[ 3964.508190] # Subtest: bitfields [ 3964.508206] 1..2 [ 3964.517376] ok 1 - test_bitfields_constants [ 3964.518647] ok 2 - test_bitfields_variables [ 3964.519585] ok 1 - bitfields [ 3965.187845] # Subtest: cmdline [ 3965.187858] 1..4 [ 3965.189160] ok 1 - cmdline_test_noint [ 3965.190218] ok 2 - cmdline_test_lead_int [ 3965.191461] ok 3 - cmdline_test_tail_int [ 3965.192772] ok 4 - cmdline_test_range [ 3965.193592] ok 2 - cmdline [ 3965.867122] # Subtest: ext4_inode_test [ 3965.867136] 1..1 [ 3965.868863] # inode_test_xtimestamp_decoding: ok 1 - 1901-12-13 Lower bound of 32bit < 0 timestamp, no extra bits [ 3965.869838] # inode_test_xtimestamp_decoding: ok 2 - 1969-12-31 Upper bound of 32bit < 0 timestamp, no extra bits [ 3965.871757] # inode_test_xtimestamp_decoding: ok 3 - 1970-01-01 Lower bound of 32bit >=0 timestamp, no extra bits [ 3965.873832] # inode_test_xtimestamp_decoding: ok 4 - 2038-01-19 Upper bound of 32bit >=0 timestamp, no extra bits [ 3965.876001] # inode_test_xtimestamp_decoding: ok 5 - 2038-01-19 Lower bound of 32bit <0 timestamp, lo extra sec bit on [ 3965.878213] # inode_test_xtimestamp_decoding: ok 6 - 2106-02-07 Upper bound of 32bit <0 timestamp, lo extra sec bit on [ 3965.881879] # inode_test_xtimestamp_decoding: ok 7 - 2106-02-07 Lower bound of 32bit >=0 timestamp, lo extra sec bit on [ 3965.884700] # inode_test_xtimestamp_decoding: ok 8 - 2174-02-25 Upper bound of 32bit >=0 timestamp, lo extra sec bit on [ 3965.887284] # inode_test_xtimestamp_decoding: ok 9 - 2174-02-25 Lower bound of 32bit <0 timestamp, hi extra sec bit on [ 3965.890288] # inode_test_xtimestamp_decoding: ok 10 - 2242-03-16 Upper bound of 32bit <0 timestamp, hi extra sec bit on [ 3965.892973] # inode_test_xtimestamp_decoding: ok 11 - 2242-03-16 Lower bound of 32bit >=0 timestamp, hi extra sec bit on [ 3965.895729] # inode_test_xtimestamp_decoding: ok 12 - 2310-04-04 Upper bound of 32bit >=0 timestamp, hi extra sec bit on [ 3965.898833] # inode_test_xtimestamp_decoding: ok 13 - 2310-04-04 Upper bound of 32bit>=0 timestamp, hi extra sec bit 1. 1 ns [ 3965.901937] # inode_test_xtimestamp_decoding: ok 14 - 2378-04-22 Lower bound of 32bit>= timestamp. Extra sec bits 1. Max ns [ 3965.904866] # inode_test_xtimestamp_decoding: ok 15 - 2378-04-22 Lower bound of 32bit >=0 timestamp. All extra sec bits on [ 3965.908041] # inode_test_xtimestamp_decoding: ok 16 - 2446-05-10 Upper bound of 32bit >=0 timestamp. All extra sec bits on [ 3965.910154] ok 1 - inode_test_xtimestamp_decoding [ 3965.912270] ok 3 - ext4_inode_test [ 3967.365493] # Subtest: kunit-try-catch-test [ 3967.365525] 1..2 [ 3967.368811] ok 1 - kunit_test_try_catch_successful_try_no_catch [ 3967.370531] ok 2 - kunit_test_try_catch_unsuccessful_try_does_catch [ 3967.371642] ok 4 - kunit-try-catch-test [ 3967.374097] # Subtest: kunit-resource-test [ 3967.374106] 1..7 [ 3967.375990] ok 1 - kunit_resource_test_init_resources [ 3967.376883] ok 2 - kunit_resource_test_alloc_resource [ 3967.379196] ok 3 - kunit_resource_test_destroy_resource [ 3967.381740] ok 4 - kunit_resource_test_cleanup_resources [ 3967.383916] ok 5 - kunit_resource_test_proper_free_ordering [ 3967.385825] ok 6 - kunit_resource_test_static [ 3967.387288] ok 7 - kunit_resource_test_named [ 3967.388053] ok 5 - kunit-resource-test [ 3967.389736] # Subtest: kunit-log-test [ 3967.389745] 1..1 [ 3967.390815] put this in log. [ 3967.391179] this too. [ 3967.391666] add to suite log. [ 3967.392004] along with this. [ 3967.392517] ok 1 - kunit_log_test [ 3967.392958] ok 6 - kunit-log-test [ 3967.394262] # Subtest: kunit_status [ 3967.394270] 1..2 [ 3967.395362] ok 1 - kunit_status_set_failure_test [ 3967.396712] ok 2 - kunit_status_mark_skipped_test [ 3967.397449] ok 7 - kunit_status [ 3967.542107] # Subtest: rtc_lib_test_cases [ 3967.542120] 1..1 [ 3973.760350] ok 1 - rtc_time64_to_tm_test_date_range [ 3973.769158] ok 8 - rtc_lib_test_cases [ 3973.968422] # Subtest: list-kunit-test [ 3973.968436] 1..36 [ 3973.970071] ok 1 - list_test_list_init [ 3973.971106] ok 2 - list_test_list_add [ 3973.972078] ok 3 - list_test_list_add_tail [ 3973.973402] ok 4 - list_test_list_del [ 3973.975209] ok 5 - list_test_list_replace [ 3973.976209] ok 6 - list_test_list_replace_init [ 3973.977508] ok 7 - list_test_list_swap [ 3973.978769] ok 8 - list_test_list_del_init [ 3973.979795] ok 9 - list_test_list_move [ 3973.981055] ok 10 - list_test_list_move_tail [ 3973.982227] ok 11 - list_test_list_bulk_move_tail [ 3973.983621] ok 12 - list_test_list_is_first [ 3973.984924] ok 13 - list_test_list_is_last [ 3973.986069] ok 14 - list_test_list_empty [ 3973.987116] ok 15 - list_test_list_empty_careful [ 3973.988418] ok 16 - list_test_list_rotate_left [ 3973.989611] ok 17 - list_test_list_rotate_to_front [ 3973.991051] ok 18 - list_test_list_is_singular [ 3973.992163] ok 19 - list_test_list_cut_position [ 3973.993512] ok 20 - list_test_list_cut_before [ 3973.994738] ok 21 - list_test_list_splice [ 3973.995933] ok 22 - list_test_list_splice_tail [ 3973.997140] ok 23 - list_test_list_splice_init [ 3973.998177] ok 24 - list_test_list_splice_tail_init [ 3973.999518] ok 25 - list_test_list_entry [ 3974.000851] ok 26 - list_test_list_first_entry [ 3974.002271] ok 27 - list_test_list_last_entry [ 3974.003357] ok 28 - list_test_list_first_entry_or_null [ 3974.004641] ok 29 - list_test_list_next_entry [ 3974.006235] ok 30 - list_test_list_prev_entry [ 3974.007401] ok 31 - list_test_list_for_each [ 3974.008488] ok 32 - list_test_list_for_each_prev [ 3974.009659] ok 33 - list_test_list_for_each_safe [ 3974.011052] ok 34 - list_test_list_for_each_prev_safe [ 3974.012214] ok 35 - list_test_list_for_each_entry [ 3974.013848] ok 36 - list_test_list_for_each_entry_reverse [ 3974.014586] ok 9 - list-kunit-test [ 3974.199364] # Subtest: memcpy [ 3974.199378] 1..4 [ 3974.200993] # memset_test: ok: memset() direct assignment [ 3974.202278] # memset_test: ok: memset() complete overwrite [ 3974.203193] # memset_test: ok: memset() middle overwrite [ 3974.204076] # memset_test: ok: memset() argument side-effects [ 3974.205017] # memset_test: ok: memset() memset_after() [ 3974.205855] # memset_test: ok: memset() memset_startat() [ 3974.206782] ok 1 - memset_test [ 3974.207319] # memcpy_test: ok: memcpy() static initializers [ 3974.208841] # memcpy_test: ok: memcpy() direct assignment [ 3974.209758] # memcpy_test: ok: memcpy() complete overwrite [ 3974.210630] # memcpy_test: ok: memcpy() middle overwrite [ 3974.211522] # memcpy_test: ok: memcpy() argument side-effects [ 3974.212487] ok 2 - memcpy_test [ 3974.213033] # memmove_test: ok: memmove() static initializers [ 3974.214611] # memmove_test: ok: memmove() direct assignment [ 3974.215536] # memmove_test: ok: memmove() complete overwrite [ 3974.216458] # memmove_test: ok: memmove() middle overwrite [ 3974.217360] # memmove_test: ok: memmove() argument side-effects [ 3974.218326] # memmove_test: ok: memmove() overlapping write [ 3974.219280] ok 3 - memmove_test [ 3974.219826] ok 4 - strtomem_test [ 3974.220388] ok 10 - memcpy [ 3974.378138] # Subtest: mptcp-crypto [ 3974.378152] 1..1 [ 3974.379491] ok 1 - mptcp_crypto_test_basic [ 3974.379923] ok 11 - mptcp-crypto [ 3974.547554] # Subtest: mptcp-token [ 3974.547570] 1..4 [ 3974.549968] ok 1 - mptcp_token_test_req_basic [ 3974.551543] ok 2 - mptcp_token_test_msk_basic [ 3974.553299] ok 3 - mptcp_token_test_accept [ 3974.555059] ok 4 - mptcp_token_test_destroyed [ 3974.556373] ok 12 - mptcp-token [ 3974.967392] # Subtest: rational [ 3974.967407] 1..1 [ 3974.968843] # rational_test: ok 1 - Exceeds bounds, semi-convergent term > 1/2 last term [ 3974.970825] # rational_test: ok 2 - Exceeds bounds, semi-convergent term < 1/2 last term [ 3974.973181] # rational_test: ok 3 - Closest to zero [ 3974.975422] # rational_test: ok 4 - Closest to smallest non-zero [ 3974.977523] # rational_test: ok 5 - Use convergent [ 3974.979008] # rational_test: ok 6 - Exact answer [ 3974.980360] # rational_test: ok 7 - Semiconvergent, numerator limit [ 3974.981738] # rational_test: ok 8 - Semiconvergent, denominator limit [ 3974.982748] ok 1 - rational_test [ 3974.983781] ok 13 - rational [ 3975.148383] # Subtest: resource [ 3975.148398] 1..2 [ 3975.150275] ok 1 - resource_test_union [ 3975.151370] ok 2 - resource_test_intersection [ 3975.152480] ok 14 - resource [ 3975.328480] # Subtest: slub_test [ 3975.328497] 1..2 [ 3975.345480] ok 1 - test_clobber_zone [ 3975.356186] ok 2 - test_clobber_redzone_free [ 3975.357425] ok 15 - slub_test [ 3975.979146] # Subtest: snd_soc_tplg_test [ 3975.979162] 1..11 [ 3975.981984] ok 1 - snd_soc_tplg_test_load_with_null_comp [ 3975.983833] ok 2 - snd_soc_tplg_test_load_with_null_ops [ 3975.986458] ok 3 - snd_soc_tplg_test_load_with_null_fw [ 3975.989014] ok 4 - snd_soc_tplg_test_load_empty_tplg [ 3975.992118] ok 5 - snd_soc_tplg_test_load_empty_tplg_bad_magic [ 3975.994910] ok 6 - snd_soc_tplg_test_load_empty_tplg_bad_abi [ 3975.998154] ok 7 - snd_soc_tplg_test_load_empty_tplg_bad_size [ 3976.001023] ok 8 - snd_soc_tplg_test_load_empty_tplg_bad_payload_size [ 3976.003886] ok 9 - snd_soc_tplg_test_load_pcm_tplg [ 3976.008251] ok 10 - snd_soc_tplg_test_load_pcm_tplg_reload_comp [ 3976.014000] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.018472] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.074346] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.079188] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.113093] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.121099] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.217067] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.221141] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.300157] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.306380] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.329185] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.332122] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.364218] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.369555] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.398339] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.401040] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.438246] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.441692] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.478217] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.480976] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.555332] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.560356] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.620005] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.622812] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.647273] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.652043] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.672848] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.676040] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.703804] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.709127] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.770909] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.775692] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.803536] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.806203] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.826606] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.829571] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.869626] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.874185] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.956151] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3976.960410] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3976.995655] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.006182] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.052752] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.055630] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.083070] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.088366] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.111613] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.114696] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.153558] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.156256] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.189904] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.192612] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.225134] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.227807] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.245634] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.248298] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.288506] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.291237] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.324150] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.327220] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.347376] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.353383] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.400821] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.403729] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.429749] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.432446] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.455944] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.464372] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.496596] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.505149] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.524608] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.532848] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.578695] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.582551] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.606609] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.612366] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.644228] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.650552] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.683440] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.689098] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.731424] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.735017] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.763937] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.766753] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.820549] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.825134] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.846266] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.854128] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.900925] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.904184] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.947882] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.950627] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3977.990899] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3977.999009] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.041292] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.054659] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.085950] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.089541] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.117912] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.126081] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.165296] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.169086] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.194692] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.200426] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.246409] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.249228] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.282968] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.287761] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.321940] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.324797] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.348762] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.351433] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.410684] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.426794] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.470919] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.479771] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.507725] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.511453] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.551203] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.556496] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.577998] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.582036] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.627733] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.631060] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.658257] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.661349] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.696363] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.699125] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.724819] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.728773] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.782447] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.787442] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.836445] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.844019] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.880005] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.882668] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.922328] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.925038] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.949403] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.954259] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3978.987134] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3978.989831] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.026778] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.030060] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.084934] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.087953] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.113957] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.116794] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.148999] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.153054] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.173118] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.176710] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.207005] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.211397] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.241970] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.245079] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.297422] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.302216] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.323175] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.331146] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.356151] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.359457] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.412630] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.416020] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.464978] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.469981] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.488934] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.493508] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.524779] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.528121] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.552354] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.556048] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.602885] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.615446] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.640470] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.644835] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.708625] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.714947] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.775969] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.783225] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.812613] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.816840] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.865653] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.869732] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.898915] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.901706] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.947699] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3979.953905] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3979.999597] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.002863] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.048163] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.053085] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.101927] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.106935] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.157233] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.161635] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.203152] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.213950] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.245797] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: Parent card not yet available, widget card binding deferred [ 3980.251124] sound-soc-topology-test-driver sound-soc-topology-test: ASoC: no DMI vendor name! [ 3980.283578] ok 11 - snd_soc_tplg_test_load_pcm_tplg_reload_card [ 3980.283597] ok 16 - snd_soc_tplg_test [ 3980.539074] # Subtest: soc-utils [ 3980.539090] 1..1 [ 3980.540789] ok 1 - test_tdm_params_to_bclk [ 3980.541252] ok 17 - soc-utils [ 3981.184616] # Subtest: sysctl_test [ 3981.184631] 1..10 [ 3981.186297] ok 1 - sysctl_test_api_dointvec_null_tbl_data [ 3981.187591] ok 2 - sysctl_test_api_dointvec_table_maxlen_unset [ 3981.193306] ok 3 - sysctl_test_api_dointvec_table_len_is_zero [ 3981.199580] ok 4 - sysctl_test_api_dointvec_table_read_but_position_set [ 3981.207835] ok 5 - sysctl_test_dointvec_read_happy_single_positive [ 3981.210926] ok 6 - sysctl_test_dointvec_read_happy_single_negative [ 3981.227510] ok 7 - sysctl_test_dointvec_write_happy_single_positive [ 3981.229665] ok 8 - sysctl_test_dointvec_write_happy_single_negative [ 3981.232516] ok 9 - sysctl_test_api_dointvec_write_single_less_int_min [ 3981.234556] ok 10 - sysctl_test_api_dointvec_write_single_greater_int_max [ 3981.236171] ok 18 - sysctl_test [ 3981.517943] # Subtest: bits-test [ 3981.517959] 1..3 [ 3981.521120] ok 1 - genmask_test [ 3981.526609] ok 2 - genmask_ull_test [ 3981.530641] ok 3 - genmask_input_check_test [ 3981.531404] ok 19 - bits-test [ 3982.646651] # Subtest: kasan [ 3982.646665] 1..55 [ 3982.649589] ================================================================== [ 3982.650929] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 3982.652020] Write of size 1 at addr ffff888104ffc573 by task kunit_try_catch/116226 [ 3982.653284] CPU: 0 PID: 116226 Comm: kunit_try_catch Kdump: loaded Not tainted 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.654759] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.655539] Call Trace: [ 3982.655907] [ 3982.656215] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 3982.656947] dump_stack_lvl+0x57/0x81 [ 3982.657548] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.658369] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 3982.659096] print_report.cold+0x5c/0x237 [ 3982.659677] kasan_report+0xc9/0x100 [ 3982.660177] ? kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 3982.660912] kmalloc_oob_right+0x4ed/0x510 [test_kasan] [ 3982.661631] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 3982.662375] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 3982.663201] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.663959] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.664654] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.665324] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.666008] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.666830] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.667532] kthread+0x2a4/0x350 [ 3982.667993] ? kthread_complete_and_exit+0x20/0x20 [ 3982.668652] ret_from_fork+0x1f/0x30 [ 3982.669181] [ 3982.669731] Allocated by task 116226: [ 3982.670243] kasan_save_stack+0x1e/0x40 [ 3982.670776] __kasan_kmalloc+0x81/0xa0 [ 3982.671295] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 3982.671986] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.672651] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.673474] kthread+0x2a4/0x350 [ 3982.673924] ret_from_fork+0x1f/0x30 [ 3982.674660] Last potentially related work creation: [ 3982.675323] kasan_save_stack+0x1e/0x40 [ 3982.675865] __kasan_record_aux_stack+0x96/0xb0 [ 3982.676493] insert_work+0x47/0x310 [ 3982.676985] __queue_work+0x4dd/0xd60 [ 3982.677494] rcu_work_rcufn+0x42/0x70 [ 3982.677997] rcu_do_batch+0x3c2/0xdc0 [ 3982.678522] rcu_core+0x3de/0x5a0 [ 3982.678984] __do_softirq+0x2d0/0x9a8 [ 3982.679748] Second to last potentially related work creation: [ 3982.680524] kasan_save_stack+0x1e/0x40 [ 3982.681049] __kasan_record_aux_stack+0x96/0xb0 [ 3982.681716] call_rcu+0xee/0x890 [ 3982.682322] queue_rcu_work+0x5a/0x70 [ 3982.682853] writeback_sb_inodes+0x373/0xd00 [ 3982.683473] __writeback_inodes_wb+0xb7/0x210 [ 3982.684074] wb_writeback+0x686/0xa10 [ 3982.684586] wb_do_writeback+0x539/0x8a0 [ 3982.685124] wb_workfn+0x12c/0x670 [ 3982.685605] process_one_work+0x8e2/0x1520 [ 3982.686164] worker_thread+0x59e/0xf90 [ 3982.686687] kthread+0x2a4/0x350 [ 3982.687140] ret_from_fork+0x1f/0x30 [ 3982.687873] The buggy address belongs to the object at ffff888104ffc500 which belongs to the cache kmalloc-128 of size 128 [ 3982.689515] The buggy address is located 115 bytes inside of 128-byte region [ffff888104ffc500, ffff888104ffc580) [ 3982.691293] The buggy address belongs to the physical page: [ 3982.692057] page:00000000f421deb9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ffc [ 3982.693358] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 3982.694307] raw: 0017ffffc0000200 ffffea000017cb80 dead000000000005 ffff8881000418c0 [ 3982.695358] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3982.696390] page dumped because: kasan: bad access detected [ 3982.697371] Memory state around the buggy address: [ 3982.698021] ffff888104ffc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 3982.698994] ffff888104ffc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.699960] >ffff888104ffc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 3982.700937] ^ [ 3982.701856] ffff888104ffc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.702826] ffff888104ffc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3982.703792] ================================================================== [ 3982.704890] Disabling lock debugging due to kernel taint [ 3982.705632] ================================================================== [ 3982.706604] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 3982.707690] Write of size 1 at addr ffff888104ffc578 by task kunit_try_catch/116226 [ 3982.708948] CPU: 0 PID: 116226 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.710779] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.711564] Call Trace: [ 3982.711916] [ 3982.712225] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 3982.712965] dump_stack_lvl+0x57/0x81 [ 3982.713486] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.714275] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 3982.715009] print_report.cold+0x5c/0x237 [ 3982.715572] kasan_report+0xc9/0x100 [ 3982.716073] ? kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 3982.716819] kmalloc_oob_right+0x4e3/0x510 [test_kasan] [ 3982.717536] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 3982.718268] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 3982.719059] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.719820] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.720521] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.721190] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.721885] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.722713] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.723419] kthread+0x2a4/0x350 [ 3982.723875] ? kthread_complete_and_exit+0x20/0x20 [ 3982.724533] ret_from_fork+0x1f/0x30 [ 3982.725053] [ 3982.725609] Allocated by task 116226: [ 3982.726114] kasan_save_stack+0x1e/0x40 [ 3982.726648] __kasan_kmalloc+0x81/0xa0 [ 3982.727166] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 3982.727871] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.728543] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.729370] kthread+0x2a4/0x350 [ 3982.729822] ret_from_fork+0x1f/0x30 [ 3982.730556] Last potentially related work creation: [ 3982.731220] kasan_save_stack+0x1e/0x40 [ 3982.731758] __kasan_record_aux_stack+0x96/0xb0 [ 3982.732387] insert_work+0x47/0x310 [ 3982.732977] __queue_work+0x4dd/0xd60 [ 3982.733578] rcu_work_rcufn+0x42/0x70 [ 3982.734084] rcu_do_batch+0x3c2/0xdc0 [ 3982.734594] rcu_core+0x3de/0x5a0 [ 3982.735057] __do_softirq+0x2d0/0x9a8 [ 3982.735801] Second to last potentially related work creation: [ 3982.736579] kasan_save_stack+0x1e/0x40 [ 3982.737107] __kasan_record_aux_stack+0x96/0xb0 [ 3982.737744] call_rcu+0xee/0x890 [ 3982.738195] queue_rcu_work+0x5a/0x70 [ 3982.738708] writeback_sb_inodes+0x373/0xd00 [ 3982.739303] __writeback_inodes_wb+0xb7/0x210 [ 3982.739904] wb_writeback+0x686/0xa10 [ 3982.740415] wb_do_writeback+0x539/0x8a0 [ 3982.740953] wb_workfn+0x12c/0x670 [ 3982.741433] process_one_work+0x8e2/0x1520 [ 3982.741991] worker_thread+0x59e/0xf90 [ 3982.742514] kthread+0x2a4/0x350 [ 3982.742967] ret_from_fork+0x1f/0x30 [ 3982.743701] The buggy address belongs to the object at ffff888104ffc500 which belongs to the cache kmalloc-128 of size 128 [ 3982.745359] The buggy address is located 120 bytes inside of 128-byte region [ffff888104ffc500, ffff888104ffc580) [ 3982.747166] The buggy address belongs to the physical page: [ 3982.747923] page:00000000f421deb9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ffc [ 3982.749177] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 3982.750114] raw: 0017ffffc0000200 ffffea000017cb80 dead000000000005 ffff8881000418c0 [ 3982.751150] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3982.752186] page dumped because: kasan: bad access detected [ 3982.753167] Memory state around the buggy address: [ 3982.753821] ffff888104ffc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 3982.754791] ffff888104ffc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.755760] >ffff888104ffc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 3982.756726] ^ [ 3982.757687] ffff888104ffc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.758656] ffff888104ffc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3982.759621] ================================================================== [ 3982.760936] ================================================================== [ 3982.762392] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 3982.763997] Read of size 1 at addr ffff888104ffc580 by task kunit_try_catch/116226 [ 3982.765833] CPU: 0 PID: 116226 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.768509] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.769656] Call Trace: [ 3982.770170] [ 3982.770632] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 3982.771722] dump_stack_lvl+0x57/0x81 [ 3982.772493] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.773676] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 3982.774794] print_report.cold+0x5c/0x237 [ 3982.775617] kasan_report+0xc9/0x100 [ 3982.776363] ? kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 3982.777436] kmalloc_oob_right+0x4d9/0x510 [test_kasan] [ 3982.778480] ? kmalloc_oob_left+0x2e0/0x2e0 [test_kasan] [ 3982.779554] ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370 [ 3982.780700] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.781807] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.782826] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.783810] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.784818] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.786034] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.787054] kthread+0x2a4/0x350 [ 3982.787737] ? kthread_complete_and_exit+0x20/0x20 [ 3982.788712] ret_from_fork+0x1f/0x30 [ 3982.789457] [ 3982.790272] Allocated by task 116226: [ 3982.791006] kasan_save_stack+0x1e/0x40 [ 3982.791785] __kasan_kmalloc+0x81/0xa0 [ 3982.792551] kmalloc_oob_right+0x98/0x510 [test_kasan] [ 3982.793575] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.794561] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.795771] kthread+0x2a4/0x350 [ 3982.796447] ret_from_fork+0x1f/0x30 [ 3982.797525] Last potentially related work creation: [ 3982.798489] kasan_save_stack+0x1e/0x40 [ 3982.799273] __kasan_record_aux_stack+0x96/0xb0 [ 3982.800190] insert_work+0x47/0x310 [ 3982.800905] __queue_work+0x4dd/0xd60 [ 3982.801658] rcu_work_rcufn+0x42/0x70 [ 3982.802380] rcu_do_batch+0x3c2/0xdc0 [ 3982.803092] rcu_core+0x3de/0x5a0 [ 