[ 2864.177642] Running test [R:13264610 T:10 - KUNIT - Kernel: 5.14.0-239.1865_753259309.el9.x86_64+debug] [ 2876.746234] # Subtest: bitfields [ 2876.746248] 1..2 [ 2876.748699] ok 1 - test_bitfields_constants [ 2876.749532] ok 2 - test_bitfields_variables [ 2876.750437] ok 1 - bitfields [ 2877.337947] # Subtest: cmdline [ 2877.337961] 1..4 [ 2877.338912] ok 1 - cmdline_test_noint [ 2877.339585] ok 2 - cmdline_test_lead_int [ 2877.340717] ok 3 - cmdline_test_tail_int [ 2877.341679] ok 4 - cmdline_test_range [ 2877.342289] ok 2 - cmdline [ 2877.928670] # Subtest: ext4_inode_test [ 2877.928682] 1..1 [ 2877.929748] # inode_test_xtimestamp_decoding: ok 1 - 1901-12-13 Lower bound of 32bit < 0 timestamp, no extra bits [ 2877.930910] # inode_test_xtimestamp_decoding: ok 2 - 1969-12-31 Upper bound of 32bit < 0 timestamp, no extra bits [ 2877.932708] # inode_test_xtimestamp_decoding: ok 3 - 1970-01-01 Lower bound of 32bit >=0 timestamp, no extra bits [ 2877.934642] # inode_test_xtimestamp_decoding: ok 4 - 2038-01-19 Upper bound of 32bit >=0 timestamp, no extra bits [ 2877.936850] # inode_test_xtimestamp_decoding: ok 5 - 2038-01-19 Lower bound of 32bit <0 timestamp, lo extra sec bit on [ 2877.939011] # inode_test_xtimestamp_decoding: ok 6 - 2106-02-07 Upper bound of 32bit <0 timestamp, lo extra sec bit on [ 2877.942395] # inode_test_xtimestamp_decoding: ok 7 - 2106-02-07 Lower bound of 32bit >=0 timestamp, lo extra sec bit on [ 2877.945012] # inode_test_xtimestamp_decoding: ok 8 - 2174-02-25 Upper bound of 32bit >=0 timestamp, lo extra sec bit on [ 2877.947151] # inode_test_xtimestamp_decoding: ok 9 - 2174-02-25 Lower bound of 32bit <0 timestamp, hi extra sec bit on [ 2877.949212] # inode_test_xtimestamp_decoding: ok 10 - 2242-03-16 Upper bound of 32bit <0 timestamp, hi extra sec bit on [ 2877.951651] # inode_test_xtimestamp_decoding: ok 11 - 2242-03-16 Lower bound of 32bit >=0 timestamp, hi extra sec bit on [ 2877.953800] # inode_test_xtimestamp_decoding: ok 12 - 2310-04-04 Upper bound of 32bit >=0 timestamp, hi extra sec bit on [ 2877.957871] # inode_test_xtimestamp_decoding: ok 13 - 2310-04-04 Upper bound of 32bit>=0 timestamp, hi extra sec bit 1. 1 ns [ 2877.959891] # inode_test_xtimestamp_decoding: ok 14 - 2378-04-22 Lower bound of 32bit>= timestamp. Extra sec bits 1. Max ns [ 2877.961929] # inode_test_xtimestamp_decoding: ok 15 - 2378-04-22 Lower bound of 32bit >=0 timestamp. All extra sec bits on [ 2877.964054] # inode_test_xtimestamp_decoding: ok 16 - 2446-05-10 Upper bound of 32bit >=0 timestamp. All extra sec bits on [ 2877.965961] ok 1 - inode_test_xtimestamp_decoding [ 2877.967658] ok 3 - ext4_inode_test [ 2879.197211] # Subtest: kunit-try-catch-test [ 2879.197223] 1..2 [ 2879.199122] ok 1 - kunit_test_try_catch_successful_try_no_catch [ 2879.200621] ok 2 - kunit_test_try_catch_unsuccessful_try_does_catch [ 2879.201453] ok 4 - kunit-try-catch-test [ 2879.203155] # Subtest: kunit-resource-test [ 2879.203162] 1..7 [ 2879.204113] ok 1 - kunit_resource_test_init_resources [ 2879.204812] ok 2 - kunit_resource_test_alloc_resource [ 2879.205924] ok 3 - kunit_resource_test_destroy_resource [ 2879.207247] ok 4 - kunit_resource_test_cleanup_resources [ 2879.208659] ok 5 - kunit_resource_test_proper_free_ordering [ 2879.209907] ok 6 - kunit_resource_test_static [ 2879.211168] ok 7 - kunit_resource_test_named [ 2879.211962] ok 5 - kunit-resource-test [ 2879.213641] # Subtest: kunit-log-test [ 2879.213648] 1..1 [ 2879.214628] put this in log. [ 2879.215073] this too. [ 2879.215535] add to suite log. [ 2879.215873] along with this. [ 2879.216452] ok 1 - kunit_log_test [ 2879.216885] ok 6 - kunit-log-test [ 2879.218904] # Subtest: kunit_status [ 2879.218915] 1..2 [ 2879.219905] ok 1 - kunit_status_set_failure_test [ 2879.220635] ok 2 - kunit_status_mark_skipped_test [ 2879.221386] ok 7 - kunit_status [ 2879.357325] # Subtest: rtc_lib_test_cases [ 2879.357336] 1..1 [ 2885.225837] ok 1 - rtc_time64_to_tm_test_date_range [ 2885.226490] ok 8 - rtc_lib_test_cases [ 2885.405513] # Subtest: list-kunit-test [ 2885.405525] 1..36 [ 2885.407082] ok 1 - list_test_list_init [ 2885.408203] ok 2 - list_test_list_add [ 2885.409193] ok 3 - list_test_list_add_tail [ 2885.410814] ok 4 - list_test_list_del [ 2885.412137] ok 5 - list_test_list_replace [ 2885.413082] ok 6 - list_test_list_replace_init [ 2885.414196] ok 7 - list_test_list_swap [ 2885.415495] ok 8 - list_test_list_del_init [ 2885.416789] ok 9 - list_test_list_move [ 2885.417969] ok 10 - list_test_list_move_tail [ 2885.418932] ok 11 - list_test_list_bulk_move_tail [ 2885.420204] ok 12 - list_test_list_is_first [ 2885.421311] ok 13 - list_test_list_is_last [ 2885.422415] ok 14 - list_test_list_empty [ 2885.423452] ok 15 - list_test_list_empty_careful [ 2885.424528] ok 16 - list_test_list_rotate_left [ 2885.425813] ok 17 - list_test_list_rotate_to_front [ 2885.426911] ok 18 - list_test_list_is_singular [ 2885.428040] ok 19 - list_test_list_cut_position [ 2885.429338] ok 20 - list_test_list_cut_before [ 2885.430619] ok 21 - list_test_list_splice [ 2885.432022] ok 22 - list_test_list_splice_tail [ 2885.433160] ok 23 - list_test_list_splice_init [ 2885.434368] ok 24 - list_te[-- MARK -- Fri Jan 20 19:15:00 2023] st_list_splice_tail_init [ 2885.435666] ok 25 - list_test_list_entry [ 2885.436931] ok 26 - list_test_list_first_entry [ 2885.438322] ok 27 - list_test_list_last_entry [ 2885.439371] ok 28 - list_test_list_first_entry_or_null [ 2885.440590] ok 29 - list_test_list_next_entry [ 2885.441880] ok 30 - list_test_list_prev_entry [ 2885.443594] ok 31 - list_test_list_for_each [ 2885.444660] ok 32 - list_test_list_for_each_prev [ 2885.445771] ok 33 - list_test_list_for_each_safe [ 2885.446866] ok 34 - list_test_list_for_each_prev_safe [ 2885.448333] ok 35 - list_test_list_for_each_entry [ 2885.449457] ok 36 - list_test_list_for_each_entry_reverse [ 2885.450225] ok 9 - list-kunit-test [ 2885.601816] # Subtest: memcpy [ 2885.601828] 1..4 [ 2885.603065] # memset_test: ok: memset() direct assignment [ 2885.604187] # memset_test: ok: memset() complete overwrite [ 2885.604959] # memset_test: ok: memset() middle overwrite [ 2885.605886] # memset_test: ok: memset() argument side-effects [ 2885.606833] # memset_test: ok: memset() memset_after() [ 2885.607709] # memset_test: ok: memset() memset_startat() [ 2885.608572] ok 1 - memset_test [ 2885.608977] # memcpy_test: ok: memcpy() static initializers [ 2885.610424] # memcpy_test: ok: memcpy() direct assignment [ 2885.611253] # memcpy_test: ok: memcpy() complete overwrite [ 2885.612037] # memcpy_test: ok: memcpy() middle overwrite [ 2885.612900] # memcpy_test: ok: memcpy() argument side-effects [ 2885.614072] ok 2 - memcpy_test [ 2885.614533] # memmove_test: ok: memmove() static initializers [ 2885.616113] # memmove_test: ok: memmove() direct assignment [ 2885.616998] # memmove_test: ok: memmove() complete overwrite [ 2885.617830] # memmove_test: ok: memmove() middle overwrite [ 2885.618625] # memmove_test: ok: memmove() argument side-effects [ 2885.619567] # memmove_test: ok: memmove() overlapping write [ 2885.620645] ok 3 - memmove_test [ 2885.621106] ok 4 - strtomem_test [ 2885.621619] ok 10 - memcpy [ 2885.761397] # Subtest: mptcp-crypto [ 2885.761410] 1..1 [ 2885.762890] ok 1 - mptcp_crypto_test_basic [ 2885.763259] ok 11 - mptcp-crypto [ 2885.906618] # Subtest: mptcp-token [ 2885.906632] 1..4 [ 2885.907813] ok 1 - mptcp_token_test_req_basic [ 2885.909167] ok 2 - mptcp_token_test_msk_basic [ 2885.910432] ok 3 - mptcp_token_test_accept [ 2885.912216] ok 4 - mptcp_token_test_destroyed [ 2885.913159] ok 12 - mptcp-token [ 2886.267413] # Subtest: rational [ 2886.267426] 1..1 [ 2886.268812] # rational_test: ok 1 - Exceeds bounds, semi-convergent term > 1/2 last term [ 2886.269436] # rational_test: ok 2 - Exceeds bounds, semi-convergent term < 1/2 last term [ 2886.270970] # rational_test: ok 3 - Closest to zero [ 2886.272858] # rational_test: ok 4 - Closest to smallest non-zero [ 2886.274043] # rational_test: ok 5 - Use convergent [ 2886.275345] # rational_test: ok 6 - Exact answer [ 2886.276499] # rational_test: ok 7 - Semiconvergent, numerator limit [ 2886.277561] # rational_test: ok 8 - Semiconvergent, denominator limit [ 2886.278552] ok 1 - rational_test [ 2886.279538] ok 13 - rational [ 2886.417560] # Subtest: resource [ 2886.417571] 1..2 [ 2886.418437] ok 1 - resource_test_union [ 2886.419225] ok 2 - resource_test_intersection [ 2886.419893] ok 14 - resource [ 2886.558951] # Subtest: slub_test [ 2886.558963] 1..2 [ 2886.574709] ok 1 - test_clobber_zone [ 2886.584113] ok 2 - test_clobber_redzone_free [ 2886.584899] ok 15 - slub_test [ 2887.137421] # Subtest: snd_soc_tplg_test [ 2887.137433] 1..11 [ 2887.140669] ok 1 - snd_soc_tplg_test_load_with_null_comp [ 2887.147222] ok 2 - snd_soc_tplg_test_load_with_null_ops [ 2887.149209] ok 3 - snd_soc_tplg_test_load_with_null_fw [ 2887.151233] ok 4 - snd_soc_tplg_test_load_empty_tplg [ 2887.153631] ok 5 - snd_soc_tplg_test_load_empty_tplg_bad_magic [ 2887.155412] ok 6 - snd_soc_tplg_test_load_empty_tplg_bad_abi [ 2887.158306] ok 7 - snd_soc_tplg_test_load_empty_tplg_bad_size [ 2887.160673] ok 8 - snd_soc_tplg_test_load_empty_tplg_bad_payload_size [ 2887.162487] ok 9 - snd_soc_tplg_test_load_pcm_tplg [ 2887.166095] ok 10 - snd_soc_tplg_test_load_pcm_tplg_reload_comp [ 2887.170906] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.175680] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.220313] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.224327] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.250868] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.253478] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.282725] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.286208] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.316277] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.324043] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.354065] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.356797] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.378789] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.382448] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.448642] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.452596] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.492699] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.496347] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.521978] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.524770] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.577234] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.584299] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.611529] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.614540] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.660666] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.666719] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.729177] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.732193] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.761587] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.764688] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.797851] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.800862] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.818678] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.821772] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.852029] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.854755] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.879898] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.883008] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.919872] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.922625] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.957561] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.960788] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2887.987175] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2887.990510] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.023537] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.026765] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.064393] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.067072] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.095405] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.102279] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.121402] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.124186] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.151677] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.160124] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.186080] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.188784] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.209657] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.217223] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.237139] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.239809] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.256127] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.258820] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.287970] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.290644] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.320360] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.323066] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.351662] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.354407] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.378000] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.380881] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.408266] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.414429] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.443189] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.445878] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.482305] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.484983] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.511859] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.514638] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.541193] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.543992] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.571641] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.576051] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.593267] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.600287] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.621255] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.623964] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.649883] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.652508] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.687643] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.690458] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.712119] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.714764] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.750267] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.753932] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.777057] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.779764] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.810489] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.816603] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.840254] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.842972] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.881834] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.884540] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.909523] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.912330] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.950128] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.952879] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2888.981647] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2888.984334] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.023952] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.027214] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.048553] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.051251] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.097152] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.099824] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.119266] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.122145] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.154763] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.161123] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.180862] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.186739] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.234622] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.238443] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.255934] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.259189] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.290082] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.293794] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.318996] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.322130] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.370998] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.379510] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.400914] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.407276] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.440573] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.449008] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.469623] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.474729] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.502128] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.505043] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.532752] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.535490] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.589217] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.593062] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.624221] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.628123] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.654946] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.657939] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.703647] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.711435] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.740781] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.743490] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.762689] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.766030] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.793226] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.795927] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.837752] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.842452] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.870356] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.873073] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.901903] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.909048] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.933680] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.936707] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.954915] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.959134] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2889.986845] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2889.989402] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.013290] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.016359] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.034171] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.036987] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.077889] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.081888] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.099179] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.103086] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.153033] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.155703] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.191653] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.194261] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.224652] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.227190] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.252061] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.265757] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.296587] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.300143] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.357963] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.360772] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.384104] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.389327] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.409829] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.412374] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.434089] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.436656] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.474014] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.480848] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.509395] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.512160] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.534869] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.541089] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.565639] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 2890.570314] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 2890.608438] ok 11 - snd_soc_tplg_test_load_pcm_tplg_reload_card [ 2890.608454] ok 16 - snd_soc_tplg_test [ 2890.832054] # Subtest: soc-utils [ 2890.832067] 1..1 [ 2890.833162] ok 1 - test_tdm_params_to_bclk [ 2890.833570] ok 17 - soc-utils [ 2891.358763] # Subtest: sysctl_test [ 2891.358775] 1..10 [ 2891.359759] ok 1 - sysctl_test_api_dointvec_null_tbl_data [ 2891.362940] ok 2 - sysctl_test_api_dointvec_table_maxlen_unset [ 2891.364359] ok 3 - sysctl_test_api_dointvec_table_len_is_zero [ 2891.365806] ok 4 - sysctl_test_api_dointvec_table_read_but_position_set [ 2891.371549] ok 5 - sysctl_test_dointvec_read_happy_single_positive [ 2891.373123] ok 6 - sysctl_test_dointvec_read_happy_single_negative [ 2891.374646] ok 7 - sysctl_test_dointvec_write_happy_single_positive [ 2891.376024] ok 8 - sysctl_test_dointvec_write_happy_single_negative [ 2891.377586] ok 9 - sysctl_test_api_dointvec_write_single_less_int_min [ 2891.379141] ok 10 - sysctl_test_api_dointvec_write_single_greater_int_max [ 2891.380140] ok 18 - sysctl_test [ 2891.611835] # Subtest: bits-test [ 2891.611846] 1..3 [ 2891.614487] ok 1 - genmask_test [ 2891.615151] ok 2 - genmask_ull_test [ 2891.626420] ok 3 - genmask_input_check_test [ 2891.627032] ok 19 - bits-test [ 2892.571152] # Subtest: kasan [ 2892.571166] 1..55 [ 2892.572076] ================================================================== [ 2892.573406] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 2892.574522] Write of size 1 at addr ffff888002e30f73 by task kunit_try_catch/48390 [ 2892.575549] [ 2892.575795] CPU: 0 PID: 48390 Comm: kunit_try_catch Kdump: loaded Not tainted 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2892.577291] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2892.578091] Call Trace: [ 2892.578459] [ 2892.578773] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 2892.579538] dump_stack_lvl+0x57/0x81 [ 2892.580069] print_address_description.constprop.0+0x1f/0x1e0 [ 2892.580872] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 2892.581620] print_report.cold+0x5c/0x237 [ 2892.582180] kasan_report+0xc9/0x100 [ 2892.582692] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 2892.583442] kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 2892.584166] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 2892.584911] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 2892.585710] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2892.586498] ? kunit_add_resource+0x197/0x280 [kunit] [ 2892.587204] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.587887] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2892.588591] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.589438] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2892.590147] kthread+0x2a4/0x350 [ 2892.590620] ? kthread_complete_and_exit+0x20/0x20 [ 2892.591282] ret_from_fork+0x1f/0x30 [ 2892.591801] [ 2892.592123] [ 2892.592360] Allocated by task 48390: [ 2892.592877] kasan_save_stack+0x1e/0x40 [ 2892.593420] __kasan_kmalloc+0x81/0xa0 [ 2892.593945] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 2892.594661] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.595336] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.596173] kthread+0x2a4/0x350 [ 2892.596637] ret_from_fork+0x1f/0x30 [ 2892.597141] [ 2892.597376] The buggy address belongs to the object at ffff888002e30f00 [ 2892.597376] which belongs to the cache kmalloc-128 of size 128 [ 2892.599042] The buggy address is located 115 bytes inside of [ 2892.599042] 128-byte region [ffff888002e30f00, ffff888002e30f80) [ 2892.600629] [ 2892.600865] The buggy address belongs to the physical page: [ 2892.601627] page:00000000929d69e4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2e30 [ 2892.602904] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2892.603844] raw: 000fffffc0000200 ffffea00001bfd80 dead000000000006 ffff8881000418c0 [ 2892.604893] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2892.605948] page dumped because: kasan: bad access detected [ 2892.606716] [ 2892.606952] Memory state around the buggy address: [ 2892.607624] ffff888002e30e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.608609] ffff888002e30e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2892.609592] >ffff888002e30f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 2892.610572] ^ [ 2892.611497] ffff888002e30f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2892.612481] ffff888002e31000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.613465] ================================================================== [ 2892.614516] Disabling lock debugging due to kernel taint [ 2892.615259] ================================================================== [ 2892.616246] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 2892.617343] Write of size 1 at addr ffff888002e30f78 by task kunit_try_catch/48390 [ 2892.618376] [ 2892.618619] CPU: 0 PID: 48390 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2892.620451] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2892.621236] Call Trace: [ 2892.621597] [ 2892.621911] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 2892.622659] dump_stack_lvl+0x57/0x81 [ 2892.623175] print_address_description.constprop.0+0x1f/0x1e0 [ 2892.623971] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 2892.624716] print_report.cold+0x5c/0x237 [ 2892.625277] kasan_report+0xc9/0x100 [ 2892.625791] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 2892.626540] kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 2892.627259] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 2892.627997] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 2892.628796] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2892.629567] ? kunit_add_resource+0x197/0x280 [kunit] [ 2892.630268] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.630949] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2892.631650] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.632488] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2892.633198] kthread+0x2a4/0x350 [ 2892.633667] ? kthread_complete_and_exit+0x20/0x20 [ 2892.634335] ret_from_fork+0x1f/0x30 [ 2892.634857] [ 2892.635180] [ 2892.635420] Allocated by task 48390: [ 2892.635921] kasan_save_stack+0x1e/0x40 [ 2892.636460] __kasan_kmalloc+0x81/0xa0 [ 2892.636982] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 2892.637693] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.638366] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.639200] kthread+0x2a4/0x350 [ 2892.639664] ret_from_fork+0x1f/0x30 [ 2892.640175] [ 2892.640416] The buggy address belongs to the object at ffff888002e30f00 [ 2892.640416] which belongs to the cache kmalloc-128 of size 128 [ 2892.642080] The buggy address is located 120 bytes inside of [ 2892.642080] 128-byte region [ffff888002e30f00, ffff888002e30f80) [ 2892.643660] [ 2892.643894] The buggy address belongs to the physical page: [ 2892.644655] page:00000000929d69e4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2e30 [ 2892.645892] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2892.646832] raw: 000fffffc0000200 ffffea00001bfd80 dead000000000006 ffff8881000418c0 [ 2892.647880] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2892.648925] page dumped because: kasan: bad access detected [ 2892.649687] [ 2892.649922] Memory state around the buggy address: [ 2892.650587] ffff888002e30e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.652070] ffff888002e30e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2892.653658] >ffff888002e30f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 2892.655213] ^ [ 2892.656693] ffff888002e30f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2892.658071] ffff888002e31000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.659458] ================================================================== [ 2892.660848] ================================================================== [ 2892.662041] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 2892.663171] Read of size 1 at addr ffff888002e30f80 by task kunit_try_catch/48390 [ 2892.664314] [ 2892.664563] CPU: 0 PID: 48390 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2892.666424] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2892.667227] Call Trace: [ 2892.667600] [ 2892.667922] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 2892.668686] dump_stack_lvl+0x57/0x81 [ 2892.669218] print_address_description.constprop.0+0x1f/0x1e0 [ 2892.670031] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 2892.670786] print_report.cold+0x5c/0x237 [ 2892.671358] kasan_report+0xc9/0x100 [ 2892.671877] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 2892.672634] kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 2892.673363] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 2892.674112] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 2892.674922] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2892.675705] ? kunit_add_resource+0x197/0x280 [kunit] [ 2892.676421] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.677107] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2892.677819] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.678672] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2892.679395] kthread+0x2a4/0x350 [ 2892.679869] ? kthread_complete_and_exit+0x20/0x20 [ 2892.680546] ret_from_fork+0x1f/0x30 [ 2892.681071] [ 2892.681400] [ 2892.681646] Allocated by task 48390: [ 2892.682156] kasan_save_stack+0x1e/0x40 [ 2892.682706] __kasan_kmalloc+0x81/0xa0 [ 2892.683235] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 2892.683954] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.684644] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.685497] kthread+0x2a4/0x350 [ 2892.685961] ret_from_fork+0x1f/0x30 [ 2892.686477] [ 2892.686716] The buggy address belongs to the object at ffff888002e30f00 [ 2892.686716] which belongs to the cache kmalloc-128 of size 128 [ 2892.688394] The buggy address is located 0 bytes to the right of [ 2892.688394] 128-byte region [ffff888002e30f00, ffff888002e30f80) [ 2892.690029] [ 2892.690265] The buggy address belongs to the physical page: [ 2892.691034] page:00000000929d69e4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2e30 [ 2892.692288] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2892.693238] raw: 000fffffc0000200 ffffea00001bfd80 dead000000000006 ffff8881000418c0 [ 2892.694305] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2892.695364] page dumped because: kasan: bad access detected [ 2892.696133] [ 2892.696370] Memory state around the buggy address: [ 2892.697040] ffff888002e30e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2892.698042] ffff888002e30f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 2892.699051] >ffff888002e30f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2892.700060] ^ [ 2892.700536] ffff888002e31000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.701537] ffff888002e31080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 2892.702531] ================================================================== [ 2892.703624] ok 1 - kmalloc_oob_right [ 2892.703906] ================================================================== [ 2892.705462] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 2892.706558] Read of size 1 at addr ffff8880041dd69f by task kunit_try_catch/48391 [ 2892.707581] [ 2892.707820] CPU: 0 PID: 48391 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2892.709661] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2892.710463] Call Trace: [ 2892.710822] [ 2892.711138] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 2892.711883] dump_stack_lvl+0x57/0x81 [ 2892.712416] print_address_description.constprop.0+0x1f/0x1e0 [ 2892.713223] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 2892.713967] print_report.cold+0x5c/0x237 [ 2892.714547] kasan_report+0xc9/0x100 [ 2892.715064] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 2892.715813] kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 2892.716539] ? kmalloc_pagealloc_oob_right+0x290/0x290 [test_kasan] [ 2892.717439] ? do_raw_spin_trylock+0xb5/0x180 [ 2892.718058] ? do_raw_spin_lock+0x270/0x270 [ 2892.718657] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2892.719436] ? kunit_add_resource+0x197/0x280 [kunit] [ 