Write of size 33 at addr fff00000c682b580 by task kunit_try_catch/174
[ 36.412180]
[ 36.412474] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.413834] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.414675] Hardware name: linux,dummy-virt (DT)
[ 36.415377] Call trace:
[ 36.416105] show_stack+0x20/0x38 (C)
[ 36.416978] dump_stack_lvl+0x8c/0xd0
[ 36.417873] print_report+0x118/0x5e0
[ 36.418744] kasan_report+0xc8/0x118
[ 36.419805] kasan_check_range+0x100/0x1a8
[ 36.420696] __asan_memset+0x34/0x78
[ 36.421498] kmalloc_uaf_memset+0x170/0x310
[ 36.422475] kunit_try_run_case+0x14c/0x3d0
[ 36.423648] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.424969] kthread+0x24c/0x2d0
[ 36.425450] ret_from_fork+0x10/0x20
[ 36.426369]
[ 36.426672] Allocated by task 174:
[ 36.427570] kasan_save_stack+0x3c/0x68
[ 36.428874] kasan_save_track+0x20/0x40
[ 36.429374] kasan_save_alloc_info+0x40/0x58
[ 36.431330] __kasan_kmalloc+0xd4/0xd8
[ 36.432550] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.433582] kmalloc_uaf_memset+0xb8/0x310
[ 36.434637] kunit_try_run_case+0x14c/0x3d0
[ 36.435932] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.437144] kthread+0x24c/0x2d0
[ 36.437881] ret_from_fork+0x10/0x20
[ 36.438621]
[ 36.440371] Freed by task 174:
[ 36.440870] kasan_save_stack+0x3c/0x68
[ 36.441432] kasan_save_track+0x20/0x40
[ 36.442167] kasan_save_free_info+0x4c/0x78
[ 36.442885] __kasan_slab_free+0x6c/0x98
[ 36.443580] kfree+0x114/0x3c8
[ 36.444194] kmalloc_uaf_memset+0x11c/0x310
[ 36.445647] kunit_try_run_case+0x14c/0x3d0
[ 36.446284] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.446997] kthread+0x24c/0x2d0
[ 36.447652] ret_from_fork+0x10/0x20
[ 36.448200]
[ 36.448577] The buggy address belongs to the object at fff00000c682b580
[ 36.448577] which belongs to the cache kmalloc-64 of size 64
[ 36.451095] The buggy address is located 0 bytes inside of
[ 36.451095] freed 64-byte region [fff00000c682b580, fff00000c682b5c0)
[ 36.452992]
[ 36.453337] The buggy address belongs to the physical page:
[ 36.453886] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10682b
[ 36.455374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.456939] page_type: f5(slab)
[ 36.457353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[ 36.459336] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[ 36.461581] page dumped because: kasan: bad access detected
[ 36.463335]
[ 36.463835] Memory state around the buggy address:
[ 36.464300] fff00000c682b480: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[ 36.465999] fff00000c682b500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 36.467077] >fff00000c682b580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 36.468224] ^
[ 36.468599] fff00000c682b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.469024] fff00000c682b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.469467] ==================================================================
Home
[ 37.697245] ==================================================================
[ 37.698581] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[ 37.699477] Read of size 1 at addr fff00000c5a863c0 by task kunit_try_catch/203
[ 37.700436]
[ 37.701193] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 37.702293] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 37.703071] Hardware name: linux,dummy-virt (DT)
[ 37.703701] Call trace:
[ 37.704044] show_stack+0x20/0x38 (C)
[ 37.705774] dump_stack_lvl+0x8c/0xd0
[ 37.706441] print_report+0x118/0x5e0
[ 37.706956] kasan_report+0xc8/0x118
[ 37.708158] __kasan_check_byte+0x54/0x70
[ 37.708998] kmem_cache_destroy+0x34/0x218
[ 37.709712] kmem_cache_double_destroy+0x17c/0x2f8
[ 37.710654] kunit_try_run_case+0x14c/0x3d0
[ 37.711732] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.712350] kthread+0x24c/0x2d0
[ 37.713066] ret_from_fork+0x10/0x20
[ 37.714221]
[ 37.714806] Allocated by task 203:
[ 37.716114] kasan_save_stack+0x3c/0x68
[ 37.716807] kasan_save_track+0x20/0x40
[ 37.717463] kasan_save_alloc_info+0x40/0x58
[ 37.718119] __kasan_slab_alloc+0xa8/0xb0
[ 37.718684] kmem_cache_alloc_noprof+0x108/0x398
[ 37.719813] __kmem_cache_create_args+0x18c/0x2b0
[ 37.721103] kmem_cache_double_destroy+0xc8/0x2f8
[ 37.722002] kunit_try_run_case+0x14c/0x3d0
[ 37.722767] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.723974] kthread+0x24c/0x2d0
[ 37.724364] ret_from_fork+0x10/0x20
[ 37.725355]
[ 37.725947] Freed by task 203:
[ 37.726477] kasan_save_stack+0x3c/0x68
[ 37.727950] kasan_save_track+0x20/0x40
[ 37.728409] kasan_save_free_info+0x4c/0x78
[ 37.729166] __kasan_slab_free+0x6c/0x98
[ 37.730191] kmem_cache_free+0x118/0x470
[ 37.730681] slab_kmem_cache_release+0x38/0x50
[ 37.731168] kmem_cache_release+0x1c/0x30
[ 37.732849] kobject_put+0x17c/0x430
[ 37.733774] sysfs_slab_release+0x1c/0x30
[ 37.734728] kmem_cache_destroy+0x118/0x218
[ 37.735678] kmem_cache_double_destroy+0x130/0x2f8
[ 37.737044] kunit_try_run_case+0x14c/0x3d0
[ 37.738245] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.739970] kthread+0x24c/0x2d0
[ 37.741192] ret_from_fork+0x10/0x20
[ 37.742465]
[ 37.743311] The buggy address belongs to the object at fff00000c5a863c0
[ 37.743311] which belongs to the cache kmem_cache of size 208
[ 37.745431] The buggy address is located 0 bytes inside of
[ 37.745431] freed 208-byte region [fff00000c5a863c0, fff00000c5a86490)
[ 37.747977]
[ 37.748389] The buggy address belongs to the physical page:
[ 37.749684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a86
[ 37.751998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 37.752865] page_type: f5(slab)
[ 37.753363] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[ 37.754418] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[ 37.756032] page dumped because: kasan: bad access detected
[ 37.757351]
[ 37.758136] Memory state around the buggy address:
[ 37.758915] fff00000c5a86280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 37.760452] fff00000c5a86300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 37.761548] >fff00000c5a86380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 37.762506] ^
[ 37.763972] fff00000c5a86400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 37.765001] fff00000c5a86480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.765952] ==================================================================
Home
[ 37.560682] ==================================================================
[ 37.562249] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[ 37.563298] Read of size 1 at addr fff00000c698a000 by task kunit_try_catch/201
[ 37.564253]
[ 37.564653] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 37.565980] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 37.566799] Hardware name: linux,dummy-virt (DT)
[ 37.567385] Call trace:
[ 37.567796] show_stack+0x20/0x38 (C)
[ 37.568570] dump_stack_lvl+0x8c/0xd0
[ 37.569123] print_report+0x118/0x5e0
[ 37.569762] kasan_report+0xc8/0x118
[ 37.570364] __asan_report_load1_noabort+0x20/0x30
[ 37.570995] kmem_cache_rcu_uaf+0x390/0x468
[ 37.571578] kunit_try_run_case+0x14c/0x3d0
[ 37.572333] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.573112] kthread+0x24c/0x2d0
[ 37.573790] ret_from_fork+0x10/0x20
[ 37.574356]
[ 37.574747] Allocated by task 201:
[ 37.575321] kasan_save_stack+0x3c/0x68
[ 37.575897] kasan_save_track+0x20/0x40
[ 37.576447] kasan_save_alloc_info+0x40/0x58
[ 37.577016] __kasan_slab_alloc+0xa8/0xb0
[ 37.577836] kmem_cache_alloc_noprof+0x108/0x398
[ 37.578598] kmem_cache_rcu_uaf+0x12c/0x468
[ 37.579109] kunit_try_run_case+0x14c/0x3d0
[ 37.579802] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.580558] kthread+0x24c/0x2d0
[ 37.581074] ret_from_fork+0x10/0x20
[ 37.581719]
[ 37.582041] Freed by task 0:
[ 37.582612] kasan_save_stack+0x3c/0x68
[ 37.583160] kasan_save_track+0x20/0x40
[ 37.583736] kasan_save_free_info+0x4c/0x78
[ 37.584473] __kasan_slab_free+0x6c/0x98
[ 37.585023] slab_free_after_rcu_debug+0xd4/0x2f8
[ 37.585705] rcu_core+0x9f4/0x1e20
[ 37.586331] rcu_core_si+0x18/0x30
[ 37.586839] handle_softirqs+0x374/0xb20
[ 37.587606] __do_softirq+0x1c/0x28
[ 37.588210]
[ 37.588583] Last potentially related work creation:
[ 37.589077] kasan_save_stack+0x3c/0x68
[ 37.589903] __kasan_record_aux_stack+0xbc/0xe8
[ 37.590430] kasan_record_aux_stack_noalloc+0x14/0x20
[ 37.591330] kmem_cache_free+0x28c/0x470
[ 37.591953] kmem_cache_rcu_uaf+0x16c/0x468
[ 37.592481] kunit_try_run_case+0x14c/0x3d0
[ 37.593224] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.593913] kthread+0x24c/0x2d0
[ 37.594510] ret_from_fork+0x10/0x20
[ 37.594984]
[ 37.595450] The buggy address belongs to the object at fff00000c698a000
[ 37.595450] which belongs to the cache test_cache of size 200
