Date
April 20, 2025, 11:09 p.m.
Failure - log-parser-test/fault-unhandled-fault-asynchronous-external-abort-at
[ 912.284637] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
Failure - log-parser-test/panic-multiline-kernel-panic-not-syncing-attempted-to-kill-init-exitcode
[ 912.297912] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007 [ 912.305725] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007 ]---
Failure - log-parser-test/kasan-bug-kasan-stack-out-of-bounds-in-test_cache_read
[ 168.648071] ================================================================== [ 168.655334] BUG: KASAN: stack-out-of-bounds in test_cache_read+0x3c8/0x3fc [ 168.662292] Read of size 4 at addr f303bd10 by task kunit_try_catch/3840 [ 168.669036] [ 168.670532] CPU: 1 UID: 0 PID: 3840 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 168.670562] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 168.670593] Hardware name: Generic DRA74X (Flattened Device Tree) [ 168.670593] Call trace: [ 168.670593] unwind_backtrace from show_stack+0x18/0x1c [ 168.670623] show_stack from dump_stack_lvl+0x70/0x90 [ 168.670654] dump_stack_lvl from print_report+0x158/0x528 [ 168.670684] print_report from kasan_report+0xdc/0x118 [ 168.670715] kasan_report from test_cache_read+0x3c8/0x3fc [ 168.670715] test_cache_read from vcap_addr_keysets+0x1d8/0x3b4 [ 168.670745] vcap_addr_keysets from vcap_api_addr_keyset_test+0x238/0x6cc [ 168.670776] vcap_api_addr_keyset_test from kunit_try_run_case+0x22c/0x5a8 [ 168.670806] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 168.670837] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 168.670837] kthread from ret_from_fork+0x14/0x20 [ 168.670867] Exception stack(0xf303bfb0 to 0xf303bff8) [ 168.670898] bfa0: 00000000 00000000 00000000 00000000 [ 168.670898] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 168.670898] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 168.670928] [ 168.789947] The buggy address belongs to stack of task kunit_try_catch/3840 [ 168.796966] and is located at offset 496 in frame: [ 168.801879] vcap_api_addr_keyset_test+0x0/0x6cc [ 168.806518] [ 168.808044] This frame has 7 objects: [ 168.811737] [48, 60) 'matches' [ 168.811737] [80, 104) '__assertion' [ 168.814910] [144, 252) 'admin' [ 168.818511] [288, 328) 'keysets' [ 168.821655] [368, 416) 'keydata' [ 168.825012] [448, 496) 'mskdata' [ 168.828338] [528, 576) 'actdata' [ 168.831695] [ 168.836517] The buggy address belongs to the virtual mapping at [ 168.836517] [f3038000, f303d000) created by: [ 168.836517] kernel_clone+0x174/0x794 [ 168.850524] [ 168.852020] The buggy address belongs to the physical page: [ 168.857635] page: refcount:1 mapcount:0 mapping:00000000 index:0xa3 pfn:0xb0d7f [ 168.864990] flags: 0x80000000(zone=2) [ 168.868682] raw: 80000000 00000000 00000122 00000000 000000a3 00000000 ffffffff 00000001 [ 168.876831] raw: 00000000 [ 168.879455] page dumped because: kasan: bad access detected [ 168.885070] [ 168.886566] Memory state around the buggy address: [ 168.891387] f303bc00: 00 00 00 04 f2 f2 f2 f2 00 00 00 00 00 f2 f2 f2 [ 168.897979] f303bc80: f2 f2 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00 [ 168.904541] >f303bd00: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 f3 f3 f3 f3 [ 168.911102] ^ [ 168.914184] f303bd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 168.920745] f303be00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 [ 168.927337] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 93.214752] ================================================================== [ 93.222015] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x248/0x260 [ 93.229034] Write of size 1 at addr cc23f278 by task kunit_try_catch/341 [ 93.235778] [ 93.237274] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 93.237304] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.237304] Hardware name: Generic DRA74X (Flattened Device Tree) [ 93.237335] Call trace: [ 93.237335] unwind_backtrace from show_stack+0x18/0x1c [ 93.237365] show_stack from dump_stack_lvl+0x70/0x90 [ 93.237396] dump_stack_lvl from print_report+0x158/0x528 [ 93.237426] print_report from kasan_report+0xdc/0x118 [ 93.237426] kasan_report from strncpy_from_user+0x248/0x260 [ 93.237457] strncpy_from_user from copy_user_test_oob+0x7a4/0x12b0 [ 93.237487] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 93.237518] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 93.237548] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 93.237548] kthread from ret_from_fork+0x14/0x20 [ 93.237579] Exception stack(0xf277bfb0 to 0xf277bff8) [ 93.237609] bfa0: 00000000 00000000 00000000 00000000 [ 93.237609] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 93.237640] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 93.237640] [ 93.348907] Allocated by task 341: [ 93.352325] kasan_save_track+0x30/0x5c [ 93.356201] __kasan_kmalloc+0x8c/0x94 [ 93.359985] __kmalloc_noprof+0x20c/0x488 [ 93.364013] kunit_kmalloc_array+0x28/0x60 [ 93.368133] copy_user_test_oob+0xac/0x12b0 [ 93.372375] kunit_try_run_case+0x22c/0x5a8 [ 93.376586] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 93.382110] kthread+0x464/0x810 [ 93.385375] ret_from_fork+0x14/0x20 [ 93.388977] [ 93.390472] The buggy address belongs to the object at cc23f200 [ 93.390472] which belongs to the cache kmalloc-128 of size 128 [ 93.402374] The buggy address is located 0 bytes to the right of [ 93.402374] allocated 120-byte region [cc23f200, cc23f278) [ 93.414001] [ 93.415527] The buggy address belongs to the physical page: [ 93.421112] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f [ 93.428405] flags: 0x0(zone=0) [ 93.431488] page_type: f5(slab) [ 93.434661] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 93.442779] raw: 00000000 [ 93.445434] page dumped because: kasan: bad access detected [ 93.451049] [ 93.452545] Memory state around the buggy address: [ 93.457366] cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 93.463928] cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.470520] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 93.477081] ^ [ 93.483581] cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.490142] cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.496704] ================================================================== [ 92.919830] ================================================================== [ 92.927093] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x20/0x260 [ 92.934020] Write of size 121 at addr cc23f200 by task kunit_try_catch/341 [ 92.940948] [ 92.942474] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 92.942504] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.942504] Hardware name: Generic DRA74X (Flattened Device Tree) [ 92.942504] Call trace: [ 92.942535] unwind_backtrace from show_stack+0x18/0x1c [ 92.942535] show_stack from dump_stack_lvl+0x70/0x90 [ 92.942565] dump_stack_lvl from print_report+0x158/0x528 [ 92.942596] print_report from kasan_report+0xdc/0x118 [ 92.942626] kasan_report from kasan_check_range+0x14c/0x198 [ 92.942626] kasan_check_range from strncpy_from_user+0x20/0x260 [ 92.942657] strncpy_from_user from copy_user_test_oob+0x7a4/0x12b0 [ 92.942687] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 92.942718] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.942749] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 92.942779] kthread from ret_from_fork+0x14/0x20 [ 92.942779] Exception stack(0xf277bfb0 to 0xf277bff8) [ 92.942810] bfa0: 00000000 00000000 00000000 00000000 [ 92.942810] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 92.942840] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 92.942840] [ 93.060119] Allocated by task 341: [ 93.063568] kasan_save_track+0x30/0x5c [ 93.067413] __kasan_kmalloc+0x8c/0x94 [ 93.071197] __kmalloc_noprof+0x20c/0x488 [ 93.075256] kunit_kmalloc_array+0x28/0x60 [ 93.079376] copy_user_test_oob+0xac/0x12b0 [ 93.083618] kunit_try_run_case+0x22c/0x5a8 [ 93.087829] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 93.093353] kthread+0x464/0x810 [ 93.096618] ret_from_fork+0x14/0x20 [ 93.100219] [ 93.101715] The buggy address belongs to the object at cc23f200 [ 93.101715] which belongs to the cache kmalloc-128 of size 128 [ 93.113616] The buggy address is located 0 bytes inside of [ 93.113616] allocated 120-byte region [cc23f200, cc23f278) [ 93.124725] [ 93.126220] The buggy address belongs to the physical page: [ 93.131835] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f [ 93.139099] flags: 0x0(zone=0) [ 93.142181] page_type: f5(slab) [ 93.145355] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 93.153503] raw: 00000000 [ 93.156158] page dumped because: kasan: bad access detected [ 93.161743] [ 93.163269] Memory state around the buggy address: [ 93.168090] cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 93.174652] cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.181213] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 93.187805] ^ [ 93.194274] cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.200866] cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.207427] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 92.341705] ================================================================== [ 92.348968] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x544/0x12b0 [ 92.356170] Write of size 121 at addr cc23f200 by task kunit_try_catch/341 [ 92.363098] [ 92.364593] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 92.364624] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.364624] Hardware name: Generic DRA74X (Flattened Device Tree) [ 92.364654] Call trace: [ 92.364654] unwind_backtrace from show_stack+0x18/0x1c [ 92.364685] show_stack from dump_stack_lvl+0x70/0x90 [ 92.364715] dump_stack_lvl from print_report+0x158/0x528 [ 92.364715] print_report from kasan_report+0xdc/0x118 [ 92.364746] kasan_report from kasan_check_range+0x14c/0x198 [ 92.364776] kasan_check_range from copy_user_test_oob+0x544/0x12b0 [ 92.364807] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 92.364807] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.364837] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 92.364868] kthread from ret_from_fork+0x14/0x20 [ 92.364898] Exception stack(0xf277bfb0 to 0xf277bff8) [ 92.364898] bfa0: 00000000 00000000 00000000 00000000 [ 92.364929] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 92.364959] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 92.364959] [ 92.476226] Allocated by task 341: [ 92.479644] kasan_save_track+0x30/0x5c [ 92.483489] __kasan_kmalloc+0x8c/0x94 [ 92.487274] __kmalloc_noprof+0x20c/0x488 [ 92.491333] kunit_kmalloc_array+0x28/0x60 [ 92.495452] copy_user_test_oob+0xac/0x12b0 [ 92.499694] kunit_try_run_case+0x22c/0x5a8 [ 92.503906] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.509429] kthread+0x464/0x810 [ 92.512695] ret_from_fork+0x14/0x20 [ 92.516296] [ 92.517791] The buggy address belongs to the object at cc23f200 [ 92.517791] which belongs to the cache kmalloc-128 of size 128 [ 92.529693] The buggy address is located 0 bytes inside of [ 92.529693] allocated 120-byte region [cc23f200, cc23f278) [ 92.540802] [ 92.542327] The buggy address belongs to the physical page: [ 92.547912] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f [ 92.555206] flags: 0x0(zone=0) [ 92.558288] page_type: f5(slab) [ 92.561431] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 92.569580] raw: 00000000 [ 92.572235] page dumped because: kasan: bad access detected [ 92.577850] [ 92.579345] Memory state around the buggy address: [ 92.584167] cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.590728] cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.597320] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.603881] ^ [ 92.610351] cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.616943] cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.623504] ================================================================== [ 91.474090] ================================================================== [ 91.481353] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x800/0x12b0 [ 91.488555] Read of size 121 at addr cc23f200 by task kunit_try_catch/341 [ 91.495391] [ 91.496887] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 91.496917] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 91.496917] Hardware name: Generic DRA74X (Flattened Device Tree) [ 91.496948] Call trace: [ 91.496948] unwind_backtrace from show_stack+0x18/0x1c [ 91.496978] show_stack from dump_stack_lvl+0x70/0x90 [ 91.497009] dump_stack_lvl from print_report+0x158/0x528 [ 91.497039] print_report from kasan_report+0xdc/0x118 [ 91.497039] kasan_report from kasan_check_range+0x14c/0x198 [ 91.497070] kasan_check_range from copy_user_test_oob+0x800/0x12b0 [ 91.497100] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 91.497131] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.497161] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 91.497161] kthread from ret_from_fork+0x14/0x20 [ 91.497192] Exception stack(0xf277bfb0 to 0xf277bff8) [ 91.497222] bfa0: 00000000 00000000 