[ 2950.778177] # Subtest: bitfields [ 2950.778195] 1..2 [ 2950.786797] ok 1 - test_bitfields_constants [ 2950.792501] ok 2 - test_bitfields_variables [ 2950.798489] ok 1 - bitfields [ 2951.239785] # Subtest: cmdline [ 2951.239798] 1..4 [ 2951.248929] ok 1 - cmdline_test_noint [ 2951.254738] ok 2 - cmdline_test_lead_int [ 2951.261959] ok 3 - cmdline_test_tail_int [ 2951.268369] ok 4 - cmdline_test_range [ 2951.273707] ok 2 - cmdline [ 2951.720577] # Subtest: ext4_inode_test [ 2951.720590] 1..1 [ 2951.726575] # inode_test_xtimestamp_decoding: ok 1 - 1901-12-13 Lower bound of 32bit < 0 timestamp, no extra bits [ 2951.733004] # inode_test_xtimestamp_decoding: ok 2 - 1969-12-31 Upper bound of 32bit < 0 timestamp, no extra bits [ 2951.740412] # inode_test_xtimestamp_decoding: ok 3 - 1970-01-01 Lower bound of 32bit >=0 timestamp, no extra bits [ 2951.747512] # inode_test_xtimestamp_decoding: ok 4 - 2038-01-19 Upper bound of 32bit >=0 timestamp, no extra bits [ 2951.754467] # inode_test_xtimestamp_decoding: ok 5 - 2038-01-19 Lower bound of 32bit <0 timestamp, lo extra sec bit on [ 2951.761355] # inode_test_xtimestamp_decoding: ok 6 - 2106-02-07 Upper bound of 32bit <0 timestamp, lo extra sec bit on [ 2951.767928] # inode_test_xtimestamp_decoding: ok 7 - 2106-02-07 Lower bound of 32bit >=0 timestamp, lo extra sec bit on [ 2951.774775] # inode_test_xtimestamp_decoding: ok 8 - 2174-02-25 Upper bound of 32bit >=0 timestamp, lo extra sec bit on [ 2951.781565] # inode_test_xtimestamp_decoding: ok 9 - 2174-02-25 Lower bound of 32bit <0 timestamp, hi extra sec bit on [ 2951.788261] # inode_test_xtimestamp_decoding: ok 10 - 2242-03-16 Upper bound of 32bit <0 timestamp, hi extra sec bit on [ 2951.794794] # inode_test_xtimestamp_decoding: ok 11 - 2242-03-16 Lower bound of 32bit >=0 timestamp, hi extra sec bit on [ 2951.801370] # inode_test_xtimestamp_decoding: ok 12 - 2310-04-04 Upper bound of 32bit >=0 timestamp, hi extra sec bit on [ 2951.807861] # inode_test_xtimestamp_decoding: ok 13 - 2310-04-04 Upper bound of 32bit>=0 timestamp, hi extra sec bit 1. 1 ns [ 2951.814381] # inode_test_xtimestamp_decoding: ok 14 - 2378-04-22 Lower bound of 32bit>= timestamp. Extra sec bits 1. Max ns [ 2951.823674] # inode_test_xtimestamp_decoding: ok 15 - 2378-04-22 Lower bound of 32bit >=0 timestamp. All extra sec bits on [ 2951.832729] # inode_test_xtimestamp_decoding: ok 16 - 2446-05-10 Upper bound of 32bit >=0 timestamp. All extra sec bits on [ 2951.841225] ok 1 - inode_test_xtimestamp_decoding [ 2951.849632] ok 3 - ext4_inode_test [ 2952.791904] # Subtest: kunit-try-catch-test [ 2952.791919] 1..2 [ 2952.797879] ok 1 - kunit_test_try_catch_successful_try_no_catch [ 2952.802473] ok 2 - kunit_test_try_catch_unsuccessful_try_does_catch [ 2952.806610] ok 4 - kunit-try-catch-test [ 2952.814411] # Subtest: kunit-resource-test [ 2952.814423] 1..7 [ 2952.819100] ok 1 - kunit_resource_test_init_resources [ 2952.822652] ok 2 - kunit_resource_test_alloc_resource [ 2952.827029] ok 3 - kunit_resource_test_destroy_resource [ 2952.830902] ok 4 - kunit_resource_test_cleanup_resources [ 2952.834455] ok 5 - kunit_resource_test_proper_free_ordering [ 2952.838006] ok 6 - kunit_resource_test_static [ 2952.841801] ok 7 - kunit_resource_test_named [ 2952.844438] ok 5 - kunit-resource-test [ 2952.849804] # Subtest: kunit-log-test [ 2952.849813] 1..1 [ 2952.853144] put this in log. [ 2952.855813] this too. [ 2952.858603] add to suite log. [ 2952.861112] along with this. [ 2952.863808] ok 1 - kunit_log_test [ 2952.866320] ok 6 - kunit-log-test [ 2952.872320] # Subtest: kunit_status [ 2952.872329] 1..2 [ 2952.875563] ok 1 - kunit_status_set_failure_test [ 2952.878607] ok 2 - kunit_status_mark_skipped_test [ 2952.881278] ok 7 - kunit_status [ 2952.993379] # Subtest: rtc_lib_test_cases [ 2952.993392] 1..1 [ 2957.961366] ok 1 - rtc_time64_to_tm_test_date_range [ 2957.964214] ok 8 - rtc_lib_test_cases [ 2958.078797] # Subtest: list-kunit-test [ 2958.078811] 1..36 [ 2958.083323] ok 1 - list_test_list_init [ 2958.086611] ok 2 - list_test_list_add [ 2958.090016] ok 3 - list_test_list_add_tail [ 2958.093323] ok 4 - list_test_list_del [ 2958.096679] ok 5 - list_test_list_replace [ 2958.100859] ok 6 - list_test_list_replace_init [ 2958.105107] ok 7 - list_test_list_swap [ 2958.108730] ok 8 - list_test_list_del_init [ 2958.112006] ok 9 - list_test_list_move [ 2958.115376] ok 10 - list_test_list_move_tail [ 2958.118521] ok 11 - list_test_list_bulk_move_tail [ 2958.121796] ok 12 - list_test_list_is_first [ 2958.124995] ok 13 - list_test_list_is_last [ 2958.128103] ok 14 - list_test_list_empty [ 2958.131102] ok 15 - list_test_list_empty_careful [ 2958.134096] ok 16 - list_test_list_rotate_left [ 2958.137974] ok 17 - list_test_list_rotate_to_front [ 2958.141028] ok 18 - list_test_list_is_singular [ 2958.144136] ok 19 - list_test_list_cut_position [ 2958.147198] ok 20 - list_test_list_cut_before [ 2958.150287] ok 21 - list_test_list_splice [ 2958.153276] ok 22 - list_test_list_splice_tail [ 2958.156109] ok 23 - list_test_list_splice_init [ 2958.159073] ok 24 - list_test_list_splice_tail_init [ 2958.162019] ok 25 - list_test_list_entry [ 2958.165074] ok 26 - list_test_list_first_entry [ 2958.167902] ok 27 - list_test_list_last_entry [ 2958.170864] ok 28 - list_test_list_first_entry_or_null [ 2958.173795] ok 29 - list_test_list_next_entry [ 2958.176942] ok 30 - list_test_list_prev_entry [ 2958.179530] ok 31 - list_test_list_for_each [ 2958.182749] ok 32 - list_test_list_for_each_prev [ 2958.185273] ok 33 - list_test_list_for_each_safe [ 2958.187828] ok 34 - list_test_list_for_each_prev_safe [ 2958.190276] ok 35 - list_test_list_for_each_entry [ 2958.192810] ok 36 - list_test_list_for_each_entry_reverse [ 2958.195294] ok 9 - list-kunit-test [ 2958.313106] # Subtest: memcpy [ 2958.313121] 1..3 [ 2958.316548] # memset_test: ok: memset() direct assignment [ 2958.320696] # memset_test: ok: memset() complete overwrite [ 2958.323176] # memset_test: ok: memset() middle overwrite [ 2958.325594] # memset_test: ok: memset() argument side-effects [ 2958.328127] # memset_test: ok: memset() memset_after() [ 2958.330462] # memset_test: ok: memset() memset_startat() [ 2958.332880] ok 1 - memset_test [ 2958.333183] # memcpy_test: ok: memcpy() static initializers [ 2958.336587] # memcpy_test: ok: memcpy() direct assignment [ 2958.338392] # memcpy_test: ok: memcpy() complete overwrite [ 2958.340431] # memcpy_test: ok: memcpy() middle overwrite [ 2958.342199] # memcpy_test: ok: memcpy() argument side-effects [ 2958.344257] ok 2 - memcpy_test [ 2958.344672] # memmove_test: ok: memmove() static initializers [ 2958.349202] # memmove_test: ok: memmove() direct assignment [ 2958.351740] # memmove_test: ok: memmove() complete overwrite [ 2958.354289] # memmove_test: ok: memmove() middle overwrite [ 2958.356813] # memmove_test: ok: memmove() argument side-effects [ 2958.359433] # memmove_test: ok: memmove() overlapping write [ 2958.362016] ok 3 - memmove_test [ 2958.362028] ok 10 - memcpy [ 2958.475236] # Subtest: mptcp-crypto [ 2958.475247] 1..1 [ 2958.478608] ok 1 - mptcp_crypto_test_basic [ 2958.480361] ok 11 - mptcp-crypto [ 2958.591508] # Subtest: mptcp-token [ 2958.591519] 1..4 [ 2958.594853] ok 1 - mptcp_token_test_req_basic [ 2958.597753] ok 2 - mptcp_token_test_msk_basic [ 2958.600642] ok 3 - mptcp_token_test_accept [ 2958.603245] ok 4 - mptcp_token_test_destroyed [ 2958.605116] ok 12 - mptcp-token [ 2958.884604] # Subtest: rational [ 2958.884628] 1..1 [ 2958.889793] # rational_test: ok 1 - Exceeds bounds, semi-convergent term > 1/2 last term [ 2958.892078] # rational_test: ok 2 - Exceeds bounds, semi-convergent term < 1/2 last term [ 2958.897552] # rational_test: ok 3 - Closest to zero [ 2958.910922] # rational_test: ok 4 - Closest to smallest non-zero [ 2958.915356] # rational_test: ok 5 - Use convergent [ 2958.919032] # rational_test: ok 6 - Exact answer [ 2958.922330] # rational_test: ok 7 - Semiconvergent, numerator limit [ 2958.925593] # rational_test: ok 8 - Semiconvergent, denominator limit [ 2958.928624] ok 1 - rational_test [ 2958.931653] ok 13 - rational [ 2959.043068] # Subtest: resource [ 2959.043082] 1..2 [ 2959.046638] ok 1 - resource_test_union [ 2959.049511] ok 2 - resource_test_intersection [ 2959.051524] ok 14 - resource [ 2959.162399] # Subtest: slub_test [ 2959.162412] 1..2 [ 2959.214691] ok 1 - test_clobber_zone [ 2959.263574] ok 2 - test_clobber_redzone_free [ 2959.265808] ok 15 - slub_test [ 2959.478887] # Subtest: snd_soc_tplg_test [ 2959.478900] 1..11 [ 2959.483867] ok 1 - snd_soc_tplg_test_load_with_null_comp [ 2959.487059] ok 2 - snd_soc_tplg_test_load_with_null_ops [ 2959.490830] ok 3 - snd_soc_tplg_test_load_with_null_fw [ 2959.494679] ok 4 - snd_soc_tplg_test_load_empty_tplg [ 2959.498525] ok 5 - snd_soc_tplg_test_load_empty_tplg_bad_magic [ 2959.502121] ok 6 - snd_soc_tplg_test_load_empty_tplg_bad_abi [ 2959.505871] ok 7 - snd_soc_tplg_test_load_empty_tplg_bad_size [ 2959.509704] ok 8 - snd_soc_tplg_test_load_empty_tplg_bad_payload_size [ 2959.513490] ok 9 - snd_soc_tplg_test_load_pcm_tplg [ 2959.518564] ok 10 - snd_soc_tplg_test_load_pcm_tplg_reload_comp [ 2959.525343] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.536722] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.582658] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.593803] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.616846] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.624845] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.648578] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.656565] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.678447] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.686817] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.705361] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.713704] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.731661] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.740091] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.760839] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.769707] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.788885] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.797772] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.817594] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.826935] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.850455] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.860023] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.879221] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.889045] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.909660] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.919836] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.939803] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.950122] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2959.969447] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2959.980369] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.007501] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.018593] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.052938] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.063914] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.094532] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.105564] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.138689] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.149899] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.179541] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.190586] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.227888] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.238969] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.259410] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.277024] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.296731] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.309299] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.328471] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.339462] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.373225] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.384033] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.412724] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.423896] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.455706] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.466774] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.497379] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.508932] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.531541] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.542448] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.575370] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.586356] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.620271] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.631058] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.650034] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.661091] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.683141] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.694098] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.713269] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.724429] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.751659] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.762784] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.786052] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.797037] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.819297] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.830615] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.852259] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.863434] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.882652] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.893829] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.921570] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.932835] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.952489] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.963385] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2960.981939] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2960.992884] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.024869] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.035731] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.054607] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.065490] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.096762] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.107487] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.140391] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.151737] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.177957] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.189001] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.208617] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.219286] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.238626] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.249787] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.279849] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.290643] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.323015] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.333774] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.360417] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.371377] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.402927] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.413736] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.444021] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.455088] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.489065] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.502556] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.528771] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.539969] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.580341] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.591395] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.622173] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.632977] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.665736] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.676446] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.698526] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.709437] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.738281] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.749008] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.779992] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.790894] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.826201] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.837061] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.864798] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.876204] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.907835] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.919299] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.937620] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.948653] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2961.969824] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2961.981399] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.010516] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.022520] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.053015] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.063937] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.100528] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.112876] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.142709] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.153888] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.185700] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.197146] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.237334] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.248830] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.279104] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.289588] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.322581] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.333937] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.367336] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.378374] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.411432] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.423013] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.447321] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.458640] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.485224] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.496143] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.521901] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.532586] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.555266] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.570031] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.600497] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.611442] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.630429] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.641179] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.661090] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.672052] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.689651] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.700693] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.719572] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.731175] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.762884] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.774345] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.793489] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.803938] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.824838] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.835941] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.865694] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.876859] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.898836] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.909714] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.929388] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.940263] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.963884] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2962.976709] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2962.998760] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2963.009677] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2963.041540] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2963.052344] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2963.079435] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2963.090141] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2963.120484] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2963.130894] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2963.163396] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2963.174025] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2963.208099] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2963.219063] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2963.243486] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2963.254483] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2963.276785] ok 11 - snd_soc_tplg_test_load_pcm_tplg_reload_card [ 2963.276800] ok 16 - snd_soc_tplg_test [ 2963.409981] # Subtest: soc-utils [ 2963.409994] 1..1 [ 2963.415906] ok 1 - test_tdm_params_to_bclk [ 2963.419791] ok 17 - soc-utils [ 2963.716436] # Subtest: sysctl_test [ 2963.716451] 1..10 [ 2963.722567] ok 1 - sysctl_test_api_dointvec_null_tbl_data [ 2963.727020] ok 2 - sysctl_test_api_dointvec_table_maxlen_unset [ 2963.732610] ok 3 - sysctl_test_api_dointvec_table_len_is_zero [ 2963.737829] ok 4 - sysctl_test_api_dointvec_table_read_but_position_set [ 2963.743450] ok 5 - sysctl_test_dointvec_read_happy_single_positive [ 2963.748967] ok 6 - sysctl_test_dointvec_read_happy_single_negative [ 2963.754353] ok 7 - sysctl_test_dointvec_write_happy_single_positive [ 2963.759674] ok 8 - sysctl_test_dointvec_write_happy_single_negative [ 2963.764956] ok 9 - sysctl_test_api_dointvec_write_single_less_int_min [ 2963.770099] ok 10 - sysctl_test_api_dointvec_write_single_greater_int_max [ 2963.774600] ok 18 - sysctl_test [ 2963.892755] # Subtest: bits-test [ 2963.892768] 1..3 [ 2963.897800] ok 1 - genmask_test [ 2963.902149] ok 2 - genmask_ull_test [ 2963.906167] ok 3 - genmask_input_check_test [ 2963.909604] ok 19 - bits-test [ 2964.382969] # Subtest: kasan [ 2964.382989] 1..55 [ 2964.387826] ================================================================== [ 2964.393164] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 2964.396297] Write of size 1 at addr ffff88816296c973 by task kunit_try_catch/121844 [ 2964.401469] CPU: 2 PID: 121844 Comm: kunit_try_catch Kdump: loaded Not tainted 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2964.407284] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2964.410138] Call Trace: [ 2964.412436] [ 2964.414681] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 2964.417415] dump_stack_lvl+0x57/0x81 [ 2964.419796] print_address_description.constprop.0+0x1f/0x1e0 [ 2964.422474] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 2964.425189] print_report.cold+0x5c/0x237 [ 2964.427523] kasan_report+0xc9/0x100 [ 2964.429751] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 2964.432142] kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 2964.434793] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 2964.437147] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 2964.439504] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2964.441818] ? kunit_add_resource+0x197/0x280 [kunit] [ 2964.444020] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2964.446189] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2964.448374] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2964.450774] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2964.453106] kthread+0x2a7/0x350 [ 2964.455122] ? kthread_complete_and_exit+0x20/0x20 [ 2964.457397] ret_from_fork+0x22/0x30 [ 2964.459495] [ 2964.463194] Allocated by task 121844: [ 2964.465406] kasan_save_stack+0x1e/0x40 [ 2964.467544] __kasan_kmalloc+0x81/0xa0 [ 2964.469612] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 2964.472106] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2964.474557] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2964.477018] kthread+0x2a7/0x350 [ 2964.479350] ret_from_fork+0x22/0x30 [ 2964.483448] The buggy address belongs to the object at ffff88816296c900 which belongs to the cache kmalloc-128 of size 128 [ 2964.488447] The buggy address is located 115 bytes inside of 128-byte region [ffff88816296c900, ffff88816296c980) [ 2964.495362] The buggy address belongs to the physical page: [ 2964.498076] page:000000009abd57ff refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88816296cf00 pfn:0x16296c [ 2964.501496] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2964.504263] raw: 0017ffffc0000200 ffffea0006e89900 dead000000000003 ffff8881000428c0 [ 2964.507154] raw: ffff88816296cf00 000000008010000a 00000001ffffffff 0000000000000000 [ 2964.510044] page dumped because: kasan: bad access detected [ 2964.514595] Memory state around the buggy address: [ 2964.517023] ffff88816296c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2964.519676] ffff88816296c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2964.522348] >ffff88816296c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 2964.525089] ^ [ 2964.527871] ffff88816296c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2964.530638] ffff88816296ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2964.533315] ================================================================== [ 2964.536086] Disabling lock debugging due to kernel taint [ 2964.538645] ================================================================== [ 2964.541598] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 2964.544594] Write of size 1 at addr ffff88816296c978 by task kunit_try_catch/121844 [ 2964.549772] CPU: 2 PID: 121844 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2964.555522] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2964.558345] Call Trace: [ 2964.560639] [ 2964.562878] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 2964.565561] dump_stack_lvl+0x57/0x81 [ 2964.568004] print_address_description.constprop.0+0x1f/0x1e0 [ 2964.570728] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 2964.573427] print_report.cold+0x5c/0x237 [ 2964.575926] kasan_report+0xc9/0x100 [ 2964.578365] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 2964.581310] kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 2964.584298] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 2964.587245] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 2964.590325] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2964.593328] ? kunit_add_resource+0x197/0x280 [kunit] [ 2964.596284] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2964.599219] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2964.602160] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2964.605297] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2964.608290] kthread+0x2a7/0x350 [ 2964.611008] ? kthread_complete_and_exit+0x20/0x20 [ 2964.613945] ret_from_fork+0x22/0x30 [ 2964.616720] [ 2964.621677] Allocated by task 121844: [ 2964.624208] kasan_save_stack+0x1e/0x40 [ 2964.626673] __kasan_kmalloc+0x81/0xa0 [ 2964.629087] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 2964.631719] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2964.634208] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2964.636855] kthread+0x2a7/0x350 [ 2964.639084] ret_from_fork+0x22/0x30 [ 2964.643355] The buggy address belongs to the object at ffff88816296c900 which belongs to the cache kmalloc-128 of size 128 [ 2964.648492] The buggy address is located 120 bytes inside of 128-byte region [ffff88816296c900, ffff88816296c980) [ 2964.655690] The buggy address belongs to the physical page: [ 2964.658219] page:000000009abd57ff refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88816296cf00 pfn:0x16296c [ 2964.661637] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2964.664391] raw: 0017ffffc0000200 ffffea0006e89900 dead000000000003 ffff8881000428c0 [ 2964.667235] raw: ffff88816296cf00 000000008010000a 00000001ffffffff 0000000000000000 [ 2964.670083] page dumped because: kasan: bad access detected [ 2964.674785] Memory state around the buggy address: [ 2964.677201] ffff88816296c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2964.679939] ffff88816296c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2964.682573] >ffff88816296c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 2964.685418] ^ [ 2964.688232] ffff88816296c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2964.690941] ffff88816296ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2964.693661] ================================================================== [ 2964.696426] ================================================================== [ 2964.699129] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 2964.701912] Read of size 1 at addr ffff88816296c980 by task kunit_try_catch/121844 [ 2964.706744] CPU: 2 PID: 121844 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2964.712225] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2964.715043] Call Trace: [ 2964.717274] [ 2964.719498] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 2964.722121] dump_stack_lvl+0x57/0x81 [ 2964.724555] print_address_description.constprop.0+0x1f/0x1e0 [ 2964.727330] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 2964.730204] print_report.cold+0x5c/0x237 [ 2964.732885] kasan_report+0xc9/0x100 [ 2964.735546] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 2964.738395] kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 2964.741259] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 2964.744129] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 2964.747079] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2964.750024] ? kunit_add_resource+0x197/0x280 [kunit] [ 2964.752904] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2964.755753] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2964.758609] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2964.761776] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2964.764710] kthread+0x2a7/0x350 [ 2964.767362] ? kthread_complete_and_exit+0x20/0x20 [ 2964.770226] ret_from_fork+0x22/0x30 [ 2964.772929] [ 2964.777428] Allocated by task 121844: [ 2964.779865] kasan_save_stack+0x1e/0x40 [ 2964.782252] __kasan_kmalloc+0x81/0xa0 [ 2964.784613] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 2964.787164] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2964.789597] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2964.792162] kthread+0x2a7/0x350 [ 2964.794350] ret_from_fork+0x22/0x30 [ 2964.798474] The buggy address belongs to the object at ffff88816296c900 which belongs to the cache kmalloc-128 of size 128 [ 2964.803477] The buggy address is located 0 bytes to the right of 128-byte region [ffff88816296c900, ffff88816296c980) [ 2964.810458] The buggy address belongs to the physical page: [ 2964.812892] page:000000009abd57ff refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88816296cf00 pfn:0x16296c [ 2964.816069] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2964.818726] raw: 0017ffffc0000200 ffffea0006e89900 dead000000000003 ffff8881000428c0 [ 2964.821596] raw: ffff88816296cf00 000000008010000a 00000001ffffffff 0000000000000000 [ 2964.824516] page dumped because: kasan: bad access detected [ 2964.829083] Memory state around the buggy address: [ 2964.831473] ffff88816296c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2964.834237] ffff88816296c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 2964.836883] >ffff88816296c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2964.839599] ^ [ 2964.841758] ffff88816296ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2964.844433] ffff88816296ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2964.847215] ================================================================== [ 2964.850061] ok 1 - kmalloc_oob_right [ 2964.850356] ================================================================== [ 2964.856726] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 2964.860493] Read of size 1 at addr ffff888129f2ceff by task kunit_try_catch/121845 [ 2964.866392] CPU: 3 PID: 121845 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2964.873497] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2964.876971] Call Trace: [ 2964.879505] [ 2964.881932] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 2964.885157] dump_stack_lvl+0x57/0x81 [ 2964.887992] print_address_description.constprop.0+0x1f/0x1e0 [ 2964.891202] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 2964.894428] print_report.cold+0x5c/0x237 [ 2964.897355] kasan_report+0xc9/0x100 [ 2964.900155] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 2964.903334] kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 2964.906556] ? kmalloc_pagealloc_oob_right+0x290/0x290 [test_kasan] [ 2964.910064] ? do_raw_spin_trylock+0xb5/0x180 [ 2964.913097] ? do_raw_spin_lock+0x270/0x270 [ 2964.916129] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2964.919488] ? kunit_add_resource+0x197/0x280 [kunit] [ 