[ 37.597055] The buggy address is located 0 bytes inside of
[ 37.597055] freed 200-byte region [fff00000c698a000, fff00000c698a0c8)
[ 37.598471]
[ 37.598847] The buggy address belongs to the physical page:
[ 37.599702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10698a
[ 37.600559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 37.601468] page_type: f5(slab)
[ 37.601972] raw: 0bfffe0000000000 fff00000ffee0f00 dead000000000122 0000000000000000
[ 37.602870] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[ 37.603755] page dumped because: kasan: bad access detected
[ 37.604387]
[ 37.604766] Memory state around the buggy address:
[ 37.605457] fff00000c6989f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 37.606427] fff00000c6989f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 37.607320] >fff00000c698a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 37.608276] ^
[ 37.608795] fff00000c698a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 37.609725] fff00000c698a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.610640] ==================================================================
Home
[ 35.725759] ==================================================================
[ 35.727582] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[ 35.729579] Read of size 1 at addr fff00000c1dfda00 by task kunit_try_catch/152
[ 35.731400]
[ 35.732159] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.734717] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.735956] Hardware name: linux,dummy-virt (DT)
[ 35.736610] Call trace:
[ 35.737177] show_stack+0x20/0x38 (C)
[ 35.737872] dump_stack_lvl+0x8c/0xd0
[ 35.738480] print_report+0x118/0x5e0
[ 35.740078] kasan_report+0xc8/0x118
[ 35.740867] __asan_report_load1_noabort+0x20/0x30
[ 35.741463] krealloc_uaf+0x4c8/0x520
[ 35.742316] kunit_try_run_case+0x14c/0x3d0
[ 35.743367] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.744681] kthread+0x24c/0x2d0
[ 35.745253] ret_from_fork+0x10/0x20
[ 35.745942]
[ 35.746256] Allocated by task 152:
[ 35.746690] kasan_save_stack+0x3c/0x68
[ 35.748586] kasan_save_track+0x20/0x40
[ 35.749300] kasan_save_alloc_info+0x40/0x58
[ 35.749926] __kasan_kmalloc+0xd4/0xd8
[ 35.750701] __kmalloc_cache_noprof+0x15c/0x3c0
[ 35.751272] krealloc_uaf+0xc8/0x520
[ 35.751916] kunit_try_run_case+0x14c/0x3d0
[ 35.753033] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.754202] kthread+0x24c/0x2d0
[ 35.754725] ret_from_fork+0x10/0x20
[ 35.756182]
[ 35.756446] Freed by task 152:
[ 35.757007] kasan_save_stack+0x3c/0x68
[ 35.757659] kasan_save_track+0x20/0x40
[ 35.758327] kasan_save_free_info+0x4c/0x78
[ 35.759137] __kasan_slab_free+0x6c/0x98
[ 35.759866] kfree+0x114/0x3c8
[ 35.760358] krealloc_uaf+0x12c/0x520
[ 35.760928] kunit_try_run_case+0x14c/0x3d0
[ 35.761962] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.762766] kthread+0x24c/0x2d0
[ 35.763784] ret_from_fork+0x10/0x20
[ 35.764648]
[ 35.764913] The buggy address belongs to the object at fff00000c1dfda00
[ 35.764913] which belongs to the cache kmalloc-256 of size 256
[ 35.767566] The buggy address is located 0 bytes inside of
[ 35.767566] freed 256-byte region [fff00000c1dfda00, fff00000c1dfdb00)
[ 35.769387]
[ 35.769856] The buggy address belongs to the physical page:
[ 35.770613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[ 35.772186] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.773856] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.775578] page_type: f5(slab)
[ 35.775907] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.776350] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.777501] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.778747] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.780589] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[ 35.781341] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 35.782286] page dumped because: kasan: bad access detected
[ 35.782970]
[ 35.783420] Memory state around the buggy address:
[ 35.785010] fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.786247] fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.788562] >fff00000c1dfda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 35.790272] ^
[ 35.790801] fff00000c1dfda80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 35.792576] fff00000c1dfdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.794152] ==================================================================
Home
[ 35.652567] ==================================================================
[ 35.654188] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[ 35.655991] Read of size 1 at addr fff00000c1dfda00 by task kunit_try_catch/152
[ 35.657056]
[ 35.657382] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 35.658630] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 35.659852] Hardware name: linux,dummy-virt (DT)
[ 35.661138] Call trace:
[ 35.661776] show_stack+0x20/0x38 (C)
[ 35.662572] dump_stack_lvl+0x8c/0xd0
[ 35.663811] print_report+0x118/0x5e0
[ 35.664339] kasan_report+0xc8/0x118
[ 35.664991] __kasan_check_byte+0x54/0x70
[ 35.665796] krealloc_noprof+0x44/0x360
[ 35.666349] krealloc_uaf+0x180/0x520
[ 35.667604] kunit_try_run_case+0x14c/0x3d0
[ 35.668611] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.669833] kthread+0x24c/0x2d0
[ 35.671121] ret_from_fork+0x10/0x20
[ 35.671851]
[ 35.672036] Allocated by task 152:
[ 35.672295] kasan_save_stack+0x3c/0x68
[ 35.673618] kasan_save_track+0x20/0x40
[ 35.674462] kasan_save_alloc_info+0x40/0x58
[ 35.675871] __kasan_kmalloc+0xd4/0xd8
[ 35.676499] __kmalloc_cache_noprof+0x15c/0x3c0
[ 35.676924] krealloc_uaf+0xc8/0x520
[ 35.677200] kunit_try_run_case+0x14c/0x3d0
[ 35.678068] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.679620] kthread+0x24c/0x2d0
[ 35.680736] ret_from_fork+0x10/0x20
[ 35.681730]
[ 35.682202] Freed by task 152:
[ 35.682751] kasan_save_stack+0x3c/0x68
[ 35.683802] kasan_save_track+0x20/0x40
[ 35.684635] kasan_save_free_info+0x4c/0x78
[ 35.685081] __kasan_slab_free+0x6c/0x98
[ 35.685761] kfree+0x114/0x3c8
[ 35.686139] krealloc_uaf+0x12c/0x520
[ 35.686674] kunit_try_run_case+0x14c/0x3d0
[ 35.688213] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 35.689019] kthread+0x24c/0x2d0
[ 35.689851] ret_from_fork+0x10/0x20
[ 35.690681]
[ 35.691240] The buggy address belongs to the object at fff00000c1dfda00
[ 35.691240] which belongs to the cache kmalloc-256 of size 256
[ 35.694616] The buggy address is located 0 bytes inside of
[ 35.694616] freed 256-byte region [fff00000c1dfda00, fff00000c1dfdb00)
[ 35.695735]
[ 35.696688] The buggy address belongs to the physical page:
[ 35.697447] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dfc
[ 35.698885] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 35.700317] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 35.701074] page_type: f5(slab)
[ 35.702007] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.703567] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.704684] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[ 35.706679] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 35.708730] head: 0bfffe0000000001 ffffc1ffc3077f01 ffffffffffffffff 0000000000000000
[ 35.709731] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 35.711600] page dumped because: kasan: bad access detected
[ 35.713377]
[ 35.714051] Memory state around the buggy address:
[ 35.714687] fff00000c1dfd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.716395] fff00000c1dfd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.717709] >fff00000c1dfda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 35.719842] ^
[ 35.720602] fff00000c1dfda80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 35.721471] fff00000c1dfdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 35.722286] ==================================================================
Home
[ 36.850149] ==================================================================
[ 36.852590] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[ 36.853550] Read of size 1 at addr fff00000c61bc500 by task kunit_try_catch/184
[ 36.854560]
[ 36.855325] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.856650] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.857402] Hardware name: linux,dummy-virt (DT)
[ 36.858104] Call trace:
[ 36.858572] show_stack+0x20/0x38 (C)
[ 36.859991] dump_stack_lvl+0x8c/0xd0
[ 36.860796] print_report+0x118/0x5e0
[ 36.861633] kasan_report+0xc8/0x118
[ 36.862349] __kasan_check_byte+0x54/0x70
[ 36.863603] ksize+0x30/0x88
[ 36.864629] ksize_uaf+0x168/0x600
[ 36.865295] kunit_try_run_case+0x14c/0x3d0
[ 36.866105] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.867389] kthread+0x24c/0x2d0
[ 36.868668] ret_from_fork+0x10/0x20
[ 36.869361]