00000000 00000000 [ 91.497222] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 91.497253] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 91.497253] [ 91.608520] Allocated by task 341: [ 91.611938] kasan_save_track+0x30/0x5c [ 91.615814] __kasan_kmalloc+0x8c/0x94 [ 91.619598] __kmalloc_noprof+0x20c/0x488 [ 91.623626] kunit_kmalloc_array+0x28/0x60 [ 91.627777] copy_user_test_oob+0xac/0x12b0 [ 91.631988] kunit_try_run_case+0x22c/0x5a8 [ 91.636199] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.641723] kthread+0x464/0x810 [ 91.644989] ret_from_fork+0x14/0x20 [ 91.648590] [ 91.650085] The buggy address belongs to the object at cc23f200 [ 91.650085] which belongs to the cache kmalloc-128 of size 128 [ 91.661987] The buggy address is located 0 bytes inside of [ 91.661987] allocated 120-byte region [cc23f200, cc23f278) [ 91.673126] [ 91.674621] The buggy address belongs to the physical page: [ 91.680236] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f [ 91.687499] flags: 0x0(zone=0) [ 91.690582] page_type: f5(slab) [ 91.693756] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 91.701904] raw: 00000000 [ 91.704528] page dumped because: kasan: bad access detected [ 91.710144] [ 91.711639] Memory state around the buggy address: [ 91.716461] cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 91.723052] cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.729614] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 91.736175] ^ [ 91.742675] cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.749237] cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.755798] ================================================================== [ 91.178466] ================================================================== [ 91.191864] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x24c/0x12b0 [ 91.199066] Write of size 121 at addr cc23f200 by task kunit_try_catch/341 [ 91.205993] [ 91.207519] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 91.207550] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 91.207550] Hardware name: Generic DRA74X (Flattened Device Tree) [ 91.207550] Call trace: [ 91.207580] unwind_backtrace from show_stack+0x18/0x1c [ 91.207580] show_stack from dump_stack_lvl+0x70/0x90 [ 91.207611] dump_stack_lvl from print_report+0x158/0x528 [ 91.207641] print_report from kasan_report+0xdc/0x118 [ 91.207672] kasan_report from kasan_check_range+0x14c/0x198 [ 91.207702] kasan_check_range from copy_user_test_oob+0x24c/0x12b0 [ 91.207702] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 91.207733] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.207763] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 91.207794] kthread from ret_from_fork+0x14/0x20 [ 91.207824] Exception stack(0xf277bfb0 to 0xf277bff8) [ 91.207824] bfa0: 00000000 00000000 00000000 00000000 [ 91.207855] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 91.207855] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 91.207885] [ 91.319122] Allocated by task 341: [ 91.322570] kasan_save_track+0x30/0x5c [ 91.326416] __kasan_kmalloc+0x8c/0x94 [ 91.330200] __kmalloc_noprof+0x20c/0x488 [ 91.334259] kunit_kmalloc_array+0x28/0x60 [ 91.338378] copy_user_test_oob+0xac/0x12b0 [ 91.342620] kunit_try_run_case+0x22c/0x5a8 [ 91.346832] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.352355] kthread+0x464/0x810 [ 91.355621] ret_from_fork+0x14/0x20 [ 91.359222] [ 91.360717] The buggy address belongs to the object at cc23f200 [ 91.360717] which belongs to the cache kmalloc-128 of size 128 [ 91.372619] The buggy address is located 0 bytes inside of [ 91.372619] allocated 120-byte region [cc23f200, cc23f278) [ 91.383728] [ 91.385253] The buggy address belongs to the physical page: [ 91.390838] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f [ 91.398132] flags: 0x0(zone=0) [ 91.401214] page_type: f5(slab) [ 91.404388] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 91.412506] raw: 00000000 [ 91.415161] page dumped because: kasan: bad access detected [ 91.420776] [ 91.422271] Memory state around the buggy address: [ 91.427093] cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 91.433654] cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.440246] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 91.446807] ^ [ 91.453308] cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.459869] cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.466430] ================================================================== [ 92.052673] ================================================================== [ 92.059936] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x484/0x12b0 [ 92.067138] Read of size 121 at addr cc23f200 by task kunit_try_catch/341 [ 92.073974] [ 92.075469] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 92.075500] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.075500] Hardware name: Generic DRA74X (Flattened Device Tree) [ 92.075531] Call trace: [ 92.075531] unwind_backtrace from show_stack+0x18/0x1c [ 92.075561] show_stack from dump_stack_lvl+0x70/0x90 [ 92.075561] dump_stack_lvl from print_report+0x158/0x528 [ 92.075592] print_report from kasan_report+0xdc/0x118 [ 92.075622] kasan_report from kasan_check_range+0x14c/0x198 [ 92.075653] kasan_check_range from copy_user_test_oob+0x484/0x12b0 [ 92.075683] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 92.075683] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.075714] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 92.075744] kthread from ret_from_fork+0x14/0x20 [ 92.075775] Exception stack(0xf277bfb0 to 0xf277bff8) [ 92.075775] bfa0: 00000000 00000000 00000000 00000000 [ 92.075805] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 92.075805] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 92.075836] [ 92.187072] Allocated by task 341: [ 92.190521] kasan_save_track+0x30/0x5c [ 92.194366] __kasan_kmalloc+0x8c/0x94 [ 92.198150] __kmalloc_noprof+0x20c/0x488 [ 92.202209] kunit_kmalloc_array+0x28/0x60 [ 92.206329] copy_user_test_oob+0xac/0x12b0 [ 92.210540] kunit_try_run_case+0x22c/0x5a8 [ 92.214782] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.220306] kthread+0x464/0x810 [ 92.223571] ret_from_fork+0x14/0x20 [ 92.227172] [ 92.228668] The buggy address belongs to the object at cc23f200 [ 92.228668] which belongs to the cache kmalloc-128 of size 128 [ 92.240570] The buggy address is located 0 bytes inside of [ 92.240570] allocated 120-byte region [cc23f200, cc23f278) [ 92.251678] [ 92.253204] The buggy address belongs to the physical page: [ 92.258789] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f [ 92.266082] flags: 0x0(zone=0) [ 92.269165] page_type: f5(slab) [ 92.272338] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 92.280456] raw: 00000000 [ 92.283111] page dumped because: kasan: bad access detected [ 92.288726] [ 92.290222] Memory state around the buggy address: [ 92.295043] cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.301605] cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.308197] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.314758] ^ [ 92.321228] cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.327819] cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.334381] ================================================================== [ 92.630828] ================================================================== [ 92.638092] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x12b0 [ 92.645263] Read of size 121 at addr cc23f200 by task kunit_try_catch/341 [ 92.652130] [ 92.653625] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 92.653656] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 92.653656] Hardware name: Generic DRA74X (Flattened Device Tree) [ 92.653686] Call trace: [ 92.653686] unwind_backtrace from show_stack+0x18/0x1c [ 92.653717] show_stack from dump_stack_lvl+0x70/0x90 [ 92.653717] dump_stack_lvl from print_report+0x158/0x528 [ 92.653747] print_report from kasan_report+0xdc/0x118 [ 92.653778] kasan_report from kasan_check_range+0x14c/0x198 [ 92.653808] kasan_check_range from copy_user_test_oob+0x604/0x12b0 [ 92.653839] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 92.653839] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.653869] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 92.653900] kthread from ret_from_fork+0x14/0x20 [ 92.653930] Exception stack(0xf277bfb0 to 0xf277bff8) [ 92.653930] bfa0: 00000000 00000000 00000000 00000000 [ 92.653961] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 92.653961] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 92.653991] [ 92.765228] Allocated by task 341: [ 92.768676] kasan_save_track+0x30/0x5c [ 92.772521] __kasan_kmalloc+0x8c/0x94 [ 92.776306] __kmalloc_noprof+0x20c/0x488 [ 92.780364] kunit_kmalloc_array+0x28/0x60 [ 92.784484] copy_user_test_oob+0xac/0x12b0 [ 92.788696] kunit_try_run_case+0x22c/0x5a8 [ 92.792938] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 92.798461] kthread+0x464/0x810 [ 92.801696] ret_from_fork+0x14/0x20 [ 92.805328] [ 92.806823] The buggy address belongs to the object at cc23f200 [ 92.806823] which belongs to the cache kmalloc-128 of size 128 [ 92.818725] The buggy address is located 0 bytes inside of [ 92.818725] allocated 120-byte region [cc23f200, cc23f278) [ 92.829833] [ 92.831329] The buggy address belongs to the physical page: [ 92.836944] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f [ 92.844207] flags: 0x0(zone=0) [ 92.847290] page_type: f5(slab) [ 92.850463] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 92.858612] raw: 00000000 [ 92.861236] page dumped because: kasan: bad access detected [ 92.866851] [ 92.868347] Memory state around the buggy address: [ 92.873168] cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.879760] cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.886322] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.892883] ^ [ 92.899383] cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.905944] cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.912536] ================================================================== [ 91.763458] ================================================================== [ 91.770721] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c4/0x12b0 [ 91.777923] Write of size 121 at addr cc23f200 by task kunit_try_catch/341 [ 91.784851] [ 91.786346] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 91.786376] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 91.786407] Hardware name: Generic DRA74X (Flattened Device Tree) [ 91.786407] Call trace: [ 91.786407] unwind_backtrace from show_stack+0x18/0x1c [ 91.786437] show_stack from dump_stack_lvl+0x70/0x90 [ 91.786468] dump_stack_lvl from print_report+0x158/0x528 [ 91.786499] print_report from kasan_report+0xdc/0x118 [ 91.786499] kasan_report from kasan_check_range+0x14c/0x198 [ 91.786529] kasan_check_range from copy_user_test_oob+0x3c4/0x12b0 [ 91.786560] copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8 [ 91.786590] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.786621] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 91.786651] kthread from ret_from_fork+0x14/0x20 [ 91.786651] Exception stack(0xf277bfb0 to 0xf277bff8) [ 91.786682] bfa0: 00000000 00000000 00000000 00000000 [ 91.786682] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 91.786712] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 91.786712] [ 91.897979] Allocated by task 341: [ 91.901397] kasan_save_track+0x30/0x5c [ 91.905273] __kasan_kmalloc+0x8c/0x94 [ 91.909057] __kmalloc_noprof+0x20c/0x488 [ 91.913116] kunit_kmalloc_array+0x28/0x60 [ 91.917236] copy_user_test_oob+0xac/0x12b0 [ 91.921447] kunit_try_run_case+0x22c/0x5a8 [ 91.925659] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.931213] kthread+0x464/0x810 [ 91.934448] ret_from_fork+0x14/0x20 [ 91.938049] [ 91.939575] The buggy address belongs to the object at cc23f200 [ 91.939575] which belongs to the cache kmalloc-128 of size 128 [ 91.951477] The buggy address is located 0 bytes inside of [ 91.951477] allocated 120-byte region [cc23f200, cc23f278) [ 91.962585] [ 91.964080] The buggy address belongs to the physical page: [ 91.969696] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f [ 91.976959] flags: 0x0(zone=0) [ 91.980041] page_type: f5(slab) [ 91.983215] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 91.991363] raw: 00000000 [ 91.993988] page dumped because: kasan: bad access detected [ 91.999603] [ 92.001098] Memory state around the buggy address: [ 92.005920] cc23f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 92.012512] cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.019073] >cc23f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 92.025634] ^ [ 92.032135] cc23f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.038696] cc23f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 92.045257] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 90.881469] ================================================================== [ 90.888732] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x144/0x3fc [ 90.896179] Write of size 8 at addr cc23f178 by