2892.720145] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.720831] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2892.721541] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.722378] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2892.723101] kthread+0x2a4/0x350 [ 2892.723576] ? kthread_complete_and_exit+0x20/0x20 [ 2892.724246] ret_from_fork+0x1f/0x30 [ 2892.724772] [ 2892.725095] [ 2892.725332] Allocated by task 0: [ 2892.725805] (stack is not available) [ 2892.726308] [ 2892.726550] Freed by task 48161: [ 2892.727013] kasan_save_stack+0x1e/0x40 [ 2892.727556] kasan_set_track+0x21/0x30 [ 2892.728083] kasan_set_free_info+0x20/0x40 [ 2892.728662] __kasan_slab_free+0x108/0x170 [ 2892.729233] slab_free_freelist_hook+0x11d/0x1d0 [ 2892.729882] kfree+0xe2/0x3c0 [ 2892.730313] shmem_free_in_core_inode+0x71/0x90 [ 2892.730954] rcu_do_batch+0x3c2/0xdc0 [ 2892.731479] rcu_core+0x3de/0x5a0 [ 2892.731954] __do_softirq+0x2d0/0x9a8 [ 2892.732480] [ 2892.732717] The buggy address belongs to the object at ffff8880041dd680 [ 2892.732717] which belongs to the cache kmalloc-16 of size 16 [ 2892.734372] The buggy address is located 15 bytes to the right of [ 2892.734372] 16-byte region [ffff8880041dd680, ffff8880041dd690) [ 2892.736022] [ 2892.736264] The buggy address belongs to the physical page: [ 2892.737042] page:00000000129a5a44 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x41dd [ 2892.738300] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2892.739245] raw: 000fffffc0000200 0000000000000000 dead000000000001 ffff8881000413c0 [ 2892.740305] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2892.741362] page dumped because: kasan: bad access detected [ 2892.742133] [ 2892.742370] Memory state around the buggy address: [ 2892.743042] ffff8880041dd580: fa fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 2892.744037] ffff8880041dd600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 2892.745030] >ffff8880041dd680: fa fb fc fc 00 07 fc fc fa fb fc fc fb fb fc fc [ 2892.746025] ^ [ 2892.746595] ffff8880041dd700: 00 00 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 2892.747593] ffff8880041dd780: fa fb fc fc fa fb fc fc fb fb fc fc fa fb fc fc [ 2892.748591] ================================================================== [ 2892.752381] ok 2 - kmalloc_oob_left [ 2892.763971] ================================================================== [ 2892.765549] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 2892.766709] Read of size 1 at addr ffff888032119000 by task kunit_try_catch/48392 [ 2892.767718] [ 2892.767952] CPU: 1 PID: 48392 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2892.769772] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2892.770561] Call Trace: [ 2892.770913] [ 2892.771223] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 2892.772028] dump_stack_lvl+0x57/0x81 [ 2892.772552] print_address_description.constprop.0+0x1f/0x1e0 [ 2892.773342] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 2892.774145] print_report.cold+0x5c/0x237 [ 2892.774710] kasan_report+0xc9/0x100 [ 2892.775214] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 2892.776017] kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 2892.776798] ? pagealloc_uaf+0x2f0/0x2f0 [test_kasan] [ 2892.777496] ? do_raw_spin_trylock+0xb5/0x180 [ 2892.778106] ? do_raw_spin_lock+0x270/0x270 [ 2892.778697] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2892.779469] ? kunit_add_resource+0x197/0x280 [kunit] [ 2892.780169] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.780854] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2892.781562] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.782393] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2892.783108] kthread+0x2a4/0x350 [ 2892.783573] ? kthread_complete_and_exit+0x20/0x20 [ 2892.784234] ret_from_fork+0x1f/0x30 [ 2892.784750] [ 2892.785068] [ 2892.785301] Allocated by task 48392: [ 2892.785808] kasan_save_stack+0x1e/0x40 [ 2892.786342] __kasan_kmalloc+0x81/0xa0 [ 2892.786866] kmalloc_node_oob_right+0x9a/0x2e0 [test_kasan] [ 2892.787627] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.788295] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.789132] kthread+0x2a4/0x350 [ 2892.789599] ret_from_fork+0x1f/0x30 [ 2892.790099] [ 2892.790331] The buggy address belongs to the object at ffff888032118000 [ 2892.790331] which belongs to the cache kmalloc-4k of size 4096 [ 2892.792138] The buggy address is located 0 bytes to the right of [ 2892.792138] 4096-byte region [ffff888032118000, ffff888032119000) [ 2892.793753] [ 2892.793985] The buggy address belongs to the physical page: [ 2892.794741] page:0000000097ceaf00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x32118 [ 2892.795980] head:0000000097ceaf00 order:3 compound_mapcount:0 compound_pincount:0 [ 2892.796990] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 2892.797985] raw: 000fffffc0010200 0000000000000000 dead000000000001 ffff888100042140 [ 2892.799027] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000 [ 2892.800065] page dumped because: kasan: bad access detected [ 2892.800818] [ 2892.801050] Memory state around the buggy address: [ 2892.801710] ffff888032118f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.802687] ffff888032118f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.803669] >ffff888032119000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2892.804646] ^ [ 2892.805101] ffff888032119080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2892.806175] ffff888032119100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2892.807176] ================================================================== [ 2892.808469] ok 3 - kmalloc_node_oob_right [ 2892.813184] ================================================================== [ 2892.814877] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 2892.816111] Write of size 1 at addr ffff88801f1ba00a by task kunit_try_catch/48393 [ 2892.817152] [ 2892.817392] CPU: 0 PID: 48393 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2892.819247] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2892.820050] Call Trace: [ 2892.820417] [ 2892.820735] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 2892.821616] dump_stack_lvl+0x57/0x81 [ 2892.822142] print_address_description.constprop.0+0x1f/0x1e0 [ 2892.822951] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 2892.823829] print_report.cold+0x5c/0x237 [ 2892.824407] kasan_report+0xc9/0x100 [ 2892.824924] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 2892.825938] kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 2892.826804] ? kmalloc_pagealloc_uaf+0x280/0x280 [test_kasan] [ 2892.827621] ? do_raw_spin_trylock+0xb5/0x180 [ 2892.828246] ? do_raw_spin_lock+0x270/0x270 [ 2892.828848] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2892.829634] ? kunit_add_resource+0x197/0x280 [kunit] [ 2892.830347] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.831038] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2892.831762] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.832628] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2892.833352] kthread+0x2a4/0x350 [ 2892.833831] ? kthread_complete_and_exit+0x20/0x20 [ 2892.834515] ret_from_fork+0x1f/0x30 [ 2892.835038] [ 2892.835364] [ 2892.835608] The buggy address belongs to the physical page: [ 2892.836373] page:00000000461a549a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1b8 [ 2892.837650] head:00000000461a549a order:2 compound_mapcount:0 compound_pincount:0 [ 2892.838676] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 2892.839626] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2892.840689] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2892.841745] page dumped because: kasan: bad access detected [ 2892.842517] [ 2892.842754] Memory state around the buggy address: [ 2892.843424] ffff88801f1b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.844417] ffff88801f1b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.845414] >ffff88801f1ba000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2892.846409] ^ [ 2892.846908] ffff88801f1ba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2892.847903] ffff88801f1ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2892.848897] ================================================================== [ 2892.850586] ok 4 - kmalloc_pagealloc_oob_right [ 2892.850899] ================================================================== [ 2892.852601] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 2892.853720] Read of size 1 at addr ffff88801f1b8000 by task kunit_try_catch/48394 [ 2892.854751] [ 2892.854991] CPU: 0 PID: 48394 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2892.856839] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2892.857676] Call Trace: [ 2892.858036] [ 2892.858500] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 2892.859304] dump_stack_lvl+0x57/0x81 [ 2892.859837] print_address_description.constprop.0+0x1f/0x1e0 [ 2892.860640] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 2892.861444] print_report.cold+0x5c/0x237 [ 2892.862012] kasan_report+0xc9/0x100 [ 2892.862534] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 2892.863333] kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 2892.864114] ? kmalloc_pagealloc_invalid_free+0x250/0x250 [test_kasan] [ 2892.865059] ? do_raw_spin_trylock+0xb5/0x180 [ 2892.865719] ? do_raw_spin_lock+0x270/0x270 [ 2892.866368] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2892.867158] ? kunit_add_resource+0x197/0x280 [kunit] [ 2892.867885] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.868603] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2892.869312] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.870179] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2892.870911] kthread+0x2a4/0x350 [ 2892.871379] ? kthread_complete_and_exit+0x20/0x20 [ 2892.872062] ret_from_fork+0x1f/0x30 [ 2892.872610] [ 2892.872935] [ 2892.873172] The buggy address belongs to the physical page: [ 2892.873964] page:00000000461a549a refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1b8 [ 2892.875240] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 2892.876140] raw: 000fffffc0000000 ffffea00007a6e08 ffff888104400270 0000000000000000 [ 2892.877220] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 2892.878299] page dumped because: kasan: bad access detected [ 2892.879075] [ 2892.879311] Memory state around the buggy address: [ 2892.879991] ffff88801f1b7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.880999] ffff88801f1b7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.882012] >ffff88801f1b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2892.883021] ^ [ 2892.883501] ffff88801f1b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2892.884521] ffff88801f1b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2892.885535] ================================================================== [ 2892.888042] ok 5 - kmalloc_pagealloc_uaf [ 2892.889874] ================================================================== [ 2892.891553] BUG: KASAN: double-free or invalid-free in kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 2892.892945] [ 2892.893188] CPU: 0 PID: 48395 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2892.895068] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2892.895890] Call Trace: [ 2892.896257] [ 2892.896605] dump_stack_lvl+0x57/0x81 [ 2892.897135] print_address_description.constprop.0+0x1f/0x1e0 [ 2892.897970] print_report.cold+0x5c/0x237 [ 2892.898561] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 2892.899553] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 2892.900500] kasan_report_invalid_free+0x99/0xc0 [ 2892.901168] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 2892.902102] kfree+0x2ab/0x3c0 [ 2892.902576] kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 2892.903479] ? kmalloc_large_oob_right+0x2b0/0x2b0 [test_kasan] [ 2892.904308] ? do_raw_spin_trylock+0xb5/0x180 [ 2892.904961] ? do_raw_spin_lock+0x270/0x270 [ 2892.905582] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2892.906360] ? kunit_add_resource+0x197/0x280 [kunit] [ 2892.907085] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.907787] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2892.908522] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.909370] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2892.910110] kthread+0x2a4/0x350 [ 2892.910589] ? kthread_complete_and_exit+0x20/0x20 [ 2892.911265] ret_from_fork+0x1f/0x30 [ 2892.911800] [ 2892.912126] [ 2892.912365] The buggy address belongs to the physical page: [ 2892.913162] page:00000000461a549a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1b8 [ 2892.914477] head:00000000461a549a order:2 compound_mapcount:0 compound_pincount:0 [ 2892.915530] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 2892.916510] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2892.917596] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2892.918674] page dumped because: kasan: bad access detected [ 2892.919464] [ 2892.919704] Memory state around the buggy address: [ 2892.920379] ffff88801f1b7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.921412] ffff88801f1b7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.922426] >ffff88801f1b8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.923434] ^ [ 2892.923901] ffff88801f1b8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.924923] ffff88801f1b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2892.925933] ================================================================== [ 2892.927491] ok 6 - kmalloc_pagealloc_invalid_free [ 2892.927770] ok 7 - pagealloc_oob_right # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2892.928910] ================================================================== [ 2892.931037] BUG: KASAN: use-after-free in pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 2892.932074] Read of size 1 at addr ffff888079470000 by task kunit_try_catch/48397 [ 2892.933135] [ 2892.933375] CPU: 0 PID: 48397 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2892.935248] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2892.936065] Call Trace: [ 2892.936451] [ 2892.936770] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 2892.937511] dump_stack_lvl+0x57/0x81 [ 2892.938038] print_address_description.constprop.0+0x1f/0x1e0 [ 2892.938863] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 2892.939587] print_report.cold+0x5c/0x237 [ 2892.940160] kasan_report+0xc9/0x100 [ 2892.940704] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 2892.941430] pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 2892.942124] ? krealloc_more_oob+0x10/0x10 [test_kasan] [ 2892.942872] ? do_raw_spin_trylock+0xb5/0x180 [ 2892.943512] ? do_raw_spin_lock+0x270/0x270 [ 2892.944109] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2892.944909] ? kunit_add_resource+0x197/0x280 [kunit] [ 2892.945650] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.946340] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2892.947069] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.947933] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2892.948681] kthread+0x2a4/0x350 [ 2892.949151] ? kthread_complete_and_exit+0x20/0x20 [ 2892.949858] ret_from_fork+0x1f/0x30 [ 2892.950396] [ 2892.950727] [ 2892.950965] The buggy address belongs to the physical page: [ 2892.951744] page:000000004e51c41e refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x79470 [ 2892.953193] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 2892.954116] raw: 000fffffc0000000 ffffea0000c48008 ffff88813ffd5aa0 0000000000000000 [ 2892.955198] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000 [ 2892.956273] page dumped because: kasan: bad access detected [ 2892.957055] [ 2892.957293] Memory state around the buggy address: [ 2892.957982] ffff88807946ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2892.958988] ffff88807946ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2892.959995] >ffff888079470000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2892.961007] ^ [ 2892.961505] ffff888079470080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2892.962519] ffff888079470100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 2892.963526] ================================================================== [ 2892.965197] ok 8 - pagealloc_uaf [ 2892.965472] ================================================================== [ 2892.967021] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 2892.968223] Write of size 1 at addr ffff8880024c1f00 by task kunit_try_catch/48398 [ 2892.969286] [ 2892.969557] CPU: 0 PID: 48398 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2892.971444] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2892.972247] Call Trace: [ 2892.972627] [ 2892.972946] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 2892.973800] dump_stack_lvl+0x57/0x81 [ 2892.974328] print_address_description.constprop.0+0x1f/0x1e0 [ 2892.975145] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 2892.975986] print_report.cold+0x5c/0x237 [ 2892.976580] kasan_report+0xc9/0x100 [ 2892.977096] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 2892.977948] kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 2892.978774] ? kmalloc_oob_16+0x3b0/0x3b0 [test_kasan] [ 2892.979513] ? do_raw_spin_trylock+0xb5/0x180 [ 2892.980134] ? do_raw_spin_lock+0x270/0x270 [ 2892.980749] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2892.981544] ? kunit_add_resource+0x197/0x280 [kunit] [ 2892.982258] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.982959] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2892.983687] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.984556] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2892.985276] kthread+0x2a4/0x350 [ 2892.985767] ? kthread_complete_and_exit+0x20/0x20 [ 2892.986456] ret_from_fork+0x1f/0x30 [ 2892.986981] [ 2892.987309] [ 2892.987563] Allocated by task 48398: [ 2892.988073] kasan_save_stack+0x1e/0x40 [ 2892.988638] __kasan_kmalloc+0x81/0xa0 [ 2892.989172] kmalloc_large_oob_right+0x98/0x2b0 [test_kasan] [ 2892.989979] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2892.990685] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2892.991551] kthread+0x2a4/0x350 [ 2892.992017] ret_from_fork+0x1f/0x30 [ 2892.992548] [ 2892.992785] The buggy address belongs to the object at ffff8880024c0000 [ 2892.992785] which belongs to the cache kmalloc-8k of size 8192 [ 2892.994497] The buggy address is located 7936 bytes inside of [ 2892.994497] 8192-byte region [ffff8880024c0000, ffff8880024c2000) [ 2892.996125] [ 2892.996364] The buggy address belongs to the physical page: [ 2892.997158] page:00000000d95abfdf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x24c0 [ 2892.998447] head:00000000d95abfdf order:3 compound_mapcount:0 compound_pincount:0 [ 2892.999487] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.000517] raw: 000fffffc0010200 ffffea0000275600 dead000000000005 ffff888100042280 [ 2893.001601] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000 [ 2893.002682] page dumped because: kasan: bad access detected [ 2893.003467] [ 2893.003705] Memory state around the buggy address: [ 2893.004374] ffff8880024c1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.005390] ffff8880024c1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.006396] >ffff8880024c1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.007399] ^ [ 2893.007870] ffff8880024c1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.008881] ffff8880024c2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.009896] ================================================================== [ 2893.012474] ok 9 - kmalloc_large_oob_right [ 2893.018521] ================================================================== [ 2893.020217] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2893.021468] Write of size 1 at addr ffff8880317ef6eb by task kunit_try_catch/48399 [ 2893.022523] [ 2893.022763] CPU: 0 PID: 48399 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.024647] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.025463] Call Trace: [ 2893.025824] [ 2893.026144] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2893.026994] dump_stack_lvl+0x57/0x81 [ 2893.027538] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.028348] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2893.029206] print_report.cold+0x5c/0x237 [ 2893.029797] kasan_report+0xc9/0x100 [ 2893.030316] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2893.031171] krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2893.032011] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 2893.032763] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.033457] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.034123] ? lock_acquire+0x4ea/0x620 [ 2893.034688] ? rcu_read_unlock+0x40/0x40 [ 2893.035247] ? rcu_read_unlock+0x40/0x40 [ 2893.035815] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.036500] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.037278] ? do_raw_spin_lock+0x270/0x270 [ 2893.037887] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.038753] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.039461] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.040177] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.040886] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.041610] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.042474] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.043199] kthread+0x2a4/0x350 [ 2893.043683] ? kthread_complete_and_exit+0x20/0x20 [ 2893.044368] ret_from_fork+0x1f/0x30 [ 2893.044915] [ 2893.045242] [ 2893.045501] Allocated by task 48399: [ 2893.046012] kasan_save_stack+0x1e/0x40 [ 2893.046577] __kasan_krealloc+0xee/0x160 [ 2893.047129] krealloc+0x50/0xe0 [ 2893.047605] krealloc_more_oob_helper+0x1d5/0x610 [test_kasan] [ 2893.048445] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.049128] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.049990] kthread+0x2a4/0x350 [ 2893.050478] ret_from_fork+0x1f/0x30 [ 2893.050991] [ 2893.051230] The buggy address belongs to the object at ffff8880317ef600 [ 2893.051230] which belongs to the cache kmalloc-256 of size 256 [ 2893.052940] The buggy address is located 235 bytes inside of [ 2893.052940] 256-byte region [ffff8880317ef600, ffff8880317ef700) [ 2893.054543] [ 2893.054781] The buggy address belongs to the physical page: [ 2893.055562] page:0000000073918922 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x317ee [ 2893.056846] head:0000000073918922 order:1 compound_mapcount:0 compound_pincount:0 [ 2893.057895] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.058928] raw: 000fffffc0010200 dead000000000100 dead000000000122 ffff888100041b40 [ 2893.060007] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2893.061090] page dumped because: kasan: bad access detected [ 2893.061870] [ 2893.062109] Memory state around the buggy address: [ 2893.062795] ffff8880317ef580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.063802] ffff8880317ef600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.064816] >ffff8880317ef680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 2893.065830] ^ [ 2893.066755] ffff8880317ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.067762] ffff8880317ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.068772] ================================================================== [ 2893.069944] ================================================================== [ 2893.070969] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2893.072179] Write of size 1 at addr ffff8880317ef6f0 by task kunit_try_catch/48399 [ 2893.073240] [ 2893.073501] CPU: 0 PID: 48399 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.075363] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.076183] Call Trace: [ 2893.076565] [ 2893.076885] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2893.077740] dump_stack_lvl+0x57/0x81 [ 2893.078269] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.079089] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2893.079937] print_report.cold+0x5c/0x237 [ 2893.080533] kasan_report+0xc9/0x100 [ 2893.081048] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2893.081911] krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2893.082743] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 2893.083493] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.084160] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.084840] ? lock_acquire+0x4ea/0x620 [ 2893.085394] ? rcu_read_unlock+0x40/0x40 [ 2893.085956] ? rcu_read_unlock+0x40/0x40 [ 2893.086528] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.087195] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.087990] ? do_raw_spin_lock+0x270/0x270 [ 2893.088606] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.089472] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.090166] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.090897] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.091605] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.092315] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.093187] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.093925] kthread+0x2a4/0x350 [ 2893.094407] ? kthread_complete_and_exit+0x20/0x20 [ 2893.095083] ret_from_fork+0x1f/0x30 [ 2893.095622] [ 2893.095947] [ 2893.096183] Allocated by task 48399: [ 2893.096708] kasan_save_stack+0x1e/0x40 [ 2893.097250] __kasan_krealloc+0xee/0x160 [ 2893.097819] krealloc+0x50/0xe0 [ 2893.098274] krealloc_more_oob_helper+0x1d5/0x610 [test_kasan] [ 2893.099102] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.099802] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.100670] kthread+0x2a4/0x350 [ 2893.101135] ret_from_fork+0x1f/0x30 [ 2893.101660] [ 2893.101897] The buggy address belongs to the object at ffff8880317ef600 [ 2893.101897] which belongs to the cache kmalloc-256 of size 256 [ 2893.103600] The buggy address is located 240 bytes inside of [ 2893.103600] 256-byte region [ffff8880317ef600, ffff8880317ef700) [ 2893.105200] [ 2893.105459] The buggy address belongs to the physical page: [ 2893.106227] page:0000000073918922 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x317ee [ 2893.107520] head:0000000073918922 order:1 compound_mapcount:0 compound_pincount:0 [ 2893.108566] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.109586] raw: 000fffffc0010200 dead000000000100 dead000000000122 ffff888100041b40 [ 2893.110653] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2893.111721] page dumped because: kasan: bad access detected [ 2893.112506] [ 2893.112744] Memory state around the buggy address: [ 2893.113432] ffff8880317ef580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.114437] ffff8880317ef600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.115446] >ffff8880317ef680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 2893.116458] ^ [ 2893.117422] ffff8880317ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.118428] ffff8880317ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.119438] ================================================================== [ 2893.120828] ok 10 - krealloc_more_oob [ 2893.127347] ================================================================== [ 2893.128982] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2893.130207] Write of size 1 at addr ffff8880317ef0c9 by task kunit_try_catch/48400 [ 2893.131268] [ 2893.131528] CPU: 0 PID: 48400 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.133419] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.134228] Call Trace: [ 2893.134604] [ 2893.134924] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2893.135779] dump_stack_lvl+0x57/0x81 [ 2893.136308] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.137141] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2893.137992] print_report.cold+0x5c/0x237 [ 2893.138584] kasan_report+0xc9/0x100 [ 2893.139100] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2893.139956] krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2893.140801] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2893.141518] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.142190] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.142873] ? lock_acquire+0x4ea/0x620 [ 2893.143442] ? rcu_read_unlock+0x40/0x40 [ 2893.144000] ? rcu_read_unlock+0x40/0x40 [ 2893.144566] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.145229] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.146037] ? do_raw_spin_lock+0x270/0x270 [ 2893.146637] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.147515] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.148211] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.148932] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.149646] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.150358] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.151212] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.151946] kthread+0x2a4/0x350 [ 2893.152426] ? kthread_complete_and_exit+0x20/0x20 [ 2893.153099] ret_from_fork+0x1f/0x30 [ 2893.153647] [ 2893.153973] [ 2893.154214] Allocated by task 48400: [ 2893.154734] kasan_save_stack+0x1e/0x40 [ 2893.155276] __kasan_krealloc+0xee/0x160 [ 2893.155854] krealloc+0x50/0xe0 [ 2893.156314] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 2893.157142] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.157851] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.158704] kthread+0x2a4/0x350 [ 2893.159171] ret_from_fork+0x1f/0x30 [ 2893.159702] [ 2893.159942] The buggy address belongs to the object at ffff8880317ef000 [ 2893.159942] which belongs to the cache kmalloc-256 of size 256 [ 2893.161660] The buggy address is located 201 bytes inside of [ 2893.161660] 256-byte region [ffff8880317ef000, ffff8880317ef100) [ 2893.163260] [ 2893.163518] The buggy address belongs to the physical page: [ 2893.164290] page:0000000073918922 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x317ee [ 2893.165596] head:0000000073918922 order:1 compound_mapcount:0 compound_pincount:0 [ 2893.166635] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.167665] raw: 000fffffc0010200 dead000000000100 dead000000000122 ffff888100041b40 [ 2893.168738] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2893.169821] page dumped because: kasan: bad access detected [ 2893.170591] [ 2893.170828] Memory state around the buggy address: [ 2893.171520] ffff8880317eef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.172515] ffff8880317ef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.173527] >ffff8880317ef080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 2893.174525] ^ [ 2893.175292] ffff8880317ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.176304] ffff8880317ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.177306] ================================================================== [ 2893.178535] ================================================================== [ 2893.179568] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2893.180776] Write of size 1 at addr ffff8880317ef0d0 by task kunit_try_catch/48400 [ 2893.181839] [ 2893.182137] CPU: 0 PID: 48400 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.184072] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.184880] Call Trace: [ 2893.185243] [ 2893.185584] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2893.186430] dump_stack_lvl+0x57/0x81 [ 2893.186954] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.187785] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2893.188637] print_report.cold+0x5c/0x237 [ 2893.189209] kasan_report+0xc9/0x100 [ 2893.189750] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2893.190603] krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2893.191445] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2893.192143] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.192813] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.193497] ? lock_acquire+0x4ea/0x620 [ 2893.194047] ? rcu_read_unlock+0x40/0x40 [ 2893.194619] ? rcu_read_unlock+0x40/0x40 [ 2893.195175] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.195863] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.196647] ? do_raw_spin_lock+0x270/0x270 [ 2893.197241] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.198121] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.198834] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.199578] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.200273] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.201001] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.201875] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.202600] kthread+0x2a4/0x350 [ 2893.203066] ? kthread_complete_and_exit+0x20/0x20 [ 2893.203766] ret_from_fork+0x1f/0x30 [ 2893.204289] [ 2893.204630] [ 2893.204869] Allocated by task 48400: [ 2893.205390] kasan_save_stack+0x1e/0x40 [ 2893.205937] __kasan_krealloc+0xee/0x160 [ 2893.206496] krealloc+0x50/0xe0 [ 2893.206950] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 2893.207787] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.208480] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.209326] kthread+0x2a4/0x350 [ 2893.209813] ret_from_fork+0x1f/0x30 [ 2893.210324] [ 2893.210574] The buggy address belongs to the object at ffff8880317ef000 [ 2893.210574] which belongs to the cache kmalloc-256 of size 256 [ 2893.212256] The buggy address is located 208 bytes inside of [ 2893.212256] 256-byte region [ffff8880317ef000, ffff8880317ef100) [ 2893.213860] [ 2893.214099] The buggy address belongs to the physical page: [ 2893.214869] page:0000000073918922 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x317ee [ 2893.216143] head:0000000073918922 