[ 36.869693] Allocated by task 184:
[ 36.870500] kasan_save_stack+0x3c/0x68
[ 36.871264] kasan_save_track+0x20/0x40
[ 36.871967] kasan_save_alloc_info+0x40/0x58
[ 36.873122] __kasan_kmalloc+0xd4/0xd8
[ 36.873849] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.874697] ksize_uaf+0xb8/0x600
[ 36.875209] kunit_try_run_case+0x14c/0x3d0
[ 36.875987] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.877983] kthread+0x24c/0x2d0
[ 36.878548] ret_from_fork+0x10/0x20
[ 36.879173]
[ 36.879617] Freed by task 184:
[ 36.880045] kasan_save_stack+0x3c/0x68
[ 36.880603] kasan_save_track+0x20/0x40
[ 36.881326] kasan_save_free_info+0x4c/0x78
[ 36.881910] __kasan_slab_free+0x6c/0x98
[ 36.882585] kfree+0x114/0x3c8
[ 36.883162] ksize_uaf+0x11c/0x600
[ 36.883683] kunit_try_run_case+0x14c/0x3d0
[ 36.884510] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.885242] kthread+0x24c/0x2d0
[ 36.885722] ret_from_fork+0x10/0x20
[ 36.886178]
[ 36.886634] The buggy address belongs to the object at fff00000c61bc500
[ 36.886634] which belongs to the cache kmalloc-128 of size 128
[ 36.887952] The buggy address is located 0 bytes inside of
[ 36.887952] freed 128-byte region [fff00000c61bc500, fff00000c61bc580)
[ 36.889475]
[ 36.889916] The buggy address belongs to the physical page:
[ 36.890795] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[ 36.891789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.892650] page_type: f5(slab)
[ 36.893094] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 36.894053] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 36.895150] page dumped because: kasan: bad access detected
[ 36.895849]
[ 36.896210] Memory state around the buggy address:
[ 36.896916] fff00000c61bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.897823] fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.898736] >fff00000c61bc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.899662] ^
[ 36.900274] fff00000c61bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.901120] fff00000c61bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.902056] ==================================================================
Home
[ 36.904315] ==================================================================
[ 36.905072] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[ 36.906032] Read of size 1 at addr fff00000c61bc500 by task kunit_try_catch/184
[ 36.907218]
[ 36.907608] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.908846] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.909445] Hardware name: linux,dummy-virt (DT)
[ 36.910610] Call trace:
[ 36.911418] show_stack+0x20/0x38 (C)
[ 36.912834] dump_stack_lvl+0x8c/0xd0
[ 36.914192] print_report+0x118/0x5e0
[ 36.914915] kasan_report+0xc8/0x118
[ 36.915465] __asan_report_load1_noabort+0x20/0x30
[ 36.916148] ksize_uaf+0x59c/0x600
[ 36.917209] kunit_try_run_case+0x14c/0x3d0
[ 36.917924] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.918864] kthread+0x24c/0x2d0
[ 36.919405] ret_from_fork+0x10/0x20
[ 36.920063]
[ 36.920421] Allocated by task 184:
[ 36.920986] kasan_save_stack+0x3c/0x68
[ 36.921596] kasan_save_track+0x20/0x40
[ 36.922176] kasan_save_alloc_info+0x40/0x58
[ 36.922817] __kasan_kmalloc+0xd4/0xd8
[ 36.923360] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.924090] ksize_uaf+0xb8/0x600
[ 36.924604] kunit_try_run_case+0x14c/0x3d0
[ 36.925292] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.926174] kthread+0x24c/0x2d0
[ 36.926656] ret_from_fork+0x10/0x20
[ 36.927307]
[ 36.927666] Freed by task 184:
[ 36.928052] kasan_save_stack+0x3c/0x68
[ 36.928781] kasan_save_track+0x20/0x40
[ 36.929379] kasan_save_free_info+0x4c/0x78
[ 36.930080] __kasan_slab_free+0x6c/0x98
[ 36.930754] kfree+0x114/0x3c8
[ 36.931218] ksize_uaf+0x11c/0x600
[ 36.931903] kunit_try_run_case+0x14c/0x3d0
[ 36.932557] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.933325] kthread+0x24c/0x2d0
[ 36.933829] ret_from_fork+0x10/0x20
[ 36.934513]
[ 36.934860] The buggy address belongs to the object at fff00000c61bc500
[ 36.934860] which belongs to the cache kmalloc-128 of size 128
[ 36.936421] The buggy address is located 0 bytes inside of
[ 36.936421] freed 128-byte region [fff00000c61bc500, fff00000c61bc580)
[ 36.937838]
[ 36.938188] The buggy address belongs to the physical page:
[ 36.938921] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[ 36.939950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.940749] page_type: f5(slab)
[ 36.941441] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 36.942392] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 36.943244] page dumped because: kasan: bad access detected
[ 36.943923]
[ 36.944305] Memory state around the buggy address:
[ 36.944985] fff00000c61bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.945922] fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.946873] >fff00000c61bc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.947748] ^
[ 36.948349] fff00000c61bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.949175] fff00000c61bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.950121] ==================================================================
Home
[ 36.954080] ==================================================================
[ 36.955048] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[ 36.955740] Read of size 1 at addr fff00000c61bc578 by task kunit_try_catch/184
[ 36.956451]
[ 36.956881] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 36.958127] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.958728] Hardware name: linux,dummy-virt (DT)
[ 36.959310] Call trace:
[ 36.959901] show_stack+0x20/0x38 (C)
[ 36.960499] dump_stack_lvl+0x8c/0xd0
[ 36.961218] print_report+0x118/0x5e0
[ 36.961886] kasan_report+0xc8/0x118
[ 36.962420] __asan_report_load1_noabort+0x20/0x30
[ 36.963190] ksize_uaf+0x548/0x600
[ 36.963822] kunit_try_run_case+0x14c/0x3d0
[ 36.964561] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.965222] kthread+0x24c/0x2d0
[ 36.965953] ret_from_fork+0x10/0x20
[ 36.966712]
[ 36.966981] Allocated by task 184:
[ 36.967567] kasan_save_stack+0x3c/0x68
[ 36.968114] kasan_save_track+0x20/0x40
[ 36.968720] kasan_save_alloc_info+0x40/0x58
[ 36.969336] __kasan_kmalloc+0xd4/0xd8
[ 36.969959] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.970709] ksize_uaf+0xb8/0x600
[ 36.971301] kunit_try_run_case+0x14c/0x3d0
[ 36.971843] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.972734] kthread+0x24c/0x2d0
[ 36.973216] ret_from_fork+0x10/0x20
[ 36.973842]
[ 36.974147] Freed by task 184:
[ 36.974784] kasan_save_stack+0x3c/0x68
[ 36.975302] kasan_save_track+0x20/0x40
[ 36.976049] kasan_save_free_info+0x4c/0x78
[ 36.976570] __kasan_slab_free+0x6c/0x98
[ 36.977229] kfree+0x114/0x3c8
[ 36.977780] ksize_uaf+0x11c/0x600
[ 36.978363] kunit_try_run_case+0x14c/0x3d0
[ 36.979078] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.979846] kthread+0x24c/0x2d0
[ 36.980314] ret_from_fork+0x10/0x20
[ 36.980784]
[ 36.981217] The buggy address belongs to the object at fff00000c61bc500
[ 36.981217] which belongs to the cache kmalloc-128 of size 128
[ 36.982783] The buggy address is located 120 bytes inside of
[ 36.982783] freed 128-byte region [fff00000c61bc500, fff00000c61bc580)
[ 36.984191]
[ 36.984627] The buggy address belongs to the physical page:
[ 36.985270] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061bc
[ 36.986370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.987307] page_type: f5(slab)
[ 36.987863] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 36.988808] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 36.989727] page dumped because: kasan: bad access detected
[ 36.990497]
[ 36.990901] Memory state around the buggy address:
[ 36.991498] fff00000c61bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.992389] fff00000c61bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.993304] >fff00000c61bc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.994269] ^
[ 36.995165] fff00000c61bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.996194] fff00000c61bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.997168] ==================================================================
Home
[ 38.537321] ==================================================================
[ 38.538973] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[ 38.540541] Read of size 1 at addr fff00000c6196e00 by task kunit_try_catch/215
[ 38.542006]
[ 38.542261] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.543795] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.544789] Hardware name: linux,dummy-virt (DT)
[ 38.545609] Call trace:
[ 38.546180] show_stack+0x20/0x38 (C)
[ 38.547425] dump_stack_lvl+0x8c/0xd0
[ 38.548036] print_report+0x118/0x5e0