2964.922722] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2964.925915] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2964.929137] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2964.932624] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2964.935887] kthread+0x2a7/0x350 [ 2964.938412] ? kthread_complete_and_exit+0x20/0x20 [ 2964.941584] ret_from_fork+0x22/0x30 [ 2964.944441] [ 2964.949266] Allocated by task 0: [ 2964.951993] (stack is not available) [ 2964.956916] The buggy address belongs to the object at ffff888129f2cee0 which belongs to the cache kmalloc-16 of size 16 [ 2964.963325] The buggy address is located 15 bytes to the right of 16-byte region [ffff888129f2cee0, ffff888129f2cef0) [ 2964.971945] The buggy address belongs to the physical page: [ 2964.975083] page:00000000197fd6b0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x129f2c [ 2964.979173] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2964.982708] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2964.986431] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2964.990143] page dumped because: kasan: bad access detected [ 2964.995530] Memory state around the buggy address: [ 2964.998518] ffff888129f2cd80: fc fc fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 2965.002102] ffff888129f2ce00: fa fb fc fc fc fc fc fc fa fb fc fc fa fb fc fc [ 2965.005629] >ffff888129f2ce80: fc fc fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 2965.009097] ^ [ 2965.012417] ffff888129f2cf00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2965.015889] ffff888129f2cf80: 00 00 fc fc fc fc fc fc fa fb fc fc fc fc fc fc [ 2965.019252] ================================================================== [ 2965.022914] ok 2 - kmalloc_oob_left [ 2965.023155] ================================================================== [ 2965.028399] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 2965.031369] Read of size 1 at addr ffff888132f03000 by task kunit_try_catch/121846 [ 2965.036163] CPU: 2 PID: 121846 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2965.042024] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2965.044735] Call Trace: [ 2965.046966] [ 2965.049158] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 2965.052128] dump_stack_lvl+0x57/0x81 [ 2965.054934] print_address_description.constprop.0+0x1f/0x1e0 [ 2965.057810] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 2965.060728] print_report.cold+0x5c/0x237 [ 2965.063368] kasan_report+0xc9/0x100 [ 2965.065970] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 2965.068867] kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 2965.071713] ? pagealloc_uaf+0x2f0/0x2f0 [test_kasan] [ 2965.074438] ? do_raw_spin_trylock+0xb5/0x180 [ 2965.077037] ? do_raw_spin_lock+0x270/0x270 [ 2965.079587] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2965.082513] ? kunit_add_resource+0x197/0x280 [kunit] [ 2965.085124] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2965.087830] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2965.090431] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2965.093185] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2965.095934] kthread+0x2a7/0x350 [ 2965.098397] ? kthread_complete_and_exit+0x20/0x20 [ 2965.100994] ret_from_fork+0x22/0x30 [ 2965.103531] [ 2965.107844] Allocated by task 121846: [ 2965.110312] kasan_save_stack+0x1e/0x40 [ 2965.112644] __kasan_kmalloc+0x81/0xa0 [ 2965.115034] kmalloc_node_oob_right+0x9a/0x2e0 [test_kasan] [ 2965.117626] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2965.120041] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2965.122574] kthread+0x2a7/0x350 [ 2965.124802] ret_from_fork+0x22/0x30 [ 2965.128933] The buggy address belongs to the object at ffff888132f02000 which belongs to the cache kmalloc-4k of size 4096 [ 2965.134004] The buggy address is located 0 bytes to the right of 4096-byte region [ffff888132f02000, ffff888132f03000) [ 2965.141688] The buggy address belongs to the physical page: [ 2965.144172] page:00000000c74bc87a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x132f00 [ 2965.147425] head:00000000c74bc87a order:3 compound_mapcount:0 compound_pincount:0 [ 2965.150315] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2965.153074] raw: 0017ffffc0010200 0000000000000000 dead000000000122 ffff888100043040 [ 2965.155849] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000 [ 2965.158689] page dumped because: kasan: bad access detected [ 2965.163199] Memory state around the buggy address: [ 2965.165498] ffff888132f02f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.168211] ffff888132f02f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.170855] >ffff888132f03000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2965.173475] ^ [ 2965.175611] ffff888132f03080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2965.178272] ffff888132f03100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2965.180861] ================================================================== [ 2965.183866] ok 3 - kmalloc_node_oob_right [ 2965.184119] ================================================================== [ 2965.190289] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 2965.194212] Write of size 1 at addr ffff8881be37e00a by task kunit_try_catch/121847 [ 2965.200008] CPU: 3 PID: 121847 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2965.206915] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2965.210283] Call Trace: [ 2965.212797] [ 2965.215173] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 2965.218600] dump_stack_lvl+0x57/0x81 [ 2965.221384] print_address_description.constprop.0+0x1f/0x1e0 [ 2965.224676] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 2965.228111] print_report.cold+0x5c/0x237 [ 2965.231014] kasan_report+0xc9/0x100 [ 2965.233809] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 2965.237288] kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 2965.240761] ? kmalloc_pagealloc_uaf+0x280/0x280 [test_kasan] [ 2965.244149] ? do_raw_spin_trylock+0xb5/0x180 [ 2965.247220] ? do_raw_spin_lock+0x270/0x270 [ 2965.250228] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2965.253362] ? kunit_add_resource+0x197/0x280 [kunit] [ 2965.256574] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2965.259744] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2965.262954] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2965.266426] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2965.269604] kthread+0x2a7/0x350 [ 2965.272342] ? kthread_complete_and_exit+0x20/0x20 [ 2965.275470] ret_from_fork+0x22/0x30 [ 2965.278296] [ 2965.283092] The buggy address belongs to the physical page: [ 2965.286341] page:00000000b861d59e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1be37c [ 2965.290491] head:00000000b861d59e order:2 compound_mapcount:0 compound_pincount:0 [ 2965.294208] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 2965.297800] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2965.301577] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2965.305325] page dumped because: kasan: bad access detected [ 2965.310873] Memory state around the buggy address: [ 2965.313941] ffff8881be37df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.317623] ffff8881be37df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.321285] >ffff8881be37e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2965.324936] ^ [ 2965.327682] ffff8881be37e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2965.331351] ffff8881be37e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2965.334988] ================================================================== [ 2965.338823] ok 4 - kmalloc_pagealloc_oob_right [ 2965.339066] ================================================================== [ 2965.345616] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 2965.348603] Read of size 1 at addr ffff8881614f0000 by task kunit_try_catch/121850 [ 2965.353599] CPU: 1 PID: 121850 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2965.359515] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2965.362357] Call Trace: [ 2965.364685] [ 2965.366900] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 2965.369654] dump_stack_lvl+0x57/0x81 [ 2965.372047] print_address_description.constprop.0+0x1f/0x1e0 [ 2965.375010] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 2965.378235] print_report.cold+0x5c/0x237 [ 2965.381021] kasan_report+0xc9/0x100 [ 2965.383735] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 2965.386583] kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 2965.389682] ? kmalloc_pagealloc_invalid_free+0x250/0x250 [test_kasan] [ 2965.392909] ? do_raw_spin_trylock+0xb5/0x180 [ 2965.395921] ? do_raw_spin_lock+0x270/0x270 [ 2965.398712] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2965.401563] ? kunit_add_resource+0x197/0x280 [kunit] [ 2965.404334] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2965.407084] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2965.409847] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2965.412938] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2965.415717] kthread+0x2a7/0x350 [ 2965.418109] ? kthread_complete_and_exit+0x20/0x20 [ 2965.420634] ret_from_fork+0x22/0x30 [ 2965.423015] [ 2965.427586] The buggy address belongs to the physical page: [ 2965.430532] page:00000000142f5311 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1614f0 [ 2965.433712] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 2965.436602] raw: 0017ffffc0000000 ffffea000544de08 ffff888363200370 0000000000000000 [ 2965.439750] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 2965.443029] page dumped because: kasan: bad access detected [ 2965.447719] Memory state around the buggy address: [ 2965.450275] ffff8881614eff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2965.453157] ffff8881614eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2965.456150] >ffff8881614f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2965.459048] ^ [ 2965.461372] ffff8881614f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2965.464237] ffff8881614f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2965.467091] ================================================================== [ 2965.470133] ok 5 - kmalloc_pagealloc_uaf [ 2965.470483] ================================================================== [ 2965.477133] BUG: KASAN: double-free or invalid-free in kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 2965.483743] CPU: 3 PID: 121851 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2965.490745] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2965.494169] Call Trace: [ 2965.496656] [ 2965.499050] dump_stack_lvl+0x57/0x81 [ 2965.501808] print_address_description.constprop.0+0x1f/0x1e0 [ 2965.505074] print_report.cold+0x5c/0x237 [ 2965.507927] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 2965.511383] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 2965.514820] kasan_report_invalid_free+0x99/0xc0 [ 2965.517798] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 2965.521182] kfree+0x2ab/0x3c0 [ 2965.523815] kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 2965.527177] ? kmalloc_large_oob_right+0x2b0/0x2b0 [test_kasan] [ 2965.530419] ? do_raw_spin_trylock+0xb5/0x180 [ 2965.533293] ? do_raw_spin_lock+0x270/0x270 [ 2965.536193] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2965.539429] ? kunit_add_resource+0x197/0x280 [kunit] [ 2965.542537] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2965.545551] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2965.548670] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2965.552037] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2965.555169] kthread+0x2a7/0x350 [ 2965.557849] ? kthread_complete_and_exit+0x20/0x20 [ 2965.560893] ret_from_fork+0x22/0x30 [ 2965.563639] [ 2965.568283] The buggy address belongs to the physical page: [ 2965.571486] page:00000000b861d59e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1be37c [ 2965.575591] head:00000000b861d59e order:2 compound_mapcount:0 compound_pincount:0 [ 2965.579243] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 2965.582778] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2965.586505] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2965.590206] page dumped because: kasan: bad access detected [ 2965.595673] Memory state around the buggy address: [ 2965.598665] ffff8881be37bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.602206] ffff8881be37bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2965.605831] >ffff8881be37c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.609414] ^ [ 2965.612101] ffff8881be37c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.615778] ffff8881be37c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.619418] ================================================================== [ 2965.623435] ok 6 - kmalloc_pagealloc_invalid_free [ 2965.623674] ok 7 - pagealloc_oob_right # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2965.628528] ================================================================== [ 2965.636106] BUG: KASAN: use-after-free in pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 2965.639674] Read of size 1 at addr ffff888161fc0000 by task kunit_try_catch/121853 [ 2965.645366] CPU: 3 PID: 121853 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2965.652450] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2965.655919] Call Trace: [ 2965.658446] [ 2965.660883] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 2965.664028] dump_stack_lvl+0x57/0x81 [ 2965.666845] print_address_description.constprop.0+0x1f/0x1e0 [ 2965.670185] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 2965.673349] print_report.cold+0x5c/0x237 [ 2965.676233] kasan_report+0xc9/0x100 [ 2965.679003] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 2965.682103] pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 2965.685160] ? krealloc_more_oob+0x10/0x10 [test_kasan] [ 2965.688314] ? do_raw_spin_trylock+0xb5/0x180 [ 2965.691245] ? do_raw_spin_lock+0x270/0x270 [ 2965.694133] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2965.697334] ? kunit_add_resource+0x197/0x280 [kunit] [ 2965.700434] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2965.703482] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2965.706542] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2965.709868] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2965.712967] kthread+0x2a7/0x350 [ 2965.715615] ? kthread_complete_and_exit+0x20/0x20 [ 2965.718658] ret_from_fork+0x22/0x30 [ 2965.721450] [ 2965.726093] The buggy address belongs to the physical page: [ 2965.729249] page:00000000b7e32406 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x161fc0 [ 2965.733402] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 2965.736837] raw: 0017ffffc0000000 ffffea0006d43c08 ffff8883f9ad6220 0000000000000000 [ 2965.740567] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000 [ 2965.744286] page dumped because: kasan: bad access detected [ 2965.749800] Memory state around the buggy address: [ 2965.752779] ffff888161fbff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.756380] ffff888161fbff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.759947] >ffff888161fc0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2965.763487] ^ [ 2965.766095] ffff888161fc0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2965.769689] ffff888161fc0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2965.773255] ================================================================== [ 2965.776937] ok 8 - pagealloc_uaf [ 2965.777208] ================================================================== [ 2965.783120] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 2965.786826] Write of size 1 at addr ffff88819cf5df00 by task kunit_try_catch/121854 [ 2965.792203] CPU: 0 PID: 121854 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2965.798558] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2965.801570] Call Trace: [ 2965.803968] [ 2965.806142] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 2965.809266] dump_stack_lvl+0x57/0x81 [ 2965.811955] print_address_description.constprop.0+0x1f/0x1e0 [ 2965.814768] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 2965.817739] print_report.cold+0x5c/0x237 [ 2965.820490] kasan_report+0xc9/0x100 [ 2965.823145] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 2965.826318] kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 2965.829395] ? kmalloc_oob_16+0x3b0/0x3b0 [test_kasan] [ 2965.832636] ? do_raw_spin_trylock+0xb5/0x180 [ 2965.835560] ? do_raw_spin_lock+0x270/0x270 [ 2965.838549] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2965.841705] ? kunit_add_resource+0x197/0x280 [kunit] [ 2965.844842] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2965.848049] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2965.851187] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2965.854348] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2965.857366] kthread+0x2a7/0x350 [ 2965.859851] ? kthread_complete_and_exit+0x20/0x20 [ 2965.862689] ret_from_fork+0x22/0x30 [ 2965.865254] [ 2965.869745] Allocated by task 121854: [ 2965.872406] kasan_save_stack+0x1e/0x40 [ 2965.874850] __kasan_kmalloc+0x81/0xa0 [ 2965.877447] kmalloc_large_oob_right+0x98/0x2b0 [test_kasan] [ 2965.880340] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2965.883172] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2965.886016] kthread+0x2a7/0x350 [ 2965.888487] ret_from_fork+0x22/0x30 [ 2965.893008] The buggy address belongs to the object at ffff88819cf5c000 which belongs to the cache kmalloc-8k of size 8192 [ 2965.898653] The buggy address is located 7936 bytes inside of 8192-byte region [ffff88819cf5c000, ffff88819cf5e000) [ 2965.906053] The buggy address belongs to the physical page: [ 2965.908745] page:0000000095350992 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x19cf58 [ 2965.912177] head:0000000095350992 order:3 compound_mapcount:0 compound_pincount:0 [ 2965.915401] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2965.918278] raw: 0017ffffc0010200 0000000000000000 dead000000000122 ffff888100043180 [ 2965.921590] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000 [ 2965.924530] page dumped because: kasan: bad access detected [ 2965.929444] Memory state around the buggy address: [ 2965.932065] ffff88819cf5de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.935236] ffff88819cf5de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2965.937981] >ffff88819cf5df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2965.941028] ^ [ 2965.943183] ffff88819cf5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2965.946165] ffff88819cf5e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2965.949360] ================================================================== [ 2965.953249] ok 9 - kmalloc_large_oob_right [ 2965.953501] ================================================================== [ 2965.959894] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2965.963720] Write of size 1 at addr ffff88810e6524eb by task kunit_try_catch/121855 [ 2965.969505] CPU: 3 PID: 121855 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2965.976570] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2965.980007] Call Trace: [ 2965.982507] [ 2965.984916] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2965.988268] dump_stack_lvl+0x57/0x81 [ 2965.991053] print_address_description.constprop.0+0x1f/0x1e0 [ 2965.994354] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2965.997716] print_report.cold+0x5c/0x237 [ 2966.000604] kasan_report+0xc9/0x100 [ 2966.003402] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2966.006816] krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2966.010205] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 2966.013456] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.016588] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.019689] ? lock_acquire+0x4ea/0x620 [ 2966.022566] ? rcu_read_unlock+0x40/0x40 [ 2966.025455] ? rcu_read_unlock+0x40/0x40 [ 2966.028305] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.031342] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2966.034596] ? do_raw_spin_lock+0x270/0x270 [ 2966.037509] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2966.040891] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2966.043995] ? kunit_add_resource+0x197/0x280 [kunit] [ 2966.047110] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2966.050182] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2966.053248] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2966.056565] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2966.059627] kthread+0x2a7/0x350 [ 2966.062233] ? kthread_complete_and_exit+0x20/0x20 [ 2966.065169] ret_from_fork+0x22/0x30 [ 2966.068132] [ 2966.072524] Allocated by task 121855: [ 2966.075123] kasan_save_stack+0x1e/0x40 [ 2966.077748] __kasan_krealloc+0xee/0x160 [ 2966.080386] krealloc+0x50/0xe0 [ 2966.082842] krealloc_more_oob_helper+0x1d5/0x610 [test_kasan] [ 2966.085906] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2966.088713] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2966.091860] kthread+0x2a7/0x350 [ 2966.094308] ret_from_fork+0x22/0x30 [ 2966.098764] The buggy address belongs to the object at ffff88810e652400 which belongs to the cache kmalloc-256 of size 256 [ 2966.104767] The buggy address is located 235 bytes inside of 256-byte region [ffff88810e652400, ffff88810e652500) [ 2966.112497] The buggy address belongs to the physical page: [ 2966.115320] page:000000008f0e6a81 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10e652 [ 2966.119111] head:000000008f0e6a81 order:1 compound_mapcount:0 compound_pincount:0 [ 2966.122468] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2966.125839] raw: 0017ffffc0010200 dead000000000100 dead000000000122 ffff888100042b40 [ 2966.129460] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2966.132913] page dumped because: kasan: bad access detected [ 2966.137806] Memory state around the buggy address: [ 2966.140553] ffff88810e652380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.143903] ffff88810e652400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2966.147241] >ffff88810e652480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 2966.150552] ^ [ 2966.153726] ffff88810e652500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.157097] ffff88810e652580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.160470] ================================================================== [ 2966.164135] ================================================================== [ 2966.167544] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2966.171331] Write of size 1 at addr ffff88810e6524f0 by task kunit_try_catch/121855 [ 2966.176991] CPU: 3 PID: 121855 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2966.183878] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2966.187218] Call Trace: [ 2966.189622] [ 2966.191951] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2966.195208] dump_stack_lvl+0x57/0x81 [ 2966.197924] print_address_description.constprop.0+0x1f/0x1e0 [ 2966.200985] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2966.204283] print_report.cold+0x5c/0x237 [ 2966.207105] kasan_report+0xc9/0x100 [ 2966.209821] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2966.213148] krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2966.216462] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 2966.219618] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.222657] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.225699] ? lock_acquire+0x4ea/0x620 [ 2966.228517] ? rcu_read_unlock+0x40/0x40 [ 2966.231360] ? rcu_read_unlock+0x40/0x40 [ 2966.234166] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.237149] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2966.240360] ? do_raw_spin_lock+0x270/0x270 [ 2966.243251] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2966.246578] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2966.249634] ? kunit_add_resource+0x197/0x280 [kunit] [ 2966.252711] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2966.255727] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2966.258789] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2966.262095] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2966.265147] kthread+0x2a7/0x350 [ 2966.267710] ? kthread_complete_and_exit+0x20/0x20 [ 2966.270638] ret_from_fork+0x22/0x30 [ 2966.273258] [ 2966.277527] Allocated by task 121855: [ 2966.280075] kasan_save_stack+0x1e/0x40 [ 2966.282644] __kasan_krealloc+0xee/0x160 [ 2966.285087] krealloc+0x50/0xe0 [ 2966.287454] krealloc_more_oob_helper+0x1d5/0x610 [test_kasan] [ 2966.290495] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2966.293298] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2966.296382] kthread+0x2a7/0x350 [ 2966.298808] ret_from_fork+0x22/0x30 [ 2966.303261] The buggy address belongs to the object at ffff88810e652400 which belongs to the cache kmalloc-256 of size 256 [ 2966.309406] The buggy address is located 240 bytes inside of 256-byte region [ffff88810e652400, ffff88810e652500) [ 2966.317136] The buggy address belongs to the physical page: [ 2966.319964] page:000000008f0e6a81 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10e652 [ 2966.323697] head:000000008f0e6a81 order:1 compound_mapcount:0 compound_pincount:0 [ 2966.327060] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2966.330402] raw: 0017ffffc0010200 dead000000000100 dead000000000122 ffff888100042b40 [ 2966.333840] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2966.337278] page dumped because: kasan: bad access detected [ 2966.342172] Memory state around the buggy address: [ 2966.344944] ffff88810e652380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.348292] ffff88810e652400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2966.351523] >ffff88810e652480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 2966.354796] ^ [ 2966.358049] ffff88810e652500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.361419] ffff88810e652580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.364774] ================================================================== [ 2966.368258] ok 10 - krealloc_more_oob [ 2966.368590] ================================================================== [ 2966.373732] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2966.376635] Write of size 1 at addr ffff8881212f0cc9 by task kunit_try_catch/121856 [ 2966.381582] CPU: 0 PID: 121856 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2966.387509] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2966.390344] Call Trace: [ 2966.392558] [ 2966.394800] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2966.397824] dump_stack_lvl+0x57/0x81 [ 2966.400406] print_address_description.constprop.0+0x1f/0x1e0 [ 2966.403534] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2966.406762] print_report.cold+0x5c/0x237 [ 2966.409206] kasan_report+0xc9/0x100 [ 2966.411595] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2966.414754] krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2966.418168] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2966.421131] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.423996] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.426573] ? lock_acquire+0x4ea/0x620 [ 2966.429176] ? rcu_read_unlock+0x40/0x40 [ 2966.431852] ? rcu_read_unlock+0x40/0x40 [ 2966.434302] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.436983] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2966.439797] ? do_raw_spin_lock+0x270/0x270 [ 2966.442409] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2966.445678] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2966.448586] ? kunit_add_resource+0x197/0x280 [kunit] [ 2966.451389] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2966.453933] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2966.456511] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2966.459448] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2966.462046] kthread+0x2a7/0x350 [ 2966.464467] ? kthread_complete_and_exit+0x20/0x20 [ 2966.466961] ret_from_fork+0x22/0x30 [ 2966.469258] [ 2966.473251] Allocated by task 121856: [ 2966.475620] kasan_save_stack+0x1e/0x40 [ 2966.478068] __kasan_krealloc+0xee/0x160 [ 2966.480517] krealloc+0x50/0xe0 [ 2966.482916] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 2966.485387] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2966.487816] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2966.490580] kthread+0x2a7/0x350 [ 2966.492769] ret_from_fork+0x22/0x30 [ 2966.496924] The buggy address belongs to the object at ffff8881212f0c00 which belongs to the cache kmalloc-256 of size 256 [ 2966.501721] The buggy address is located 201 bytes inside of 256-byte region [ffff8881212f0c00, ffff8881212f0d00) [ 2966.508160] The buggy address belongs to the physical page: [ 2966.510863] page:00000000dfbc1367 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1212f0 [ 2966.513987] head:00000000dfbc1367 order:1 compound_mapcount:0 compound_pincount:0 [ 2966.516967] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2966.519531] raw: 0017ffffc0010200 ffffea00058a6600 dead000000000002 ffff888100042b40 [ 2966.522373] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2966.525756] page dumped because: kasan: bad access detected [ 2966.530632] Memory state around the buggy address: [ 2966.533336] ffff8881212f0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.536027] ffff8881212f0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2966.538901] >ffff8881212f0c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 2966.541893] ^ [ 2966.544696] ffff8881212f0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.547700] ffff8881212f0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.550330] ================================================================== [ 2966.553076] ================================================================== [ 2966.555664] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2966.559070] Write of size 1 at addr ffff8881212f0cd0 by task kunit_try_catch/121856 [ 2966.564139] CPU: 0 PID: 121856 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2966.569871] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2966.572843] Call Trace: [ 2966.575218] [ 2966.577408] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2966.580310] dump_stack_lvl+0x57/0x81 [ 2966.582842] print_address_description.constprop.0+0x1f/0x1e0 [ 2966.586184] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2966.589477] print_report.cold+0x5c/0x237 [ 2966.592389] kasan_report+0xc9/0x100 [ 2966.595064] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2966.598234] krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2966.601137] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2966.604378] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.607455] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.610286] ? lock_acquire+0x4ea/0x620 [ 2966.613035] ? rcu_read_unlock+0x40/0x40 [ 2966.615790] ? rcu_read_unlock+0x40/0x40 [ 2966.618705] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.621736] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2966.624526] ? do_raw_spin_lock+0x270/0x270 [ 2966.627043] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2966.629939] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2966.632846] ? kunit_add_resource+0x197/0x280 [kunit] [ 2966.635417] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2966.638017] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2966.640513] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2966.643369] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2966.646058] kthread+0x2a7/0x350 [ 2966.648273] ? kthread_complete_and_exit+0x20/0x20 [ 2966.650716] ret_from_fork+0x22/0x30 [ 2966.653012] [ 2966.657026] Allocated by task 121856: [ 2966.659250] kasan_save_stack+0x1e/0x40 [ 2966.661733] __kasan_krealloc+0xee/0x160 [ 2966.664212] krealloc+0x50/0xe0 [ 2966.666439] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 2966.668965] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2966.671212] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2966.673782] kthread+0x2a7/0x350 [ 2966.676118] ret_from_fork+0x22/0x30 [ 2966.680185] The buggy address belongs to the object at ffff8881212f0c00 which belongs to the cache kmalloc-256 of size 256 [ 2966.685350] The buggy address is located 208 bytes inside of 256-byte region [ffff8881212f0c00, ffff8881212f0d00) [ 2966.692190] The buggy address belongs to the physical page: [ 2966.694674] page:00000000dfbc1367 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1212f0 [ 2966.697416] head:00000000dfbc1367 order:1 compound_mapcount:0 compound_pincount:0 [ 2966.700342] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2966.703531] raw: 0017ffffc0010200 ffffea00058a6600 dead000000000002 ffff888100042b40 [ 2966.706686] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2966.709508] page dumped because: kasan: bad access detected [ 2966.713684] Memory state around the buggy address: [ 2966.716059] ffff8881212f0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.718722] ffff8881212f0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2966.721759] >ffff8881212f0c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 2966.724563] ^ [ 2966.726951] ffff8881212f0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.729703] ffff8881212f0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.732248] ================================================================== [ 