order:1 compound_mapcount:0 compound_pincount:0 [ 2893.217172] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.218184] raw: 000fffffc0010200 dead000000000100 dead000000000122 ffff888100041b40 [ 2893.219247] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2893.220309] page dumped because: kasan: bad access detected [ 2893.221081] [ 2893.221320] Memory state around the buggy address: [ 2893.221996] ffff8880317eef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.223006] ffff8880317ef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.224007] >ffff8880317ef080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 2893.225002] ^ [ 2893.225814] ffff8880317ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.226834] ffff8880317ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.227851] ================================================================== [ 2893.228892] ================================================================== [ 2893.229898] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2893.231106] Write of size 1 at addr ffff8880317ef0da by task kunit_try_catch/48400 [ 2893.232147] [ 2893.232394] CPU: 0 PID: 48400 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.234243] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.235045] Call Trace: [ 2893.235430] [ 2893.235781] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2893.236632] dump_stack_lvl+0x57/0x81 [ 2893.237156] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.237980] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2893.238942] print_report.cold+0x5c/0x237 [ 2893.239523] kasan_report+0xc9/0x100 [ 2893.240040] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2893.240888] krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2893.241721] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2893.242427] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.243097] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.243809] ? lock_acquire+0x4ea/0x620 [ 2893.244358] ? rcu_read_unlock+0x40/0x40 [ 2893.244922] ? rcu_read_unlock+0x40/0x40 [ 2893.245492] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.246157] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.246941] ? do_raw_spin_lock+0x270/0x270 [ 2893.247539] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.248395] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.249091] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.249812] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.250508] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.251220] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.252071] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.252844] kthread+0x2a4/0x350 [ 2893.253311] ? kthread_complete_and_exit+0x20/0x20 [ 2893.253995] ret_from_fork+0x1f/0x30 [ 2893.254523] [ 2893.254850] [ 2893.255088] Allocated by task 48400: [ 2893.255604] kasan_save_stack+0x1e/0x40 [ 2893.256147] __kasan_krealloc+0xee/0x160 [ 2893.256707] krealloc+0x50/0xe0 [ 2893.257164] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 2893.257983] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.258674] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.259555] kthread+0x2a4/0x350 [ 2893.260020] ret_from_fork+0x1f/0x30 [ 2893.260546] [ 2893.260783] The buggy address belongs to the object at ffff8880317ef000 [ 2893.260783] which belongs to the cache kmalloc-256 of size 256 [ 2893.262496] The buggy address is located 218 bytes inside of [ 2893.262496] 256-byte region [ffff8880317ef000, ffff8880317ef100) [ 2893.264098] [ 2893.264336] The buggy address belongs to the physical page: [ 2893.265114] page:0000000073918922 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x317ee [ 2893.266390] head:0000000073918922 order:1 compound_mapcount:0 compound_pincount:0 [ 2893.267422] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.268432] raw: 000fffffc0010200 dead000000000100 dead000000000122 ffff888100041b40 [ 2893.269506] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2893.270569] page dumped because: kasan: bad access detected [ 2893.271338] [ 2893.271582] Memory state around the buggy address: [ 2893.272252] ffff8880317eef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.273250] ffff8880317ef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.274250] >ffff8880317ef080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 2893.275265] ^ [ 2893.276109] ffff8880317ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.277108] ffff8880317ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.278105] ================================================================== [ 2893.279136] ================================================================== [ 2893.280173] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2893.281390] Write of size 1 at addr ffff8880317ef0ea by task kunit_try_catch/48400 [ 2893.282438] [ 2893.282678] CPU: 0 PID: 48400 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.284576] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.285385] Call Trace: [ 2893.285750] [ 2893.286070] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2893.286917] dump_stack_lvl+0x57/0x81 [ 2893.287474] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.288276] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2893.289125] print_report.cold+0x5c/0x237 [ 2893.289711] kasan_report+0xc9/0x100 [ 2893.290227] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2893.291078] krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2893.291931] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2893.292642] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.293307] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.293987] ? lock_acquire+0x4ea/0x620 [ 2893.294542] ? rcu_read_unlock+0x40/0x40 [ 2893.295102] ? rcu_read_unlock+0x40/0x40 [ 2893.295699] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.296377] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.297156] ? do_raw_spin_lock+0x270/0x270 [ 2893.297767] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.298624] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.299325] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.300077] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.300787] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.301515] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.302368] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.303194] kthread+0x2a4/0x350 [ 2893.303698] ? kthread_complete_and_exit+0x20/0x20 [ 2893.304386] ret_from_fork+0x1f/0x30 [ 2893.304907] [ 2893.305233] [ 2893.305484] Allocated by task 48400: [ 2893.305991] kasan_save_stack+0x1e/0x40 [ 2893.306537] __kasan_krealloc+0xee/0x160 [ 2893.307086] krealloc+0x50/0xe0 [ 2893.307581] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 2893.308399] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.309083] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.309939] kthread+0x2a4/0x350 [ 2893.310417] ret_from_fork+0x1f/0x30 [ 2893.310925] [ 2893.311163] The buggy address belongs to the object at ffff8880317ef000 [ 2893.311163] which belongs to the cache kmalloc-256 of size 256 [ 2893.312874] The buggy address is located 234 bytes inside of [ 2893.312874] 256-byte region [ffff8880317ef000, ffff8880317ef100) [ 2893.314474] [ 2893.314711] The buggy address belongs to the physical page: [ 2893.315507] page:0000000073918922 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x317ee [ 2893.316773] head:0000000073918922 order:1 compound_mapcount:0 compound_pincount:0 [ 2893.317813] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.318828] raw: 000fffffc0010200 dead000000000100 dead000000000122 ffff888100041b40 [ 2893.319912] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2893.320979] page dumped because: kasan: bad access detected [ 2893.321761] [ 2893.321997] Memory state around the buggy address: [ 2893.322686] ffff8880317eef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.323702] ffff8880317ef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.324708] >ffff8880317ef080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 2893.325708] ^ [ 2893.326621] ffff8880317ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.327633] ffff8880317ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.328626] ================================================================== [ 2893.329661] ================================================================== [ 2893.330660] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2893.331881] Write of size 1 at addr ffff8880317ef0eb by task kunit_try_catch/48400 [ 2893.332921] [ 2893.333158] CPU: 0 PID: 48400 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.335014] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.335840] Call Trace: [ 2893.336201] [ 2893.336524] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2893.337370] dump_stack_lvl+0x57/0x81 [ 2893.337903] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.338712] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2893.339579] print_report.cold+0x5c/0x237 [ 2893.340150] kasan_report+0xc9/0x100 [ 2893.340674] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2893.341531] krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2893.342347] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2893.343049] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.343738] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.344413] ? lock_acquire+0x4ea/0x620 [ 2893.344961] ? rcu_read_unlock+0x40/0x40 [ 2893.345541] ? rcu_read_unlock+0x40/0x40 [ 2893.346103] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.346778] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.347592] ? do_raw_spin_lock+0x270/0x270 [ 2893.348187] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.349055] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.349771] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.350492] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.351180] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.351922] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.352779] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.353518] kthread+0x2a4/0x350 [ 2893.353985] ? kthread_complete_and_exit+0x20/0x20 [ 2893.354661] ret_from_fork+0x1f/0x30 [ 2893.355182] [ 2893.355537] [ 2893.355773] Allocated by task 48400: [ 2893.356284] kasan_save_stack+0x1e/0x40 [ 2893.356834] __kasan_krealloc+0xee/0x160 [ 2893.357407] krealloc+0x50/0xe0 [ 2893.357861] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 2893.358690] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.359396] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.360249] kthread+0x2a4/0x350 [ 2893.360726] ret_from_fork+0x1f/0x30 [ 2893.361239] [ 2893.361497] The buggy address belongs to the object at ffff8880317ef000 [ 2893.361497] which belongs to the cache kmalloc-256 of size 256 [ 2893.363310] The buggy address is located 235 bytes inside of [ 2893.363310] 256-byte region [ffff8880317ef000, ffff8880317ef100) [ 2893.364924] [ 2893.365162] The buggy address belongs to the physical page: [ 2893.365947] page:0000000073918922 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x317ee [ 2893.367219] head:0000000073918922 order:1 compound_mapcount:0 compound_pincount:0 [ 2893.368271] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.369290] raw: 000fffffc0010200 dead000000000100 dead000000000122 ffff888100041b40 [ 2893.370380] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2893.371439] page dumped because: kasan: bad access detected [ 2893.372205] [ 2893.372449] Memory state around the buggy address: [ 2893.373117] ffff8880317eef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.374117] ffff8880317ef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.375120] >ffff8880317ef080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 2893.376116] ^ [ 2893.377048] ffff8880317ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.378048] ffff8880317ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.379050] ================================================================== [ 2893.380278] ok 11 - krealloc_less_oob [ 2893.380588] ================================================================== [ 2893.382170] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2893.383380] Write of size 1 at addr ffff88801f1ba0eb by task kunit_try_catch/48401 [ 2893.384425] [ 2893.384665] CPU: 0 PID: 48401 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.386580] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.387391] Call Trace: [ 2893.387751] [ 2893.388068] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2893.388910] dump_stack_lvl+0x57/0x81 [ 2893.389444] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.390253] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2893.391089] print_report.cold+0x5c/0x237 [ 2893.391669] kasan_report+0xc9/0x100 [ 2893.392189] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2893.393039] krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 2893.393865] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 2893.394606] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.395278] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.396017] ? lock_acquire+0x4ea/0x620 [ 2893.396570] ? rcu_read_unlock+0x40/0x40 [ 2893.397124] ? rcu_read_unlock+0x40/0x40 [ 2893.397684] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.398359] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.399138] ? do_raw_spin_lock+0x270/0x270 [ 2893.399738] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.400603] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.401311] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.402033] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.402729] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.403442] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.404296] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.405021] kthread+0x2a4/0x350 [ 2893.405497] ? kthread_complete_and_exit+0x20/0x20 [ 2893.406172] ret_from_fork+0x1f/0x30 [ 2893.406704] [ 2893.407030] [ 2893.407270] The buggy address belongs to the physical page: [ 2893.408048] page:00000000461a549a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1b8 [ 2893.409327] head:00000000461a549a order:2 compound_mapcount:0 compound_pincount:0 [ 2893.410362] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.411306] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2893.412374] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2893.413434] page dumped because: kasan: bad access detected [ 2893.414201] [ 2893.414444] Memory state around the buggy address: [ 2893.415112] ffff88801f1b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.416111] ffff88801f1ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.417110] >ffff88801f1ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 2893.418110] ^ [ 2893.419025] ffff88801f1ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.420024] ffff88801f1ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.421062] ================================================================== [ 2893.422135] ================================================================== [ 2893.423145] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2893.424360] Write of size 1 at addr ffff88801f1ba0f0 by task kunit_try_catch/48401 [ 2893.425403] [ 2893.425648] CPU: 0 PID: 48401 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.427555] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.428362] Call Trace: [ 2893.428731] [ 2893.429051] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2893.429898] dump_stack_lvl+0x57/0x81 [ 2893.430428] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.431235] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2893.432110] print_report.cold+0x5c/0x237 [ 2893.432689] kasan_report+0xc9/0x100 [ 2893.433201] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2893.434052] krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 2893.434871] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 2893.435636] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.436299] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.436962] ? lock_acquire+0x4ea/0x620 [ 2893.437510] ? rcu_read_unlock+0x40/0x40 [ 2893.438065] ? rcu_read_unlock+0x40/0x40 [ 2893.438623] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.439286] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.440084] ? do_raw_spin_lock+0x270/0x270 [ 2893.440691] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.441555] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.442256] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.442977] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.443698] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.444429] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.445274] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.446007] kthread+0x2a4/0x350 [ 2893.446488] ? kthread_complete_and_exit+0x20/0x20 [ 2893.447161] ret_from_fork+0x1f/0x30 [ 2893.447718] [ 2893.448044] [ 2893.448282] The buggy address belongs to the physical page: [ 2893.449064] page:00000000461a549a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1b8 [ 2893.450333] head:00000000461a549a order:2 compound_mapcount:0 compound_pincount:0 [ 2893.451381] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.452333] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2893.453407] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2893.454477] page dumped because: kasan: bad access detected [ 2893.455241] [ 2893.455505] Memory state around the buggy address: [ 2893.456175] ffff88801f1b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.457175] ffff88801f1ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.458181] >ffff88801f1ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 2893.459182] ^ [ 2893.460150] ffff88801f1ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.461146] ffff88801f1ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.462139] ================================================================== [ 2893.463202] ok 12 - krealloc_pagealloc_more_oob [ 2893.463488] ================================================================== [ 2893.465318] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2893.466542] Write of size 1 at addr ffff88801f1ba0c9 by task kunit_try_catch/48402 [ 2893.467610] [ 2893.467849] CPU: 0 PID: 48402 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.469732] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.470535] Call Trace: [ 2893.470894] [ 2893.471212] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2893.472075] dump_stack_lvl+0x57/0x81 [ 2893.472606] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.473430] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2893.474266] print_report.cold+0x5c/0x237 [ 2893.474842] kasan_report+0xc9/0x100 [ 2893.475366] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2893.476236] krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 2893.477055] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2893.477781] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.478449] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.479108] ? lock_acquire+0x4ea/0x620 [ 2893.479676] ? rcu_read_unlock+0x40/0x40 [ 2893.480230] ? rcu_read_unlock+0x40/0x40 [ 2893.480790] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.481483] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.482256] ? do_raw_spin_lock+0x270/0x270 [ 2893.482858] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.483733] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.484434] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.485144] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.485852] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.486564] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.487431] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.488151] kthread+0x2a4/0x350 [ 2893.488626] ? kthread_complete_and_exit+0x20/0x20 [ 2893.489300] ret_from_fork+0x1f/0x30 [ 2893.489851] [ 2893.490179] [ 2893.490432] The buggy address belongs to the physical page: [ 2893.491201] page:00000000461a549a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1b8 [ 2893.492508] head:00000000461a549a order:2 compound_mapcount:0 compound_pincount:0 [ 2893.493553] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.494508] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2893.495584] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2893.496642] page dumped because: kasan: bad access detected [ 2893.497433] [ 2893.497670] Memory state around the buggy address: [ 2893.498345] ffff88801f1b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.499336] ffff88801f1ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.500369] >ffff88801f1ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 2893.501383] ^ [ 2893.502160] ffff88801f1ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.503158] ffff88801f1ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.504156] ================================================================== [ 2893.505356] ================================================================== [ 2893.506368] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2893.507617] Write of size 1 at addr ffff88801f1ba0d0 by task kunit_try_catch/48402 [ 2893.508661] [ 2893.508902] CPU: 0 PID: 48402 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.510755] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.511587] Call Trace: [ 2893.511948] [ 2893.512267] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2893.513114] dump_stack_lvl+0x57/0x81 [ 2893.513646] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.514456] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2893.515293] print_report.cold+0x5c/0x237 [ 2893.515867] kasan_report+0xc9/0x100 [ 2893.516389] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2893.517229] krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 2893.518073] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2893.518771] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.519443] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.520104] ? lock_acquire+0x4ea/0x620 [ 2893.520659] ? rcu_read_unlock+0x40/0x40 [ 2893.521216] ? rcu_read_unlock+0x40/0x40 [ 2893.521776] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.522445] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.523223] ? do_raw_spin_lock+0x270/0x270 [ 2893.523821] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.524678] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.525383] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.526100] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.526798] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.527515] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.528367] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.529091] kthread+0x2a4/0x350 [ 2893.529564] ? kthread_complete_and_exit+0x20/0x20 [ 2893.530235] ret_from_fork+0x1f/0x30 [ 2893.530766] [ 2893.531092] [ 2893.531329] The buggy address belongs to the physical page: [ 2893.532106] page:00000000461a549a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1b8 [ 2893.533377] head:00000000461a549a order:2 compound_mapcount:0 compound_pincount:0 [ 2893.534408] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.535365] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2893.536432] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2893.537500] page dumped because: kasan: bad access detected [ 2893.538266] [ 2893.538509] Memory state around the buggy address: [ 2893.539176] ffff88801f1b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.540175] ffff88801f1ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.541179] >ffff88801f1ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 2893.542174] ^ [ 2893.542987] ffff88801f1ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.543981] ffff88801f1ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.544971] ================================================================== [ 2893.546002] ================================================================== [ 2893.547005] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2893.548201] Write of size 1 at addr ffff88801f1ba0da by task kunit_try_catch/48402 [ 2893.549241] [ 2893.549485] CPU: 0 PID: 48402 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.551328] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.552135] Call Trace: [ 2893.552500] [ 2893.552818] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2893.553662] dump_stack_lvl+0x57/0x81 [ 2893.554185] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.554999] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2893.555843] print_report.cold+0x5c/0x237 [ 2893.556418] kasan_report+0xc9/0x100 [ 2893.556932] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2893.557774] krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 2893.558592] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2893.559286] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.559953] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.560617] ? lock_acquire+0x4ea/0x620 [ 2893.561162] ? rcu_read_unlock+0x40/0x40 [ 2893.561721] ? rcu_read_unlock+0x40/0x40 [ 2893.562275] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.562956] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.563846] ? do_raw_spin_lock+0x270/0x270 [ 2893.564446] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.565409] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.566128] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.566874] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.567580] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.568290] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.569141] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.569893] kthread+0x2a4/0x350 [ 2893.570385] ? kthread_complete_and_exit+0x20/0x20 [ 2893.571063] ret_from_fork+0x1f/0x30 [ 2893.571596] [ 2893.571921] [ 2893.572157] The buggy address belongs to the physical page: [ 2893.572928] page:00000000461a549a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1b8 [ 2893.574207] head:00000000461a549a order:2 compound_mapcount:0 compound_pincount:0 [ 2893.575245] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.576189] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2893.577251] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2893.578330] page dumped because: kasan: bad access detected [ 2893.579109] [ 2893.579354] Memory state around the buggy address: [ 2893.580024] ffff88801f1b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.581020] ffff88801f1ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.582018] >ffff88801f1ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 2893.583015] ^ [ 2893.583864] ffff88801f1ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.584857] ffff88801f1ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.585853] ================================================================== [ 2893.586898] ================================================================== [ 2893.587900] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2893.589095] Write of size 1 at addr ffff88801f1ba0ea by task kunit_try_catch/48402 [ 2893.590251] [ 2893.590498] CPU: 0 PID: 48402 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.592350] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.593142] Call Trace: [ 2893.593504] [ 2893.593820] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2893.594661] dump_stack_lvl+0x57/0x81 [ 2893.595185] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.595989] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2893.596936] print_report.cold+0x5c/0x237 [ 2893.597514] kasan_report+0xc9/0x100 [ 2893.598026] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2893.598869] krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 2893.599690] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2893.600394] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.601058] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.601724] ? lock_acquire+0x4ea/0x620 [ 2893.602271] ? rcu_read_unlock+0x40/0x40 [ 2893.602834] ? rcu_read_unlock+0x40/0x40 [ 2893.603394] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.604164] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.604942] ? do_raw_spin_lock+0x270/0x270 [ 2893.605621] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.606481] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.607181] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.607900] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.608593] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.609307] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.610269] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.610996] kthread+0x2a4/0x350 [ 2893.611471] ? kthread_complete_and_exit+0x20/0x20 [ 2893.612145] ret_from_fork+0x1f/0x30 [ 2893.612677] [ 2893.613005] [ 2893.613245] The buggy address belongs to the physical page: [ 2893.614014] page:00000000461a549a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1b8 [ 2893.615279] head:00000000461a549a order:2 compound_mapcount:0 compound_pincount:0 [ 2893.616308] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.617261] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2893.618345] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2893.619434] page dumped because: kasan: bad access detected [ 2893.620213] [ 2893.620459] Memory state around the buggy address: [ 2893.621124] ffff88801f1b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.622118] ffff88801f1ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.623115] >ffff88801f1ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 2893.624109] ^ [ 2893.625022] ffff88801f1ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.626019] ffff88801f1ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.627012] ================================================================== [ 2893.628055] ================================================================== [ 2893.629058] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2893.630268] Write of size 1 at addr ffff88801f1ba0eb by task kunit_try_catch/48402 [ 2893.631315] [ 2893.631561] CPU: 0 PID: 48402 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.633559] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.634612] Call Trace: [ 2893.635039] [ 2893.635404] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2893.636463] dump_stack_lvl+0x57/0x81 [ 2893.637114] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.638004] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2893.638883] print_report.cold+0x5c/0x237 [ 2893.639468] kasan_report+0xc9/0x100 [ 2893.640000] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2893.640922] krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 2893.641781] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 2893.642492] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.643173] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.643869] ? lock_acquire+0x4ea/0x620 [ 2893.644420] ? rcu_read_unlock+0x40/0x40 [ 2893.644984] ? rcu_read_unlock+0x40/0x40 [ 2893.645545] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.646223] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.647030] ? do_raw_spin_lock+0x270/0x270 [ 2893.647629] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 2893.648485] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.649183] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.649902] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.650599] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.651311] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.652167] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.652892] kthread+0x2a4/0x350 [ 2893.653368] ? kthread_complete_and_exit+0x20/0x20 [ 2893.654040] ret_from_fork+0x1f/0x30 [ 2893.654567] [ 2893.654892] [ 2893.655130] The buggy address belongs to the physical page: [ 2893.655908] page:00000000461a549a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1b8 [ 2893.657171] head:00000000461a549a order:2 compound_mapcount:0 compound_pincount:0 [ 2893.658207] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.659160] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 2893.660227] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2893.661292] page dumped because: kasan: bad access detected [ 2893.662082] [ 2893.662321] Memory state around the buggy address: [ 2893.662999] ffff88801f1b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.664005] ffff88801f1ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.665111] >ffff88801f1ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 2893.666105] ^ [ 2893.667015] ffff88801f1ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.668011] ffff88801f1ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 2893.669010] ================================================================== [ 2893.671384] ok 13 - krealloc_pagealloc_less_oob [ 2893.671801] ================================================================== [ 2893.673536] BUG: KASAN: use-after-free in krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2893.674550] Read of size 1 at addr ffff8880317efa00 by task kunit_try_catch/48403 [ 2893.675579] [ 2893.675818] CPU: 0 PID: 48403 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.677677] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.678480] Call Trace: [ 2893.678841] [ 2893.679159] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2893.679863] dump_stack_lvl+0x57/0x81 [ 2893.680393] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.681195] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2893.681896] print_report.cold+0x5c/0x237 [ 2893.682474] kasan_report+0xc9/0x100 [ 