[ 38.548447] kasan_report+0xc8/0x118
[ 38.549585] __asan_report_load1_noabort+0x20/0x30
[ 38.550549] mempool_uaf_helper+0x314/0x340
[ 38.551275] mempool_kmalloc_uaf+0xbc/0x118
[ 38.552427] kunit_try_run_case+0x14c/0x3d0
[ 38.553220] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.554171] kthread+0x24c/0x2d0
[ 38.555228] ret_from_fork+0x10/0x20
[ 38.556005]
[ 38.556321] Allocated by task 215:
[ 38.556833] kasan_save_stack+0x3c/0x68
[ 38.557402] kasan_save_track+0x20/0x40
[ 38.557969] kasan_save_alloc_info+0x40/0x58
[ 38.558648] __kasan_mempool_unpoison_object+0x11c/0x180
[ 38.559670] remove_element+0x130/0x1f8
[ 38.560401] mempool_alloc_preallocated+0x58/0xc0
[ 38.561646] mempool_uaf_helper+0xa4/0x340
[ 38.562756] mempool_kmalloc_uaf+0xbc/0x118
[ 38.563453] kunit_try_run_case+0x14c/0x3d0
[ 38.564887] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.565835] kthread+0x24c/0x2d0
[ 38.566595] ret_from_fork+0x10/0x20
[ 38.567586]
[ 38.567982] Freed by task 215:
[ 38.568809] kasan_save_stack+0x3c/0x68
[ 38.569507] kasan_save_track+0x20/0x40
[ 38.570237] kasan_save_free_info+0x4c/0x78
[ 38.571048] __kasan_mempool_poison_object+0xc0/0x150
[ 38.572181] mempool_free+0x28c/0x328
[ 38.573060] mempool_uaf_helper+0x104/0x340
[ 38.573897] mempool_kmalloc_uaf+0xbc/0x118
[ 38.574657] kunit_try_run_case+0x14c/0x3d0
[ 38.575832] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.576729] kthread+0x24c/0x2d0
[ 38.577237] ret_from_fork+0x10/0x20
[ 38.578021]
[ 38.578450] The buggy address belongs to the object at fff00000c6196e00
[ 38.578450] which belongs to the cache kmalloc-128 of size 128
[ 38.580989] The buggy address is located 0 bytes inside of
[ 38.580989] freed 128-byte region [fff00000c6196e00, fff00000c6196e80)
[ 38.582938]
[ 38.583509] The buggy address belongs to the physical page:
[ 38.584184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106196
[ 38.586178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 38.587133] page_type: f5(slab)
[ 38.587698] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[ 38.589295] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[ 38.590381] page dumped because: kasan: bad access detected
[ 38.591220]
[ 38.591969] Memory state around the buggy address:
[ 38.592560] fff00000c6196d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 38.593438] fff00000c6196d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.594346] >fff00000c6196e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 38.595346] ^
[ 38.596355] fff00000c6196e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.597603] fff00000c6196f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 38.598552] ==================================================================
Home
[ 38.669230] ==================================================================
[ 38.670472] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[ 38.671431] Read of size 1 at addr fff00000c6996240 by task kunit_try_catch/219
[ 38.672317]
[ 38.673455] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.674543] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.675809] Hardware name: linux,dummy-virt (DT)
[ 38.676329] Call trace:
[ 38.676971] show_stack+0x20/0x38 (C)
[ 38.677687] dump_stack_lvl+0x8c/0xd0
[ 38.678395] print_report+0x118/0x5e0
[ 38.679687] kasan_report+0xc8/0x118
[ 38.680418] __asan_report_load1_noabort+0x20/0x30
[ 38.681161] mempool_uaf_helper+0x314/0x340
[ 38.681785] mempool_slab_uaf+0xb8/0x110
[ 38.682442] kunit_try_run_case+0x14c/0x3d0
[ 38.683273] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.684298] kthread+0x24c/0x2d0
[ 38.684843] ret_from_fork+0x10/0x20
[ 38.685579]
[ 38.685885] Allocated by task 219:
[ 38.686343] kasan_save_stack+0x3c/0x68
[ 38.687574] kasan_save_track+0x20/0x40
[ 38.688727] kasan_save_alloc_info+0x40/0x58
[ 38.689574] __kasan_mempool_unpoison_object+0xbc/0x180
[ 38.690466] remove_element+0x16c/0x1f8
[ 38.691994] mempool_alloc_preallocated+0x58/0xc0
[ 38.692675] mempool_uaf_helper+0xa4/0x340
[ 38.693173] mempool_slab_uaf+0xb8/0x110
[ 38.693884] kunit_try_run_case+0x14c/0x3d0
[ 38.694416] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.695290] kthread+0x24c/0x2d0
[ 38.695897] ret_from_fork+0x10/0x20
[ 38.696871]
[ 38.697185] Freed by task 219:
[ 38.698571] kasan_save_stack+0x3c/0x68
[ 38.699470] kasan_save_track+0x20/0x40
[ 38.700341] kasan_save_free_info+0x4c/0x78
[ 38.701192] __kasan_mempool_poison_object+0xc0/0x150
[ 38.702052] mempool_free+0x28c/0x328
[ 38.702647] mempool_uaf_helper+0x104/0x340
[ 38.703384] mempool_slab_uaf+0xb8/0x110
[ 38.704352] kunit_try_run_case+0x14c/0x3d0
[ 38.705454] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.706272] kthread+0x24c/0x2d0
[ 38.707226] ret_from_fork+0x10/0x20
[ 38.707763]
[ 38.708242] The buggy address belongs to the object at fff00000c6996240
[ 38.708242] which belongs to the cache test_cache of size 123
[ 38.709863] The buggy address is located 0 bytes inside of
[ 38.709863] freed 123-byte region [fff00000c6996240, fff00000c69962bb)
[ 38.711868]
[ 38.712618] The buggy address belongs to the physical page:
[ 38.713561] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106996
[ 38.714482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 38.715667] page_type: f5(slab)
[ 38.716484] raw: 0bfffe0000000000 fff00000c1763a00 dead000000000122 0000000000000000
[ 38.717915] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[ 38.719224] page dumped because: kasan: bad access detected
[ 38.720488]
[ 38.720871] Memory state around the buggy address:
[ 38.721506] fff00000c6996100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 38.723075] fff00000c6996180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 38.724280] >fff00000c6996200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 38.725106] ^
[ 38.726050] fff00000c6996280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 38.728145] fff00000c6996300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.729187] ==================================================================
Home
[ 37.027477] ==================================================================
[ 37.028717] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[ 37.029865] Read of size 4 at addr fff00000c61a5d00 by task swapper/1/0
[ 37.030566]
[ 37.030916] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.13.0-rc7 #1
[ 37.031808] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 37.032367] Hardware name: linux,dummy-virt (DT)
[ 37.032980] Call trace:
[ 37.033463] show_stack+0x20/0x38 (C)
[ 37.034067] dump_stack_lvl+0x8c/0xd0
[ 37.034700] print_report+0x118/0x5e0
[ 37.035383] kasan_report+0xc8/0x118
[ 37.035948] __asan_report_load4_noabort+0x20/0x30
[ 37.036705] rcu_uaf_reclaim+0x64/0x70
[ 37.037292] rcu_core+0x9f4/0x1e20
[ 37.037852] rcu_core_si+0x18/0x30
[ 37.038474] handle_softirqs+0x374/0xb20
[ 37.039012] __do_softirq+0x1c/0x28
[ 37.039720] ____do_softirq+0x18/0x30
[ 37.040444] call_on_irq_stack+0x24/0x58
[ 37.041300] do_softirq_own_stack+0x24/0x38
[ 37.041992] __irq_exit_rcu+0x1fc/0x318
[ 37.042614] irq_exit_rcu+0x1c/0x80
[ 37.043109] el1_interrupt+0x38/0x58
[ 37.043783] el1h_64_irq_handler+0x18/0x28
[ 37.044415] el1h_64_irq+0x6c/0x70
[ 37.045088] arch_local_irq_enable+0x4/0x8 (P)
[ 37.045764] do_idle+0x384/0x4e8
[ 37.046569] cpu_startup_entry+0x64/0x80
[ 37.047326] secondary_start_kernel+0x288/0x340
[ 37.047962] __secondary_switched+0xc0/0xc8
[ 37.048667]
[ 37.048979] Allocated by task 186:
[ 37.049472] kasan_save_stack+0x3c/0x68
[ 37.050093] kasan_save_track+0x20/0x40
[ 37.050754] kasan_save_alloc_info+0x40/0x58
[ 37.051345] __kasan_kmalloc+0xd4/0xd8
[ 37.051975] __kmalloc_cache_noprof+0x15c/0x3c0
[ 37.052589] rcu_uaf+0xb0/0x2d0
[ 37.053146] kunit_try_run_case+0x14c/0x3d0
[ 37.053827] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.054594] kthread+0x24c/0x2d0
[ 37.055123] ret_from_fork+0x10/0x20
[ 37.055760]
[ 37.056076] Freed by task 0:
[ 37.056635] kasan_save_stack+0x3c/0x68
[ 37.057211] kasan_save_track+0x20/0x40
[ 37.058025] kasan_save_free_info+0x4c/0x78
[ 37.058592] __kasan_slab_free+0x6c/0x98
[ 37.059216] kfree+0x114/0x3c8
[ 37.059891] rcu_uaf_reclaim+0x28/0x70
[ 37.060587] rcu_core+0x9f4/0x1e20
[ 37.061116] rcu_core_si+0x18/0x30
[ 37.061689] handle_softirqs+0x374/0xb20
[ 37.062253] __do_softirq+0x1c/0x28
[ 37.062927]
[ 37.063293] Last potentially related work creation:
[ 37.063992] kasan_save_stack+0x3c/0x68
[ 37.064635] __kasan_record_aux_stack+0xbc/0xe8
[ 37.065293] kasan_record_aux_stack_noalloc+0x14/0x20
[ 37.066090] __call_rcu_common.constprop.0+0x74/0xa10
[ 37.066779] call_rcu+0x18/0x30
[ 37.067243] rcu_uaf+0x14c/0x2d0
[ 37.067927] kunit_try_run_case+0x14c/0x3d0
[ 37.068507] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.069467] kthread+0x24c/0x2d0