task kunit_try_catch/337 [ 90.902923] [ 90.904449] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 90.904479] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 90.904479] Hardware name: Generic DRA74X (Flattened Device Tree) [ 90.904479] Call trace: [ 90.904510] unwind_backtrace from show_stack+0x18/0x1c [ 90.904510] show_stack from dump_stack_lvl+0x70/0x90 [ 90.904541] dump_stack_lvl from print_report+0x158/0x528 [ 90.904571] print_report from kasan_report+0xdc/0x118 [ 90.904602] kasan_report from kasan_check_range+0x14c/0x198 [ 90.904632] kasan_check_range from copy_to_kernel_nofault+0x144/0x3fc [ 90.904632] copy_to_kernel_nofault from copy_to_kernel_nofault_oob+0x258/0x4fc [ 90.904663] copy_to_kernel_nofault_oob from kunit_try_run_case+0x22c/0x5a8 [ 90.904693] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.904724] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 90.904754] kthread from ret_from_fork+0x14/0x20 [ 90.904785] Exception stack(0xf2763fb0 to 0xf2763ff8) [ 90.904785] 3fa0: 00000000 00000000 00000000 00000000 [ 90.904815] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 90.904815] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 90.904846] [ 91.024383] Allocated by task 337: [ 91.027801] kasan_save_track+0x30/0x5c [ 91.031677] __kasan_kmalloc+0x8c/0x94 [ 91.035461] copy_to_kernel_nofault_oob+0xf0/0x4fc [ 91.040283] kunit_try_run_case+0x22c/0x5a8 [ 91.044525] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 91.050048] kthread+0x464/0x810 [ 91.053283] ret_from_fork+0x14/0x20 [ 91.056915] [ 91.058410] The buggy address belongs to the object at cc23f100 [ 91.058410] which belongs to the cache kmalloc-128 of size 128 [ 91.070312] The buggy address is located 0 bytes to the right of [ 91.070312] allocated 120-byte region [cc23f100, cc23f178) [ 91.081939] [ 91.083435] The buggy address belongs to the physical page: [ 91.089050] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f [ 91.096313] flags: 0x0(zone=0) [ 91.099395] page_type: f5(slab) [ 91.102569] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 91.110717] raw: 00000000 [ 91.113372] page dumped because: kasan: bad access detected [ 91.118957] [ 91.120483] Memory state around the buggy address: [ 91.125305] cc23f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 91.131866] cc23f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.138427] >cc23f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 91.145019] ^ [ 91.151489] cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.158050] cc23f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.164642] ================================================================== [ 90.589233] ================================================================== [ 90.604187] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x37c/0x3fc [ 90.611663] Read of size 8 at addr cc23f178 by task kunit_try_catch/337 [ 90.618316] [ 90.619812] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 90.619842] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 90.619873] Hardware name: Generic DRA74X (Flattened Device Tree) [ 90.619873] Call trace: [ 90.619873] unwind_backtrace from show_stack+0x18/0x1c [ 90.619903] show_stack from dump_stack_lvl+0x70/0x90 [ 90.619934] dump_stack_lvl from print_report+0x158/0x528 [ 90.619964] print_report from kasan_report+0xdc/0x118 [ 90.619995] kasan_report from copy_to_kernel_nofault+0x37c/0x3fc [ 90.620025] copy_to_kernel_nofault from copy_to_kernel_nofault_oob+0x1c0/0x4fc [ 90.620056] copy_to_kernel_nofault_oob from kunit_try_run_case+0x22c/0x5a8 [ 90.620056] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.620086] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 90.620117] kthread from ret_from_fork+0x14/0x20 [ 90.620147] Exception stack(0xf2763fb0 to 0xf2763ff8) [ 90.620147] 3fa0: 00000000 00000000 00000000 00000000 [ 90.620178] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 90.620208] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 90.620208] [ 90.733642] Allocated by task 337: [ 90.737060] kasan_save_track+0x30/0x5c [ 90.740936] __kasan_kmalloc+0x8c/0x94 [ 90.744720] copy_to_kernel_nofault_oob+0xf0/0x4fc [ 90.749542] kunit_try_run_case+0x22c/0x5a8 [ 90.753784] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.759307] kthread+0x464/0x810 [ 90.762542] ret_from_fork+0x14/0x20 [ 90.766174] [ 90.767669] The buggy address belongs to the object at cc23f100 [ 90.767669] which belongs to the cache kmalloc-128 of size 128 [ 90.779571] The buggy address is located 0 bytes to the right of [ 90.779571] allocated 120-byte region [cc23f100, cc23f178) [ 90.791198] [ 90.792724] The buggy address belongs to the physical page: [ 90.798309] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23f [ 90.805603] flags: 0x0(zone=0) [ 90.808685] page_type: f5(slab) [ 90.811828] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 90.819976] raw: 00000000 [ 90.822631] page dumped because: kasan: bad access detected [ 90.828247] [ 90.829742] Memory state around the buggy address: [ 90.834564] cc23f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc [ 90.841125] cc23f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.847717] >cc23f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 90.854278] ^ [ 90.860778] cc23f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.867340] cc23f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.873901] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 90.310516] ================================================================== [ 90.317810] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a8/0x6fc [ 90.324554] Read of size 1 at addr f02b57f8 by task kunit_try_catch/325 [ 90.331207] [ 90.332733] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 90.332763] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 90.332763] Hardware name: Generic DRA74X (Flattened Device Tree) [ 90.332763] Call trace: [ 90.332763] unwind_backtrace from show_stack+0x18/0x1c [ 90.332794] show_stack from dump_stack_lvl+0x70/0x90 [ 90.332824] dump_stack_lvl from print_report+0x158/0x528 [ 90.332855] print_report from kasan_report+0xdc/0x118 [ 90.332885] kasan_report from vmalloc_oob+0x6a8/0x6fc [ 90.332885] vmalloc_oob from kunit_try_run_case+0x22c/0x5a8 [ 90.332916] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.332946] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 90.332977] kthread from ret_from_fork+0x14/0x20 [ 90.333007] Exception stack(0xf270bfb0 to 0xf270bff8) [ 90.333007] bfa0: 00000000 00000000 00000000 00000000 [ 90.333038] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 90.333038] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 90.333068] [ 90.436889] The buggy address belongs to the virtual mapping at [ 90.436889] [f02b5000, f02b7000) created by: [ 90.436889] vmalloc_oob+0x88/0x6fc [ 90.450714] [ 90.452209] The buggy address belongs to the physical page: [ 90.457824] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d9a [ 90.465087] flags: 0x80000000(zone=2) [ 90.468780] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 90.476928] raw: 00000000 [ 90.479583] page dumped because: kasan: bad access detected [ 90.485168] [ 90.486694] Memory state around the buggy address: [ 90.491516] f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.498077] f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.504638] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 90.511230] ^ [ 90.517700] f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.524291] f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.530853] ================================================================== [ 90.074859] ================================================================== [ 90.090087] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a0/0x6fc [ 90.096862] Read of size 1 at addr f02b57f3 by task kunit_try_catch/325 [ 90.103515] [ 90.105010] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 90.105041] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 90.105041] Hardware name: Generic DRA74X (Flattened Device Tree) [ 90.105072] Call trace: [ 90.105072] unwind_backtrace from show_stack+0x18/0x1c [ 90.105102] show_stack from dump_stack_lvl+0x70/0x90 [ 90.105133] dump_stack_lvl from print_report+0x158/0x528 [ 90.105163] print_report from kasan_report+0xdc/0x118 [ 90.105163] kasan_report from vmalloc_oob+0x6a0/0x6fc [ 90.105194] vmalloc_oob from kunit_try_run_case+0x22c/0x5a8 [ 90.105224] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.105255] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 90.105285] kthread from ret_from_fork+0x14/0x20 [ 90.105285] Exception stack(0xf270bfb0 to 0xf270bff8) [ 90.105316] bfa0: 00000000 00000000 00000000 00000000 [ 90.105316] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 90.105346] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 90.105377] [ 90.209197] The buggy address belongs to the virtual mapping at [ 90.209197] [f02b5000, f02b7000) created by: [ 90.209197] vmalloc_oob+0x88/0x6fc [ 90.223022] [ 90.224517] The buggy address belongs to the physical page: [ 90.230133] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d9a [ 90.237396] flags: 0x80000000(zone=2) [ 90.241119] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 90.249237] raw: 00000000 [ 90.251892] page dumped because: kasan: bad access detected [ 90.257507] [ 90.259002] Memory state around the buggy address: [ 90.263824] f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.270416] f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.276977] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 90.283538] ^ [ 90.289764] f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.296325] f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.302917] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 81.858337] ================================================================== [ 81.865600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x5ab0 [ 81.873046] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 81.879730] [ 81.881225] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 81.881256] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.881256] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.881286] Call trace: [ 81.881286] unwind_backtrace from show_stack+0x18/0x1c [ 81.881317] show_stack from dump_stack_lvl+0x70/0x90 [ 81.881317] dump_stack_lvl from print_report+0x158/0x528 [ 81.881347] print_report from kasan_report+0xdc/0x118 [ 81.881378] kasan_report from kasan_check_range+0x14c/0x198 [ 81.881408] kasan_check_range from kasan_atomics_helper+0x154c/0x5ab0 [ 81.881439] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.881439] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.881469] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.881500] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.881530] kthread from ret_from_fork+0x14/0x20 [ 81.881561] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 81.881561] 3fa0: 00000000 00000000 00000000 00000000 [ 81.881591] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.881591] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.881622] [ 81.998718] Allocated by task 321: [ 82.002136] kasan_save_track+0x30/0x5c [ 82.006011] __kasan_kmalloc+0x8c/0x94 [ 82.009796] kasan_atomics+0xc0/0x33c [ 82.013488] kunit_try_run_case+0x22c/0x5a8 [ 82.017700] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.023223] kthread+0x464/0x810 [ 82.026489] ret_from_fork+0x14/0x20 [ 82.030090] [ 82.031616] The buggy address belongs to the object at cc23e880 [ 82.031616] which belongs to the cache kmalloc-64 of size 64 [ 82.043334] The buggy address is located 0 bytes to the right of [ 82.043334] allocated 48-byte region [cc23e880, cc23e8b0) [ 82.054870] [ 82.056396] The buggy address belongs to the physical page: [ 82.061981] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 82.069274] flags: 0x0(zone=0) [ 82.072357] page_type: f5(slab) [ 82.075500] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.083648] raw: 00000000 [ 82.086303] page dumped because: kasan: bad access detected [ 82.091918] [ 82.093414] Memory state around the buggy address: [ 82.098236] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.104797] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.111389] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.117950] ^ [ 82.122070] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.128662] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.135223] ================================================================== [ 83.267395] ================================================================== [ 83.274658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1774/0x5ab0 [ 83.282104] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 83.288879] [ 83.290374] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 83.290405] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.290405] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.290435] Call trace: [ 83.290435] unwind_backtrace from show_stack+0x18/0x1c [ 83.290466] show_stack from dump_stack_lvl+0x70/0x90 [ 83.290466] dump_stack_lvl from print_report+0x158/0x528 [ 83.290496] print_report