3982.803782] __do_softirq+0x2d0/0x9a8 [ 3982.804877] Second to last potentially related work creation: [ 3982.806029] kasan_save_stack+0x1e/0x40 [ 3982.806823] __kasan_record_aux_stack+0x96/0xb0 [ 3982.807752] call_rcu+0xee/0x890 [ 3982.808433] queue_rcu_work+0x5a/0x70 [ 3982.809175] writeback_sb_inodes+0x373/0xd00 [ 3982.810048] __writeback_inodes_wb+0xb7/0x210 [ 3982.810952] wb_writeback+0x686/0xa10 [ 3982.811701] wb_do_writeback+0x539/0x8a0 [ 3982.812510] wb_workfn+0x12c/0x670 [ 3982.813213] process_one_work+0x8e2/0x1520 [ 3982.814054] worker_thread+0x59e/0xf90 [ 3982.814826] kthread+0x2a4/0x350 [ 3982.815515] ret_from_fork+0x1f/0x30 [ 3982.816619] The buggy address belongs to the object at ffff888104ffc500 which belongs to the cache kmalloc-128 of size 128 [ 3982.819045] The buggy address is located 0 bytes to the right of 128-byte region [ffff888104ffc500, ffff888104ffc580) [ 3982.821720] The buggy address belongs to the physical page: [ 3982.822825] page:00000000f421deb9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ffc [ 3982.824679] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 3982.826058] raw: 0017ffffc0000200 ffffea000017cb80 dead000000000005 ffff8881000418c0 [ 3982.827583] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3982.829100] page dumped because: kasan: bad access detected [ 3982.830558] Memory state around the buggy address: [ 3982.831524] ffff888104ffc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.832945] ffff888104ffc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 3982.834373] >ffff888104ffc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.835800] ^ [ 3982.836479] ffff888104ffc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3982.837881] ffff888104ffc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.839300] ================================================================== [ 3982.840974] ok 1 - kmalloc_oob_right [ 3982.841464] ================================================================== [ 3982.843686] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 3982.845242] Read of size 1 at addr ffff88810833ec3f by task kunit_try_catch/116227 [ 3982.847047] CPU: 0 PID: 116227 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.849661] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.850797] Call Trace: [ 3982.851317] [ 3982.851765] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 3982.852843] dump_stack_lvl+0x57/0x81 [ 3982.853609] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.854763] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 3982.855784] print_report.cold+0x5c/0x237 [ 3982.856603] kasan_report+0xc9/0x100 [ 3982.857354] ? kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 3982.858421] kmalloc_oob_left+0x2bf/0x2e0 [test_kasan] [ 3982.859452] ? kmalloc_pagealloc_oob_right+0x290/0x290 [test_kasan] [ 3982.860697] ? do_raw_spin_trylock+0xb5/0x180 [ 3982.861593] ? do_raw_spin_lock+0x270/0x270 [ 3982.862455] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.863576] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.864607] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.865607] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.866642] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.867885] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.868909] kthread+0x2a4/0x350 [ 3982.869541] ? kthread_complete_and_exit+0x20/0x20 [ 3982.870491] ret_from_fork+0x1f/0x30 [ 3982.871263] [ 3982.872068] Allocated by task 1366: [ 3982.872813] kasan_save_stack+0x1e/0x40 [ 3982.873607] __kasan_kmalloc+0x81/0xa0 [ 3982.874379] kmem_alloc+0x91/0x120 [xfs] [ 3982.876235] xfs_iext_insert+0x4e6/0x15f0 [xfs] [ 3982.877502] xfs_bmap_add_extent_hole_real+0x425/0x1d00 [xfs] [ 3982.878956] xfs_bmapi_allocate+0xa6d/0x1380 [xfs] [ 3982.880240] xfs_bmapi_write+0x850/0x1170 [xfs] [ 3982.881479] xfs_alloc_file_space+0x2c6/0x670 [xfs] [ 3982.882778] xfs_file_fallocate+0x89e/0xdd0 [xfs] [ 3982.884044] vfs_fallocate+0x2aa/0xbb0 [ 3982.884817] __x64_sys_fallocate+0xb4/0x100 [ 3982.885661] do_syscall_64+0x59/0x90 [ 3982.886419] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3982.887766] The buggy address belongs to the object at ffff88810833ec20 which belongs to the cache kmalloc-16 of size 16 [ 3982.890159] The buggy address is located 15 bytes to the right of 16-byte region [ffff88810833ec20, ffff88810833ec30) [ 3982.892855] The buggy address belongs to the physical page: [ 3982.893963] page:0000000090a77c2c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10833e [ 3982.895805] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 3982.897188] raw: 0017ffffc0000200 ffffea000427fb80 dead000000000002 ffff8881000413c0 [ 3982.898699] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3982.899762] page dumped because: kasan: bad access detected [ 3982.900769] Memory state around the buggy address: [ 3982.901432] ffff88810833eb00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3982.902420] ffff88810833eb80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3982.903389] >ffff88810833ec00: 00 00 fc fc 00 00 fc fc 00 07 fc fc fb fb fc fc [ 3982.904414] ^ [ 3982.905103] ffff88810833ec80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3982.906077] ffff88810833ed00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3982.907047] ================================================================== [ 3982.908136] ok 2 - kmalloc_oob_left [ 3982.922425] ================================================================== [ 3982.923986] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 3982.925178] Read of size 1 at addr ffff88810866d000 by task kunit_try_catch/116228 [ 3982.926454] CPU: 1 PID: 116228 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.928275] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.929057] Call Trace: [ 3982.929427] [ 3982.929738] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 3982.930555] dump_stack_lvl+0x57/0x81 [ 3982.931085] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.931874] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 3982.932672] print_report.cold+0x5c/0x237 [ 3982.933226] kasan_report+0xc9/0x100 [ 3982.933732] ? kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 3982.934534] kmalloc_node_oob_right+0x2bf/0x2e0 [test_kasan] [ 3982.935312] ? pagealloc_uaf+0x2f0/0x2f0 [test_kasan] [ 3982.935999] ? do_raw_spin_trylock+0xb5/0x180 [ 3982.936607] ? do_raw_spin_lock+0x270/0x270 [ 3982.937188] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.937955] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.938686] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.939369] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.940058] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.940889] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.941593] kthread+0x2a4/0x350 [ 3982.942049] ? kthread_complete_and_exit+0x20/0x20 [ 3982.942710] ret_from_fork+0x1f/0x30 [ 3982.943219] [ 3982.943776] Allocated by task 116228: [ 3982.944288] kasan_save_stack+0x1e/0x40 [ 3982.944817] __kasan_kmalloc+0x81/0xa0 [ 3982.945341] kmalloc_node_oob_right+0x9a/0x2e0 [test_kasan] [ 3982.946139] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.946816] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.947647] kthread+0x2a4/0x350 [ 3982.948101] ret_from_fork+0x1f/0x30 [ 3982.948869] The buggy address belongs to the object at ffff88810866c000 which belongs to the cache kmalloc-4k of size 4096 [ 3982.950505] The buggy address is located 0 bytes to the right of 4096-byte region [ffff88810866c000, ffff88810866d000) [ 3982.952340] The buggy address belongs to the physical page: [ 3982.953150] page:00000000cb63493e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108668 [ 3982.954400] head:00000000cb63493e order:3 compound_mapcount:0 compound_pincount:0 [ 3982.955399] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff) [ 3982.956399] raw: 0017ffffc0010200 ffffea00041cd800 dead000000000002 ffff888100042140 [ 3982.957432] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000 [ 3982.958462] page dumped because: kasan: bad access detected [ 3982.959448] Memory state around the buggy address: [ 3982.960177] ffff88810866cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3982.961160] ffff88810866cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3982.962143] >ffff88810866d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.963125] ^ [ 3982.963602] ffff88810866d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.964585] ffff88810866d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3982.965587] ================================================================== [ 3982.966862] ok 3 - kmalloc_node_oob_right [ 3982.972887] ================================================================== [ 3982.974526] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 3982.975727] Write of size 1 at addr ffff888045dda00a by task kunit_try_catch/116229 [ 3982.976985] CPU: 1 PID: 116229 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3982.978798] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3982.979578] Call Trace: [ 3982.979929] [ 3982.980244] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 3982.981086] dump_stack_lvl+0x57/0x81 [ 3982.981607] print_address_description.constprop.0+0x1f/0x1e0 [ 3982.982393] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 3982.983244] print_report.cold+0x5c/0x237 [ 3982.983797] kasan_report+0xc9/0x100 [ 3982.984302] ? kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 3982.985145] kmalloc_pagealloc_oob_right+0x27b/0x290 [test_kasan] [ 3982.985976] ? kmalloc_pagealloc_uaf+0x280/0x280 [test_kasan] [ 3982.986763] ? do_raw_spin_trylock+0xb5/0x180 [ 3982.987377] ? do_raw_spin_lock+0x270/0x270 [ 3982.987957] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3982.988728] ? kunit_add_resource+0x197/0x280 [kunit] [ 3982.989430] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3982.990103] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3982.990797] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3982.991624] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3982.992331] kthread+0x2a4/0x350 [ 3982.992790] ? kthread_complete_and_exit+0x20/0x20 [ 3982.993450] ret_from_fork+0x1f/0x30 [ 3982.993960] [ 3982.994512] The buggy address belongs to the physical page: [ 3982.995264] page:00000000f7c551e3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45dd8 [ 3982.996499] head:00000000f7c551e3 order:2 compound_mapcount:0 compound_pincount:0 [ 3982.997505] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 3982.998428] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3982.999459] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.000489] page dumped because: kasan: bad access detected [ 3983.001469] Memory state around the buggy address: [ 3983.002117] ffff888045dd9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.003084] ffff888045dd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.004055] >ffff888045dda000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.005023] ^ [ 3983.005513] ffff888045dda080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.006500] ffff888045dda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.007468] ================================================================== [ 3983.008571] ok 4 - kmalloc_pagealloc_oob_right [ 3983.016280] ================================================================== [ 3983.017955] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 3983.019041] Read of size 1 at addr ffff888045dd8000 by task kunit_try_catch/116230 [ 3983.020290] CPU: 1 PID: 116230 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.022097] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.022877] Call Trace: [ 3983.023225] [ 3983.023539] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 3983.024327] dump_stack_lvl+0x57/0x81 [ 3983.024842] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.025628] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 3983.026415] print_report.cold+0x5c/0x237 [ 3983.026974] kasan_report+0xc9/0x100 [ 3983.027477] ? kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 3983.028261] kmalloc_pagealloc_uaf+0x26b/0x280 [test_kasan] [ 3983.029013] ? kmalloc_pagealloc_invalid_free+0x250/0x250 [test_kasan] [ 3983.029903] ? do_raw_spin_trylock+0xb5/0x180 [ 3983.030508] ? do_raw_spin_lock+0x270/0x270 [ 3983.031087] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.031849] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.032545] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.033215] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.033909] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.034736] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.035441] kthread+0x2a4/0x350 [ 3983.035897] ? kthread_complete_and_exit+0x20/0x20 [ 3983.036557] ret_from_fork+0x1f/0x30 [ 3983.037067] [ 3983.037623] The buggy address belongs to the physical page: [ 3983.038372] page:00000000f7c551e3 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45dd8 [ 3983.039604] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 3983.040487] raw: 000fffffc0000000 ffffea00004b7008 ffff88810c1ff270 0000000000000000 [ 3983.041519] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 3983.042548] page dumped because: kasan: bad access detected [ 3983.043643] Memory state around the buggy address: [ 3983.044525] ffff888045dd7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.045809] ffff888045dd7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.047076] >ffff888045dd8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.048359] ^ [ 3983.048984] ffff888045dd8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.050312] ffff888045dd8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.051693] ================================================================== [ 3983.053202] ok 5 - kmalloc_pagealloc_uaf [ 3983.055641] ================================================================== [ 3983.057300] BUG: KASAN: double-free or invalid-free in kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 3983.058912] CPU: 0 PID: 116231 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.060776] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.061583] Call Trace: [ 3983.061944] [ 3983.062271] dump_stack_lvl+0x57/0x81 [ 3983.062800] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.063610] print_report.cold+0x5c/0x237 [ 3983.064177] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 3983.065086] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 3983.065994] kasan_report_invalid_free+0x99/0xc0 [ 3983.066658] ? kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 3983.067566] kfree+0x2ab/0x3c0 [ 3983.068017] kmalloc_pagealloc_invalid_free+0x191/0x250 [test_kasan] [ 3983.068907] ? kmalloc_large_oob_right+0x2b0/0x2b0 [test_kasan] [ 3983.069748] ? do_raw_spin_trylock+0xb5/0x180 [ 3983.070377] ? do_raw_spin_lock+0x270/0x270 [ 3983.070975] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.071763] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.072481] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.073171] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.073892] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.074749] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.075479] kthread+0x2a4/0x350 [ 3983.075949] ? kthread_complete_and_exit+0x20/0x20 [ 3983.076624] ret_from_fork+0x1f/0x30 [ 3983.077149] [ 3983.077725] The buggy address belongs to the physical page: [ 3983.078496] page:000000003916311f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47f80 [ 3983.079767] head:000000003916311f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.080800] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.081750] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.082819] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.083880] page dumped because: kasan: bad access detected [ 3983.084890] Memory state around the buggy address: [ 3983.085582] ffff888047f7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.086594] ffff888047f7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.087595] >ffff888047f80000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.088587] ^ [ 3983.089054] ffff888047f80080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.090061] ffff888047f80100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.091065] ================================================================== [ 3983.095731] ok 6 - kmalloc_pagealloc_invalid_free [ 3983.097359] ok 7 - pagealloc_oob_right # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3983.105065] ================================================================== [ 3983.107199] BUG: KASAN: use-after-free in pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 3983.108238] Read of size 1 at addr ffff888015140000 by task kunit_try_catch/116233 [ 3983.109516] CPU: 0 PID: 116233 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.111379] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.112176] Call Trace: [ 3983.112545] [ 3983.112862] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 3983.113576] dump_stack_lvl+0x57/0x81 [ 3983.114104] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.114919] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 3983.115636] print_report.cold+0x5c/0x237 [ 3983.116210] kasan_report+0xc9/0x100 [ 3983.116732] ? pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 3983.117450] pagealloc_uaf+0x2b5/0x2f0 [test_kasan] [ 3983.118142] ? krealloc_more_oob+0x10/0x10 [test_kasan] [ 3983.118883] ? do_raw_spin_trylock+0xb5/0x180 [ 3983.119512] ? do_raw_spin_lock+0x270/0x270 [ 3983.120110] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.120894] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.121616] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.122308] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.123021] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.123880] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.124609] kthread+0x2a4/0x350 [ 3983.125079] ? kthread_complete_and_exit+0x20/0x20 [ 3983.125763] ret_from_fork+0x1f/0x30 [ 3983.126298] [ 3983.126862] The buggy address belongs to the physical page: [ 3983.127634] page:0000000014d7a338 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x15140 [ 3983.128937] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 3983.129833] raw: 000fffffc0000000 ffffea00011f5008 ffff88813ffd3aa0 0000000000000000 [ 3983.130901] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000 [ 3983.131965] page dumped because: kasan: bad access detected [ 3983.132976] Memory state around the buggy address: [ 3983.133654] ffff88801513ff00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 3983.134650] ffff88801513ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.135644] >ffff888015140000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.136643] ^ [ 3983.137110] ffff888015140080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.138124] ffff888015140100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3983.139119] ================================================================== [ 3983.143195] ok 8 - pagealloc_uaf [ 3983.151592] ================================================================== [ 3983.153095] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 3983.154402] Write of size 1 at addr ffff88809d645f00 by task kunit_try_catch/116234 [ 3983.156047] CPU: 1 PID: 116234 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.157946] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.158734] Call Trace: [ 3983.159086] [ 3983.159405] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 3983.160212] dump_stack_lvl+0x57/0x81 [ 3983.160734] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.161531] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 3983.162338] print_report.cold+0x5c/0x237 [ 3983.162898] kasan_report+0xc9/0x100 [ 3983.163408] ? kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 3983.164214] kmalloc_large_oob_right+0x28c/0x2b0 [test_kasan] [ 3983.165006] ? kmalloc_oob_16+0x3b0/0x3b0 [test_kasan] [ 3983.165707] ? do_raw_spin_trylock+0xb5/0x180 [ 3983.166316] ? do_raw_spin_lock+0x270/0x270 [ 3983.166894] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.167696] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.168407] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.169110] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.169890] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.170724] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.171433] kthread+0x2a4/0x350 [ 3983.171891] ? kthread_complete_and_exit+0x20/0x20 [ 3983.172578] ret_from_fork+0x1f/0x30 [ 3983.173092] [ 3983.173647] Allocated by task 116234: [ 3983.174154] kasan_save_stack+0x1e/0x40 [ 3983.174688] __kasan_kmalloc+0x81/0xa0 [ 3983.175203] kmalloc_large_oob_right+0x98/0x2b0 [test_kasan] [ 3983.175978] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.176649] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.177477] kthread+0x2a4/0x350 [ 3983.177930] ret_from_fork+0x1f/0x30 [ 3983.178667] The buggy address belongs to the object at ffff88809d644000 which belongs to the cache kmalloc-8k of size 8192 [ 3983.180379] The buggy address is located 7936 bytes inside of 8192-byte region [ffff88809d644000, ffff88809d646000) [ 3983.182183] The buggy address belongs to the physical page: [ 3983.182935] page:000000004c8505a6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9d640 [ 3983.184190] head:000000004c8505a6 order:3 compound_mapcount:0 compound_pincount:0 [ 3983.185190] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.186178] raw: 000fffffc0010200 ffffea000008c200 dead000000000005 ffff888100042280 [ 3983.187261] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000 [ 3983.188295] page dumped because: kasan: bad access detected [ 3983.189279] Memory state around the buggy address: [ 3983.189930] ffff88809d645e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.190901] ffff88809d645e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.191873] >ffff88809d645f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.192847] ^ [ 3983.193307] ffff88809d645f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.194275] ffff88809d646000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.195243] ================================================================== [ 3983.196384] ok 9 - kmalloc_large_oob_right [ 3983.203317] ================================================================== [ 3983.204986] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.206183] Write of size 1 at addr ffff88800511e0eb by task kunit_try_catch/116235 [ 3983.207473] CPU: 0 PID: 116235 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.209329] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.210128] Call Trace: [ 3983.210503] [ 3983.210818] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.211659] dump_stack_lvl+0x57/0x81 [ 3983.212190] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.213000] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.213837] print_report.cold+0x5c/0x237 [ 3983.214413] kasan_report+0xc9/0x100 [ 3983.214926] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.215768] krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.216584] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 3983.217320] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.217994] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.218663] ? lock_acquire+0x4ea/0x620 [ 3983.219210] ? rcu_read_unlock+0x40/0x40 [ 3983.219772] ? rcu_read_unlock+0x40/0x40 [ 3983.220343] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.221009] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.221797] ? do_raw_spin_lock+0x270/0x270 [ 3983.222396] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.223254] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.223954] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.224671] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.225368] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.226074] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.226932] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.227658] kthread+0x2a4/0x350 [ 3983.228123] ? kthread_complete_and_exit+0x20/0x20 [ 3983.228809] ret_from_fork+0x1f/0x30 [ 3983.229342] [ 3983.229912] Allocated by task 116235: [ 3983.230441] kasan_save_stack+0x1e/0x40 [ 3983.230982] __kasan_krealloc+0xee/0x160 [ 3983.231543] krealloc+0x50/0xe0 [ 3983.232014] krealloc_more_oob_helper+0x1d5/0x610 [test_kasan] [ 3983.232834] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.233528] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.234381] kthread+0x2a4/0x350 [ 3983.234845] ret_from_fork+0x1f/0x30 [ 3983.235595] The buggy address belongs to the object at ffff88800511e000 which belongs to the cache kmalloc-256 of size 256 [ 3983.237283] The buggy address is located 235 bytes inside of 256-byte region [ffff88800511e000, ffff88800511e100) [ 3983.239112] The buggy address belongs to the physical page: [ 3983.239890] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.241323] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.242356] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.243365] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.244427] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.245488] page dumped because: kasan: bad access detected [ 3983.246498] Memory state around the buggy address: [ 3983.247167] ffff88800511df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.248171] ffff88800511e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.249166] >ffff88800511e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 3983.250160] ^ [ 3983.251067] ffff88800511e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.252059] ffff88800511e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.253050] ================================================================== [ 3983.254257] ================================================================== [ 3983.255261] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.256456] Write of size 1 at addr ffff88800511e0f0 by task kunit_try_catch/116235 [ 3983.257742] CPU: 0 PID: 116235 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.259588] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.260394] Call Trace: [ 3983.260752] [ 3983.261069] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.261907] dump_stack_lvl+0x57/0x81 [ 3983.262443] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.263259] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.264108] print_report.cold+0x5c/0x237 [ 3983.264687] kasan_report+0xc9/0x100 [ 3983.265201] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.266048] krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.266873] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 3983.267609] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.268285] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.268950] ? lock_acquire+0x4ea/0x620 [ 3983.269507] ? rcu_read_unlock+0x40/0x40 [ 3983.270061] ? rcu_read_unlock+0x40/0x40 [ 3983.270627] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.271299] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.272084] ? do_raw_spin_lock+0x270/0x270 [ 3983.272695] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.273552] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.274255] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.274968] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.275660] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.276369] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.277221] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.277939] kthread+0x2a4/0x350 [ 3983.278413] ? kthread_complete_and_exit+0x20/0x20 [ 3983.279085] ret_from_fork+0x1f/0x30 [ 3983.279612] [ 3983.280176] Allocated by task 116235: [ 3983.280705] kasan_save_stack+0x1e/0x40 [ 3983.281256] __kasan_krealloc+0xee/0x160 [ 3983.281810] krealloc+0x50/0xe0 [ 3983.282271] krealloc_more_oob_helper+0x1d5/0x610 [test_kasan] [ 3983.283084] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.283776] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.284623] kthread+0x2a4/0x350 [ 3983.285093] ret_from_fork+0x1f/0x30 [ 3983.285857] The buggy address belongs to the object at ffff88800511e000 which belongs to the cache kmalloc-256 of size 256 [ 3983.287550] The buggy address is located 240 bytes inside of 256-byte region [ffff88800511e000, ffff88800511e100) [ 3983.289385] The buggy address belongs to the physical page: [ 3983.290154] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.291580] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.292612] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.293624] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.294691] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.295749] page dumped because: kasan: bad access detected [ 3983.296774] Memory state around the buggy address: [ 3983.297446] ffff88800511df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.298441] ffff88800511e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.299442] >ffff88800511e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 3983.300438] ^ [ 3983.301380] ffff88800511e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.302395] ffff88800511e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.303396] ================================================================== [ 3983.308961] ok 10 - krealloc_more_oob [ 3983.312599] ================================================================== [ 3983.314220] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.315421] Write of size 1 at addr ffff88800511eec9 by task kunit_try_catch/116236 [ 3983.316713] CPU: 0 PID: 116236 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.318587] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.319404] Call Trace: [ 3983.319773] [ 3983.320099] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.320953] dump_stack_lvl+0x57/0x81 [ 3983.321493] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.322308] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.323149] print_report.cold+0x5c/0x237 [ 3983.323732] kasan_report+0xc9/0x100 [ 3983.324255] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.325096] krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.325927] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.326631] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.327303] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.327968] ? lock_acquire+0x4ea/0x620 [ 3983.328527] ? rcu_read_unlock+0x40/0x40 [ 3983.329089] ? rcu_read_unlock+0x40/0x40 [ 3983.329656] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.330332] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.331115] ? do_raw_spin_lock+0x270/0x270 [ 3983.331718] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.332585] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.333283] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.333996] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.334698] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.335423] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.336288] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.337008] kthread+0x2a4/0x350 [ 3983.337482] ? kthread_complete_and_exit+0x20/0x20 [ 3983.338157] ret_from_fork+0x1f/0x30 [ 3983.338689] [ 3983.339263] Allocated by task 116236: [ 3983.339801] kasan_save_stack+0x1e/0x40 [ 3983.340353] __kasan_krealloc+0xee/0x160 [ 3983.340907] krealloc+0x50/0xe0 [ 3983.341373] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 3983.342186] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.342877] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.343733] kthread+0x2a4/0x350 [ 3983.344214] ret_from_fork+0x1f/0x30 [ 3983.344962] The buggy address belongs to the object at ffff88800511ee00 which belongs to the cache kmalloc-256 of size 256 [ 3983.346653] The buggy address is located 201 bytes inside of 256-byte region [ffff88800511ee00, ffff88800511ef00) [ 3983.348483] The buggy address belongs to the physical page: [ 3983.349256] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.350690] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.351721] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.352737] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.353804] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.354868] page dumped because: kasan: bad access detected [ 3983.355880] Memory state around the buggy address: [ 3983.356557] ffff88800511ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.357556] ffff88800511ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.358554] >ffff88800511ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 3983.359549] ^ [ 3983.360322] ffff88800511ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.361316] ffff88800511ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.362307] ================================================================== [ 3983.363452] ================================================================== [ 3983.364455] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.365651] Write of size 1 at addr ffff88800511eed0 by task kunit_try_catch/116236 [ 3983.366947] CPU: 0 PID: 116236 