[ 37.070065] ret_from_fork+0x10/0x20
[ 37.070841]
[ 37.071239] The buggy address belongs to the object at fff00000c61a5d00
[ 37.071239] which belongs to the cache kmalloc-32 of size 32
[ 37.072654] The buggy address is located 0 bytes inside of
[ 37.072654] freed 32-byte region [fff00000c61a5d00, fff00000c61a5d20)
[ 37.073784]
[ 37.074212] The buggy address belongs to the physical page:
[ 37.075083] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[ 37.076065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 37.077139] page_type: f5(slab)
[ 37.077795] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 37.078651] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 37.079775] page dumped because: kasan: bad access detected
[ 37.080489]
[ 37.080913] Memory state around the buggy address:
[ 37.081662] fff00000c61a5c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 37.082541] fff00000c61a5c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 37.083362] >fff00000c61a5d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.084276] ^
[ 37.084810] fff00000c61a5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.085681] fff00000c61a5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.086642] ==================================================================
Home
[ 39.412963] ==================================================================
[ 39.414060] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[ 39.414930] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[ 39.415980]
[ 39.416444] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.418331] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.419457] Hardware name: linux,dummy-virt (DT)
[ 39.420128] Call trace:
[ 39.420558] show_stack+0x20/0x38 (C)
[ 39.421162] dump_stack_lvl+0x8c/0xd0
[ 39.421808] print_report+0x118/0x5e0
[ 39.422476] kasan_report+0xc8/0x118
[ 39.423044] __asan_report_load1_noabort+0x20/0x30
[ 39.423883] strchr+0xcc/0xd8
[ 39.424427] kasan_strings+0x180/0x8f8
[ 39.425679] kunit_try_run_case+0x14c/0x3d0
[ 39.426286] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.427611] kthread+0x24c/0x2d0
[ 39.428149] ret_from_fork+0x10/0x20
[ 39.428835]
[ 39.429303] Allocated by task 247:
[ 39.429938] kasan_save_stack+0x3c/0x68
[ 39.430463] kasan_save_track+0x20/0x40
[ 39.432583] kasan_save_alloc_info+0x40/0x58
[ 39.433402] __kasan_kmalloc+0xd4/0xd8
[ 39.433933] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.434778] kasan_strings+0xb4/0x8f8
[ 39.435835] kunit_try_run_case+0x14c/0x3d0
[ 39.436387] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.437291] kthread+0x24c/0x2d0
[ 39.438043] ret_from_fork+0x10/0x20
[ 39.438648]
[ 39.439449] Freed by task 247:
[ 39.440300] kasan_save_stack+0x3c/0x68
[ 39.440970] kasan_save_track+0x20/0x40
[ 39.442036] kasan_save_free_info+0x4c/0x78
[ 39.442756] __kasan_slab_free+0x6c/0x98
[ 39.443672] kfree+0x114/0x3c8
[ 39.444177] kasan_strings+0x128/0x8f8
[ 39.444869] kunit_try_run_case+0x14c/0x3d0
[ 39.445447] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.446364] kthread+0x24c/0x2d0
[ 39.447001] ret_from_fork+0x10/0x20
[ 39.448060]
[ 39.448412] The buggy address belongs to the object at fff00000c69eb480
[ 39.448412] which belongs to the cache kmalloc-32 of size 32
[ 39.449860] The buggy address is located 16 bytes inside of
[ 39.449860] freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[ 39.451876]
[ 39.452712] The buggy address belongs to the physical page:
[ 39.453340] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[ 39.455052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.456473] page_type: f5(slab)
[ 39.457182] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 39.458190] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 39.459362] page dumped because: kasan: bad access detected
[ 39.460085]
[ 39.460939] Memory state around the buggy address:
[ 39.461694] fff00000c69eb380: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 39.462626] fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 39.463960] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.464890] ^
[ 39.465609] fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.466502] fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.467959] ==================================================================
Home
[ 39.525779] ==================================================================
[ 39.526652] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[ 39.529785] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[ 39.531114]
[ 39.531552] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.532678] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.533167] Hardware name: linux,dummy-virt (DT)
[ 39.534239] Call trace:
[ 39.534800] show_stack+0x20/0x38 (C)
[ 39.535398] dump_stack_lvl+0x8c/0xd0
[ 39.536106] print_report+0x118/0x5e0
[ 39.536765] kasan_report+0xc8/0x118
[ 39.538158] __asan_report_load1_noabort+0x20/0x30
[ 39.539006] strcmp+0xc0/0xc8
[ 39.539410] kasan_strings+0x248/0x8f8
[ 39.540001] kunit_try_run_case+0x14c/0x3d0
[ 39.540436] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.541383] kthread+0x24c/0x2d0
[ 39.542124] ret_from_fork+0x10/0x20
[ 39.542860]
[ 39.543165] Allocated by task 247:
[ 39.544222] kasan_save_stack+0x3c/0x68
[ 39.544957] kasan_save_track+0x20/0x40
[ 39.545562] kasan_save_alloc_info+0x40/0x58
[ 39.546107] __kasan_kmalloc+0xd4/0xd8
[ 39.547462] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.548659] kasan_strings+0xb4/0x8f8
[ 39.550183] kunit_try_run_case+0x14c/0x3d0
[ 39.551365] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.552730] kthread+0x24c/0x2d0
[ 39.553310] ret_from_fork+0x10/0x20
[ 39.554263]
[ 39.554580] Freed by task 247:
[ 39.555048] kasan_save_stack+0x3c/0x68
[ 39.555629] kasan_save_track+0x20/0x40
[ 39.557758] kasan_save_free_info+0x4c/0x78
[ 39.558443] __kasan_slab_free+0x6c/0x98
[ 39.559444] kfree+0x114/0x3c8
[ 39.560132] kasan_strings+0x128/0x8f8
[ 39.560882] kunit_try_run_case+0x14c/0x3d0
[ 39.561661] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.562488] kthread+0x24c/0x2d0
[ 39.563100] ret_from_fork+0x10/0x20
[ 39.564109]
[ 39.564610] The buggy address belongs to the object at fff00000c69eb480
[ 39.564610] which belongs to the cache kmalloc-32 of size 32
[ 39.566223] The buggy address is located 16 bytes inside of
[ 39.566223] freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[ 39.568489]
[ 39.569023] The buggy address belongs to the physical page:
[ 39.570593] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[ 39.571916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.573141] page_type: f5(slab)
[ 39.573903] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 39.575221] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 39.576494] page dumped because: kasan: bad access detected
[ 39.577423]
[ 39.577907] Memory state around the buggy address:
[ 39.578545] fff00000c69eb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 39.580296] fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 39.581398] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.582239] ^
[ 39.583589] fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.584640] fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.585767] ==================================================================
Home
[ 39.647114] ==================================================================
[ 39.648671] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[ 39.650182] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[ 39.652680]
[ 39.653042] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.654682] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.656416] Hardware name: linux,dummy-virt (DT)
[ 39.657216] Call trace:
[ 39.657577] show_stack+0x20/0x38 (C)
[ 39.658413] dump_stack_lvl+0x8c/0xd0
[ 39.659576] print_report+0x118/0x5e0
[ 39.660335] kasan_report+0xc8/0x118
[ 39.660919] __asan_report_load1_noabort+0x20/0x30
[ 39.661754] strlen+0xa8/0xb0
[ 39.662241] kasan_strings+0x320/0x8f8
[ 39.663394] kunit_try_run_case+0x14c/0x3d0
[ 39.664481] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.665319] kthread+0x24c/0x2d0
[ 39.665964] ret_from_fork+0x10/0x20
[ 39.666709]
[ 39.667391] Allocated by task 247:
[ 39.668399] kasan_save_stack+0x3c/0x68
[ 39.668909] kasan_save_track+0x20/0x40
[ 39.669217] kasan_save_alloc_info+0x40/0x58
[ 39.669594] __kasan_kmalloc+0xd4/0xd8
[ 39.669991] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.671280] kasan_strings+0xb4/0x8f8
[ 39.672674] kunit_try_run_case+0x14c/0x3d0
[ 39.673664] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.674689] kthread+0x24c/0x2d0
[ 39.675564] ret_from_fork+0x10/0x20
[ 39.676108]
[ 39.676448] Freed by task 247:
[ 39.677735] kasan_save_stack+0x3c/0x68
[ 39.678671] kasan_save_track+0x20/0x40