from kasan_report+0xdc/0x118 [ 83.290527] kasan_report from kasan_check_range+0x14c/0x198 [ 83.290557] kasan_check_range from kasan_atomics_helper+0x1774/0x5ab0 [ 83.290588] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.290588] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.290618] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.290649] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.290679] kthread from ret_from_fork+0x14/0x20 [ 83.290710] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 83.290710] 3fa0: 00000000 00000000 00000000 00000000 [ 83.290740] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.290740] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.290771] [ 83.407867] Allocated by task 321: [ 83.411285] kasan_save_track+0x30/0x5c [ 83.415161] __kasan_kmalloc+0x8c/0x94 [ 83.418945] kasan_atomics+0xc0/0x33c [ 83.422637] kunit_try_run_case+0x22c/0x5a8 [ 83.426849] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.432403] kthread+0x464/0x810 [ 83.435638] ret_from_fork+0x14/0x20 [ 83.439239] [ 83.440765] The buggy address belongs to the object at cc23e880 [ 83.440765] which belongs to the cache kmalloc-64 of size 64 [ 83.452484] The buggy address is located 0 bytes to the right of [ 83.452484] allocated 48-byte region [cc23e880, cc23e8b0) [ 83.464019] [ 83.465545] The buggy address belongs to the physical page: [ 83.471130] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 83.478424] flags: 0x0(zone=0) [ 83.481506] page_type: f5(slab) [ 83.484680] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.492797] raw: 00000000 [ 83.495452] page dumped because: kasan: bad access detected [ 83.501068] [ 83.502563] Memory state around the buggy address: [ 83.507385] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.513946] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.520538] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.527099] ^ [ 83.531219] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.537811] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.544372] ================================================================== [ 75.062286] ================================================================== [ 75.069549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x648/0x5ab0 [ 75.076904] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 75.083648] [ 75.085174] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 75.085205] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.085205] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.085205] Call trace: [ 75.085235] unwind_backtrace from show_stack+0x18/0x1c [ 75.085235] show_stack from dump_stack_lvl+0x70/0x90 [ 75.085266] dump_stack_lvl from print_report+0x158/0x528 [ 75.085296] print_report from kasan_report+0xdc/0x118 [ 75.085327] kasan_report from kasan_check_range+0x14c/0x198 [ 75.085357] kasan_check_range from kasan_atomics_helper+0x648/0x5ab0 [ 75.085357] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.085388] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.085418] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.085449] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.085479] kthread from ret_from_fork+0x14/0x20 [ 75.085510] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 75.085510] 3fa0: 00000000 00000000 00000000 00000000 [ 75.085540] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.085540] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.085571] [ 75.202575] Allocated by task 321: [ 75.205993] kasan_save_track+0x30/0x5c [ 75.209869] __kasan_kmalloc+0x8c/0x94 [ 75.213653] kasan_atomics+0xc0/0x33c [ 75.217346] kunit_try_run_case+0x22c/0x5a8 [ 75.221557] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.227111] kthread+0x464/0x810 [ 75.230346] ret_from_fork+0x14/0x20 [ 75.233947] [ 75.235473] The buggy address belongs to the object at cc23e880 [ 75.235473] which belongs to the cache kmalloc-64 of size 64 [ 75.247192] The buggy address is located 0 bytes to the right of [ 75.247192] allocated 48-byte region [cc23e880, cc23e8b0) [ 75.258728] [ 75.260253] The buggy address belongs to the physical page: [ 75.265838] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 75.273132] flags: 0x0(zone=0) [ 75.276214] page_type: f5(slab) [ 75.279388] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.287536] raw: 00000000 [ 75.290161] page dumped because: kasan: bad access detected [ 75.295776] [ 75.297271] Memory state around the buggy address: [ 75.302093] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.308685] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.315246] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.321807] ^ [ 75.325927] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.332519] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.339080] ================================================================== [ 79.886871] ================================================================== [ 79.894134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11a4/0x5ab0 [ 79.901611] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 79.908355] [ 79.909851] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 79.909881] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.909881] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.909912] Call trace: [ 79.909912] unwind_backtrace from show_stack+0x18/0x1c [ 79.909942] show_stack from dump_stack_lvl+0x70/0x90 [ 79.909973] dump_stack_lvl from print_report+0x158/0x528 [ 79.910003] print_report from kasan_report+0xdc/0x118 [ 79.910003] kasan_report from kasan_check_range+0x14c/0x198 [ 79.910034] kasan_check_range from kasan_atomics_helper+0x11a4/0x5ab0 [ 79.910064] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.910095] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.910125] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.910125] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.910156] kthread from ret_from_fork+0x14/0x20 [ 79.910186] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 79.910186] 3fa0: 00000000 00000000 00000000 00000000 [ 79.910217] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.910247] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.910247] [ 80.027343] Allocated by task 321: [ 80.030792] kasan_save_track+0x30/0x5c [ 80.034667] __kasan_kmalloc+0x8c/0x94 [ 80.038452] kasan_atomics+0xc0/0x33c [ 80.042144] kunit_try_run_case+0x22c/0x5a8 [ 80.046356] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.051879] kthread+0x464/0x810 [ 80.055145] ret_from_fork+0x14/0x20 [ 80.058746] [ 80.060241] The buggy address belongs to the object at cc23e880 [ 80.060241] which belongs to the cache kmalloc-64 of size 64 [ 80.071960] The buggy address is located 0 bytes to the right of [ 80.071960] allocated 48-byte region [cc23e880, cc23e8b0) [ 80.083526] [ 80.085021] The buggy address belongs to the physical page: [ 80.090637] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 80.097900] flags: 0x0(zone=0) [ 80.100982] page_type: f5(slab) [ 80.104156] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.112304] raw: 00000000 [ 80.114929] page dumped because: kasan: bad access detected [ 80.120544] [ 80.122039] Memory state around the buggy address: [ 80.126861] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.133453] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.140014] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.146575] ^ [ 80.150726] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.157287] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.163848] ================================================================== [ 73.937713] ================================================================== [ 73.945007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5200/0x5ab0 [ 73.952453] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 73.959106] [ 73.960632] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 73.960632] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.960662] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.960662] Call trace: [ 73.960662] unwind_backtrace from show_stack+0x18/0x1c [ 73.960693] show_stack from dump_stack_lvl+0x70/0x90 [ 73.960723] dump_stack_lvl from print_report+0x158/0x528 [ 73.960754] print_report from kasan_report+0xdc/0x118 [ 73.960784] kasan_report from kasan_atomics_helper+0x5200/0x5ab0 [ 73.960815] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.960815] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.960845] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.960876] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.960906] kthread from ret_from_fork+0x14/0x20 [ 73.960937] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 73.960937] 3fa0: 00000000 00000000 00000000 00000000 [ 73.960968] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.960968] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.960998] [ 74.071990] Allocated by task 321: [ 74.075408] kasan_save_track+0x30/0x5c [ 74.079284] __kasan_kmalloc+0x8c/0x94 [ 74.083068] kasan_atomics+0xc0/0x33c [ 74.086761] kunit_try_run_case+0x22c/0x5a8 [ 74.090972] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.096496] kthread+0x464/0x810 [ 74.099761] ret_from_fork+0x14/0x20 [ 74.103363] [ 74.104858] The buggy address belongs to the object at cc23e880 [ 74.104858] which belongs to the cache kmalloc-64 of size 64 [ 74.116607] The buggy address is located 0 bytes to the right of [ 74.116607] allocated 48-byte region [cc23e880, cc23e8b0) [ 74.128143] [ 74.129638] The buggy address belongs to the physical page: [ 74.135253] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 74.142517] flags: 0x0(zone=0) [ 74.145599] page_type: f5(slab) [ 74.148773] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.156921] raw: 00000000 [ 74.159545] page dumped because: kasan: bad access detected [ 74.165161] [ 74.166687] Memory state around the buggy address: [ 74.171508] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.178070] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.184631] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.191223] ^ [ 74.195343] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.201904] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.208496] ================================================================== [ 82.142547] ================================================================== [ 82.149810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52e4/0x5ab0 [ 82.157287] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 82.163940] [ 82.165435] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 82.165466] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.165466] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.165496] Call trace: [ 82.165496] unwind_backtrace from show_stack+0x18/0x1c [ 82.165527] show_stack from dump_stack_lvl+0x70/0x90 [ 82.165557] dump_stack_lvl from print_report+0x158/0x528 [ 82.165588] print_report from kasan_report+0xdc/0x118 [ 82.165588] kasan_report from kasan_atomics_helper+0x52e4/0x5ab0 [ 82.165618] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.165649] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.165679] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.165710] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.165710] kthread from ret_from_fork+0x14/0x20 [ 82.165740] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 82.165771] 3fa0: 00000000 00000000 00000000 00000000 [ 82.165771] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.165802] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.165802] [ 82.276794] Allocated by task 321: [ 82.280212] kasan_save_track+0x30/0x5c [ 82.284088] __kasan_kmalloc+0x8c/0x94 [ 82.287872] kasan_atomics+0xc0/0x33c [ 82.291564] kunit_try_run_case+0x22c/0x5a8 [ 82.295776] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.301330] kthread+0x464/0x810 [ 82.304565] ret_from_fork+0x14/0x20 [ 82.308197] [ 82.309692] The buggy address belongs to the object at cc23e880 [ 82.309692] which belongs to the cache kmalloc-64 of size 64 [ 82.321411] The buggy address is located 0 bytes to the right of [ 82.321411] allocated 48-byte region [cc23e880, cc23e8b0) [ 82.332946] [ 82.334472] The buggy address belongs to the physical page: [ 82.340057] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 82.347351] flags: 0x0(zone=0) [ 82.350433] page_type: f5(slab) [ 82.353576] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.361724] raw: 00000000 [ 82.364379] page dumped because: kasan: bad access detected [ 82.369995] [ 82.371490] Memory state around the buggy address: [ 82.376312] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.382873] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.389465] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.396026] ^ [ 82.400146] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.406738] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.413299] ================================================================== [ 77.051239] ================================================================== [ 77.058502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac4/0x5ab0 [ 77.065887] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 77.072631] [ 77.074127] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 77.074157] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.074157] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.074188] Call trace: [ 77.074188] unwind_backtrace from show_stack+0x18/0x1c [ 77.074218] show_stack from dump_stack_lvl+0x70/0x90 [ 77.074249] dump_stack_lvl from print_report+0x158/0x528 [ 77.074279] print_report from kasan_report+0xdc/0x118 [ 77.074279] kasan_report from kasan_check_range+0x14c/0x198 [ 77.074310] kasan_check_range from kasan_atomics_helper+0xac4/0x5ab0 [ 77.074340] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.074371] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.074401] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.074401] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.074432] kthread from ret_from_fork+0x14/0x20 [ 77.074462] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 77.074462] 3fa0: 00000000 00000000 00000000 00000000 [ 77.074493] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.074523] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.074523] [ 77.191528] Allocated by task 321: [ 77.194976] kasan_save_track+0x30/0x5c [ 77.198822] __kasan_kmalloc+0x8c/0x94 [ 77.202606] kasan_atomics+0xc0/0x33c [ 77.206298] kunit_try_run_case+0x22c/0x5a8 [ 77.210540] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.216064] kthread+0x464/0x810 [ 77.219329] ret_from_fork+0x14/0x20 [ 77.222930] [ 77.224426] The buggy address belongs to the object at cc23e880 [ 77.224426] which belongs to the cache kmalloc-64 of size 64 [ 77.236145] The buggy address is located 0 bytes to the right of [ 77.236145] allocated 48-byte region [cc23e880, cc23e8b0) [ 77.247711] [ 77.249206] The buggy address belongs to the physical page: [ 77.254821] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 77.262084] flags: 0x0(zone=0) [ 77.265167] page_type: f5(slab) [ 77.268341] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.276489] raw: 00000000 [ 77.279113] page dumped because: kasan: bad access detected [ 77.284729] [ 77.286224] Memory state around the buggy address: [ 77.291046] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.297637] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.304199] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.310760] ^ [ 77.314910] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.321472] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.328033] ================================================================== [ 85.257537] ================================================================== [ 85.264801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1bf0/0x5ab0 [ 85.272247] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 85.278991] [ 85.280517] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 85.280548] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.280548] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.280548] Call trace: [ 85.280578] unwind_backtrace from show_stack+0x18/0x1c [ 85.280578] show_stack from dump_stack_lvl+0x70/0x90 [ 85.280609] dump_stack_lvl from print_report+0x158/0x528 [ 85.280639] print_report from kasan_report+0xdc/0x118 [ 85.280670] kasan_report from kasan_check_range+0x14c/0x198 [ 85.280700] kasan_check_range from kasan_atomics_helper+0x1bf0/0x5ab0 [ 85.280700] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.280731] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.280761] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.280792] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.280822] kthread from ret_from_fork+0x14/0x20 [ 85.280822] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 85.280853] 3fa0: 00000000 00000000 00000000 00000000 [ 85.280883] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.280883] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.280914] [ 85.398010] Allocated by task 321: [ 85.401428] kasan_save_track+0x30/0x5c [ 85.405303] __kasan_kmalloc+0x8c/0x94 [ 85.409088] kasan_atomics+0xc0/0x33c [ 85.412780] kunit_try_run_case+0x22c/0x5a8 [ 85.416992] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.422515] kthread+0x464/0x810 [ 85.425781] ret_from_fork+0x14/0x20 [ 85.429382] [ 85.430877] The buggy address belongs to the object at cc23e880 [ 85.430877] which belongs to the cache kmalloc-64 of size 64 [ 85.442626] The buggy address is located 0 bytes to the right of [ 85.442626] allocated 48-byte region [cc23e880, cc23e8b0) [ 85.454162] [ 85.455657] The buggy address belongs to the physical page: [ 85.461273] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 85.468536] flags: 0x0(zone=0) [ 85.471618] page_type: f5(slab) [ 85.474792] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.482940] raw: 00000000 [ 85.485595] page dumped because: kasan: bad access detected [ 85.491180] [ 85.492706] Memory state around the buggy address: [ 85.497528] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.504089] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.510650] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.517242] ^ [ 85.521362] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.527923] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.534515] ================================================================== [ 77.903656] ================================================================== [ 77.910949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x5ab0 [ 77.918304] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 77.925048] [ 77.926544] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 77.926574] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.926605] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.926605] Call trace: [ 77.926605] unwind_backtrace from show_stack+0x18/0x1c [ 77.926635] show_stack from dump_stack_lvl+0x70/0x90 [ 77.926666] dump_stack_lvl from print_report+0x158/0x528 [ 77.926696] print_report from kasan_report+0xdc/0x118 [ 77.926727] kasan_report from kasan_check_range+0x14c/0x198 [ 77.926727] kasan_check_range from kasan_atomics_helper+0xd3c/0x5ab0 [ 77.926757] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.926788] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.926818] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.926849] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.926879] kthread from ret_from_fork+0x14/0x20 [ 77.926879] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 77.926910] 3fa0: 00000000 00000000 00000000 00000000 [ 77.926910] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.926940] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.926940] [ 78.043975] Allocated by task 321: [ 78.047393] kasan_save_track+0x30/0x5c [ 78.051269] __kasan_kmalloc+0x8c/0x94 [ 78.055053] kasan_atomics+0xc0/0x33c [ 78.058746] kunit_try_run_case+0x22c/0x5a8 [ 78.062957] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.068481] kthread+0x464/0x810 [ 78.071746] ret_from_fork+0x14/0x20 [ 78.075347] [ 78.076843] The buggy address belongs to the object at cc23e880 [ 78.076843] which belongs to the cache kmalloc-64 of size 64 [ 78.088592] The buggy address is located 0 bytes to the right of [ 78.088592] allocated 48-byte region [cc23e880, cc23e8b0) [ 78.100128] [ 78.101623] The buggy address belongs to the physical page: [ 78.107238] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 78.114532] flags: 0x0(zone=0) [ 78.117584] page_type: f5(slab) [ 78.120758] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.128906] raw: 00000000 [ 78.131561] page dumped because: kasan: bad access detected [ 78.137145] [ 78.138671] Memory state around the buggy address: [ 78.143493] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.150054] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.156616] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.163208] ^ [ 78.167327] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.173889] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.180480] ================================================================== [ 80.171173] ================================================================== [ 80.178466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1268/0x5ab0 [ 80.185913] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 80.192657] [ 80.194152] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 80.194183] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.194183] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.194213] Call trace: [ 80.194213] unwind_backtrace from show_stack+0x18/0x1c [ 80.194244] show_stack from dump_stack_lvl+0x70/0x90 [ 80.194274] dump_stack_lvl from print_report+0x158/0x528 [ 80.194305] print_report from kasan_report+0xdc/0x118 [ 80.194305] kasan_report from kasan_check_range+0x14c/0x198 [ 80.194335] kasan_check_range from kasan_atomics_helper+0x1268/0x5ab0 [ 80.194366] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.194396] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.194427] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.194427] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.194458] kthread from ret_from_fork+0x14/0x20 [ 80.194488] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 80.194488] 3fa0: 00000000 00000000 00000000 00000000 [ 80.194519] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.194549] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.194549] [ 80.311645] Allocated by task 321: [ 80.315093] kasan_save_track+0x30/0x5c [ 80.318939] __kasan_kmalloc+0x8c/0x94 [ 80.322723] kasan_atomics+0xc0/0x33c [ 80.326416] kunit_try_run_case+0x22c/0x5a8 [ 80.330657] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.336181] kthread+0x464/0x810 [ 80.339447] ret_from_fork+0x14/0x20 [ 80.343048] [ 80.344543] The buggy address belongs to the object at cc23e880 [ 80.344543] which belongs to the cache kmalloc-64 of size 64 [ 80.356262] The buggy address is located 0 bytes to the right of [ 80.356262] allocated 48-byte region [cc23e880, cc23e8b0) [ 80.367828] [ 80.369323] The buggy address belongs to the physical page: [ 80.374938] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 80.382202] flags: 0x0(zone=0) [ 80.385284] page_type: f5(slab) [ 80.388458] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.396606] raw: 00000000 [ 80.399230] page dumped because: kasan: bad access detected [ 80.404846] [ 80.406341] Memory state around the buggy address: [ 80.411163] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.417755] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.424316] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.430877] ^ [ 80.435028] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.441589] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.448150] ================================================================== [ 86.957092] ================================================================== [ 86.964355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ffc/0x5ab0 [ 86.971801] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 86.978546] [ 86.980072] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 86.980102] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.980102] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.980102] Call trace: [ 86.980133] unwind_backtrace from show_stack+0x18/0x1c [ 86.980163] show_stack from dump_stack_lvl+0x70/0x90 [ 86.980163] dump_stack_lvl from print_report+0x158/0x528 [ 86.980194] print_report from kasan_report+0xdc/0x118 [ 86.980224] kasan_report from kasan_check_range+0x14c/0x198 [ 86.980255] kasan_check_range from kasan_atomics_helper+0x1ffc/0x5ab0 [ 86.980285] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.980285] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.980316] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.980346] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.980377] kthread from ret_from_fork+0x14/0x20 [ 86.980407] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 86.980407] 3fa0: 00000000 00000000 00000000 00000000 [ 86.980438] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.980438] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.980468] [ 87.097564] Allocated by task 321: [ 87.100982] kasan_save_track+0x30/0x5c [ 87.104858] __kasan_kmalloc+0x8c/0x94 [ 87.108642] kasan_atomics+0xc0/0x33c [ 87.112335] kunit_try_run_case+0x22c/0x5a8 [ 87.116546] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.122070] kthread+0x464/0x810 [ 87.125335] ret_from_fork+0x14/0x20 [ 87.128936] [ 87.130432] The buggy address belongs to the object at cc23e880 [ 87.130432] which belongs to the cache kmalloc-64 of size 64 [ 87.142150] The buggy address is located 0 bytes to the right of [ 87.142150] allocated 48-byte region [cc23e880, cc23e8b0) [ 87.153717] [ 87.155212] The buggy address belongs to the physical page: [ 87.160827] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 87.168090] flags: 0x0(zone=0) [ 87.171173] page_type: f5(slab) [ 87.174346] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.182495] raw: 00000000 [ 87.185150] page dumped because: kasan: bad access detected [ 87.190734] [ 