2893.682987] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2893.683696] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2893.684404] __kasan_check_byte+0x36/0x50 [ 2893.684994] krealloc+0x2e/0xe0 [ 2893.685466] krealloc_uaf+0x1c7/0x450 [test_kasan] [ 2893.686141] ? kmalloc_memmove_negative_size+0x290/0x290 [test_kasan] [ 2893.687053] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.687726] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.688399] ? lock_acquire+0x4ea/0x620 [ 2893.688951] ? rcu_read_unlock+0x40/0x40 [ 2893.689513] ? rcu_read_unlock+0x40/0x40 [ 2893.690069] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.690739] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.691527] ? do_raw_spin_lock+0x270/0x270 [ 2893.692122] ? trace_hardirqs_on+0x2d/0x160 [ 2893.692719] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.693418] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.694133] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.694827] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.695546] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.696397] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.697115] kthread+0x2a4/0x350 [ 2893.697584] ? kthread_complete_and_exit+0x20/0x20 [ 2893.698258] ret_from_fork+0x1f/0x30 [ 2893.698793] [ 2893.699119] [ 2893.699366] Allocated by task 48403: [ 2893.699877] kasan_save_stack+0x1e/0x40 [ 2893.700427] __kasan_kmalloc+0x81/0xa0 [ 2893.700960] krealloc_uaf+0xaa/0x450 [test_kasan] [ 2893.701622] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.702309] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.703158] kthread+0x2a4/0x350 [ 2893.703630] ret_from_fork+0x1f/0x30 [ 2893.704140] [ 2893.704383] Freed by task 48403: [ 2893.704846] kasan_save_stack+0x1e/0x40 [ 2893.705395] kasan_set_track+0x21/0x30 [ 2893.705928] kasan_set_free_info+0x20/0x40 [ 2893.706510] __kasan_slab_free+0x108/0x170 [ 2893.707085] slab_free_freelist_hook+0x11d/0x1d0 [ 2893.707744] kfree+0xe2/0x3c0 [ 2893.708178] krealloc_uaf+0x147/0x450 [test_kasan] [ 2893.708853] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.709543] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.710397] kthread+0x2a4/0x350 [ 2893.710862] ret_from_fork+0x1f/0x30 [ 2893.711379] [ 2893.711616] The buggy address belongs to the object at ffff8880317efa00 [ 2893.711616] which belongs to the cache kmalloc-256 of size 256 [ 2893.713298] The buggy address is located 0 bytes inside of [ 2893.713298] 256-byte region [ffff8880317efa00, ffff8880317efb00) [ 2893.714876] [ 2893.715116] The buggy address belongs to the physical page: [ 2893.715890] page:0000000073918922 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x317ee [ 2893.717179] head:0000000073918922 order:1 compound_mapcount:0 compound_pincount:0 [ 2893.718210] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.719239] raw: 000fffffc0010200 dead000000000100 dead000000000122 ffff888100041b40 [ 2893.720299] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2893.721371] page dumped because: kasan: bad access detected [ 2893.722136] [ 2893.722381] Memory state around the buggy address: [ 2893.723050] ffff8880317ef900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.724042] ffff8880317ef980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.725035] >ffff8880317efa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2893.726028] ^ [ 2893.726520] ffff8880317efa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2893.727514] ffff8880317efb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.728507] ================================================================== [ 2893.729710] ================================================================== [ 2893.730820] BUG: KASAN: use-after-free in krealloc_uaf+0x42e/0x450 [test_kasan] [ 2893.731840] Read of size 1 at addr ffff8880317efa00 by task kunit_try_catch/48403 [ 2893.732867] [ 2893.733114] CPU: 0 PID: 48403 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.734979] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.735783] Call Trace: [ 2893.736144] [ 2893.736469] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 2893.737170] dump_stack_lvl+0x57/0x81 [ 2893.737703] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.738520] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 2893.739214] print_report.cold+0x5c/0x237 [ 2893.739789] kasan_report+0xc9/0x100 [ 2893.740308] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 2893.741010] krealloc_uaf+0x42e/0x450 [test_kasan] [ 2893.741691] ? kmalloc_memmove_negative_size+0x290/0x290 [test_kasan] [ 2893.742595] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.743258] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.743928] ? lock_acquire+0x4ea/0x620 [ 2893.744486] ? rcu_read_unlock+0x40/0x40 [ 2893.745041] ? rcu_read_unlock+0x40/0x40 [ 2893.745601] ? rcu_read_lock_sched_held+0x12/0x80 [ 2893.746262] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.747042] ? do_raw_spin_lock+0x270/0x270 [ 2893.747701] ? kunit_ptr_not_err_assert_format+0x210/0x210 [kunit] [ 2893.748586] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.749282] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.750004] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.750716] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.751464] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.752336] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.753070] kthread+0x2a4/0x350 [ 2893.753568] ? kthread_complete_and_exit+0x20/0x20 [ 2893.754242] ret_from_fork+0x1f/0x30 [ 2893.754788] [ 2893.755114] [ 2893.755370] Allocated by task 48403: [ 2893.755888] kasan_save_stack+0x1e/0x40 [ 2893.756450] __kasan_kmalloc+0x81/0xa0 [ 2893.756979] krealloc_uaf+0xaa/0x450 [test_kasan] [ 2893.757673] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.758381] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.759224] kthread+0x2a4/0x350 [ 2893.759713] ret_from_fork+0x1f/0x30 [ 2893.760228] [ 2893.760487] Freed by task 48403: [ 2893.760952] kasan_save_stack+0x1e/0x40 [ 2893.761524] kasan_set_track+0x21/0x30 [ 2893.762057] kasan_set_free_info+0x20/0x40 [ 2893.762647] __kasan_slab_free+0x108/0x170 [ 2893.763221] slab_free_freelist_hook+0x11d/0x1d0 [ 2893.763890] kfree+0xe2/0x3c0 [ 2893.764333] krealloc_uaf+0x147/0x450 [test_kasan] [ 2893.765009] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.765721] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.766581] kthread+0x2a4/0x350 [ 2893.767043] ret_from_fork+0x1f/0x30 [ 2893.767573] [ 2893.767810] The buggy address belongs to the object at ffff8880317efa00 [ 2893.767810] which belongs to the cache kmalloc-256 of size 256 [ 2893.769520] The buggy address is located 0 bytes inside of [ 2893.769520] 256-byte region [ffff8880317efa00, ffff8880317efb00) [ 2893.771090] [ 2893.771334] The buggy address belongs to the physical page: [ 2893.772112] page:0000000073918922 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x317ee [ 2893.773407] head:0000000073918922 order:1 compound_mapcount:0 compound_pincount:0 [ 2893.774451] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.775484] raw: 000fffffc0010200 dead000000000100 dead000000000122 ffff888100041b40 [ 2893.776588] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2893.777673] page dumped because: kasan: bad access detected [ 2893.778463] [ 2893.778702] Memory state around the buggy address: [ 2893.779402] ffff8880317ef900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.780424] ffff8880317ef980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.781456] >ffff8880317efa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2893.782469] ^ [ 2893.782933] ffff8880317efa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2893.783953] ffff8880317efb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.784974] ================================================================== [ 2893.786202] ok 14 - krealloc_uaf [ 2893.793539] ================================================================== [ 2893.795175] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 2893.796236] Write of size 16 at addr ffff888078e2ece0 by task kunit_try_catch/48404 [ 2893.797267] [ 2893.797507] CPU: 1 PID: 48404 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.799312] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.800100] Call Trace: [ 2893.800460] [ 2893.800771] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 2893.801479] dump_stack_lvl+0x57/0x81 [ 2893.801996] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.802789] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 2893.803499] print_report.cold+0x5c/0x237 [ 2893.804055] kasan_report+0xc9/0x100 [ 2893.804565] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 2893.805283] kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 2893.805976] ? kmalloc_uaf_16+0x3b0/0x3b0 [test_kasan] [ 2893.806688] ? do_raw_spin_trylock+0xb5/0x180 [ 2893.807293] ? do_raw_spin_lock+0x270/0x270 [ 2893.807879] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.808644] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.809330] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.810025] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.810702] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.811400] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.812226] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.812932] kthread+0x2a4/0x350 [ 2893.813401] ? kthread_complete_and_exit+0x20/0x20 [ 2893.814057] ret_from_fork+0x1f/0x30 [ 2893.814578] [ 2893.814896] [ 2893.815128] Allocated by task 48404: [ 2893.815630] kasan_save_stack+0x1e/0x40 [ 2893.816161] __kasan_kmalloc+0x81/0xa0 [ 2893.816687] kmalloc_oob_16+0xa4/0x3b0 [test_kasan] [ 2893.817365] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.818035] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.818881] kthread+0x2a4/0x350 [ 2893.819345] ret_from_fork+0x1f/0x30 [ 2893.819847] [ 2893.820080] The buggy address belongs to the object at ffff888078e2ece0 [ 2893.820080] which belongs to the cache kmalloc-16 of size 16 [ 2893.821722] The buggy address is located 0 bytes inside of [ 2893.821722] 16-byte region [ffff888078e2ece0, ffff888078e2ecf0) [ 2893.823253] [ 2893.823497] The buggy address belongs to the physical page: [ 2893.824247] page:0000000039a8984d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x78e2e [ 2893.825494] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.826425] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 2893.827464] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2893.828500] page dumped because: kasan: bad access detected [ 2893.829248] [ 2893.829484] Memory state around the buggy address: [ 2893.830140] ffff888078e2eb80: 00 00 fc fc fa fb fc fc fb fb fc fc fa fb fc fc [ 2893.831116] ffff888078e2ec00: fb fb fc fc fb fb fc fc fa fb fc fc 00 00 fc fc [ 2893.832095] >ffff888078e2ec80: 00 00 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 2893.833069] ^ [ 2893.833962] ffff888078e2ed00: fb fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 2893.834954] ffff888078e2ed80: 00 00 fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 2893.835926] ================================================================== [ 2893.837238] ok 15 - kmalloc_oob_16 [ 2893.839348] ================================================================== [ 2893.841000] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 2893.842025] Read of size 16 at addr ffff888078e2ea60 by task kunit_try_catch/48405 [ 2893.843046] [ 2893.843283] CPU: 1 PID: 48405 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.845102] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.845896] Call Trace: [ 2893.846252] [ 2893.846575] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 2893.847284] dump_stack_lvl+0x57/0x81 [ 2893.847810] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.848608] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 2893.849323] print_report.cold+0x5c/0x237 [ 2893.849883] kasan_report+0xc9/0x100 [ 2893.850394] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 2893.851105] kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 2893.851799] ? kmalloc_uaf+0x2b0/0x2b0 [test_kasan] [ 2893.852478] ? do_raw_spin_trylock+0xb5/0x180 [ 2893.853087] ? do_raw_spin_lock+0x270/0x270 [ 2893.853675] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.854459] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.855144] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.855847] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.856527] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.857224] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.858061] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.858771] kthread+0x2a4/0x350 [ 2893.859231] ? kthread_complete_and_exit+0x20/0x20 [ 2893.859898] ret_from_fork+0x1f/0x30 [ 2893.860424] [ 2893.860751] [ 2893.860987] Allocated by task 48405: [ 2893.861497] kasan_save_stack+0x1e/0x40 [ 2893.862027] __kasan_kmalloc+0x81/0xa0 [ 2893.862554] kmalloc_uaf_16+0x15d/0x3b0 [test_kasan] [ 2893.863239] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.863933] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.864770] kthread+0x2a4/0x350 [ 2893.865227] ret_from_fork+0x1f/0x30 [ 2893.865733] [ 2893.865965] Freed by task 48405: [ 2893.866425] kasan_save_stack+0x1e/0x40 [ 2893.866957] kasan_set_track+0x21/0x30 [ 2893.867483] kasan_set_free_info+0x20/0x40 [ 2893.868045] __kasan_slab_free+0x108/0x170 [ 2893.868613] slab_free_freelist_hook+0x11d/0x1d0 [ 2893.869248] kfree+0xe2/0x3c0 [ 2893.869680] kmalloc_uaf_16+0x1e8/0x3b0 [test_kasan] [ 2893.870373] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.871042] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.871876] kthread+0x2a4/0x350 [ 2893.872338] ret_from_fork+0x1f/0x30 [ 2893.872836] [ 2893.873071] The buggy address belongs to the object at ffff888078e2ea60 [ 2893.873071] which belongs to the cache kmalloc-16 of size 16 [ 2893.874957] The buggy address is located 0 bytes inside of [ 2893.874957] 16-byte region [ffff888078e2ea60, ffff888078e2ea70) [ 2893.876488] [ 2893.876721] The buggy address belongs to the physical page: [ 2893.877478] page:0000000039a8984d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x78e2e [ 2893.878717] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.879644] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 2893.880688] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2893.881727] page dumped because: kasan: bad access detected [ 2893.882484] [ 2893.882716] Memory state around the buggy address: [ 2893.883374] ffff888078e2e900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 2893.884352] ffff888078e2e980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 2893.885325] >ffff888078e2ea00: fb fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 2893.886293] ^ [ 2893.887154] ffff888078e2ea80: 00 00 fc fc fb fb fc fc fa fb fc fc fa fb fc fc [ 2893.888130] ffff888078e2eb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 2893.889104] ================================================================== [ 2893.890228] ok 16 - kmalloc_uaf_16 [ 2893.894442] ================================================================== [ 2893.895988] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 2893.897130] Write of size 128 at addr ffff888006a1f800 by task kunit_try_catch/48406 [ 2893.898173] [ 2893.898415] CPU: 1 PID: 48406 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.900261] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.901048] Call Trace: [ 2893.901408] [ 2893.901720] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 2893.902517] dump_stack_lvl+0x57/0x81 [ 2893.903032] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.903830] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 2893.904625] print_report.cold+0x5c/0x237 [ 2893.905184] kasan_report+0xc9/0x100 [ 2893.905698] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 2893.906487] kasan_check_range+0xfd/0x1e0 [ 2893.907043] memset+0x20/0x50 [ 2893.907473] kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 2893.908233] ? kmalloc_oob_memset_2+0x290/0x290 [test_kasan] [ 2893.909016] ? do_raw_spin_trylock+0xb5/0x180 [ 2893.909632] ? do_raw_spin_lock+0x270/0x270 [ 2893.910215] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.910979] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.911667] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.912374] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.913046] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.913754] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.914594] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.915296] kthread+0x2a4/0x350 [ 2893.915764] ? kthread_complete_and_exit+0x20/0x20 [ 2893.916428] ret_from_fork+0x1f/0x30 [ 2893.916940] [ 2893.917261] [ 2893.917501] Allocated by task 48406: [ 2893.918000] kasan_save_stack+0x1e/0x40 [ 2893.918538] __kasan_kmalloc+0x81/0xa0 [ 2893.919060] kmalloc_oob_in_memset+0x9c/0x280 [test_kasan] [ 2893.919809] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.920488] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.921325] kthread+0x2a4/0x350 [ 2893.921781] ret_from_fork+0x1f/0x30 [ 2893.922282] [ 2893.922523] The buggy address belongs to the object at ffff888006a1f800 [ 2893.922523] which belongs to the cache kmalloc-128 of size 128 [ 2893.924173] The buggy address is located 0 bytes inside of [ 2893.924173] 128-byte region [ffff888006a1f800, ffff888006a1f880) [ 2893.925716] [ 2893.925950] The buggy address belongs to the physical page: [ 2893.926709] page:00000000685c008a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x6a1f [ 2893.927946] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.928877] raw: 000fffffc0000200 ffffea00007ce3c0 dead000000000004 ffff8881000418c0 [ 2893.929921] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2893.930960] page dumped because: kasan: bad access detected [ 2893.931720] [ 2893.931953] Memory state around the buggy address: [ 2893.932615] ffff888006a1f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2893.933597] ffff888006a1f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.934579] >ffff888006a1f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 2893.935558] ^ [ 2893.936524] ffff888006a1f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.937507] ffff888006a1f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2893.938487] ================================================================== [ 2893.939593] ok 17 - kmalloc_oob_in_memset [ 2893.939870] ================================================================== [ 2893.941603] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 2893.942732] Write of size 2 at addr ffff888006a1ff77 by task kunit_try_catch/48407 [ 2893.943757] [ 2893.943994] CPU: 1 PID: 48407 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.945819] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.946605] Call Trace: [ 2893.946957] [ 2893.947268] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 2893.948051] dump_stack_lvl+0x57/0x81 [ 2893.948582] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.949461] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 2893.950243] print_report.cold+0x5c/0x237 [ 2893.950808] kasan_report+0xc9/0x100 [ 2893.951316] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 2893.952087] kasan_check_range+0xfd/0x1e0 [ 2893.952649] memset+0x20/0x50 [ 2893.953077] kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 2893.953832] ? kmalloc_oob_memset_4+0x290/0x290 [test_kasan] [ 2893.954608] ? do_raw_spin_trylock+0xb5/0x180 [ 2893.955212] ? do_raw_spin_lock+0x270/0x270 [ 2893.955799] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2893.956560] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2893.957238] ? kunit_add_resource+0x197/0x280 [kunit] [ 2893.957939] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.958613] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2893.959310] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.960137] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2893.960846] kthread+0x2a4/0x350 [ 2893.961311] ? kthread_complete_and_exit+0x20/0x20 [ 2893.961970] ret_from_fork+0x1f/0x30 [ 2893.962487] [ 2893.962805] [ 2893.963039] Allocated by task 48407: [ 2893.963544] kasan_save_stack+0x1e/0x40 [ 2893.964073] __kasan_kmalloc+0x81/0xa0 [ 2893.964599] kmalloc_oob_memset_2+0x9c/0x290 [test_kasan] [ 2893.965338] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2893.966006] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2893.966841] kthread+0x2a4/0x350 [ 2893.967296] ret_from_fork+0x1f/0x30 [ 2893.967800] [ 2893.968034] The buggy address belongs to the object at ffff888006a1ff00 [ 2893.968034] which belongs to the cache kmalloc-128 of size 128 [ 2893.969682] The buggy address is located 119 bytes inside of [ 2893.969682] 128-byte region [ffff888006a1ff00, ffff888006a1ff80) [ 2893.971228] [ 2893.971466] The buggy address belongs to the physical page: [ 2893.972213] page:00000000685c008a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x6a1f [ 2893.973440] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2893.974363] raw: 000fffffc0000200 ffffea00007ce3c0 dead000000000004 ffff8881000418c0 [ 2893.975401] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2893.976431] page dumped because: kasan: bad access detected [ 2893.977180] [ 2893.977418] Memory state around the buggy address: [ 2893.978076] ffff888006a1fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.979055] ffff888006a1fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.980035] >ffff888006a1ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 2893.981007] ^ [ 2893.981966] ffff888006a1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2893.982937] ffff888006a20000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2893.983906] ================================================================== [ 2893.985137] ok 18 - kmalloc_oob_memset_2 [ 2893.986631] ================================================================== [ 2893.988232] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 2893.989368] Write of size 4 at addr ffff888006a1f275 by task kunit_try_catch/48408 [ 2893.990389] [ 2893.990625] CPU: 1 PID: 48408 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2893.992542] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2893.993339] Call Trace: [ 2893.993702] [ 2893.994019] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 2893.994806] dump_stack_lvl+0x57/0x81 [ 2893.995328] print_address_description.constprop.0+0x1f/0x1e0 [ 2893.996118] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 2893.996900] print_report.cold+0x5c/0x237 [ 2893.997468] kasan_report+0xc9/0x100 [ 2893.997972] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 2893.998759] kasan_check_range+0xfd/0x1e0 [ 2893.999324] memset+0x20/0x50 [ 2893.999755] kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 2894.000520] ? kmalloc_oob_memset_8+0x290/0x290 [test_kasan] [ 2894.001306] ? do_raw_spin_trylock+0xb5/0x180 [ 2894.001914] ? do_raw_spin_lock+0x270/0x270 [ 2894.002503] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2894.003271] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2894.003963] ? kunit_add_resource+0x197/0x280 [kunit] [ 2894.004671] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.005351] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2894.006047] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.006884] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2894.007598] kthread+0x2a4/0x350 [ 2894.008062] ? kthread_complete_and_exit+0x20/0x20 [ 2894.008728] ret_from_fork+0x1f/0x30 [ 2894.009242] [ 2894.009568] [ 2894.009804] Allocated by task 48408: [ 2894.010310] kasan_save_stack+0x1e/0x40 [ 2894.010841] __kasan_kmalloc+0x81/0xa0 [ 2894.011370] kmalloc_oob_memset_4+0x9c/0x290 [test_kasan] [ 2894.012108] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.012785] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.013618] kthread+0x2a4/0x350 [ 2894.014074] ret_from_fork+0x1f/0x30 [ 2894.014578] [ 2894.014811] The buggy address belongs to the object at ffff888006a1f200 [ 2894.014811] which belongs to the cache kmalloc-128 of size 128 [ 2894.016469] The buggy address is located 117 bytes inside of [ 2894.016469] 128-byte region [ffff888006a1f200, ffff888006a1f280) [ 2894.018023] [ 2894.018258] The buggy address belongs to the physical page: [ 2894.019012] page:00000000685c008a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x6a1f [ 2894.020243] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2894.021173] raw: 000fffffc0000200 ffffea00007ce3c0 dead000000000004 ffff8881000418c0 [ 2894.022213] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2894.023252] page dumped because: kasan: bad access detected [ 2894.024008] [ 2894.024240] Memory state around the buggy address: [ 2894.024900] ffff888006a1f100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2894.025876] ffff888006a1f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2894.026855] >ffff888006a1f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 2894.027832] ^ [ 2894.028801] ffff888006a1f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2894.029773] ffff888006a1f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2894.030752] ================================================================== [ 2894.032000] ok 19 - kmalloc_oob_memset_4 [ 2894.033295] ================================================================== [ 2894.034232] systemd-journald[573]: Data hash table of /run/log/journal/be73443026774564864f916130901b16/system.journal has a fill level at 75.0 (6997 of 9329 items, 5373952 file size, 768 bytes per hash table item), suggesting rotation. [ 2894.034919] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 2894.037823] systemd-journald[573]: /run/log/journal/be73443026774564864f916130901b16/system.journal: Journal header limits reached or header out-of-date, rotating. [ 2894.038897] Write of size 8 at addr ffff888006a1f171 by task kunit_try_catch/48409 [ 2894.038903] [ 2894.038906] CPU: 1 PID: 48409 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2894.038913] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2894.044786] Call Trace: [ 2894.045142] [ 2894.045466] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 2894.046251] dump_stack_lvl+0x57/0x81 [ 2894.046776] print_address_description.constprop.0+0x1f/0x1e0 [ 2894.047574] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 2894.048362] print_report.cold+0x5c/0x237 [ 2894.049236] kasan_report+0xc9/0x100 [ 2894.050040] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 2894.051185] kasan_check_range+0xfd/0x1e0 [ 2894.051944] memset+0x20/0x50 [ 2894.052497] kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 2894.053477] ? kmalloc_oob_memset_16+0x290/0x290 [test_kasan] [ 2894.054518] ? do_raw_spin_trylock+0xb5/0x180 [ 2894.055286] ? do_raw_spin_lock+0x270/0x270 [ 2894.056076] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2894.057045] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2894.057956] ? kunit_add_resource+0x197/0x280 [kunit] [ 2894.058867] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.059759] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2894.060707] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.061899] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2894.062850] kthread+0x2a4/0x350 [ 2894.063438] ? kthread_complete_and_exit+0x20/0x20 [ 2894.064332] ret_from_fork+0x1f/0x30 [ 2894.065007] [ 2894.065417] [ 2894.065713] Allocated by task 48409: [ 2894.066387] kasan_save_stack+0x1e/0x40 [ 2894.067101] __kasan_kmalloc+0x81/0xa0 [ 2894.067765] kmalloc_oob_memset_8+0x9c/0x290 [test_kasan] [ 2894.068752] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.069630] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.070735] kthread+0x2a4/0x350 [ 2894.071336] ret_from_fork+0x1f/0x30 [ 2894.071964] [ 2894.072257] The buggy address belongs to the object at ffff888006a1f100 [ 2894.072257] which belongs to the cache kmalloc-128 of size 128 [ 2894.074411] The buggy address is located 113 bytes inside of [ 2894.074411] 128-byte region [ffff888006a1f100, ffff888006a1f180) [ 2894.076416] [ 2894.076728] The buggy address belongs to the physical page: [ 2894.077719] page:00000000685c008a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x6a1f [ 2894.079329] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2894.080491] raw: 000fffffc0000200 ffffea00007ce3c0 dead000000000004 ffff8881000418c0 [ 2894.081848] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2894.083183] page dumped because: kasan: bad access detected [ 2894.084149] [ 2894.084453] Memory state around the buggy address: [ 2894.085315] ffff888006a1f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2894.086550] ffff888006a1f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2894.087839] >ffff888006a1f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 2894.089088] ^ [ 2894.090352] ffff888006a1f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2894.091631] ffff888006a1f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2894.092870] ================================================================== [ 2894.094589] ok 20 - kmalloc_oob_memset_8 [ 2894.102087] ================================================================== [ 2894.103769] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 2894.104933] Write of size 16 at addr ffff8880312f5669 by task kunit_try_catch/48411 [ 2894.105979] [ 2894.106219] CPU: 0 PID: 48411 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2894.108063] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2894.108865] Call Trace: [ 2894.109224] [ 2894.109549] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 2894.110354] dump_stack_lvl+0x57/0x81 [ 2894.110881] print_address_description.constprop.0+0x1f/0x1e0 [ 2894.111687] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 2894.112489] print_report.cold+0x5c/0x237 [ 2894.113055] kasan_report+0xc9/0x100 [ 2894.113571] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 2894.114378] kasan_check_range+0xfd/0x1e0 [ 2894.114941] memset+0x20/0x50 [ 2894.115383] kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 2894.116155] ? kmalloc_uaf_memset+0x280/0x280 [test_kasan] [ 2894.116920] ? do_raw_spin_trylock+0xb5/0x180 [ 2894.117542] ? do_raw_spin_lock+0x270/0x270 [ 2894.118134] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2894.118916] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2894.119616] ? kunit_add_resource+0x197/0x280 [kunit] [ 2894.120333] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.121016] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2894.121728] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.122579] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2894.123298] kthread+0x2a4/0x350 [ 2894.123773] ? kthread_complete_and_exit+0x20/0x20 [ 2894.124444] ret_from_fork+0x1f/0x30 [ 2894.124962] [ 2894.125285] [ 2894.125528] Allocated by task 48411: [ 2894.126030] kasan_save_stack+0x1e/0x40 [ 2894.126572] __kasan_kmalloc+0x81/0xa0 [ 2894.127099] kmalloc_oob_memset_16+0x9c/0x290 [test_kasan] [ 2894.127857] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.128541] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.129379] kthread+0x2a4/0x350 [ 2894.129837] ret_from_fork+0x1f/0x30 [ 2894.130348] [ 2894.130584] The buggy address belongs to the object at ffff8880312f5600 [ 2894.130584] which belongs to the cache kmalloc-128 of size 128 [ 2894.132251] The buggy address is located 105 bytes inside of [ 2894.132251] 128-byte region [ffff8880312f5600, ffff8880312f5680) [ 2894.133832] [ 2894.134067] The buggy address belongs to the physical page: [ 2894.134835] page:000000009c19455c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x312f5 [ 2894.136090] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2894.137028] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000418c0 [ 2894.138078] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2894.139128] page dumped because: kasan: bad access detected [ 2894.139891] [ 2894.140126] Memory state around the buggy address: [ 2894.140795] ffff8880312f5500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2894.141789] ffff8880312f5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2894.142780] >ffff8880312f5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 2894.143767] ^ [ 2894.144746] ffff8880312f5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2894.145737] ffff8880312f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2894.146724] ================================================================== [ 2894.147803] ok 21 - kmalloc_oob_memset_16 [ 2894.151720] ================================================================== [ 2894.153354] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 2894.154536] Read of size 18446744073709551614 at addr ffff888079901b84 by task kunit_try_catch/48412 [ 2894.155752] [ 2894.155988] CPU: 1 PID: 48412 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2894.157922] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2894.158721] Call Trace: [ 2894.159076] [ 2894.159396] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 2894.160269] dump_stack_lvl+0x57/0x81 [ 2894.160793] print_address_description.constprop.0+0x1f/0x1e0 [ 2894.161586] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 2894.162462] print_report.cold+0x5c/0x237 [ 2894.163023] kasan_report+0xc9/0x100 [ 2894.163532] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 2894.164411] kasan_check_range+0xfd/0x1e0 [ 2894.164965] memmove+0x20/0x60 [ 2894.165410] kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 2894.166259] ? kmalloc_memmove_invalid_size+0x2a0/0x2a0 [test_kasan] [ 2894.167127] ? do_raw_spin_trylock+0xb5/0x180 [ 2894.167742] ? do_raw_spin_lock+0x270/0x270 [ 2894.168330] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2894.169087] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2894.169772] ? kunit_add_resource+0x197/0x280 [kunit] [ 2894.170474] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.171145] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2894.171843] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.172675] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2894.173388] kthread+0x2a4/0x350 [ 2894.173844] ? kthread_complete_and_exit+0x20/0x20 [ 2894.174513] ret_from_fork+0x1f/0x30 [ 2894.175024] [ 2894.175351] [ 2894.175584] Allocated by task 48412: [ 2894.176081] kasan_save_stack+0x1e/0x40 [ 2894.176618] __kasan_kmalloc+0x81/0xa0 [ 2894.177139] kmalloc_memmove_negative_size+0x9c/0x290 [test_kasan] [ 2894.177978] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.178649] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.179482] kthread+0x2a4/0x350 [ 2894.179937] ret_from_fork+0x1f/0x30 [ 2894.180444] [ 2894.180676] The buggy address belongs to the object at ffff888079901b80 [ 2894.180676] which belongs to the cache kmalloc-64 of size 64 [ 2894.182304] The buggy address is located 4 bytes inside of [ 2894.182304] 64-byte region [ffff888079901b80, ffff888079901bc0) [ 2894.183822] [ 2894.184055] The buggy address belongs to the physical page: [ 2894.184809] page:000000008945d7f1 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888079901b00 pfn:0x79901 [ 2894.186212] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2894.187142] raw: 000fffffc0000200 ffffea0000d10d80 dead000000000007 ffff888100041640 [ 2894.188185] raw: ffff888079901b00 000000008020000f 00000001ffffffff 0000000000000000 [ 2894.189229] page dumped because: kasan: bad access detected [ 2894.189984] [ 2894.190216] Memory state around the buggy address: [ 2894.190877] ffff888079901a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc [ 2894.191852] ffff888079901b00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2894.192829] >ffff888079901b80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2894.193805] ^ [ 2894.194259] ffff888079901c00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2894.195231] ffff888079901c80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2894.196205] ================================================================== [ 2894.197329] ok 22 - kmalloc_memmove_negative_size [ 2894.202577] ================================================================== [ 2894.204309] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 2894.205529] Read of size 64 at addr ffff888079901684 by task kunit_try_catch/48413 [ 2894.206550] [ 2894.206787] CPU: 1 PID: 48413 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2894.208611] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2894.209406] Call Trace: [ 2894.209763] [ 2894.210078] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 2894.210949] dump_stack_lvl+0x57/0x81 [ 2894.211473] print_address_description.constprop.0+0x1f/0x1e0 [ 2894.212267] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 2894.213140] print_report.cold+0x5c/0x237 [ 2894.213708] kasan_report+0xc9/0x100 [ 2894.214215] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 2894.215084] kasan_check_range+0xfd/0x1e0 [ 2894.215650] memmove+0x20/0x60 [ 2894.216090] kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 2894.216944] ? kmalloc_oob_in_memset+0x280/0x280 [test_kasan] [ 2894.217847] ? do_raw_spin_trylock+0xb5/0x180 [ 2894.218465] ? do_raw_spin_lock+0x270/0x270 [ 2894.219053] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2894.219819] ? kunit_add_resource+0x197/0x280 [kunit] [ 2894.220531] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.221204] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2894.221913] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.222751] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2894.223463] kthread+0x2a4/0x350 [ 2894.223922] ? kthread_complete_and_exit+0x20/0x20 [ 2894.224588] ret_from_fork+0x1f/0x30 [ 2894.225102] [ 2894.225429] [ 2894.225662] Allocated by task 48413: [ 2894.226163] kasan_save_stack+0x1e/0x40 [ 2894.226700] __kasan_kmalloc+0x81/0xa0 [ 2894.227218] kmalloc_memmove_invalid_size+0xac/0x2a0 [test_kasan] [ 2894.228053] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.228729] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.229567] kthread+0x2a4/0x350 [ 2894.230023] ret_from_fork+0x1f/0x30 [ 2894.230529] [ 2894.230762] The buggy address belongs to the object at ffff888079901680 [ 2894.230762] which belongs to the cache kmalloc-64 of size 64 [ 2894.232397] The buggy address is located 4 bytes inside of [ 2894.232397] 64-byte region [ffff888079901680, ffff8880799016c0) [ 2894.233921] [ 2894.234156] The buggy address belongs to the physical page: [ 2894.234917] page:000000008945d7f1 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888079901b00 pfn:0x79901 [ 2894.236336] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2894.237263] raw: 000fffffc0000200 ffffea0000d10d80 dead000000000007 ffff888100041640 [ 2894.238311] raw: ffff888079901b00 000000008020000f 00000001ffffffff 0000000000000000 [ 2894.239351] page dumped because: kasan: bad access detected [ 2894.240103] [ 2894.240342] Memory state around the buggy address: [ 2894.240999] ffff888079901580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2894.241976] ffff888079901600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2894.242954] >ffff888079901680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2894.243931] ^ [ 2894.244654] ffff888079901700: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2894.245630] ffff888079901780: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 2894.246609] ================================================================== [ 2894.247749] ok 23 - kmalloc_memmove_invalid_size [ 2894.251320] ================================================================== [ 2894.253018] BUG: KASAN: use-after-free in kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 2894.254004] Read of size 1 at addr ffff8880795bf548 by task kunit_try_catch/48414 [ 2894.255008] [ 2894.255245] CPU: 0 PID: 48414 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2894.257064] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2894.257882] Call Trace: [ 2894.258236] [ 2894.258553] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 2894.259230] dump_stack_lvl+0x57/0x81 [ 2894.259752] print_address_description.constprop.0+0x1f/0x1e0 [ 2894.260544] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 2894.261216] print_report.cold+0x5c/0x237 [ 2894.261782] kasan_report+0xc9/0x100 [ 2894.262298] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 2894.262970] kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 2894.263630] ? kmalloc_uaf2+0x430/0x430 [test_kasan] [ 2894.264318] ? do_raw_spin_trylock+0xb5/0x180 [ 2894.264932] ? do_raw_spin_lock+0x270/0x270 [ 2894.265520] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2894.266283] ? kunit_add_resource+0x197/0x280 [kunit] [ 2894.266986] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.267666] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2894.268366] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.269196] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2894.269981] kthread+0x2a4/0x350 [ 2894.270462] ? kthread_complete_and_exit+0x20/0x20 [ 2894.271130] ret_from_fork+0x1f/0x30 [ 2894.271669] [ 2894.271995] [ 2894.272232] Allocated by task 48414: [ 2894.272744] kasan_save_stack+0x1e/0x40 [ 2894.273288] __kasan_kmalloc+0x81/0xa0 [ 2894.273819] kmalloc_uaf+0x98/0x2b0 [test_kasan] [ 2894.274472] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.275148] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.275985] kthread+0x2a4/0x350 [ 2894.276450] ret_from_fork+0x1f/0x30 [ 2894.276950] [ 2894.277185] Freed by task 48414: [ 2894.277645] kasan_save_stack+0x1e/0x40 [ 2894.278176] kasan_set_track+0x21/0x30 [ 2894.278702] kasan_set_free_info+0x20/0x40 [ 2894.279266] __kasan_slab_free+0x108/0x170 [ 2894.279832] slab_free_freelist_hook+0x11d/0x1d0 [ 2894.280474] kfree+0xe2/0x3c0 [ 2894.280897] kmalloc_uaf+0x12b/0x2b0 [test_kasan] [ 2894.281599] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.282274] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.283220] kthread+0x2a4/0x350 [ 2894.283690] ret_from_fork+0x1f/0x30 [ 2894.284207] [ 2894.284445] The buggy address belongs to the object at ffff8880795bf540 [ 2894.284445] which belongs to the cache kmalloc-16 of size 16 [ 2894.286149] The buggy address is located 8 bytes inside of [ 2894.286149] 16-byte region [ffff8880795bf540, ffff8880795bf550) [ 2894.287685] [ 2894.287920] The buggy address belongs to the physical page: [ 2894.288678] page:00000000916a73f4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x795bf [ 2894.289926] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2894.290854] raw: 000fffffc0000200 ffffea0000ddb780 dead000000000002 ffff8881000413c0 [ 2894.291895] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2894.292932] page dumped because: kasan: bad access detected [ 2894.293684] [ 2894.293916] Memory state around the buggy address: [ 2894.294577] ffff8880795bf400: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 2894.295558] ffff8880795bf480: 00 00 fc fc fa fb fc fc 00 00 fc fc 00 00 fc fc [ 2894.296530] >ffff8880795bf500: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 2894.297504] ^ [ 2894.298255] ffff8880795bf580: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 2894.299232] ffff8880795bf600: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 2894.300209] ================================================================== [ 2894.301735] ok 24 - kmalloc_uaf [ 2894.306536] ================================================================== [ 2894.308046] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 2894.309105] Write of size 33 at addr ffff888079901700 by task kunit_try_catch/48416 [ 2894.310136] [ 2894.310377] CPU: 1 PID: 48416 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2894.312189] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2894.312973] Call Trace: [ 2894.313334] [ 2894.313644] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 2894.314397] dump_stack_lvl+0x57/0x81 [ 2894.314915] print_address_description.constprop.0+0x1f/0x1e0 [ 2894.315710] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 2894.316461] print_report.cold+0x5c/0x237 [ 2894.317020] kasan_report+0xc9/0x100 [ 2894.317528] ? kmalloc_uaf_memset+0xc1/0x280 [test_kasan] [ 2894.318260] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 2894.319013] kasan_check_range+0xfd/0x1e0 [ 2894.319574] memset+0x20/0x50 [ 2894.320000] kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 2894.320729] ? kmem_cache_accounted+0x170/0x170 [test_kasan] [ 2894.321510] ? do_raw_spin_trylock+0xb5/0x180 [ 2894.322117] ? do_raw_spin_lock+0x270/0x270 [ 2894.322705] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2894.323467] ? kunit_add_resource+0x197/0x280 [kunit] [ 2894.324165] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.324842] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2894.325540] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.326371] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2894.327074] kthread+0x2a4/0x350 [ 2894.327538] ? kthread_complete_and_exit+0x20/0x20 [ 2894.328196] ret_from_fork+0x1f/0x30 [ 2894.328714] [ 2894.329034] [ 2894.329268] Allocated by task 48416: [ 2894.329773] kasan_save_stack+0x1e/0x40 [ 2894.330309] __kasan_kmalloc+0x81/0xa0 [ 2894.330829] kmalloc_uaf_memset+0x9a/0x280 [test_kasan] [ 2894.331546] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.332215] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.333045] kthread+0x2a4/0x350 [ 2894.333507] ret_from_fork+0x1f/0x30 [ 2894.334006] [ 2894.334238] Freed by task 48416: [ 2894.334698] kasan_save_stack+0x1e/0x40 [ 2894.335226] kasan_set_track+0x21/0x30 [ 2894.335752] kasan_set_free_info+0x20/0x40 [ 2894.336322] __kasan_slab_free+0x108/0x170 [ 2894.336884] slab_free_freelist_hook+0x11d/0x1d0 [ 2894.337527] kfree+0xe2/0x3c0 [ 2894.337951] kmalloc_uaf_memset+0x137/0x280 [test_kasan] [ 2894.338679] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.339356] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.340184] kthread+0x2a4/0x350 [ 2894.340643] ret_from_fork+0x1f/0x30 [ 2894.341142] [ 2894.341382] The buggy address belongs to the object at ffff888079901700 [ 2894.341382] which belongs to the cache kmalloc-64 of size 64 [ 2894.343008] The buggy address is located 0 bytes inside of [ 2894.343008] 64-byte region [ffff888079901700, ffff888079901740) [ 2894.344534] [ 2894.344768] The buggy address belongs to the physical page: [ 2894.345526] page:000000008945d7f1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x79901 [ 2894.346763] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2894.347695] raw: 000fffffc0000200 ffffea0000d10d80 dead000000000007 ffff888100041640 [ 2894.348735] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 2894.349770] page dumped because: kasan: bad access detected [ 2894.350525] [ 2894.350756] Memory state around the buggy address: [ 2894.351418] ffff888079901600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2894.352388] ffff888079901680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2894.353364] >ffff888079901700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2894.354335] ^ [ 2894.354789] ffff888079901780: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 2894.355767] ffff888079901800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2894.356738] ================================================================== [ 2894.358340] ok 25 - kmalloc_uaf_memset [ 2894.358772] ================================================================== [ 2894.360339] BUG: KASAN: use-after-free in kmalloc_uaf2+0x402/0x430 [test_kasan] [ 2894.361335] Read of size 1 at addr ffff888079901a28 by task kunit_try_catch/48417 [ 2894.362340] [ 2894.362576] CPU: 1 PID: 48417 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2894.364398] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2894.365177] Call Trace: [ 2894.365537] [ 2894.365849] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 2894.366539] dump_stack_lvl+0x57/0x81 [ 2894.367054] print_address_description.constprop.0+0x1f/0x1e0 [ 2894.367846] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 2894.368535] print_report.cold+0x5c/0x237 [ 2894.369094] kasan_report+0xc9/0x100 [ 2894.369601] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 2894.370290] kmalloc_uaf2+0x402/0x430 [test_kasan] [ 2894.370951] ? kfree_via_page+0x290/0x290 [test_kasan] [ 2894.371665] ? rcu_read_lock_sched_held+0x12/0x80 [ 2894.372320] ? lock_acquire+0x4ea/0x620 [ 2894.372855] ? rcu_read_unlock+0x40/0x40 [ 2894.373405] ? rcu_read_unlock+0x40/0x40 [ 2894.373949] ? rcu_read_lock_sched_held+0x12/0x80 [ 2894.374607] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2894.375371] ? do_raw_spin_lock+0x270/0x270 [ 2894.375954] ? trace_hardirqs_on+0x2d/0x160 [ 2894.376536] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2894.377218] ? kunit_add_resource+0x197/0x280 [kunit] [ 2894.377918] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.378597] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2894.379297] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.380126] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2894.380836] kthread+0x2a4/0x350 [ 2894.381296] ? kthread_complete_and_exit+0x20/0x20 [ 2894.381955] ret_from_fork+0x1f/0x30 [ 2894.382471] [ 2894.382787] [ 2894.383021] Allocated by task 48417: [ 2894.383524] kasan_save_stack+0x1e/0x40 [ 2894.384054] __kasan_kmalloc+0x81/0xa0 [ 2894.384578] kmalloc_uaf2+0xad/0x430 [test_kasan] [ 2894.385225] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.385901] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.386734] kthread+0x2a4/0x350 [ 2894.387190] ret_from_fork+0x1f/0x30 [ 2894.387694] [ 2894.387928] Freed by task 48417: [ 2894.388389] kasan_save_stack+0x1e/0x40 [ 2894.388917] kasan_set_track+0x21/0x30 [ 2894.389442] kasan_set_free_info+0x20/0x40 [ 2894.390006] __kasan_slab_free+0x108/0x170 [ 2894.390574] slab_free_freelist_hook+0x11d/0x1d0 [ 2894.391212] kfree+0xe2/0x3c0 [ 2894.391640] kmalloc_uaf2+0x144/0x430 [test_kasan] [ 2894.392302] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2894.392974] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2894.393806] kthread+0x2a4/0x350 [ 2894.394263] ret_from_fork+0x1f/0x30 [ 2894.394770] [ 2894.395002] The buggy address belongs to the object at ffff888079901a00 [ 2894.395002] which belongs to the cache kmalloc-64 of size 64 [ 2894.396642] The buggy address is located 40 bytes inside of [ 2894.396642] 64-byte region [ffff888079901a00, ffff888079901a40) [ 2894.398178] [ 2894.398418] The buggy address belongs to the physical page: [ 2894.399171] page:000000008945d7f1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x79901 [ 2894.400413] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2894.401344] raw: 000fffffc0000200 ffffea0000d10d80 dead000000000007 ffff888100041640 [ 2894.402384] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 2894.403424] page dumped because: kasan: bad access detected [ 2894.404173] [ 2894.404410] Memory state around the buggy address: [ 2894.405064] ffff888079901900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2894.406036] ffff888079901980: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 2894.407012] >ffff888079901a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2894.407984] ^ [ 2894.408618] ffff888079901a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc [ 2894.409590] ffff888079901b00: fa fb f fc fc fc fc fc [ 2894.4 [ 2894.411717] ok 26 - kmalloc_uaf2 [ 2894.412305] ok 27 - kfree_via_page [ 2894.413609] ok 28 - kfree_via_phys [ 2894.414682] ================================================================== [ 2894.416253] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 2894.417328] Read of size 1 at addr ffff888009152a10 by task kunit_try_catch/48420 [ 2894.418336] [ 2894.418569] CPU: 0 PID: 48420 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2894.420437] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2894.421224] Call Trace: [ 2894.421587] [ 2894.421899] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 2894.422614] dump_stack_lvl+0x57/0x81 [ 2894.423134] print_address_description.constprop.0+0x1f/0x1e0 [ 2894.423933] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 2894.424650] print_report.cold+0x5c/0x237 [ 2894.425212] kasan_report+0xc9/0x100 [ 2894.425723] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 2894.426441] kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 2894.427132] ? kmem_cache_double_free+0x280/0x280 [test_kasan] [ 2894.427950] ? do_raw_spin_trylock+0xb5/0x180 [ 2894.428576] ? do_raw_spin_lock+0x270/0x270 [ 2894.429164] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2894.429933] ? kunit_add_resource [ 2894.463882] ok 29 - kmem_cache_oob [ 2894.995211] ok 30 - kmem_cache_accounted [ 2895.001552] ok 31 - kmem_cache_bulk [ 2895.002454] ================================================================== [ 2895.003978] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 2895.005147] Read of size 1 at addr ffffffffc169590d by task kunit_try_catch/48423 [ 2895.006146] [ 2895.006386] CPU: 1 PID: 48423 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.008183] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.008963] Call Trace: [ 2895.009317] [ 2895.009625] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 2895.010363] dump_stack_lvl+0x57/0x81 [ 2895.010822] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.011528] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 2895.012244] print_report.cold+0x5c/0x237 [ 2895.012740] kasan_report+0xc9/0x100 [ 2895.013187] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 2895.013904] kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 2895.014703] ? kasan_stack_oob+0x200/0x200 [test_kasan] [ 2895.015424] ? do_raw_spin_trylock+0xb5/0x180 [ 2895.016029] ? do_raw_spin_lock+0x270/0x270 [ 2895.016619] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.017381] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.018078] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.018754] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.019453] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.020283] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.020985] kthread+0x2a4/0x350 [ 2895.021444] ? kthread_complete_and_exit+0x20/0x20 [ 2895.022102] ret_from_fork+0x1f/0x30 [ 2895.022617] [ 2895.022935] [ 2895.023167] The buggy address belongs to the variable: [ 2895.023867] global_array+0xd/0xfffffffffffe5700 [test_kasan] [ 2895.024653] [ 2895.024886] Memory state around the buggy address: [ 2895.025544] ffffffffc1695800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2895.026519] ffffffffc1695880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2895.027491] >ffffffffc1695900: 00 02 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 2895.028463] ^ [ 2895.028956] ffffffffc1695980: 02 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 f9 f9 [ 2895.029928] ffffffffc1695a00: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 2895.030898] ================================================================== [ 2895.032070] ok 32 - kasan_global_oob_right [ 2895.032249] ok 33 - kasan_global_oob_left # SKIP Test requires CONFIG_CC_IS_CLANG=y [ 2895.033165] ================================================================== [ 2895.035224] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 2895.036305] Read of size 1 at addr ffffc900012afe7a by task kunit_try_catch/48425 [ 2895.037314] [ 2895.037547] CPU: 1 PID: 48425 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.039359] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.040138] Call Trace: [ 2895.040493] [ 2895.040801] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 2895.041523] dump_stack_lvl+0x57/0x81 [ 2895.042036] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.042828] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 2895.043543] print_report.cold+0x5c/0x237 [ 2895.044102] kasan_report+0xc9/0x100 [ 2895.044609] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 2895.045329] kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 2895.046023] ? match_all_mem_tag+0x20/0x20 [test_kasan] [ 2895.046741] ? rcu_read_unlock+0x40/0x40 [ 2895.047289] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.047939] ? do_raw_spin_trylock+0xb5/0x180 [ 2895.048553] ? do_raw_spin_lock+0x270/0x270 [ 2895.049133] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.049896] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2895.050584] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.051284] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.051957] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.052660] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.053497] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.054199] kthread+0x2a4/0x350 [ 2895.054664] ? kthread_complete_and_exit+0x20/0x20 [ 2895.055332] ret_from_fork+0x1f/0x30 [ 2895.055844] [ 2895.056163] [ 2895.056403] The buggy address belongs to stack of task kunit_try_catch/48425 [ 2895.057356] and is located at offset 266 in frame: [ 2895.058023] kasan_stack_oob+0x0/0x200 [test_kasan] [ 2895.058704] [ 2895.058939] This frame has 4 objects: [ 2895.059457] [48, 56) 'array' [ 2895.059462] [80, 128) '__assertion' [ 2895.059888] [160, 224) '__assertion' [ 2895.060392] [256, 266) 'stack_array' [ 2895.060909] [ 2895.061661] The buggy address belongs to the virtual mapping at [ 2895.061661] [ffffc900012a8000, ffffc900012b1000) created by: [ 2895.061661] dup_task_struct+0x5e/0x5a0 [ 2895.063715] [ 2895.063949] The buggy address belongs to the physical page: [ 2895.064705] page:00000000350dbbb0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x923c [ 2895.065942] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 2895.066819] raw: 000fffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 2895.067859] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2895.068897] page dumped because: kasan: bad access detected [ 2895.069654] [ 2895.069887] Memory state around the buggy address: [ 2895.070549] ffffc900012afd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 [ 2895.071523] ffffc900012afd80: f1 f1 f1 f1 00 f2 f2 f2 00 00 00 00 00 00 f2 f2 [ 2895.072497] >ffffc900012afe00: f2 f2 00 00 00 00 00 00 00 00 f2 f2 f2 f2 00 02 [ 2895.073471] ^ [ 2895.074441] ffffc900012afe80: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2895.075434] ffffc900012aff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2895.076417] ================================================================== [ 2895.077677] ok 34 - kasan_stack_oob [ 2895.077886] ================================================================== [ 2895.079425] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 2895.080587] Read of size 1 at addr ffffc90001037d1f by task kunit_try_catch/48426 [ 2895.081600] [ 2895.081837] CPU: 1 PID: 48426 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.083667] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.084459] Call Trace: [ 2895.084811] [ 2895.085121] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 2895.085911] dump_stack_lvl+0x57/0x81 [ 2895.086432] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.087223] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 2895.088008] print_report.cold+0x5c/0x237 [ 2895.088571] kasan_report+0xc9/0x100 [ 2895.089074] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 2895.089868] kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 2895.090638] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.091295] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.091946] ? lock_acquire+0x4ea/0x620 [ 2895.092490] ? kasan_alloca_oob_right+0x290/0x290 [test_kasan] [ 2895.093300] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.093951] ? do_raw_spin_trylock+0xb5/0x180 [ 2895.094565] ? do_raw_spin_lock+0x270/0x270 [ 2895.095148] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.095913] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2895.096600] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.097305] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.097975] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.098677] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.099511] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.100220] kthread+0x2a4/0x350 [ 2895.100680] ? kthread_complete_and_exit+0x20/0x20 [ 2895.101343] ret_from_fork+0x1f/0x30 [ 2895.101855] [ 2895.102175] [ 2895.102412] The buggy address belongs to stack of task kunit_try_catch/48426 [ 2895.103373] [ 2895.103608] The buggy address belongs to the virtual mapping at [ 2895.103608] [ffffc90001030000, ffffc90001039000) created by: [ 2895.103608] dup_task_struct+0x5e/0x5a0 [ 2895.105655] [ 2895.105890] The buggy address belongs to the physical page: [ 2895.106648] page:0000000004313e74 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3345c [ 2895.107889] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 2895.108765] raw: 000fffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 2895.109801] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2895.110842] page dumped because: kasan: bad access detected [ 2895.111597] [ 2895.111828] Memory state around the buggy address: [ 2895.112488] ffffc90001037c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2895.113460] ffffc90001037c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2895.114438] >ffffc90001037d00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00 [ 2895.115411] ^ [ 2895.115961] ffffc90001037d80: f1 f1 f1 f1 04 f2 00 f2 f2 f2 00 00 00 00 00 00 [ 2895.116932] ffffc90001037e00: f2 f2 f2 f2 00 00 00 00 00 00 00 00 f3 f3 f3 f3 [ 2895.117903] ================================================================== [ 2895.118972] ok 35 - kasan_alloca_oob_left [ 2895.119194] ================================================================== [ 2895.120791] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 2895.121962] Read of size 1 at addr ffffc900012afd2a by task kunit_try_catch/48427 [ 2895.122968] [ 2895.123203] CPU: 1 PID: 48427 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.125017] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.125804] Call Trace: [ 2895.126156] [ 2895.126469] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 2895.127270] dump_stack_lvl+0x57/0x81 [ 2895.127784] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.128581] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 2895.129383] print_report.cold+0x5c/0x237 [ 2895.129941] kasan_report+0xc9/0x100 [ 2895.130449] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 2895.131251] kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 2895.132030] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.132685] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.133336] ? lock_acquire+0x4ea/0x620 [ 2895.133871] ? ksize_unpoisons_memory+0x300/0x300 [test_kasan] [ 2895.134674] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.135330] ? do_raw_spin_trylock+0xb5/0x180 [ 2895.135936] ? do_raw_spin_lock+0x270/0x270 [ 2895.136523] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.137291] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2895.137970] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.138674] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.139353] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.140050] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.140884] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.141597] kthread+0x2a4/0x350 [ 2895.142056] ? kthread_complete_and_exit+0x20/0x20 [ 2895.142723] ret_from_fork+0x1f/0x30 [ 2895.143245] [ 2895.143563] [ 2895.143797] The buggy address belongs to stack of task kunit_try_catch/48427 [ 2895.144761] [ 2895.144999] The buggy address belongs to the virtual mapping at [ 2895.144999] [ffffc900012a8000, ffffc900012b1000) created by: [ 2895.144999] dup_task_struct+0x5e/0x5a0 [ 2895.147047] [ 2895.147287] The buggy address belongs to the physical page: [ 2895.148037] page:00000000350dbbb0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x923c [ 2895.149277] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 2895.150151] raw: 000fffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 2895.151193] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2895.152238] page dumped because: kasan: bad access detected [ 2895.152987] [ 2895.153226] Memory state around the buggy address: [ 2895.153881] ffffc900012afc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2895.154856] ffffc900012afc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2895.155829] >ffffc900012afd00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00 [ 2895.156800] ^ [ 2895.157429] ffffc900012afd80: f1 f1 f1 f1 04 f2 00 f2 f2 f2 00 00 00 00 00 00 [ 2895.158400] ffffc900012afe00: f2 f2 f2 f2 00 00 00 00 00 00 00 00 f3 f3 f3 f3 [ 2895.159377] ================================================================== [ 2895.160603] ok 36 - kasan_alloca_oob_right [ 2895.160819] ================================================================== [ 2895.162434] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 2895.163582] Read of size 1 at addr ffff888009b3ae80 by task kunit_try_catch/48428 [ 2895.164594] [ 2895.164828] CPU: 1 PID: 48428 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.166641] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.167425] Call Trace: [ 2895.167776] [ 2895.168086] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 2895.168884] dump_stack_lvl+0x57/0x81 [ 2895.169400] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.170185] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 2895.170986] print_report.cold+0x5c/0x237 [ 2895.171549] kasan_report+0xc9/0x100 [ 2895.172050] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 2895.172853] ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 2895.173634] ? ksize_uaf+0x4a0/0x4a0 [test_kasan] [ 2895.174286] ? do_raw_spin_trylock+0xb5/0x180 [ 2895.174891] ? do_raw_spin_lock+0x270/0x270 [ 2895.175478] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.176254] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.176952] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.177629] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.178326] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.179157] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.179863] kthread+0x2a4/0x350 [ 2895.180326] ? kthread_complete_and_exit+0x20/0x20 [ 2895.180984] ret_from_fork+0x1f/0x30 [ 2895.181501] [ 2895.181822] [ 2895.182057] Allocated by task 48428: [ 2895.182559] kasan_save_stack+0x1e/0x40 [ 2895.183090] __kasan_kmalloc+0x81/0xa0 [ 2895.183615] ksize_unpoisons_memory+0x9a/0x300 [test_kasan] [ 2895.184382] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.185051] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.185887] kthread+0x2a4/0x350 [ 2895.186350] ret_from_fork+0x1f/0x30 [ 2895.186848] [ 2895.187079] The buggy address belongs to the object at ffff888009b3ae00 [ 2895.187079] which belongs to the cache kmalloc-128 of size 128 [ 2895.188735] The buggy address is located 0 bytes to the right of [ 2895.188735] 128-byte region [ffff888009b3ae00, ffff888009b3ae80) [ 2895.190354] [ 2895.190586] The buggy address belongs to the physical page: [ 2895.191343] page:00000000c60a26ba refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9b3a [ 2895.192577] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.193506] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000418c0 [ 2895.194548] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2895.195588] page dumped because: kasan: bad access detected [ 2895.196344] [ 2895.196577] Memory state around the buggy address: [ 