[ 39.679842] kasan_save_free_info+0x4c/0x78
[ 39.680850] __kasan_slab_free+0x6c/0x98
[ 39.681773] kfree+0x114/0x3c8
[ 39.682565] kasan_strings+0x128/0x8f8
[ 39.683712] kunit_try_run_case+0x14c/0x3d0
[ 39.684083] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.684440] kthread+0x24c/0x2d0
[ 39.684814] ret_from_fork+0x10/0x20
[ 39.685791]
[ 39.686157] The buggy address belongs to the object at fff00000c69eb480
[ 39.686157] which belongs to the cache kmalloc-32 of size 32
[ 39.688014] The buggy address is located 16 bytes inside of
[ 39.688014] freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[ 39.689796]
[ 39.690387] The buggy address belongs to the physical page:
[ 39.691701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[ 39.692854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.694092] page_type: f5(slab)
[ 39.694630] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 39.695962] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 39.696898] page dumped because: kasan: bad access detected
[ 39.697800]
[ 39.698182] Memory state around the buggy address:
[ 39.698806] fff00000c69eb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 39.700179] fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 39.701219] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.702181] ^
[ 39.702762] fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.704054] fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.705638] ==================================================================
Home
[ 39.707691] ==================================================================
[ 39.708582] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[ 39.710532] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[ 39.711785]
[ 39.712217] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.713442] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.714211] Hardware name: linux,dummy-virt (DT)
[ 39.715464] Call trace:
[ 39.716239] show_stack+0x20/0x38 (C)
[ 39.716698] dump_stack_lvl+0x8c/0xd0
[ 39.717470] print_report+0x118/0x5e0
[ 39.718257] kasan_report+0xc8/0x118
[ 39.719300] __asan_report_load1_noabort+0x20/0x30
[ 39.720338] strnlen+0x80/0x88
[ 39.721052] kasan_strings+0x380/0x8f8
[ 39.721737] kunit_try_run_case+0x14c/0x3d0
[ 39.722490] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.723599] kthread+0x24c/0x2d0
[ 39.724130] ret_from_fork+0x10/0x20
[ 39.724741]
[ 39.725166] Allocated by task 247:
[ 39.726035] kasan_save_stack+0x3c/0x68
[ 39.726918] kasan_save_track+0x20/0x40
[ 39.728079] kasan_save_alloc_info+0x40/0x58
[ 39.729659] __kasan_kmalloc+0xd4/0xd8
[ 39.730309] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.731168] kasan_strings+0xb4/0x8f8
[ 39.732083] kunit_try_run_case+0x14c/0x3d0
[ 39.732971] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.733845] kthread+0x24c/0x2d0
[ 39.734467] ret_from_fork+0x10/0x20
[ 39.735508]
[ 39.735902] Freed by task 247:
[ 39.736627] kasan_save_stack+0x3c/0x68
[ 39.737271] kasan_save_track+0x20/0x40
[ 39.737964] kasan_save_free_info+0x4c/0x78
[ 39.738741] __kasan_slab_free+0x6c/0x98
[ 39.739612] kfree+0x114/0x3c8
[ 39.740449] kasan_strings+0x128/0x8f8
[ 39.741085] kunit_try_run_case+0x14c/0x3d0
[ 39.741866] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.742745] kthread+0x24c/0x2d0
[ 39.743734] ret_from_fork+0x10/0x20
[ 39.744469]
[ 39.744888] The buggy address belongs to the object at fff00000c69eb480
[ 39.744888] which belongs to the cache kmalloc-32 of size 32
[ 39.746511] The buggy address is located 16 bytes inside of
[ 39.746511] freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[ 39.748306]
[ 39.748663] The buggy address belongs to the physical page:
[ 39.749420] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[ 39.752264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.753655] page_type: f5(slab)
[ 39.754408] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 39.755942] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 39.756847] page dumped because: kasan: bad access detected
[ 39.757785]
[ 39.758168] Memory state around the buggy address:
[ 39.759390] fff00000c69eb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 39.760538] fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 39.761443] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.762464] ^
[ 39.763017] fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.763897] fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.764790] ==================================================================
Home
[ 39.470207] ==================================================================
[ 39.471549] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[ 39.472199] Read of size 1 at addr fff00000c69eb490 by task kunit_try_catch/247
[ 39.473314]
[ 39.474779] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.476433] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.477161] Hardware name: linux,dummy-virt (DT)
[ 39.478219] Call trace:
[ 39.478745] show_stack+0x20/0x38 (C)
[ 39.479311] dump_stack_lvl+0x8c/0xd0
[ 39.479979] print_report+0x118/0x5e0
[ 39.481073] kasan_report+0xc8/0x118
[ 39.481957] __asan_report_load1_noabort+0x20/0x30
[ 39.482963] strrchr+0x6c/0x78
[ 39.483593] kasan_strings+0x1e0/0x8f8
[ 39.484573] kunit_try_run_case+0x14c/0x3d0
[ 39.485406] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.486403] kthread+0x24c/0x2d0
[ 39.487791] ret_from_fork+0x10/0x20
[ 39.488357]
[ 39.488736] Allocated by task 247:
[ 39.489249] kasan_save_stack+0x3c/0x68
[ 39.489992] kasan_save_track+0x20/0x40
[ 39.490468] kasan_save_alloc_info+0x40/0x58
[ 39.491460] __kasan_kmalloc+0xd4/0xd8
[ 39.492987] __kmalloc_cache_noprof+0x15c/0x3c0
[ 39.493565] kasan_strings+0xb4/0x8f8
[ 39.493989] kunit_try_run_case+0x14c/0x3d0
[ 39.494764] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.495443] kthread+0x24c/0x2d0
[ 39.496136] ret_from_fork+0x10/0x20
[ 39.496816]
[ 39.497214] Freed by task 247:
[ 39.498307] kasan_save_stack+0x3c/0x68
[ 39.499382] kasan_save_track+0x20/0x40
[ 39.499951] kasan_save_free_info+0x4c/0x78
[ 39.500640] __kasan_slab_free+0x6c/0x98
[ 39.501135] kfree+0x114/0x3c8
[ 39.501946] kasan_strings+0x128/0x8f8
[ 39.502692] kunit_try_run_case+0x14c/0x3d0
[ 39.503343] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.504547] kthread+0x24c/0x2d0
[ 39.505054] ret_from_fork+0x10/0x20
[ 39.505677]
[ 39.506006] The buggy address belongs to the object at fff00000c69eb480
[ 39.506006] which belongs to the cache kmalloc-32 of size 32
[ 39.507736] The buggy address is located 16 bytes inside of
[ 39.507736] freed 32-byte region [fff00000c69eb480, fff00000c69eb4a0)
[ 39.509361]
[ 39.509838] The buggy address belongs to the physical page:
[ 39.510691] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069eb
[ 39.512419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.513086] page_type: f5(slab)
[ 39.513584] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 39.515001] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 39.516143] page dumped because: kasan: bad access detected
[ 39.516825]
[ 39.517174] Memory state around the buggy address:
[ 39.517924] fff00000c69eb380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 39.519256] fff00000c69eb400: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 39.520240] >fff00000c69eb480: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.520995] ^
[ 39.521733] fff00000c69eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.523224] fff00000c69eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 39.524136] ==================================================================
Home
[ 37.108010] ==================================================================
[ 37.108957] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[ 37.109914] Read of size 8 at addr fff00000c61a5e40 by task kunit_try_catch/188
[ 37.110869]
[ 37.111193] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 37.113869] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 37.114372] Hardware name: linux,dummy-virt (DT)
[ 37.115744] Call trace:
[ 37.116919] show_stack+0x20/0x38 (C)
[ 37.117580] dump_stack_lvl+0x8c/0xd0
[ 37.118200] print_report+0x118/0x5e0
[ 37.119283] kasan_report+0xc8/0x118
[ 37.119952] __asan_report_load8_noabort+0x20/0x30
[ 37.121545] workqueue_uaf+0x480/0x4a8
[ 37.122231] kunit_try_run_case+0x14c/0x3d0
[ 37.122916] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.124422] kthread+0x24c/0x2d0
[ 37.125054] ret_from_fork+0x10/0x20
[ 37.125778]
[ 37.126204] Allocated by task 188:
[ 37.127191] kasan_save_stack+0x3c/0x68
[ 37.128285] kasan_save_track+0x20/0x40
[ 37.129138] kasan_save_alloc_info+0x40/0x58
[ 37.130091] __kasan_kmalloc+0xd4/0xd8
[ 37.130674] __kmalloc_cache_noprof+0x15c/0x3c0