87.192230] Memory state around the buggy address: [ 87.197082] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.203643] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.210205] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.216766] ^ [ 87.220916] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.227478] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.234039] ================================================================== [ 85.826110] ================================================================== [ 85.833404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d50/0x5ab0 [ 85.840850] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 85.847595] [ 85.849090] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 85.849121] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.849121] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.849151] Call trace: [ 85.849151] unwind_backtrace from show_stack+0x18/0x1c [ 85.849182] show_stack from dump_stack_lvl+0x70/0x90 [ 85.849212] dump_stack_lvl from print_report+0x158/0x528 [ 85.849243] print_report from kasan_report+0xdc/0x118 [ 85.849243] kasan_report from kasan_check_range+0x14c/0x198 [ 85.849273] kasan_check_range from kasan_atomics_helper+0x1d50/0x5ab0 [ 85.849304] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.849334] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.849365] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.849365] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.849395] kthread from ret_from_fork+0x14/0x20 [ 85.849426] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 85.849426] 3fa0: 00000000 00000000 00000000 00000000 [ 85.849456] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.849487] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.849487] [ 85.966583] Allocated by task 321: [ 85.970031] kasan_save_track+0x30/0x5c [ 85.973876] __kasan_kmalloc+0x8c/0x94 [ 85.977661] kasan_atomics+0xc0/0x33c [ 85.981353] kunit_try_run_case+0x22c/0x5a8 [ 85.985595] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.991119] kthread+0x464/0x810 [ 85.994354] ret_from_fork+0x14/0x20 [ 85.997985] [ 85.999481] The buggy address belongs to the object at cc23e880 [ 85.999481] which belongs to the cache kmalloc-64 of size 64 [ 86.011199] The buggy address is located 0 bytes to the right of [ 86.011199] allocated 48-byte region [cc23e880, cc23e8b0) [ 86.022766] [ 86.024261] The buggy address belongs to the physical page: [ 86.029876] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 86.037139] flags: 0x0(zone=0) [ 86.040222] page_type: f5(slab) [ 86.043395] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.051513] raw: 00000000 [ 86.054168] page dumped because: kasan: bad access detected [ 86.059783] [ 86.061279] Memory state around the buggy address: [ 86.066101] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.072662] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.079254] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.085815] ^ [ 86.089935] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.096527] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.103088] ================================================================== [ 79.602569] ================================================================== [ 79.609832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10e0/0x5ab0 [ 79.617279] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 79.624023] [ 79.625549] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 79.625579] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.625579] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.625579] Call trace: [ 79.625610] unwind_backtrace from show_stack+0x18/0x1c [ 79.625640] show_stack from dump_stack_lvl+0x70/0x90 [ 79.625640] dump_stack_lvl from print_report+0x158/0x528 [ 79.625671] print_report from kasan_report+0xdc/0x118 [ 79.625701] kasan_report from kasan_check_range+0x14c/0x198 [ 79.625732] kasan_check_range from kasan_atomics_helper+0x10e0/0x5ab0 [ 79.625762] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.625762] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.625793] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.625823] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.625854] kthread from ret_from_fork+0x14/0x20 [ 79.625885] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 79.625885] 3fa0: 00000000 00000000 00000000 00000000 [ 79.625915] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.625915] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.625946] [ 79.743041] Allocated by task 321: [ 79.746459] kasan_save_track+0x30/0x5c [ 79.750335] __kasan_kmalloc+0x8c/0x94 [ 79.754119] kasan_atomics+0xc0/0x33c [ 79.757812] kunit_try_run_case+0x22c/0x5a8 [ 79.762023] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.767578] kthread+0x464/0x810 [ 79.770812] ret_from_fork+0x14/0x20 [ 79.774414] [ 79.775939] The buggy address belongs to the object at cc23e880 [ 79.775939] which belongs to the cache kmalloc-64 of size 64 [ 79.787658] The buggy address is located 0 bytes to the right of [ 79.787658] allocated 48-byte region [cc23e880, cc23e8b0) [ 79.799194] [ 79.800720] The buggy address belongs to the physical page: [ 79.806304] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 79.813598] flags: 0x0(zone=0) [ 79.816680] page_type: f5(slab) [ 79.819824] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.827972] raw: 00000000 [ 79.830627] page dumped because: kasan: bad access detected [ 79.836242] [ 79.837738] Memory state around the buggy address: [ 79.842559] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.849121] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.855712] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.862274] ^ [ 79.866394] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.872985] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.879547] ================================================================== [ 87.809936] ================================================================== [ 87.817230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2200/0x5ab0 [ 87.824676] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 87.831420] [ 87.832916] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 87.832946] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.832946] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.832977] Call trace: [ 87.832977] unwind_backtrace from show_stack+0x18/0x1c [ 87.833007] show_stack from dump_stack_lvl+0x70/0x90 [ 87.833038] dump_stack_lvl from print_report+0x158/0x528 [ 87.833068] print_report from kasan_report+0xdc/0x118 [ 87.833068] kasan_report from kasan_check_range+0x14c/0x198 [ 87.833099] kasan_check_range from kasan_atomics_helper+0x2200/0x5ab0 [ 87.833129] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.833160] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.833190] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.833190] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.833221] kthread from ret_from_fork+0x14/0x20 [ 87.833251] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 87.833251] 3fa0: 00000000 00000000 00000000 00000000 [ 87.833282] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.833312] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.833312] [ 87.950408] Allocated by task 321: [ 87.953857] kasan_save_track+0x30/0x5c [ 87.957702] __kasan_kmalloc+0x8c/0x94 [ 87.961486] kasan_atomics+0xc0/0x33c [ 87.965179] kunit_try_run_case+0x22c/0x5a8 [ 87.969421] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.974945] kthread+0x464/0x810 [ 87.978210] ret_from_fork+0x14/0x20 [ 87.981811] [ 87.983306] The buggy address belongs to the object at cc23e880 [ 87.983306] which belongs to the cache kmalloc-64 of size 64 [ 87.995025] The buggy address is located 0 bytes to the right of [ 87.995025] allocated 48-byte region [cc23e880, cc23e8b0) [ 88.006591] [ 88.008087] The buggy address belongs to the physical page: [ 88.013702] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 88.020965] flags: 0x0(zone=0) [ 88.024047] page_type: f5(slab) [ 88.027221] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.035369] raw: 00000000 [ 88.037994] page dumped because: kasan: bad access detected [ 88.043609] [ 88.045104] Memory state around the buggy address: [ 88.049926] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.056488] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.063079] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.069641] ^ [ 88.073760] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.080352] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.086914] ================================================================== [ 86.110412] ================================================================== [ 86.117706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e5c/0x5ab0 [ 86.125152] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 86.131896] [ 86.133392] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 86.133422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.133453] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.133453] Call trace: [ 86.133453] unwind_backtrace from show_stack+0x18/0x1c [ 86.133483] show_stack from dump_stack_lvl+0x70/0x90 [ 86.133514] dump_stack_lvl from print_report+0x158/0x528 [ 86.133544] print_report from kasan_report+0xdc/0x118 [ 86.133575] kasan_report from kasan_check_range+0x14c/0x198 [ 86.133575] kasan_check_range from kasan_atomics_helper+0x1e5c/0x5ab0 [ 86.133605] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.133636] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.133666] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.133697] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.133697] kthread from ret_from_fork+0x14/0x20 [ 86.133728] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 86.133758] 3fa0: 00000000 00000000 00000000 00000000 [ 86.133758] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.133789] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.133789] [ 86.250915] Allocated by task 321: [ 86.254333] kasan_save_track+0x30/0x5c [ 86.258209] __kasan_kmalloc+0x8c/0x94 [ 86.261993] kasan_atomics+0xc0/0x33c [ 86.265686] kunit_try_run_case+0x22c/0x5a8 [ 86.269897] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.275421] kthread+0x464/0x810 [ 86.278686] ret_from_fork+0x14/0x20 [ 86.282287] [ 86.283782] The buggy address belongs to the object at cc23e880 [ 86.283782] which belongs to the cache kmalloc-64 of size 64 [ 86.295501] The buggy address is located 0 bytes to the right of [ 86.295501] allocated 48-byte region [cc23e880, cc23e8b0) [ 86.307067] [ 86.308563] The buggy address belongs to the physical page: [ 86.314178] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 86.321441] flags: 0x0(zone=0) [ 86.324523] page_type: f5(slab) [ 86.327697] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.335845] raw: 00000000 [ 86.338470] page dumped because: kasan: bad access detected [ 86.344085] [ 86.345581] Memory state around the buggy address: [ 86.350402] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.356994] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.363555] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.370117] ^ [ 86.374237] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.380828] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.387390] ================================================================== [ 89.225158] ================================================================== [ 89.232421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54f4/0x5ab0 [ 89.239898] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 89.246551] [ 89.248046] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 89.248077] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.248107] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.248107] Call trace: [ 89.248107] unwind_backtrace from show_stack+0x18/0x1c [ 89.248138] show_stack from dump_stack_lvl+0x70/0x90 [ 89.248168] dump_stack_lvl from print_report+0x158/0x528 [ 89.248199] print_report from kasan_report+0xdc/0x118 [ 89.248199] kasan_report from kasan_atomics_helper+0x54f4/0x5ab0 [ 89.248229] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 89.248260] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 89.248291] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.248321] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.248352] kthread from ret_from_fork+0x14/0x20 [ 89.248352] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 89.248382] 3fa0: 00000000 00000000 00000000 00000000 [ 89.248382] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.248413] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.248413] [ 89.359405] Allocated by task 321: [ 89.362823] kasan_save_track+0x30/0x5c [ 89.366699] __kasan_kmalloc+0x8c/0x94 [ 89.370483] kasan_atomics+0xc0/0x33c [ 89.374176] kunit_try_run_case+0x22c/0x5a8 [ 89.378387] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.383941] kthread+0x464/0x810 [ 89.387176] ret_from_fork+0x14/0x20 [ 89.390777] [ 89.392303] The buggy address belongs to the object at cc23e880 [ 89.392303] which