2966.735038] ================================================================== [ 2966.737797] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2966.740649] Write of size 1 at addr ffff8881212f0cda by task kunit_try_catch/121856 [ 2966.745335] CPU: 0 PID: 121856 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2966.751075] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2966.754307] Call Trace: [ 2966.756478] [ 2966.758580] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2966.761417] dump_stack_lvl+0x57/0x81 [ 2966.764052] print_address_description.constprop.0+0x1f/0x1e0 [ 2966.766976] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2966.770187] print_report.cold+0x5c/0x237 [ 2966.772864] kasan_report+0xc9/0x100 [ 2966.775438] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2966.778769] krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2966.782167] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2966.785272] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.788384] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.790952] ? lock_acquire+0x4ea/0x620 [ 2966.793485] ? rcu_read_unlock+0x40/0x40 [ 2966.795942] ? rcu_read_unlock+0x40/0x40 [ 2966.798519] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.801112] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2966.803771] ? do_raw_spin_lock+0x270/0x270 [ 2966.806208] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2966.809008] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2966.811515] ? kunit_add_resource+0x197/0x280 [kunit] [ 2966.814314] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2966.817115] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2966.819687] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2966.822507] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2966.824974] kthread+0x2a7/0x350 [ 2966.827181] ? kthread_complete_and_exit+0x20/0x20 [ 2966.829792] ret_from_fork+0x22/0x30 [ 2966.832005] [ 2966.835996] Allocated by task 121856: [ 2966.838361] kasan_save_stack+0x1e/0x40 [ 2966.840850] __kasan_krealloc+0xee/0x160 [ 2966.843001] krealloc+0x50/0xe0 [ 2966.845194] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 2966.847571] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2966.849864] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2966.852237] kthread+0x2a7/0x350 [ 2966.854285] ret_from_fork+0x22/0x30 [ 2966.858280] The buggy address belongs to the object at ffff8881212f0c00 which belongs to the cache kmalloc-256 of size 256 [ 2966.863059] The buggy address is located 218 bytes inside of 256-byte region [ffff8881212f0c00, ffff8881212f0d00) [ 2966.869452] The buggy address belongs to the physical page: [ 2966.872097] page:00000000dfbc1367 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1212f0 [ 2966.875240] head:00000000dfbc1367 order:1 compound_mapcount:0 compound_pincount:0 [ 2966.878320] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2966.881098] raw: 0017ffffc0010200 ffffea00058a6600 dead000000000002 ffff888100042b40 [ 2966.883846] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2966.886428] page dumped because: kasan: bad access detected [ 2966.890657] Memory state around the buggy address: [ 2966.893294] ffff8881212f0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.896176] ffff8881212f0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2966.898917] >ffff8881212f0c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 2966.901422] ^ [ 2966.903986] ffff8881212f0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.906720] ffff8881212f0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2966.909698] ================================================================== [ 2966.912615] ================================================================== [ 2966.915770] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2966.918619] Write of size 1 at addr ffff8881212f0cea by task kunit_try_catch/121856 [ 2966.923392] CPU: 0 PID: 121856 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2966.929299] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2966.932193] Call Trace: [ 2966.934372] [ 2966.936497] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2966.939423] dump_stack_lvl+0x57/0x81 [ 2966.942067] print_address_description.constprop.0+0x1f/0x1e0 [ 2966.945109] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2966.947781] print_report.cold+0x5c/0x237 [ 2966.950187] kasan_report+0xc9/0x100 [ 2966.952586] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2966.955609] krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2966.958335] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2966.961255] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.964056] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.966855] ? lock_acquire+0x4ea/0x620 [ 2966.969623] ? rcu_read_unlock+0x40/0x40 [ 2966.972271] ? rcu_read_unlock+0x40/0x40 [ 2966.975147] ? rcu_read_lock_sched_held+0x12/0x80 [ 2966.978084] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2966.980923] ? do_raw_spin_lock+0x270/0x270 [ 2966.983562] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2966.986608] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2966.989400] ? kunit_add_resource+0x197/0x280 [kunit] [ 2966.992229] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2966.995208] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2966.997960] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2967.000884] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2967.003805] kthread+0x2a7/0x350 [ 2967.006495] ? kthread_complete_and_exit+0x20/0x20 [ 2967.009198] ret_from_fork+0x22/0x30 [ 2967.011666] [ 2967.015597] Allocated by task 121856: [ 2967.017840] kasan_save_stack+0x1e/0x40 [ 2967.020300] __kasan_krealloc+0xee/0x160 [ 2967.022702] krealloc+0x50/0xe0 [ 2967.024882] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 2967.027259] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2967.029593] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2967.032156] kthread+0x2a7/0x350 [ 2967.034312] ret_from_fork+0x22/0x30 [ 2967.038504] The buggy address belongs to the object at ffff8881212f0c00 which belongs to the cache kmalloc-256 of size 256 [ 2967.043385] The buggy address is located 234 bytes inside of 256-byte region [ffff8881212f0c00, ffff8881212f0d00) [ 2967.049970] The buggy address belongs to the physical page: [ 2967.052169] page:00000000dfbc1367 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1212f0 [ 2967.055028] head:00000000dfbc1367 order:1 compound_mapcount:0 compound_pincount:0 [ 2967.057839] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2967.060948] raw: 0017ffffc0010200 ffffea00058a6600 dead000000000002 ffff888100042b40 [ 2967.063722] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2967.066570] page dumped because: kasan: bad access detected [ 2967.070842] Memory state around the buggy address: [ 2967.073104] ffff8881212f0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2967.075648] ffff8881212f0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2967.078414] >ffff8881212f0c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 2967.081025] ^ [ 2967.083571] ffff8881212f0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2967.086182] ffff8881212f0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2967.088956] ================================================================== [ 2967.091905] ================================================================== [ 2967.095163] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2967.098474] Write of size 1 at addr ffff8881212f0ceb by task kunit_try_catch/121856 [ 2967.103141] CPU: 0 PID: 121856 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2967.108740] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2967.111837] Call Trace: [ 2967.114253] [ 2967.116375] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2967.119003] dump_stack_lvl+0x57/0x81 [ 2967.121344] print_address_description.constprop.0+0x1f/0x1e0 [ 2967.124068] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2967.126954] print_report.cold+0x5c/0x237 [ 2967.129740] kasan_report+0xc9/0x100 [ 2967.132401] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2967.135322] krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2967.138318] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2967.141134] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.144142] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.146913] ? lock_acquire+0x4ea/0x620 [ 2967.149651] ? rcu_read_unlock+0x40/0x40 [ 2967.152095] ? rcu_read_unlock+0x40/0x40 [ 2967.154472] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.156948] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2967.159802] ? do_raw_spin_lock+0x270/0x270 [ 2967.162577] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2967.165507] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2967.168232] ? kunit_add_resource+0x197/0x280 [kunit] [ 2967.170747] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2967.173627] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2967.176384] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2967.179075] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2967.181768] kthread+0x2a7/0x350 [ 2967.184136] ? kthread_complete_and_exit+0x20/0x20 [ 2967.186791] ret_from_fork+0x22/0x30 [ 2967.189137] [ 2967.193341] Allocated by task 121856: [ 2967.195824] kasan_save_stack+0x1e/0x40 [ 2967.198327] __kasan_krealloc+0xee/0x160 [ 2967.200549] krealloc+0x50/0xe0 [ 2967.202589] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 2967.205242] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2967.207871] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2967.210722] kthread+0x2a7/0x350 [ 2967.212803] ret_from_fork+0x22/0x30 [ 2967.216692] The buggy address belongs to the object at ffff8881212f0c00 which belongs to the cache kmalloc-256 of size 256 [ 2967.221728] The buggy address is located 235 bytes inside of 256-byte region [ffff8881212f0c00, ffff8881212f0d00) [ 2967.228141] The buggy address belongs to the physical page: [ 2967.230679] page:00000000dfbc1367 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1212f0 [ 2967.233724] head:00000000dfbc1367 order:1 compound_mapcount:0 compound_pincount:0 [ 2967.236432] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2967.239070] raw: 0017ffffc0010200 ffffea00058a6600 dead000000000002 ffff888100042b40 [ 2967.241769] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2967.244562] page dumped because: kasan: bad access detected [ 2967.249240] Memory state around the buggy address: [ 2967.251498] ffff8881212f0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2967.254295] ffff8881212f0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2967.257162] >ffff8881212f0c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 2967.259939] ^ [ 2967.262592] ffff8881212f0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2967.265213] ffff8881212f0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2967.267902] ================================================================== [ 2967.270911] ok 11 - krealloc_less_oob [ 2967.271267] ================================================================== [ 2967.277143] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2967.281044] Write of size 1 at addr ffff8881b3b2e0eb by task kunit_try_catch/121857 [ 2967.286829] CPU: 3 PID: 121857 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2967.293840] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2967.297249] Call Trace: [ 2967.299755] [ 2967.302150] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2967.305468] dump_stack_lvl+0x57/0x81 [ 2967.308247] print_address_description.constprop.0+0x1f/0x1e0 [ 2967.311530] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2967.314889] print_report.cold+0x5c/0x237 [ 2967.317774] kasan_report+0xc9/0x100 [ 2967.320571] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2967.323980] krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2967.327348] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 2967.330587] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.333721] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.336831] ? lock_acquire+0x4ea/0x620 [ 2967.339698] ? rcu_read_unlock+0x40/0x40 [ 2967.342584] ? rcu_read_unlock+0x40/0x40 [ 2967.345438] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.348482] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2967.351746] ? do_raw_spin_lock+0x270/0x270 [ 2967.354675] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2967.358069] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2967.361188] ? kunit_add_resource+0x197/0x280 [kunit] [ 2967.364321] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2967.367401] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2967.370515] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2967.373856] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2967.376942] kthread+0x2a7/0x350 [ 2967.379554] ? kthread_complete_and_exit+0x20/0x20 [ 2967.382519] ret_from_fork+0x22/0x30 [ 2967.385178] [ 2967.389570] The buggy address belongs to the physical page: [ 2967.392641] page:0000000057d3845e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b3b2c [ 2967.396655] head:0000000057d3845e order:2 compound_mapcount:0 compound_pincount:0 [ 2967.400202] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 2967.403671] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2967.407328] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2967.410951] page dumped because: kasan: bad access detected [ 2967.416274] Memory state around the buggy address: [ 2967.419212] ffff8881b3b2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2967.422755] ffff8881b3b2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2967.426248] >ffff8881b3b2e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 2967.429650] ^ [ 2967.432930] ffff8881b3b2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2967.436344] ffff8881b3b2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2967.439681] ================================================================== [ 2967.443084] ================================================================== [ 2967.446101] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2967.449827] Write of size 1 at addr ffff8881b3b2e0f0 by task kunit_try_catch/121857 [ 2967.455305] CPU: 3 PID: 121857 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2967.461969] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2967.465213] Call Trace: [ 2967.467531] [ 2967.469758] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2967.472946] dump_stack_lvl+0x57/0x81 [ 2967.475561] print_address_description.constprop.0+0x1f/0x1e0 [ 2967.478701] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2967.481926] print_report.cold+0x5c/0x237 [ 2967.484677] kasan_report+0xc9/0x100 [ 2967.487306] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2967.490566] krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2967.493801] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 2967.496883] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.499836] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.502770] ? lock_acquire+0x4ea/0x620 [ 2967.505466] ? rcu_read_unlock+0x40/0x40 [ 2967.508189] ? rcu_read_unlock+0x40/0x40 [ 2967.510891] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.513769] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2967.516855] ? do_raw_spin_lock+0x270/0x270 [ 2967.519598] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2967.522828] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2967.525707] ? kunit_add_resource+0x197/0x280 [kunit] [ 2967.528676] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2967.531607] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2967.534616] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2967.537863] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2967.540853] kthread+0x2a7/0x350 [ 2967.543362] ? kthread_complete_and_exit+0x20/0x20 [ 2967.546228] ret_from_fork+0x22/0x30 [ 2967.548735] [ 2967.552958] The buggy address belongs to the physical page: [ 2967.555925] page:0000000057d3845e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b3b2c [ 2967.559835] head:0000000057d3845e order:2 compound_mapcount:0 compound_pincount:0 [ 2967.563295] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 2967.566669] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2967.570274] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2967.573859] page dumped because: kasan: bad access detected [ 2967.579058] Memory state around the buggy address: [ 2967.581965] ffff8881b3b2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2967.585485] ffff8881b3b2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2967.588965] >ffff8881b3b2e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 2967.592390] ^ [ 2967.595708] ffff8881b3b2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2967.599107] ffff8881b3b2e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2967.602423] ================================================================== [ 2967.606360] ok 12 - krealloc_pagealloc_more_oob [ 2967.609649] ================================================================== [ 2967.614854] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2967.617972] Write of size 1 at addr ffff8881bd1f60c9 by task kunit_try_catch/121858 [ 2967.622791] CPU: 0 PID: 121858 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2967.628426] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2967.631572] Call Trace: [ 2967.633913] [ 2967.636104] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2967.638653] dump_stack_lvl+0x57/0x81 [ 2967.641023] print_address_description.constprop.0+0x1f/0x1e0 [ 2967.643580] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2967.646179] print_report.cold+0x5c/0x237 [ 2967.648678] kasan_report+0xc9/0x100 [ 2967.651014] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2967.653907] krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2967.656871] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2967.659631] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.662549] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.665375] ? lock_acquire+0x4ea/0x620 [ 2967.667928] ? rcu_read_unlock+0x40/0x40 [ 2967.670304] ? rcu_read_unlock+0x40/0x40 [ 2967.672644] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.675089] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2967.677923] ? do_raw_spin_lock+0x270/0x270 [ 2967.680437] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2967.683255] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2967.686164] ? kunit_add_resource+0x197/0x280 [kunit] [ 2967.688922] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2967.691724] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2967.694556] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2967.697497] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2967.700038] kthread+0x2a7/0x350 [ 2967.702513] ? kthread_complete_and_exit+0x20/0x20 [ 2967.704971] ret_from_fork+0x22/0x30 [ 2967.707278] [ 2967.711497] The buggy address belongs to the physical page: [ 2967.714038] page:000000004d338e6c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1bd1f4 [ 2967.717026] head:000000004d338e6c order:2 compound_mapcount:0 compound_pincount:0 [ 2967.719876] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 2967.722919] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2967.725991] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2967.729451] page dumped because: kasan: bad access detected [ 2967.734608] Memory state around the buggy address: [ 2967.737453] ffff8881bd1f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2967.740820] ffff8881bd1f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2967.743988] >ffff8881bd1f6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 2967.747060] ^ [ 2967.749944] ffff8881bd1f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2967.753088] ffff8881bd1f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2967.755773] ================================================================== [ 2967.758538] ================================================================== [ 2967.761344] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2967.764876] Write of size 1 at addr ffff8881bd1f60d0 by task kunit_try_catch/121858 [ 2967.769948] CPU: 0 PID: 121858 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2967.775820] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2967.778637] Call Trace: [ 2967.780936] [ 2967.783125] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2967.786179] dump_stack_lvl+0x57/0x81 [ 2967.788542] print_address_description.constprop.0+0x1f/0x1e0 [ 2967.791526] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2967.794448] print_report.cold+0x5c/0x237 [ 2967.796982] kasan_report+0xc9/0x100 [ 2967.799536] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2967.802682] krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2967.805426] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2967.808305] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.810745] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.813571] ? lock_acquire+0x4ea/0x620 [ 2967.816234] ? rcu_read_unlock+0x40/0x40 [ 2967.818879] ? rcu_read_unlock+0x40/0x40 [ 2967.821483] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.824259] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2967.827147] ? do_raw_spin_lock+0x270/0x270 [ 2967.829787] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2967.832366] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2967.835117] ? kunit_add_resource+0x197/0x280 [kunit] [ 2967.837922] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2967.840751] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2967.843661] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2967.846737] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2967.849550] kthread+0x2a7/0x350 [ 2967.851997] ? kthread_complete_and_exit+0x20/0x20 [ 2967.854764] ret_from_fork+0x22/0x30 [ 2967.857153] [ 2967.861243] The buggy address belongs to the physical page: [ 2967.863993] page:000000004d338e6c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1bd1f4 [ 2967.867517] head:000000004d338e6c order:2 compound_mapcount:0 compound_pincount:0 [ 2967.870700] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 2967.873579] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2967.877065] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2967.880446] page dumped because: kasan: bad access detected [ 2967.885218] Memory state around the buggy address: [ 2967.887802] ffff8881bd1f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2967.891099] ffff8881bd1f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2967.894095] >ffff8881bd1f6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 2967.897168] ^ [ 2967.899797] ffff8881bd1f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2967.902827] ffff8881bd1f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2967.906001] ================================================================== [ 2967.908813] ================================================================== [ 2967.911812] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2967.915301] Write of size 1 at addr ffff8881bd1f60da by task kunit_try_catch/121858 [ 2967.921026] CPU: 0 PID: 121858 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2967.927374] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2967.930208] Call Trace: [ 2967.932702] [ 2967.935108] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2967.938253] dump_stack_lvl+0x57/0x81 [ 2967.941003] print_address_description.constprop.0+0x1f/0x1e0 [ 2967.943748] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2967.946855] print_report.cold+0x5c/0x237 [ 2967.949295] kasan_report+0xc9/0x100 [ 2967.951879] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2967.954939] krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2967.958058] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2967.960921] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.963549] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.966380] ? lock_acquire+0x4ea/0x620 [ 2967.968954] ? rcu_read_unlock+0x40/0x40 [ 2967.971545] ? rcu_read_unlock+0x40/0x40 [ 2967.974089] ? rcu_read_lock_sched_held+0x12/0x80 [ 2967.976873] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2967.979589] ? do_raw_spin_lock+0x270/0x270 [ 2967.982089] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2967.984927] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2967.987725] ? kunit_add_resource+0x197/0x280 [kunit] [ 2967.990581] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2967.993374] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2967.996122] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2967.999206] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2968.002030] kthread+0x2a7/0x350 [ 2968.004462] ? kthread_complete_and_exit+0x20/0x20 [ 2968.007118] ret_from_fork+0x22/0x30 [ 2968.009371] [ 2968.013204] The buggy address belongs to the physical page: [ 2968.016080] page:000000004d338e6c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1bd1f4 [ 2968.019552] head:000000004d338e6c order:2 compound_mapcount:0 compound_pincount:0 [ 2968.022610] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 2968.025800] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2968.029205] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2968.032188] page dumped because: kasan: bad access detected [ 2968.036900] Memory state around the buggy address: [ 2968.039502] ffff8881bd1f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2968.042458] ffff8881bd1f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2968.045631] >ffff8881bd1f6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 2968.048795] ^ [ 2968.051587] ffff8881bd1f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2968.054889] ffff8881bd1f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2968.058100] ================================================================== [ 2968.061116] ================================================================== [ 2968.064202] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2968.067169] Write of size 1 at addr ffff8881bd1f60ea by task kunit_try_catch/121858 [ 2968.072392] CPU: 0 PID: 121858 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2968.077956] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2968.081060] Call Trace: [ 2968.083348] [ 2968.085539] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2968.088578] dump_stack_lvl+0x57/0x81 [ 2968.091119] print_address_description.constprop.0+0x1f/0x1e0 [ 2968.094112] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2968.097017] print_report.cold+0x5c/0x237 [ 2968.099626] kasan_report+0xc9/0x100 [ 2968.101956] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2968.104670] krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2968.107783] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2968.110708] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.113208] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.116043] ? lock_acquire+0x4ea/0x620 [ 2968.118434] ? rcu_read_unlock+0x40/0x40 [ 2968.120940] ? rcu_read_unlock+0x40/0x40 [ 2968.123382] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.126100] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2968.129062] ? do_raw_spin_lock+0x270/0x270 [ 2968.131729] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2968.134793] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2968.137379] ? kunit_add_resource+0x197/0x280 [kunit] [ 2968.140235] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2968.143061] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2968.145957] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2968.148896] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2968.151458] kthread+0x2a7/0x350 [ 2968.153671] ? kthread_complete_and_exit+0x20/0x20 [ 2968.156448] ret_from_fork+0x22/0x30 [ 2968.158942] [ 2968.163054] The buggy address belongs to the physical page: [ 2968.165726] page:000000004d338e6c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1bd1f4 [ 2968.168966] head:000000004d338e6c order:2 compound_mapcount:0 compound_pincount:0 [ 2968.172090] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 2968.175153] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2968.178072] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2968.180855] page dumped because: kasan: bad access detected [ 2968.185865] Memory state around the buggy address: [ 2968.188582] ffff8881bd1f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2968.191653] ffff8881bd1f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2968.194941] >ffff8881bd1f6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 2968.198141] ^ [ 2968.200704] ffff8881bd1f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2968.203328] ffff8881bd1f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2968.205889] ================================================================== [ 2968.208499] ================================================================== [ 2968.211024] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2968.213891] Write of size 1 at addr ffff8881bd1f60eb by task kunit_try_catch/121858 [ 2968.218766] CPU: 0 PID: 121858 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2968.224180] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2968.227199] Call Trace: [ 2968.229486] [ 2968.231680] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2968.234366] dump_stack_lvl+0x57/0x81 [ 2968.236577] print_address_description.constprop.0+0x1f/0x1e0 [ 2968.239137] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2968.241687] print_report.cold+0x5c/0x237 [ 2968.243989] kasan_report+0xc9/0x100 [ 2968.246238] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2968.249072] krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2968.251913] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2968.254616] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.257377] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.260009] ? lock_acquire+0x4ea/0x620 [ 2968.262647] ? rcu_read_unlock+0x40/0x40 [ 2968.265278] ? rcu_read_unlock+0x40/0x40 [ 2968.267763] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.270324] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2968.272850] ? do_raw_spin_lock+0x270/0x270 [ 2968.275130] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2968.277646] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2968.280058] ? kunit_add_resource+0x197/0x280 [kunit] [ 2968.282466] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2968.284871] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2968.287313] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2968.289891] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2968.292308] kthread+0x2a7/0x350 [ 2968.294470] ? kthread_complete_and_exit+0x20/0x20 [ 2968.296773] ret_from_fork+0x22/0x30 [ 2968.298954] [ 2968.302771] The buggy address belongs to the physical page: [ 2968.305143] page:000000004d338e6c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1bd1f4 [ 2968.308067] head:000000004d338e6c order:2 compound_mapcount:0 compound_pincount:0 [ 2968.310732] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 2968.313412] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2968.316534] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2968.319399] page dumped because: kasan: bad access detected [ 2968.323955] Memory state around the buggy address: [ 2968.326652] ffff8881bd1f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2968.329922] ffff8881bd1f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2968.332598] >ffff8881bd1f6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 2968.335305] ^ [ 2968.337953] ffff8881bd1f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2968.340763] ffff8881bd1f6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2968.343409] ================================================================== [ 2968.346308] ok 13 - krealloc_pagealloc_less_oob [ 2968.346960] ================================================================== [ 2968.353203] BUG: KASAN: use-after-free in krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2968.356658] Read of size 1 at addr ffff88810e653800 by task kunit_try_catch/121859 [ 2968.362229] CPU: 3 PID: 121859 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2968.369023] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2968.372330] Call Trace: [ 2968.374708] [ 2968.376987] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2968.379952] dump_stack_lvl+0x57/0x81 [ 2968.382593] print_address_description.constprop.0+0x1f/0x1e0 [ 2968.385787] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2968.388788] print_report.cold+0x5c/0x237 [ 2968.391560] kasan_report+0xc9/0x100 [ 2968.394260] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2968.397215] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2968.400194] __kasan_check_byte+0x36/0x50 [ 2968.402965] krealloc+0x2e/0xe0 [ 2968.405497] krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2968.408409] ? kmalloc_memmove_negative_size+0x290/0x290 [test_kasan] [ 2968.411792] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.414717] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.417605] ? lock_acquire+0x4ea/0x620 [ 2968.420279] ? rcu_read_unlock+0x40/0x40 [ 2968.422963] ? rcu_read_unlock+0x40/0x40 [ 