[ 37.131415] workqueue_uaf+0x13c/0x4a8
[ 37.131906] kunit_try_run_case+0x14c/0x3d0
[ 37.133197] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.134267] kthread+0x24c/0x2d0
[ 37.135187] ret_from_fork+0x10/0x20
[ 37.135920]
[ 37.136476] Freed by task 31:
[ 37.136852] kasan_save_stack+0x3c/0x68
[ 37.137400] kasan_save_track+0x20/0x40
[ 37.138118] kasan_save_free_info+0x4c/0x78
[ 37.139697] __kasan_slab_free+0x6c/0x98
[ 37.140671] kfree+0x114/0x3c8
[ 37.141132] workqueue_uaf_work+0x18/0x30
[ 37.141842] process_one_work+0x530/0xf98
[ 37.142356] worker_thread+0x614/0xf28
[ 37.143600] kthread+0x24c/0x2d0
[ 37.144751] ret_from_fork+0x10/0x20
[ 37.146114]
[ 37.147014] Last potentially related work creation:
[ 37.148588] kasan_save_stack+0x3c/0x68
[ 37.149432] __kasan_record_aux_stack+0xbc/0xe8
[ 37.150127] kasan_record_aux_stack_noalloc+0x14/0x20
[ 37.151373] __queue_work+0x65c/0xfd8
[ 37.152018] queue_work_on+0xbc/0xf8
[ 37.152425] workqueue_uaf+0x210/0x4a8
[ 37.152888] kunit_try_run_case+0x14c/0x3d0
[ 37.153735] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 37.154727] kthread+0x24c/0x2d0
[ 37.155668] ret_from_fork+0x10/0x20
[ 37.156405]
[ 37.157145] The buggy address belongs to the object at fff00000c61a5e40
[ 37.157145] which belongs to the cache kmalloc-32 of size 32
[ 37.158953] The buggy address is located 0 bytes inside of
[ 37.158953] freed 32-byte region [fff00000c61a5e40, fff00000c61a5e60)
[ 37.160480]
[ 37.160926] The buggy address belongs to the physical page:
[ 37.162118] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[ 37.163861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 37.165548] page_type: f5(slab)
[ 37.166256] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[ 37.167292] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[ 37.168493] page dumped because: kasan: bad access detected
[ 37.169749]
[ 37.170336] Memory state around the buggy address:
[ 37.171137] fff00000c61a5d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 37.171898] fff00000c61a5d80: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[ 37.172959] >fff00000c61a5e00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 37.174540] ^
[ 37.175474] fff00000c61a5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.177028] fff00000c61a5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 37.178812] ==================================================================
Home
[ 39.135639] ==================================================================
[ 39.137226] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[ 39.138471] Read of size 1 at addr ffff800080b67cba by task kunit_try_catch/237
[ 39.140070]
[ 39.140910] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 39.142438] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 39.143416] Hardware name: linux,dummy-virt (DT)
[ 39.144100] Call trace:
[ 39.144718] show_stack+0x20/0x38 (C)
[ 39.145559] dump_stack_lvl+0x8c/0xd0
[ 39.146347] print_report+0x2fc/0x5e0
[ 39.147214] kasan_report+0xc8/0x118
[ 39.147847] __asan_report_load1_noabort+0x20/0x30
[ 39.148551] kasan_stack_oob+0x230/0x268
[ 39.149718] kunit_try_run_case+0x14c/0x3d0
[ 39.150565] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 39.151881] kthread+0x24c/0x2d0
[ 39.152741] ret_from_fork+0x10/0x20
[ 39.154332]
[ 39.154852] The buggy address belongs to stack of task kunit_try_catch/237
[ 39.156137] and is located at offset 138 in frame:
[ 39.156803] kasan_stack_oob+0x0/0x268
[ 39.157782]
[ 39.158163] This frame has 4 objects:
[ 39.159051] [48, 49) '__assertion'
[ 39.159231] [64, 72) 'array'
[ 39.159800] [96, 112) '__assertion'
[ 39.160884] [128, 138) 'stack_array'
[ 39.161863]
[ 39.163203] The buggy address belongs to the virtual mapping at
[ 39.163203] [ffff800080b60000, ffff800080b69000) created by:
[ 39.163203] kernel_clone+0x140/0x788
[ 39.165155]
[ 39.165693] The buggy address belongs to the physical page:
[ 39.166383] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a98
[ 39.167975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 39.170045] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 39.171128] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 39.171847] page dumped because: kasan: bad access detected
[ 39.173472]
[ 39.173741] Memory state around the buggy address:
[ 39.174063] ffff800080b67b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 39.174487] ffff800080b67c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[ 39.175918] >ffff800080b67c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[ 39.177139] ^
[ 39.178012] ffff800080b67d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[ 39.179131] ffff800080b67d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[ 39.180718] ==================================================================
Home
[ 34.726203] ==================================================================
[ 34.727654] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[ 34.729001] Read of size 1 at addr fff00000c68a0000 by task kunit_try_catch/136
[ 34.731086]
[ 34.731956] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.733396] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.734301] Hardware name: linux,dummy-virt (DT)
[ 34.735883] Call trace:
[ 34.736797] show_stack+0x20/0x38 (C)
[ 34.737355] dump_stack_lvl+0x8c/0xd0
[ 34.738275] print_report+0x118/0x5e0
[ 34.739091] kasan_report+0xc8/0x118
[ 34.739547] __asan_report_load1_noabort+0x20/0x30
[ 34.740114] kmalloc_large_uaf+0x2cc/0x2f8
[ 34.740875] kunit_try_run_case+0x14c/0x3d0
[ 34.741614] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.742546] kthread+0x24c/0x2d0
[ 34.743146] ret_from_fork+0x10/0x20
[ 34.743870]
[ 34.744715] The buggy address belongs to the physical page:
[ 34.745202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068a0
[ 34.745912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.747428] raw: 0bfffe0000000000 ffffc1ffc31a2908 fff00000da50af80 0000000000000000
[ 34.749233] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 34.750207] page dumped because: kasan: bad access detected
[ 34.751417]
[ 34.751878] Memory state around the buggy address:
[ 34.752958] fff00000c689ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.754484] fff00000c689ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.756187] >fff00000c68a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 34.757497] ^
[ 34.758106] fff00000c68a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 34.760295] fff00000c68a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 34.761275] ==================================================================
Home
[ 38.750061] ==================================================================
[ 38.751714] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[ 38.753024] Read of size 1 at addr fff00000c6a24000 by task kunit_try_catch/221
[ 38.754143]
[ 38.754589] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.756793] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.757428] Hardware name: linux,dummy-virt (DT)
[ 38.758079] Call trace:
[ 38.758658] show_stack+0x20/0x38 (C)
[ 38.759233] dump_stack_lvl+0x8c/0xd0
[ 38.759843] print_report+0x118/0x5e0
[ 38.761124] kasan_report+0xc8/0x118
[ 38.761949] __asan_report_load1_noabort+0x20/0x30
[ 38.762549] mempool_uaf_helper+0x314/0x340
[ 38.763422] mempool_page_alloc_uaf+0xb8/0x118
[ 38.764740] kunit_try_run_case+0x14c/0x3d0
[ 38.765630] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.766323] kthread+0x24c/0x2d0
[ 38.767272] ret_from_fork+0x10/0x20
[ 38.768082]
[ 38.768710] The buggy address belongs to the physical page:
[ 38.769422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a24
[ 38.770511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 38.772111] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 38.773056] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 38.773906] page dumped because: kasan: bad access detected
[ 38.774667]
[ 38.774967] Memory state around the buggy address:
[ 38.776670] fff00000c6a23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.777437] fff00000c6a23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.778609] >fff00000c6a24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.779674] ^
[ 38.780235] fff00000c6a24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.781835] fff00000c6a24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.782658] ==================================================================
Home
[ 38.613101] ==================================================================
[ 38.614436] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[ 38.615385] Read of size 1 at addr fff00000c6a24000 by task kunit_try_catch/217
[ 38.616938]