2895.197239] ffff888009b3ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.198214] ffff888009b3ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2895.199189] >ffff888009b3ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.200166] ^ [ 2895.200625] ffff888009b3af00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2895.201603] ffff888009b3af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.202583] ================================================================== [ 2895.203639] ok 37 - ksize_unpoisons_memory [ 2895.203868] ================================================================== [ 2895.205480] BUG: KASAN: use-after-free in ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2895.206439] Read of size 1 at addr ffff888009b3ac00 by task kunit_try_catch/48429 [ 2895.207449] [ 2895.207684] CPU: 1 PID: 48429 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.209502] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.210291] Call Trace: [ 2895.210644] [ 2895.210955] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2895.211616] dump_stack_lvl+0x57/0x81 [ 2895.212135] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.212928] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2895.213581] print_report.cold+0x5c/0x237 [ 2895.214139] kasan_report+0xc9/0x100 [ 2895.214647] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2895.215304] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2895.215954] __kasan_check_byte+0x36/0x50 [ 2895.216518] ksize+0x1b/0x50 [ 2895.216937] ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 2895.217571] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 2895.218279] ? do_raw_spin_trylock+0xb5/0x180 [ 2895.218885] ? do_raw_spin_lock+0x270/0x270 [ 2895.219474] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.220242] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.220941] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.221621] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.222322] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.223153] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.223859] kthread+0x2a4/0x350 [ 2895.224323] ? kthread_complete_and_exit+0x20/0x20 [ 2895.224985] ret_from_fork+0x1f/0x30 [ 2895.225503] [ 2895.225821] [ 2895.226054] Allocated by task 48429: [ 2895.226559] kasan_save_stack+0x1e/0x40 [ 2895.227089] __kasan_kmalloc+0x81/0xa0 [ 2895.227616] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 2895.228237] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.228908] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.229743] kthread+0x2a4/0x350 [ 2895.230203] ret_from_fork+0x1f/0x30 [ 2895.230704] [ 2895.230938] Freed by task 48429: [ 2895.231398] kasan_save_stack+0x1e/0x40 [ 2895.231927] kasan_set_track+0x21/0x30 [ 2895.232455] kasan_set_free_info+0x20/0x40 [ 2895.233020] __kasan_slab_free+0x108/0x170 [ 2895.233589] slab_free_freelist_hook+0x11d/0x1d0 [ 2895.234231] kfree+0xe2/0x3c0 [ 2895.234659] ksize_uaf+0x137/0x4a0 [test_kasan] [ 2895.235293] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.235961] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.236794] kthread+0x2a4/0x350 [ 2895.237254] ret_from_fork+0x1f/0x30 [ 2895.237754] [ 2895.237986] The buggy address belongs to the object at ffff888009b3ac00 [ 2895.237986] which belongs to the cache kmalloc-128 of size 128 [ 2895.239644] The buggy address is located 0 bytes inside of [ 2895.239644] 128-byte region [ffff888009b3ac00, ffff888009b3ac80) [ 2895.241176] [ 2895.241414] The buggy address belongs to the physical page: [ 2895.242166] page:00000000c60a26ba refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9b3a [ 2895.243404] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.244333] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000418c0 [ 2895.245376] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2895.246413] page dumped because: kasan: bad access detected [ 2895.247164] [ 2895.247401] Memory state around the buggy address: [ 2895.248054] ffff888009b3ab00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2895.249029] ffff888009b3ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.250007] >ffff888009b3ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2895.250980] ^ [ 2895.251442] ffff888009b3ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.252416] ffff888009b3ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fc fc [ 2895.253391] ================================================================== [ 2895.254563] ================================================================== [ 2895.255545] BUG: KASAN: use-after-free in ksize_uaf+0x47d/0x4a0 [test_kasan] [ 2895.256511] Read of size 1 at addr ffff888009b3ac00 by task kunit_try_catch/48429 [ 2895.257521] [ 2895.257756] CPU: 1 PID: 48429 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.259577] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.260365] Call Trace: [ 2895.260719] [ 2895.261029] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 2895.261687] dump_stack_lvl+0x57/0x81 [ 2895.262208] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.262997] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 2895.263653] print_report.cold+0x5c/0x237 [ 2895.264218] kasan_report+0xc9/0x100 [ 2895.264721] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 2895.265385] ksize_uaf+0x47d/0x4a0 [test_kasan] [ 2895.266019] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 2895.266732] ? do_raw_spin_trylock+0xb5/0x180 [ 2895.267355] ? do_raw_spin_lock+0x270/0x270 [ 2895.267937] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.268702] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.269405] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.270078] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.270778] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.271622] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.272337] kthread+0x2a4/0x350 [ 2895.272799] ? kthread_complete_and_exit+0x20/0x20 [ 2895.273471] ret_from_fork+0x1f/0x30 [ 2895.273987] [ 2895.274311] [ 2895.274545] Allocated by task 48429: [ 2895.275047] kasan_save_stack+0x1e/0x40 [ 2895.275586] __kasan_kmalloc+0x81/0xa0 [ 2895.276105] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 2895.276727] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.277402] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.278240] kthread+0x2a4/0x350 [ 2895.278697] ret_from_fork+0x1f/0x30 [ 2895.279200] [ 2895.279433] Freed by task 48429: [ 2895.279888] kasan_save_stack+0x1e/0x40 [ 2895.280422] kasan_set_track+0x21/0x30 [ 2895.280941] kasan_set_free_info+0x20/0x40 [ 2895.281510] __kasan_slab_free+0x108/0x170 [ 2895.282075] slab_free_freelist_hook+0x11d/0x1d0 [ 2895.282720] kfree+0xe2/0x3c0 [ 2895.283147] ksize_uaf+0x137/0x4a0 [test_kasan] [ 2895.283785] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.284468] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.285312] kthread+0x2a4/0x350 [ 2895.285771] ret_from_fork+0x1f/0x30 [ 2895.286275] [ 2895.286507] The buggy address belongs to the object at ffff888009b3ac00 [ 2895.286507] which belongs to the cache kmalloc-128 of size 128 [ 2895.288165] The buggy address is located 0 bytes inside of [ 2895.288165] 128-byte region [ffff888009b3ac00, ffff888009b3ac80) [ 2895.289712] [ 2895.289945] The buggy address belongs to the physical page: [ 2895.290703] page:00000000c60a26ba refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9b3a [ 2895.291939] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.292874] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000418c0 [ 2895.293919] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2895.294968] page dumped because: kasan: bad access detected [ 2895.295731] [ 2895.295964] Memory state around the buggy address: [ 2895.296623] ffff888009b3ab00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2895.297600] ffff888009b3ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.298574] >ffff888009b3ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2895.299550] ^ [ 2895.300006] ffff888009b3ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.300981] ffff888009b3ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fc fc [ 2895.301954] ================================================================== [ 2895.302968] ================================================================== [ 2895.303954] BUG: KASAN: use-after-free in ksize_uaf+0x470/0x4a0 [test_kasan] [ 2895.304913] Read of size 1 at addr ffff888009b3ac78 by task kunit_try_catch/48429 [ 2895.305918] [ 2895.306151] CPU: 1 PID: 48429 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.307960] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.308747] Call Trace: [ 2895.309101] [ 2895.309415] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 2895.310066] dump_stack_lvl+0x57/0x81 [ 2895.310584] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.311373] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 2895.312022] print_report.cold+0x5c/0x237 [ 2895.312586] kasan_report+0xc9/0x100 [ 2895.313093] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 2895.313753] ksize_uaf+0x470/0x4a0 [test_kasan] [ 2895.314386] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 2895.315088] ? do_raw_spin_trylock+0xb5/0x180 [ 2895.315715] ? do_raw_spin_lock+0x270/0x270 [ 2895.316303] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.317065] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.317766] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.318443] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.319136] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.319968] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.320674] kthread+0x2a4/0x350 [ 2895.321130] ? kthread_complete_and_exit+0x20/0x20 [ 2895.321794] ret_from_fork+0x1f/0x30 [ 2895.322312] [ 2895.322631] [ 2895.322862] Allocated by task 48429: [ 2895.323363] kasan_save_stack+0x1e/0x40 [ 2895.323894] __kasan_kmalloc+0x81/0xa0 [ 2895.324419] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 2895.325036] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.325713] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.326545] kthread+0x2a4/0x350 [ 2895.326999] ret_from_fork+0x1f/0x30 [ 2895.327502] [ 2895.327735] Freed by task 48429: [ 2895.328196] kasan_save_stack+0x1e/0x40 [ 2895.328727] kasan_set_track+0x21/0x30 [ 2895.329252] kasan_set_free_info+0x20/0x40 [ 2895.329814] __kasan_slab_free+0x108/0x170 [ 2895.330382] slab_free_freelist_hook+0x11d/0x1d0 [ 2895.331016] kfree+0xe2/0x3c0 [ 2895.331445] ksize_uaf+0x137/0x4a0 [test_kasan] [ 2895.332073] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.332745] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.333577] kthread+0x2a4/0x350 [ 2895.334033] ret_from_fork+0x1f/0x30 [ 2895.334539] [ 2895.334771] The buggy address belongs to the object at ffff888009b3ac00 [ 2895.334771] which belongs to the cache kmalloc-128 of size 128 [ 2895.336427] The buggy address is located 120 bytes inside of [ 2895.336427] 128-byte region [ffff888009b3ac00, ffff888009b3ac80) [ 2895.337977] [ 2895.338215] The buggy address belongs to the physical page: [ 2895.338962] page:00000000c60a26ba refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9b3a [ 2895.340198] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.341121] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000418c0 [ 2895.342162] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 2895.343203] page dumped because: kasan: bad access detected [ 2895.343951] [ 2895.344183] Memory state around the buggy address: [ 2895.344842] ffff888009b3ab00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2895.345817] ffff888009b3ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.346790] >ffff888009b3ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2895.347762] ^ [ 2895.348729] ffff888009b3ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.349708] ffff888009b3ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fc fc [ 2895.350684] ================================================================== [ 2895.351721] ok 38 - ksize_uaf [ 2895.352327] ================================================================== [ 2895.353782] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x152/0x400 [ 2895.354799] [ 2895.355033] CPU: 1 PID: 48430 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.356851] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.357634] Call Trace: [ 2895.357985] [ 2895.358301] dump_stack_lvl+0x57/0x81 [ 2895.358816] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.359607] print_report.cold+0x5c/0x237 [ 2895.360164] ? kmem_cache_free+0x152/0x400 [ 2895.360735] ? kmem_cache_free+0x152/0x400 [ 2895.361303] kasan_report_invalid_free+0x99/0xc0 [ 2895.361943] ? kmem_cache_free+0x152/0x400 [ 2895.362513] ? kmem_cache_free+0x152/0x400 [ 2895.363077] __kasan_slab_free+0x152/0x170 [ 2895.363647] slab_free_freelist_hook+0x11d/0x1d0 [ 2895.364295] ? kmem_cache_double_free+0x1bd/0x280 [test_kasan] [ 2895.365095] kmem_cache_free+0x152/0x400 [ 2895.365648] kmem_cache_double_free+0x1bd/0x280 [test_kasan] [ 2895.366431] ? kmem_cache_invalid_free+0x280/0x280 [test_kasan] [ 2895.367243] ? do_raw_spin_trylock+0xb5/0x180 [ 2895.367852] ? do_raw_spin_lock+0x270/0x270 [ 2895.368438] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.369204] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2895.369889] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.370591] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.371271] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.371969] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.372805] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.373513] kthread+0x2a4/0x350 [ 2895.373971] ? kthread_complete_and_exit+0x20/0x20 [ 2895.374636] ret_from_fork+0x1f/0x30 [ 2895.375154] [ 2895.375479] [ 2895.375712] Allocated by task 48430: [ 2895.376212] kasan_save_stack+0x1e/0x40 [ 2895.376741] __kasan_slab_alloc+0x66/0x80 [ 2895.377298] kmem_cache_alloc+0x161/0x310 [ 2895.377847] kmem_cache_double_free+0x123/0x280 [test_kasan] [ 2895.378630] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.379305] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.380136] kthread+0x2a4/0x350 [ 2895.380601] ret_from_fork+0x1f/0x30 [ 2895.381105] [ 2895.381345] Freed by task 48430: [ 2895.381802] kasan_save_stack+0x1e/0x40 [ 2895.382340] kasan_set_track+0x21/0x30 [ 2895.382859] kasan_set_free_info+0x20/0x40 [ 2895.383427] __kasan_slab_free+0x108/0x170 [ 2895.383988] slab_free_freelist_hook+0x11d/0x1d0 [ 2895.384638] kmem_cache_free+0x152/0x400 [ 2895.385179] kmem_cache_double_free+0x144/0x280 [test_kasan] [ 2895.385962] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.386638] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.387473] kthread+0x2a4/0x350 [ 2895.387928] ret_from_fork+0x1f/0x30 [ 2895.388434] [ 2895.388669] The buggy address belongs to the object at ffff888007b55318 [ 2895.388669] which belongs to the cache test_cache of size 200 [ 2895.390315] The buggy address is located 0 bytes inside of [ 2895.390315] 200-byte region [ffff888007b55318, ffff888007b553e0) [ 2895.391846] [ 2895.392078] The buggy address belongs to the physical page: [ 2895.392831] page:00000000750d7384 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7b55 [ 2895.394061] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.394990] raw: 000fffffc0000200 0000000000000000 dead000000000122 ffff88800b38db40 [ 2895.396034] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 2895.397076] page dumped because: kasan: bad access detected [ 2895.397832] [ 2895.398063] Memory state around the buggy address: [ 2895.398723] ffff888007b55200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.399711] ffff888007b55280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.400690] >ffff888007b55300: fc fc fc fa fb fb fb fb fb fb fb fb fb fb fb fb [ 2895.401662] ^ [ 2895.402220] ffff888007b55380: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 2895.403195] ffff888007b55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.404170] ================================================================== [ 2895.411970] ok 39 - kmem_cache_double_free [ 2895.412492] ================================================================== [ 2895.414122] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x152/0x400 [ 2895.415144] [ 2895.415382] CPU: 1 PID: 48431 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.417198] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.417981] Call Trace: [ 2895.418337] [ 2895.418649] dump_stack_lvl+0x57/0x81 [ 2895.419164] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.419955] print_report.cold+0x5c/0x237 [ 2895.420516] ? kmem_cache_free+0x152/0x400 [ 2895.421079] ? kmem_cache_free+0x152/0x400 [ 2895.421650] kasan_report_invalid_free+0x99/0xc0 [ 2895.422296] ? kmem_cache_free+0x152/0x400 [ 2895.422859] ? kmem_cache_free+0x152/0x400 [ 2895.423426] __kasan_slab_free+0x152/0x170 [ 2895.423990] slab_free_freelist_hook+0x11d/0x1d0 [ 2895.424634] ? kmem_cache_invalid_free+0x1b6/0x280 [test_kasan] [ 2895.425446] kmem_cache_free+0x152/0x400 [ 2895.425995] kmem_cache_invalid_free+0x1b6/0x280 [test_kasan] [ 2895.426786] ? kmem_cache_double_destroy+0x250/0x250 [test_kasan] [ 2895.427621] ? do_raw_spin_trylock+0xb5/0x180 [ 2895.428233] ? do_raw_spin_lock+0x270/0x270 [ 2895.428818] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.429582] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 2895.430271] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.430968] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.431644] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.432342] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.433171] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.433882] kthread+0x2a4/0x350 [ 2895.434345] ? kthread_complete_and_exit+0x20/0x20 [ 2895.435003] ret_from_fork+0x1f/0x30 [ 2895.435520] [ 2895.435838] [ 2895.436072] Allocated by task 48431: [ 2895.436574] kasan_save_stack+0x1e/0x40 [ 2895.437104] __kasan_slab_alloc+0x66/0x80 [ 2895.437663] kmem_cache_alloc+0x161/0x310 [ 2895.438221] kmem_cache_invalid_free+0x126/0x280 [test_kasan] [ 2895.439006] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.439687] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.440522] kthread+0x2a4/0x350 [ 2895.440981] ret_from_fork+0x1f/0x30 [ 2895.441487] [ 2895.441720] The buggy address belongs to the object at ffff888007b55420 [ 2895.441720] which belongs to the cache test_cache of size 200 [ 2895.443381] The buggy address is located 1 bytes inside of [ 2895.443381] 200-byte region [ffff888007b55420, ffff888007b554e8) [ 2895.444925] [ 2895.445162] The buggy address belongs to the physical page: [ 2895.445923] page:00000000750d7384 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7b55 [ 2895.447155] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.448080] raw: 000fffffc0000200 0000000000000000 dead000000000122 ffff88800b38ddc0 [ 2895.449120] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 2895.450158] page dumped because: kasan: bad access detected [ 2895.450912] [ 2895.451144] Memory state around the buggy address: [ 2895.451804] ffff888007b55300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.452779] ffff888007b55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.453757] >ffff888007b55400: fc fc fc fc 00 00 00 00 00 00 00 00 00 00 00 00 [ 2895.454735] ^ [ 2895.455330] ffff888007b55480: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 2895.456304] ffff888007b55500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.457279] ================================================================== [ 2895.463894] ok 40 - kmem_cache_invalid_free [ 2895.464836] ================================================================== [ 2895.466476] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2895.467619] Read of size 1 at addr ffff8880062443c0 by task kunit_try_catch/48432 [ 2895.468624] [ 2895.468857] CPU: 0 PID: 48432 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.470660] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.471446] Call Trace: [ 2895.471796] [ 2895.472108] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2895.472964] dump_stack_lvl+0x57/0x81 [ 2895.473485] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.474275] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2895.475103] print_report.cold+0x5c/0x237 [ 2895.475663] kasan_report+0xc9/0x100 [ 2895.476165] ? kmem_cache_free+0x90/0x400 [ 2895.476724] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2895.477559] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2895.478389] __kasan_check_byte+0x36/0x50 [ 2895.478943] kmem_cache_destroy+0x21/0x170 [ 2895.479517] kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 2895.480329] ? kmalloc_oob_right+0x510/0x510 [test_kasan] [ 2895.481082] ? do_raw_spin_trylock+0xb5/0x180 [ 2895.481697] ? do_raw_spin_lock+0x270/0x270 [ 2895.482285] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.483046] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.483748] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.484429] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.485122] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.485955] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.486668] kthread+0x2a4/0x350 [ 2895.487126] ? kthread_complete_and_exit+0x20/0x20 [ 2895.487790] ret_from_fork+0x1f/0x30 [ 2895.488307] [ 2895.488625] [ 2895.488859] Allocated by task 48432: [ 2895.489364] kasan_save_stack+0x1e/0x40 [ 2895.489897] __kasan_slab_alloc+0x66/0x80 [ 2895.490455] kmem_cache_alloc+0x161/0x310 [ 2895.491025] kmem_cache_create_usercopy+0x1b9/0x310 [ 2895.491696] kmem_cache_create+0x12/0x20 [ 2895.492245] kmem_cache_double_destroy+0x8d/0x250 [test_kasan] [ 2895.493039] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.493713] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.494545] kthread+0x2a4/0x350 [ 2895.495019] ret_from_fork+0x1f/0x30 [ 2895.495526] [ 2895.495759] Freed by task 48432: [ 2895.496222] kasan_save_stack+0x1e/0x40 [ 2895.496755] kasan_set_track+0x21/0x30 [ 2895.497279] kasan_set_free_info+0x20/0x40 [ 2895.497842] __kasan_slab_free+0x108/0x170 [ 2895.498408] slab_free_freelist_hook+0x11d/0x1d0 [ 2895.499047] kmem_cache_free+0x152/0x400 [ 2895.499600] kobject_cleanup+0x101/0x390 [ 2895.500144] kmem_cache_double_destroy+0x12a/0x250 [test_kasan] [ 2895.500958] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.501635] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.502471] kthread+0x2a4/0x350 [ 2895.502929] ret_from_fork+0x1f/0x30 [ 2895.503434] [ 2895.503666] The buggy address belongs to the object at ffff8880062443c0 [ 2895.503666] which belongs to the cache kmem_cache of size 240 [ 2895.505349] The buggy address is located 0 bytes inside of [ 2895.505349] 240-byte region [ffff8880062443c0, ffff8880062444b0) [ 2895.506881] [ 2895.507113] The buggy address belongs to the physical page: [ 2895.507867] page:00000000492b2f9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x6244 [ 2895.509100] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.510028] raw: 000fffffc0000200 0000000000000000 dead000000000122 ffff888100041000 [ 2895.511067] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000 [ 2895.512105] page dumped because: kasan: bad access detected [ 2895.512864] [ 2895.513096] Memory state around the buggy address: [ 2895.513754] ffff888006244280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.514731] ffff888006244300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2895.515703] >ffff888006244380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 2895.516681] ^ [ 2895.517407] ffff888006244400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2895.518385] ffff888006244480: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc [ 2895.519360] ================================================================== [ 2895.520527] ok 41 - kmem_cache_double_destroy [ 2895.520748] ok 42 - kasan_memchr # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 2895.521682] ok 43 - kasan_memcmp # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 2895.522924] ok 44 - kasan_strings # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 2895.524244] ================================================================== [ 2895.526250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 2895.527484] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2895.528506] [ 2895.528740] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.530555] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.531341] Call Trace: [ 2895.531692] [ 2895.531999] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 2895.532884] dump_stack_lvl+0x57/0x81 [ 2895.533403] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.534192] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 2895.535071] print_report.cold+0x5c/0x237 [ 2895.535631] kasan_report+0xc9/0x100 [ 2895.536131] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 2895.537017] kasan_check_range+0xfd/0x1e0 [ 2895.537574] kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 2895.538438] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2895.539191] ? kunit_kfree+0x200/0x200 [kunit] [ 2895.539814] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.540469] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.541229] ? rcu_read_lock_held+0x30/0x50 [ 2895.541804] ? trace_kmalloc+0x3c/0x100 [ 2895.542345] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2895.542994] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2895.543738] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2895.544739] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2895.545520] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.546218] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.546888] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.547588] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.548419] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.549119] kthread+0x2a4/0x350 [ 2895.549587] ? kthread_complete_and_exit+0x20/0x20 [ 2895.550249] ret_from_fork+0x1f/0x30 [ 2895.550761] [ 2895.551081] [ 2895.551321] Allocated by task 48436: [ 2895.551819] kasan_save_stack+0x1e/0x40 [ 2895.552357] __kasan_kmalloc+0x81/0xa0 [ 2895.552879] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2895.553616] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.554294] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.555151] kthread+0x2a4/0x350 [ 2895.555612] ret_from_fork+0x1f/0x30 [ 2895.556113] [ 2895.556351] The buggy address belongs to the object at ffff8880377c9b40 [ 2895.556351] which belongs to the cache kmalloc-16 of size 16 [ 2895.557980] The buggy address is located 8 bytes inside of [ 2895.557980] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2895.559505] [ 2895.559736] The buggy address belongs to the physical page: [ 2895.560492] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2895.561732] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.562661] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2895.563698] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2895.564736] page dumped because: kasan: bad access detected [ 2895.565493] [ 2895.565727] Memory state around the buggy address: [ 2895.566408] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2895.567379] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2895.568354] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2895.569325] ^ [ 2895.570072] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2895.571046] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2895.572019] ================================================================== [ 2895.573063] ================================================================== [ 2895.574040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 2895.575295] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2895.576313] [ 2895.576546] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.578356] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.579136] Call Trace: [ 2895.579494] [ 2895.579804] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 2895.580701] dump_stack_lvl+0x57/0x81 [ 2895.581221] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.582008] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 2895.582905] print_report.cold+0x5c/0x237 [ 2895.583513] kasan_report+0xc9/0x100 [ 2895.584015] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 2895.584911] kasan_check_range+0xfd/0x1e0 [ 2895.585473] kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 2895.586347] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2895.587040] ? kunit_kfree+0x200/0x200 [kunit] [ 2895.587663] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.588318] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.589073] ? rcu_read_lock_held+0x30/0x50 [ 2895.589702] ? trace_kmalloc+0x3c/0x100 [ 2895.590244] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2895.590893] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2895.591631] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2895.592631] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2895.593411] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.594106] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.594779] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.595479] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.596313] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.597014] kthread+0x2a4/0x350 [ 2895.597477] ? kthread_complete_and_exit+0x20/0x20 [ 2895.598131] ret_from_fork+0x1f/0x30 [ 2895.598648] [ 2895.598965] [ 2895.599202] Allocated by task 48436: [ 2895.599702] kasan_save_stack+0x1e/0x40 [ 2895.600240] __kasan_kmalloc+0x81/0xa0 [ 2895.600926] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2895.601716] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.602392] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.603223] kthread+0x2a4/0x350 [ 2895.603678] ret_from_fork+0x1f/0x30 [ 2895.604183] [ 2895.604414] The buggy address belongs to the object at ffff8880377c9b40 [ 2895.604414] which belongs to the cache kmalloc-16 of size 16 [ 2895.606042] The buggy address is located 8 bytes inside of [ 2895.606042] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2895.607563] [ 2895.607794] The buggy address belongs to the physical page: [ 2895.608547] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2895.609786] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.610712] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2895.611752] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2895.612789] page dumped because: kasan: bad access detected [ 2895.613542] [ 2895.613776] Memory state around the buggy address: [ 2895.614434] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2895.615406] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2895.616409] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2895.617381] ^ [ 2895.618132] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2895.619108] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2895.620080] ================================================================== [ 2895.621255] ================================================================== [ 2895.622242] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 2895.623486] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2895.624504] [ 2895.624740] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.626561] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.627351] Call Trace: [ 2895.627704] [ 2895.628013] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 2895.628909] dump_stack_lvl+0x57/0x81 [ 2895.629430] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.630221] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 2895.631126] print_report.cold+0x5c/0x237 [ 2895.631693] kasan_report+0xc9/0x100 [ 2895.632203] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 2895.633100] kasan_check_range+0xfd/0x1e0 [ 2895.633661] kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 2895.634535] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2895.635241] ? kunit_kfree+0x200/0x200 [kunit] [ 2895.635861] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.636518] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.637279] ? rcu_read_lock_held+0x30/0x50 [ 2895.637854] ? trace_kmalloc+0x3c/0x100 [ 2895.638389] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2895.639041] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2895.639813] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2895.640826] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2895.641607] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.642309] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.642987] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.643685] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.644516] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.645225] kthread+0x2a4/0x350 [ 2895.645682] ? kthread_complete_and_exit+0x20/0x20 [ 2895.646347] ret_from_fork+0x1f/0x30 [ 2895.646858] [ 2895.647186] [ 2895.647422] Allocated by task 48436: [ 2895.647925] kasan_save_stack+0x1e/0x40 [ 2895.648473] __kasan_kmalloc+0x81/0xa0 [ 2895.648995] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2895.649736] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.650415] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.651251] kthread+0x2a4/0x350 [ 2895.651704] ret_from_fork+0x1f/0x30 [ 2895.652208] [ 2895.652440] The buggy address belongs to the object at ffff8880377c9b40 [ 2895.652440] which belongs to the cache kmalloc-16 of size 16 [ 2895.654067] The buggy address is located 8 bytes inside of [ 2895.654067] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2895.655591] [ 2895.655824] The buggy address belongs to the physical page: [ 