2968.425620] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.428463] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2968.431496] ? do_raw_spin_lock+0x270/0x270 [ 2968.434223] ? trace_hardirqs_on+0x2d/0x160 [ 2968.436946] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2968.439859] ? kunit_add_resource+0x197/0x280 [kunit] [ 2968.442764] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2968.445609] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2968.448468] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2968.451558] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2968.454437] kthread+0x2a7/0x350 [ 2968.456838] ? kthread_complete_and_exit+0x20/0x20 [ 2968.459593] ret_from_fork+0x22/0x30 [ 2968.462094] [ 2968.466199] Allocated by task 121859: [ 2968.468660] kasan_save_stack+0x1e/0x40 [ 2968.471169] __kasan_kmalloc+0x81/0xa0 [ 2968.473628] krealloc_uaf+0xaa/0x450 [test_kasan] [ 2968.476342] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2968.479079] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2968.481967] kthread+0x2a7/0x350 [ 2968.484280] ret_from_fork+0x22/0x30 [ 2968.488473] Freed by task 121859: [ 2968.490699] kasan_save_stack+0x1e/0x40 [ 2968.493007] kasan_set_track+0x21/0x30 [ 2968.495236] kasan_set_free_info+0x20/0x40 [ 2968.497511] __kasan_slab_free+0x108/0x170 [ 2968.499746] slab_free_freelist_hook+0x11d/0x1d0 [ 2968.502153] kfree+0xe2/0x3c0 [ 2968.504162] krealloc_uaf+0x147/0x450 [test_kasan] [ 2968.506595] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2968.509049] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2968.511795] kthread+0x2a7/0x350 [ 2968.513853] ret_from_fork+0x22/0x30 [ 2968.517635] The buggy address belongs to the object at ffff88810e653800 which belongs to the cache kmalloc-256 of size 256 [ 2968.523233] The buggy address is located 0 bytes inside of 256-byte region [ffff88810e653800, ffff88810e653900) [ 2968.530368] The buggy address belongs to the physical page: [ 2968.533053] page:000000008f0e6a81 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10e652 [ 2968.536718] head:000000008f0e6a81 order:1 compound_mapcount:0 compound_pincount:0 [ 2968.539948] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2968.543200] raw: 0017ffffc0010200 dead000000000100 dead000000000122 ffff888100042b40 [ 2968.546559] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2968.549960] page dumped because: kasan: bad access detected [ 2968.554769] Memory state around the buggy address: [ 2968.557478] ffff88810e653700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2968.560800] ffff88810e653780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2968.564091] >ffff88810e653800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2968.567380] ^ [ 2968.569724] ffff88810e653880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2968.573048] ffff88810e653900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2968.576344] ================================================================== [ 2968.579821] ================================================================== [ 2968.583120] BUG: KASAN: use-after-free in krealloc_uaf+0x42e/0x450 [test_kasan] [ 2968.586463] Read of size 1 at addr ffff88810e653800 by task kunit_try_catch/121859 [ 2968.591890] CPU: 3 PID: 121859 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2968.598636] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2968.601948] Call Trace: [ 2968.604329] [ 2968.606627] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 2968.609600] dump_stack_lvl+0x57/0x81 [ 2968.612257] print_address_description.constprop.0+0x1f/0x1e0 [ 2968.615422] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 2968.618420] print_report.cold+0x5c/0x237 [ 2968.621201] kasan_report+0xc9/0x100 [ 2968.623883] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 2968.626916] krealloc_uaf+0x42e/0x450 [test_kasan] [ 2968.629915] ? kmalloc_memmove_negative_size+0x290/0x290 [test_kasan] [ 2968.633316] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.636305] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.639278] ? lock_acquire+0x4ea/0x620 [ 2968.642044] ? rcu_read_unlock+0x40/0x40 [ 2968.644825] ? rcu_read_unlock+0x40/0x40 [ 2968.647561] ? rcu_read_lock_sched_held+0x12/0x80 [ 2968.650480] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2968.653610] ? do_raw_spin_lock+0x270/0x270 [ 2968.656429] ? kunit_ptr_not_err_assert_format+0x210/0x210 [kunit] [ 2968.659719] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2968.662725] ? kunit_add_resource+0x197/0x280 [kunit] [ 2968.665747] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2968.668709] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2968.671713] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2968.674946] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2968.677931] kthread+0x2a7/0x350 [ 2968.680443] ? kthread_complete_and_exit+0x20/0x20 [ 2968.683315] ret_from_fork+0x22/0x30 [ 2968.685890] [ 2968.690086] Allocated by task 121859: [ 2968.692582] kasan_save_stack+0x1e/0x40 [ 2968.695115] __kasan_kmalloc+0x81/0xa0 [ 2968.697595] krealloc_uaf+0xaa/0x450 [test_kasan] [ 2968.700335] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2968.703095] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2968.706151] kthread+0x2a7/0x350 [ 2968.708516] ret_from_fork+0x22/0x30 [ 2968.712878] Freed by task 121859: [ 2968.715240] kasan_save_stack+0x1e/0x40 [ 2968.717680] kasan_set_track+0x21/0x30 [ 2968.720084] kasan_set_free_info+0x20/0x40 [ 2968.722526] __kasan_slab_free+0x108/0x170 [ 2968.724923] slab_free_freelist_hook+0x11d/0x1d0 [ 2968.727397] kfree+0xe2/0x3c0 [ 2968.729459] krealloc_uaf+0x147/0x450 [test_kasan] [ 2968.731946] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2968.734461] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2968.737284] kthread+0x2a7/0x350 [ 2968.739435] ret_from_fork+0x22/0x30 [ 2968.743341] The buggy address belongs to the object at ffff88810e653800 which belongs to the cache kmalloc-256 of size 256 [ 2968.748958] The buggy address is located 0 bytes inside of 256-byte region [ffff88810e653800, ffff88810e653900) [ 2968.756136] The buggy address belongs to the physical page: [ 2968.758822] page:000000008f0e6a81 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10e652 [ 2968.762465] head:000000008f0e6a81 order:1 compound_mapcount:0 compound_pincount:0 [ 2968.765705] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2968.768969] raw: 0017ffffc0010200 dead000000000100 dead000000000122 ffff888100042b40 [ 2968.772347] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2968.775746] page dumped because: kasan: bad access detected [ 2968.780610] Memory state around the buggy address: [ 2968.783327] ffff88810e653700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2968.786642] ffff88810e653780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2968.789933] >ffff88810e653800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2968.793205] ^ [ 2968.795549] ffff88810e653880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2968.798844] ffff88810e653900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2968.802142] ================================================================== [ 2968.805641] ok 14 - krealloc_uaf [ 2968.806367] ================================================================== [ 2968.811853] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 2968.814954] Write of size 16 at addr ffff888166bd6dc0 by task kunit_try_catch/121860 [ 2968.820333] CPU: 0 PID: 121860 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2968.826903] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2968.830125] Call Trace: [ 2968.832530] [ 2968.834646] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 2968.837387] dump_stack_lvl+0x57/0x81 [ 2968.840090] print_address_description.constprop.0+0x1f/0x1e0 [ 2968.843074] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 2968.846259] print_report.cold+0x5c/0x237 [ 2968.849288] kasan_report+0xc9/0x100 [ 2968.852102] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 2968.855386] kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 2968.858640] ? kmalloc_uaf_16+0x3b0/0x3b0 [test_kasan] [ 2968.861747] ? do_raw_spin_trylock+0xb5/0x180 [ 2968.864888] ? do_raw_spin_lock+0x270/0x270 [ 2968.867879] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2968.871167] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2968.874377] ? kunit_add_resource+0x197/0x280 [kunit] [ 2968.877341] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2968.879915] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2968.882815] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2968.885812] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2968.888852] kthread+0x2a7/0x350 [ 2968.891204] ? kthread_complete_and_exit+0x20/0x20 [ 2968.893803] ret_from_fork+0x22/0x30 [ 2968.896424] [ 2968.900957] Allocated by task 121860: [ 2968.903546] kasan_save_stack+0x1e/0x40 [ 2968.906041] __kasan_kmalloc+0x81/0xa0 [ 2968.908435] kmalloc_oob_16+0xa4/0x3b0 [test_kasan] [ 2968.911173] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2968.913752] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2968.916676] kthread+0x2a7/0x350 [ 2968.918973] ret_from_fork+0x22/0x30 [ 2968.923290] The buggy address belongs to the object at ffff888166bd6dc0 which belongs to the cache kmalloc-16 of size 16 [ 2968.928715] The buggy address is located 0 bytes inside of 16-byte region [ffff888166bd6dc0, ffff888166bd6dd0) [ 2968.935818] The buggy address belongs to the physical page: [ 2968.938341] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2968.941416] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2968.944429] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2968.947613] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2968.950614] page dumped because: kasan: bad access detected [ 2968.955260] Memory state around the buggy address: [ 2968.957843] ffff888166bd6c80: fc fc fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 2968.960441] ffff888166bd6d00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2968.963364] >ffff888166bd6d80: 00 00 fc fc fc fc fc fc 00 05 fc fc fa fb fc fc [ 2968.966395] ^ [ 2968.968942] ffff888166bd6e00: fc fc fc fc fc fc fc fc fa fb fc fc fa fb fc fc [ 2968.972164] ffff888166bd6e80: 00 00 fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2968.974752] ================================================================== [ 2968.977694] ok 15 - kmalloc_oob_16 [ 2968.977975] ================================================================== [ 2968.983340] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 2968.986623] Read of size 16 at addr ffff8881206b1680 by task kunit_try_catch/121861 [ 2968.992046] CPU: 1 PID: 121861 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2968.998037] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2969.001288] Call Trace: [ 2969.003695] [ 2969.006022] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 2969.008811] dump_stack_lvl+0x57/0x81 [ 2969.011377] print_address_description.constprop.0+0x1f/0x1e0 [ 2969.014449] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 2969.017008] print_report.cold+0x5c/0x237 [ 2969.019477] kasan_report+0xc9/0x100 [ 2969.022174] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 2969.025196] kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 2969.028113] ? kmalloc_uaf+0x2b0/0x2b0 [test_kasan] [ 2969.031083] ? do_raw_spin_trylock+0xb5/0x180 [ 2969.033661] ? do_raw_spin_lock+0x270/0x270 [ 2969.036418] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2969.039571] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2969.042530] ? kunit_add_resource+0x197/0x280 [kunit] [ 2969.045497] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2969.048454] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2969.051454] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2969.054624] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2969.057607] kthread+0x2a7/0x350 [ 2969.060216] ? kthread_complete_and_exit+0x20/0x20 [ 2969.063006] ret_from_fork+0x22/0x30 [ 2969.065548] [ 2969.069973] Allocated by task 121861: [ 2969.072423] kasan_save_stack+0x1e/0x40 [ 2969.075020] __kasan_kmalloc+0x81/0xa0 [ 2969.077524] kmalloc_uaf_16+0x15d/0x3b0 [test_kasan] [ 2969.080333] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2969.083072] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2969.086087] kthread+0x2a7/0x350 [ 2969.088496] ret_from_fork+0x22/0x30 [ 2969.092891] Freed by task 121861: [ 2969.095172] kasan_save_stack+0x1e/0x40 [ 2969.097653] kasan_set_track+0x21/0x30 [ 2969.100090] kasan_set_free_info+0x20/0x40 [ 2969.102356] __kasan_slab_free+0x108/0x170 [ 2969.104517] slab_free_freelist_hook+0x11d/0x1d0 [ 2969.106899] kfree+0xe2/0x3c0 [ 2969.109099] kmalloc_uaf_16+0x1e8/0x3b0 [test_kasan] [ 2969.111673] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2969.114177] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2969.117179] kthread+0x2a7/0x350 [ 2969.119528] ret_from_fork+0x22/0x30 [ 2969.123500] The buggy address belongs to the object at ffff8881206b1680 which belongs to the cache kmalloc-16 of size 16 [ 2969.128773] The buggy address is located 0 bytes inside of 16-byte region [ffff8881206b1680, ffff8881206b1690) [ 2969.135161] The buggy address belongs to the physical page: [ 2969.137646] page:0000000060a4d0db refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1206b1 [ 2969.141076] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2969.144007] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2969.147020] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2969.150181] page dumped because: kasan: bad access detected [ 2969.154655] Memory state around the buggy address: [ 2969.156879] ffff8881206b1580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 2969.159753] ffff8881206b1600: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 2969.162519] >ffff8881206b1680: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 2969.165264] ^ [ 2969.167365] ffff8881206b1700: fa fb fc fc fc fc fc fc fa fb fc fc 00 00 fc fc [ 2969.170181] ffff8881206b1780: fc fc fc fc fc fc fc fc 00 00 fc fc fc fc fc fc [ 2969.173242] ================================================================== [ 2969.176536] ok 16 - kmalloc_uaf_16 [ 2969.176832] ================================================================== [ 2969.182337] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 2969.185556] Write of size 128 at addr ffff888143e2fd00 by task kunit_try_catch/121862 [ 2969.190478] CPU: 0 PID: 121862 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2969.196760] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2969.199769] Call Trace: [ 2969.201943] [ 2969.204227] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 2969.207189] dump_stack_lvl+0x57/0x81 [ 2969.209683] print_address_description.constprop.0+0x1f/0x1e0 [ 2969.212570] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 2969.215238] print_report.cold+0x5c/0x237 [ 2969.217868] kasan_report+0xc9/0x100 [ 2969.220473] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 2969.223382] kasan_check_range+0xfd/0x1e0 [ 2969.225976] memset+0x20/0x50 [ 2969.228538] kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 2969.231241] ? kmalloc_oob_memset_2+0x290/0x290 [test_kasan] [ 2969.234357] ? do_raw_spin_trylock+0xb5/0x180 [ 2969.237195] ? do_raw_spin_lock+0x270/0x270 [ 2969.239916] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2969.243078] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2969.246097] ? kunit_add_resource+0x197/0x280 [kunit] [ 2969.248813] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2969.251823] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2969.254746] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2969.257661] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2969.260499] kthread+0x2a7/0x350 [ 2969.262975] ? kthread_complete_and_exit+0x20/0x20 [ 2969.265538] ret_from_fork+0x22/0x30 [ 2969.267962] [ 2969.272411] Allocated by task 121862: [ 2969.274983] kasan_save_stack+0x1e/0x40 [ 2969.277589] __kasan_kmalloc+0x81/0xa0 [ 2969.280217] kmalloc_oob_in_memset+0x9c/0x280 [test_kasan] [ 2969.282785] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2969.285217] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2969.287713] kthread+0x2a7/0x350 [ 2969.289910] ret_from_fork+0x22/0x30 [ 2969.294056] The buggy address belongs to the object at ffff888143e2fd00 which belongs to the cache kmalloc-128 of size 128 [ 2969.299050] The buggy address is located 0 bytes inside of 128-byte region [ffff888143e2fd00, ffff888143e2fd80) [ 2969.305982] The buggy address belongs to the physical page: [ 2969.308571] page:00000000f1da1adc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x143e2f [ 2969.311624] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2969.314384] raw: 0017ffffc0000200 ffffea0006eb5700 dead000000000005 ffff8881000428c0 [ 2969.317398] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2969.320207] page dumped because: kasan: bad access detected [ 2969.324444] Memory state around the buggy address: [ 2969.326757] ffff888143e2fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2969.329360] ffff888143e2fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2969.332185] >ffff888143e2fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 2969.334787] ^ [ 2969.337528] ffff888143e2fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2969.340231] ffff888143e2fe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2969.343088] ================================================================== [ 2969.345875] ok 17 - kmalloc_oob_in_memset [ 2969.347033] ================================================================== [ 2969.352858] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 2969.356132] Write of size 2 at addr ffff8881bad5c577 by task kunit_try_catch/121863 [ 2969.361222] CPU: 0 PID: 121863 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2969.367483] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2969.370349] Call Trace: [ 2969.372841] [ 2969.375215] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 2969.378098] dump_stack_lvl+0x57/0x81 [ 2969.380818] print_address_description.constprop.0+0x1f/0x1e0 [ 2969.383526] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 2969.386364] print_report.cold+0x5c/0x237 [ 2969.389114] kasan_report+0xc9/0x100 [ 2969.391824] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 2969.395256] kasan_check_range+0xfd/0x1e0 [ 2969.398165] memset+0x20/0x50 [ 2969.400938] kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 2969.404073] ? kmalloc_oob_memset_4+0x290/0x290 [test_kasan] [ 2969.407471] ? do_raw_spin_trylock+0xb5/0x180 [ 2969.410685] ? do_raw_spin_lock+0x270/0x270 [ 2969.413836] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2969.417294] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2969.420173] ? kunit_add_resource+0x197/0x280 [kunit] [ 2969.423136] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2969.426275] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2969.429033] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2969.432157] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2969.435202] kthread+0x2a7/0x350 [ 2969.437863] ? kthread_complete_and_exit+0x20/0x20 [ 2969.440834] ret_from_fork+0x22/0x30 [ 2969.443564] [ 2969.448147] Allocated by task 121863: [ 2969.450755] kasan_save_stack+0x1e/0x40 [ 2969.453383] __kasan_kmalloc+0x81/0xa0 [ 2969.455900] kmalloc_oob_memset_2+0x9c/0x290 [test_kasan] [ 2969.458891] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2969.461662] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2969.464765] kthread+0x2a7/0x350 [ 2969.467351] ret_from_fork+0x22/0x30 [ 2969.472349] Last potentially related work creation: [ 2969.475196] kasan_save_stack+0x1e/0x40 [ 2969.477956] __kasan_record_aux_stack+0x96/0xb0 [ 2969.480768] insert_work+0x47/0x310 [ 2969.483063] __queue_work+0x4dd/0xd60 [ 2969.485497] rcu_work_rcufn+0x42/0x70 [ 2969.487735] rcu_do_batch+0x3c5/0xdc0 [ 2969.490096] rcu_core+0x3de/0x5a0 [ 2969.492078] __do_softirq+0x2d3/0x9a8 [ 2969.496068] Second to last potentially related work creation: [ 2969.498417] kasan_save_stack+0x1e/0x40 [ 2969.500418] __kasan_record_aux_stack+0x96/0xb0 [ 2969.502708] call_rcu+0xee/0x890 [ 2969.504710] queue_rcu_work+0x5a/0x70 [ 2969.506916] writeback_sb_inodes+0x373/0xd00 [ 2969.509221] wb_writeback+0x25a/0xa10 [ 2969.511306] wb_do_writeback+0x1dd/0x8a0 [ 2969.513535] wb_workfn+0x12c/0x670 [ 2969.515385] process_one_work+0x8e5/0x1520 [ 2969.517625] worker_thread+0x59e/0xf90 [ 2969.519454] kthread+0x2a7/0x350 [ 2969.521217] ret_from_fork+0x22/0x30 [ 2969.524512] The buggy address belongs to the object at ffff8881bad5c500 which belongs to the cache kmalloc-128 of size 128 [ 2969.529009] The buggy address is located 119 bytes inside of 128-byte region [ffff8881bad5c500, ffff8881bad5c580) [ 2969.535495] The buggy address belongs to the physical page: [ 2969.537649] page:000000000f3d8944 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1bad5c [ 2969.541571] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2969.544994] raw: 0017ffffc0000200 ffffea00041503c0 dead000000000004 ffff8881000428c0 [ 2969.548334] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2969.551652] page dumped because: kasan: bad access detected [ 2969.556368] Memory state around the buggy address: [ 2969.559019] ffff8881bad5c400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2969.562288] ffff8881bad5c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2969.565581] >ffff8881bad5c500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 2969.568858] ^ [ 2969.572140] ffff8881bad5c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2969.575464] ffff8881bad5c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2969.578786] ================================================================== [ 2969.582251] ok 18 - kmalloc_oob_memset_2 [ 2969.582524] ================================================================== [ 2969.588643] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 2969.592329] Write of size 4 at addr ffff888143d31d75 by task kunit_try_catch/121864 [ 2969.600220] CPU: 1 PID: 121864 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2969.607109] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2969.610464] Call Trace: [ 2969.612994] [ 2969.615487] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 2969.618787] dump_stack_lvl+0x57/0x81 [ 2969.621676] print_address_description.constprop.0+0x1f/0x1e0 [ 2969.625099] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 2969.628532] print_report.cold+0x5c/0x237 [ 2969.631525] kasan_report+0xc9/0x100 [ 2969.634399] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 2969.637773] kasan_check_range+0xfd/0x1e0 [ 2969.640484] memset+0x20/0x50 [ 2969.643204] kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 2969.646611] ? kmalloc_oob_memset_8+0x290/0x290 [test_kasan] [ 2969.650045] ? do_raw_spin_trylock+0xb5/0x180 [ 2969.653172] ? do_raw_spin_lock+0x270/0x270 [ 2969.656238] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2969.659681] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2969.662965] ? kunit_add_resource+0x197/0x280 [kunit] [ 2969.666319] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2969.669647] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2969.672954] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2969.676479] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2969.679813] kthread+0x2a7/0x350 [ 2969.682669] ? kthread_complete_and_exit+0x20/0x20 [ 2969.685915] ret_from_fork+0x22/0x30 [ 2969.688853] [ 2969.693682] Allocated by task 121864: [ 2969.696490] kasan_save_stack+0x1e/0x40 [ 2969.699278] __kasan_kmalloc+0x81/0xa0 [ 2969.702057] kmalloc_oob_memset_4+0x9c/0x290 [test_kasan] [ 2969.705249] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2969.708323] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2969.711702] kthread+0x2a7/0x350 [ 2969.714383] ret_from_fork+0x22/0x30 [ 2969.719188] The buggy address belongs to the object at ffff888143d31d00 which belongs to the cache kmalloc-128 of size 128 [ 2969.725865] The buggy address is located 117 bytes inside of 128-byte region [ffff888143d31d00, ffff888143d31d80) [ 2969.734478] The buggy address belongs to the physical page: [ 2969.737608] page:00000000844762f6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x143d31 [ 2969.741703] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2969.745180] raw: 0017ffffc0000200 0000000000000000 dead000000000001 ffff8881000428c0 [ 2969.748874] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2969.752438] page dumped because: kasan: bad access detected [ 2969.757600] Memory state around the buggy address: [ 2969.760513] ffff888143d31c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2969.764042] ffff888143d31c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2969.767588] >ffff888143d31d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 2969.771107] ^ [ 2969.774629] ffff888143d31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2969.778161] ffff888143d31e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2969.781746] ================================================================== [ 2969.785573] ok 19 - kmalloc_oob_memset_4 [ 2969.785904] ================================================================== [ 2969.791375] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 2969.794197] Write of size 8 at addr ffff8881bad5ce71 by task kunit_try_catch/121865 [ 2969.799228] CPU: 0 PID: 121865 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2969.804755] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2969.807549] Call Trace: [ 2969.809809] [ 2969.812003] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 2969.814940] dump_stack_lvl+0x57/0x81 [ 2969.817340] print_address_description.constprop.0+0x1f/0x1e0 [ 2969.820174] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 2969.822981] print_report.cold+0x5c/0x237 [ 2969.825413] kasan_report+0xc9/0x100 [ 2969.827874] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 2969.830532] kasan_check_range+0xfd/0x1e0 [ 2969.833015] memset+0x20/0x50 [ 2969.835429] kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 2969.838126] ? kmalloc_oob_memset_16+0x290/0x290 [test_kasan] [ 2969.841110] ? do_raw_spin_trylock+0xb5/0x180 [ 2969.843779] ? do_raw_spin_lock+0x270/0x270 [ 2969.846298] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2969.849041] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2969.851652] ? kunit_add_resource+0x197/0x280 [kunit] [ 2969.854290] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2969.856909] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2969.859530] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2969.862457] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2969.865117] kthread+0x2a7/0x350 [ 2969.867505] ? kthread_complete_and_exit+0x20/0x20 [ 2969.870232] ret_from_fork+0x22/0x30 [ 2969.872705] [ 2969.876977] Allocated by task 121865: [ 2969.879258] kasan_save_stack+0x1e/0x40 [ 2969.881558] __kasan_kmalloc+0x81/0xa0 [ 2969.883822] kmalloc_oob_memset_8+0x9c/0x290 [test_kasan] [ 2969.886445] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2969.888984] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2969.891535] kthread+0x2a7/0x350 [ 2969.893723] ret_from_fork+0x22/0x30 [ 2969.898025] Last potentially related work creation: [ 2969.900363] kasan_save_stack+0x1e/0x40 [ 2969.902664] __kasan_record_aux_stack+0x96/0xb0 [ 2969.905069] insert_work+0x47/0x310 [ 2969.907405] __queue_work+0x4dd/0xd60 [ 2969.909503] rcu_work_rcufn+0x42/0x70 [ 2969.911567] rcu_do_batch+0x3c5/0xdc0 [ 2969.913600] rcu_core+0x3de/0x5a0 [ 2969.915598] __do_softirq+0x2d3/0x9a8 [ 2969.919253] Second to last potentially related work creation: [ 2969.921382] kasan_save_stack+0x1e/0x40 [ 2969.923278] __kasan_record_aux_stack+0x96/0xb0 [ 2969.925288] call_rcu+0xee/0x890 [ 2969.927116] queue_rcu_work+0x5a/0x70 [ 2969.929091] writeback_sb_inodes+0x373/0xd00 [ 2969.931046] wb_writeback+0x25a/0xa10 [ 2969.932970] wb_do_writeback+0x1dd/0x8a0 [ 2969.935080] wb_workfn+0x12c/0x670 [ 2969.936891] process_one_work+0x8e5/0x1520 [ 2969.938771] worker_thread+0x59e/0xf90 [ 2969.940581] kthread+0x2a7/0x350 [ 2969.942333] ret_from_fork+0x22/0x30 [ 2969.945600] The buggy address belongs to the object at ffff8881bad5ce00 which belongs to the cache kmalloc-128 of size 128 [ 2969.950122] The buggy address is located 113 bytes inside of 128-byte region [ffff8881bad5ce00, ffff8881bad5ce80) [ 2969.955865] The buggy address belongs to the physical page: [ 2969.957989] page:000000000f3d8944 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1bad5c [ 2969.960588] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2969.962890] raw: 0017ffffc0000200 ffffea00041503c0 dead000000000004 ffff8881000428c0 [ 2969.965274] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2969.967894] page dumped because: kasan: bad access detected [ 2969.971714] Memory state around the buggy address: [ 2969.973795] ffff8881bad5cd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2969.976254] ffff8881bad5cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2969.978676] >ffff8881bad5ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 2969.981279] ^ [ 2969.983723] ffff8881bad5ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2969.986439] ffff8881bad5cf00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2969.989039] ================================================================== [ 2969.991880] ok 20 - kmalloc_oob_memset_8 [ 2969.992214] ================================================================== [ 2969.998295] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 2970.002003] Write of size 16 at addr ffff88810ce57b69 by task kunit_try_catch/121866 [ 2970.007578] CPU: 1 PID: 121866 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2970.014425] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2970.017659] Call Trace: [ 2970.020097] [ 2970.022440] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 2970.025673] dump_stack_lvl+0x57/0x81 [ 2970.028431] print_address_description.constprop.0+0x1f/0x1e0 [ 2970.031732] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 2970.035006] print_report.cold+0x5c/0x237 [ 2970.037859] kasan_report+0xc9/0x100 [ 2970.040601] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 2970.043885] kasan_check_range+0xfd/0x1e0 [ 2970.046746] memset+0x20/0x50 [ 2970.049388] kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 2970.052645] ? kmalloc_uaf_memset+0x280/0x280 [test_kasan] [ 2970.055909] ? do_raw_spin_trylock+0xb5/0x180 [ 2970.058915] ? do_raw_spin_lock+0x270/0x270 [ 2970.061795] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2970.065083] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2970.068193] ? kunit_add_resource+0x197/0x280 [kunit] [ 2970.071232] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.074291] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2970.077471] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.080914] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2970.084085] kthread+0x2a7/0x350 [ 2970.086840] ? kthread_complete_and_exit+0x20/0x20 [ 2970.089949] ret_from_fork+0x22/0x30 [ 2970.092754] [ 2970.097389] Allocated by task 121866: [ 2970.100087] kasan_save_stack+0x1e/0x40 [ 2970.102802] __kasan_kmalloc+0x81/0xa0 [ 2970.105467] kmalloc_oob_memset_16+0x9c/0x290 [test_kasan] [ 2970.108547] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.111482] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.114704] kthread+0x2a7/0x350 [ 2970.117260] ret_from_fork+0x22/0x30 [ 2970.121975] The buggy address belongs to the object at ffff88810ce57b00 which belongs to the cache kmalloc-128 of size 128 [ 2970.128379] The buggy address is located 105 bytes inside of 128-byte region [ffff88810ce57b00, ffff88810ce57b80) [ 2970.136676] The buggy address belongs to the physical page: [ 2970.139670] page:00000000066ea067 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ce57 [ 2970.143551] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2970.146935] raw: 0017ffffc0000200 ffffea0004136600 dead000000000002 ffff8881000428c0 [ 2970.150478] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2970.153992] page dumped because: kasan: bad access detected [ 2970.158993] Memory state around the buggy address: [ 2970.161794] ffff88810ce57a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2970.165186] ffff88810ce57a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2970.168584] >ffff88810ce57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 2970.171995] ^ [ 2970.175392] ffff88810ce57b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2970.178827] ffff88810ce57c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2970.182243] ================================================================== [ 2970.186457] ok 21 - kmalloc_oob_memset_16 [ 2970.186737] ================================================================== [ 2970.192042] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 2970.195430] Read of size 18446744073709551614 at addr ffff8881bee80084 by task kunit_try_catch/121867 [ 2970.200952] CPU: 0 PID: 121867 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2970.206767] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2970.209520] Call Trace: [ 2970.211802] [ 2970.214057] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 2970.217363] dump_stack_lvl+0x57/0x81 [ 2970.220121] print_address_description.constprop.0+0x1f/0x1e0 [ 2970.223166] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 2970.226606] print_report.cold+0x5c/0x237 [ 2970.229508] kasan_report+0xc9/0x100 [ 2970.232483] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 2970.235525] kasan_check_range+0xfd/0x1e0 [ 2970.238456] memmove+0x20/0x60 [ 2970.240991] kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 2970.244170] ? kmalloc_memmove_invalid_size+0x2a0/0x2a0 [test_kasan] [ 2970.247324] ? do_raw_spin_trylock+0xb5/0x180 [ 2970.250075] ? do_raw_spin_lock+0x270/0x270 [ 2970.252672] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2970.255947] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2970.258780] ? kunit_add_resource+0x197/0x280 [kunit] [ 2970.261563] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.264387] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2970.267361] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.270414] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2970.273541] kthread+0x2a7/0x350 [ 2970.276110] ? kthread_complete_and_exit+0x20/0x20 [ 2970.278888] ret_from_fork+0x22/0x30 [ 2970.281696] [ 2970.286513] Allocated by task 121867: [ 2970.288959] kasan_save_stack+0x1e/0x40 [ 2970.291349] __kasan_kmalloc+0x81/0xa0 [ 2970.293699] kmalloc_memmove_negative_size+0x9c/0x290 [test_kasan] [ 2970.296533] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.299424] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.302080] kthread+0x2a7/0x350 [ 2970.304377] ret_from_fork+0x22/0x30 [ 2970.308986] The buggy address belongs to the object at ffff8881bee80080 which belongs to the cache kmalloc-64 of size 64 [ 2970.314601] The buggy address is located 4 bytes inside of 64-byte region [ffff8881bee80080, ffff8881bee800c0) [ 2970.321647] The buggy address belongs to the physical page: [ 2970.324304] page:00000000b239ed16 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8881bee80e80 pfn:0x1bee80 [ 2970.328016] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2970.331087] raw: 0017ffffc0000200 ffffea00048d8100 dead000000000007 ffff888100042640 [ 2970.334156] raw: ffff8881bee80e80 000000008020001f 00000001ffffffff 0000000000000000 [ 2970.337054] page dumped because: kasan: bad access detected [ 2970.341735] Memory state around the buggy address: [ 2970.344297] ffff8881bee7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2970.347035] ffff8881bee80000: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc [ 2970.350138] >ffff8881bee80080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2970.353427] ^ [ 2970.355769] ffff8881bee80100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2970.358452] ffff8881bee80180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2970.361150] ================================================================== [ 2970.363979] ok 22 - kmalloc_memmove_negative_size [ 2970.364288] ================================================================== [ 2970.370905] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 2970.374914] Read of size 64 at addr ffff88816b070d04 by task kunit_try_catch/121870 [ 2970.380841] CPU: 1 PID: 121870 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2970.387994] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2970.391460] Call Trace: [ 2970.394005] [ 2970.396451] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 2970.399935] dump_stack_lvl+0x57/0x81 [ 2970.402744] print_address_description.constprop.0+0x1f/0x1e0 [ 2970.406099] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 2970.409569] print_report.cold+0x5c/0x237 [ 2970.412509] kasan_report+0xc9/0x100 [ 2970.415323] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 2970.418849] kasan_check_range+0xfd/0x1e0 [ 2970.421832] memmove+0x20/0x60 [ 2970.424589] kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 2970.428129] ? kmalloc_oob_in_memset+0x280/0x280 [test_kasan] [ 2970.431569] ? do_raw_spin_trylock+0xb5/0x180 [ 2970.434678] ? do_raw_spin_lock+0x270/0x270 [ 2970.437713] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2970.441085] ? kunit_add_resource+0x197/0x280 [kunit] [ 2970.444325] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.447511] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2970.450767] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.454274] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2970.457541] kthread+0x2a7/0x350 [ 2970.460335] ? kthread_complete_and_exit+0x20/0x20 [ 2970.463514] ret_from_fork+0x22/0x30 [ 2970.466398] [ 2970.471204] Allocated by task 121870: [ 2970.473961] kasan_save_stack+0x1e/0x40 [ 2970.476698] __kasan_kmalloc+0x81/0xa0 [ 2970.479414] kmalloc_memmove_invalid_size+0xac/0x2a0 [test_kasan] [ 2970.482682] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.485667] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.488945] kthread+0x2a7/0x350 [ 2970.491520] ret_from_fork+0x22/0x30 [ 2970.496296] The buggy address belongs to the object at ffff88816b070d00 which belongs to the cache kmalloc-64 of size 64 [ 2970.502723] The buggy address is located 4 bytes inside of 64-byte region [ffff88816b070d00, ffff88816b070d40) [ 2970.511106] The buggy address belongs to the physical page: [ 2970.514225] page:0000000021140723 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x16b070 [ 2970.518221] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2970.521368] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff888100042640 [ 2970.524991] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 2970.528566] page dumped because: kasan: bad access detected [ 2970.533664] Memory state around the buggy address: [ 2970.536476] ffff88816b070c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2970.539947] ffff88816b070c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2970.543358] >ffff88816b070d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2970.546753] ^ [ 2970.549686] ffff88816b070d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2970.553120] ffff88816b070e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2970.556494] ================================================================== [ 2970.560532] ok 23 - kmalloc_memmove_invalid_size [ 2970.560756] ================================================================== [ 2970.566651] BUG: KASAN: use-after-free in kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 2970.569341] Read of size 1 at addr ffff888166bd6508 by task kunit_try_catch/121871 [ 2970.574437] CPU: 0 PID: 121871 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2970.580054] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2970.583263] Call Trace: [ 2970.585719] [ 2970.587994] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 2970.590729] dump_stack_lvl+0x57/0x81 [ 2970.593490] print_address_description.constprop.0+0x1f/0x1e0 [ 2970.596749] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 2970.599822] print_report.cold+0x5c/0x237 [ 2970.602737] kasan_report+0xc9/0x100 [ 2970.605603] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 2970.608646] kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 2970.611367] ? kmalloc_uaf2+0x430/0x430 [test_kasan] [ 2970.614124] ? do_raw_spin_trylock+0xb5/0x180 [ 2970.617036] ? do_raw_spin_lock+0x270/0x270 [ 2970.619978] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2970.622831] ? kunit_add_resource+0x197/0x280 [kunit] [ 2970.625676] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.628414] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2970.631319] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.634735] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2970.637808] kthread+0x2a7/0x350 [ 2970.640335] ? kthread_complete_and_exit+0x20/0x20 [ 2970.642984] ret_from_fork+0x22/0x30 [ 2970.645324] [ 2970.649508] Allocated by task 121871: [ 2970.651878] kasan_save_stack+0x1e/0x40 [ 2970.654467] __kasan_kmalloc+0x81/0xa0 [ 2970.656997] kmalloc_uaf+0x98/0x2b0 [test_kasan] [ 2970.659501] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.662267] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.665131] kthread+0x2a7/0x350 [ 2970.667502] ret_from_fork+0x22/0x30 [ 2970.671901] Freed by task 121871: [ 2970.674262] kasan_save_stack+0x1e/0x40 [ 2970.677140] kasan_set_track+0x21/0x30 [ 2970.679323] kasan_set_free_info+0x20/0x40 [ 2970.681780] __kasan_slab_free+0x108/0x170 [ 2970.683989] slab_free_freelist_hook+0x11d/0x1d0 [ 2970.686216] kfree+0xe2/0x3c0 [ 2970.688304] kmalloc_uaf+0x12b/0x2b0 [test_kasan] [ 2970.691083] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.693517] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.696555] kthread+0x2a7/0x350 [ 2970.698686] ret_from_fork+0x22/0x30 [ 2970.702596] The buggy address belongs to the object at ffff888166bd6500 which belongs to the cache kmalloc-16 of size 16 [ 2970.707465] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd6500, ffff888166bd6510) [ 2970.714118] The buggy address belongs to the physical page: [ 2970.716565] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2970.720047] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2970.723020] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2970.725797] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2970.728965] page dumped because: kasan: bad access detected [ 2970.732939] Memory state around the buggy address: [ 2970.735382] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2970.738386] ffff888166bd6480: 00 00 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 2970.741408] >ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2970.744151] ^ [ 2970.746488] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2970.749653] ffff888166bd6600: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2970.752538] ================================================================== [ 2970.755441] ok 24 - kmalloc_uaf [ 2970.755790] ================================================================== [ 2970.761619] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 2970.765114] Write of size 33 at addr ffff888121acdd00 by task kunit_try_catch/121872 [ 2970.770575] CPU: 3 PID: 121872 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2970.777452] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2970.780802] Call Trace: [ 2970.783235] [ 2970.785565] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 2970.788711] dump_stack_lvl+0x57/0x81 [ 2970.791420] print_address_description.constprop.0+0x1f/0x1e0 [ 2970.794637] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 2970.797812] print_report.cold+0x5c/0x237 [ 2970.800650] kasan_report+0xc9/0x100 [ 2970.803378] ? kmalloc_uaf_memset+0xc1/0x280 [test_kasan] [ 2970.806561] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 2970.809764] kasan_check_range+0xfd/0x1e0 [ 2970.812614] memset+0x20/0x50 [ 2970.815211] kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 2970.818401] ? kmem_cache_accounted+0x170/0x170 [test_kasan] [ 2970.821684] ? do_raw_spin_trylock+0xb5/0x180 [ 2970.824646] ? do_raw_spin_lock+0x270/0x270 [ 2970.827554] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2970.830782] ? kunit_add_resource+0x197/0x280 [kunit] [ 2970.833914] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.837008] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2970.840136] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.843505] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2970.846638] kthread+0x2a7/0x350 [ 2970.849313] ? kthread_complete_and_exit+0x20/0x20 [ 2970.852354] ret_from_fork+0x22/0x30 [ 2970.855105] [ 2970.859559] Allocated by task 121872: [ 2970.862161] kasan_save_stack+0x1e/0x40 [ 2970.864813] __kasan_kmalloc+0x81/0xa0 [ 2970.867411] kmalloc_uaf_memset+0x9a/0x280 [test_kasan] [ 2970.870370] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.873241] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.876386] kthread+0x2a7/0x350 [ 2970.878873] ret_from_fork+0x22/0x30 [ 2970.883478] Freed by task 121872: [ 2970.885938] kasan_save_stack+0x1e/0x40 [ 2970.888505] kasan_set_track+0x21/0x30 [ 2970.891020] kasan_set_free_info+0x20/0x40 [ 2970.893607] __kasan_slab_free+0x108/0x170 [ 2970.896130] slab_free_freelist_hook+0x11d/0x1d0 [ 2970.898810] kfree+0xe2/0x3c0 [ 2970.901057] kmalloc_uaf_memset+0x137/0x280 [test_kasan] [ 2970.903867] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2970.906526] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2970.909370] kthread+0x2a7/0x350 [ 2970.911557] ret_from_fork+0x22/0x30 [ 2970.915557] The buggy address belongs to the object at ffff888121acdd00 which belongs to the cache kmalloc-64 of size 64 [ 2970.921294] The buggy address is located 0 bytes inside of 64-byte region [ffff888121acdd00, ffff888121acdd40) [ 2970.928592] The buggy address belongs to the physical page: [ 2970.931359] page:0000000047e53e3c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x121acd [ 2970.935073] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2970.938253] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff888100042640 [ 2970.941638] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 2970.945042] page dumped because: kasan: bad access detected [ 2970.949858] Memory state around the buggy address: [ 2970.952554] ffff888121acdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2970.955871] ffff888121acdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2970.959156] >ffff888121acdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2970.962436] ^ [ 2970.964777] ffff888121acdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2970.968094] ffff888121acde00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2970.971406] ================================================================== [ 2970.974709] ok 25 - kmalloc_uaf_memset [ 2970.974988] ================================================================== [ 2970.980657] BUG: KASAN: use-after-free in kmalloc_uaf2+0x402/0x430 [test_kasan] [ 2970.983788] Read of size 1 at addr ffff88810c4c2228 by task kunit_try_catch/121873 [ 2970.989220] CPU: 0 PID: 121873 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2970.995890] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2970.999132] Call Trace: [ 2971.001515] [ 2971.003808] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 2971.006996] dump_stack_lvl+0x57/0x81 [ 2971.009868] print_address_description.constprop.0+0x1f/0x1e0 [ 2971.013233] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 2971.016432] print_report.cold+0x5c/0x237 [ 2971.019296] kasan_report+0xc9/0x100 [ 2971.021998] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 2971.024996] kmalloc_uaf2+0x402/0x430 [test_kasan] [ 2971.027957] ? kfree_via_page+0x290/0x290 [test_kasan] [ 2971.031014] ? rcu_read_lock_sched_held+0x12/0x80 [ 2971.033795] ? lock_acquire+0x4ea/0x620 [ 2971.036560] ? rcu_read_unlock+0x40/0x40 [ 2971.038992] ? rcu_read_unlock+0x40/0x40 [ 2971.041586] ? rcu_read_lock_sched_held+0x12/0x80 [ 2971.044130] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2971.046761] ? do_raw_spin_lock+0x270/0x270 [ 2971.049329] ? trace_hardirqs_on+0x2d/0x160 [ 2971.052055] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2971.054763] ? kunit_add_resource+0x197/0x280 [kunit] [ 2971.057567] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2971.060492] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2971.063273] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2971.066465] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2971.069430] kthread+0x2a7/0x350 [ 2971.071812] ? kthread_complete_and_exit+0x20/0x20 [ 2971.074397] ret_from_fork+0x22/0x30 [ 2971.076901] [ 2971.081106] Allocated by task 121873: [ 2971.083605] kasan_save_stack+0x1e/0x40 [ 2971.086129] __kasan_kmalloc+0x81/0xa0 [ 2971.088519] kmalloc_uaf2+0xad/0x430 [test_kasan] [ 2971.091424] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2971.094244] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2971.097470] kthread+0x2a7/0x350 [ 2971.099972] ret_from_fork+0x22/0x30 [ 2971.104530] Freed by task 121873: [ 2971.106885] kasan_save_stack+0x1e/0x40 [ 2971.109474] kasan_set_track+0x21/0x30 [ 2971.111998] kasan_set_free_info+0x20/0x40 [ 2971.114240] __kasan_slab_free+0x108/0x170 [ 2971.116782] slab_free_freelist_hook+0x11d/0x1d0 [ 2971.119232] kfree+0xe2/0x3c0 [ 2971.121296] kmalloc_uaf2+0x144/0x430 [test_kasan] [ 2971.123703] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2971.125893] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2971.128570] kthread+0x2a7/0x350 [ 2971.130638] ret_from_fork+0x22/0x30 [ 2971.134422] The buggy address belongs to the object at ffff88810c4c2200 which belongs to the cache kmalloc-64 of size 64 [ 2971.139347] The buggy address is located 40 bytes inside of 64-byte region [ffff88810c4c2200, ffff88810c4c2240) [ 2971.145216] The buggy address belongs to the physical page: [ 2971.147647] page:000000003a5464d1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c4c2 [ 2971.150547] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2971.153243] raw: 0017ffffc0000200 ffffea00048acec0 dead000000000004 ffff888100042640 [ 2971.156089] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 2971.159106] page dumped because: kasan: bad access detected [ 2971.163476] Memory state around the buggy address: [ 2971.166082] ffff88810c4c2100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2971.169249] ffff88810c4c2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2971.172171] >ffff88810c4c2200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2971.175123] ^ [ 2971.177352] ffff88810c4c2280: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 2971.180298] ffff88810c4c2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2971.182971] ================================================================== [ 2971.185958] ok 26 - kmalloc_uaf2 [ 2971.186260] ok 27 - kfree_via_page [ 2971.189121] ok 28 - kfree_via_phys [ 2971.193136] ================================================================== [ 2971.198726] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 2971.202084] Read of size 1 at addr ffff8881be19db98 by task kunit_try_catch/121876 [ 2971.207034] CPU: 1 PID: 121876 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2971.213317] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2971.216331] Call Trace: [ 2971.218594] [ 2971.220778] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 2971.223528] dump_stack_lvl+0x57/0x81 [ 2971.226083] print_address_description.constprop.0+0x1f/0x1e0 [ 2971.228663] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 2971.231167] print_report.cold+0x5c/0x237 [ 2971.233562] kasan_report+0xc9/0x100 [ 2971.235944] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 2971.238522] kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 2971.241174] ? kmem_cache_double_free+0x280/0x280 [test_kasan] [ 2971.244127] ? do_raw_spin_trylock+0xb5/0x180 [ 2971.246869] ? do_raw_spin_lock+0x270/0x270 [ 2971.249642] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2971.252318] ? kunit_add_resource+0x197/0x280 [kunit] [ 2971.254821] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2971.257459] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2971.260268] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2971.263114] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2971.265860] kthread+0x2a7/0x350 [ 2971.268411] ? kthread_complete_and_exit+0x20/0x20 [ 2971.271025] ret_from_fork+0x22/0x30 [ 2971.273659] [ 2971.278007] Allocated by task 121876: [ 2971.280413] kasan_save_stack+0x1e/0x40 [ 2971.282759] __kasan_slab_alloc+0x66/0x80 [ 2971.285317] kmem_cache_alloc+0x161/0x310 [ 2971.287551] kmem_cache_oob+0x121/0x2e0 [test_kasan] [ 2971.289881] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2971.292191] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2971.294649] kthread+0x2a7/0x350 [ 2971.296759] ret_from_fork+0x22/0x30 [ 2971.300752] The buggy address belongs to the object at ffff8881be19dad0 which belongs to the cache test_cache of size 200 [ 2971.305592] The buggy address is located 0 bytes to the right of 200-byte region [ffff8881be19dad0, ffff8881be19db98) [ 2971.312345] The buggy address belongs to the physical page: [ 2971.315153] page:000000009e7796ab refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1be19c [ 2971.318562] head:000000009e7796ab order:1 compound_mapcount:0 compound_pincount:0 [ 2971.321352] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2971.324356] raw: 0017ffffc0010200 0000000000000000 dead000000000122 ffff8881009e2000 [ 2971.327310] raw: 0000000000000000 00000000801f001f 00000001ffffffff 0000000000000000 [ 2971.330538] page dumped because: kasan: bad access detected [ 2971.334758] Memory state around the buggy address: [ 2971.337081] ffff8881be19da80: fc fc fc fc fc fc fc fc fc fc 00 00 00 00 00 00 [ 2971.339661] ffff8881be19db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2971.342287] >ffff8881be19db80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2971.344867] ^ [ 2971.347072] ffff8881be19dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2971.349721] ffff8881be19dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2971.352320] ================================================================== [ 2971.383431] ok 29 - kmem_cache_oob [ 2971.929961] ok 30 - kmem_cache_accounted [ 2971.957954] ok 31 - kmem_cache_bulk [ 2971.961248] ================================================================== [ 2971.966170] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 2971.969040] Read of size 1 at addr ffffffffc1b4090d by task kunit_try_catch/121879 [ 2971.973672] CPU: 1 PID: 121879 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2971.979031] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2971.981656] Call Trace: [ 2971.983807] [ 2971.985924] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 2971.989093] dump_stack_lvl+0x57/0x81 [ 2971.991630] print_address_description.constprop.0+0x1f/0x1e0 [ 2971.994562] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 2971.997581] print_report.cold+0x5c/0x237 [ 2972.000243] kasan_report+0xc9/0x100 [ 2972.002748] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 2972.005422] kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 2972.008101] ? kasan_stack_oob+0x200/0x200 [test_kasan] [ 2972.010703] ? do_raw_spin_trylock+0xb5/0x180 [ 2972.013357] ? do_raw_spin_lock+0x270/0x270 [ 2972.015898] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2972.018526] ? kunit_add_resource+0x197/0x280 [kunit] [ 2972.021129] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2972.023694] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2972.026275] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2972.029189] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2972.031762] kthread+0x2a7/0x350 [ 2972.034103] ? kthread_complete_and_exit+0x20/0x20 [ 2972.036623] ret_from_fork+0x22/0x30 [ 2972.039145] [ 2972.043300] The buggy address belongs to the variable: [ 2972.045744] global_array+0xd/0xfffffffffffe5700 [test_kasan] [ 2972.050480] Memory state around the buggy address: [ 2972.052885] ffffffffc1b40800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2972.055633] ffffffffc1b40880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2972.058407] >ffffffffc1b40900: 00 02 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 2972.061064] ^ [ 2972.063269] ffffffffc1b40980: 02 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 f9 f9 [ 2972.066085] ffffffffc1b40a00: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 2972.068837] ================================================================== [ 2972.071615] ok 32 - kasan_global_oob_right [ 2972.071904] ok 33 - kasan_global_oob_left # SKIP Test requires CONFIG_CC_IS_CLANG=y [ 2972.075280] ================================================================== [ 2972.081439] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 2972.084436] Read of size 1 at addr ffffc9000184fe7a by task kunit_try_catch/121881 [ 2972.089374] CPU: 1 PID: 121881 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2972.095215] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2972.097916] Call Trace: [ 2972.100093] [ 2972.102162] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 2972.104614] dump_stack_lvl+0x57/0x81 [ 2972.106871] print_address_description.constprop.0+0x1f/0x1e0 [ 2972.109407] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 2972.111864] print_report.cold+0x5c/0x237 [ 2972.114163] kasan_report+0xc9/0x100 [ 2972.116399] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 2972.118865] kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 2972.121338] ? match_all_mem_tag+0x20/0x20 [test_kasan] [ 2972.123806] ? rcu_read_unlock+0x40/0x40 [ 2972.126079] ? rcu_read_lock_sched_held+0x12/0x80 [ 2972.128681] ? do_raw_spin_trylock+0xb5/0x180 [ 2972.130979] ? do_raw_spin_lock+0x270/0x270 [ 2972.133367] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2972.135841] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2972.138243] ? kunit_add_resource+0x197/0x280 [kunit] [ 2972.140716] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2972.143087] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2972.145473] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2972.148090] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2972.150488] kthread+0x2a7/0x350 [ 2972.152646] ? kthread_complete_and_exit+0x20/0x20 [ 2972.155442] ret_from_fork+0x22/0x30 [ 2972.157833] [ 2972.161933] The buggy address belongs to stack of task kunit_try_catch/121881 [ 2972.164854] and is located at offset 266 in frame: [ 2972.167590] kasan_stack_oob+0x0/0x200 [test_kasan] [ 2972.172488] This frame has 4 objects: [ 2972.174852] [48, 56) 'array' [ 2972.174856] [80, 128) '__assertion' [ 2972.177202] [160, 224) '__assertion' [ 2972.179706] [256, 266) 'stack_array' [ 2972.186636] The buggy address belongs to the virtual mapping at [ffffc90001848000, ffffc90001851000) created by: dup_task_struct+0x5e/0x5a0 [ 2972.196371] The buggy address belongs to the physical page: [ 2972.199198] page:00000000bc2b37ca refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14033a [ 2972.202314] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 2972.205230] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 2972.208039] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2972.210928] page dumped because: kasan: bad access detected [ 2972.214983] Memory state around the buggy address: [ 2972.217312] ffffc9000184fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 [ 2972.220013] ffffc9000184fd80: f1 f1 f1 f1 00 f2 f2 f2 00 00 00 00 00 00 f2 f2 [ 2972.222853] >ffffc9000184fe00: f2 f2 00 00 00 00 00 00 00 00 f2 f2 f2 f2 00 02 [ 2972.225619] ^ [ 2972.228618] ffffc9000184fe80: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2972.231309] ffffc9000184ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2972.233995] ================================================================== [ 2972.237229] ok 34 - kasan_stack_oob [ 2972.237460] ================================================================== [ 2972.243243] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 2972.246696] Read of size 1 at addr ffffc9000191fd1f by task kunit_try_catch/121882 [ 2972.251958] CPU: 0 PID: 121882 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2972.258589] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2972.261819] Call Trace: [ 2972.264130] [ 2972.266417] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 2972.269747] dump_stack_lvl+0x57/0x81 [ 2972.272537] print_address_description.constprop.0+0x1f/0x1e0 [ 2972.275619] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 2972.278740] print_report.cold+0x5c/0x237 [ 2972.281495] kasan_report+0xc9/0x100 [ 2972.284163] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 2972.287130] kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 2972.290288] ? rcu_read_lock_sched_held+0x12/0x80 [ 2972.293296] ? rcu_read_lock_sched_held+0x12/0x80 [ 2972.296019] ? lock_acquire+0x4ea/0x620 [ 2972.298732] ? kasan_alloca_oob_right+0x290/0x290 [test_kasan] [ 2972.302031] ? rcu_read_lock_sched_held+0x12/0x80 [ 2972.305176] ? do_raw_spin_trylock+0xb5/0x180 [ 2972.308261] ? do_raw_spin_lock+0x270/0x270 [ 2972.311128] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2972.314196] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2972.317412] ? kunit_add_resource+0x197/0x280 [kunit] [ 2972.320681] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2972.323912] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2972.326766] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2972.330126] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2972.333306] kthread+0x2a7/0x350 [ 2972.336010] ? kthread_complete_and_exit+0x20/0x20 [ 2972.338756] ret_from_fork+0x22/0x30 [ 2972.341128] [ 2972.345326] The buggy address belongs to stack of task kunit_try_catch/121882 [ 2972.350552] The buggy address belongs to the virtual mapping at [ffffc90001918000, ffffc90001921000) created by: dup_task_struct+0x5e/0x5a0 [ 2972.361129] The buggy address belongs to the physical page: [ 2972.364155] page:00000000b9412f09 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b90fe [ 2972.367591] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 2972.370734] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 2972.374245] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2972.377779] page dumped because: kasan: bad access detected [ 2972.382860] Memory state around the buggy address: [ 2972.385742] ffffc9000191fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2972.389142] ffffc9000191fc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2972.392359] >ffffc9000191fd00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00 [ 2972.395544] ^ [ 2972.397935] ffffc9000191fd80: f1 f1 f1 f1 04 f2 00 f2 f2 f2 00 00 00 00 00 00 [ 2972.401052] ffffc9000191fe00: f2 f2 f2 f2 00 00 00 00 00 00 00 00 f3 f3 f3 f3 [ 2972.404163] ================================================================== [ 2972.408262] ok 35 - kasan_alloca_oob_left [ 2972.408588] ================================================================== [ 2972.414555] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 2972.418187] Read of size 1 at addr ffffc9000184fd2a by task kunit_try_catch/121883 [ 2972.423696] CPU: 1 PID: 121883 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2972.430372] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2972.433253] Call Trace: [ 2972.435690] [ 2972.438056] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 2972.441230] dump_stack_lvl+0x57/0x81 [ 2972.444176] print_address_description.constprop.0+0x1f/0x1e0 [ 2972.447246] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 2972.449943] print_report.cold+0x5c/0x237 [ 2972.452744] kasan_report+0xc9/0x100 [ 2972.455215] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 2972.458386] kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 2972.461552] ? put_prev_task_fair+0x37/0x70 [ 2972.464403] ? rcu_read_lock_sched_held+0x12/0x80 [ 2972.466957] ? rcu_read_lock_sched_held+0x12/0x80 [ 2972.469455] ? lock_acquire+0x4ea/0x620 [ 2972.471964] ? ksize_unpoisons_memory+0x300/0x300 [test_kasan] [ 2972.474635] ? rcu_read_lock_sched_held+0x12/0x80 [ 2972.477175] ? do_raw_spin_trylock+0xb5/0x180 [ 2972.479655] ? do_raw_spin_lock+0x270/0x270 [ 2972.482136] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2972.484765] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2972.487304] ? kunit_add_resource+0x197/0x280 [kunit] [ 2972.489826] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2972.492344] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2972.494899] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2972.497547] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2972.500109] kthread+0x2a7/0x350 [ 2972.502403] ? kthread_complete_and_exit+0x20/0x20 [ 2972.504844] ret_from_fork+0x22/0x30 [ 2972.507127] [ 2972.511163] The buggy address belongs to stack of task kunit_try_catch/121883 [ 2972.516209] The buggy address belongs to the virtual mapping at [ffffc90001848000, ffffc90001851000) created by: dup_task_struct+0x5e/0x5a0 [ 2972.526714] The buggy address belongs to the physical page: [ 2972.529692] page:00000000bc2b37ca refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14033a [ 2972.533543] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 2972.536765] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 2972.539979] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2972.543441] page dumped because: kasan: bad access detected [ 2972.548051] Memory state around the buggy address: [ 2972.550412] ffffc9000184fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2972.553692] ffffc9000184fc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2972.556267] >ffffc9000184fd00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00 [ 2972.559472] ^ [ 2972.562107] ffffc9000184fd80: f1 f1 f1 f1 04 f2 00 f2 f2 f2 00 00 00 00 00 00 [ 2972.565353] ffffc9000184fe00: f2 f2 f2 f2 00 00 00 00 00 00 00 00 f3 f3 f3 f3 [ 2972.568589] ================================================================== [ 2972.571984] ok 36 - kasan_alloca_oob_right [ 2972.572397] ================================================================== [ 2972.578648] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 2972.582437] Read of size 1 at addr ffff888140d3c480 by task kunit_try_catch/121884 [ 2972.588164] CPU: 3 PID: 121884 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2972.595113] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2972.598498] Call Trace: [ 2972.600981] [ 2972.603367] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 2972.606648] dump_stack_lvl+0x57/0x81 [ 2972.609432] print_address_description.constprop.0+0x1f/0x1e0 [ 2972.612707] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 2972.616044] print_report.cold+0x5c/0x237 [ 2972.618927] kasan_report+0xc9/0x100 [ 2972.621700] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 2972.625025] ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 2972.628303] ? ksize_uaf+0x4a0/0x4a0 [test_kasan] [ 2972.631376] ? do_raw_spin_trylock+0xb5/0x180 [ 2972.634354] ? do_raw_spin_lock+0x270/0x270 [ 2972.637254] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2972.640504] ? kunit_add_resource+0x197/0x280 [kunit] [ 2972.643620] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2972.646700] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2972.649829] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2972.653228] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2972.656392] kthread+0x2a7/0x350 [ 2972.659092] ? kthread_complete_and_exit+0x20/0x20 [ 2972.662134] ret_from_fork+0x22/0x30 [ 2972.664887] [ 2972.669526] Allocated by task 121884: [ 2972.672267] kasan_save_stack+0x1e/0x40 [ 2972.675014] __kasan_kmalloc+0x81/0xa0 [ 2972.677678] ksize_unpoisons_memory+0x9a/0x300 [test_kasan] [ 2972.680760] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2972.683704] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2972.686915] kthread+0x2a7/0x350 [ 2972.689170] ret_from_fork+0x22/0x30 [ 2972.693870] The buggy address belongs to the object at ffff888140d3c400 which belongs to the cache kmalloc-128 of size 128 [ 2972.700345] The buggy address is located 0 bytes to the right of 128-byte region [ffff888140d3c400, ffff888140d3c480) [ 2972.708862] The buggy address belongs to the physical page: [ 2972.711952] page:0000000060e43d87 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x140d3c [ 2972.715982] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2972.719443] raw: 0017ffffc0000200 ffffea0004368ec0 dead000000000002 ffff8881000428c0 [ 2972.723069] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2972.726650] page dumped because: kasan: bad access detected [ 2972.731806] Memory state around the buggy address: [ 2972.734626] ffff888140d3c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2972.737978] ffff888140d3c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2972.741397] >ffff888140d3c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2972.744830] ^ [ 2972.747315] ffff888140d3c500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2972.750768] ffff888140d3c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2972.754235] ================================================================== [ 2972.757648] ok 37 - ksize_unpoisons_memory [ 2972.757920] ================================================================== [ 2972.763192] BUG: KASAN: use-after-free in ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2972.766521] Read of size 1 at addr ffff88814434fa00 by task kunit_try_catch/121885 [ 2972.772229] CPU: 1 PID: 121885 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2972.778420] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2972.781679] Call Trace: [ 2972.784124] [ 2972.786465] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2972.789415] dump_stack_lvl+0x57/0x81 [ 2972.792140] print_address_description.constprop.0+0x1f/0x1e0 [ 2972.795205] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2972.798060] print_report.cold+0x5c/0x237 [ 2972.800822] kasan_report+0xc9/0x100 [ 2972.803515] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2972.806226] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2972.808885] __kasan_check_byte+0x36/0x50 [ 2972.811578] ksize+0x1b/0x50 [ 2972.813896] ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2972.816750] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 2972.819800] ? do_raw_spin_trylock+0xb5/0x180 [ 2972.822310] ? do_raw_spin_lock+0x270/0x270 [ 2972.825096] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2972.827690] ? kunit_add_resource+0x197/0x280 [kunit] [ 2972.830676] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2972.833421] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2972.836429] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2972.839454] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2972.842201] kthread+0x2a7/0x350 [ 2972.844527] ? kthread_complete_and_exit+0x20/0x20 [ 2972.847385] ret_from_fork+0x22/0x30 [ 2972.849927] [ 2972.854314] Allocated by task 121885: [ 2972.856864] kasan_save_stack+0x1e/0x40 [ 2972.859422] __kasan_kmalloc+0x81/0xa0 [ 2972.861675] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 2972.864400] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2972.867136] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2972.869840] kthread+0x2a7/0x350 [ 2972.872076] ret_from_fork+0x22/0x30 [ 2972.876435] Freed by task 121885: [ 2972.878740] kasan_save_stack+0x1e/0x40 [ 2972.881151] kasan_set_track+0x21/0x30 [ 2972.883307] kasan_set_free_info+0x20/0x40 [ 2972.885604] __kasan_slab_free+0x108/0x170 [ 2972.887715] slab_free_freelist_hook+0x11d/0x1d0 [ 2972.890191] kfree+0xe2/0x3c0 [ 2972.892279] ksize_uaf+0x137/0x4a0 [test_kasan] [ 2972.894690] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2972.897124] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2972.899495] kthread+0x2a7/0x350 [ 2972.901414] ret_from_fork+0x22/0x30 [ 2972.904685] The buggy address belongs to the object at ffff88814434fa00 which belongs to the cache kmalloc-128 of size 128 [ 2972.909053] The buggy address is located 0 bytes inside of 128-byte region [ffff88814434fa00, ffff88814434fa80) [ 2972.915224] The buggy address belongs to the physical page: [ 2972.917299] page:000000003ae2ca6b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14434f [ 2972.920379] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2972.922729] raw: 0017ffffc0000200 ffffea00042bf280 dead000000000003 ffff8881000428c0 [ 2972.925205] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2972.927667] page dumped because: kasan: bad access detected [ 2972.931657] Memory state around the buggy address: [ 2972.933995] ffff88814434f900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2972.936763] ffff88814434f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2972.939724] >ffff88814434fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2972.942289] ^ [ 2972.944279] ffff88814434fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2972.947012] ffff88814434fb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2972.949519] ================================================================== [ 2972.952148] ================================================================== [ 2972.954707] BUG: KASAN: use-after-free in ksize_uaf+0x47d/0x4a0 [test_kasan] [ 2972.957245] Read of size 1 at addr ffff88814434fa00 by task kunit_try_catch/121885 [ 2972.961725] CPU: 1 PID: 121885 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2972.967307] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2972.969918] Call Trace: [ 2972.972033] [ 2972.974089] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 2972.976800] dump_stack_lvl+0x57/0x81 [ 2972.979142] print_address_description.constprop.0+0x1f/0x1e0 [ 2972.981646] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 2972.984052] print_report.cold+0x5c/0x237 [ 2972.986371] kasan_report+0xc9/0x100 [ 2972.988751] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 2972.991242] ksize_uaf+0x47d/0x4a0 [test_kasan] [ 2972.993815] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 2972.996628] ? do_raw_spin_trylock+0xb5/0x180 [ 2972.999041] ? do_raw_spin_lock+0x270/0x270 [ 2973.001414] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2973.004200] ? kunit_add_resource+0x197/0x280 [kunit] [ 2973.006671] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.009288] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2973.011797] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.014405] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2973.016926] kthread+0x2a7/0x350 [ 2973.019229] ? kthread_complete_and_exit+0x20/0x20 [ 2973.021815] ret_from_fork+0x22/0x30 [ 2973.024251] [ 2973.028364] Allocated by task 121885: [ 2973.030603] kasan_save_stack+0x1e/0x40 [ 2973.032855] __kasan_kmalloc+0x81/0xa0 [ 2973.035067] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 2973.037743] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.040233] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.043149] kthread+0x2a7/0x350 [ 2973.045408] ret_from_fork+0x22/0x30 [ 2973.049687] Freed by task 121885: [ 2973.051783] kasan_save_stack+0x1e/0x40 [ 2973.053869] kasan_set_track+0x21/0x30 [ 2973.056149] kasan_set_free_info+0x20/0x40 [ 2973.058211] __kasan_slab_free+0x108/0x170 [ 2973.060262] slab_free_freelist_hook+0x11d/0x1d0 [ 2973.062366] kfree+0xe2/0x3c0 [ 2973.064247] ksize_uaf+0x137/0x4a0 [test_kasan] [ 2973.066342] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.068623] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.070891] kthread+0x2a7/0x350 [ 2973.072774] ret_from_fork+0x22/0x30 [ 2973.076393] The buggy address belongs to the object at ffff88814434fa00 which belongs to the cache kmalloc-128 of size 128 [ 2973.081211] The buggy address is located 0 bytes inside of 128-byte region [ffff88814434fa00, ffff88814434fa80) [ 2973.087523] The buggy address belongs to the physical page: [ 2973.089624] page:000000003ae2ca6b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14434f [ 2973.092628] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2973.095061] raw: 0017ffffc0000200 ffffea00042bf280 dead000000000003 ffff8881000428c0 [ 2973.097595] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2973.100331] page dumped because: kasan: bad access detected [ 2973.104321] Memory state around the buggy address: [ 2973.106768] ffff88814434f900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2973.109269] ffff88814434f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2973.111721] >ffff88814434fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2973.114391] ^ [ 2973.116374] ffff88814434fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2973.119151] ffff88814434fb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2973.121624] ================================================================== [ 2973.124169] ================================================================== [ 2973.126811] BUG: KASAN: use-after-free in ksize_uaf+0x470/0x4a0 [test_kasan] [ 2973.129317] Read of size 1 at addr ffff88814434fa78 by task kunit_try_catch/121885 [ 2973.133918] CPU: 1 PID: 121885 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2973.139084] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2973.141655] Call Trace: [ 2973.143766] [ 2973.145821] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 2973.148307] dump_stack_lvl+0x57/0x81 [ 2973.150547] print_address_description.constprop.0+0x1f/0x1e0 [ 2973.153074] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 2973.155655] print_report.cold+0x5c/0x237 [ 2973.157972] kasan_report+0xc9/0x100 [ 2973.160244] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 2973.162745] ksize_uaf+0x470/0x4a0 [test_kasan] [ 2973.165316] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 2973.167805] ? do_raw_spin_trylock+0xb5/0x180 [ 2973.170202] ? do_raw_spin_lock+0x270/0x270 [ 2973.172574] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2973.175112] ? kunit_add_resource+0x197/0x280 [kunit] [ 2973.177683] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.180157] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2973.182784] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.185493] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2973.188015] kthread+0x2a7/0x350 [ 2973.190296] ? kthread_complete_and_exit+0x20/0x20 [ 2973.192754] ret_from_fork+0x22/0x30 [ 2973.195136] [ 2973.199227] Allocated by task 121885: [ 2973.201646] kasan_save_stack+0x1e/0x40 [ 2973.203923] __kasan_kmalloc+0x81/0xa0 [ 2973.206117] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 2973.208444] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.210729] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.213372] kthread+0x2a7/0x350 [ 2973.215436] ret_from_fork+0x22/0x30 [ 2973.219518] Freed by task 121885: [ 2973.221574] kasan_save_stack+0x1e/0x40 [ 2973.223815] kasan_set_track+0x21/0x30 [ 2973.225856] kasan_set_free_info+0x20/0x40 [ 2973.227919] __kasan_slab_free+0x108/0x170 [ 2973.229964] slab_free_freelist_hook+0x11d/0x1d0 [ 2973.232123] kfree+0xe2/0x3c0 [ 2973.234018] ksize_uaf+0x137/0x4a0 [test_kasan] [ 2973.236276] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.238583] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.241074] kthread+0x2a7/0x350 [ 2973.243032] ret_from_fork+0x22/0x30 [ 2973.246478] The buggy address belongs to the object at ffff88814434fa00 which belongs to the cache kmalloc-128 of size 128 [ 2973.251199] The buggy address is located 120 bytes inside of 128-byte region [ffff88814434fa00, ffff88814434fa80) [ 2973.257052] The buggy address belongs to the physical page: [ 2973.259259] page:000000003ae2ca6b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14434f [ 2973.262421] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2973.264979] raw: 0017ffffc0000200 ffffea00042bf280 dead000000000003 ffff8881000428c0 [ 2973.267446] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2973.270021] page dumped because: kasan: bad access detected [ 2973.274200] Memory state around the buggy address: [ 2973.276413] ffff88814434f900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2973.279305] ffff88814434f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2973.282100] >ffff88814434fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2973.284826] ^ [ 2973.287673] ffff88814434fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2973.290522] ffff88814434fb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2973.293315] ================================================================== [ 2973.296974] ok 38 - ksize_uaf [ 2973.297471] ================================================================== [ 2973.302542] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x152/0x400 [ 2973.307031] CPU: 1 PID: 121886 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2973.312287] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2973.314940] Call Trace: [ 2973.317099] [ 2973.319228] dump_stack_lvl+0x57/0x81 [ 2973.321537] print_address_description.constprop.0+0x1f/0x1e0 [ 2973.324132] print_report.cold+0x5c/0x237 [ 2973.326489] ? kmem_cache_free+0x152/0x400 [ 2973.329075] ? kmem_cache_free+0x152/0x400 [ 2973.331457] kasan_report_invalid_free+0x99/0xc0 [ 2973.333970] ? kmem_cache_free+0x152/0x400 [ 2973.336330] ? kmem_cache_free+0x152/0x400 [ 2973.338663] __kasan_slab_free+0x152/0x170 [ 2973.341028] slab_free_freelist_hook+0x11d/0x1d0 [ 2973.343451] ? kmem_cache_double_free+0x1bd/0x280 [test_kasan] [ 2973.346187] kmem_cache_free+0x152/0x400 [ 2973.348649] kmem_cache_double_free+0x1bd/0x280 [test_kasan] [ 2973.351253] ? kmem_cache_invalid_free+0x280/0x280 [test_kasan] [ 2973.354195] ? do_raw_spin_trylock+0xb5/0x180 [ 2973.357167] ? do_raw_spin_lock+0x270/0x270 [ 2973.359752] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2973.362581] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2973.365475] ? kunit_add_resource+0x197/0x280 [kunit] [ 2973.368215] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.370848] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2973.373497] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.376172] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2973.378687] kthread+0x2a7/0x350 [ 2973.380974] ? kthread_complete_and_exit+0x20/0x20 [ 2973.383480] ret_from_fork+0x22/0x30 [ 2973.385692] [ 2973.389567] Allocated by task 121886: [ 2973.391761] kasan_save_stack+0x1e/0x40 [ 2973.394217] __kasan_slab_alloc+0x66/0x80 [ 2973.396467] kmem_cache_alloc+0x161/0x310 [ 2973.398918] kmem_cache_double_free+0x123/0x280 [test_kasan] [ 2973.401241] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.403478] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.406009] kthread+0x2a7/0x350 [ 2973.408067] ret_from_fork+0x22/0x30 [ 2973.411954] Freed by task 121886: [ 2973.413902] kasan_save_stack+0x1e/0x40 [ 2973.415904] kasan_set_track+0x21/0x30 [ 2973.417842] kasan_set_free_info+0x20/0x40 [ 2973.419918] __kasan_slab_free+0x108/0x170 [ 2973.421832] slab_free_freelist_hook+0x11d/0x1d0 [ 2973.423993] kmem_cache_free+0x152/0x400 [ 2973.426123] kmem_cache_double_free+0x144/0x280 [test_kasan] [ 2973.428366] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.430310] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.432447] kthread+0x2a7/0x350 [ 2973.434324] ret_from_fork+0x22/0x30 [ 2973.437661] The buggy address belongs to the object at ffff88810e3e6420 which belongs to the cache test_cache of size 200 [ 2973.442045] The buggy address is located 0 bytes inside of 200-byte region [ffff88810e3e6420, ffff88810e3e64e8) [ 2973.448191] The buggy address belongs to the physical page: [ 2973.450338] page:0000000025a47b1d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10e3e6 [ 2973.453093] head:0000000025a47b1d order:1 compound_mapcount:0 compound_pincount:0 [ 2973.455912] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2973.458569] raw: 0017ffffc0010200 0000000000000000 dead000000000122 ffff8881009e3400 [ 2973.461240] raw: 0000000000000000 00000000801f001f 00000001ffffffff 0000000000000000 [ 2973.463776] page dumped because: kasan: bad access detected [ 2973.467834] Memory state around the buggy address: [ 2973.470090] ffff88810e3e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2973.472790] ffff88810e3e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2973.475253] >ffff88810e3e6400: fc fc fc fc fa fb fb fb fb fb fb fb fb fb fb fb [ 2973.477754] ^ [ 2973.479848] ffff88810e3e6480: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 2973.482505] ffff88810e3e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2973.484981] ================================================================== [ 2973.513147] ok 39 - kmem_cache_double_free [ 2973.513912] ================================================================== [ 2973.520107] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x152/0x400 [ 2973.525691] CPU: 3 PID: 121887 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2973.532596] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2973.535781] Call Trace: [ 2973.538219] [ 2973.540538] dump_stack_lvl+0x57/0x81 [ 2973.543225] print_address_description.constprop.0+0x1f/0x1e0 [ 2973.546414] print_report.cold+0x5c/0x237 [ 2973.549192] ? kmem_cache_free+0x152/0x400 [ 2973.551919] ? kmem_cache_free+0x152/0x400 [ 2973.554685] kasan_report_invalid_free+0x99/0xc0 [ 2973.557617] ? kmem_cache_free+0x152/0x400 [ 2973.560420] ? kmem_cache_free+0x152/0x400 [ 2973.563205] __kasan_slab_free+0x152/0x170 [ 2973.565979] slab_free_freelist_hook+0x11d/0x1d0 [ 2973.568886] ? kmem_cache_invalid_free+0x1b6/0x280 [test_kasan] [ 2973.572104] kmem_cache_free+0x152/0x400 [ 2973.574900] kmem_cache_invalid_free+0x1b6/0x280 [test_kasan] [ 2973.578100] ? kmem_cache_double_destroy+0x250/0x250 [test_kasan] [ 2973.581375] ? do_raw_spin_trylock+0xb5/0x180 [ 2973.584152] ? do_raw_spin_lock+0x270/0x270 [ 2973.586963] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2973.590046] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2973.593047] ? kunit_add_resource+0x197/0x280 [kunit] [ 2973.596060] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.599021] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2973.602026] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.605264] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2973.608222] kthread+0x2a7/0x350 [ 2973.610761] ? kthread_complete_and_exit+0x20/0x20 [ 2973.613631] ret_from_fork+0x22/0x30 [ 2973.616211] [ 2973.620421] Allocated by task 121887: [ 2973.622924] kasan_save_stack+0x1e/0x40 [ 2973.625435] __kasan_slab_alloc+0x66/0x80 [ 2973.628007] kmem_cache_alloc+0x161/0x310 [ 2973.630530] kmem_cache_invalid_free+0x126/0x280 [test_kasan] [ 2973.633479] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.636225] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.639267] kthread+0x2a7/0x350 [ 2973.641622] ret_from_fork+0x22/0x30 [ 2973.645933] The buggy address belongs to the object at ffff88816189a318 which belongs to the cache test_cache of size 200 [ 2973.651912] The buggy address is located 1 bytes inside of 200-byte region [ffff88816189a318, ffff88816189a3e0) [ 2973.659433] The buggy address belongs to the physical page: [ 2973.662200] page:000000003814a677 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x16189a [ 2973.665884] head:000000003814a677 order:1 compound_mapcount:0 compound_pincount:0 [ 2973.669121] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2973.672396] raw: 0017ffffc0010200 0000000000000000 dead000000000122 ffff88810def0140 [ 2973.675770] raw: 0000000000000000 00000000801f001f 00000001ffffffff 0000000000000000 [ 2973.679155] page dumped because: kasan: bad access detected [ 2973.683983] Memory state around the buggy address: [ 2973.686727] ffff88816189a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2973.690066] ffff88816189a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2973.693381] >ffff88816189a300: fc fc fc 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2973.696748] ^ [ 2973.699391] ffff88816189a380: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 2973.702810] ffff88816189a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2973.706206] ================================================================== [ 2973.749056] ok 40 - kmem_cache_invalid_free [ 2973.749980] ================================================================== [ 2973.755480] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2973.758557] Read of size 1 at addr ffff8881009e2b40 by task kunit_try_catch/121888 [ 2973.763289] CPU: 1 PID: 121888 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2973.769095] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2973.771998] Call Trace: [ 2973.774227] [ 2973.776455] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2973.779198] dump_stack_lvl+0x57/0x81 [ 2973.781558] print_address_description.constprop.0+0x1f/0x1e0 [ 2973.784206] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2973.787351] print_report.cold+0x5c/0x237 [ 2973.790148] kasan_report+0xc9/0x100 [ 2973.792792] ? kmem_cache_free+0xf0/0x400 [ 2973.795502] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2973.798791] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2973.802083] __kasan_check_byte+0x36/0x50 [ 2973.804783] kmem_cache_destroy+0x21/0x170 [ 2973.807752] kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2973.810734] ? kmalloc_oob_right+0x510/0x510 [test_kasan] [ 2973.813857] ? do_raw_spin_trylock+0xb5/0x180 [ 2973.816596] ? do_raw_spin_lock+0x270/0x270 [ 2973.819570] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2973.822306] ? kunit_add_resource+0x197/0x280 [kunit] [ 2973.825053] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.827591] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2973.830365] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.833075] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2973.835692] kthread+0x2a7/0x350 [ 2973.838024] ? kthread_complete_and_exit+0x20/0x20 [ 2973.840512] ret_from_fork+0x22/0x30 [ 2973.842869] [ 2973.846937] Allocated by task 121888: [ 2973.849161] kasan_save_stack+0x1e/0x40 [ 2973.851470] __kasan_slab_alloc+0x66/0x80 [ 2973.853697] kmem_cache_alloc+0x161/0x310 [ 2973.855949] kmem_cache_create_usercopy+0x1b9/0x310 [ 2973.858271] kmem_cache_create+0x12/0x20 [ 2973.860560] kmem_cache_double_destroy+0x8d/0x250 [test_kasan] [ 2973.862990] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.865282] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.867847] kthread+0x2a7/0x350 [ 2973.870000] ret_from_fork+0x22/0x30 [ 2973.873946] Freed by task 121888: [ 2973.875965] kasan_save_stack+0x1e/0x40 [ 2973.878240] kasan_set_track+0x21/0x30 [ 2973.880221] kasan_set_free_info+0x20/0x40 [ 2973.882215] __kasan_slab_free+0x108/0x170 [ 2973.884165] slab_free_freelist_hook+0x11d/0x1d0 [ 2973.886294] kmem_cache_free+0x152/0x400 [ 2973.888372] kobject_cleanup+0x104/0x390 [ 2973.890447] kmem_cache_double_destroy+0x12a/0x250 [test_kasan] [ 2973.892694] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2973.894774] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2973.896915] kthread+0x2a7/0x350 [ 2973.898671] ret_from_fork+0x22/0x30 [ 2973.902096] The buggy address belongs to the object at ffff8881009e2b40 which belongs to the cache kmem_cache of size 240 [ 2973.906755] The buggy address is located 0 bytes inside of 240-byte region [ffff8881009e2b40, ffff8881009e2c30) [ 2973.912835] The buggy address belongs to the physical page: [ 2973.915101] page:000000008cd1b56c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009e2 [ 2973.917736] head:000000008cd1b56c order:1 compound_mapcount:0 compound_pincount:0 [ 2973.920237] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 2973.922661] raw: 0017ffffc0010200 0000000000000000 dead000000000122 ffff888100042000 [ 2973.925187] raw: 0000000000000000 0000000080190019 00000001ffffffff 0000000000000000 [ 2973.927699] page dumped because: kasan: bad access detected [ 2973.931843] Memory state around the buggy address: [ 2973.934400] ffff8881009e2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2973.937038] ffff8881009e2a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 2973.939736] >ffff8881009e2b00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 2973.942581] ^ [ 2973.944908] ffff8881009e2b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2973.947496] ffff8881009e2c00: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc [ 2973.950352] ================================================================== [ 2973.954086] ok 41 - kmem_cache_double_destroy [ 2973.954392] ok 42 - kasan_memchr # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 2973.957659] ok 43 - kasan_memcmp # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 2973.961665] ok 44 - kasan_strings # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 2973.965018] ================================================================== [ 2973.970968] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 2973.974769] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2973.980354] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2973.986728] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2973.989951] Call Trace: [ 2973.992392] [ 2973.994791] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 2973.998112] dump_stack_lvl+0x57/0x81 [ 2974.000901] print_address_description.constprop.0+0x1f/0x1e0 [ 2974.003991] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 2974.007271] print_report.cold+0x5c/0x237 [ 2974.010160] kasan_report+0xc9/0x100 [ 2974.013175] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 2974.016887] kasan_check_range+0xfd/0x1e0 [ 2974.020062] kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 2974.023599] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2974.026806] ? put_prev_task_fair+0x37/0x70 [ 2974.029533] ? kunit_kfree+0x200/0x200 [kunit] [ 2974.032287] ? rcu_read_lock_sched_held+0x12/0x80 [ 2974.035214] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2974.038423] ? rcu_read_lock_bh_held+0x60/0x70 [ 2974.041364] ? trace_kmalloc+0x3c/0x100 [ 2974.044236] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2974.047267] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2974.050466] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2974.054014] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2974.056863] ? kunit_add_resource+0x197/0x280 [kunit] [ 2974.059531] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2974.062139] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2974.064918] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2974.067664] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2974.070336] kthread+0x2a7/0x350 [ 2974.072811] ? kthread_complete_and_exit+0x20/0x20 [ 2974.075378] ret_from_fork+0x22/0x30 [ 2974.077949] [ 2974.082415] Allocated by task 121892: [ 2974.084797] kasan_save_stack+0x1e/0x40 [ 2974.087152] __kasan_kmalloc+0x81/0xa0 [ 2974.089462] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2974.092364] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2974.095240] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2974.098375] kthread+0x2a7/0x350 [ 2974.100907] ret_from_fork+0x22/0x30 [ 2974.105587] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2974.111716] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2974.119109] The buggy address belongs to the physical page: [ 2974.121841] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2974.125336] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2974.128383] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2974.131710] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2974.135180] page dumped because: kasan: bad access detected [ 2974.140178] Memory state around the buggy address: [ 2974.142937] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2974.146262] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2974.149423] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2974.152643] ^ [ 2974.155788] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2974.159084] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2974.162359] ================================================================== [ 2974.165427] ================================================================== [ 2974.168731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 2974.172491] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2974.177636] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2974.183791] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2974.186929] Call Trace: [ 2974.189179] [ 2974.191298] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 2974.194680] dump_stack_lvl+0x57/0x81 [ 2974.197473] print_address_description.constprop.0+0x1f/0x1e0 [ 2974.200481] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 2974.203600] print_report.cold+0x5c/0x237 [ 2974.206369] kasan_report+0xc9/0x100 [ 2974.208901] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 2974.211858] kasan_check_range+0xfd/0x1e0 [ 2974.214640] kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 2974.217418] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2974.220269] ? put_prev_task_fair+0x37/0x70 [ 2974.223163] ? kunit_kfree+0x200/0x200 [kunit] [ 2974.225937] ? rcu_read_lock_sched_held+0x12/0x80 [ 2974.228588] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2974.231764] ? rcu_read_lock_bh_held+0x60/0x70 [ 2974.234748] ? trace_kmalloc+0x3c/0x100 [ 2974.237445] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2974.240438] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2974.243497] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2974.246919] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2974.250035] ? kunit_add_resource+0x197/0x280 [kunit] [ 2974.252765] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2974.255596] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2974.258388] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2974.261690] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2974.264751] kthread+0x2a7/0x350 [ 2974.267376] ? kthread_complete_and_exit+0x20/0x20 [ 2974.270163] ret_from_fork+0x22/0x30 [ 2974.272550] [ 2974.277004] Allocated by task 121892: [ 2974.279600] kasan_save_stack+0x1e/0x40 [ 2974.282099] __kasan_kmalloc+0x81/0xa0 [ 2974.284471] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2974.287513] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2974.289938] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2974.292879] kthread+0x2a7/0x350 [ 2974.295389] ret_from_fork+0x22/0x30 [ 2974.300036] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2974.305386] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2974.312722] The buggy address belongs to the physical page: [ 2974.315509] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2974.319030] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2974.322254] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2974.325162] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2974.328356] page dumped because: kasan: bad access detected [ 2974.333118] Memory state around the buggy address: [ 2974.335935] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2974.339230] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2974.342151] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2974.345234] ^ [ 2974.348263] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2974.350984] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2974.353616] ================================================================== [ 2974.356506] ================================================================== [ 2974.359185] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 2974.362514] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2974.367977] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2974.374070] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2974.376807] Call Trace: [ 2974.378984] [ 2974.381094] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 2974.384050] dump_stack_lvl+0x57/0x81 [ 2974.386777] print_address_description.constprop.0+0x1f/0x1e0 [ 2974.389734] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 2974.392602] print_report.cold+0x5c/0x237 [ 2974.395088] kasan_report+0xc9/0x100 [ 2974.397519] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 2974.400724] kasan_check_range+0xfd/0x1e0 [ 2974.403178] kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 