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.368815] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.369622] Call Trace: [ 3983.369986] [ 3983.370307] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.371137] dump_stack_lvl+0x57/0x81 [ 3983.371670] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.372479] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.373316] print_report.cold+0x5c/0x237 [ 3983.373886] kasan_report+0xc9/0x100 [ 3983.374405] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.375249] krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.376069] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.376771] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.377451] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.378115] ? lock_acquire+0x4ea/0x620 [ 3983.378667] ? rcu_read_unlock+0x40/0x40 [ 3983.379234] ? rcu_read_unlock+0x40/0x40 [ 3983.379787] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.380463] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.381252] ? do_raw_spin_lock+0x270/0x270 [ 3983.381847] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.382707] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.383411] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.384125] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.384832] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.385547] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.386401] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.387119] kthread+0x2a4/0x350 [ 3983.387594] ? kthread_complete_and_exit+0x20/0x20 [ 3983.388278] ret_from_fork+0x1f/0x30 [ 3983.388802] [ 3983.389375] Allocated by task 116236: [ 3983.389897] kasan_save_stack+0x1e/0x40 [ 3983.390450] __kasan_krealloc+0xee/0x160 [ 3983.391002] krealloc+0x50/0xe0 [ 3983.391465] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 3983.392286] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.392975] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.393828] kthread+0x2a4/0x350 [ 3983.394300] ret_from_fork+0x1f/0x30 [ 3983.395052] The buggy address belongs to the object at ffff88800511ee00 which belongs to the cache kmalloc-256 of size 256 [ 3983.396742] The buggy address is located 208 bytes inside of 256-byte region [ffff88800511ee00, ffff88800511ef00) [ 3983.398579] The buggy address belongs to the physical page: [ 3983.399356] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.400778] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.401810] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.402827] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.403898] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.404966] page dumped because: kasan: bad access detected [ 3983.405986] Memory state around the buggy address: [ 3983.406665] ffff88800511ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.407666] ffff88800511ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.408654] >ffff88800511ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 3983.409656] ^ [ 3983.410519] ffff88800511ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.411582] ffff88800511ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.412844] ================================================================== [ 3983.414233] ================================================================== [ 3983.415555] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.417120] Write of size 1 at addr ffff88800511eeda by task kunit_try_catch/116236 [ 3983.418816] CPU: 0 PID: 116236 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.421167] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.422004] Call Trace: [ 3983.422520] [ 3983.422959] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.423983] dump_stack_lvl+0x57/0x81 [ 3983.424685] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.425544] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.426424] print_report.cold+0x5c/0x237 [ 3983.427025] kasan_report+0xc9/0x100 [ 3983.427686] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.428793] krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.429883] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.430816] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.431702] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.432568] ? lock_acquire+0x4ea/0x620 [ 3983.433290] ? rcu_read_unlock+0x40/0x40 [ 3983.434018] ? rcu_read_unlock+0x40/0x40 [ 3983.434750] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.435648] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.436684] ? do_raw_spin_lock+0x270/0x270 [ 3983.437369] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.438330] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.439289] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.440220] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.441022] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.441788] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.442710] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.443568] kthread+0x2a4/0x350 [ 3983.444211] ? kthread_complete_and_exit+0x20/0x20 [ 3983.444917] ret_from_fork+0x1f/0x30 [ 3983.445491] [ 3983.446190] Allocated by task 116236: [ 3983.446880] kasan_save_stack+0x1e/0x40 [ 3983.447595] __kasan_krealloc+0xee/0x160 [ 3983.448331] krealloc+0x50/0xe0 [ 3983.448921] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 3983.449987] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.450899] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.452011] kthread+0x2a4/0x350 [ 3983.452648] ret_from_fork+0x1f/0x30 [ 3983.453631] The buggy address belongs to the object at ffff88800511ee00 which belongs to the cache kmalloc-256 of size 256 [ 3983.455791] The buggy address is located 218 bytes inside of 256-byte region [ffff88800511ee00, ffff88800511ef00) [ 3983.457982] The buggy address belongs to the physical page: [ 3983.458960] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.460534] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.461626] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.462895] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.464052] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.465347] page dumped because: kasan: bad access detected [ 3983.466674] Memory state around the buggy address: [ 3983.467546] ffff88800511ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.468855] ffff88800511ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.470182] >ffff88800511ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 3983.471251] ^ [ 3983.472215] ffff88800511ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.473538] ffff88800511ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.474913] ================================================================== [ 3983.476325] ================================================================== [ 3983.477437] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.478896] Write of size 1 at addr ffff88800511eeea by task kunit_try_catch/116236 [ 3983.480352] CPU: 0 PID: 116236 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.482828] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.483907] Call Trace: [ 3983.484401] [ 3983.484827] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.485796] dump_stack_lvl+0x57/0x81 [ 3983.486483] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.487410] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.488479] print_report.cold+0x5c/0x237 [ 3983.489203] kasan_report+0xc9/0x100 [ 3983.489730] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.490587] krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.491429] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.492154] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.492877] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.493640] ? lock_acquire+0x4ea/0x620 [ 3983.494383] ? rcu_read_unlock+0x40/0x40 [ 3983.495035] ? rcu_read_unlock+0x40/0x40 [ 3983.495620] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.496517] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.497571] ? do_raw_spin_lock+0x270/0x270 [ 3983.498218] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.499399] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.500347] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.501321] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.502270] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.503083] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.503979] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.504751] kthread+0x2a4/0x350 [ 3983.505297] ? kthread_complete_and_exit+0x20/0x20 [ 3983.506225] ret_from_fork+0x1f/0x30 [ 3983.506905] [ 3983.507678] Allocated by task 116236: [ 3983.508406] kasan_save_stack+0x1e/0x40 [ 3983.509140] __kasan_krealloc+0xee/0x160 [ 3983.509890] krealloc+0x50/0xe0 [ 3983.510524] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 3983.511553] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.512273] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.513135] kthread+0x2a4/0x350 [ 3983.513645] ret_from_fork+0x1f/0x30 [ 3983.514496] The buggy address belongs to the object at ffff88800511ee00 which belongs to the cache kmalloc-256 of size 256 [ 3983.516325] The buggy address is located 234 bytes inside of 256-byte region [ffff88800511ee00, ffff88800511ef00) [ 3983.518364] The buggy address belongs to the physical page: [ 3983.519133] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.520606] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.521650] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.522689] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.523764] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.524820] page dumped because: kasan: bad access detected [ 3983.525816] Memory state around the buggy address: [ 3983.526506] ffff88800511ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.527502] ffff88800511ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.528492] >ffff88800511ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 3983.529483] ^ [ 3983.530411] ffff88800511ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.531419] ffff88800511ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.532433] ================================================================== [ 3983.533527] ================================================================== [ 3983.534532] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.535761] Write of size 1 at addr ffff88800511eeeb by task kunit_try_catch/116236 [ 3983.537069] CPU: 0 PID: 116236 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.539129] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.539963] Call Trace: [ 3983.540342] [ 3983.540666] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.541507] dump_stack_lvl+0x57/0x81 [ 3983.542082] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.542899] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.543764] print_report.cold+0x5c/0x237 [ 3983.544357] kasan_report+0xc9/0x100 [ 3983.544874] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.545717] krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.546539] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.547238] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.547918] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.548589] ? lock_acquire+0x4ea/0x620 [ 3983.549134] ? rcu_read_unlock+0x40/0x40 [ 3983.549695] ? rcu_read_unlock+0x40/0x40 [ 3983.550255] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.550920] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.551727] ? do_raw_spin_lock+0x270/0x270 [ 3983.552340] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.553197] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.553894] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.554609] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.555306] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.556025] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.556879] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.557600] kthread+0x2a4/0x350 [ 3983.558071] ? kthread_complete_and_exit+0x20/0x20 [ 3983.558749] ret_from_fork+0x1f/0x30 [ 3983.559285] [ 3983.559864] Allocated by task 116236: [ 3983.560404] kasan_save_stack+0x1e/0x40 [ 3983.560968] __kasan_krealloc+0xee/0x160 [ 3983.561528] krealloc+0x50/0xe0 [ 3983.561973] krealloc_less_oob_helper+0x1d9/0xa20 [test_kasan] [ 3983.562786] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.563497] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.564352] kthread+0x2a4/0x350 [ 3983.564819] ret_from_fork+0x1f/0x30 [ 3983.565580] The buggy address belongs to the object at ffff88800511ee00 which belongs to the cache kmalloc-256 of size 256 [ 3983.567265] The buggy address is located 235 bytes inside of 256-byte region [ffff88800511ee00, ffff88800511ef00) [ 3983.569136] The buggy address belongs to the physical page: [ 3983.569917] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800511e800 pfn:0x511e [ 3983.571370] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.572408] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.573424] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.574496] raw: ffff88800511e800 000000008010000f 00000001ffffffff 0000000000000000 [ 3983.575590] page dumped because: kasan: bad access detected [ 3983.577082] Memory state around the buggy address: [ 3983.578070] ffff88800511ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.579399] ffff88800511ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.580814] >ffff88800511ee80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 3983.582114] ^ [ 3983.583302] ffff88800511ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.584599] ffff88800511ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.585904] ================================================================== [ 3983.587346] ok 11 - krealloc_less_oob [ 3983.587758] ================================================================== [ 3983.589840] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.591423] Write of size 1 at addr ffff888047f820eb by task kunit_try_catch/116237 [ 3983.593099] CPU: 0 PID: 116237 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.595542] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.596602] Call Trace: [ 3983.597069] [ 3983.597496] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.598601] dump_stack_lvl+0x57/0x81 [ 3983.599296] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.600359] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.601460] print_report.cold+0x5c/0x237 [ 3983.602219] kasan_report+0xc9/0x100 [ 3983.602893] ? krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.604006] krealloc_more_oob_helper+0x5c3/0x610 [test_kasan] [ 3983.605097] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 3983.606052] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.606920] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.607840] ? lock_acquire+0x4ea/0x620 [ 3983.608676] ? rcu_read_unlock+0x40/0x40 [ 3983.609424] ? rcu_read_unlock+0x40/0x40 [ 3983.610143] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.611107] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.612215] ? do_raw_spin_lock+0x270/0x270 [ 3983.612981] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.614091] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.615001] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.615937] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.616840] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.617771] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.618883] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.619836] kthread+0x2a4/0x350 [ 3983.620474] ? kthread_complete_and_exit+0x20/0x20 [ 3983.621358] ret_from_fork+0x1f/0x30 [ 3983.622042] [ 3983.622785] The buggy address belongs to the physical page: [ 3983.623783] page:000000003916311f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47f80 [ 3983.625443] head:000000003916311f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.626784] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.628021] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.629408] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.630797] page dumped because: kasan: bad access detected [ 3983.632114] Memory state around the buggy address: [ 3983.633005] ffff888047f81f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.634310] ffff888047f82000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.635617] >ffff888047f82080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 3983.636902] ^ [ 3983.638040] ffff888047f82100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.639308] ffff888047f82180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.640605] ================================================================== [ 3983.641999] ================================================================== [ 3983.643308] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.643702] systemd-journald[572]: Data hash table of /run/log/journal/d5d3542be8d8469cb02596ae71801d53/system.journal has a fill level at 75.0 (6997 of 9329 items, 5373952 file size, 768 bytes per hash table item), suggesting rotation. [ 3983.644855] Write of size 1 at addr ffff888047f820f0 by task kunit_try_catch/116237 [ 3983.644868] CPU: 0 PID: 116237 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.647792] systemd-journald[572]: /run/log/journal/d5d3542be8d8469cb02596ae71801d53/system.journal: Journal header limits reached or header out-of-date, rotating. [ 3983.649111] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.649118] Call Trace: [ 3983.649124] [ 3983.656350] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.657593] dump_stack_lvl+0x57/0x81 [ 3983.658298] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.659375] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.660480] print_report.cold+0x5c/0x237 [ 3983.661241] kasan_report+0xc9/0x100 [ 3983.661915] ? krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.663031] krealloc_more_oob_helper+0x5b6/0x610 [test_kasan] [ 3983.664102] ? krealloc_less_oob+0x10/0x10 [test_kasan] [ 3983.665054] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.665929] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.666793] ? lock_acquire+0x4ea/0x620 [ 3983.667510] ? rcu_read_unlock+0x40/0x40 [ 3983.668251] ? rcu_read_unlock+0x40/0x40 [ 3983.668977] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.669864] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.670978] ? do_raw_spin_lock+0x270/0x270 [ 3983.671780] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.672913] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.673823] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.674767] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.675667] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.676607] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.677728] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.678692] kthread+0x2a4/0x350 [ 3983.679312] ? kthread_complete_and_exit+0x20/0x20 [ 3983.680199] ret_from_fork+0x1f/0x30 [ 3983.680884] [ 3983.681626] The buggy address belongs to the physical page: [ 3983.682650] page:000000003916311f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47f80 [ 3983.684317] head:000000003916311f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.685662] flags: 0xfffffc0010000(head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.686899] raw: 000fffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.688308] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.689760] page dumped because: kasan: bad access detected [ 3983.691304] Memory state around the buggy address: [ 3983.692199] ffff888047f81f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.693506] ffff888047f82000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.694812] >ffff888047f82080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 3983.696119] ^ [ 3983.697356] ffff888047f82100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.698664] ffff888047f82180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.699944] ================================================================== [ 3983.701429] ok 12 - krealloc_pagealloc_more_oob [ 3983.701946] ================================================================== [ 3983.704210] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.705393] Write of size 1 at addr ffff888108e960c9 by task kunit_try_catch/116239 [ 3983.706664] CPU: 0 PID: 116239 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.708486] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.709271] Call Trace: [ 3983.709623] [ 3983.709936] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.710758] dump_stack_lvl+0x57/0x81 [ 3983.711283] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.712070] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.712892] print_report.cold+0x5c/0x237 [ 3983.713458] kasan_report+0xc9/0x100 [ 3983.713960] ? krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.714781] krealloc_less_oob_helper+0x9f1/0xa20 [test_kasan] [ 3983.715586] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.716286] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.716933] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.717589] ? lock_acquire+0x4ea/0x620 [ 3983.718123] ? rcu_read_unlock+0x40/0x40 [ 3983.718676] ? rcu_read_unlock+0x40/0x40 [ 3983.719222] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.719870] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.720635] ? do_raw_spin_lock+0x270/0x270 [ 3983.721218] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.722050] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.722729] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.723431] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.724104] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.724801] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.725636] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.726344] kthread+0x2a4/0x350 [ 3983.726802] ? kthread_complete_and_exit+0x20/0x20 [ 3983.727462] ret_from_fork+0x1f/0x30 [ 3983.727974] [ 3983.728534] The buggy address belongs to the physical page: [ 3983.729288] page:00000000df26e75f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108e94 [ 3983.730537] head:00000000df26e75f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.731546] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 3983.732484] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.733520] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.734554] page dumped because: kasan: bad access detected [ 3983.735541] Memory state around the buggy address: [ 3983.736198] ffff888108e95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.737165] ffff888108e96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.738137] >ffff888108e96080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 3983.739108] ^ [ 3983.739862] ffff888108e96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.740835] ffff888108e96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.741805] ================================================================== [ 3983.743006] ================================================================== [ 3983.743986] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.745157] Write of size 1 at addr ffff888108e960d0 by task kunit_try_catch/116239 [ 3983.746443] CPU: 0 PID: 116239 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.748277] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.749061] Call Trace: [ 3983.749421] [ 3983.749732] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.750559] dump_stack_lvl+0x57/0x81 [ 3983.751077] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.751866] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.752690] print_report.cold+0x5c/0x237 [ 3983.753256] kasan_report+0xc9/0x100 [ 3983.753760] ? krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.754581] krealloc_less_oob_helper+0x9e0/0xa20 [test_kasan] [ 3983.755388] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.756072] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.756732] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.757384] ? lock_acquire+0x4ea/0x620 [ 3983.757920] ? rcu_read_unlock+0x40/0x40 [ 3983.758468] ? rcu_read_unlock+0x40/0x40 [ 3983.759012] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.759664] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.760428] ? do_raw_spin_lock+0x270/0x270 [ 3983.761006] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.761843] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.762526] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.763228] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.763898] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.764597] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.765432] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.766137] kthread+0x2a4/0x350 [ 3983.766601] ? kthread_complete_and_exit+0x20/0x20 [ 3983.767265] ret_from_fork+0x1f/0x30 [ 3983.767778] [ 3983.768333] The buggy address belongs to the physical page: [ 3983.769082] page:00000000df26e75f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108e94 [ 3983.770337] head:00000000df26e75f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.771344] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 3983.772284] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.773319] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.774355] page dumped because: kasan: bad access detected [ 3983.775344] Memory state around the buggy address: [ 3983.776000] ffff888108e95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.776972] ffff888108e96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.777940] >ffff888108e96080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 3983.778910] ^ [ 3983.779884] ffff888108e96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.781164] ffff888108e96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.782452] ================================================================== [ 3983.783805] ================================================================== [ 3983.785089] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.786645] Write of size 1 at addr ffff888108e960da by task kunit_try_catch/116239 [ 3983.788423] CPU: 0 PID: 116239 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.790635] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.791457] Call Trace: [ 3983.791819] [ 3983.792143] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.792994] dump_stack_lvl+0x57/0x81 [ 3983.793584] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.794542] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.795442] print_report.cold+0x5c/0x237 [ 3983.796021] kasan_report+0xc9/0x100 [ 3983.796549] ? krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.797453] krealloc_less_oob_helper+0x9cf/0xa20 [test_kasan] [ 3983.798404] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.799124] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.799881] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.800557] ? lock_acquire+0x4ea/0x620 [ 3983.801105] ? rcu_read_unlock+0x40/0x40 [ 3983.801766] ? rcu_read_unlock+0x40/0x40 [ 3983.802378] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.803201] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.804048] ? do_raw_spin_lock+0x270/0x270 [ 3983.804734] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.805739] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.806448] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.807164] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.807865] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.808583] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.809439] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.810164] kthread+0x2a4/0x350 [ 3983.810643] ? kthread_complete_and_exit+0x20/0x20 [ 3983.811325] ret_from_fork+0x1f/0x30 [ 3983.811852] [ 3983.812426] The buggy address belongs to the physical page: [ 3983.813301] page:00000000df26e75f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108e94 [ 3983.814726] head:00000000df26e75f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.815966] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 3983.817055] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.818249] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.819428] page dumped because: kasan: bad access detected [ 3983.820484] Memory state around the buggy address: [ 3983.821207] ffff888108e95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.822261] ffff888108e96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.823260] >ffff888108e96080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 3983.824315] ^ [ 3983.825447] ffff888108e96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.826644] ffff888108e96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.827646] ================================================================== [ 3983.828712] ================================================================== [ 3983.829716] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.830932] Write of size 1 at addr ffff888108e960ea by task kunit_try_catch/116239 [ 3983.832236] CPU: 0 PID: 116239 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.834094] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.834902] Call Trace: [ 3983.835271] [ 3983.835592] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.836439] dump_stack_lvl+0x57/0x81 [ 3983.836970] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.837817] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.838808] print_report.cold+0x5c/0x237 [ 3983.839495] kasan_report+0xc9/0x100 [ 3983.840015] ? krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.840864] krealloc_less_oob_helper+0x9c2/0xa20 [test_kasan] [ 3983.841694] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.842401] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.843136] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.843834] ? lock_acquire+0x4ea/0x620 [ 3983.844400] ? rcu_read_unlock+0x40/0x40 [ 3983.844957] ? rcu_read_unlock+0x40/0x40 [ 3983.845530] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.846214] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.846999] ? do_raw_spin_lock+0x270/0x270 [ 3983.847619] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.848493] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.849194] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.849912] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.850605] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.851324] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.852178] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.852900] kthread+0x2a4/0x350 [ 3983.853386] ? kthread_complete_and_exit+0x20/0x20 [ 3983.854061] ret_from_fork+0x1f/0x30 [ 3983.854593] [ 3983.855156] The buggy address belongs to the physical page: [ 3983.855931] page:00000000df26e75f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108e94 [ 3983.857218] head:00000000df26e75f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.858241] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 3983.859204] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.860268] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.861324] page dumped because: kasan: bad access detected [ 3983.862343] Memory state around the buggy address: [ 3983.863010] ffff888108e95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.864004] ffff888108e96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.864999] >ffff888108e96080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 3983.865995] ^ [ 3983.866906] ffff888108e96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.867899] ffff888108e96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.868925] ================================================================== [ 3983.869986] ================================================================== [ 3983.870989] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.872188] Write of size 1 at addr ffff888108e960eb by task kunit_try_catch/116239 [ 3983.873482] CPU: 0 PID: 116239 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.875348] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.876148] Call Trace: [ 3983.876515] [ 3983.876833] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.877680] dump_stack_lvl+0x57/0x81 [ 3983.878217] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.879025] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.879868] print_report.cold+0x5c/0x237 [ 3983.880446] kasan_report+0xc9/0x100 [ 3983.880962] ? krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.881803] krealloc_less_oob_helper+0x9b5/0xa20 [test_kasan] [ 3983.882624] ? krealloc_uaf+0x450/0x450 [test_kasan] [ 3983.883319] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.883987] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.884636] ? lock_acquire+0x4ea/0x620 [ 3983.885173] ? rcu_read_unlock+0x40/0x40 [ 3983.885743] ? rcu_read_unlock+0x40/0x40 [ 3983.886306] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.886973] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.887755] ? do_raw_spin_lock+0x270/0x270 [ 3983.888355] ? kunit_binary_str_assert_format+0x3e0/0x3e0 [kunit] [ 