[ 38.617482] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 38.619283] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.620258] Hardware name: linux,dummy-virt (DT)
[ 38.620809] Call trace:
[ 38.621632] show_stack+0x20/0x38 (C)
[ 38.622676] dump_stack_lvl+0x8c/0xd0
[ 38.623811] print_report+0x118/0x5e0
[ 38.625015] kasan_report+0xc8/0x118
[ 38.625630] __asan_report_load1_noabort+0x20/0x30
[ 38.626099] mempool_uaf_helper+0x314/0x340
[ 38.627254] mempool_kmalloc_large_uaf+0xbc/0x118
[ 38.628797] kunit_try_run_case+0x14c/0x3d0
[ 38.629397] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.630377] kthread+0x24c/0x2d0
[ 38.631455] ret_from_fork+0x10/0x20
[ 38.632382]
[ 38.632754] The buggy address belongs to the physical page:
[ 38.633595] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a24
[ 38.634672] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 38.636399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 38.637442] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 38.639499] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 38.640384] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[ 38.641708] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 38.643287] head: 0bfffe0000000002 ffffc1ffc31a8901 ffffffffffffffff 0000000000000000
[ 38.644467] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 38.645765] page dumped because: kasan: bad access detected
[ 38.646496]
[ 38.646851] Memory state around the buggy address:
[ 38.648010] fff00000c6a23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.648904] fff00000c6a23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.649988] >fff00000c6a24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.650909] ^
[ 38.651468] fff00000c6a24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.653567] fff00000c6a24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 38.654375] ==================================================================
Home
[ 34.834373] ==================================================================
[ 34.836026] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[ 34.836763] Read of size 1 at addr fff00000c68e0000 by task kunit_try_catch/142
[ 34.838597]
[ 34.839301] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.840728] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.841686] Hardware name: linux,dummy-virt (DT)
[ 34.842539] Call trace:
[ 34.843767] show_stack+0x20/0x38 (C)
[ 34.844408] dump_stack_lvl+0x8c/0xd0
[ 34.844968] print_report+0x118/0x5e0
[ 34.845662] kasan_report+0xc8/0x118
[ 34.846274] __asan_report_load1_noabort+0x20/0x30
[ 34.847054] page_alloc_uaf+0x328/0x350
[ 34.847637] kunit_try_run_case+0x14c/0x3d0
[ 34.848393] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.849197] kthread+0x24c/0x2d0
[ 34.850407] ret_from_fork+0x10/0x20
[ 34.850971]
[ 34.851767] The buggy address belongs to the physical page:
[ 34.852490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068e0
[ 34.854246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 34.855168] page_type: f0(buddy)
[ 34.855780] raw: 0bfffe0000000000 fff00000ff615148 fff00000ff615148 0000000000000000
[ 34.856803] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[ 34.858116] page dumped because: kasan: bad access detected
[ 34.859685]
[ 34.860096] Memory state around the buggy address:
[ 34.860616] fff00000c68dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.861655] fff00000c68dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 34.862691] >fff00000c68e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 34.864684] ^
[ 34.865473] fff00000c68e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 34.866423] fff00000c68e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 34.868325] ==================================================================
Home
[ 34.567585] ==================================================================
[ 34.570182] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x490
[ 34.570182]
[ 34.571407] Corrupted memory at 0x00000000a008934d [ ! . . . . . . . ] (in kfence-#88):
[ 34.576225] kmalloc_track_caller_oob_right+0x224/0x490
[ 34.576965] kunit_try_run_case+0x14c/0x3d0
[ 34.577741] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.578428] kthread+0x24c/0x2d0
[ 34.579023] ret_from_fork+0x10/0x20
[ 34.580376]
[ 34.581008] kfence-#88: 0x00000000e9d55bfd-0x000000007bf3ead3, size=120, cache=kmalloc-128
[ 34.581008]
[ 34.582592] allocated by task 130 on cpu 1 at 34.564881s (0.017557s ago):
[ 34.584320] kmalloc_track_caller_oob_right+0x184/0x490
[ 34.585164] kunit_try_run_case+0x14c/0x3d0
[ 34.585884] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.586827] kthread+0x24c/0x2d0
[ 34.587317] ret_from_fork+0x10/0x20
[ 34.588216]
[ 34.589398] freed by task 130 on cpu 1 at 34.566485s (0.022737s ago):
[ 34.590186] kmalloc_track_caller_oob_right+0x224/0x490
[ 34.590838] kunit_try_run_case+0x14c/0x3d0
[ 34.591734] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 34.593199] kthread+0x24c/0x2d0
[ 34.593892] ret_from_fork+0x10/0x20
[ 34.594630]
[ 34.595478] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc7 #1
[ 34.596822] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 34.597182] Hardware name: linux,dummy-virt (DT)
[ 34.597606] ==================================================================
Home
------------[ cut here ]------------
[ 44.412856] WARNING: CPU: 1 PID: 466 at mm/util.c:657 __kvmalloc_node_noprof+0x11c/0x124
[ 44.414288] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 44.418181] CPU: 1 UID: 0 PID: 466 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 44.419431] Hardware name: linux,dummy-virt (DT)
[ 44.420853] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 44.421978] pc : __kvmalloc_node_noprof+0x11c/0x124
[ 44.422822] lr : __kvmalloc_node_noprof+0x50/0x124
[ 44.423505] sp : ffff800080a7bce0
[ 44.423768] x29: ffff800080a7bcf0 x28: fff00000c1109240 x27: 0000000000000000
[ 44.424770] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 44.425530] x23: 0000000080001000 x22: 5dcfa7005e55c980 x21: 0000000200001e00
[ 44.426999] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 44.428889] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 44.429709] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 44.430441] x11: 0000000000000040 x10: 246ea02de0832500 x9 : 246ea02de0832500
[ 44.431913] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 44.432412] x5 : 0000000000000000 x4 : ffff800080a7bcb0 x3 : 0000000000000000
[ 44.432892] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 44.435230] Call trace:
[ 44.435903] __kvmalloc_node_noprof+0x11c/0x124 (P)
[ 44.437390] alloc_fdtable+0x74/0x118
[ 44.438335] expand_files+0x114/0x2e0
[ 44.439299] ksys_dup3+0x64/0xe8
[ 44.440416] __arm64_sys_dup3+0x20/0x30
[ 44.441070] invoke_syscall+0x40/0xf8
[ 44.441337] el0_svc_common+0xa8/0xd8
[ 44.441593] do_el0_svc+0x1c/0x28
[ 44.441833] el0_svc+0x38/0x68
[ 44.442092] el0t_64_sync_handler+0x78/0x108
[ 44.442371] el0t_64_sync+0x198/0x19c
[ 44.443754] ---[ end trace 0000000000000000 ]---
Home
------------[ cut here ]------------
[ 46.916909] WARNING: CPU: 0 PID: 468 at mm/util.c:657 __kvmalloc_node_noprof+0x138/0x148
[ 46.919230] Modules linked in: crct10dif_ce sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 46.923201] CPU: 0 UID: 0 PID: 468 Comm: unshare_test Not tainted 6.13.0-rc7 #1
[ 46.924209] Hardware name: linux,dummy-virt (DT)
[ 46.924871] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 46.925336] pc : __kvmalloc_node_noprof+0x138/0x148
[ 46.925940] lr : __kvmalloc_node_noprof+0x64/0x148
[ 46.926668] sp : ffff800080ab3cd0
[ 46.927131] x29: ffff800080ab3ce0 x28: fff00000c6ab0000 x27: 0000000000000000
[ 46.928130] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c28b2680
[ 46.928907] x23: fff00000c28b2700 x22: f1cf98940293b6bc x21: 0000000200001e00
[ 46.929824] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[ 46.930780] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 46.931794] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 46.932611] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 46.933448] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[ 46.934514] x5 : 0000000000000000 x4 : fff00000c6ab0000 x3 : 0000000000000000
[ 46.935228] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 46.936246] Call trace:
[ 46.936978] __kvmalloc_node_noprof+0x138/0x148 (P)
[ 46.938012] alloc_fdtable+0x84/0x128
[ 46.938977] expand_files+0x78/0x2ec
[ 46.939776] ksys_dup3+0x60/0x120
[ 46.940550] __arm64_sys_dup3+0x20/0x30
[ 46.940822] invoke_syscall+0x48/0x10c
[ 46.941090] el0_svc_common.constprop.0+0x40/0xe0
[ 46.941388] do_el0_svc+0x1c/0x28
[ 46.941662] el0_svc+0x30/0xcc
[ 46.942042] el0t_64_sync_handler+0x10c/0x138
[ 46.942539] el0t_64_sync+0x198/0x19c
[ 46.943313] ---[ end trace 0000000000000000 ]---