2974.406218] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2974.408806] ? put_prev_task_fair+0x37/0x70 [ 2974.411567] ? kunit_kfree+0x200/0x200 [kunit] [ 2974.414211] ? rcu_read_lock_sched_held+0x12/0x80 [ 2974.417089] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2974.420271] ? rcu_read_lock_bh_held+0x60/0x70 [ 2974.423137] ? trace_kmalloc+0x3c/0x100 [ 2974.425959] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2974.428853] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2974.432285] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2974.436011] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2974.439257] ? kunit_add_resource+0x197/0x280 [kunit] [ 2974.442349] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2974.445270] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2974.448350] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2974.451338] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2974.454382] kthread+0x2a7/0x350 [ 2974.456790] ? kthread_complete_and_exit+0x20/0x20 [ 2974.459722] ret_from_fork+0x22/0x30 [ 2974.462292] [ 2974.466700] Allocated by task 121892: [ 2974.469303] kasan_save_stack+0x1e/0x40 [ 2974.471823] __kasan_kmalloc+0x81/0xa0 [ 2974.474386] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2974.477135] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2974.479987] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2974.482753] kthread+0x2a7/0x350 [ 2974.485285] ret_from_fork+0x22/0x30 [ 2974.489950] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2974.495835] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2974.502791] The buggy address belongs to the physical page: [ 2974.505131] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2974.508321] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2974.511075] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2974.513782] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2974.516738] page dumped because: kasan: bad access detected [ 2974.521172] Memory state around the buggy address: [ 2974.523693] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2974.526682] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2974.529620] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2974.532357] ^ [ 2974.534950] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2974.537831] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2974.540639] ================================================================== [ 2974.543760] ================================================================== [ 2974.546794] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 2974.549955] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2974.554874] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2974.561008] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2974.564233] Call Trace: [ 2974.566488] [ 2974.568647] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 2974.571555] dump_stack_lvl+0x57/0x81 [ 2974.573943] print_address_description.constprop.0+0x1f/0x1e0 [ 2974.576872] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 2974.579715] print_report.cold+0x5c/0x237 [ 2974.582306] kasan_report+0xc9/0x100 [ 2974.584837] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 2974.587987] kasan_check_range+0xfd/0x1e0 [ 2974.590516] kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 2974.593648] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2974.596465] ? put_prev_task_fair+0x37/0x70 [ 2974.598998] ? kunit_kfree+0x200/0x200 [kunit] [ 2974.601688] ? rcu_read_lock_sched_held+0x12/0x80 [ 2974.604294] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2974.607246] ? rcu_read_lock_bh_held+0x60/0x70 [ 2974.609846] ? trace_kmalloc+0x3c/0x100 [ 2974.612334] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2974.614935] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2974.617576] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2974.620633] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2974.623531] ? kunit_add_resource+0x197/0x280 [kunit] [ 2974.626206] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2974.628988] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2974.632054] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2974.635130] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2974.637973] kthread+0x2a7/0x350 [ 2974.640577] ? kthread_complete_and_exit+0x20/0x20 [ 2974.643507] ret_from_fork+0x22/0x30 [ 2974.645991] [ 2974.650446] Allocated by task 121892: [ 2974.653051] kasan_save_stack+0x1e/0x40 [ 2974.655662] __kasan_kmalloc+0x81/0xa0 [ 2974.658215] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2974.661075] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2974.663834] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2974.666610] kthread+0x2a7/0x350 [ 2974.669110] ret_from_fork+0x22/0x30 [ 2974.673725] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2974.679809] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2974.687591] The buggy address belongs to the physical page: [ 2974.690186] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2974.693414] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2974.696590] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2974.699673] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2974.702457] page dumped because: kasan: bad access detected [ 2974.706948] Memory state around the buggy address: [ 2974.709581] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2974.712708] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2974.715954] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2974.718998] ^ [ 2974.722089] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2974.725155] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2974.728135] ================================================================== [ 2974.731048] ================================================================== [ 2974.734241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 2974.737569] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2974.742726] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2974.748803] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2974.751617] Call Trace: [ 2974.754003] [ 2974.756197] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 2974.759062] dump_stack_lvl+0x57/0x81 [ 2974.761678] print_address_description.constprop.0+0x1f/0x1e0 [ 2974.764623] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 2974.767758] print_report.cold+0x5c/0x237 [ 2974.770472] kasan_report+0xc9/0x100 [ 2974.773138] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 2974.776420] kasan_check_range+0xfd/0x1e0 [ 2974.779207] kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 2974.782575] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2974.785649] ? put_prev_task_fair+0x37/0x70 [ 2974.788574] ? kunit_kfree+0x200/0x200 [kunit] [ 2974.791430] ? rcu_read_lock_sched_held+0x12/0x80 [ 2974.794428] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2974.797491] ? rcu_read_lock_bh_held+0x60/0x70 [ 2974.800365] ? trace_kmalloc+0x3c/0x100 [ 2974.803153] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2974.806046] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2974.809091] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2974.812640] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2974.815866] ? kunit_add_resource+0x197/0x280 [kunit] [ 2974.818885] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2974.821926] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2974.824930] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2974.828229] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2974.830855] kthread+0x2a7/0x350 [ 2974.833309] ? kthread_complete_and_exit+0x20/0x20 [ 2974.836251] ret_from_fork+0x22/0x30 [ 2974.838811] [ 2974.843307] Allocated by task 121892: [ 2974.845888] kasan_save_stack+0x1e/0x40 [ 2974.848525] __kasan_kmalloc+0x81/0xa0 [ 2974.851137] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2974.854140] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2974.857009] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2974.860062] kthread+0x2a7/0x350 [ 2974.862568] ret_from_fork+0x22/0x30 [ 2974.867245] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2974.872827] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2974.880661] The buggy address belongs to the physical page: [ 2974.883270] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2974.887049] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2974.890274] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2974.893654] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2974.896677] page dumped because: kasan: bad access detected [ 2974.901683] Memory state around the buggy address: [ 2974.904451] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2974.907622] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2974.910777] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2974.913868] ^ [ 2974.916916] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2974.920095] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2974.923374] ================================================================== [ 2974.926735] ================================================================== [ 2974.930042] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 2974.933719] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2974.939220] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2974.945697] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2974.948759] Call Trace: [ 2974.951152] [ 2974.953447] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 2974.956747] dump_stack_lvl+0x57/0x81 [ 2974.959421] print_address_description.constprop.0+0x1f/0x1e0 [ 2974.962523] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 2974.965532] print_report.cold+0x5c/0x237 [ 2974.967933] kasan_report+0xc9/0x100 [ 2974.970534] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 2974.973703] kasan_check_range+0xfd/0x1e0 [ 2974.976164] kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 2974.979135] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2974.982293] ? put_prev_task_fair+0x37/0x70 [ 2974.985429] ? kunit_kfree+0x200/0x200 [kunit] [ 2974.988332] ? rcu_read_lock_sched_held+0x12/0x80 [ 2974.991130] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2974.994329] ? rcu_read_lock_bh_held+0x60/0x70 [ 2974.997155] ? trace_kmalloc+0x3c/0x100 [ 2974.999937] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2975.002881] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2975.005654] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2975.008758] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2975.011501] ? kunit_add_resource+0x197/0x280 [kunit] [ 2975.014286] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.017117] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2975.020138] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.023528] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2975.026571] kthread+0x2a7/0x350 [ 2975.029141] ? kthread_complete_and_exit+0x20/0x20 [ 2975.031982] ret_from_fork+0x22/0x30 [ 2975.034338] [ 2975.038630] Allocated by task 121892: [ 2975.041003] kasan_save_stack+0x1e/0x40 [ 2975.043427] __kasan_kmalloc+0x81/0xa0 [ 2975.045702] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2975.048271] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.050700] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.053391] kthread+0x2a7/0x350 [ 2975.055649] ret_from_fork+0x22/0x30 [ 2975.060034] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2975.065776] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2975.073328] The buggy address belongs to the physical page: [ 2975.076100] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2975.079608] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2975.082687] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2975.085507] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2975.088555] page dumped because: kasan: bad access detected [ 2975.093437] Memory state around the buggy address: [ 2975.095797] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2975.098569] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2975.101260] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2975.103954] ^ [ 2975.106667] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2975.109624] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2975.112439] ================================================================== [ 2975.115555] ================================================================== [ 2975.118703] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 2975.122077] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2975.127485] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2975.133760] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2975.136999] Call Trace: [ 2975.139361] [ 2975.141654] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 2975.144763] dump_stack_lvl+0x57/0x81 [ 2975.147434] print_address_description.constprop.0+0x1f/0x1e0 [ 2975.150311] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 2975.153243] print_report.cold+0x5c/0x237 [ 2975.155914] kasan_report+0xc9/0x100 [ 2975.158473] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 2975.161813] kasan_check_range+0xfd/0x1e0 [ 2975.164567] kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 2975.167891] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2975.170958] ? put_prev_task_fair+0x37/0x70 [ 2975.173822] ? kunit_kfree+0x200/0x200 [kunit] [ 2975.176656] ? rcu_read_lock_sched_held+0x12/0x80 [ 2975.179645] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2975.182619] ? rcu_read_lock_bh_held+0x60/0x70 [ 2975.185608] ? trace_kmalloc+0x3c/0x100 [ 2975.188259] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2975.190999] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2975.194139] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2975.197236] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2975.199998] ? kunit_add_resource+0x197/0x280 [kunit] [ 2975.202646] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.205273] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2975.207936] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.211065] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2975.213782] kthread+0x2a7/0x350 [ 2975.216381] ? kthread_complete_and_exit+0x20/0x20 [ 2975.219300] ret_from_fork+0x22/0x30 [ 2975.221688] [ 2975.225856] Allocated by task 121892: [ 2975.228248] kasan_save_stack+0x1e/0x40 [ 2975.230506] __kasan_kmalloc+0x81/0xa0 [ 2975.232776] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2975.235656] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.238077] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.240930] kthread+0x2a7/0x350 [ 2975.243127] ret_from_fork+0x22/0x30 [ 2975.247393] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2975.252489] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2975.259580] The buggy address belongs to the physical page: [ 2975.261911] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2975.264861] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2975.267457] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2975.270430] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2975.273264] page dumped because: kasan: bad access detected [ 2975.277591] Memory state around the buggy address: [ 2975.279952] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2975.282630] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2975.285763] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2975.288561] ^ [ 2975.291499] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2975.294360] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2975.297244] ================================================================== [ 2975.300206] ================================================================== [ 2975.302950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 2975.306255] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2975.311003] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2975.317320] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2975.320338] Call Trace: [ 2975.322713] [ 2975.325020] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 2975.328036] dump_stack_lvl+0x57/0x81 [ 2975.330403] print_address_description.constprop.0+0x1f/0x1e0 [ 2975.333319] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 2975.336672] print_report.cold+0x5c/0x237 [ 2975.339312] kasan_report+0xc9/0x100 [ 2975.341970] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 2975.344993] kasan_check_range+0xfd/0x1e0 [ 2975.347427] kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 2975.350960] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2975.354270] ? put_prev_task_fair+0x37/0x70 [ 2975.357352] ? kunit_kfree+0x200/0x200 [kunit] [ 2975.360509] ? rcu_read_lock_sched_held+0x12/0x80 [ 2975.363696] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2975.366868] ? rcu_read_lock_bh_held+0x60/0x70 [ 2975.370050] ? trace_kmalloc+0x3c/0x100 [ 2975.372966] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2975.375791] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2975.378962] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2975.382507] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2975.385831] ? kunit_add_resource+0x197/0x280 [kunit] [ 2975.388533] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.391347] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2975.394173] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.396971] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2975.399653] kthread+0x2a7/0x350 [ 2975.401982] ? kthread_complete_and_exit+0x20/0x20 [ 2975.404537] ret_from_fork+0x22/0x30 [ 2975.406989] [ 2975.411273] Allocated by task 121892: [ 2975.413633] kasan_save_stack+0x1e/0x40 [ 2975.416250] __kasan_kmalloc+0x81/0xa0 [ 2975.418842] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2975.421350] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.423780] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.426553] kthread+0x2a7/0x350 [ 2975.428767] ret_from_fork+0x22/0x30 [ 2975.433250] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2975.438480] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2975.445350] The buggy address belongs to the physical page: [ 2975.447718] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2975.450728] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2975.453335] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2975.456272] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2975.459162] page dumped because: kasan: bad access detected [ 2975.463684] Memory state around the buggy address: [ 2975.466101] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2975.468849] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2975.471974] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2975.474640] ^ [ 2975.477425] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2975.480106] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2975.483032] ================================================================== [ 2975.485972] ================================================================== [ 2975.489074] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 2975.492579] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2975.497319] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2975.503160] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2975.505822] Call Trace: [ 2975.508094] [ 2975.510365] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 2975.513157] dump_stack_lvl+0x57/0x81 [ 2975.515509] print_address_description.constprop.0+0x1f/0x1e0 [ 2975.518277] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 2975.521625] print_report.cold+0x5c/0x237 [ 2975.524378] kasan_report+0xc9/0x100 [ 2975.526783] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 2975.529921] kasan_check_range+0xfd/0x1e0 [ 2975.532575] kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 2975.535918] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2975.538842] ? put_prev_task_fair+0x37/0x70 [ 2975.541403] ? kunit_kfree+0x200/0x200 [kunit] [ 2975.544036] ? rcu_read_lock_sched_held+0x12/0x80 [ 2975.546671] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2975.549609] ? rcu_read_lock_bh_held+0x60/0x70 [ 2975.552236] ? trace_kmalloc+0x3c/0x100 [ 2975.554737] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2975.557368] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2975.560373] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2975.563648] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2975.566443] ? kunit_add_resource+0x197/0x280 [kunit] [ 2975.569392] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.572239] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2975.574996] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.578017] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2975.580927] kthread+0x2a7/0x350 [ 2975.583304] ? kthread_complete_and_exit+0x20/0x20 [ 2975.586006] ret_from_fork+0x22/0x30 [ 2975.588526] [ 2975.592852] Allocated by task 121892: [ 2975.595522] kasan_save_stack+0x1e/0x40 [ 2975.597913] __kasan_kmalloc+0x81/0xa0 [ 2975.600319] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2975.603090] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.605752] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.608395] kthread+0x2a7/0x350 [ 2975.610769] ret_from_fork+0x22/0x30 [ 2975.615293] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2975.620766] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2975.627653] The buggy address belongs to the physical page: [ 2975.630082] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2975.633182] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2975.635828] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2975.639077] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2975.642255] page dumped because: kasan: bad access detected [ 2975.646812] Memory state around the buggy address: [ 2975.649474] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2975.652412] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2975.655450] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2975.658679] ^ [ 2975.661559] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2975.664535] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2975.667704] ================================================================== [ 2975.670806] ================================================================== [ 2975.673953] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 2975.677642] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2975.682876] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2975.689558] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2975.692700] Call Trace: [ 2975.695106] [ 2975.697244] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 2975.700889] dump_stack_lvl+0x57/0x81 [ 2975.703820] print_address_description.constprop.0+0x1f/0x1e0 [ 2975.707237] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 2975.710972] print_report.cold+0x5c/0x237 [ 2975.714000] kasan_report+0xc9/0x100 [ 2975.716923] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 2975.720611] kasan_check_range+0xfd/0x1e0 [ 2975.723625] kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 2975.727269] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2975.730925] ? put_prev_task_fair+0x37/0x70 [ 2975.734056] ? kunit_kfree+0x200/0x200 [kunit] [ 2975.737224] ? rcu_read_lock_sched_held+0x12/0x80 [ 2975.740045] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2975.743258] ? rcu_read_lock_bh_held+0x60/0x70 [ 2975.746258] ? trace_kmalloc+0x3c/0x100 [ 2975.749035] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2975.751794] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2975.754638] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2975.758194] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2975.761224] ? kunit_add_resource+0x197/0x280 [kunit] [ 2975.764372] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.767252] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2975.770058] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.773112] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2975.776080] kthread+0x2a7/0x350 [ 2975.778743] ? kthread_complete_and_exit+0x20/0x20 [ 2975.781530] ret_from_fork+0x22/0x30 [ 2975.784257] [ 2975.788878] Allocated by task 121892: [ 2975.791534] kasan_save_stack+0x1e/0x40 [ 2975.794225] __kasan_kmalloc+0x81/0xa0 [ 2975.796777] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2975.799824] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.802704] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.805810] kthread+0x2a7/0x350 [ 2975.808175] ret_from_fork+0x22/0x30 [ 2975.812960] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2975.818947] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2975.826878] The buggy address belongs to the physical page: [ 2975.829750] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2975.833419] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2975.836515] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2975.839954] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2975.843343] page dumped because: kasan: bad access detected [ 2975.848361] Memory state around the buggy address: [ 2975.851063] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2975.854040] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2975.856958] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2975.859751] ^ [ 2975.862366] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2975.865054] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2975.867663] ================================================================== [ 2975.870383] ================================================================== [ 2975.873097] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 2975.876214] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2975.881019] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2975.886585] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2975.889477] Call Trace: [ 2975.891691] [ 2975.893954] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 2975.896847] dump_stack_lvl+0x57/0x81 [ 2975.899241] print_address_description.constprop.0+0x1f/0x1e0 [ 2975.901922] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 2975.904837] print_report.cold+0x5c/0x237 [ 2975.907347] kasan_report+0xc9/0x100 [ 2975.909822] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 2975.912750] kasan_check_range+0xfd/0x1e0 [ 2975.915275] kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 2975.918516] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2975.921700] ? put_prev_task_fair+0x37/0x70 [ 2975.924593] ? kunit_kfree+0x200/0x200 [kunit] [ 2975.927229] ? rcu_read_lock_sched_held+0x12/0x80 [ 2975.929943] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2975.932846] ? rcu_read_lock_bh_held+0x60/0x70 [ 2975.935484] ? trace_kmalloc+0x3c/0x100 [ 2975.938126] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2975.940801] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2975.943753] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2975.946759] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2975.949630] ? kunit_add_resource+0x197/0x280 [kunit] [ 2975.952461] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.955481] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2975.958309] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.961302] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2975.964401] kthread+0x2a7/0x350 [ 2975.967074] ? kthread_complete_and_exit+0x20/0x20 [ 2975.969988] ret_from_fork+0x22/0x30 [ 2975.972724] [ 2975.977303] Allocated by task 121892: [ 2975.979976] kasan_save_stack+0x1e/0x40 [ 2975.982650] __kasan_kmalloc+0x81/0xa0 [ 2975.985072] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2975.987903] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2975.990640] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2975.993740] kthread+0x2a7/0x350 [ 2975.996231] ret_from_fork+0x22/0x30 [ 2976.000766] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2976.006364] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2976.013775] The buggy address belongs to the physical page: [ 2976.016464] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2976.020096] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2976.023514] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2976.026965] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2976.030208] page dumped because: kasan: bad access detected [ 2976.035036] Memory state around the buggy address: [ 2976.037858] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2976.041147] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2976.044023] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2976.047111] ^ [ 2976.050168] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2976.053372] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2976.056653] ================================================================== [ 2976.059694] ================================================================== [ 2976.062799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 2976.066568] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2976.071996] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2976.078327] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2976.081247] Call Trace: [ 2976.083438] [ 2976.085797] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 2976.089140] dump_stack_lvl+0x57/0x81 [ 2976.091816] print_address_description.constprop.0+0x1f/0x1e0 [ 2976.094979] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 2976.098212] print_report.cold+0x5c/0x237 [ 2976.100786] kasan_report+0xc9/0x100 [ 2976.103472] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 2976.106742] kasan_check_range+0xfd/0x1e0 [ 2976.109565] kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 2976.112927] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2976.116135] ? put_prev_task_fair+0x37/0x70 [ 2976.118824] ? kunit_kfree+0x200/0x200 [kunit] [ 2976.121836] ? rcu_read_lock_sched_held+0x12/0x80 [ 2976.124908] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2976.128070] ? rcu_read_lock_bh_held+0x60/0x70 [ 2976.131069] ? trace_kmalloc+0x3c/0x100 [ 2976.133593] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2976.136469] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2976.139503] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2976.143449] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2976.146873] ? kunit_add_resource+0x197/0x280 [kunit] [ 2976.150126] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2976.153244] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2976.156607] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2976.160108] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2976.163485] kthread+0x2a7/0x350 [ 2976.166407] ? kthread_complete_and_exit+0x20/0x20 [ 2976.169422] ret_from_fork+0x22/0x30 [ 2976.172386] [ 2976.177365] Allocated by task 121892: [ 2976.180137] kasan_save_stack+0x1e/0x40 [ 2976.182750] __kasan_kmalloc+0x81/0xa0 [ 2976.185455] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2976.188409] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2976.191245] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2976.194055] kthread+0x2a7/0x350 [ 2976.196624] ret_from_fork+0x22/0x30 [ 2976.201423] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2976.206989] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2976.214423] The buggy address belongs to the physical page: [ 2976.217293] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2976.220692] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2976.223698] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2976.227067] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2976.230445] page dumped because: kasan: bad access detected [ 2976.235022] Memory state around the buggy address: [ 2976.237620] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2976.240562] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2976.243449] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2976.246181] ^ [ 2976.248938] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2976.251912] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2976.255082] ================================================================== [ 2976.257970] ================================================================== [ 2976.260891] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 2976.264438] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2976.269854] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2976.275740] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2976.278625] Call Trace: [ 2976.280849] [ 2976.283100] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 2976.286265] dump_stack_lvl+0x57/0x81 [ 2976.288829] print_address_description.constprop.0+0x1f/0x1e0 [ 2976.291566] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 2976.294585] print_report.cold+0x5c/0x237 [ 2976.297125] kasan_report+0xc9/0x100 [ 2976.299475] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 2976.302337] kasan_check_range+0xfd/0x1e0 [ 2976.305044] kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 2976.308191] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2976.311253] ? put_prev_task_fair+0x37/0x70 [ 2976.313833] ? kunit_kfree+0x200/0x200 [kunit] [ 2976.316491] ? rcu_read_lock_sched_held+0x12/0x80 [ 