2895.656584] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2895.657823] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.658752] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2895.659790] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2895.660824] page dumped because: kasan: bad access detected [ 2895.661579] [ 2895.661810] Memory state around the buggy address: [ 2895.662470] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2895.663440] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2895.664417] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2895.665387] ^ [ 2895.666140] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2895.667144] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2895.668178] ================================================================== [ 2895.669443] ================================================================== [ 2895.670471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 2895.671718] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2895.672743] [ 2895.672976] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.674787] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.675574] Call Trace: [ 2895.675926] [ 2895.676248] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 2895.677139] dump_stack_lvl+0x57/0x81 [ 2895.677661] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.678452] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 2895.679349] print_report.cold+0x5c/0x237 [ 2895.679904] kasan_report+0xc9/0x100 [ 2895.680414] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 2895.681312] kasan_check_range+0xfd/0x1e0 [ 2895.681868] kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 2895.682744] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2895.683446] ? kunit_kfree+0x200/0x200 [kunit] [ 2895.684067] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.684722] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.685485] ? rcu_read_lock_held+0x30/0x50 [ 2895.686059] ? trace_kmalloc+0x3c/0x100 [ 2895.686594] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2895.687249] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2895.687986] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2895.688986] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2895.689816] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.690521] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.691199] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.691893] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.692729] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.693440] kthread+0x2a4/0x350 [ 2895.693899] ? kthread_complete_and_exit+0x20/0x20 [ 2895.694564] ret_from_fork+0x1f/0x30 [ 2895.695075] [ 2895.695399] [ 2895.695631] Allocated by task 48436: [ 2895.696132] kasan_save_stack+0x1e/0x40 [ 2895.696674] __kasan_kmalloc+0x81/0xa0 [ 2895.697199] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2895.697932] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.698607] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.699480] kthread+0x2a4/0x350 [ 2895.699940] ret_from_fork+0x1f/0x30 [ 2895.700448] [ 2895.700698] The buggy address belongs to the object at ffff8880377c9b40 [ 2895.700698] which belongs to the cache kmalloc-16 of size 16 [ 2895.702328] The buggy address is located 8 bytes inside of [ 2895.702328] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2895.703870] [ 2895.704103] The buggy address belongs to the physical page: [ 2895.704862] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2895.706099] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.707050] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2895.708089] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2895.709125] page dumped because: kasan: bad access detected [ 2895.709882] [ 2895.710116] Memory state around the buggy address: [ 2895.710778] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2895.711754] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2895.712730] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2895.713705] ^ [ 2895.714464] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2895.715463] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2895.716436] ================================================================== [ 2895.717475] ================================================================== [ 2895.718455] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 2895.719711] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2895.720734] [ 2895.720968] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.722794] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.723587] Call Trace: [ 2895.723942] [ 2895.724263] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 2895.725164] dump_stack_lvl+0x57/0x81 [ 2895.725682] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.726479] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 2895.727386] print_report.cold+0x5c/0x237 [ 2895.727946] kasan_report+0xc9/0x100 [ 2895.728456] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 2895.729358] kasan_check_range+0xfd/0x1e0 [ 2895.729914] kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 2895.730793] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2895.731527] ? kunit_kfree+0x200/0x200 [kunit] [ 2895.732151] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.732815] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.733583] ? rcu_read_lock_held+0x30/0x50 [ 2895.734166] ? trace_kmalloc+0x3c/0x100 [ 2895.734699] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2895.735356] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2895.736097] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2895.737110] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2895.737891] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.738599] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.739278] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.740004] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.740840] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.741551] kthread+0x2a4/0x350 [ 2895.742014] ? kthread_complete_and_exit+0x20/0x20 [ 2895.742681] ret_from_fork+0x1f/0x30 [ 2895.743202] [ 2895.743520] [ 2895.743752] Allocated by task 48436: [ 2895.744253] kasan_save_stack+0x1e/0x40 [ 2895.744785] __kasan_kmalloc+0x81/0xa0 [ 2895.745311] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2895.746052] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.746730] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.747567] kthread+0x2a4/0x350 [ 2895.748023] ret_from_fork+0x1f/0x30 [ 2895.748528] [ 2895.748761] The buggy address belongs to the object at ffff8880377c9b40 [ 2895.748761] which belongs to the cache kmalloc-16 of size 16 [ 2895.750396] The buggy address is located 8 bytes inside of [ 2895.750396] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2895.751922] [ 2895.752163] The buggy address belongs to the physical page: [ 2895.752926] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2895.754178] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.755108] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2895.756150] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2895.757205] page dumped because: kasan: bad access detected [ 2895.757965] [ 2895.758208] Memory state around the buggy address: [ 2895.758875] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2895.759858] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2895.760842] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2895.761825] ^ [ 2895.762588] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2895.763604] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2895.764594] ================================================================== [ 2895.765627] ================================================================== [ 2895.766615] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 2895.767872] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2895.768897] [ 2895.769132] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.770947] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.771738] Call Trace: [ 2895.772092] [ 2895.772408] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 2895.773312] dump_stack_lvl+0x57/0x81 [ 2895.773825] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.774618] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 2895.775517] print_report.cold+0x5c/0x237 [ 2895.776075] kasan_report+0xc9/0x100 [ 2895.776583] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 2895.777487] kasan_check_range+0xfd/0x1e0 [ 2895.778044] kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 2895.778922] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2895.779627] ? kunit_kfree+0x200/0x200 [kunit] [ 2895.780253] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.780904] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.781668] ? rcu_read_lock_held+0x30/0x50 [ 2895.782251] ? trace_kmalloc+0x3c/0x100 [ 2895.782783] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2895.783443] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2895.784185] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2895.785214] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2895.785994] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.786699] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.787376] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.788072] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.788914] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.789660] kthread+0x2a4/0x350 [ 2895.790171] ? kthread_complete_and_exit+0x20/0x20 [ 2895.790869] ret_from_fork+0x1f/0x30 [ 2895.791394] [ 2895.791715] [ 2895.791950] Allocated by task 48436: [ 2895.792475] kasan_save_stack+0x1e/0x40 [ 2895.793007] __kasan_kmalloc+0x81/0xa0 [ 2895.793534] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2895.794278] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.794953] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.795845] kthread+0x2a4/0x350 [ 2895.796311] ret_from_fork+0x1f/0x30 [ 2895.796810] [ 2895.797043] The buggy address belongs to the object at ffff8880377c9b40 [ 2895.797043] which belongs to the cache kmalloc-16 of size 16 [ 2895.798724] The buggy address is located 8 bytes inside of [ 2895.798724] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2895.800296] [ 2895.800538] The buggy address belongs to the physical page: [ 2895.801293] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2895.802555] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.803486] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2895.804558] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2895.805624] page dumped because: kasan: bad access detected [ 2895.806397] [ 2895.806628] Memory state around the buggy address: [ 2895.807290] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2895.808301] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2895.809510] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2895.810714] ^ [ 2895.811647] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2895.812847] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2895.814062] ================================================================== [ 2895.815351] ================================================================== [ 2895.816564] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 2895.818102] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2895.819368] [ 2895.819661] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.821913] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.822887] Call Trace: [ 2895.823328] [ 2895.823713] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 2895.824823] dump_stack_lvl+0x57/0x81 [ 2895.825466] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.826439] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 2895.827549] print_report.cold+0x5c/0x237 [ 2895.828243] kasan_report+0xc9/0x100 [ 2895.828869] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 2895.829985] kasan_check_range+0xfd/0x1e0 [ 2895.830596] kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 2895.831484] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2895.832188] ? kunit_kfree+0x200/0x200 [kunit] [ 2895.832805] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.833464] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.834230] ? rcu_read_lock_held+0x30/0x50 [ 2895.834805] ? trace_kmalloc+0x3c/0x100 [ 2895.835341] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2895.835994] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2895.836737] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2895.837740] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2895.838524] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.839229] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.839902] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.840601] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.841435] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.842136] kthread+0x2a4/0x350 [ 2895.842599] ? kthread_complete_and_exit+0x20/0x20 [ 2895.843265] ret_from_fork+0x1f/0x30 [ 2895.843779] [ 2895.844100] [ 2895.844339] Allocated by task 48436: [ 2895.844835] kasan_save_stack+0x1e/0x40 [ 2895.845373] __kasan_kmalloc+0x81/0xa0 [ 2895.845892] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2895.846629] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.847305] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.848133] kthread+0x2a4/0x350 [ 2895.848597] ret_from_fork+0x1f/0x30 [ 2895.849096] [ 2895.849334] The buggy address belongs to the object at ffff8880377c9b40 [ 2895.849334] which belongs to the cache kmalloc-16 of size 16 [ 2895.850969] The buggy address is located 8 bytes inside of [ 2895.850969] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2895.852499] [ 2895.852731] The buggy address belongs to the physical page: [ 2895.853483] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2895.854724] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.855652] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2895.856694] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2895.857734] page dumped because: kasan: bad access detected [ 2895.858493] [ 2895.858726] Memory state around the buggy address: [ 2895.859388] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2895.860365] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2895.861343] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2895.862316] ^ [ 2895.863067] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2895.864043] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2895.865019] ================================================================== [ 2895.866028] ================================================================== [ 2895.867009] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 2895.868256] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2895.869296] [ 2895.869530] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.871362] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.872153] Call Trace: [ 2895.872506] [ 2895.872817] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 2895.873712] dump_stack_lvl+0x57/0x81 [ 2895.874230] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.875016] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 2895.875918] print_report.cold+0x5c/0x237 [ 2895.876482] kasan_report+0xc9/0x100 [ 2895.876985] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 2895.877908] kasan_check_range+0xfd/0x1e0 [ 2895.878478] kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 2895.879352] ? kasan_test_init+0x50/0x50 [test_kasan] [ 2895.880065] ? kunit_kfree+0x200/0x200 [kunit] [ 2895.880692] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.881358] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.882120] ? rcu_read_lock_held+0x30/0x50 [ 2895.882699] ? trace_kmalloc+0x3c/0x100 [ 2895.883246] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2895.883893] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 2895.884628] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2895.885643] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2895.886454] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.887166] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.887841] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.888537] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.889380] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.890084] kthread+0x2a4/0x350 [ 2895.890569] ? kthread_complete_and_exit+0x20/0x20 [ 2895.891244] ret_from_fork+0x1f/0x30 [ 2895.891766] [ 2895.892085] [ 2895.892324] Allocated by task 48436: [ 2895.892820] kasan_save_stack+0x1e/0x40 [ 2895.893362] __kasan_kmalloc+0x81/0xa0 [ 2895.893885] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2895.894640] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.895326] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.896167] kthread+0x2a4/0x350 [ 2895.896626] ret_from_fork+0x1f/0x30 [ 2895.897151] [ 2895.897387] The buggy address belongs to the object at ffff8880377c9b40 [ 2895.897387] which belongs to the cache kmalloc-16 of size 16 [ 2895.899041] The buggy address is located 8 bytes inside of [ 2895.899041] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2895.900582] [ 2895.900816] The buggy address belongs to the physical page: [ 2895.901583] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2895.902838] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.903776] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2895.904813] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2895.905856] page dumped because: kasan: bad access detected [ 2895.906636] [ 2895.906868] Memory state around the buggy address: [ 2895.907539] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2895.908512] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2895.909504] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2895.910487] ^ [ 2895.911252] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2895.912232] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2895.913222] ================================================================== [ 2895.914253] ================================================================== [ 2895.915242] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 2895.916596] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2895.917641] [ 2895.917883] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.919703] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.920499] Call Trace: [ 2895.920851] [ 2895.921186] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 2895.922190] dump_stack_lvl+0x57/0x81 [ 2895.922702] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.923501] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 2895.924502] print_report.cold+0x5c/0x237 [ 2895.925080] kasan_report+0xc9/0x100 [ 2895.925593] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 2895.926595] kasan_check_range+0xfd/0x1e0 [ 2895.927155] kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 2895.928137] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2895.929042] ? kunit_kfree+0x200/0x200 [kunit] [ 2895.929666] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.930366] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.931122] ? rcu_read_lock_held+0x30/0x50 [ 2895.931712] ? trace_kmalloc+0x3c/0x100 [ 2895.932255] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2895.932904] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2895.933654] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2895.934665] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2895.935460] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.936175] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.936848] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.937556] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.938395] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.939104] kthread+0x2a4/0x350 [ 2895.939578] ? kthread_complete_and_exit+0x20/0x20 [ 2895.940248] ret_from_fork+0x1f/0x30 [ 2895.940760] [ 2895.941080] [ 2895.941320] Allocated by task 48436: [ 2895.941821] kasan_save_stack+0x1e/0x40 [ 2895.942359] __kasan_kmalloc+0x81/0xa0 [ 2895.942894] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2895.943640] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.944312] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.945149] kthread+0x2a4/0x350 [ 2895.945603] ret_from_fork+0x1f/0x30 [ 2895.946099] [ 2895.946344] The buggy address belongs to the object at ffff8880377c9b40 [ 2895.946344] which belongs to the cache kmalloc-16 of size 16 [ 2895.947978] The buggy address is located 8 bytes inside of [ 2895.947978] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2895.949516] [ 2895.949748] The buggy address belongs to the physical page: [ 2895.950513] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2895.951758] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2895.952692] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2895.953737] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2895.954781] page dumped because: kasan: bad access detected [ 2895.955550] [ 2895.955782] Memory state around the buggy address: [ 2895.956441] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2895.957429] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2895.958405] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2895.959385] ^ [ 2895.960147] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2895.961124] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2895.962103] ================================================================== [ 2895.963116] ================================================================== [ 2895.964103] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 2895.965462] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2895.966483] [ 2895.966718] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2895.968537] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2895.969332] Call Trace: [ 2895.969683] [ 2895.969995] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 2895.971002] dump_stack_lvl+0x57/0x81 [ 2895.971519] print_address_description.constprop.0+0x1f/0x1e0 [ 2895.972313] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 2895.973318] print_report.cold+0x5c/0x237 [ 2895.973878] kasan_report+0xc9/0x100 [ 2895.974388] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 2895.975391] kasan_check_range+0xfd/0x1e0 [ 2895.975951] kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 2895.976939] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2895.977843] ? kunit_kfree+0x200/0x200 [kunit] [ 2895.978471] ? rcu_read_lock_sched_held+0x12/0x80 [ 2895.979124] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2895.979887] ? rcu_read_lock_held+0x30/0x50 [ 2895.980470] ? trace_kmalloc+0x3c/0x100 [ 2895.981004] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2895.981660] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2895.982415] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2895.983419] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2895.984198] ? kunit_add_resource+0x197/0x280 [kunit] [ 2895.984894] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.985570] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2895.986269] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.987097] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2895.987806] kthread+0x2a4/0x350 [ 2895.988267] ? kthread_complete_and_exit+0x20/0x20 [ 2895.988925] ret_from_fork+0x1f/0x30 [ 2895.989442] [ 2895.989759] [ 2895.989991] Allocated by task 48436: [ 2895.990492] kasan_save_stack+0x1e/0x40 [ 2895.991021] __kasan_kmalloc+0x81/0xa0 [ 2895.991542] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2895.992285] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2895.992953] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2895.993801] kthread+0x2a4/0x350 [ 2895.994319] ret_from_fork+0x1f/0x30 [ 2895.994839] [ 2895.995072] The buggy address belongs to the object at ffff8880377c9b40 [ 2895.995072] which belongs to the cache kmalloc-16 of size 16 [ 2895.996732] The buggy address is located 8 bytes inside of [ 2895.996732] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2895.998258] [ 2895.998490] The buggy address belongs to the physical page: [ 2895.999243] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2896.000484] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2896.001410] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2896.002447] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2896.003483] page dumped because: kasan: bad access detected [ 2896.004238] [ 2896.004470] Memory state around the buggy address: [ 2896.005122] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2896.006095] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2896.007068] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2896.008041] ^ [ 2896.008795] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.009768] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.010744] ================================================================== [ 2896.011864] ================================================================== [ 2896.012853] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 2896.014209] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2896.015224] [ 2896.015458] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.017268] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.018049] Call Trace: [ 2896.018403] [ 2896.018713] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 2896.019710] dump_stack_lvl+0x57/0x81 [ 2896.020224] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.021010] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 2896.022009] print_report.cold+0x5c/0x237 [ 2896.022573] kasan_report+0xc9/0x100 [ 2896.023074] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 2896.024073] kasan_check_range+0xfd/0x1e0 [ 2896.024635] kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 2896.025615] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2896.026515] ? kunit_kfree+0x200/0x200 [kunit] [ 2896.027132] ? rcu_read_lock_sched_held+0x12/0x80 [ 2896.027789] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.028548] ? rcu_read_lock_held+0x30/0x50 [ 2896.029121] ? trace_kmalloc+0x3c/0x100 [ 2896.029655] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2896.030311] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2896.031064] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2896.032070] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2896.032852] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.033552] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.034227] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.034917] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.035753] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.036459] kthread+0x2a4/0x350 [ 2896.036914] ? kthread_complete_and_exit+0x20/0x20 [ 2896.037579] ret_from_fork+0x1f/0x30 [ 2896.038091] [ 2896.038415] [ 2896.038648] Allocated by task 48436: [ 2896.039147] kasan_save_stack+0x1e/0x40 [ 2896.039675] __kasan_kmalloc+0x81/0xa0 [ 2896.040196] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2896.040931] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.041603] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.042387] kthread+0x2a4/0x350 [ 2896.042807] ret_from_fork+0x1f/0x30 [ 2896.043257] [ 2896.043463] The buggy address belongs to the object at ffff8880377c9b40 [ 2896.043463] which belongs to the cache kmalloc-16 of size 16 [ 2896.044909] The buggy address is located 8 bytes inside of [ 2896.044909] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2896.046272] [ 2896.046478] The buggy address belongs to the physical page: [ 2896.047153] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2896.048259] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2896.049085] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2896.050081] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2896.051120] page dumped because: kasan: bad access detected [ 2896.051896] [ 2896.052128] Memory state around the buggy address: [ 2896.052787] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2896.053761] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2896.054731] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2896.055702] ^ [ 2896.056457] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.057417] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.058287] ================================================================== [ 2896.059329] ================================================================== [ 2896.060307] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 2896.061540] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2896.062449] [ 2896.062681] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.064493] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.065283] Call Trace: [ 2896.065596] [ 2896.065872] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 2896.066764] dump_stack_lvl+0x57/0x81 [ 2896.067225] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.067925] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 2896.068821] print_report.cold+0x5c/0x237 [ 2896.069320] kasan_report+0xc9/0x100 [ 2896.069771] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 2896.070665] kasan_check_range+0xfd/0x1e0 [ 2896.071166] kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 2896.072036] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2896.072844] ? kunit_kfree+0x200/0x200 [kunit] [ 2896.073402] ? rcu_read_lock_sched_held+0x12/0x80 [ 2896.073988] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.074671] ? rcu_read_lock_held+0x30/0x50 [ 2896.075187] ? trace_kmalloc+0x3c/0x100 [ 2896.075663] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2896.076248] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2896.076912] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2896.077811] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2896.078508] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.079217] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.079883] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.080507] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.081253] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.081880] kthread+0x2a4/0x350 [ 2896.082298] ? kthread_complete_and_exit+0x20/0x20 [ 2896.082886] ret_from_fork+0x1f/0x30 [ 2896.083347] [ 2896.083631] [ 2896.083838] Allocated by task 48436: [ 2896.084286] kasan_save_stack+0x1e/0x40 [ 2896.084759] __kasan_kmalloc+0x81/0xa0 [ 2896.085281] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2896.086017] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.086691] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.087497] kthread+0x2a4/0x350 [ 2896.087904] ret_from_fork+0x1f/0x30 [ 2896.088353] [ 2896.088559] The buggy address belongs to the object at ffff8880377c9b40 [ 2896.088559] which belongs to the cache kmalloc-16 of size 16 [ 2896.090097] The buggy address is located 8 bytes inside of [ 2896.090097] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2896.091626] [ 2896.091858] The buggy address belongs to the physical page: [ 2896.092612] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2896.093849] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2896.094778] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2896.095816] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2896.096850] page dumped because: kasan: bad access detected [ 2896.097603] [ 2896.097835] Memory state around the buggy address: [ 2896.098493] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2896.099468] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2896.100438] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2896.101410] ^ [ 2896.102168] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.103141] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.104107] ================================================================== [ 2896.105109] ================================================================== [ 2896.106086] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 2896.107436] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2896.108448] [ 2896.108681] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.110488] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.111268] Call Trace: [ 2896.111618] [ 2896.111927] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 2896.112926] dump_stack_lvl+0x57/0x81 [ 2896.113447] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.114237] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 2896.115238] print_report.cold+0x5c/0x237 [ 2896.115794] kasan_report+0xc9/0x100 [ 2896.116302] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 2896.117302] kasan_check_range+0xfd/0x1e0 [ 2896.117857] kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 2896.118836] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2896.119739] ? kunit_kfree+0x200/0x200 [kunit] [ 2896.120364] ? rcu_read_lock_sched_held+0x12/0x80 [ 2896.121012] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.121775] ? rcu_read_lock_held+0x30/0x50 [ 2896.122356] ? trace_kmalloc+0x3c/0x100 [ 2896.122887] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2896.123541] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2896.124292] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2896.125294] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2896.126070] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.126773] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.127449] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.128146] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.128972] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.129680] kthread+0x2a4/0x350 [ 2896.130142] ? kthread_complete_and_exit+0x20/0x20 [ 2896.130799] ret_from_fork+0x1f/0x30 [ 2896.131313] [ 2896.131631] [ 