3983.889209] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.889905] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.890624] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.891316] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.892024] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.892876] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.893600] kthread+0x2a4/0x350 [ 3983.894067] ? kthread_complete_and_exit+0x20/0x20 [ 3983.894745] ret_from_fork+0x1f/0x30 [ 3983.895273] [ 3983.895845] The buggy address belongs to the physical page: [ 3983.896621] page:00000000df26e75f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108e94 [ 3983.897902] head:00000000df26e75f order:2 compound_mapcount:0 compound_pincount:0 [ 3983.898932] flags: 0x17ffffc0010000(head|node=0|zone=2|lastcpupid=0x1fffff) [ 3983.899891] raw: 0017ffffc0010000 0000000000000000 dead000000000122 0000000000000000 [ 3983.900953] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3983.902050] page dumped because: kasan: bad access detected [ 3983.903112] Memory state around the buggy address: [ 3983.903793] ffff888108e95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.904800] ffff888108e96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3983.905807] >ffff888108e96080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 3983.906810] ^ [ 3983.907730] ffff888108e96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.908728] ffff888108e96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 3983.909730] ================================================================== [ 3983.910886] ok 13 - krealloc_pagealloc_less_oob [ 3983.911250] ================================================================== [ 3983.912949] BUG: KASAN: use-after-free in krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.913959] Read of size 1 at addr ffff88800511e800 by task kunit_try_catch/116240 [ 3983.915265] CPU: 0 PID: 116240 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.917119] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.917931] Call Trace: [ 3983.918297] [ 3983.918615] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.919358] dump_stack_lvl+0x57/0x81 [ 3983.919892] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.920703] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.921413] print_report.cold+0x5c/0x237 [ 3983.921985] kasan_report+0xc9/0x100 [ 3983.922506] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.923210] ? krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.923910] __kasan_check_byte+0x36/0x50 [ 3983.924487] krealloc+0x2e/0xe0 [ 3983.924950] krealloc_uaf+0x1c7/0x450 [test_kasan] [ 3983.925631] ? kmalloc_memmove_negative_size+0x290/0x290 [test_kasan] [ 3983.926525] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.927195] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.927873] ? lock_acquire+0x4ea/0x620 [ 3983.928425] ? rcu_read_unlock+0x40/0x40 [ 3983.928982] ? rcu_read_unlock+0x40/0x40 [ 3983.929545] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.930218] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.930999] ? do_raw_spin_lock+0x270/0x270 [ 3983.931599] ? trace_hardirqs_on+0x2d/0x160 [ 3983.932218] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.932926] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.933647] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.934342] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.935055] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.935916] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.936644] kthread+0x2a4/0x350 [ 3983.937114] ? kthread_complete_and_exit+0x20/0x20 [ 3983.937794] ret_from_fork+0x1f/0x30 [ 3983.938326] [ 3983.938892] Allocated by task 116240: [ 3983.939418] kasan_save_stack+0x1e/0x40 [ 3983.939962] __kasan_kmalloc+0x81/0xa0 [ 3983.940498] krealloc_uaf+0xaa/0x450 [test_kasan] [ 3983.941166] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.941852] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.942707] kthread+0x2a4/0x350 [ 3983.943182] ret_from_fork+0x1f/0x30 [ 3983.943931] Freed by task 116240: [ 3983.944412] kasan_save_stack+0x1e/0x40 [ 3983.944951] kasan_set_track+0x21/0x30 [ 3983.945490] kasan_set_free_info+0x20/0x40 [ 3983.946069] __kasan_slab_free+0x108/0x170 [ 3983.946656] slab_free_freelist_hook+0x11d/0x1d0 [ 3983.947320] kfree+0xe2/0x3c0 [ 3983.947757] krealloc_uaf+0x147/0x450 [test_kasan] [ 3983.948440] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.949127] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.949980] kthread+0x2a4/0x350 [ 3983.950458] ret_from_fork+0x1f/0x30 [ 3983.951215] The buggy address belongs to the object at ffff88800511e800 which belongs to the cache kmalloc-256 of size 256 [ 3983.952910] The buggy address is located 0 bytes inside of 256-byte region [ffff88800511e800, ffff88800511e900) [ 3983.954734] The buggy address belongs to the physical page: [ 3983.955511] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x511e [ 3983.956777] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3983.957815] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3983.958832] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3983.959894] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3983.960963] page dumped because: kasan: bad access detected [ 3983.961978] Memory state around the buggy address: [ 3983.962659] ffff88800511e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.963661] ffff88800511e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.964659] >ffff88800511e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3983.965674] ^ [ 3983.966139] ffff88800511e880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3983.967138] ffff88800511e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3983.968139] ================================================================== [ 3983.969302] ================================================================== [ 3983.970314] BUG: KASAN: use-after-free in krealloc_uaf+0x42e/0x450 [test_kasan] [ 3983.971373] Read of size 1 at addr ffff88800511e800 by task kunit_try_catch/116240 [ 3983.972663] CPU: 0 PID: 116240 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3983.974536] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3983.975348] Call Trace: [ 3983.975711] [ 3983.976033] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 3983.976742] dump_stack_lvl+0x57/0x81 [ 3983.977278] print_address_description.constprop.0+0x1f/0x1e0 [ 3983.978088] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 3983.978794] print_report.cold+0x5c/0x237 [ 3983.979369] kasan_report+0xc9/0x100 [ 3983.979870] ? krealloc_uaf+0x42e/0x450 [test_kasan] [ 3983.980561] krealloc_uaf+0x42e/0x450 [test_kasan] [ 3983.981240] ? kmalloc_memmove_negative_size+0x290/0x290 [test_kasan] [ 3983.982106] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.982758] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.983407] ? lock_acquire+0x4ea/0x620 [ 3983.983937] ? rcu_read_unlock+0x40/0x40 [ 3983.984491] ? rcu_read_unlock+0x40/0x40 [ 3983.985046] ? rcu_read_lock_sched_held+0x12/0x80 [ 3983.985718] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3983.986498] ? do_raw_spin_lock+0x270/0x270 [ 3983.987089] ? kunit_ptr_not_err_assert_format+0x210/0x210 [kunit] [ 3983.987959] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3983.988665] ? kunit_add_resource+0x197/0x280 [kunit] [ 3983.989387] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.990074] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3983.990793] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.991645] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3983.992375] kthread+0x2a4/0x350 [ 3983.992850] ? kthread_complete_and_exit+0x20/0x20 [ 3983.993535] ret_from_fork+0x1f/0x30 [ 3983.994064] [ 3983.994635] Allocated by task 116240: [ 3983.995165] kasan_save_stack+0x1e/0x40 [ 3983.995713] __kasan_kmalloc+0x81/0xa0 [ 3983.996255] krealloc_uaf+0xaa/0x450 [test_kasan] [ 3983.996920] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3983.997612] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3983.998465] kthread+0x2a4/0x350 [ 3983.998942] ret_from_fork+0x1f/0x30 [ 3983.999704] Freed by task 116240: [ 3984.000189] kasan_save_stack+0x1e/0x40 [ 3984.000725] kasan_set_track+0x21/0x30 [ 3984.001272] kasan_set_free_info+0x20/0x40 [ 3984.001850] __kasan_slab_free+0x108/0x170 [ 3984.002435] slab_free_freelist_hook+0x11d/0x1d0 [ 3984.003088] kfree+0xe2/0x3c0 [ 3984.003526] krealloc_uaf+0x147/0x450 [test_kasan] [ 3984.004210] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.004901] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.005784] kthread+0x2a4/0x350 [ 3984.006258] ret_from_fork+0x1f/0x30 [ 3984.007014] The buggy address belongs to the object at ffff88800511e800 which belongs to the cache kmalloc-256 of size 256 [ 3984.008710] The buggy address is located 0 bytes inside of 256-byte region [ffff88800511e800, ffff88800511e900) [ 3984.010542] The buggy address belongs to the physical page: [ 3984.011315] page:0000000048529345 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x511e [ 3984.012581] head:0000000048529345 order:1 compound_mapcount:0 compound_pincount:0 [ 3984.013652] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.014674] raw: 000fffffc0010200 ffffea0000d4d500 dead000000000007 ffff888100041b40 [ 3984.015737] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.016799] page dumped because: kasan: bad access detected [ 3984.017810] Memory state around the buggy address: [ 3984.018503] ffff88800511e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.019503] ffff88800511e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.020505] >ffff88800511e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.021524] ^ [ 3984.021989] ffff88800511e880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.022994] ffff88800511e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.023995] ================================================================== [ 3984.025066] ok 14 - krealloc_uaf [ 3984.025358] ================================================================== [ 3984.026902] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 3984.027985] Write of size 16 at addr ffff8880018eab40 by task kunit_try_catch/116241 [ 3984.029306] CPU: 0 PID: 116241 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.031188] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.031992] Call Trace: [ 3984.032364] [ 3984.032680] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 3984.033409] dump_stack_lvl+0x57/0x81 [ 3984.033946] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.034761] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 3984.035490] print_report.cold+0x5c/0x237 [ 3984.036064] kasan_report+0xc9/0x100 [ 3984.036591] ? kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 3984.037318] kmalloc_oob_16+0x399/0x3b0 [test_kasan] [ 3984.038021] ? kmalloc_uaf_16+0x3b0/0x3b0 [test_kasan] [ 3984.038745] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.039376] ? do_raw_spin_lock+0x270/0x270 [ 3984.039972] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.040761] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.041464] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.042183] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.042869] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.043605] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.044456] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.045185] kthread+0x2a4/0x350 [ 3984.045652] ? kthread_complete_and_exit+0x20/0x20 [ 3984.046334] ret_from_fork+0x1f/0x30 [ 3984.046859] [ 3984.047428] Allocated by task 116241: [ 3984.047960] kasan_save_stack+0x1e/0x40 [ 3984.048510] __kasan_kmalloc+0x81/0xa0 [ 3984.049044] kmalloc_oob_16+0xa4/0x3b0 [test_kasan] [ 3984.049736] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.050424] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.051280] kthread+0x2a4/0x350 [ 3984.051748] ret_from_fork+0x1f/0x30 [ 3984.052498] The buggy address belongs to the object at ffff8880018eab40 which belongs to the cache kmalloc-16 of size 16 [ 3984.054170] The buggy address is located 0 bytes inside of 16-byte region [ffff8880018eab40, ffff8880018eab50) [ 3984.055972] The buggy address belongs to the physical page: [ 3984.056747] page:00000000eef87173 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x18ea [ 3984.058005] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.058957] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3984.060023] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3984.061088] page dumped because: kasan: bad access detected [ 3984.062097] Memory state around the buggy address: [ 3984.062782] ffff8880018eaa00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.063776] ffff8880018eaa80: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3984.064772] >ffff8880018eab00: 00 00 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 3984.065772] ^ [ 3984.066548] ffff8880018eab80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.067552] ffff8880018eac00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.068553] ================================================================== [ 3984.069661] ok 15 - kmalloc_oob_16 [ 3984.069968] ================================================================== [ 3984.071551] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 3984.072615] Read of size 16 at addr ffff8880018ead60 by task kunit_try_catch/116242 [ 3984.073907] CPU: 0 PID: 116242 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.075775] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.076577] Call Trace: [ 3984.076943] [ 3984.077262] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 3984.077988] dump_stack_lvl+0x57/0x81 [ 3984.078529] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.079344] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 3984.080069] print_report.cold+0x5c/0x237 [ 3984.080642] kasan_report+0xc9/0x100 [ 3984.081162] ? kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 3984.081880] kmalloc_uaf_16+0x38a/0x3b0 [test_kasan] [ 3984.082587] ? kmalloc_uaf+0x2b0/0x2b0 [test_kasan] [ 3984.083280] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.083901] ? do_raw_spin_lock+0x270/0x270 [ 3984.084504] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.085285] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.085985] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.086701] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.087394] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.088102] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.088953] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.089677] kthread+0x2a4/0x350 [ 3984.090155] ? kthread_complete_and_exit+0x20/0x20 [ 3984.090833] ret_from_fork+0x1f/0x30 [ 3984.091363] [ 3984.091931] Allocated by task 116242: [ 3984.092455] kasan_save_stack+0x1e/0x40 [ 3984.092999] __kasan_kmalloc+0x81/0xa0 [ 3984.093533] kmalloc_uaf_16+0x15d/0x3b0 [test_kasan] [ 3984.094236] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.094917] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.095768] kthread+0x2a4/0x350 [ 3984.096238] ret_from_fork+0x1f/0x30 [ 3984.096987] Freed by task 116242: [ 3984.097468] kasan_save_stack+0x1e/0x40 [ 3984.098007] kasan_set_track+0x21/0x30 [ 3984.098541] kasan_set_free_info+0x20/0x40 [ 3984.099132] __kasan_slab_free+0x108/0x170 [ 3984.099713] slab_free_freelist_hook+0x11d/0x1d0 [ 3984.100368] kfree+0xe2/0x3c0 [ 3984.100801] kmalloc_uaf_16+0x1e8/0x3b0 [test_kasan] [ 3984.101501] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.102190] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.103036] kthread+0x2a4/0x350 [ 3984.103508] ret_from_fork+0x1f/0x30 [ 3984.104266] The buggy address belongs to the object at ffff8880018ead60 which belongs to the cache kmalloc-16 of size 16 [ 3984.105933] The buggy address is located 0 bytes inside of 16-byte region [ffff8880018ead60, ffff8880018ead70) [ 3984.107729] The buggy address belongs to the physical page: [ 3984.108507] page:00000000eef87173 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x18ea [ 3984.109816] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.110769] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3984.111832] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3984.112893] page dumped because: kasan: bad access detected [ 3984.113906] Memory state around the buggy address: [ 3984.114582] ffff8880018eac00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.115598] ffff8880018eac80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.116592] >ffff8880018ead00: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3984.117609] ^ [ 3984.118490] ffff8880018ead80: 00 00 fc fc 00 00 fc fc 00 00 fc fc fb fb fc fc [ 3984.119485] ffff8880018eae00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.120481] ================================================================== [ 3984.121805] ok 16 - kmalloc_uaf_16 [ 3984.122226] ================================================================== [ 3984.123814] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 3984.124979] Write of size 128 at addr ffff88800106af00 by task kunit_try_catch/116243 [ 3984.126289] CPU: 0 PID: 116243 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.128146] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.128945] Call Trace: [ 3984.129308] [ 3984.129626] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 3984.130434] dump_stack_lvl+0x57/0x81 [ 3984.130963] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.131781] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 3984.132598] print_report.cold+0x5c/0x237 [ 3984.133175] kasan_report+0xc9/0x100 [ 3984.133690] ? kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 3984.134499] kasan_check_range+0xfd/0x1e0 [ 3984.135085] memset+0x20/0x50 [ 3984.135530] kmalloc_oob_in_memset+0x1b3/0x280 [test_kasan] [ 3984.136328] ? kmalloc_oob_memset_2+0x290/0x290 [test_kasan] [ 3984.137124] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.137753] ? do_raw_spin_lock+0x270/0x270 [ 3984.138355] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.139130] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.139829] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.140547] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.141242] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.141953] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.142807] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.143530] kthread+0x2a4/0x350 [ 3984.143999] ? kthread_complete_and_exit+0x20/0x20 [ 3984.144841] ret_from_fork+0x1f/0x30 [ 3984.145547] [ 3984.146308] Allocated by task 116243: [ 3984.146953] kasan_save_stack+0x1e/0x40 [ 3984.147515] __kasan_kmalloc+0x81/0xa0 [ 3984.148066] kmalloc_oob_in_memset+0x9c/0x280 [test_kasan] [ 3984.148847] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.149556] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.150428] kthread+0x2a4/0x350 [ 3984.150908] ret_from_fork+0x1f/0x30 [ 3984.151667] The buggy address belongs to the object at ffff88800106af00 which belongs to the cache kmalloc-128 of size 128 [ 3984.153398] The buggy address is located 0 bytes inside of 128-byte region [ffff88800106af00, ffff88800106af80) [ 3984.155231] The buggy address belongs to the physical page: [ 3984.156014] page:0000000024b36a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a [ 3984.157341] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.158317] raw: 000fffffc0000200 ffffea00009c8e80 dead000000000003 ffff8881000418c0 [ 3984.159394] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.160466] page dumped because: kasan: bad access detected [ 3984.161486] Memory state around the buggy address: [ 3984.162200] ffff88800106ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.163210] ffff88800106ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.164223] >ffff88800106af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 3984.165234] ^ [ 3984.166235] ffff88800106af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.167254] ffff88800106b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.168267] ================================================================== [ 3984.169472] ok 17 - kmalloc_oob_in_memset [ 3984.169824] ================================================================== [ 3984.171978] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 3984.173495] Write of size 2 at addr ffff88800106a077 by task kunit_try_catch/116244 [ 3984.175146] CPU: 0 PID: 116244 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.177033] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.177833] Call Trace: [ 3984.178210] [ 3984.178531] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 3984.179353] dump_stack_lvl+0x57/0x81 [ 3984.179897] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.180728] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 3984.181542] print_report.cold+0x5c/0x237 [ 3984.182130] kasan_report+0xc9/0x100 [ 3984.182654] ? kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 3984.183474] kasan_check_range+0xfd/0x1e0 [ 3984.184055] memset+0x20/0x50 [ 3984.184500] kmalloc_oob_memset_2+0x1b6/0x290 [test_kasan] [ 3984.185297] ? kmalloc_oob_memset_4+0x290/0x290 [test_kasan] [ 3984.186103] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.186729] ? do_raw_spin_lock+0x270/0x270 [ 3984.187339] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.188127] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.188832] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.189561] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.190270] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.190986] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.191834] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.192568] kthread+0x2a4/0x350 [ 3984.193046] ? kthread_complete_and_exit+0x20/0x20 [ 3984.193726] ret_from_fork+0x1f/0x30 [ 3984.194266] [ 3984.194829] Allocated by task 116244: [ 3984.195378] kasan_save_stack+0x1e/0x40 [ 3984.195935] __kasan_kmalloc+0x81/0xa0 [ 3984.196514] kmalloc_oob_memset_2+0x9c/0x290 [test_kasan] [ 3984.197509] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.198413] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.199525] kthread+0x2a4/0x350 [ 3984.200145] ret_from_fork+0x1f/0x30 [ 3984.201149] The buggy address belongs to the object at ffff88800106a000 which belongs to the cache kmalloc-128 of size 128 [ 3984.203358] The buggy address is located 119 bytes inside of 128-byte region [ffff88800106a000, ffff88800106a080) [ 3984.205744] The buggy address belongs to the physical page: [ 3984.206755] page:0000000024b36a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a [ 3984.208403] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.209643] raw: 000fffffc0000200 ffffea00009c8e80 dead000000000003 ffff8881000418c0 [ 3984.210741] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.211856] page dumped because: kasan: bad access detected [ 3984.212906] Memory state around the buggy address: [ 3984.213648] ffff888001069f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.214726] ffff888001069f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.215772] >ffff88800106a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 3984.217059] ^ [ 3984.218087] ffff88800106a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.219084] ffff88800106a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.220076] ================================================================== [ 3984.221270] ok 18 - kmalloc_oob_memset_2 [ 3984.221531] ================================================================== [ 3984.223161] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 3984.224307] Write of size 4 at addr ffff88800106ab75 by task kunit_try_catch/116245 [ 3984.225603] CPU: 0 PID: 116245 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.227476] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.228281] Call Trace: [ 3984.228641] [ 3984.228958] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 3984.229757] dump_stack_lvl+0x57/0x81 [ 3984.230291] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.231099] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 3984.231876] print_report.cold+0x5c/0x237 [ 3984.232442] kasan_report+0xc9/0x100 [ 3984.232954] ? kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 3984.233751] kasan_check_range+0xfd/0x1e0 [ 3984.234322] memset+0x20/0x50 [ 3984.234761] kmalloc_oob_memset_4+0x1b6/0x290 [test_kasan] [ 3984.235532] ? kmalloc_oob_memset_8+0x290/0x290 [test_kasan] [ 3984.236328] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.236946] ? do_raw_spin_lock+0x270/0x270 [ 3984.237547] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.238329] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.239026] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.239745] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.240441] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.241152] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.242009] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.242735] kthread+0x2a4/0x350 [ 3984.243209] ? kthread_complete_and_exit+0x20/0x20 [ 3984.243878] ret_from_fork+0x1f/0x30 [ 3984.244408] [ 3984.244973] Allocated by task 116245: [ 3984.245497] kasan_save_stack+0x1e/0x40 [ 3984.246039] __kasan_kmalloc+0x81/0xa0 [ 3984.246605] kmalloc_oob_memset_4+0x9c/0x290 [test_kasan] [ 3984.247350] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.248024] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.248859] kthread+0x2a4/0x350 [ 3984.249328] ret_from_fork+0x1f/0x30 [ 3984.250076] The buggy address belongs to the object at ffff88800106ab00 which belongs to the cache kmalloc-128 of size 128 [ 3984.251756] The buggy address is located 117 bytes inside of 128-byte region [ffff88800106ab00, ffff88800106ab80) [ 3984.253539] The buggy address belongs to the physical page: [ 3984.254305] page:0000000024b36a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a [ 3984.255559] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.256507] raw: 000fffffc0000200 ffffea00009c8e80 dead000000000003 ffff8881000418c0 [ 3984.257571] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.258635] page dumped because: kasan: bad access detected [ 3984.259702] Memory state around the buggy address: [ 3984.260367] ffff88800106aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.261359] ffff88800106aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.262351] >ffff88800106ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 3984.263343] ^ [ 3984.264333] ffff88800106ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.265326] ffff88800106ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.266316] ================================================================== [ 3984.268390] ok 19 - kmalloc_oob_memset_4 [ 3984.269193] ================================================================== [ 3984.270842] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 3984.272000] Write of size 8 at addr ffff88802723a571 by task kunit_try_catch/116246 [ 3984.273312] CPU: 0 PID: 116246 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.275187] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.275999] Call Trace: [ 3984.276367] [ 3984.276686] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 3984.277498] dump_stack_lvl+0x57/0x81 [ 3984.278031] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.278851] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 3984.279658] print_report.cold+0x5c/0x237 [ 3984.280247] kasan_report+0xc9/0x100 [ 3984.280775] ? kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 3984.281586] kasan_check_range+0xfd/0x1e0 [ 3984.282162] memset+0x20/0x50 [ 3984.282603] kmalloc_oob_memset_8+0x1b6/0x290 [test_kasan] [ 3984.283387] ? kmalloc_oob_memset_16+0x290/0x290 [test_kasan] [ 3984.284199] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.284865] ? do_raw_spin_lock+0x270/0x270 [ 3984.285478] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.286270] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.286973] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.287706] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.288400] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.289122] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.289981] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.290721] kthread+0x2a4/0x350 [ 3984.291199] ? kthread_complete_and_exit+0x20/0x20 [ 3984.291883] ret_from_fork+0x1f/0x30 [ 3984.292413] [ 3984.292978] Allocated by task 116246: [ 3984.293509] kasan_save_stack+0x1e/0x40 [ 3984.294056] __kasan_kmalloc+0x81/0xa0 [ 3984.294604] kmalloc_oob_memset_8+0x9c/0x290 [test_kasan] [ 3984.295360] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.296053] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.296906] kthread+0x2a4/0x350 [ 3984.297380] ret_from_fork+0x1f/0x30 [ 3984.298146] The buggy address belongs to the object at ffff88802723a500 which belongs to the cache kmalloc-128 of size 128 [ 3984.299844] The buggy address is located 113 bytes inside of 128-byte region [ffff88802723a500, ffff88802723a580) [ 3984.301691] The buggy address belongs to the physical page: [ 3984.302475] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3984.303750] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.304709] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3984.305770] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.306907] page dumped because: kasan: bad access detected [ 3984.307960] Memory state around the buggy address: [ 3984.308635] ffff88802723a400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.309644] ffff88802723a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.310652] >ffff88802723a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 3984.311649] ^ [ 3984.312639] ffff88802723a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.313648] ffff88802723a600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.314704] ================================================================== [ 3984.315871] ok 20 - kmalloc_oob_memset_8 [ 3984.316147] ================================================================== [ 3984.317813] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 3984.318988] Write of size 16 at addr ffff88802723a169 by task kunit_try_catch/116247 [ 3984.320305] CPU: 0 PID: 116247 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.322189] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.323017] Call Trace: [ 3984.323394] [ 3984.323719] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 3984.324528] dump_stack_lvl+0x57/0x81 [ 3984.325056] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.325879] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 3984.326697] print_report.cold+0x5c/0x237 [ 3984.327277] kasan_report+0xc9/0x100 [ 3984.327791] ? kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 3984.328617] kasan_check_range+0xfd/0x1e0 [ 3984.329189] memset+0x20/0x50 [ 3984.329638] kmalloc_oob_memset_16+0x1b6/0x290 [test_kasan] [ 3984.330420] ? kmalloc_uaf_memset+0x280/0x280 [test_kasan] [ 3984.331203] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.331827] ? do_raw_spin_lock+0x270/0x270 [ 3984.332438] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.333231] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.333935] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.334656] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.335360] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.336068] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.336931] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.337657] kthread+0x2a4/0x350 [ 3984.338139] ? kthread_complete_and_exit+0x20/0x20 [ 3984.338816] ret_from_fork+0x1f/0x30 [ 3984.339344] [ 3984.339919] Allocated by task 116247: [ 3984.340443] kasan_save_stack+0x1e/0x40 [ 3984.341002] __kasan_kmalloc+0x81/0xa0 [ 3984.341648] kmalloc_oob_memset_16+0x9c/0x290 [test_kasan] [ 3984.342475] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.343179] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.344040] kthread+0x2a4/0x350 [ 3984.344515] ret_from_fork+0x1f/0x30 [ 3984.345275] The buggy address belongs to the object at ffff88802723a100 which belongs to the cache kmalloc-128 of size 128 [ 3984.346976] The buggy address is located 105 bytes inside of 128-byte region [ffff88802723a100, ffff88802723a180) [ 3984.348820] The buggy address belongs to the physical page: [ 3984.349602] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3984.350874] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.351837] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3984.352914] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3984.353987] page dumped because: kasan: bad access detected [ 3984.355004] Memory state around the buggy address: [ 3984.355726] ffff88802723a000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.356741] ffff88802723a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.357749] >ffff88802723a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 3984.358761] ^ [ 3984.359754] ffff88802723a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.360749] ffff88802723a200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3984.361759] ================================================================== [ 