2976.319375] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2976.322125] ? rcu_read_lock_bh_held+0x60/0x70 [ 2976.324734] ? trace_kmalloc+0x3c/0x100 [ 2976.327402] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2976.330184] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2976.333322] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2976.336747] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2976.339801] ? kunit_add_resource+0x197/0x280 [kunit] [ 2976.342632] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2976.345578] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2976.348340] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2976.351400] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2976.354339] kthread+0x2a7/0x350 [ 2976.356720] ? kthread_complete_and_exit+0x20/0x20 [ 2976.359579] ret_from_fork+0x22/0x30 [ 2976.362148] [ 2976.366582] Allocated by task 121892: [ 2976.369019] kasan_save_stack+0x1e/0x40 [ 2976.371538] __kasan_kmalloc+0x81/0xa0 [ 2976.374024] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2976.376839] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2976.379454] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2976.382158] kthread+0x2a7/0x350 [ 2976.384559] ret_from_fork+0x22/0x30 [ 2976.389119] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2976.394738] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2976.401909] The buggy address belongs to the physical page: [ 2976.404662] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2976.408163] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2976.411386] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2976.414247] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2976.417516] page dumped because: kasan: bad access detected [ 2976.422207] Memory state around the buggy address: [ 2976.424665] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2976.427955] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2976.430851] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2976.433846] ^ [ 2976.436797] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2976.439831] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2976.442641] ================================================================== [ 2976.445651] ================================================================== [ 2976.448509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 2976.451909] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2976.457257] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2976.463517] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2976.466243] Call Trace: [ 2976.468416] [ 2976.470602] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 2976.473576] dump_stack_lvl+0x57/0x81 [ 2976.476169] print_address_description.constprop.0+0x1f/0x1e0 [ 2976.479073] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 2976.482198] print_report.cold+0x5c/0x237 [ 2976.484611] kasan_report+0xc9/0x100 [ 2976.487022] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 2976.490318] kasan_check_range+0xfd/0x1e0 [ 2976.493051] kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 2976.496391] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2976.499369] ? put_prev_task_fair+0x37/0x70 [ 2976.502037] ? kunit_kfree+0x200/0x200 [kunit] [ 2976.504984] ? rcu_read_lock_sched_held+0x12/0x80 [ 2976.507805] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2976.510884] ? rcu_read_lock_bh_held+0x60/0x70 [ 2976.513876] ? trace_kmalloc+0x3c/0x100 [ 2976.516543] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2976.519470] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2976.522623] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2976.526167] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2976.529161] ? kunit_add_resource+0x197/0x280 [kunit] [ 2976.533271] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2976.536349] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2976.539212] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2976.542657] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2976.545787] kthread+0x2a7/0x350 [ 2976.548466] ? kthread_complete_and_exit+0x20/0x20 [ 2976.551306] ret_from_fork+0x22/0x30 [ 2976.553980] [ 2976.558470] Allocated by task 121892: [ 2976.561137] kasan_save_stack+0x1e/0x40 [ 2976.563823] __kasan_kmalloc+0x81/0xa0 [ 2976.566493] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2976.569536] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2976.572346] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2976.575515] kthread+0x2a7/0x350 [ 2976.577869] ret_from_fork+0x22/0x30 [ 2976.582645] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2976.588308] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2976.596285] The buggy address belongs to the physical page: [ 2976.599138] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2976.602813] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2976.605890] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2976.609359] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2976.612598] page dumped because: kasan: bad access detected [ 2976.617665] Memory state around the buggy address: [ 2976.620448] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2976.623636] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2976.626965] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2976.630057] ^ [ 2976.633182] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2976.636335] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2976.639553] ================================================================== [ 2976.642873] ================================================================== [ 2976.646040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 2976.650167] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2976.655335] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2976.662219] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2976.665278] Call Trace: [ 2976.667666] [ 2976.670189] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 2976.673853] dump_stack_lvl+0x57/0x81 [ 2976.676614] print_address_description.constprop.0+0x1f/0x1e0 [ 2976.679853] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 2976.683404] print_report.cold+0x5c/0x237 [ 2976.686313] kasan_report+0xc9/0x100 [ 2976.688918] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 2976.692121] kasan_check_range+0xfd/0x1e0 [ 2976.694725] kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 2976.698006] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2976.701056] ? put_prev_task_fair+0x37/0x70 [ 2976.703615] ? kunit_kfree+0x200/0x200 [kunit] [ 2976.706590] ? rcu_read_lock_sched_held+0x12/0x80 [ 2976.709462] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2976.712620] ? rcu_read_lock_bh_held+0x60/0x70 [ 2976.715580] ? trace_kmalloc+0x3c/0x100 [ 2976.718429] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2976.721239] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2976.724563] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2976.728170] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2976.731577] ? kunit_add_resource+0x197/0x280 [kunit] [ 2976.734882] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2976.737780] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2976.740751] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2976.743934] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2976.747070] kthread+0x2a7/0x350 [ 2976.749740] ? kthread_complete_and_exit+0x20/0x20 [ 2976.752588] ret_from_fork+0x22/0x30 [ 2976.755324] [ 2976.759759] Allocated by task 121892: [ 2976.762276] kasan_save_stack+0x1e/0x40 [ 2976.764762] __kasan_kmalloc+0x81/0xa0 [ 2976.767397] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2976.770293] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2976.773028] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2976.775942] kthread+0x2a7/0x350 [ 2976.778455] ret_from_fork+0x22/0x30 [ 2976.783248] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2976.789299] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2976.797125] The buggy address belongs to the physical page: [ 2976.799727] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2976.803132] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2976.806323] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2976.809600] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2976.812770] page dumped because: kasan: bad access detected [ 2976.817790] Memory state around the buggy address: [ 2976.820437] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2976.823533] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2976.826735] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2976.829836] ^ [ 2976.832653] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2976.835536] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2976.838829] ================================================================== [ 2976.841981] ================================================================== [ 2976.845206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 2976.848914] Read of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2976.854138] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2976.860347] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2976.863448] Call Trace: [ 2976.865812] [ 2976.868030] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 2976.871429] dump_stack_lvl+0x57/0x81 [ 2976.874227] print_address_description.constprop.0+0x1f/0x1e0 [ 2976.877356] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 2976.880570] print_report.cold+0x5c/0x237 [ 2976.883361] kasan_report+0xc9/0x100 [ 2976.885845] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 2976.889174] kasan_check_range+0xfd/0x1e0 [ 2976.891814] kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 2976.894984] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2976.898235] ? put_prev_task_fair+0x37/0x70 [ 2976.901141] ? kunit_kfree+0x200/0x200 [kunit] [ 2976.903925] ? rcu_read_lock_sched_held+0x12/0x80 [ 2976.906791] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2976.909738] ? rcu_read_lock_bh_held+0x60/0x70 [ 2976.912645] ? trace_kmalloc+0x3c/0x100 [ 2976.915488] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2976.918548] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2976.921785] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2976.925510] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2976.928727] ? kunit_add_resource+0x197/0x280 [kunit] [ 2976.931646] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2976.934319] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2976.937098] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2976.940402] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2976.943305] kthread+0x2a7/0x350 [ 2976.945989] ? kthread_complete_and_exit+0x20/0x20 [ 2976.948999] ret_from_fork+0x22/0x30 [ 2976.951736] [ 2976.956331] Allocated by task 121892: [ 2976.958825] kasan_save_stack+0x1e/0x40 [ 2976.961525] __kasan_kmalloc+0x81/0xa0 [ 2976.964184] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2976.966969] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2976.969860] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2976.972971] kthread+0x2a7/0x350 [ 2976.975503] ret_from_fork+0x22/0x30 [ 2976.980112] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2976.986235] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2976.994139] The buggy address belongs to the physical page: [ 2976.997078] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2977.000591] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2977.003820] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2977.007331] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2977.010502] page dumped because: kasan: bad access detected [ 2977.015494] Memory state around the buggy address: [ 2977.018256] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2977.021516] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2977.024475] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2977.027782] ^ [ 2977.030684] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2977.033848] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2977.037064] ================================================================== [ 2977.040219] ================================================================== [ 2977.043404] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 2977.047234] Read of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2977.052568] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2977.059101] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2977.062286] Call Trace: [ 2977.064630] [ 2977.066833] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 2977.070227] dump_stack_lvl+0x57/0x81 [ 2977.072804] print_address_description.constprop.0+0x1f/0x1e0 [ 2977.075843] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 2977.079329] print_report.cold+0x5c/0x237 [ 2977.082028] kasan_report+0xc9/0x100 [ 2977.084641] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 2977.087812] kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 2977.091094] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2977.094328] ? put_prev_task_fair+0x37/0x70 [ 2977.097090] ? kunit_kfree+0x200/0x200 [kunit] [ 2977.099963] ? rcu_read_lock_sched_held+0x12/0x80 [ 2977.102960] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2977.106212] ? rcu_read_lock_bh_held+0x60/0x70 [ 2977.109211] ? trace_kmalloc+0x3c/0x100 [ 2977.112018] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2977.115012] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2977.117969] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2977.121492] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2977.124713] ? kunit_add_resource+0x197/0x280 [kunit] [ 2977.127669] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2977.130607] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2977.133661] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2977.137099] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2977.140092] kthread+0x2a7/0x350 [ 2977.142723] ? kthread_complete_and_exit+0x20/0x20 [ 2977.145552] ret_from_fork+0x22/0x30 [ 2977.148270] [ 2977.152788] Allocated by task 121892: [ 2977.155401] kasan_save_stack+0x1e/0x40 [ 2977.157823] __kasan_kmalloc+0x81/0xa0 [ 2977.160376] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2977.163327] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2977.165981] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2977.169095] kthread+0x2a7/0x350 [ 2977.171499] ret_from_fork+0x22/0x30 [ 2977.176143] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2977.181995] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2977.189620] The buggy address belongs to the physical page: [ 2977.192348] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2977.195615] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2977.198620] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2977.201974] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2977.205270] page dumped because: kasan: bad access detected [ 2977.210060] Memory state around the buggy address: [ 2977.212785] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2977.215925] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2977.219242] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2977.222348] ^ [ 2977.225402] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2977.228677] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2977.231832] ================================================================== [ 2977.235055] ================================================================== [ 2977.238261] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 2977.242126] Write of size 8 at addr ffff888166bd64e8 by task kunit_try_catch/121892 [ 2977.246926] CPU: 0 PID: 121892 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2977.252510] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2977.255269] Call Trace: [ 2977.257476] [ 2977.259595] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 2977.262471] dump_stack_lvl+0x57/0x81 [ 2977.264878] print_address_description.constprop.0+0x1f/0x1e0 [ 2977.267664] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 2977.270941] print_report.cold+0x5c/0x237 [ 2977.273589] kasan_report+0xc9/0x100 [ 2977.276289] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 2977.279692] kasan_check_range+0xfd/0x1e0 [ 2977.282490] kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 2977.285809] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2977.288789] ? put_prev_task_fair+0x37/0x70 [ 2977.291372] ? kunit_kfree+0x200/0x200 [kunit] [ 2977.294038] ? rcu_read_lock_sched_held+0x12/0x80 [ 2977.297103] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2977.300279] ? rcu_read_lock_bh_held+0x60/0x70 [ 2977.302993] ? trace_kmalloc+0x3c/0x100 [ 2977.305766] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2977.308561] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2977.311614] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2977.315156] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2977.318079] ? kunit_add_resource+0x197/0x280 [kunit] [ 2977.321215] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2977.324077] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2977.327091] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2977.329975] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2977.332676] kthread+0x2a7/0x350 [ 2977.335363] ? kthread_complete_and_exit+0x20/0x20 [ 2977.338366] ret_from_fork+0x22/0x30 [ 2977.340994] [ 2977.345497] Allocated by task 121892: [ 2977.348173] kasan_save_stack+0x1e/0x40 [ 2977.350835] __kasan_kmalloc+0x81/0xa0 [ 2977.353352] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2977.356338] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2977.359076] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2977.362204] kthread+0x2a7/0x350 [ 2977.364740] ret_from_fork+0x22/0x30 [ 2977.369521] The buggy address belongs to the object at ffff888166bd64e0 which belongs to the cache kmalloc-16 of size 16 [ 2977.375411] The buggy address is located 8 bytes inside of 16-byte region [ffff888166bd64e0, ffff888166bd64f0) [ 2977.383193] The buggy address belongs to the physical page: [ 2977.386066] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2977.389552] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2977.392606] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2977.395910] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2977.399056] page dumped because: kasan: bad access detected [ 2977.403826] Memory state around the buggy address: [ 2977.406431] ffff888166bd6380: fc fc fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2977.409613] ffff888166bd6400: fa fb fc fc fc fc fc fc fc fc fc fc fa fb fc fc [ 2977.412797] >ffff888166bd6480: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 01 fc fc [ 2977.416008] ^ [ 2977.419080] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2977.422228] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2977.425350] ================================================================== [ 2977.428420] ok 45 - kasan_bitops_generic [ 2977.428805] ok 46 - kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2977.432669] ================================================================== [ 2977.439304] BUG: KASAN: use-after-free in kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2977.442554] Read of size 1 at addr ffff888166bd6640 by task kunit_try_catch/121896 [ 2977.447948] CPU: 0 PID: 121896 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2977.454060] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2977.457248] Call Trace: [ 2977.459555] [ 2977.461897] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2977.464905] dump_stack_lvl+0x57/0x81 [ 2977.467475] print_address_description.constprop.0+0x1f/0x1e0 [ 2977.470583] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2977.473576] print_report.cold+0x5c/0x237 [ 2977.476284] kasan_report+0xc9/0x100 [ 2977.478778] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2977.481893] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2977.484899] __kasan_check_byte+0x36/0x50 [ 2977.487580] kfree_sensitive+0x1b/0x60 [ 2977.490144] kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2977.493013] ? vmalloc_oob+0x5e0/0x5e0 [test_kasan] [ 2977.495884] ? do_raw_spin_trylock+0xb5/0x180 [ 2977.498614] ? do_raw_spin_lock+0x270/0x270 [ 2977.501337] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2977.504328] ? kunit_add_resource+0x197/0x280 [kunit] [ 2977.507183] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2977.510024] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2977.512985] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2977.516033] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2977.519004] kthread+0x2a7/0x350 [ 2977.521432] ? kthread_complete_and_exit+0x20/0x20 [ 2977.524364] ret_from_fork+0x22/0x30 [ 2977.526931] [ 2977.531337] Allocated by task 121896: [ 2977.533673] kasan_save_stack+0x1e/0x40 [ 2977.536245] __kasan_kmalloc+0x81/0xa0 [ 2977.538502] kmalloc_double_kzfree+0x9a/0x270 [test_kasan] [ 2977.541322] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2977.543847] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2977.546588] kthread+0x2a7/0x350 [ 2977.549034] ret_from_fork+0x22/0x30 [ 2977.553306] Freed by task 121896: [ 2977.555527] kasan_save_stack+0x1e/0x40 [ 2977.558004] kasan_set_track+0x21/0x30 [ 2977.560337] kasan_set_free_info+0x20/0x40 [ 2977.562651] __kasan_slab_free+0x108/0x170 [ 2977.565017] slab_free_freelist_hook+0x11d/0x1d0 [ 2977.567558] kfree+0xe2/0x3c0 [ 2977.569783] kmalloc_double_kzfree+0x137/0x270 [test_kasan] [ 2977.572480] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2977.575172] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2977.577743] kthread+0x2a7/0x350 [ 2977.580052] ret_from_fork+0x22/0x30 [ 2977.584187] The buggy address belongs to the object at ffff888166bd6640 which belongs to the cache kmalloc-16 of size 16 [ 2977.589430] The buggy address is located 0 bytes inside of 16-byte region [ffff888166bd6640, ffff888166bd6650) [ 2977.595929] The buggy address belongs to the physical page: [ 2977.598435] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2977.601692] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2977.604615] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2977.607716] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2977.610799] page dumped because: kasan: bad access detected [ 2977.615480] Memory state around the buggy address: [ 2977.618042] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2977.621077] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2977.623658] >ffff888166bd6600: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc [ 2977.626655] ^ [ 2977.629292] ffff888166bd6680: 00 00 fc fc fc fc fc fc fa fb fc fc fa fb fc fc [ 2977.632070] ffff888166bd6700: fc fc fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 2977.634793] ================================================================== [ 2977.637836] ================================================================== [ 2977.640767] BUG: KASAN: double-free or invalid-free in kfree+0xe2/0x3c0 [ 2977.645594] CPU: 0 PID: 121896 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2977.651156] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2977.653973] Call Trace: [ 2977.656248] [ 2977.658428] dump_stack_lvl+0x57/0x81 [ 2977.660975] print_address_description.constprop.0+0x1f/0x1e0 [ 2977.663702] print_report.cold+0x5c/0x237 [ 2977.666281] ? kfree+0xe2/0x3c0 [ 2977.668433] ? kfree+0xe2/0x3c0 [ 2977.670814] kasan_report_invalid_free+0x99/0xc0 [ 2977.673445] ? kfree+0xe2/0x3c0 [ 2977.675739] ? kfree+0xe2/0x3c0 [ 2977.678130] __kasan_slab_free+0x152/0x170 [ 2977.680746] slab_free_freelist_hook+0x11d/0x1d0 [ 2977.683417] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2977.686255] kfree+0xe2/0x3c0 [ 2977.688651] ? __kasan_check_byte+0x36/0x50 [ 2977.691292] kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2977.694416] ? vmalloc_oob+0x5e0/0x5e0 [test_kasan] [ 2977.697342] ? do_raw_spin_trylock+0xb5/0x180 [ 2977.700025] ? do_raw_spin_lock+0x270/0x270 [ 2977.702682] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2977.705801] ? kunit_add_resource+0x197/0x280 [kunit] [ 2977.708839] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2977.711625] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2977.714537] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2977.717614] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2977.720437] kthread+0x2a7/0x350 [ 2977.722835] ? kthread_complete_and_exit+0x20/0x20 [ 2977.725407] ret_from_fork+0x22/0x30 [ 2977.727778] [ 2977.731792] Allocated by task 121896: [ 2977.734034] kasan_save_stack+0x1e/0x40 [ 2977.736355] __kasan_kmalloc+0x81/0xa0 [ 2977.738740] kmalloc_double_kzfree+0x9a/0x270 [test_kasan] [ 2977.741412] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2977.743692] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2977.746523] kthread+0x2a7/0x350 [ 2977.748786] ret_from_fork+0x22/0x30 [ 2977.752825] Freed by task 121896: [ 2977.755042] kasan_save_stack+0x1e/0x40 [ 2977.757258] kasan_set_track+0x21/0x30 [ 2977.759369] kasan_set_free_info+0x20/0x40 [ 2977.761637] __kasan_slab_free+0x108/0x170 [ 2977.763780] slab_free_freelist_hook+0x11d/0x1d0 [ 2977.766002] kfree+0xe2/0x3c0 [ 2977.767959] kmalloc_double_kzfree+0x137/0x270 [test_kasan] [ 2977.770391] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2977.772678] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2977.775399] kthread+0x2a7/0x350 [ 2977.777498] ret_from_fork+0x22/0x30 [ 2977.781223] The buggy address belongs to the object at ffff888166bd6640 which belongs to the cache kmalloc-16 of size 16 [ 2977.786131] The buggy address is located 0 bytes inside of 16-byte region [ffff888166bd6640, ffff888166bd6650) [ 2977.792869] The buggy address belongs to the physical page: [ 2977.795429] page:000000007e59ae9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x166bd6 [ 2977.798653] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 2977.801548] raw: 0017ffffc0000200 0000000000000000 dead000000000122 ffff8881000423c0 [ 2977.804668] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2977.807652] page dumped because: kasan: bad access detected [ 2977.812198] Memory state around the buggy address: [ 2977.814813] ffff888166bd6500: fa fb fc fc fc fc fc fc fc fc fc fc 00 00 fc fc [ 2977.817921] ffff888166bd6580: 00 00 fc fc 00 00 fc fc fc fc fc fc 00 00 fc fc [ 2977.820864] >ffff888166bd6600: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc [ 2977.823788] ^ [ 2977.826461] ffff888166bd6680: 00 00 fc fc fc fc fc fc fa fb fc fc fa fb fc fc [ 2977.829535] ffff888166bd6700: fc fc fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 2977.832527] ================================================================== [ 2977.835474] ok 47 - kmalloc_double_kzfree [ 2977.835839] ok 48 - vmalloc_helpers_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2977.841653] ================================================================== [ 2977.847224] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x596/0x5e0 [test_kasan] [ 2977.849965] Read of size 1 at addr ffffc9000007b7f3 by task kunit_try_catch/121898 [ 2977.854669] CPU: 0 PID: 121898 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2977.860116] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2977.862853] Call Trace: [ 2977.865079] [ 2977.867226] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 2977.869943] dump_stack_lvl+0x57/0x81 [ 2977.872518] print_address_description.constprop.0+0x1f/0x1e0 [ 2977.875421] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 2977.878166] print_report.cold+0x5c/0x237 [ 2977.880809] kasan_report+0xc9/0x100 [ 2977.883639] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 2977.886501] vmalloc_oob+0x596/0x5e0 [test_kasan] [ 2977.889421] ? kasan_global_oob_right+0x1f0/0x1f0 [test_kasan] [ 2977.892344] ? do_raw_spin_trylock+0xb5/0x180 [ 2977.895149] ? do_raw_spin_lock+0x270/0x270 [ 2977.897659] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2977.900801] ? kunit_add_resource+0x197/0x280 [kunit] [ 2977.903646] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2977.906536] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2977.909441] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2977.912202] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2977.914955] kthread+0x2a7/0x350 [ 2977.917446] ? kthread_complete_and_exit+0x20/0x20 [ 2977.919970] ret_from_fork+0x22/0x30 [ 2977.922369] [ 2977.926789] The buggy address belongs to the virtual mapping at [ffffc9000007b000, ffffc9000007d000) created by: vmalloc_oob+0x78/0x5e0 [test_kasan] [ 2977.936876] The buggy address belongs to the physical page: [ 2977.939717] page:0000000043a254e0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b4b05 [ 2977.943028] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 2977.945955] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 2977.949317] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2977.952577] page dumped because: kasan: bad access detected [ 2977.957422] Memory state around the buggy address: [ 2977.960015] ffffc9000007b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2977.963399] ffffc9000007b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2977.966355] >ffffc9000007b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 2977.969286] ^ [ 2977.972414] ffffc9000007b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 2977.975296] ffffc9000007b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 2977.978656] ================================================================== [ 2977.981979] ================================================================== [ 2977.985180] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 2977.987939] Read of size 1 at addr ffffc9000007b7f8 by task kunit_try_catch/121898 [ 2977.992750] CPU: 0 PID: 121898 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-211.mr1651_721233192.el9.x86_64+debug #1 [ 2977.999057] Hardware name: Red Hat KVM, BIOS 1.15.0-1.el9 04/01/2014 [ 2978.002188] Call Trace: [ 2978.004412] [ 2978.006525] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 2978.009318] dump_stack_lvl+0x57/0x81 [ 2978.011683] print_address_description.constprop.0+0x1f/0x1e0 [ 2978.014447] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 2978.016974] print_report.cold+0x5c/0x237 [ 2978.019582] kasan_report+0xc9/0x100 [ 2978.022133] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 2978.024905] vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 2978.027537] ? kasan_global_oob_right+0x1f0/0x1f0 [test_kasan] [ 2978.030483] ? do_raw_spin_trylock+0xb5/0x180 [ 2978.033119] ? do_raw_spin_lock+0x270/0x270 [ 2978.035638] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2978.038551] ? kunit_add_resource+0x197/0x280 [kunit] [ 2978.041366] kunit_try_run_case+0x10b/0x1a0 [kunit] [ 2978.043992] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2978.046845] kunit_generic_run_threadfn_adapter+0x4d/0x90 [kunit] [ 2978.049835] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2978.052634] kthread+0x2a7/0x350 [ 2978.055173] ? kthread_complete_and_exit+0x20/0x20 [ 2978.057866] ret_from_fork+0x22/0x30 [ 2978.060327] [ 2978.064401] The buggy address belongs to the virtual mapping at [ffffc9000007b000, ffffc9000007d000) created by: vmalloc_oob+0x78/0x5e0 [test_kasan] [ 2978.074462] The buggy address belongs to the physical page: [ 2978.077224] page:0000000043a254e0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b4b05 [ 2978.080928] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 2978.083871] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 2978.087108] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2978.090386] page dumped because: kasan: bad access detected [ 2978.095093] Memory state around the buggy address: [ 2978.097853] ffffc9000007b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2978.101187] ffffc9000007b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2978.104441] >ffffc9000007b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 2978.107538] ^ [ 2978.110855] ffffc9000007b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 2978.114223] ffffc9000007b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 2978.117505] ================================================================== [ 2978.121856] ok 49 - vmalloc_oob [ 2978.122129] ok 50 - vmap_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 2978.124989] ok 51 - vm_map_ram_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 2978.129776] ok 52 - vmalloc_percpu # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 2978.135582] ok 53 - match_all_not_assigned # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2978.139847] ok 54 - match_all_ptr_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2978.144075] ok 55 - match_all_mem_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2978.147857] ok 20 - kasan [ 2978.292410] # Subtest: linear-ranges-test [ 2978.292421] 1..4 [ 2978.295865] ok 1 - range_test_get_value_amount [ 2978.299137] ok 2 - range_test_get_selector_high [ 2978.302782] ok 3 - range_test_get_selector_low [ 2978.306153] ok 4 - range_test_get_value [ 2978.308869] ok 21 - linear-ranges-test [ 2978.363571] # Subtest: list_sort [ 2978.363582] 1..1 [ 2978.375884] ok 1 - list_sort_test [ 2978.378155] ok 22 - list_sort [ 2978.504833] # Subtest: time_test_cases [ 2978.504843] 1..1 [ 2983.399446] ok 1 - time64_to_tm_test_date_range [ 2983.399459] ok 23 - time_test_cases