2896.131863] Allocated by task 48436: [ 2896.132364] kasan_save_stack+0x1e/0x40 [ 2896.132894] __kasan_kmalloc+0x81/0xa0 [ 2896.133418] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2896.134158] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.134824] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.135657] kthread+0x2a4/0x350 [ 2896.136113] ret_from_fork+0x1f/0x30 [ 2896.136620] [ 2896.136852] The buggy address belongs to the object at ffff8880377c9b40 [ 2896.136852] which belongs to the cache kmalloc-16 of size 16 [ 2896.138486] The buggy address is located 8 bytes inside of [ 2896.138486] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2896.140005] [ 2896.140244] The buggy address belongs to the physical page: [ 2896.140992] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2896.142242] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2896.143170] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2896.144209] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2896.145248] page dumped because: kasan: bad access detected [ 2896.145998] [ 2896.146237] Memory state around the buggy address: [ 2896.146893] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2896.147866] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2896.148844] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2896.149819] ^ [ 2896.150576] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.151549] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.152528] ================================================================== [ 2896.153543] ================================================================== [ 2896.154532] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 2896.155884] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2896.156910] [ 2896.157153] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.158975] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.159775] Call Trace: [ 2896.160137] [ 2896.160452] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 2896.161456] dump_stack_lvl+0x57/0x81 [ 2896.161974] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.162769] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 2896.163784] print_report.cold+0x5c/0x237 [ 2896.164347] kasan_report+0xc9/0x100 [ 2896.164852] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 2896.165855] kasan_check_range+0xfd/0x1e0 [ 2896.166417] kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 2896.167397] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2896.168293] ? kunit_kfree+0x200/0x200 [kunit] [ 2896.168909] ? rcu_read_lock_sched_held+0x12/0x80 [ 2896.169564] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.170327] ? rcu_read_lock_held+0x30/0x50 [ 2896.170900] ? trace_kmalloc+0x3c/0x100 [ 2896.171434] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2896.172085] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2896.172832] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2896.173833] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2896.174614] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.175317] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.175987] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.176685] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.177526] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.178230] kthread+0x2a4/0x350 [ 2896.178683] ? kthread_complete_and_exit+0x20/0x20 [ 2896.179342] ret_from_fork+0x1f/0x30 [ 2896.179849] [ 2896.180173] [ 2896.180404] Allocated by task 48436: [ 2896.180900] kasan_save_stack+0x1e/0x40 [ 2896.181436] __kasan_kmalloc+0x81/0xa0 [ 2896.181955] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2896.182693] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.183367] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.184193] kthread+0x2a4/0x350 [ 2896.184645] ret_from_fork+0x1f/0x30 [ 2896.185148] [ 2896.185379] The buggy address belongs to the object at ffff8880377c9b40 [ 2896.185379] which belongs to the cache kmalloc-16 of size 16 [ 2896.187002] The buggy address is located 8 bytes inside of [ 2896.187002] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2896.188526] [ 2896.188757] The buggy address belongs to the physical page: [ 2896.189511] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2896.190742] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2896.191665] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2896.192696] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2896.193737] page dumped because: kasan: bad access detected [ 2896.194491] [ 2896.194722] Memory state around the buggy address: [ 2896.195383] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2896.196355] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2896.197334] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2896.198311] ^ [ 2896.199060] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.200034] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.201014] ================================================================== [ 2896.202021] ================================================================== [ 2896.202993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 2896.204333] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2896.205345] [ 2896.205577] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.207383] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.208162] Call Trace: [ 2896.208511] [ 2896.208818] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 2896.209815] dump_stack_lvl+0x57/0x81 [ 2896.210333] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.211112] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 2896.212106] print_report.cold+0x5c/0x237 [ 2896.212672] kasan_report+0xc9/0x100 [ 2896.213181] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 2896.214185] kasan_check_range+0xfd/0x1e0 [ 2896.214740] kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 2896.215722] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2896.216624] ? kunit_kfree+0x200/0x200 [kunit] [ 2896.217251] ? rcu_read_lock_sched_held+0x12/0x80 [ 2896.217900] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.218659] ? rcu_read_lock_held+0x30/0x50 [ 2896.219237] ? trace_kmalloc+0x3c/0x100 [ 2896.219770] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2896.220427] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2896.221178] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2896.222182] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2896.222954] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.223652] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.224330] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.225022] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.225856] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.226563] kthread+0x2a4/0x350 [ 2896.227018] ? kthread_complete_and_exit+0x20/0x20 [ 2896.227682] ret_from_fork+0x1f/0x30 [ 2896.228199] [ 2896.228517] [ 2896.228748] Allocated by task 48436: [ 2896.229249] kasan_save_stack+0x1e/0x40 [ 2896.229781] __kasan_kmalloc+0x81/0xa0 [ 2896.230303] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2896.231033] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.231705] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.232536] kthread+0x2a4/0x350 [ 2896.232988] ret_from_fork+0x1f/0x30 [ 2896.233497] [ 2896.233732] The buggy address belongs to the object at ffff8880377c9b40 [ 2896.233732] which belongs to the cache kmalloc-16 of size 16 [ 2896.235359] The buggy address is located 8 bytes inside of [ 2896.235359] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2896.236885] [ 2896.237124] The buggy address belongs to the physical page: [ 2896.237874] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2896.239115] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2896.240039] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2896.241071] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2896.242103] page dumped because: kasan: bad access detected [ 2896.242853] [ 2896.243083] Memory state around the buggy address: [ 2896.243736] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2896.244699] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2896.245665] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2896.246628] ^ [ 2896.247377] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.248343] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.249316] ================================================================== [ 2896.250315] ================================================================== [ 2896.251288] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 2896.252640] Read of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2896.253648] [ 2896.253881] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.255697] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.256487] Call Trace: [ 2896.256841] [ 2896.257161] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 2896.258163] dump_stack_lvl+0x57/0x81 [ 2896.258674] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.259461] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 2896.260457] print_report.cold+0x5c/0x237 [ 2896.261014] kasan_report+0xc9/0x100 [ 2896.261522] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 2896.262524] kasan_check_range+0xfd/0x1e0 [ 2896.263077] kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 2896.264059] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2896.264958] ? kunit_kfree+0x200/0x200 [kunit] [ 2896.265582] ? rcu_read_lock_sched_held+0x12/0x80 [ 2896.266239] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.266992] ? rcu_read_lock_held+0x30/0x50 [ 2896.267567] ? trace_kmalloc+0x3c/0x100 [ 2896.268097] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2896.268750] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2896.269505] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2896.270505] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2896.271288] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.271988] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.272662] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.273356] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.274192] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.274894] kthread+0x2a4/0x350 [ 2896.275354] ? kthread_complete_and_exit+0x20/0x20 [ 2896.276012] ret_from_fork+0x1f/0x30 [ 2896.276532] [ 2896.276851] [ 2896.277085] Allocated by task 48436: [ 2896.277588] kasan_save_stack+0x1e/0x40 [ 2896.278125] __kasan_kmalloc+0x81/0xa0 [ 2896.278653] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2896.279392] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.280061] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.280893] kthread+0x2a4/0x350 [ 2896.281351] ret_from_fork+0x1f/0x30 [ 2896.281854] [ 2896.282087] The buggy address belongs to the object at ffff8880377c9b40 [ 2896.282087] which belongs to the cache kmalloc-16 of size 16 [ 2896.283755] The buggy address is located 8 bytes inside of [ 2896.283755] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2896.285286] [ 2896.285518] The buggy address belongs to the physical page: [ 2896.286271] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2896.287511] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2896.288438] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2896.289480] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2896.290518] page dumped because: kasan: bad access detected [ 2896.291268] [ 2896.291501] Memory state around the buggy address: [ 2896.292164] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2896.293136] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2896.294108] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2896.295082] ^ [ 2896.295843] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.296819] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.297796] ================================================================== [ 2896.298802] ================================================================== [ 2896.299781] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 2896.301142] Read of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2896.302152] [ 2896.302385] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.304198] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.304980] Call Trace: [ 2896.305338] [ 2896.305650] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 2896.306651] dump_stack_lvl+0x57/0x81 [ 2896.307168] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.307956] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 2896.308957] print_report.cold+0x5c/0x237 [ 2896.309519] kasan_report+0xc9/0x100 [ 2896.310023] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 2896.311028] kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 2896.312011] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2896.312907] ? kunit_kfree+0x200/0x200 [kunit] [ 2896.313531] ? rcu_read_lock_sched_held+0x12/0x80 [ 2896.314188] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.314947] ? rcu_read_lock_held+0x30/0x50 [ 2896.315532] ? trace_kmalloc+0x3c/0x100 [ 2896.316065] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2896.316722] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2896.317475] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2896.318483] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2896.319273] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.319973] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.320653] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.321356] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.322188] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.322895] kthread+0x2a4/0x350 [ 2896.323359] ? kthread_complete_and_exit+0x20/0x20 [ 2896.324018] ret_from_fork+0x1f/0x30 [ 2896.324536] [ 2896.324853] [ 2896.325085] Allocated by task 48436: [ 2896.325590] kasan_save_stack+0x1e/0x40 [ 2896.326128] __kasan_kmalloc+0x81/0xa0 [ 2896.326648] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2896.327388] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.328058] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.328892] kthread+0x2a4/0x350 [ 2896.329353] ret_from_fork+0x1f/0x30 [ 2896.329852] [ 2896.330085] The buggy address belongs to the object at ffff8880377c9b40 [ 2896.330085] which belongs to the cache kmalloc-16 of size 16 [ 2896.331723] The buggy address is located 8 bytes inside of [ 2896.331723] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2896.333254] [ 2896.333487] The buggy address belongs to the physical page: [ 2896.334240] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2896.335542] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2896.336470] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2896.337522] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2896.338559] page dumped because: kasan: bad access detected [ 2896.339317] [ 2896.339550] Memory state around the buggy address: [ 2896.340209] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2896.341186] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2896.342163] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2896.343142] ^ [ 2896.343898] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.344875] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.345858] ================================================================== [ 2896.346870] ================================================================== [ 2896.347855] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 2896.349216] Write of size 8 at addr ffff8880377c9b48 by task kunit_try_catch/48436 [ 2896.350241] [ 2896.350479] CPU: 1 PID: 48436 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.352302] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.353085] Call Trace: [ 2896.353445] [ 2896.353757] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 2896.354760] dump_stack_lvl+0x57/0x81 [ 2896.355284] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.356076] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 2896.357083] print_report.cold+0x5c/0x237 [ 2896.357652] kasan_report+0xc9/0x100 [ 2896.358165] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 2896.359175] kasan_check_range+0xfd/0x1e0 [ 2896.359737] kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 2896.360723] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 2896.361630] ? kunit_kfree+0x200/0x200 [kunit] [ 2896.362260] ? rcu_read_lock_sched_held+0x12/0x80 [ 2896.362914] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.363679] ? rcu_read_lock_held+0x30/0x50 [ 2896.364260] ? trace_kmalloc+0x3c/0x100 [ 2896.364794] ? kmem_cache_alloc_trace+0x1af/0x320 [ 2896.365451] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 2896.366203] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 2896.367214] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 2896.367994] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.368698] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.369381] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.370081] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.370921] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.371636] kthread+0x2a4/0x350 [ 2896.372097] ? kthread_complete_and_exit+0x20/0x20 [ 2896.372764] ret_from_fork+0x1f/0x30 [ 2896.373284] [ 2896.373605] [ 2896.373841] Allocated by task 48436: [ 2896.374346] kasan_save_stack+0x1e/0x40 [ 2896.374877] __kasan_kmalloc+0x81/0xa0 [ 2896.375402] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 2896.376139] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.376812] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.377650] kthread+0x2a4/0x350 [ 2896.378112] ret_from_fork+0x1f/0x30 [ 2896.378611] [ 2896.378842] The buggy address belongs to the object at ffff8880377c9b40 [ 2896.378842] which belongs to the cache kmalloc-16 of size 16 [ 2896.380476] The buggy address is located 8 bytes inside of [ 2896.380476] 16-byte region [ffff8880377c9b40, ffff8880377c9b50) [ 2896.381995] [ 2896.382237] The buggy address belongs to the physical page: [ 2896.382988] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2896.384237] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2896.385166] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2896.386207] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2896.387243] page dumped because: kasan: bad access detected [ 2896.387995] [ 2896.388231] Memory state around the buggy address: [ 2896.388893] ffff8880377c9a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 2896.389869] ffff8880377c9a80: 00 00 fc fc fb fb fc fc fb fb fc fc 00 00 fc fc [ 2896.390856] >ffff8880377c9b00: 00 00 fc fc 00 00 fc fc 00 01 fc fc fb fb fc fc [ 2896.391837] ^ [ 2896.392620] ffff8880377c9b80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.393605] ffff8880377c9c00: 00 00 fc fc fb fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.394577] ================================================================== [ 2896.396224] ok 45 - kasan_bitops_generic [ 2896.396558] ok 46 - kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2896.397619] ================================================================== [ 2896.399663] BUG: KASAN: use-after-free in kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2896.400753] Read of size 1 at addr ffff8880377c9180 by task kunit_try_catch/48438 [ 2896.401765] [ 2896.402000] CPU: 1 PID: 48438 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.403824] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.404615] Call Trace: [ 2896.404970] [ 2896.405287] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2896.406072] dump_stack_lvl+0x57/0x81 [ 2896.406594] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.407389] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2896.408180] print_report.cold+0x5c/0x237 [ 2896.408741] kasan_report+0xc9/0x100 [ 2896.409252] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2896.410038] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2896.410827] __kasan_check_byte+0x36/0x50 [ 2896.411385] kfree_sensitive+0x1b/0x60 [ 2896.411907] kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2896.412674] ? vmalloc_oob+0x5e0/0x5e0 [test_kasan] [ 2896.413353] ? do_raw_spin_trylock+0xb5/0x180 [ 2896.413960] ? do_raw_spin_lock+0x270/0x270 [ 2896.414545] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.415308] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.416006] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.416683] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.417384] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.418224] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.418927] kthread+0x2a4/0x350 [ 2896.419393] ? kthread_complete_and_exit+0x20/0x20 [ 2896.420050] ret_from_fork+0x1f/0x30 [ 2896.420573] [ 2896.420894] [ 2896.421130] Allocated by task 48438: [ 2896.421598] kasan_save_stack+0x1e/0x40 [ 2896.422134] __kasan_kmalloc+0x81/0xa0 [ 2896.422656] kmalloc_double_kzfree+0x9a/0x270 [test_kasan] [ 2896.423408] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.424065] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.424859] kthread+0x2a4/0x350 [ 2896.425319] ret_from_fork+0x1f/0x30 [ 2896.425818] [ 2896.426050] Freed by task 48438: [ 2896.426509] kasan_save_stack+0x1e/0x40 [ 2896.427041] kasan_set_track+0x21/0x30 [ 2896.427567] kasan_set_free_info+0x20/0x40 [ 2896.428135] __kasan_slab_free+0x108/0x170 [ 2896.428697] slab_free_freelist_hook+0x11d/0x1d0 [ 2896.429338] kfree+0xe2/0x3c0 [ 2896.429763] kmalloc_double_kzfree+0x137/0x270 [test_kasan] [ 2896.430521] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.431195] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.432022] kthread+0x2a4/0x350 [ 2896.432483] ret_from_fork+0x1f/0x30 [ 2896.432983] [ 2896.433222] The buggy address belongs to the object at ffff8880377c9180 [ 2896.433222] which belongs to the cache kmalloc-16 of size 16 [ 2896.434853] The buggy address is located 0 bytes inside of [ 2896.434853] 16-byte region [ffff8880377c9180, ffff8880377c9190) [ 2896.436380] [ 2896.436613] The buggy address belongs to the physical page: [ 2896.437371] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2896.438611] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2896.439542] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2896.440585] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2896.441626] page dumped because: kasan: bad access detected [ 2896.442383] [ 2896.442616] Memory state around the buggy address: [ 2896.443285] ffff8880377c9080: fa fb fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.444161] ffff8880377c9100: 00 00 fc fc 00 00 fc fc 00 00 fc fc fb fb fc fc [ 2896.445027] >ffff8880377c9180: fa fb fc fc fa fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.445985] ^ [ 2896.446445] ffff8880377c9200: 00 00 fc fc fa fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.447422] ffff8880377c9280: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.448401] ================================================================== [ 2896.449435] ================================================================== [ 2896.450415] BUG: KASAN: double-free or invalid-free in kfree+0xe2/0x3c0 [ 2896.451308] [ 2896.451542] CPU: 1 PID: 48438 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.453357] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.454140] Call Trace: [ 2896.454494] [ 2896.454809] dump_stack_lvl+0x57/0x81 [ 2896.455329] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.456120] print_report.cold+0x5c/0x237 [ 2896.456672] ? kfree+0xe2/0x3c0 [ 2896.457128] ? kfree+0xe2/0x3c0 [ 2896.457576] kasan_report_invalid_free+0x99/0xc0 [ 2896.458221] ? kfree+0xe2/0x3c0 [ 2896.458667] ? kfree+0xe2/0x3c0 [ 2896.459120] __kasan_slab_free+0x152/0x170 [ 2896.459686] slab_free_freelist_hook+0x11d/0x1d0 [ 2896.460333] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2896.461124] kfree+0xe2/0x3c0 [ 2896.461552] ? __kasan_check_byte+0x36/0x50 [ 2896.462134] kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 2896.462891] ? vmalloc_oob+0x5e0/0x5e0 [test_kasan] [ 2896.463570] ? do_raw_spin_trylock+0xb5/0x180 [ 2896.464180] ? do_raw_spin_lock+0x270/0x270 [ 2896.464762] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.465525] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.466230] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.466906] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.467603] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.468435] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.469147] kthread+0x2a4/0x350 [ 2896.469603] ? kthread_complete_and_exit+0x20/0x20 [ 2896.470269] ret_from_fork+0x1f/0x30 [ 2896.470780] [ 2896.471104] [ 2896.471336] Allocated by task 48438: [ 2896.471832] kasan_save_stack+0x1e/0x40 [ 2896.472366] __kasan_kmalloc+0x81/0xa0 [ 2896.472886] kmalloc_double_kzfree+0x9a/0x270 [test_kasan] [ 2896.473632] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.474303] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.475132] kthread+0x2a4/0x350 [ 2896.475584] ret_from_fork+0x1f/0x30 [ 2896.476079] [ 2896.476316] Freed by task 48438: [ 2896.476766] kasan_save_stack+0x1e/0x40 [ 2896.477297] kasan_set_track+0x21/0x30 [ 2896.477813] kasan_set_free_info+0x20/0x40 [ 2896.478379] __kasan_slab_free+0x108/0x170 [ 2896.478940] slab_free_freelist_hook+0x11d/0x1d0 [ 2896.479580] kfree+0xe2/0x3c0 [ 2896.480005] kmalloc_double_kzfree+0x137/0x270 [test_kasan] [ 2896.480763] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.481439] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.482268] kthread+0x2a4/0x350 [ 2896.482724] ret_from_fork+0x1f/0x30 [ 2896.483231] [ 2896.483463] The buggy address belongs to the object at ffff8880377c9180 [ 2896.483463] which belongs to the cache kmalloc-16 of size 16 [ 2896.485090] The buggy address is located 0 bytes inside of [ 2896.485090] 16-byte region [ffff8880377c9180, ffff8880377c9190) [ 2896.486623] [ 2896.486855] The buggy address belongs to the physical page: [ 2896.487611] page:00000000fb376c59 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x377c9 [ 2896.488852] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 2896.489779] raw: 000fffffc0000200 ffffea0001e38200 dead000000000002 ffff8881000413c0 [ 2896.490819] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 2896.491855] page dumped because: kasan: bad access detected [ 2896.492610] [ 2896.492842] Memory state around the buggy address: [ 2896.493501] ffff8880377c9080: fa fb fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.494473] ffff8880377c9100: 00 00 fc fc 00 00 fc fc 00 00 fc fc fb fb fc fc [ 2896.495443] >ffff8880377c9180: fa fb fc fc fa fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.496416] ^ [ 2896.496854] ffff8880377c9200: 00 00 fc fc fa fb fc fc 00 00 fc fc 00 00 fc fc [ 2896.497725] ffff8880377c9280: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 2896.498598] ================================================================== [ 2896.499767] ok 47 - kmalloc_double_kzfree [ 2896.500033] ok 48 - vmalloc_helpers_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2896.501046] ================================================================== [ 2896.503134] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x596/0x5e0 [test_kasan] [ 2896.504185] Read of size 1 at addr ffffc900000777f3 by task kunit_try_catch/48440 [ 2896.505080] [ 2896.505295] CPU: 1 PID: 48440 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.506950] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.507741] Call Trace: [ 2896.508102] [ 2896.508412] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 2896.509048] dump_stack_lvl+0x57/0x81 [ 2896.509569] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.510362] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 2896.511031] print_report.cold+0x5c/0x237 [ 2896.511594] kasan_report+0xc9/0x100 [ 2896.512103] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 2896.512776] vmalloc_oob+0x596/0x5e0 [test_kasan] [ 2896.513433] ? kasan_global_oob_right+0x1f0/0x1f0 [test_kasan] [ 2896.514236] ? do_raw_spin_trylock+0xb5/0x180 [ 2896.514842] ? do_raw_spin_lock+0x270/0x270 [ 2896.515429] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.516194] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.516893] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.517532] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.518155] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.518946] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.519653] kthread+0x2a4/0x350 [ 2896.520116] ? kthread_complete_and_exit+0x20/0x20 [ 2896.520775] ret_from_fork+0x1f/0x30 [ 2896.521292] [ 2896.521609] [ 2896.521841] The buggy address belongs to the virtual mapping at [ 2896.521841] [ffffc90000077000, ffffc90000079000) created by: [ 2896.521841] vmalloc_oob+0x78/0x5e0 [test_kasan] [ 2896.523848] [ 2896.524101] The buggy address belongs to the physical page: [ 2896.524851] page:000000006c8086e4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb565 [ 2896.525980] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 2896.526768] raw: 000fffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 2896.527704] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2896.528741] page dumped because: kasan: bad access detected [ 2896.529501] [ 2896.529765] Memory state around the buggy address: [ 2896.530426] ffffc90000077680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2896.531352] ffffc90000077700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2896.532293] >ffffc90000077780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 2896.533255] ^ [ 2896.534077] ffffc90000077800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 2896.534944] ffffc90000077880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 2896.535816] ================================================================== [ 2896.536830] ================================================================== [ 2896.537739] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 2896.538689] Read of size 1 at addr ffffc900000777f8 by task kunit_try_catch/48440 [ 2896.539593] [ 2896.539802] CPU: 1 PID: 48440 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-239.1865_753259309.el9.x86_64+debug #1 [ 2896.541622] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 2896.542409] Call Trace: [ 2896.542761] [ 2896.543073] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 2896.543753] dump_stack_lvl+0x57/0x81 [ 2896.544271] print_address_description.constprop.0+0x1f/0x1e0 [ 2896.545057] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 2896.545735] print_report.cold+0x5c/0x237 [ 2896.546299] kasan_report+0xc9/0x100 [ 2896.546803] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 2896.547481] vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 2896.548145] ? kasan_global_oob_right+0x1f0/0x1f0 [test_kasan] [ 2896.548945] ? do_raw_spin_trylock+0xb5/0x180 [ 2896.549560] ? do_raw_spin_lock+0x270/0x270 [ 2896.550152] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 2896.550919] ? kunit_add_resource+0x197/0x280 [kunit] [ 2896.551628] kunit_try_run_case+0x108/0x1a0 [kunit] [ 2896.552308] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 2896.553007] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 2896.553844] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 2896.554555] kthread+0x2a4/0x350 [ 2896.555012] ? kthread_complete_and_exit+0x20/0x20 [ 2896.555675] ret_from_fork+0x1f/0x30 [ 2896.556193] [ 2896.556510] [ 2896.556743] The buggy address belongs to the virtual mapping at [ 2896.556743] [ffffc90000077000, ffffc90000079000) created by: [ 2896.556743] vmalloc_oob+0x78/0x5e0 [test_kasan] [ 2896.558889] [ 2896.559128] The buggy address belongs to the physical page: [ 2896.559880] page:000000006c8086e4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb565 [ 2896.561122] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 2896.561993] raw: 000fffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 2896.563031] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 2896.564082] page dumped because: kasan: bad access detected [ 2896.564837] [ 2896.565069] Memory state around the buggy address: [ 2896.565729] ffffc90000077680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2896.566707] ffffc90000077700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2896.567678] >ffffc90000077780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 2896.568656] ^ [ 2896.569621] ffffc90000077800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 2896.570596] ffffc90000077880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 2896.571571] ================================================================== [ 2896.572627] ok 49 - vmalloc_oob [ 2896.572883] ok 50 - vmap_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 2896.573572] ok 51 - vm_map_ram_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 2896.574915] ok 52 - vmalloc_percpu # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 2896.576157] ok 53 - match_all_not_assigned # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2896.577376] ok 54 - match_all_ptr_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2896.578880] ok 55 - match_all_mem_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 2896.580148] ok 20 - kasan [ 2896.730375] # Subtest: linear-ranges-test [ 2896.730384] 1..4 [ 2896.731255] ok 1 - range_test_get_value_amount [ 2896.731843] ok 2 - range_test_get_selector_high [ 2896.732685] ok 3 - range_test_get_selector_low [ 2896.733669] ok 4 - range_test_get_value [ 2896.734383] ok 21 - linear-ranges-test [ 2896.790686] # Subtest: list_sort [ 2896.790694] 1..1 [ 2896.802296] ok 1 - list_sort_test [ 2896.802616] ok 22 - list_sort [ 2896.941639] # Subtest: time_test_cases [ 2896.941648] 1..1 [ 2902.342803] ok 1 - time64_to_tm_test_date_range [ 2902.343414] ok 23 - time_test_cases