3984.363029] ok 21 - kmalloc_oob_memset_16 [ 3984.363301] ================================================================== [ 3984.364955] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 3984.366248] Read of size 18446744073709551614 at addr ffff88809d22aa84 by task kunit_try_catch/116248 [ 3984.367792] CPU: 0 PID: 116248 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.369684] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.370507] Call Trace: [ 3984.370872] [ 3984.371197] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 3984.372104] dump_stack_lvl+0x57/0x81 [ 3984.372642] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.373459] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 3984.374367] print_report.cold+0x5c/0x237 [ 3984.374941] kasan_report+0xc9/0x100 [ 3984.375462] ? kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 3984.376375] kasan_check_range+0xfd/0x1e0 [ 3984.376942] memmove+0x20/0x60 [ 3984.377420] kmalloc_memmove_negative_size+0x1c4/0x290 [test_kasan] [ 3984.378297] ? kmalloc_memmove_invalid_size+0x2a0/0x2a0 [test_kasan] [ 3984.379196] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.379824] ? do_raw_spin_lock+0x270/0x270 [ 3984.380432] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.381217] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.381929] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.382648] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.383355] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.384066] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.384926] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.385659] kthread+0x2a4/0x350 [ 3984.386135] ? kthread_complete_and_exit+0x20/0x20 [ 3984.386820] ret_from_fork+0x1f/0x30 [ 3984.387366] [ 3984.387932] Allocated by task 116248: [ 3984.388490] kasan_save_stack+0x1e/0x40 [ 3984.389044] __kasan_kmalloc+0x81/0xa0 [ 3984.389578] kmalloc_memmove_negative_size+0x9c/0x290 [test_kasan] [ 3984.390453] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.391148] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.392012] kthread+0x2a4/0x350 [ 3984.392484] ret_from_fork+0x1f/0x30 [ 3984.393245] The buggy address belongs to the object at ffff88809d22aa80 which belongs to the cache kmalloc-64 of size 64 [ 3984.394913] The buggy address is located 4 bytes inside of 64-byte region [ffff88809d22aa80, ffff88809d22aac0) [ 3984.396714] The buggy address belongs to the physical page: [ 3984.397495] page:000000008f586a5f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9d22a [ 3984.398748] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.399701] raw: 000fffffc0000200 ffffea000229f040 dead000000000006 ffff888100041640 [ 3984.400771] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 3984.401833] page dumped because: kasan: bad access detected [ 3984.402838] Memory state around the buggy address: [ 3984.403518] ffff88809d22a980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.404527] ffff88809d22aa00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3984.405517] >ffff88809d22aa80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.406516] ^ [ 3984.406977] ffff88809d22ab00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.407985] ffff88809d22ab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3984.408993] ================================================================== [ 3984.410102] ok 22 - kmalloc_memmove_negative_size [ 3984.410397] ================================================================== [ 3984.412139] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 3984.413474] Read of size 64 at addr ffff88809d22a604 by task kunit_try_catch/116249 [ 3984.415067] CPU: 0 PID: 116249 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.417246] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.418346] Call Trace: [ 3984.418835] [ 3984.419295] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 3984.420515] dump_stack_lvl+0x57/0x81 [ 3984.421220] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.422045] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 3984.422932] print_report.cold+0x5c/0x237 [ 3984.423514] kasan_report+0xc9/0x100 [ 3984.424028] ? kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 3984.424921] kasan_check_range+0xfd/0x1e0 [ 3984.425500] memmove+0x20/0x60 [ 3984.425949] kmalloc_memmove_invalid_size+0x1cf/0x2a0 [test_kasan] [ 3984.426814] ? kmalloc_oob_in_memset+0x280/0x280 [test_kasan] [ 3984.427631] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.428262] ? do_raw_spin_lock+0x270/0x270 [ 3984.428857] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.429641] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.430361] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.431048] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.431773] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.432627] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.433352] kthread+0x2a4/0x350 [ 3984.433829] ? kthread_complete_and_exit+0x20/0x20 [ 3984.434512] ret_from_fork+0x1f/0x30 [ 3984.435038] [ 3984.435616] Allocated by task 116249: [ 3984.436147] kasan_save_stack+0x1e/0x40 [ 3984.436691] __kasan_kmalloc+0x81/0xa0 [ 3984.437224] kmalloc_memmove_invalid_size+0xac/0x2a0 [test_kasan] [ 3984.438069] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.438758] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.439611] kthread+0x2a4/0x350 [ 3984.440079] ret_from_fork+0x1f/0x30 [ 3984.440851] The buggy address belongs to the object at ffff88809d22a600 which belongs to the cache kmalloc-64 of size 64 [ 3984.442520] The buggy address is located 4 bytes inside of 64-byte region [ffff88809d22a600, ffff88809d22a640) [ 3984.444327] The buggy address belongs to the physical page: [ 3984.445098] page:000000008f586a5f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9d22a [ 3984.446373] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.447331] raw: 000fffffc0000200 ffffea000229f040 dead000000000006 ffff888100041640 [ 3984.448397] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 3984.449462] page dumped because: kasan: bad access detected [ 3984.450472] Memory state around the buggy address: [ 3984.451149] ffff88809d22a500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.452147] ffff88809d22a580: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.453145] >ffff88809d22a600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.454139] ^ [ 3984.454873] ffff88809d22a680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.455870] ffff88809d22a700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.456866] ================================================================== [ 3984.458089] ok 23 - kmalloc_memmove_invalid_size [ 3984.458375] ================================================================== [ 3984.460085] BUG: KASAN: use-after-free in kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 3984.461090] Read of size 1 at addr ffff8880018eade8 by task kunit_try_catch/116250 [ 3984.462377] CPU: 0 PID: 116250 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.464244] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.465042] Call Trace: [ 3984.465408] [ 3984.465724] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 3984.466430] dump_stack_lvl+0x57/0x81 [ 3984.466962] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.467781] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 3984.468476] print_report.cold+0x5c/0x237 [ 3984.469053] kasan_report+0xc9/0x100 [ 3984.469575] ? kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 3984.470273] kmalloc_uaf+0x286/0x2b0 [test_kasan] [ 3984.470939] ? kmalloc_uaf2+0x430/0x430 [test_kasan] [ 3984.471635] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.472260] ? do_raw_spin_lock+0x270/0x270 [ 3984.472853] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.473629] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.474348] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.475031] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.475740] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.476589] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.477305] kthread+0x2a4/0x350 [ 3984.477772] ? kthread_complete_and_exit+0x20/0x20 [ 3984.478445] ret_from_fork+0x1f/0x30 [ 3984.478968] [ 3984.479539] Allocated by task 116250: [ 3984.480059] kasan_save_stack+0x1e/0x40 [ 3984.480610] __kasan_kmalloc+0x81/0xa0 [ 3984.481150] kmalloc_uaf+0x98/0x2b0 [test_kasan] [ 3984.481800] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.482486] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.483341] kthread+0x2a4/0x350 [ 3984.483810] ret_from_fork+0x1f/0x30 [ 3984.484564] Freed by task 116250: [ 3984.485041] kasan_save_stack+0x1e/0x40 [ 3984.485766] kasan_set_track+0x21/0x30 [ 3984.486526] kasan_set_free_info+0x20/0x40 [ 3984.487328] __kasan_slab_free+0x108/0x170 [ 3984.488153] slab_free_freelist_hook+0x11d/0x1d0 [ 3984.489088] kfree+0xe2/0x3c0 [ 3984.489706] kmalloc_uaf+0x12b/0x2b0 [test_kasan] [ 3984.490662] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.491645] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.492851] kthread+0x2a4/0x350 [ 3984.493528] ret_from_fork+0x1f/0x30 [ 3984.494624] The buggy address belongs to the object at ffff8880018eade0 which belongs to the cache kmalloc-16 of size 16 [ 3984.497004] The buggy address is located 8 bytes inside of 16-byte region [ffff8880018eade0, ffff8880018eadf0) [ 3984.499605] The buggy address belongs to the physical page: [ 3984.500714] page:00000000eef87173 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x18ea [ 3984.502526] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.503903] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3984.505424] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3984.506951] page dumped because: kasan: bad access detected [ 3984.508420] Memory state around the buggy address: [ 3984.509393] ffff8880018eac80: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.510800] ffff8880018ead00: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3984.512247] >ffff8880018ead80: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3984.513681] ^ [ 3984.515005] ffff8880018eae00: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 3984.516445] ffff8880018eae80: fa fb fc fc 00 00 fc fc fb fb fc fc 00 00 fc fc [ 3984.517869] ================================================================== [ 3984.519486] ok 24 - kmalloc_uaf [ 3984.520177] ================================================================== [ 3984.522343] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 3984.523886] Write of size 33 at addr ffff88808a7c1100 by task kunit_try_catch/116251 [ 3984.525766] CPU: 0 PID: 116251 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.528433] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.529579] Call Trace: [ 3984.530097] [ 3984.530556] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 3984.531654] dump_stack_lvl+0x57/0x81 [ 3984.532422] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.533587] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 3984.534688] print_report.cold+0x5c/0x237 [ 3984.535521] kasan_report+0xc9/0x100 [ 3984.536273] ? kmalloc_uaf_memset+0xc1/0x280 [test_kasan] [ 3984.537345] ? kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 3984.538448] kasan_check_range+0xfd/0x1e0 [ 3984.539282] memset+0x20/0x50 [ 3984.539890] kmalloc_uaf_memset+0x1b4/0x280 [test_kasan] [ 3984.540976] ? kmem_cache_accounted+0x170/0x170 [test_kasan] [ 3984.542138] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.543021] ? do_raw_spin_lock+0x270/0x270 [ 3984.543882] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.545006] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.546047] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.547058] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.548089] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.549321] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.550367] kthread+0x2a4/0x350 [ 3984.551041] ? kthread_complete_and_exit+0x20/0x20 [ 3984.552027] ret_from_fork+0x1f/0x30 [ 3984.552798] [ 3984.553648] Allocated by task 116251: [ 3984.554423] kasan_save_stack+0x1e/0x40 [ 3984.555212] __kasan_kmalloc+0x81/0xa0 [ 3984.555974] kmalloc_uaf_memset+0x9a/0x280 [test_kasan] [ 3984.557028] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.558045] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.559270] kthread+0x2a4/0x350 [ 3984.559949] ret_from_fork+0x1f/0x30 [ 3984.561042] Freed by task 116251: [ 3984.561739] kasan_save_stack+0x1e/0x40 [ 3984.562517] kasan_set_track+0x21/0x30 [ 3984.563281] kasan_set_free_info+0x20/0x40 [ 3984.564099] __kasan_slab_free+0x108/0x170 [ 3984.564935] slab_free_freelist_hook+0x11d/0x1d0 [ 3984.565891] kfree+0xe2/0x3c0 [ 3984.566517] kmalloc_uaf_memset+0x137/0x280 [test_kasan] [ 3984.567603] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.568590] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.569811] kthread+0x2a4/0x350 [ 3984.570491] ret_from_fork+0x1f/0x30 [ 3984.571581] The buggy address belongs to the object at ffff88808a7c1100 which belongs to the cache kmalloc-64 of size 64 [ 3984.573969] The buggy address is located 0 bytes inside of 64-byte region [ffff88808a7c1100, ffff88808a7c1140) [ 3984.576542] The buggy address belongs to the physical page: [ 3984.577645] page:00000000a4ebc60e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7c1 [ 3984.579438] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.580803] raw: 000fffffc0000200 ffffea000427f980 dead000000000005 ffff888100041640 [ 3984.582335] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 3984.583830] page dumped because: kasan: bad access detected [ 3984.585274] Memory state around the buggy address: [ 3984.586229] ffff88808a7c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3984.587654] ffff88808a7c1080: 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc [ 3984.589081] >ffff88808a7c1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3984.590501] ^ [ 3984.591178] ffff88808a7c1180: 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc [ 3984.592606] ffff88808a7c1200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.594046] ================================================================== [ 3984.595649] ok 25 - kmalloc_uaf_memset [ 3984.596325] ================================================================== [ 3984.598589] BUG: KASAN: use-after-free in kmalloc_uaf2+0x402/0x430 [test_kasan] [ 3984.600055] Read of size 1 at addr ffff88808a7c1f28 by task kunit_try_catch/116252 [ 3984.601912] CPU: 0 PID: 116252 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.604569] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.605740] Call Trace: [ 3984.606272] [ 3984.606723] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 3984.607733] dump_stack_lvl+0x57/0x81 [ 3984.608493] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.609526] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 3984.610234] print_report.cold+0x5c/0x237 [ 3984.610821] kasan_report+0xc9/0x100 [ 3984.611350] ? kmalloc_uaf2+0x402/0x430 [test_kasan] [ 3984.612052] kmalloc_uaf2+0x402/0x430 [test_kasan] [ 3984.612743] ? kfree_via_page+0x290/0x290 [test_kasan] [ 3984.613466] ? rcu_read_lock_sched_held+0x12/0x80 [ 3984.614135] ? lock_acquire+0x4ea/0x620 [ 3984.614686] ? rcu_read_unlock+0x40/0x40 [ 3984.615252] ? rcu_read_unlock+0x40/0x40 [ 3984.615806] ? rcu_read_lock_sched_held+0x12/0x80 [ 3984.616480] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.617264] ? do_raw_spin_lock+0x270/0x270 [ 3984.617859] ? trace_hardirqs_on+0x2d/0x160 [ 3984.618447] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3984.619145] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.619863] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.620558] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.621278] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.622137] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.622860] kthread+0x2a4/0x350 [ 3984.623339] ? kthread_complete_and_exit+0x20/0x20 [ 3984.624017] ret_from_fork+0x1f/0x30 [ 3984.624552] [ 3984.625124] Allocated by task 116252: [ 3984.625647] kasan_save_stack+0x1e/0x40 [ 3984.626203] __kasan_kmalloc+0x81/0xa0 [ 3984.626735] kmalloc_uaf2+0xad/0x430 [test_kasan] [ 3984.627404] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.628093] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.628946] kthread+0x2a4/0x350 [ 3984.629421] ret_from_fork+0x1f/0x30 [ 3984.630178] Freed by task 116252: [ 3984.630653] kasan_save_stack+0x1e/0x40 [ 3984.631202] kasan_set_track+0x21/0x30 [ 3984.631735] kasan_set_free_info+0x20/0x40 [ 3984.632316] __kasan_slab_free+0x108/0x170 [ 3984.632892] slab_free_freelist_hook+0x11d/0x1d0 [ 3984.633547] kfree+0xe2/0x3c0 [ 3984.633989] kmalloc_uaf2+0x144/0x430 [test_kasan] [ 3984.634673] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.635416] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.636387] kthread+0x2a4/0x350 [ 3984.637010] ret_from_fork+0x1f/0x30 [ 3984.637832] The buggy address belongs to the object at ffff88808a7c1f00 which belongs to the cache kmalloc-64 of size 64 [ 3984.639681] The buggy address is located 40 bytes inside of 64-byte region [ffff88808a7c1f00, ffff88808a7c1f40) [ 3984.641545] The buggy address belongs to the physical page: [ 3984.642410] page:00000000a4ebc60e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7c1 [ 3984.643981] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.645246] raw: 000fffffc0000200 ffffea000427f980 dead000000000005 ffff888100041640 [ 3984.646418] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 [ 3984.647711] page dumped because: kasan: bad access detected [ 3984.648751] Memory state around the buggy address: [ 3984.649446] ffff88808a7c1e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 3984.650539] ffff88808a7c1e80: 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc [ 3984.651623] >ffff88808a7c1f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3984.652667] ^ [ 3984.653312] ffff88808a7c1f80: 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc [ 3984.654303] ffff88808a7c2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3984.655295] ================================================================== [ 3984.657763] ok 26 - kmalloc_uaf2 [ 3984.659676] ok 27 - kfree_via_page [ 3984.660477] ok 28 - kfree_via_phys [ 3984.661615] ================================================================== [ 3984.663168] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 3984.664252] Read of size 1 at addr ffff8880024efa10 by task kunit_try_catch/116256 [ 3984.665532] CPU: 0 PID: 116256 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3984.667400] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3984.668203] Call Trace: [ 3984.668562] [ 3984.668880] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 3984.669607] dump_stack_lvl+0x57/0x81 [ 3984.670146] print_address_description.constprop.0+0x1f/0x1e0 [ 3984.670955] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 3984.671759] print_report.cold+0x5c/0x237 [ 3984.672342] kasan_report+0xc9/0x100 [ 3984.672890] ? kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 3984.673626] kmem_cache_oob+0x2d4/0x2e0 [test_kasan] [ 3984.674424] ? kmem_cache_double_free+0x280/0x280 [test_kasan] [ 3984.675246] ? do_raw_spin_trylock+0xb5/0x180 [ 3984.675866] ? do_raw_spin_lock+0x270/0x270 [ 3984.676464] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3984.677258] ? kunit_add_resource+0x197/0x280 [kunit] [ 3984.678004] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.678914] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3984.679803] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.680822] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3984.681643] kthread+0x2a4/0x350 [ 3984.682232] ? kthread_complete_and_exit+0x20/0x20 [ 3984.682924] ret_from_fork+0x1f/0x30 [ 3984.683626] [ 3984.684378] Allocated by task 116256: [ 3984.684903] kasan_save_stack+0x1e/0x40 [ 3984.685456] __kasan_slab_alloc+0x66/0x80 [ 3984.686025] kmem_cache_alloc+0x161/0x310 [ 3984.686596] kmem_cache_oob+0x121/0x2e0 [test_kasan] [ 3984.687308] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3984.688036] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3984.688894] kthread+0x2a4/0x350 [ 3984.689366] ret_from_fork+0x1f/0x30 [ 3984.690121] The buggy address belongs to the object at ffff8880024ef948 which belongs to the cache test_cache of size 200 [ 3984.691810] The buggy address is located 0 bytes to the right of 200-byte region [ffff8880024ef948, ffff8880024efa10) [ 3984.693672] The buggy address belongs to the physical page: [ 3984.694449] page:00000000d619b1fa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x24ef [ 3984.695710] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3984.696664] raw: 000fffffc0000200 0000000000000000 dead000000000122 ffff888003939dc0 [ 3984.697733] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 3984.698797] page dumped because: kasan: bad access detected [ 3984.699812] Memory state around the buggy address: [ 3984.700490] ffff8880024ef900: fc fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 3984.701490] ffff8880024ef980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3984.702477] >ffff8880024efa00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.703444] ^ [ 3984.703963] ffff8880024efa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.704960] ffff8880024efb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3984.705953] ================================================================== [ 3984.721046] ok 29 - kmem_cache_oob [ 3985.246494] ok 30 - kmem_cache_accounted [ 3985.254255] ok 31 - kmem_cache_bulk [ 3985.255269] ================================================================== [ 3985.269237] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 3985.270461] Read of size 1 at addr ffffffffc17dc90d by task kunit_try_catch/116260 [ 3985.271724] CPU: 1 PID: 116260 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.273576] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.274369] Call Trace: [ 3985.274721] [ 3985.275053] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 3985.275859] dump_stack_lvl+0x57/0x81 [ 3985.276380] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.277184] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 3985.277993] print_report.cold+0x5c/0x237 [ 3985.278557] kasan_report+0xc9/0x100 [ 3985.279076] ? kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 3985.279883] kasan_global_oob_right+0x1df/0x1f0 [test_kasan] [ 3985.280661] ? kasan_stack_oob+0x200/0x200 [test_kasan] [ 3985.281392] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.282324] ? do_raw_spin_lock+0x270/0x270 [ 3985.282999] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.283764] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.284473] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.285173] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.285879] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.286709] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.287424] kthread+0x2a4/0x350 [ 3985.287897] ? kthread_complete_and_exit+0x20/0x20 [ 3985.288563] ret_from_fork+0x1f/0x30 [ 3985.289097] [ 3985.289648] The buggy address belongs to the variable: [ 3985.290366] global_array+0xd/0xfffffffffffe5700 [test_kasan] [ 3985.291405] Memory state around the buggy address: [ 3985.292079] ffffffffc17dc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.293065] ffffffffc17dc880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.294044] >ffffffffc17dc900: 00 02 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 3985.295031] ^ [ 3985.295520] ffffffffc17dc980: 02 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 f9 f9 [ 3985.296503] ffffffffc17dca00: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 3985.297488] ================================================================== [ 3985.298667] ok 32 - kasan_global_oob_right [ 3985.301839] ok 33 - kasan_global_oob_left # SKIP Test requires CONFIG_CC_IS_CLANG=y [ 3985.303217] ================================================================== [ 3985.305519] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 3985.306603] Read of size 1 at addr ffffc9000131fe7a by task kunit_try_catch/116262 [ 3985.307885] CPU: 0 PID: 116262 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.309724] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.310515] Call Trace: [ 3985.310887] [ 3985.311201] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 3985.311936] dump_stack_lvl+0x57/0x81 [ 3985.312465] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.313272] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 3985.313994] print_report.cold+0x5c/0x237 [ 3985.314558] kasan_report+0xc9/0x100 [ 3985.315086] ? kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 3985.315810] kasan_stack_oob+0x1eb/0x200 [test_kasan] [ 3985.316509] ? match_all_mem_tag+0x20/0x20 [test_kasan] [ 3985.317240] ? rcu_read_unlock+0x40/0x40 [ 3985.317794] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.318447] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.319076] ? do_raw_spin_lock+0x270/0x270 [ 3985.319653] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.320429] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3985.321128] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.321838] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.322521] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.323245] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.324093] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.324815] kthread+0x2a4/0x350 [ 3985.325280] ? kthread_complete_and_exit+0x20/0x20 [ 3985.325950] ret_from_fork+0x1f/0x30 [ 3985.326469] [ 3985.327041] The buggy address belongs to stack of task kunit_try_catch/116262 [ 3985.328013] and is located at offset 266 in frame: [ 3985.328681] kasan_stack_oob+0x0/0x200 [test_kasan] [ 3985.329600] This frame has 4 objects: [ 3985.330123] [48, 56) 'array' [ 3985.330128] [80, 128) '__assertion' [ 3985.330548] [160, 224) '__assertion' [ 3985.331069] [256, 266) 'stack_array' [ 3985.332333] The buggy address belongs to the virtual mapping at [ffffc90001318000, ffffc90001321000) created by: dup_task_struct+0x5e/0x5a0 [ 3985.334643] The buggy address belongs to the physical page: [ 3985.335418] page:000000000e10f412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x44759 [ 3985.336661] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 3985.337547] raw: 000fffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 3985.338593] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3985.339646] page dumped because: kasan: bad access detected [ 3985.340639] Memory state around the buggy address: [ 3985.341310] ffffc9000131fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 [ 3985.342292] ffffc9000131fd80: f1 f1 f1 f1 00 f2 f2 f2 00 00 00 00 00 00 f2 f2 [ 3985.343281] >ffffc9000131fe00: f2 f2 00 00 00 00 00 00 00 00 f2 f2 f2 f2 00 02 [ 3985.344278] ^ [ 3985.345263] ffffc9000131fe80: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.346248] ffffc9000131ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.347243] ================================================================== [ 3985.348402] ok 34 - kasan_stack_oob [ 3985.348806] ================================================================== [ 3985.350853] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 3985.352413] Read of size 1 at addr ffffc900012efd1f by task kunit_try_catch/116263 [ 3985.354098] CPU: 0 PID: 116263 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.356515] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.357573] Call Trace: [ 3985.358058] [ 3985.358473] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 3985.359418] dump_stack_lvl+0x57/0x81 [ 3985.359954] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.360746] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 3985.361558] print_report.cold+0x5c/0x237 [ 3985.362137] kasan_report+0xc9/0x100 [ 3985.362641] ? kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 3985.363441] kasan_alloca_oob_left+0x27d/0x2a0 [test_kasan] [ 3985.364225] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.364894] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.365545] ? lock_acquire+0x4ea/0x620 [ 3985.366102] ? kasan_alloca_oob_right+0x290/0x290 [test_kasan] [ 3985.366917] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.367571] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.368194] ? do_raw_spin_lock+0x270/0x270 [ 3985.368788] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.369558] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3985.370257] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.370968] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.371650] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.372366] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.373224] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.373942] kthread+0x2a4/0x350 [ 3985.374406] ? kthread_complete_and_exit+0x20/0x20 [ 3985.375083] ret_from_fork+0x1f/0x30 [ 3985.375597] [ 3985.376173] The buggy address belongs to stack of task kunit_try_catch/116263 [ 3985.377392] The buggy address belongs to the virtual mapping at [ffffc900012e8000, ffffc900012f1000) created by: dup_task_struct+0x5e/0x5a0 [ 3985.379696] The buggy address belongs to the physical page: [ 3985.380466] page:000000005db04381 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47f3 [ 3985.381720] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 3985.382602] raw: 000fffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 3985.383649] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3985.384702] page dumped because: kasan: bad access detected [ 3985.385707] Memory state around the buggy address: [ 3985.386379] ffffc900012efc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.387363] ffffc900012efc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.388347] >ffffc900012efd00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00 [ 3985.389334] ^ [ 3985.389895] ffffc900012efd80: f1 f1 f1 f1 04 f2 00 f2 f2 f2 00 00 00 00 00 00 [ 3985.390878] ffffc900012efe00: f2 f2 f2 f2 00 00 00 00 00 00 00 00 f3 f3 f3 f3 [ 3985.391861] ================================================================== [ 3985.393089] ok 35 - kasan_alloca_oob_left [ 3985.393494] ================================================================== [ 3985.395626] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 3985.397199] Read of size 1 at addr ffffc9000131fd2a by task kunit_try_catch/116264 [ 3985.398951] CPU: 0 PID: 116264 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.401385] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.402270] Call Trace: [ 3985.402622] [ 3985.402944] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 3985.403746] dump_stack_lvl+0x57/0x81 [ 3985.404276] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.405086] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 3985.405903] print_report.cold+0x5c/0x237 [ 3985.406464] kasan_report+0xc9/0x100 [ 3985.406977] ? kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 3985.407790] kasan_alloca_oob_right+0x275/0x290 [test_kasan] [ 3985.408567] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.409240] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.409901] ? lock_acquire+0x4ea/0x620 [ 3985.410440] ? ksize_unpoisons_memory+0x300/0x300 [test_kasan] [ 3985.411248] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.411903] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.412511] ? do_raw_spin_lock+0x270/0x270 [ 3985.413115] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.413884] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3985.414565] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.415276] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.415960] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.416656] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.417498] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.418218] kthread+0x2a4/0x350 [ 3985.418674] ? kthread_complete_and_exit+0x20/0x20 [ 3985.419346] ret_from_fork+0x1f/0x30 [ 3985.419887] [ 3985.420441] The buggy address belongs to stack of task kunit_try_catch/116264 [ 3985.421671] The buggy address belongs to the virtual mapping at [ffffc90001318000, ffffc90001321000) created by: dup_task_struct+0x5e/0x5a0 [ 3985.423976] The buggy address belongs to the physical page: [ 3985.424729] page:000000000e10f412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x44759 [ 3985.425993] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 3985.426876] raw: 000fffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 3985.427925] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3985.428971] page dumped because: kasan: bad access detected [ 3985.429988] Memory state around the buggy address: [ 3985.430645] ffffc9000131fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.431625] ffffc9000131fc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.432614] >ffffc9000131fd00: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00 [ 3985.433599] ^ [ 3985.434238] ffffc9000131fd80: f1 f1 f1 f1 04 f2 00 f2 f2 f2 00 00 00 00 00 00 [ 3985.435228] ffffc9000131fe00: f2 f2 f2 f2 00 00 00 00 00 00 00 00 f3 f3 f3 f3 [ 3985.436216] ================================================================== [ 3985.437291] ok 36 - kasan_alloca_oob_right [ 3985.437701] ================================================================== [ 3985.439847] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 3985.441061] Read of size 1 at addr ffff88802723a880 by task kunit_try_catch/116265 [ 3985.442307] CPU: 0 PID: 116265 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.444124] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.444900] Call Trace: [ 3985.445257] [ 3985.445568] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 3985.446365] dump_stack_lvl+0x57/0x81 [ 3985.446879] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.447670] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 3985.448465] print_report.cold+0x5c/0x237 [ 3985.449021] kasan_report+0xc9/0x100 [ 3985.449528] ? ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 3985.450331] ksize_unpoisons_memory+0x2cf/0x300 [test_kasan] [ 3985.451109] ? ksize_uaf+0x4a0/0x4a0 [test_kasan] [ 3985.451759] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.452371] ? do_raw_spin_lock+0x270/0x270 [ 3985.452954] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.453717] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.454422] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.455101] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.455791] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.456628] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.457334] kthread+0x2a4/0x350 [ 3985.457789] ? kthread_complete_and_exit+0x20/0x20 [ 3985.458448] ret_from_fork+0x1f/0x30 [ 3985.458961] [ 3985.459515] Allocated by task 116265: [ 3985.460025] kasan_save_stack+0x1e/0x40 [ 3985.460561] __kasan_kmalloc+0x81/0xa0 [ 3985.461086] ksize_unpoisons_memory+0x9a/0x300 [test_kasan] [ 3985.461835] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.462505] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.463331] kthread+0x2a4/0x350 [ 3985.463783] ret_from_fork+0x1f/0x30 [ 3985.464517] The buggy address belongs to the object at ffff88802723a800 which belongs to the cache kmalloc-128 of size 128 [ 3985.466163] The buggy address is located 0 bytes to the right of 128-byte region [ffff88802723a800, ffff88802723a880) [ 3985.467980] The buggy address belongs to the physical page: [ 3985.468737] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3985.469980] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.470907] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3985.471939] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3985.472983] page dumped because: kasan: bad access detected [ 3985.473972] Memory state around the buggy address: [ 3985.474632] ffff88802723a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.475601] ffff88802723a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.476568] >ffff88802723a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.477540] ^ [ 3985.477994] ffff88802723a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.478963] ffff88802723a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.479934] ================================================================== [ 3985.481166] ok 37 - ksize_unpoisons_memory [ 3985.481483] ================================================================== [ 3985.483081] BUG: KASAN: use-after-free in ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.484037] Read of size 1 at addr ffff88802723a300 by task kunit_try_catch/116266 [ 3985.485281] CPU: 0 PID: 116266 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.487091] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.487869] Call Trace: [ 3985.488222] [ 3985.488530] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.489183] dump_stack_lvl+0x57/0x81 [ 3985.489701] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.490492] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.491146] print_report.cold+0x5c/0x237 [ 3985.491711] kasan_report+0xc9/0x100 [ 3985.492217] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.492862] ? ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.493512] __kasan_check_byte+0x36/0x50 [ 3985.494070] ksize+0x1b/0x50 [ 3985.494485] ksize_uaf+0x1ad/0x4a0 [test_kasan] [ 3985.495120] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 3985.495822] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.496435] ? do_raw_spin_lock+0x270/0x270 [ 3985.497015] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.497780] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.498486] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.499165] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.499862] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.500696] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.501403] kthread+0x2a4/0x350 [ 3985.501860] ? kthread_complete_and_exit+0x20/0x20 [ 3985.502523] ret_from_fork+0x1f/0x30 [ 3985.503041] [ 3985.503594] Allocated by task 116266: [ 3985.504111] kasan_save_stack+0x1e/0x40 [ 3985.504642] __kasan_kmalloc+0x81/0xa0 [ 3985.505166] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 3985.505783] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.506455] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.507285] kthread+0x2a4/0x350 [ 3985.507741] ret_from_fork+0x1f/0x30 [ 3985.508476] Freed by task 116266: [ 3985.508940] kasan_save_stack+0x1e/0x40 [ 3985.509476] kasan_set_track+0x21/0x30 [ 3985.509994] kasan_set_free_info+0x20/0x40 [ 3985.510563] __kasan_slab_free+0x108/0x170 [ 3985.511130] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.511765] kfree+0xe2/0x3c0 [ 3985.512191] ksize_uaf+0x137/0x4a0 [test_kasan] [ 3985.512818] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.513490] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.514322] kthread+0x2a4/0x350 [ 3985.514776] ret_from_fork+0x1f/0x30 [ 3985.515513] The buggy address belongs to the object at ffff88802723a300 which belongs to the cache kmalloc-128 of size 128 [ 3985.517157] The buggy address is located 0 bytes inside of 128-byte region [ffff88802723a300, ffff88802723a380) [ 3985.518915] The buggy address belongs to the physical page: [ 3985.519677] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3985.520915] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.521841] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3985.522876] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3985.523907] page dumped because: kasan: bad access detected [ 3985.524897] Memory state around the buggy address: [ 3985.525556] ffff88802723a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.526527] ffff88802723a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.527499] >ffff88802723a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.528469] ^ [ 3985.528925] ffff88802723a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.529896] ffff88802723a400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.530865] ================================================================== [ 3985.531888] ================================================================== [ 3985.532861] BUG: KASAN: use-after-free in ksize_uaf+0x47d/0x4a0 [test_kasan] [ 3985.533819] Read of size 1 at addr ffff88802723a300 by task kunit_try_catch/116266 [ 3985.535072] CPU: 0 PID: 116266 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.536880] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.537663] Call Trace: [ 3985.538016] [ 3985.538330] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 3985.538978] dump_stack_lvl+0x57/0x81 [ 3985.539492] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.540279] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 3985.540926] print_report.cold+0x5c/0x237 [ 3985.541492] kasan_report+0xc9/0x100 [ 3985.541993] ? ksize_uaf+0x47d/0x4a0 [test_kasan] [ 3985.542651] ksize_uaf+0x47d/0x4a0 [test_kasan] [ 3985.543285] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 3985.543984] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.544593] ? do_raw_spin_lock+0x270/0x270 [ 3985.545179] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.545938] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.546642] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.547320] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.548010] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.548840] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.549545] kthread+0x2a4/0x350 [ 3985.549999] ? kthread_complete_and_exit+0x20/0x20 [ 3985.550659] ret_from_fork+0x1f/0x30 [ 3985.551175] [ 3985.551725] Allocated by task 116266: [ 3985.552234] kasan_save_stack+0x1e/0x40 [ 3985.552764] __kasan_kmalloc+0x81/0xa0 [ 3985.553298] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 3985.553913] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.554586] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.555417] kthread+0x2a4/0x350 [ 3985.555872] ret_from_fork+0x1f/0x30 [ 3985.556609] Freed by task 116266: [ 3985.557092] kasan_save_stack+0x1e/0x40 [ 3985.557621] kasan_set_track+0x21/0x30 [ 3985.558146] kasan_set_free_info+0x20/0x40 [ 3985.558709] __kasan_slab_free+0x108/0x170 [ 3985.559276] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.559910] kfree+0xe2/0x3c0 [ 3985.560338] ksize_uaf+0x137/0x4a0 [test_kasan] [ 3985.560960] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.561636] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.562463] kthread+0x2a4/0x350 [ 3985.562917] ret_from_fork+0x1f/0x30 [ 3985.563656] The buggy address belongs to the object at ffff88802723a300 which belongs to the cache kmalloc-128 of size 128 [ 3985.565297] The buggy address is located 0 bytes inside of 128-byte region [ffff88802723a300, ffff88802723a380) [ 3985.567059] The buggy address belongs to the physical page: [ 3985.567809] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3985.569053] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.569971] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3985.571004] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3985.572042] page dumped because: kasan: bad access detected [ 3985.573021] Memory state around the buggy address: [ 3985.573678] ffff88802723a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.574651] ffff88802723a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.575629] >ffff88802723a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.576598] ^ [ 3985.577060] ffff88802723a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.578032] ffff88802723a400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.578998] ================================================================== [ 3985.580118] ================================================================== [ 3985.581100] BUG: KASAN: use-after-free in ksize_uaf+0x470/0x4a0 [test_kasan] [ 3985.582056] Read of size 1 at addr ffff88802723a378 by task kunit_try_catch/116266 [ 3985.583299] CPU: 0 PID: 116266 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.585111] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.585886] Call Trace: [ 3985.586242] [ 3985.586551] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 3985.587210] dump_stack_lvl+0x57/0x81 [ 3985.587721] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.588513] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 3985.589171] print_report.cold+0x5c/0x237 [ 3985.589729] kasan_report+0xc9/0x100 [ 3985.590240] ? ksize_uaf+0x470/0x4a0 [test_kasan] [ 3985.590899] ksize_uaf+0x470/0x4a0 [test_kasan] [ 3985.591531] ? kmem_cache_oob+0x2e0/0x2e0 [test_kasan] [ 3985.592235] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.592837] ? do_raw_spin_lock+0x270/0x270 [ 3985.593422] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.594181] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.594874] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.595553] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.596248] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.597080] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.597781] kthread+0x2a4/0x350 [ 3985.598242] ? kthread_complete_and_exit+0x20/0x20 [ 3985.598896] ret_from_fork+0x1f/0x30 [ 3985.599409] [ 3985.599961] Allocated by task 116266: [ 3985.600471] kasan_save_stack+0x1e/0x40 [ 3985.601000] __kasan_kmalloc+0x81/0xa0 [ 3985.601527] ksize_uaf+0x9a/0x4a0 [test_kasan] [ 3985.602147] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.602815] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.603644] kthread+0x2a4/0x350 [ 3985.604103] ret_from_fork+0x1f/0x30 [ 3985.604831] Freed by task 116266: [ 3985.605300] kasan_save_stack+0x1e/0x40 [ 3985.605828] kasan_set_track+0x21/0x30 [ 3985.606352] kasan_set_free_info+0x20/0x40 [ 3985.606916] __kasan_slab_free+0x108/0x170 [ 3985.607482] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.608123] kfree+0xe2/0x3c0 [ 3985.608543] ksize_uaf+0x137/0x4a0 [test_kasan] [ 3985.609169] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.609838] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.610669] kthread+0x2a4/0x350 [ 3985.611130] ret_from_fork+0x1f/0x30 [ 3985.611864] The buggy address belongs to the object at ffff88802723a300 which belongs to the cache kmalloc-128 of size 128 [ 3985.613511] The buggy address is located 120 bytes inside of 128-byte region [ffff88802723a300, ffff88802723a380) [ 3985.615292] The buggy address belongs to the physical page: [ 3985.616051] page:000000003ebc8d1c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2723a [ 3985.617287] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.618212] raw: 000fffffc0000200 ffffea0000069140 dead000000000002 ffff8881000418c0 [ 3985.619248] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 3985.620285] page dumped because: kasan: bad access detected [ 3985.621269] Memory state around the buggy address: [ 3985.621919] ffff88802723a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.622894] ffff88802723a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.623862] >ffff88802723a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.624834] ^ [ 3985.625796] ffff88802723a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.626769] ffff88802723a400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.628036] ================================================================== [ 3985.629598] ok 38 - ksize_uaf [ 3985.638442] ================================================================== [ 3985.639953] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x152/0x400 [ 3985.641252] CPU: 1 PID: 116267 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.643136] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.643937] Call Trace: [ 3985.644305] [ 3985.644628] dump_stack_lvl+0x57/0x81 [ 3985.645165] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.645969] print_report.cold+0x5c/0x237 [ 3985.646562] ? kmem_cache_free+0x152/0x400 [ 3985.647149] ? kmem_cache_free+0x152/0x400 [ 3985.647726] kasan_report_invalid_free+0x99/0xc0 [ 3985.648386] ? kmem_cache_free+0x152/0x400 [ 3985.648965] ? kmem_cache_free+0x152/0x400 [ 3985.649547] __kasan_slab_free+0x152/0x170 [ 3985.650133] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.650790] ? kmem_cache_double_free+0x1bd/0x280 [test_kasan] [ 3985.651615] kmem_cache_free+0x152/0x400 [ 3985.652180] kmem_cache_double_free+0x1bd/0x280 [test_kasan] [ 3985.652971] ? kmem_cache_invalid_free+0x280/0x280 [test_kasan] [ 3985.653850] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.654627] ? do_raw_spin_lock+0x270/0x270 [ 3985.655421] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.656466] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3985.657399] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.658358] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.659281] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.660227] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.661360] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.662329] kthread+0x2a4/0x350 [ 3985.662968] ? kthread_complete_and_exit+0x20/0x20 [ 3985.663878] ret_from_fork+0x1f/0x30 [ 3985.664603] [ 3985.665361] Allocated by task 116267: [ 3985.666047] kasan_save_stack+0x1e/0x40 [ 3985.666764] __kasan_slab_alloc+0x66/0x80 [ 3985.667519] kmem_cache_alloc+0x161/0x310 [ 3985.668276] kmem_cache_double_free+0x123/0x280 [test_kasan] [ 3985.669329] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.670239] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.671349] kthread+0x2a4/0x350 [ 3985.671966] ret_from_fork+0x1f/0x30 [ 3985.672962] Freed by task 116267: [ 3985.673597] kasan_save_stack+0x1e/0x40 [ 3985.674321] kasan_set_track+0x21/0x30 [ 3985.675034] kasan_set_free_info+0x20/0x40 [ 3985.675802] __kasan_slab_free+0x108/0x170 [ 3985.676568] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.677437] kmem_cache_free+0x152/0x400 [ 3985.678174] kmem_cache_double_free+0x144/0x280 [test_kasan] [ 3985.679222] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.680131] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.681258] kthread+0x2a4/0x350 [ 3985.681876] ret_from_fork+0x1f/0x30 [ 3985.682885] The buggy address belongs to the object at ffff888048427738 which belongs to the cache test_cache of size 200 [ 3985.685091] The buggy address is located 0 bytes inside of 200-byte region [ffff888048427738, ffff888048427800) [ 3985.687467] The buggy address belongs to the physical page: [ 3985.688482] page:00000000fa30da5c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x48427 [ 3985.690150] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.691412] raw: 000fffffc0000200 0000000000000000 dead000000000122 ffff888008353280 [ 3985.692870] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 3985.694273] page dumped because: kasan: bad access detected [ 3985.695601] Memory state around the buggy address: [ 3985.696618] ffff888048427600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.698073] ffff888048427680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.699495] >ffff888048427700: fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb fb [ 3985.700926] ^ [ 3985.701932] ffff888048427780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.703346] ffff888048427800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.704754] ================================================================== [ 3985.727677] ok 39 - kmem_cache_double_free [ 3985.728583] ================================================================== [ 3985.730978] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x152/0x400 [ 3985.732853] CPU: 1 PID: 116268 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.735469] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.736396] Call Trace: [ 3985.736831] [ 3985.737223] dump_stack_lvl+0x57/0x81 [ 3985.737830] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.738753] print_report.cold+0x5c/0x237 [ 3985.739407] ? kmem_cache_free+0x152/0x400 [ 3985.740058] ? kmem_cache_free+0x152/0x400 [ 3985.740737] kasan_report_invalid_free+0x99/0xc0 [ 3985.741577] ? kmem_cache_free+0x152/0x400 [ 3985.742473] ? kmem_cache_free+0x152/0x400 [ 3985.743336] __kasan_slab_free+0x152/0x170 [ 3985.744038] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.744840] ? kmem_cache_invalid_free+0x1b6/0x280 [test_kasan] [ 3985.745794] kmem_cache_free+0x152/0x400 [ 3985.746446] kmem_cache_invalid_free+0x1b6/0x280 [test_kasan] [ 3985.747371] ? kmem_cache_double_destroy+0x250/0x250 [test_kasan] [ 3985.748589] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.749547] ? do_raw_spin_lock+0x270/0x270 [ 3985.750370] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.751248] ? _raw_spin_unlock_irqrestore+0x42/0x70 [ 3985.752030] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.752826] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.753594] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.754389] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.755343] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.756150] kthread+0x2a4/0x350 [ 3985.756677] ? kthread_complete_and_exit+0x20/0x20 [ 3985.757432] ret_from_fork+0x1f/0x30 [ 3985.758023] [ 3985.758656] Allocated by task 116268: [ 3985.759244] kasan_save_stack+0x1e/0x40 [ 3985.759854] __kasan_slab_alloc+0x66/0x80 [ 3985.760487] kmem_cache_alloc+0x161/0x310 [ 3985.761127] kmem_cache_invalid_free+0x126/0x280 [test_kasan] [ 3985.762028] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.762788] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.763733] kthread+0x2a4/0x350 [ 3985.764262] ret_from_fork+0x1f/0x30 [ 3985.765103] The buggy address belongs to the object at ffff8880a3b1b948 which belongs to the cache test_cache of size 200 [ 3985.766978] The buggy address is located 1 bytes inside of 200-byte region [ffff8880a3b1b948, ffff8880a3b1ba10) [ 3985.769025] The buggy address belongs to the physical page: [ 3985.769881] page:00000000d5bdb39f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa3b1b [ 3985.771293] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.772351] raw: 000fffffc0000200 0000000000000000 dead000000000122 ffff888048427dc0 [ 3985.773535] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 3985.774714] page dumped because: kasan: bad access detected [ 3985.775834] Memory state around the buggy address: [ 3985.776583] ffff8880a3b1b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.777691] ffff8880a3b1b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.778799] >ffff8880a3b1b900: fc fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 3985.779904] ^ [ 3985.780765] ffff8880a3b1b980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3985.781874] ffff8880a3b1ba00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.782982] ================================================================== [ 3985.796601] ok 40 - kmem_cache_invalid_free [ 3985.797871] ================================================================== [ 3985.799525] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.800671] Read of size 1 at addr ffff888048427780 by task kunit_try_catch/116269 [ 3985.801924] CPU: 1 PID: 116269 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.803751] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.804537] Call Trace: [ 3985.804892] [ 3985.805209] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.806042] dump_stack_lvl+0x57/0x81 [ 3985.806559] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.807351] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.808183] print_report.cold+0x5c/0x237 [ 3985.808742] kasan_report+0xc9/0x100 [ 3985.809249] ? kmem_cache_free+0x110/0x400 [ 3985.809812] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.810644] ? kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.811480] __kasan_check_byte+0x36/0x50 [ 3985.812039] kmem_cache_destroy+0x21/0x170 [ 3985.812608] kmem_cache_double_destroy+0x1a0/0x250 [test_kasan] [ 3985.813424] ? kmalloc_oob_right+0x510/0x510 [test_kasan] [ 3985.814167] ? do_raw_spin_trylock+0xb5/0x180 [ 3985.814774] ? do_raw_spin_lock+0x270/0x270 [ 3985.815365] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.816132] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.816832] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.817507] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.818205] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.819051] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.819766] kthread+0x2a4/0x350 [ 3985.820247] ? kthread_complete_and_exit+0x20/0x20 [ 3985.820908] ret_from_fork+0x1f/0x30 [ 3985.821432] [ 3985.821984] Allocated by task 116269: [ 3985.822500] kasan_save_stack+0x1e/0x40 [ 3985.823035] __kasan_slab_alloc+0x66/0x80 [ 3985.823584] kmem_cache_alloc+0x161/0x310 [ 3985.824147] kmem_cache_create_usercopy+0x1b9/0x310 [ 3985.824814] kmem_cache_create+0x12/0x20 [ 3985.825358] kmem_cache_double_destroy+0x8d/0x250 [test_kasan] [ 3985.826162] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.826831] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.827666] kthread+0x2a4/0x350 [ 3985.828129] ret_from_fork+0x1f/0x30 [ 3985.828861] Freed by task 116269: [ 3985.829331] kasan_save_stack+0x1e/0x40 [ 3985.829862] kasan_set_track+0x21/0x30 [ 3985.830389] kasan_set_free_info+0x20/0x40 [ 3985.830951] __kasan_slab_free+0x108/0x170 [ 3985.831520] slab_free_freelist_hook+0x11d/0x1d0 [ 3985.832164] kmem_cache_free+0x152/0x400 [ 3985.832703] kobject_cleanup+0x101/0x390 [ 3985.833287] kmem_cache_double_destroy+0x12a/0x250 [test_kasan] [ 3985.834096] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.834763] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.835594] kthread+0x2a4/0x350 [ 3985.836051] ret_from_fork+0x1f/0x30 [ 3985.836781] The buggy address belongs to the object at ffff888048427780 which belongs to the cache kmem_cache of size 240 [ 3985.838422] The buggy address is located 0 bytes inside of 240-byte region [ffff888048427780, ffff888048427870) [ 3985.840193] The buggy address belongs to the physical page: [ 3985.840944] page:00000000fa30da5c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x48427 [ 3985.842188] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.843115] raw: 000fffffc0000200 0000000000000000 dead000000000122 ffff888100041000 [ 3985.844151] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000 [ 3985.845186] page dumped because: kasan: bad access detected [ 3985.846174] Memory state around the buggy address: [ 3985.846828] ffff888048427680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.847805] ffff888048427700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.848776] >ffff888048427780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3985.849753] ^ [ 3985.850213] ffff888048427800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 3985.851188] ffff888048427880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3985.852170] ================================================================== [ 3985.853355] ok 41 - kmem_cache_double_destroy [ 3985.854144] ok 42 - kasan_memchr # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 3985.855622] ok 43 - kasan_memcmp # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 3985.857628] ok 44 - kasan_strings # SKIP Test requires CONFIG_AMD_MEM_ENCRYPT=n [ 3985.860146] ================================================================== [ 3985.863319] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 3985.865269] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3985.867294] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.870038] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.871214] Call Trace: [ 3985.871740] [ 3985.872216] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 3985.873555] dump_stack_lvl+0x57/0x81 [ 3985.874350] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.875535] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 3985.876873] print_report.cold+0x5c/0x237 [ 3985.877735] kasan_report+0xc9/0x100 [ 3985.878512] ? kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 3985.879855] kasan_check_range+0xfd/0x1e0 [ 3985.880717] kasan_bitops_modify.constprop.0+0xff/0x850 [test_kasan] [ 3985.882049] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3985.883110] ? put_prev_task_fair+0x37/0x70 [ 3985.883990] ? kunit_kfree+0x200/0x200 [kunit] [ 3985.884940] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.885930] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.887093] ? rcu_read_lock_held+0x30/0x50 [ 3985.887972] ? trace_kmalloc+0x3c/0x100 [ 3985.888787] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3985.889790] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3985.890919] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3985.892471] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3985.893660] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.894716] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.895720] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.896767] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.898027] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.899092] kthread+0x2a4/0x350 [ 3985.899781] ? kthread_complete_and_exit+0x20/0x20 [ 3985.900778] ret_from_fork+0x1f/0x30 [ 3985.901512] [ 3985.902317] Allocated by task 116273: [ 3985.903097] kasan_save_stack+0x1e/0x40 [ 3985.903898] __kasan_kmalloc+0x81/0xa0 [ 3985.904706] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3985.905816] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.906744] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.907832] kthread+0x2a4/0x350 [ 3985.908445] ret_from_fork+0x1f/0x30 [ 3985.909432] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3985.911590] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3985.913931] The buggy address belongs to the physical page: [ 3985.914932] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3985.916568] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.917799] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3985.919190] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3985.920568] page dumped because: kasan: bad access detected [ 3985.921879] Memory state around the buggy address: [ 3985.922755] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3985.924058] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3985.925361] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3985.926645] ^ [ 3985.927819] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3985.929117] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3985.930398] ================================================================== [ 3985.931794] ================================================================== [ 3985.933103] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 3985.934744] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3985.936414] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.938806] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.939854] Call Trace: [ 3985.940332] [ 3985.940747] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 3985.941938] dump_stack_lvl+0x57/0x81 [ 3985.942633] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.943701] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 3985.944893] print_report.cold+0x5c/0x237 [ 3985.945660] kasan_report+0xc9/0x100 [ 3985.946343] ? kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 3985.947420] kasan_check_range+0xfd/0x1e0 [ 3985.947975] kasan_bitops_modify.constprop.0+0x1a4/0x850 [test_kasan] [ 3985.949155] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3985.950087] ? put_prev_task_fair+0x37/0x70 [ 3985.950861] ? kunit_kfree+0x200/0x200 [kunit] [ 3985.951707] ? rcu_read_lock_sched_held+0x12/0x80 [ 3985.952583] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3985.953607] ? rcu_read_lock_held+0x30/0x50 [ 3985.954411] ? trace_kmalloc+0x3c/0x100 [ 3985.955138] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3985.956016] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3985.957020] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3985.958360] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3985.959407] ? kunit_add_resource+0x197/0x280 [kunit] [ 3985.960360] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.961219] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3985.961913] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.962743] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3985.963446] kthread+0x2a4/0x350 [ 3985.963905] ? kthread_complete_and_exit+0x20/0x20 [ 3985.964563] ret_from_fork+0x1f/0x30 [ 3985.965076] [ 3985.965625] Allocated by task 116273: [ 3985.966134] kasan_save_stack+0x1e/0x40 [ 3985.966663] __kasan_kmalloc+0x81/0xa0 [ 3985.967185] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3985.967916] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3985.968589] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3985.969417] kthread+0x2a4/0x350 [ 3985.969869] ret_from_fork+0x1f/0x30 [ 3985.970602] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3985.972227] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3985.973973] The buggy address belongs to the physical page: [ 3985.974724] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3985.975947] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3985.976869] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3985.977905] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3985.978937] page dumped because: kasan: bad access detected [ 3985.979920] Memory state around the buggy address: [ 3985.980577] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3985.981544] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3985.982516] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3985.983483] ^ [ 3985.984388] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3985.985361] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3985.986329] ================================================================== [ 3985.987340] ================================================================== [ 3985.988315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 3985.989555] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3985.990821] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3985.992642] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3985.993426] Call Trace: [ 3985.993777] [ 3985.994093] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 3985.994982] dump_stack_lvl+0x57/0x81 [ 3985.995503] print_address_description.constprop.0+0x1f/0x1e0 [ 3985.996288] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 3985.997185] print_report.cold+0x5c/0x237 [ 3985.997746] kasan_report+0xc9/0x100 [ 3985.998258] ? kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 3985.999161] kasan_check_range+0xfd/0x1e0 [ 3985.999716] kasan_bitops_modify.constprop.0+0x24d/0x850 [test_kasan] [ 3986.000593] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.001291] ? put_prev_task_fair+0x37/0x70 [ 3986.001867] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.002545] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.003229] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.004035] ? rcu_read_lock_held+0x30/0x50 [ 3986.004629] ? trace_kmalloc+0x3c/0x100 [ 3986.005194] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.005855] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.006608] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.007615] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.008396] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.009107] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.009817] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.010514] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.011363] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.012083] kthread+0x2a4/0x350 [ 3986.012541] ? kthread_complete_and_exit+0x20/0x20 [ 3986.013204] ret_from_fork+0x1f/0x30 [ 3986.013713] [ 3986.014271] Allocated by task 116273: [ 3986.014775] kasan_save_stack+0x1e/0x40 [ 3986.015309] __kasan_kmalloc+0x81/0xa0 [ 3986.015826] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.016572] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.017242] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.018072] kthread+0x2a4/0x350 [ 3986.018523] ret_from_fork+0x1f/0x30 [ 3986.019286] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.020905] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.022674] The buggy address belongs to the physical page: [ 3986.023437] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.024657] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.025584] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.026617] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.027648] page dumped because: kasan: bad access detected [ 3986.028632] Memory state around the buggy address: [ 3986.029296] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.030277] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.031247] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.032215] ^ [ 3986.033102] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.034071] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.035043] ================================================================== [ 3986.036060] ================================================================== [ 3986.037033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 3986.038299] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.039562] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.041381] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.042160] Call Trace: [ 3986.042513] [ 3986.042822] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 3986.043714] dump_stack_lvl+0x57/0x81 [ 3986.044309] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.045366] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 3986.046566] print_report.cold+0x5c/0x237 [ 3986.047324] kasan_report+0xc9/0x100 [ 3986.048005] ? kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 3986.049202] kasan_check_range+0xfd/0x1e0 [ 3986.049938] kasan_bitops_modify.constprop.0+0x2f2/0x850 [test_kasan] [ 3986.051115] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.052045] ? put_prev_task_fair+0x37/0x70 [ 3986.052805] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.053638] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.054512] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.055530] ? rcu_read_lock_held+0x30/0x50 [ 3986.056293] ? trace_kmalloc+0x3c/0x100 [ 3986.057009] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.057877] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.058671] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.059673] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.060450] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.061149] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.061820] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.062515] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.063360] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.064068] kthread+0x2a4/0x350 [ 3986.064526] ? kthread_complete_and_exit+0x20/0x20 [ 3986.065191] ret_from_fork+0x1f/0x30 [ 3986.065701] [ 3986.066257] Allocated by task 116273: [ 3986.066764] kasan_save_stack+0x1e/0x40 [ 3986.067300] __kasan_kmalloc+0x81/0xa0 [ 3986.067818] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.068555] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.069227] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.070055] kthread+0x2a4/0x350 [ 3986.070509] ret_from_fork+0x1f/0x30 [ 3986.071243] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.072866] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.074614] The buggy address belongs to the physical page: [ 3986.075361] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.076578] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.077500] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.078545] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.079577] page dumped because: kasan: bad access detected [ 3986.080562] Memory state around the buggy address: [ 3986.081220] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.082187] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.083154] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.084124] ^ [ 3986.085012] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.085974] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.086941] ================================================================== [ 3986.087954] ================================================================== [ 3986.088938] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 3986.090180] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.091436] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.093681] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.094726] Call Trace: [ 3986.095205] [ 3986.095622] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 3986.096815] dump_stack_lvl+0x57/0x81 [ 3986.097413] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.098204] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 3986.099096] print_report.cold+0x5c/0x237 [ 3986.099653] kasan_report+0xc9/0x100 [ 3986.100173] ? kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 3986.101067] kasan_check_range+0xfd/0x1e0 [ 3986.101624] kasan_bitops_modify.constprop.0+0x39b/0x850 [test_kasan] [ 3986.102506] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.103208] ? put_prev_task_fair+0x37/0x70 [ 3986.103785] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.104407] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.105060] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.105815] ? rcu_read_lock_held+0x30/0x50 [ 3986.106392] ? trace_kmalloc+0x3c/0x100 [ 3986.106923] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.107577] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.108318] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.109318] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.110096] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.110788] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.111459] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.112154] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.112988] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.113684] kthread+0x2a4/0x350 [ 3986.114147] ? kthread_complete_and_exit+0x20/0x20 [ 3986.114802] ret_from_fork+0x1f/0x30 [ 3986.115317] [ 3986.115869] Allocated by task 116273: [ 3986.116383] kasan_save_stack+0x1e/0x40 [ 3986.116910] __kasan_kmalloc+0x81/0xa0 [ 3986.117434] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.118168] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.118833] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.119660] kthread+0x2a4/0x350 [ 3986.120116] ret_from_fork+0x1f/0x30 [ 3986.120843] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.122465] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.124217] The buggy address belongs to the physical page: [ 3986.124963] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.126188] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.127111] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.128153] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.129183] page dumped because: kasan: bad access detected [ 3986.130166] Memory state around the buggy address: [ 3986.130815] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.131783] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.132764] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.133730] ^ [ 3986.134616] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.135582] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.136550] ================================================================== [ 3986.137562] ================================================================== [ 3986.138533] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 3986.139765] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.141026] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.142827] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.143815] Call Trace: [ 3986.144298] [ 3986.144715] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 3986.145917] dump_stack_lvl+0x57/0x81 [ 3986.146616] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.147529] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 3986.148465] print_report.cold+0x5c/0x237 [ 3986.149035] kasan_report+0xc9/0x100 [ 3986.149539] ? kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 3986.150441] kasan_check_range+0xfd/0x1e0 [ 3986.151001] kasan_bitops_modify.constprop.0+0x440/0x850 [test_kasan] [ 3986.151870] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.152569] ? put_prev_task_fair+0x37/0x70 [ 3986.153148] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.153765] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.154421] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.155181] ? rcu_read_lock_held+0x30/0x50 [ 3986.155752] ? trace_kmalloc+0x3c/0x100 [ 3986.156288] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.156936] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.157672] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.158682] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.159459] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.160162] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.160831] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.161526] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.162358] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.163063] kthread+0x2a4/0x350 [ 3986.163532] ? kthread_complete_and_exit+0x20/0x20 [ 3986.164196] ret_from_fork+0x1f/0x30 [ 3986.164706] [ 3986.165258] Allocated by task 116273: [ 3986.165766] kasan_save_stack+0x1e/0x40 [ 3986.166300] __kasan_kmalloc+0x81/0xa0 [ 3986.166817] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.167556] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.168229] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.169057] kthread+0x2a4/0x350 [ 3986.169511] ret_from_fork+0x1f/0x30 [ 3986.170243] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.171861] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.173606] The buggy address belongs to the physical page: [ 3986.174356] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.175579] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.176504] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.177534] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.178565] page dumped because: kasan: bad access detected [ 3986.179550] Memory state around the buggy address: [ 3986.180205] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.181175] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.182142] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.183105] ^ [ 3986.183989] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.184952] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.185919] ================================================================== [ 3986.186938] ================================================================== [ 3986.187910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 3986.189147] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.190400] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.192553] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.193335] Call Trace: [ 3986.193688] [ 3986.194006] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 3986.194962] dump_stack_lvl+0x57/0x81 [ 3986.195484] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.196266] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 3986.197156] print_report.cold+0x5c/0x237 [ 3986.197707] kasan_report+0xc9/0x100 [ 3986.198210] ? kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 3986.199177] kasan_check_range+0xfd/0x1e0 [ 3986.199928] kasan_bitops_modify.constprop.0+0x4e9/0x850 [test_kasan] [ 3986.200856] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.201549] ? put_prev_task_fair+0x37/0x70 [ 3986.202198] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.202814] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.203469] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.204233] ? rcu_read_lock_held+0x30/0x50 [ 3986.204805] ? trace_kmalloc+0x3c/0x100 [ 3986.205415] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.206221] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.207038] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.208036] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.208817] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.209514] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.210186] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.210875] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.211698] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.212402] kthread+0x2a4/0x350 [ 3986.212857] ? kthread_complete_and_exit+0x20/0x20 [ 3986.213514] ret_from_fork+0x1f/0x30 [ 3986.214031] [ 3986.214617] Allocated by task 116273: [ 3986.215257] kasan_save_stack+0x1e/0x40 [ 3986.215915] __kasan_kmalloc+0x81/0xa0 [ 3986.216565] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.217469] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.218270] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.219303] kthread+0x2a4/0x350 [ 3986.219839] ret_from_fork+0x1f/0x30 [ 3986.220736] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.223046] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.225001] The buggy address belongs to the physical page: [ 3986.225839] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.227470] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.228516] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.229548] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.230663] page dumped because: kasan: bad access detected [ 3986.231953] Memory state around the buggy address: [ 3986.232822] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.234121] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.235406] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.236694] ^ [ 3986.237870] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.239165] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.240450] ================================================================== [ 3986.241783] ================================================================== [ 3986.243091] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 3986.244746] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.246417] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.248833] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.249878] Call Trace: [ 3986.250352] [ 3986.250774] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 3986.251978] dump_stack_lvl+0x57/0x81 [ 3986.252665] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.253707] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 3986.254886] print_report.cold+0x5c/0x237 [ 3986.255638] kasan_report+0xc9/0x100 [ 3986.256316] ? kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 3986.257503] kasan_check_range+0xfd/0x1e0 [ 3986.258243] kasan_bitops_modify.constprop.0+0x58e/0x850 [test_kasan] [ 3986.259401] ? kasan_test_init+0x50/0x50 [test_kasan] [ 3986.260326] ? put_prev_task_fair+0x37/0x70 [ 3986.261093] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.261908] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.262780] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.263784] ? rcu_read_lock_held+0x30/0x50 [ 3986.264550] ? trace_kmalloc+0x3c/0x100 [ 3986.265260] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.266125] kasan_bitops_generic+0xfa/0x164 [test_kasan] [ 3986.267104] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.268426] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.269455] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.270384] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.271280] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.272204] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.273240] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.273948] kthread+0x2a4/0x350 [ 3986.274445] ? kthread_complete_and_exit+0x20/0x20 [ 3986.275141] ret_from_fork+0x1f/0x30 [ 3986.275650] [ 3986.276230] Allocated by task 116273: [ 3986.276766] kasan_save_stack+0x1e/0x40 [ 3986.277319] __kasan_kmalloc+0x81/0xa0 [ 3986.277836] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.278611] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.279323] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.280157] kthread+0x2a4/0x350 [ 3986.280624] ret_from_fork+0x1f/0x30 [ 3986.281420] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.283087] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.284834] The buggy address belongs to the physical page: [ 3986.285584] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.286821] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.287748] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.288785] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.289819] page dumped because: kasan: bad access detected [ 3986.290802] Memory state around the buggy address: [ 3986.291459] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.292426] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.293395] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.294364] ^ [ 3986.295252] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.296221] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.297192] ================================================================== [ 3986.298198] ================================================================== [ 3986.299171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 3986.300504] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.301764] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.303592] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.304401] Call Trace: [ 3986.304776] [ 3986.305157] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 3986.306194] dump_stack_lvl+0x57/0x81 [ 3986.306708] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.307496] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 3986.308485] print_report.cold+0x5c/0x237 [ 3986.309051] kasan_report+0xc9/0x100 [ 3986.309581] ? kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 3986.310611] kasan_check_range+0xfd/0x1e0 [ 3986.311175] kasan_bitops_test_and_modify.constprop.0+0xff/0x990 [test_kasan] [ 3986.312205] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.313109] ? put_prev_task_fair+0x37/0x70 [ 3986.313709] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.314357] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.315016] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.315766] ? rcu_read_lock_held+0x30/0x50 [ 3986.316340] ? trace_kmalloc+0x3c/0x100 [ 3986.316869] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.317521] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.318268] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.319263] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.320040] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.320731] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.321419] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.322158] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.323269] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.324232] kthread+0x2a4/0x350 [ 3986.324851] ? kthread_complete_and_exit+0x20/0x20 [ 3986.325743] ret_from_fork+0x1f/0x30 [ 3986.326444] [ 3986.327194] Allocated by task 116273: [ 3986.327871] kasan_save_stack+0x1e/0x40 [ 3986.328590] __kasan_kmalloc+0x81/0xa0 [ 3986.329302] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.330299] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.331198] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.332321] kthread+0x2a4/0x350 [ 3986.332935] ret_from_fork+0x1f/0x30 [ 3986.333918] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.335768] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.337543] The buggy address belongs to the physical page: [ 3986.338441] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.339685] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.340617] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.341668] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.342726] page dumped because: kasan: bad access detected [ 3986.343734] Memory state around the buggy address: [ 3986.344393] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.345374] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.346360] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.347345] ^ [ 3986.348263] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.349250] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.350235] ================================================================== [ 3986.351266] ================================================================== [ 3986.352567] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 3986.354370] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.356059] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.358472] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.359514] Call Trace: [ 3986.359989] [ 3986.360402] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 3986.361628] dump_stack_lvl+0x57/0x81 [ 3986.362183] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.362994] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 3986.364019] print_report.cold+0x5c/0x237 [ 3986.364575] kasan_report+0xc9/0x100 [ 3986.365097] ? kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 3986.366119] kasan_check_range+0xfd/0x1e0 [ 3986.366677] kasan_bitops_test_and_modify.constprop.0+0x1a9/0x990 [test_kasan] [ 3986.367682] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.368587] ? put_prev_task_fair+0x37/0x70 [ 3986.369181] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.369813] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.370636] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.371633] ? rcu_read_lock_held+0x30/0x50 [ 3986.372421] ? trace_kmalloc+0x3c/0x100 [ 3986.373146] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.374030] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.375025] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.376333] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.377370] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.378307] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.379230] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.380124] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.381229] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.382169] kthread+0x2a4/0x350 [ 3986.382788] ? kthread_complete_and_exit+0x20/0x20 [ 3986.383680] ret_from_fork+0x1f/0x30 [ 3986.384370] [ 3986.385118] Allocated by task 116273: [ 3986.385798] kasan_save_stack+0x1e/0x40 [ 3986.386519] __kasan_kmalloc+0x81/0xa0 [ 3986.387216] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.388193] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.389089] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.390185] kthread+0x2a4/0x350 [ 3986.390790] ret_from_fork+0x1f/0x30 [ 3986.391771] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.393913] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.396266] The buggy address belongs to the physical page: [ 3986.397258] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.398858] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.400080] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.401458] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.402819] page dumped because: kasan: bad access detected [ 3986.404128] Memory state around the buggy address: [ 3986.404992] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.406272] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.407550] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.408830] ^ [ 3986.410016] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.411295] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.412579] ================================================================== [ 3986.413926] ================================================================== [ 3986.415248] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 3986.417042] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.418709] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.421115] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.422149] Call Trace: [ 3986.422616] [ 3986.423049] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 3986.424392] dump_stack_lvl+0x57/0x81 [ 3986.425144] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.426221] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 3986.427662] print_report.cold+0x5c/0x237 [ 3986.428305] kasan_report+0xc9/0x100 [ 3986.428840] ? kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 3986.429978] kasan_check_range+0xfd/0x1e0 [ 3986.430569] kasan_bitops_test_and_modify.constprop.0+0x252/0x990 [test_kasan] [ 3986.431573] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.432514] ? put_prev_task_fair+0x37/0x70 [ 3986.433131] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.433798] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.434731] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.435825] ? rcu_read_lock_held+0x30/0x50 [ 3986.436650] ? trace_kmalloc+0x3c/0x100 [ 3986.437465] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.438163] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.438928] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.439963] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.440734] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.441453] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.442298] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.443264] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.444422] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.445409] kthread+0x2a4/0x350 [ 3986.446114] ? kthread_complete_and_exit+0x20/0x20 [ 3986.447018] ret_from_fork+0x1f/0x30 [ 3986.447820] [ 3986.448611] Allocated by task 116273: [ 3986.449363] kasan_save_stack+0x1e/0x40 [ 3986.450130] __kasan_kmalloc+0x81/0xa0 [ 3986.450819] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.451832] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.452688] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.453615] kthread+0x2a4/0x350 [ 3986.454077] ret_from_fork+0x1f/0x30 [ 3986.454856] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.457001] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.459391] The buggy address belongs to the physical page: [ 3986.460441] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.462130] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.463384] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.464844] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.466340] page dumped because: kasan: bad access detected [ 3986.467717] Memory state around the buggy address: [ 3986.468640] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.469946] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.471259] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.472572] ^ [ 3986.473762] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.475067] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.476337] ================================================================== [ 3986.477645] ================================================================== [ 3986.478938] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 3986.480682] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.482467] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.484942] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.485998] Call Trace: [ 3986.486468] [ 3986.486871] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 3986.488081] dump_stack_lvl+0x57/0x81 [ 3986.488632] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.489445] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 3986.490471] print_report.cold+0x5c/0x237 [ 3986.491186] kasan_report+0xc9/0x100 [ 3986.491919] ? kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 3986.493308] kasan_check_range+0xfd/0x1e0 [ 3986.494087] kasan_bitops_test_and_modify.constprop.0+0x2fc/0x990 [test_kasan] [ 3986.495406] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.496682] ? put_prev_task_fair+0x37/0x70 [ 3986.497564] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.498426] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.499177] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.500064] ? rcu_read_lock_held+0x30/0x50 [ 3986.500739] ? trace_kmalloc+0x3c/0x100 [ 3986.501536] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.502479] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.503794] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.505098] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.506025] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.506941] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.507926] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.508927] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.510150] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.511274] kthread+0x2a4/0x350 [ 3986.511969] ? kthread_complete_and_exit+0x20/0x20 [ 3986.513012] ret_from_fork+0x1f/0x30 [ 3986.513823] [ 3986.514609] Allocated by task 116273: [ 3986.515251] kasan_save_stack+0x1e/0x40 [ 3986.516158] __kasan_kmalloc+0x81/0xa0 [ 3986.516997] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.518144] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.519212] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.520465] kthread+0x2a4/0x350 [ 3986.521181] ret_from_fork+0x1f/0x30 [ 3986.522238] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.524778] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.527463] The buggy address belongs to the physical page: [ 3986.528615] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.530524] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.532004] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.533591] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.535282] page dumped because: kasan: bad access detected [ 3986.536923] Memory state around the buggy address: [ 3986.537897] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.539325] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.540902] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.542462] ^ [ 3986.543797] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.545271] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.546762] ================================================================== [ 3986.548369] ================================================================== [ 3986.549906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 3986.552035] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.553954] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.556953] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.558184] Call Trace: [ 3986.558729] [ 3986.559233] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 3986.560863] dump_stack_lvl+0x57/0x81 [ 3986.561700] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.563072] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 3986.564603] print_report.cold+0x5c/0x237 [ 3986.565358] kasan_report+0xc9/0x100 [ 3986.566059] ? kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 3986.567392] kasan_check_range+0xfd/0x1e0 [ 3986.568134] kasan_bitops_test_and_modify.constprop.0+0x3a6/0x990 [test_kasan] [ 3986.569462] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.570684] ? put_prev_task_fair+0x37/0x70 [ 