belongs to the cache kmalloc-64 of size 64 [ 89.404022] The buggy address is located 0 bytes to the right of [ 89.404022] allocated 48-byte region [cc23e880, cc23e8b0) [ 89.415557] [ 89.417083] The buggy address belongs to the physical page: [ 89.422668] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 89.429962] flags: 0x0(zone=0) [ 89.433044] page_type: f5(slab) [ 89.436187] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.444335] raw: 00000000 [ 89.446990] page dumped because: kasan: bad access detected [ 89.452606] [ 89.454101] Memory state around the buggy address: [ 89.458923] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.465484] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.472076] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.478637] ^ [ 89.482757] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.489318] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.495910] ================================================================== [ 88.094238] ================================================================== [ 88.101501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x22c4/0x5ab0 [ 88.108947] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 88.115692] [ 88.117218] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 88.117248] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.117248] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.117279] Call trace: [ 88.117279] unwind_backtrace from show_stack+0x18/0x1c [ 88.117309] show_stack from dump_stack_lvl+0x70/0x90 [ 88.117309] dump_stack_lvl from print_report+0x158/0x528 [ 88.117340] print_report from kasan_report+0xdc/0x118 [ 88.117370] kasan_report from kasan_check_range+0x14c/0x198 [ 88.117401] kasan_check_range from kasan_atomics_helper+0x22c4/0x5ab0 [ 88.117431] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.117431] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.117462] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.117492] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.117523] kthread from ret_from_fork+0x14/0x20 [ 88.117553] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 88.117553] 3fa0: 00000000 00000000 00000000 00000000 [ 88.117584] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.117584] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.117614] [ 88.234710] Allocated by task 321: [ 88.238128] kasan_save_track+0x30/0x5c [ 88.242004] __kasan_kmalloc+0x8c/0x94 [ 88.245788] kasan_atomics+0xc0/0x33c [ 88.249481] kunit_try_run_case+0x22c/0x5a8 [ 88.253692] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.259216] kthread+0x464/0x810 [ 88.262481] ret_from_fork+0x14/0x20 [ 88.266082] [ 88.267578] The buggy address belongs to the object at cc23e880 [ 88.267578] which belongs to the cache kmalloc-64 of size 64 [ 88.279296] The buggy address is located 0 bytes to the right of [ 88.279296] allocated 48-byte region [cc23e880, cc23e8b0) [ 88.290863] [ 88.292358] The buggy address belongs to the physical page: [ 88.297973] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 88.305236] flags: 0x0(zone=0) [ 88.308319] page_type: f5(slab) [ 88.311492] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.319641] raw: 00000000 [ 88.322265] page dumped because: kasan: bad access detected [ 88.327880] [ 88.329376] Memory state around the buggy address: [ 88.334197] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.340789] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.347351] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.353912] ^ [ 88.358062] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.364624] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.371185] ================================================================== [ 81.295959] ================================================================== [ 81.303222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1458/0x5ab0 [ 81.310668] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 81.317413] [ 81.318939] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 81.318969] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.318969] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.318969] Call trace: [ 81.318969] unwind_backtrace from show_stack+0x18/0x1c [ 81.319000] show_stack from dump_stack_lvl+0x70/0x90 [ 81.319030] dump_stack_lvl from print_report+0x158/0x528 [ 81.319061] print_report from kasan_report+0xdc/0x118 [ 81.319091] kasan_report from kasan_check_range+0x14c/0x198 [ 81.319091] kasan_check_range from kasan_atomics_helper+0x1458/0x5ab0 [ 81.319122] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.319152] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.319183] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.319213] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.319244] kthread from ret_from_fork+0x14/0x20 [ 81.319244] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 81.319274] 3fa0: 00000000 00000000 00000000 00000000 [ 81.319305] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.319305] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.319335] [ 81.436431] Allocated by task 321: [ 81.439849] kasan_save_track+0x30/0x5c [ 81.443725] __kasan_kmalloc+0x8c/0x94 [ 81.447509] kasan_atomics+0xc0/0x33c [ 81.451202] kunit_try_run_case+0x22c/0x5a8 [ 81.455413] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.460937] kthread+0x464/0x810 [ 81.464202] ret_from_fork+0x14/0x20 [ 81.467803] [ 81.469299] The buggy address belongs to the object at cc23e880 [ 81.469299] which belongs to the cache kmalloc-64 of size 64 [ 81.481048] The buggy address is located 0 bytes to the right of [ 81.481048] allocated 48-byte region [cc23e880, cc23e8b0) [ 81.492584] [ 81.494079] The buggy address belongs to the physical page: [ 81.499694] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 81.506958] flags: 0x0(zone=0) [ 81.510040] page_type: f5(slab) [ 81.513214] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.521362] raw: 00000000 [ 81.523986] page dumped because: kasan: bad access detected [ 81.529602] [ 81.531127] Memory state around the buggy address: [ 81.535949] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.542510] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.549072] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.555664] ^ [ 81.559783] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.566345] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.572937] ================================================================== [ 76.482971] ================================================================== [ 76.490234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x97c/0x5ab0 [ 76.497589] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 76.504333] [ 76.505859] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 76.505889] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.505889] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.505889] Call trace: [ 76.505920] unwind_backtrace from show_stack+0x18/0x1c [ 76.505950] show_stack from dump_stack_lvl+0x70/0x90 [ 76.505950] dump_stack_lvl from print_report+0x158/0x528 [ 76.505981] print_report from kasan_report+0xdc/0x118 [ 76.506011] kasan_report from kasan_check_range+0x14c/0x198 [ 76.506042] kasan_check_range from kasan_atomics_helper+0x97c/0x5ab0 [ 76.506072] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.506072] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.506103] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.506134] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.506164] kthread from ret_from_fork+0x14/0x20 [ 76.506195] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 76.506195] 3fa0: 00000000 00000000 00000000 00000000 [ 76.506225] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.506225] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.506256] [ 76.623260] Allocated by task 321: [ 76.626678] kasan_save_track+0x30/0x5c [ 76.630554] __kasan_kmalloc+0x8c/0x94 [ 76.634338] kasan_atomics+0xc0/0x33c [ 76.638031] kunit_try_run_case+0x22c/0x5a8 [ 76.642242] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.647796] kthread+0x464/0x810 [ 76.651031] ret_from_fork+0x14/0x20 [ 76.654632] [ 76.656158] The buggy address belongs to the object at cc23e880 [ 76.656158] which belongs to the cache kmalloc-64 of size 64 [ 76.667877] The buggy address is located 0 bytes to the right of [ 76.667877] allocated 48-byte region [cc23e880, cc23e8b0) [ 76.679412] [ 76.680938] The buggy address belongs to the physical page: [ 76.686523] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 76.693817] flags: 0x0(zone=0) [ 76.696899] page_type: f5(slab) [ 76.700073] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.708190] raw: 00000000 [ 76.710845] page dumped because: kasan: bad access detected [ 76.716461] [ 76.717956] Memory state around the buggy address: [ 76.722778] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.729339] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.735931] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.742492] ^ [ 76.746612] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.753204] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.759765] ================================================================== [ 88.378540] ================================================================== [ 88.385803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2388/0x5ab0 [ 88.393249] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 88.399993] [ 88.401489] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 88.401519] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.401550] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.401550] Call trace: [ 88.401550] unwind_backtrace from show_stack+0x18/0x1c [ 88.401580] show_stack from dump_stack_lvl+0x70/0x90 [ 88.401611] dump_stack_lvl from print_report+0x158/0x528 [ 88.401641] print_report from kasan_report+0xdc/0x118 [ 88.401672] kasan_report from kasan_check_range+0x14c/0x198 [ 88.401672] kasan_check_range from kasan_atomics_helper+0x2388/0x5ab0 [ 88.401702] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.401733] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.401763] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.401794] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.401794] kthread from ret_from_fork+0x14/0x20 [ 88.401824] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 88.401855] 3fa0: 00000000 00000000 00000000 00000000 [ 88.401855] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.401885] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.401885] [ 88.518981] Allocated by task 321: [ 88.522430] kasan_save_track+0x30/0x5c [ 88.526275] __kasan_kmalloc+0x8c/0x94 [ 88.530059] kasan_atomics+0xc0/0x33c [ 88.533782] kunit_try_run_case+0x22c/0x5a8 [ 88.537994] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.543518] kthread+0x464/0x810 [ 88.546783] ret_from_fork+0x14/0x20 [ 88.550384] [ 88.551879] The buggy address belongs to the object at cc23e880 [ 88.551879] which belongs to the cache kmalloc-64 of size 64 [ 88.563598] The buggy address is located 0 bytes to the right of [ 88.563598] allocated 48-byte region [cc23e880, cc23e8b0) [ 88.575164] [ 88.576660] The buggy address belongs to the physical page: [ 88.582275] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 88.589538] flags: 0x0(zone=0) [ 88.592620] page_type: f5(slab) [ 88.595794] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.603942] raw: 00000000 [ 88.606567] page dumped because: kasan: bad access detected [ 88.612182] [ 88.613677] Memory state around the buggy address: [ 88.618499] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.625061] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.631652] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.638214] ^ [ 88.642333] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.648925] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.655487] ================================================================== [ 85.541839] ================================================================== [ 85.549102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c9c/0x5ab0 [ 85.556549] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 85.563293] [ 85.564819] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 85.564849] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.564849] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.564849] Call trace: [ 85.564849] unwind_backtrace from show_stack+0x18/0x1c [ 85.564880] show_stack from dump_stack_lvl+0x70/0x90 [ 85.564910] dump_stack_lvl from print_report+0x158/0x528 [ 85.564941] print_report from kasan_report+0xdc/0x118 [ 85.564971] kasan_report from kasan_check_range+0x14c/0x198 [ 85.564971] kasan_check_range from kasan_atomics_helper+0x1c9c/0x5ab0 [ 85.565002] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.565032] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.565063] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.565093] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.565124] kthread from ret_from_fork+0x14/0x20 [ 85.565124] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 