3986.571608] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.572576] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.573588] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.574762] ? rcu_read_lock_held+0x30/0x50 [ 3986.575650] ? trace_kmalloc+0x3c/0x100 [ 3986.576476] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.577478] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.578636] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.580148] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.581331] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.582409] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.583435] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.584482] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.585729] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.586796] kthread+0x2a4/0x350 [ 3986.587480] ? kthread_complete_and_exit+0x20/0x20 [ 3986.588481] ret_from_fork+0x1f/0x30 [ 3986.589257] [ 3986.590092] Allocated by task 116273: [ 3986.590857] kasan_save_stack+0x1e/0x40 [ 3986.591666] __kasan_kmalloc+0x81/0xa0 [ 3986.592457] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.593566] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.594587] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.595840] kthread+0x2a4/0x350 [ 3986.596534] ret_from_fork+0x1f/0x30 [ 3986.597641] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.600181] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.602862] The buggy address belongs to the physical page: [ 3986.604026] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.605901] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.607298] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.608860] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.610431] page dumped because: kasan: bad access detected [ 3986.611920] Memory state around the buggy address: [ 3986.612903] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.613911] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.614881] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.615848] ^ [ 3986.616742] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.617716] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.618687] ================================================================== [ 3986.619702] ================================================================== [ 3986.620683] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 3986.622034] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.623295] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.625118] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.625892] Call Trace: [ 3986.626251] [ 3986.626564] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 3986.627565] dump_stack_lvl+0x57/0x81 [ 3986.628087] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.628870] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 3986.629866] print_report.cold+0x5c/0x237 [ 3986.630570] kasan_report+0xc9/0x100 [ 3986.631079] ? kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 3986.632080] kasan_check_range+0xfd/0x1e0 [ 3986.632633] kasan_bitops_test_and_modify.constprop.0+0x44f/0x990 [test_kasan] [ 3986.633608] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.634499] ? put_prev_task_fair+0x37/0x70 [ 3986.635078] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.635701] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.636354] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.637113] ? rcu_read_lock_held+0x30/0x50 [ 3986.637687] ? trace_kmalloc+0x3c/0x100 [ 3986.638222] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.638869] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.639623] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.640858] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.641906] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.642846] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.643751] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.644681] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.645782] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.646726] kthread+0x2a4/0x350 [ 3986.647360] ? kthread_complete_and_exit+0x20/0x20 [ 3986.648241] ret_from_fork+0x1f/0x30 [ 3986.649100] [ 3986.649833] Allocated by task 116273: [ 3986.650512] kasan_save_stack+0x1e/0x40 [ 3986.651223] __kasan_kmalloc+0x81/0xa0 [ 3986.651908] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.652889] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.653785] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.654888] kthread+0x2a4/0x350 [ 3986.655505] ret_from_fork+0x1f/0x30 [ 3986.656482] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.658638] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.660974] The buggy address belongs to the physical page: [ 3986.661972] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.663603] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.664840] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.666218] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.667583] page dumped because: kasan: bad access detected [ 3986.668894] Memory state around the buggy address: [ 3986.669767] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.671061] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.672343] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.673631] ^ [ 3986.674801] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.676103] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.677392] ================================================================== [ 3986.678738] ================================================================== [ 3986.680052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 3986.681839] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.683514] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.685922] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.686977] Call Trace: [ 3986.687450] [ 3986.687864] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 3986.689206] dump_stack_lvl+0x57/0x81 [ 3986.689890] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.690962] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 3986.692297] print_report.cold+0x5c/0x237 [ 3986.693047] kasan_report+0xc9/0x100 [ 3986.693718] ? kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 3986.694803] kasan_check_range+0xfd/0x1e0 [ 3986.695375] kasan_bitops_test_and_modify.constprop.0+0x4f9/0x990 [test_kasan] [ 3986.696357] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.697251] ? put_prev_task_fair+0x37/0x70 [ 3986.697825] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.698464] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.699123] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.699884] ? rcu_read_lock_held+0x30/0x50 [ 3986.700464] ? trace_kmalloc+0x3c/0x100 [ 3986.701003] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.701654] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.702402] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.703401] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.704180] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.704875] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.705552] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.706250] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.707081] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.707782] kthread+0x2a4/0x350 [ 3986.708243] ? kthread_complete_and_exit+0x20/0x20 [ 3986.708899] ret_from_fork+0x1f/0x30 [ 3986.709418] [ 3986.709974] Allocated by task 116273: [ 3986.710481] kasan_save_stack+0x1e/0x40 [ 3986.711018] __kasan_kmalloc+0x81/0xa0 [ 3986.711535] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.712269] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.712941] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.713764] kthread+0x2a4/0x350 [ 3986.714228] ret_from_fork+0x1f/0x30 [ 3986.714968] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.716592] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.718344] The buggy address belongs to the physical page: [ 3986.719095] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.720323] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.721248] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.722283] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.723314] page dumped because: kasan: bad access detected [ 3986.724296] Memory state around the buggy address: [ 3986.724952] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.725919] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.726888] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.727859] ^ [ 3986.728758] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.729726] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.730697] ================================================================== [ 3986.731721] ================================================================== [ 3986.732698] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 3986.734048] Read of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.735292] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.737114] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.737895] Call Trace: [ 3986.738257] [ 3986.738567] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 3986.739572] dump_stack_lvl+0x57/0x81 [ 3986.740093] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.740877] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 3986.741872] print_report.cold+0x5c/0x237 [ 3986.742434] kasan_report+0xc9/0x100 [ 3986.742938] ? kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 3986.743937] kasan_check_range+0xfd/0x1e0 [ 3986.744490] kasan_bitops_test_and_modify.constprop.0+0x5a2/0x990 [test_kasan] [ 3986.745466] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.746613] ? put_prev_task_fair+0x37/0x70 [ 3986.747202] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.747820] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.748475] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.749235] ? rcu_read_lock_held+0x30/0x50 [ 3986.749810] ? trace_kmalloc+0x3c/0x100 [ 3986.750356] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.751012] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.751758] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.752761] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.753539] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.754238] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.754909] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.755607] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.756437] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.757144] kthread+0x2a4/0x350 [ 3986.757599] ? kthread_complete_and_exit+0x20/0x20 [ 3986.758259] ret_from_fork+0x1f/0x30 [ 3986.758769] [ 3986.759328] Allocated by task 116273: [ 3986.759834] kasan_save_stack+0x1e/0x40 [ 3986.760370] __kasan_kmalloc+0x81/0xa0 [ 3986.760887] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.761622] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.762297] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.763132] kthread+0x2a4/0x350 [ 3986.763584] ret_from_fork+0x1f/0x30 [ 3986.764322] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.765943] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.767689] The buggy address belongs to the physical page: [ 3986.768441] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.769663] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.770585] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.771619] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.772650] page dumped because: kasan: bad access detected [ 3986.773633] Memory state around the buggy address: [ 3986.774289] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.775261] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.776231] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.777201] ^ [ 3986.778089] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.779061] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.780032] ================================================================== [ 3986.781046] ================================================================== [ 3986.782030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 3986.783375] Read of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.784625] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.786443] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.787324] Call Trace: [ 3986.787677] [ 3986.787990] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 3986.789235] dump_stack_lvl+0x57/0x81 [ 3986.789869] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.790663] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 3986.791663] print_report.cold+0x5c/0x237 [ 3986.792236] kasan_report+0xc9/0x100 [ 3986.792737] ? kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 3986.793750] kasan_bitops_test_and_modify.constprop.0+0x984/0x990 [test_kasan] [ 3986.794870] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.795775] ? put_prev_task_fair+0x37/0x70 [ 3986.796357] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.796978] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.797627] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.798384] ? rcu_read_lock_held+0x30/0x50 [ 3986.799004] ? trace_kmalloc+0x3c/0x100 [ 3986.799537] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.800194] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.800984] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.802018] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.802796] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.803498] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.804172] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.804863] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.805696] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.806401] kthread+0x2a4/0x350 [ 3986.806857] ? kthread_complete_and_exit+0x20/0x20 [ 3986.807519] ret_from_fork+0x1f/0x30 [ 3986.808034] [ 3986.808584] Allocated by task 116273: [ 3986.809097] kasan_save_stack+0x1e/0x40 [ 3986.809627] __kasan_kmalloc+0x81/0xa0 [ 3986.810153] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.810883] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.811630] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.812534] kthread+0x2a4/0x350 [ 3986.812997] ret_from_fork+0x1f/0x30 [ 3986.813727] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.815353] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.817151] The buggy address belongs to the physical page: [ 3986.817900] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.819197] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.820171] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.821207] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.822240] page dumped because: kasan: bad access detected [ 3986.823225] Memory state around the buggy address: [ 3986.823874] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.824843] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.825814] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.826778] ^ [ 3986.827660] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.828661] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.829653] ================================================================== [ 3986.830775] ================================================================== [ 3986.831975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 3986.833325] Write of size 8 at addr ffff8880025962e8 by task kunit_try_catch/116273 [ 3986.834585] CPU: 1 PID: 116273 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.836486] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.838390] Call Trace: [ 3986.838812] [ 3986.839214] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 3986.840474] dump_stack_lvl+0x57/0x81 [ 3986.841124] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.842102] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 3986.843381] print_report.cold+0x5c/0x237 [ 3986.844048] kasan_report+0xc9/0x100 [ 3986.844723] ? kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 3986.845897] kasan_check_range+0xfd/0x1e0 [ 3986.846682] kasan_bitops_test_and_modify.constprop.0+0x66e/0x990 [test_kasan] [ 3986.848263] ? kasan_bitops_modify.constprop.0+0x850/0x850 [test_kasan] [ 3986.849603] ? put_prev_task_fair+0x37/0x70 [ 3986.850381] ? kunit_kfree+0x200/0x200 [kunit] [ 3986.851155] ? rcu_read_lock_sched_held+0x12/0x80 [ 3986.851940] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.852946] ? rcu_read_lock_held+0x30/0x50 [ 3986.853663] ? trace_kmalloc+0x3c/0x100 [ 3986.854305] ? kmem_cache_alloc_trace+0x1af/0x320 [ 3986.855161] kasan_bitops_generic+0x105/0x164 [test_kasan] [ 3986.856077] ? kasan_bitops_test_and_modify.constprop.0+0x990/0x990 [test_kasan] [ 3986.857251] ? kunit_unary_assert_format+0x1e0/0x1e0 [kunit] [ 3986.858192] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.859059] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.859858] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.860692] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.861694] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.862618] kthread+0x2a4/0x350 [ 3986.863182] ? kthread_complete_and_exit+0x20/0x20 [ 3986.863976] ret_from_fork+0x1f/0x30 [ 3986.864617] [ 3986.865289] Allocated by task 116273: [ 3986.865901] kasan_save_stack+0x1e/0x40 [ 3986.866546] __kasan_kmalloc+0x81/0xa0 [ 3986.867183] kasan_bitops_generic+0x86/0x164 [test_kasan] [ 3986.868058] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.868851] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.869839] kthread+0x2a4/0x350 [ 3986.870440] ret_from_fork+0x1f/0x30 [ 3986.871449] The buggy address belongs to the object at ffff8880025962e0 which belongs to the cache kmalloc-16 of size 16 [ 3986.873433] The buggy address is located 8 bytes inside of 16-byte region [ffff8880025962e0, ffff8880025962f0) [ 3986.875635] The buggy address belongs to the physical page: [ 3986.876700] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.878208] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.879330] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.880587] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.881797] page dumped because: kasan: bad access detected [ 3986.883072] Memory state around the buggy address: [ 3986.883873] ffff888002596180: fa fb fc fc fb fb fc fc fa fb fc fc fb fb fc fc [ 3986.885028] ffff888002596200: 00 00 fc fc 00 00 fc fc fa fb fc fc fb fb fc fc [ 3986.886238] >ffff888002596280: 00 00 fc fc fb fb fc fc fb fb fc fc 00 01 fc fc [ 3986.887372] ^ [ 3986.888433] ffff888002596300: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 3986.889588] ffff888002596380: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.890818] ================================================================== [ 3986.895588] ok 45 - kasan_bitops_generic [ 3986.918017] ok 46 - kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3986.920259] ================================================================== [ 3986.922874] BUG: KASAN: use-after-free in kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.924171] Read of size 1 at addr ffff888002596940 by task kunit_try_catch/116275 [ 3986.925685] CPU: 1 PID: 116275 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.927854] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.928810] Call Trace: [ 3986.929231] [ 3986.929598] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.930721] dump_stack_lvl+0x57/0x81 [ 3986.931346] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.932313] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.933263] print_report.cold+0x5c/0x237 [ 3986.933923] kasan_report+0xc9/0x100 [ 3986.934515] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.935447] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.936375] __kasan_check_byte+0x36/0x50 [ 3986.937042] kfree_sensitive+0x1b/0x60 [ 3986.937676] kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.938569] ? vmalloc_oob+0x5e0/0x5e0 [test_kasan] [ 3986.939378] ? do_raw_spin_trylock+0xb5/0x180 [ 3986.940116] ? do_raw_spin_lock+0x270/0x270 [ 3986.940811] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.941744] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.942577] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.943424] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.944292] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.945308] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3986.946196] kthread+0x2a4/0x350 [ 3986.946740] ? kthread_complete_and_exit+0x20/0x20 [ 3986.947538] ret_from_fork+0x1f/0x30 [ 3986.948175] [ 3986.948816] Allocated by task 116275: [ 3986.949431] kasan_save_stack+0x1e/0x40 [ 3986.950063] __kasan_kmalloc+0x81/0xa0 [ 3986.950688] kmalloc_double_kzfree+0x9a/0x270 [test_kasan] [ 3986.951590] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.952413] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.953409] kthread+0x2a4/0x350 [ 3986.953963] ret_from_fork+0x1f/0x30 [ 3986.954833] Freed by task 116275: [ 3986.955407] kasan_save_stack+0x1e/0x40 [ 3986.956057] kasan_set_track+0x21/0x30 [ 3986.956778] kasan_set_free_info+0x20/0x40 [ 3986.957541] __kasan_slab_free+0x108/0x170 [ 3986.958113] slab_free_freelist_hook+0x11d/0x1d0 [ 3986.958786] kfree+0xe2/0x3c0 [ 3986.959217] kmalloc_double_kzfree+0x137/0x270 [test_kasan] [ 3986.959982] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.960650] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.961594] kthread+0x2a4/0x350 [ 3986.962097] ret_from_fork+0x1f/0x30 [ 3986.962906] The buggy address belongs to the object at ffff888002596940 which belongs to the cache kmalloc-16 of size 16 [ 3986.964600] The buggy address is located 0 bytes inside of 16-byte region [ffff888002596940, ffff888002596950) [ 3986.966456] The buggy address belongs to the physical page: [ 3986.967307] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3986.968530] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3986.969536] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3986.970591] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3986.971619] page dumped because: kasan: bad access detected [ 3986.972604] Memory state around the buggy address: [ 3986.973291] ffff888002596800: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3986.974257] ffff888002596880: fb fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 3986.975220] >ffff888002596900: 00 00 fc fc fb fb fc fc fa fb fc fc 00 00 fc fc [ 3986.976184] ^ [ 3986.976895] ffff888002596980: fb fb fc fc fb fb fc fc fb fb fc fc fa fb fc fc [ 3986.977906] ffff888002596a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 3986.978898] ================================================================== [ 3986.980006] ================================================================== [ 3986.981133] BUG: KASAN: double-free or invalid-free in kfree+0xe2/0x3c0 [ 3986.982292] CPU: 1 PID: 116275 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3986.984094] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3986.984867] Call Trace: [ 3986.985261] [ 3986.985591] dump_stack_lvl+0x57/0x81 [ 3986.986110] print_address_description.constprop.0+0x1f/0x1e0 [ 3986.986921] print_report.cold+0x5c/0x237 [ 3986.987471] ? kfree+0xe2/0x3c0 [ 3986.987918] ? kfree+0xe2/0x3c0 [ 3986.988361] kasan_report_invalid_free+0x99/0xc0 [ 3986.988997] ? kfree+0xe2/0x3c0 [ 3986.989471] ? kfree+0xe2/0x3c0 [ 3986.989917] __kasan_slab_free+0x152/0x170 [ 3986.990478] slab_free_freelist_hook+0x11d/0x1d0 [ 3986.991127] ? kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.991916] kfree+0xe2/0x3c0 [ 3986.992340] ? __kasan_check_byte+0x36/0x50 [ 3986.992918] kmalloc_double_kzfree+0x1ad/0x270 [test_kasan] [ 3986.993736] ? vmalloc_oob+0x5e0/0x5e0 [test_kasan] [ 3986.994443] ? do_raw_spin_trylock+0xb5/0x180 [ 3986.995052] ? do_raw_spin_lock+0x270/0x270 [ 3986.995630] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3986.996395] ? kunit_add_resource+0x197/0x280 [kunit] [ 3986.997094] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3986.997796] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3986.998488] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3986.999313] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3987.000015] kthread+0x2a4/0x350 [ 3987.000470] ? kthread_complete_and_exit+0x20/0x20 [ 3987.001132] ret_from_fork+0x1f/0x30 [ 3987.001681] [ 3987.002270] Allocated by task 116275: [ 3987.002774] kasan_save_stack+0x1e/0x40 [ 3987.003308] __kasan_kmalloc+0x81/0xa0 [ 3987.003971] kmalloc_double_kzfree+0x9a/0x270 [test_kasan] [ 3987.004974] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3987.005868] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3987.007026] kthread+0x2a4/0x350 [ 3987.007503] ret_from_fork+0x1f/0x30 [ 3987.008244] Freed by task 116275: [ 3987.008705] kasan_save_stack+0x1e/0x40 [ 3987.009244] kasan_set_track+0x21/0x30 [ 3987.009761] kasan_set_free_info+0x20/0x40 [ 3987.010330] __kasan_slab_free+0x108/0x170 [ 3987.010892] slab_free_freelist_hook+0x11d/0x1d0 [ 3987.011541] kfree+0xe2/0x3c0 [ 3987.011969] kmalloc_double_kzfree+0x137/0x270 [test_kasan] [ 3987.012727] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3987.013403] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3987.014316] kthread+0x2a4/0x350 [ 3987.014797] ret_from_fork+0x1f/0x30 [ 3987.015567] The buggy address belongs to the object at ffff888002596940 which belongs to the cache kmalloc-16 of size 16 [ 3987.017372] The buggy address is located 0 bytes inside of 16-byte region [ffff888002596940, ffff888002596950) [ 3987.019719] The buggy address belongs to the physical page: [ 3987.020715] page:000000001c3a3487 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2596 [ 3987.022345] flags: 0xfffffc0000200(slab|node=0|zone=1|lastcpupid=0x1fffff) [ 3987.023575] raw: 000fffffc0000200 dead000000000100 dead000000000122 ffff8881000413c0 [ 3987.024650] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 3987.025733] page dumped because: kasan: bad access detected [ 3987.026742] Memory state around the buggy address: [ 3987.027402] ffff888002596800: fb fb fc fc fa fb fc fc fb fb fc fc 00 00 fc fc [ 3987.028403] ffff888002596880: fb fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 3987.029501] >ffff888002596900: 00 00 fc fc fb fb fc fc fa fb fc fc 00 00 fc fc [ 3987.030802] ^ [ 3987.031760] ffff888002596980: fb fb fc fc fb fb fc fc fb fb fc fc fa fb fc fc [ 3987.033060] ffff888002596a00: fa fb fc fc fb fb fc fc 00 00 fc fc fb fb fc fc [ 3987.034354] ================================================================== [ 3987.039737] ok 47 - kmalloc_double_kzfree [ 3987.042492] ok 48 - vmalloc_helpers_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3987.049707] ================================================================== [ 3987.052481] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x596/0x5e0 [test_kasan] [ 3987.053877] Read of size 1 at addr ffffc900000777f3 by task kunit_try_catch/116277 [ 3987.055548] CPU: 0 PID: 116277 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3987.057968] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3987.059005] Call Trace: [ 3987.059474] [ 3987.059885] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 3987.060790] dump_stack_lvl+0x57/0x81 [ 3987.061490] print_address_description.constprop.0+0x1f/0x1e0 [ 3987.062564] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 3987.063641] print_report.cold+0x5c/0x237 [ 3987.064511] kasan_report+0xc9/0x100 [ 3987.065286] ? vmalloc_oob+0x596/0x5e0 [test_kasan] [ 3987.066319] vmalloc_oob+0x596/0x5e0 [test_kasan] [ 3987.067313] ? kasan_global_oob_right+0x1f0/0x1f0 [test_kasan] [ 3987.068652] ? do_raw_spin_trylock+0xb5/0x180 [ 3987.069581] ? do_raw_spin_lock+0x270/0x270 [ 3987.070459] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3987.071610] ? kunit_add_resource+0x197/0x280 [kunit] [ 3987.072661] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3987.073680] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3987.074747] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3987.076011] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3987.077077] kthread+0x2a4/0x350 [ 3987.077768] ? kthread_complete_and_exit+0x20/0x20 [ 3987.078767] ret_from_fork+0x1f/0x30 [ 3987.079544] [ 3987.080394] The buggy address belongs to the virtual mapping at [ffffc90000077000, ffffc90000079000) created by: vmalloc_oob+0x78/0x5e0 [test_kasan] [ 3987.084007] The buggy address belongs to the physical page: [ 3987.085146] page:00000000d61211a0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045e3 [ 3987.087038] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 3987.088367] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 3987.089950] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3987.091510] page dumped because: kasan: bad access detected [ 3987.093011] Memory state around the buggy address: [ 3987.094003] ffffc90000077680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3987.095468] ffffc90000077700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3987.096936] >ffffc90000077780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 3987.098398] ^ [ 3987.099784] ffffc90000077800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 3987.101358] ffffc90000077880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 3987.102354] ================================================================== [ 3987.103426] ================================================================== [ 3987.104428] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 3987.105518] Read of size 1 at addr ffffc900000777f8 by task kunit_try_catch/116277 [ 3987.107048] CPU: 0 PID: 116277 Comm: kunit_try_catch Kdump: loaded Tainted: G B --------- --- 5.14.0-254.1844_765618331.el9.x86_64+debug #1 [ 3987.108916] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 3987.109714] Call Trace: [ 3987.110082] [ 3987.110402] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 3987.111094] dump_stack_lvl+0x57/0x81 [ 3987.111665] print_address_description.constprop.0+0x1f/0x1e0 [ 3987.112482] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 3987.113170] print_report.cold+0x5c/0x237 [ 3987.113740] kasan_report+0xc9/0x100 [ 3987.114259] ? vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 3987.114971] vmalloc_oob+0x58c/0x5e0 [test_kasan] [ 3987.115639] ? kasan_global_oob_right+0x1f0/0x1f0 [test_kasan] [ 3987.116457] ? do_raw_spin_trylock+0xb5/0x180 [ 3987.117082] ? do_raw_spin_lock+0x270/0x270 [ 3987.117711] ? kunit_fail_assert_format+0x100/0x100 [kunit] [ 3987.118515] ? kunit_add_resource+0x197/0x280 [kunit] [ 3987.119234] kunit_try_run_case+0x108/0x1a0 [kunit] [ 3987.119927] ? kunit_catch_run_case+0xe0/0xe0 [kunit] [ 3987.120637] kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit] [ 3987.121558] ? kunit_try_catch_throw+0x80/0x80 [kunit] [ 3987.122283] kthread+0x2a4/0x350 [ 3987.122752] ? kthread_complete_and_exit+0x20/0x20 [ 3987.123431] ret_from_fork+0x1f/0x30 [ 3987.123956] [ 3987.124523] The buggy address belongs to the virtual mapping at [ffffc90000077000, ffffc90000079000) created by: vmalloc_oob+0x78/0x5e0 [test_kasan] [ 3987.126955] The buggy address belongs to the physical page: [ 3987.127726] page:00000000d61211a0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045e3 [ 3987.129014] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) [ 3987.129921] raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000 [ 3987.130994] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 3987.132098] page dumped because: kasan: bad access detected [ 3987.133111] Memory state around the buggy address: [ 3987.133781] ffffc90000077680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3987.134775] ffffc90000077700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3987.135770] >ffffc90000077780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 3987.136783] ^ [ 3987.137770] ffffc90000077800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 3987.138767] ffffc90000077880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 3987.139779] ================================================================== [ 3987.141170] ok 49 - vmalloc_oob [ 3987.141548] ok 50 - vmap_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 3987.142482] ok 51 - vm_map_ram_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 3987.146692] ok 52 - vmalloc_percpu # SKIP Test requires CONFIG_KASAN_SW_TAGS=y [ 3987.148220] ok 53 - match_all_not_assigned # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3987.150058] ok 54 - match_all_ptr_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3987.151389] ok 55 - match_all_mem_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 3987.152523] ok 20 - kasan [ 3987.330799] # Subtest: linear-ranges-test [ 3987.330808] 1..4 [ 3987.332085] ok 1 - range_test_get_value_amount [ 3987.332731] ok 2 - range_test_get_selector_high [ 3987.333784] ok 3 - range_test_get_selector_low [ 3987.334856] ok 4 - range_test_get_value [ 3987.335671] ok 21 - linear-ranges-test [ 3987.397535] # Subtest: list_sort [ 3987.397545] 1..1 [ 3987.409255] ok 1 - list_sort_test [ 3987.409645] ok 22 - list_sort [ 3987.569164] # Subtest: time_test_cases [ 3987.569174] 1..1 [ 3993.207857] ok 1 - time64_to_tm_test_date_range [ 3993.208350] ok 23 - time_test_cases