85.565155] 3fa0: 00000000 00000000 00000000 00000000 [ 85.565155] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.565185] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.565185] [ 85.682312] Allocated by task 321: [ 85.685729] kasan_save_track+0x30/0x5c [ 85.689605] __kasan_kmalloc+0x8c/0x94 [ 85.693389] kasan_atomics+0xc0/0x33c [ 85.697082] kunit_try_run_case+0x22c/0x5a8 [ 85.701293] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.706817] kthread+0x464/0x810 [ 85.710083] ret_from_fork+0x14/0x20 [ 85.713684] [ 85.715179] The buggy address belongs to the object at cc23e880 [ 85.715179] which belongs to the cache kmalloc-64 of size 64 [ 85.726928] The buggy address is located 0 bytes to the right of [ 85.726928] allocated 48-byte region [cc23e880, cc23e8b0) [ 85.738464] [ 85.739959] The buggy address belongs to the physical page: [ 85.745574] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 85.752838] flags: 0x0(zone=0) [ 85.755920] page_type: f5(slab) [ 85.759094] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.767242] raw: 00000000 [ 85.769897] page dumped because: kasan: bad access detected [ 85.775482] [ 85.776977] Memory state around the buggy address: [ 85.781799] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.788391] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.794952] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.801544] ^ [ 85.805664] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.812225] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.818786] ================================================================== [ 78.749999] ================================================================== [ 78.757263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xedc/0x5ab0 [ 78.764648] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 78.771392] [ 78.772888] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 78.772918] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.772918] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.772949] Call trace: [ 78.772949] unwind_backtrace from show_stack+0x18/0x1c [ 78.772979] show_stack from dump_stack_lvl+0x70/0x90 [ 78.773010] dump_stack_lvl from print_report+0x158/0x528 [ 78.773040] print_report from kasan_report+0xdc/0x118 [ 78.773040] kasan_report from kasan_check_range+0x14c/0x198 [ 78.773071] kasan_check_range from kasan_atomics_helper+0xedc/0x5ab0 [ 78.773101] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.773132] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.773162] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.773162] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.773193] kthread from ret_from_fork+0x14/0x20 [ 78.773223] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 78.773223] 3fa0: 00000000 00000000 00000000 00000000 [ 78.773254] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.773284] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.773284] [ 78.890289] Allocated by task 321: [ 78.893737] kasan_save_track+0x30/0x5c [ 78.897613] __kasan_kmalloc+0x8c/0x94 [ 78.901367] kasan_atomics+0xc0/0x33c [ 78.905090] kunit_try_run_case+0x22c/0x5a8 [ 78.909301] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.914825] kthread+0x464/0x810 [ 78.918090] ret_from_fork+0x14/0x20 [ 78.921691] [ 78.923187] The buggy address belongs to the object at cc23e880 [ 78.923187] which belongs to the cache kmalloc-64 of size 64 [ 78.934906] The buggy address is located 0 bytes to the right of [ 78.934906] allocated 48-byte region [cc23e880, cc23e8b0) [ 78.946472] [ 78.947967] The buggy address belongs to the physical page: [ 78.953582] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 78.960845] flags: 0x0(zone=0) [ 78.963928] page_type: f5(slab) [ 78.967102] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.975250] raw: 00000000 [ 78.977874] page dumped because: kasan: bad access detected [ 78.983489] [ 78.984985] Memory state around the buggy address: [ 78.989807] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.996398] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.002960] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.009521] ^ [ 79.013671] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.020233] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.026794] ================================================================== [ 74.499969] ================================================================== [ 74.507232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50bc/0x5ab0 [ 74.514678] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 74.521423] [ 74.522949] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 74.522979] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.522979] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.522979] Call trace: [ 74.523010] unwind_backtrace from show_stack+0x18/0x1c [ 74.523040] show_stack from dump_stack_lvl+0x70/0x90 [ 74.523040] dump_stack_lvl from print_report+0x158/0x528 [ 74.523071] print_report from kasan_report+0xdc/0x118 [ 74.523101] kasan_report from kasan_atomics_helper+0x50bc/0x5ab0 [ 74.523132] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.523162] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.523162] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.523193] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.523223] kthread from ret_from_fork+0x14/0x20 [ 74.523254] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 74.523254] 3fa0: 00000000 00000000 00000000 00000000 [ 74.523284] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.523315] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.523315] [ 74.634307] Allocated by task 321: [ 74.637725] kasan_save_track+0x30/0x5c [ 74.641601] __kasan_kmalloc+0x8c/0x94 [ 74.645385] kasan_atomics+0xc0/0x33c [ 74.649078] kunit_try_run_case+0x22c/0x5a8 [ 74.653289] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.658813] kthread+0x464/0x810 [ 74.662078] ret_from_fork+0x14/0x20 [ 74.665679] [ 74.667175] The buggy address belongs to the object at cc23e880 [ 74.667175] which belongs to the cache kmalloc-64 of size 64 [ 74.678924] The buggy address is located 0 bytes to the right of [ 74.678924] allocated 48-byte region [cc23e880, cc23e8b0) [ 74.690460] [ 74.691955] The buggy address belongs to the physical page: [ 74.697570] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 74.704833] flags: 0x0(zone=0) [ 74.707916] page_type: f5(slab) [ 74.711090] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.719238] raw: 00000000 [ 74.721893] page dumped because: kasan: bad access detected [ 74.727478] [ 74.729003] Memory state around the buggy address: [ 74.733825] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.740386] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.746948] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.753540] ^ [ 74.757659] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.764221] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.770812] ================================================================== [ 82.704925] ================================================================== [ 82.712188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52cc/0x5ab0 [ 82.719635] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 82.726409] [ 82.727905] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 82.727935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.727935] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.727966] Call trace: [ 82.727966] unwind_backtrace from show_stack+0x18/0x1c [ 82.727996] show_stack from dump_stack_lvl+0x70/0x90 [ 82.727996] dump_stack_lvl from print_report+0x158/0x528 [ 82.728027] print_report from kasan_report+0xdc/0x118 [ 82.728057] kasan_report from kasan_atomics_helper+0x52cc/0x5ab0 [ 82.728088] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.728118] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.728149] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.728149] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.728179] kthread from ret_from_fork+0x14/0x20 [ 82.728210] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 82.728210] 3fa0: 00000000 00000000 00000000 00000000 [ 82.728240] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.728271] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.728271] [ 82.839263] Allocated by task 321: [ 82.842681] kasan_save_track+0x30/0x5c [ 82.846557] __kasan_kmalloc+0x8c/0x94 [ 82.850341] kasan_atomics+0xc0/0x33c [ 82.854034] kunit_try_run_case+0x22c/0x5a8 [ 82.858245] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.863769] kthread+0x464/0x810 [ 82.867034] ret_from_fork+0x14/0x20 [ 82.870635] [ 82.872131] The buggy address belongs to the object at cc23e880 [ 82.872131] which belongs to the cache kmalloc-64 of size 64 [ 82.883880] The buggy address is located 0 bytes to the right of [ 82.883880] allocated 48-byte region [cc23e880, cc23e8b0) [ 82.895416] [ 82.896911] The buggy address belongs to the physical page: [ 82.902526] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 82.909790] flags: 0x0(zone=0) [ 82.912872] page_type: f5(slab) [ 82.916046] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.924194] raw: 00000000 [ 82.926849] page dumped because: kasan: bad access detected [ 82.932434] [ 82.933959] Memory state around the buggy address: [ 82.938781] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.945343] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.951934] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.958496] ^ [ 82.962615] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.969177] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.975769] ================================================================== [ 86.672790] ================================================================== [ 86.680053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f50/0x5ab0 [ 86.687530] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 86.694274] [ 86.695770] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 86.695800] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.695800] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.695831] Call trace: [ 86.695831] unwind_backtrace from show_stack+0x18/0x1c [ 86.695861] show_stack from dump_stack_lvl+0x70/0x90 [ 86.695892] dump_stack_lvl from print_report+0x158/0x528 [ 86.695892] print_report from kasan_report+0xdc/0x118 [ 86.695922] kasan_report from kasan_check_range+0x14c/0x198 [ 86.695953] kasan_check_range from kasan_atomics_helper+0x1f50/0x5ab0 [ 86.695983] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.696014] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.696014] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.696044] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.696075] kthread from ret_from_fork+0x14/0x20 [ 86.696105] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 86.696105] 3fa0: 00000000 00000000 00000000 00000000 [ 86.696136] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.696136] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.696166] [ 86.813262] Allocated by task 321: [ 86.816680] kasan_save_track+0x30/0x5c [ 86.820556] __kasan_kmalloc+0x8c/0x94 [ 86.824340] kasan_atomics+0xc0/0x33c [ 86.828033] kunit_try_run_case+0x22c/0x5a8 [ 86.832244] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.837799] kthread+0x464/0x810 [ 86.841033] ret_from_fork+0x14/0x20 [ 86.844635] [ 86.846160] The buggy address belongs to the object at cc23e880 [ 86.846160] which belongs to the cache kmalloc-64 of size 64 [ 86.857879] The buggy address is located 0 bytes to the right of [ 86.857879] allocated 48-byte region [cc23e880, cc23e8b0) [ 86.869415] [ 86.870941] The buggy address belongs to the physical page: [ 86.876525] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 86.883819] flags: 0x0(zone=0) [ 86.886901] page_type: f5(slab) [ 86.890075] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.898193] raw: 00000000 [ 86.900848] page dumped because: kasan: bad access detected [ 86.906463] [ 86.907958] Memory state around the buggy address: [ 86.912780] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.919342] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.925933] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.932495] ^ [ 86.936614] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.943206] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.949768] ================================================================== [ 79.034149] ================================================================== [ 79.041412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x5ab0 [ 79.048767] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 79.055511] [ 79.057037] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 79.057037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.057067] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.057067] Call trace: [ 79.057067] unwind_backtrace from show_stack+0x18/0x1c [ 79.057098] show_stack from dump_stack_lvl+0x70/0x90 [ 79.057128] dump_stack_lvl from print_report+0x158/0x528 [ 79.057159] print_report from kasan_report+0xdc/0x118 [ 79.057189] kasan_report from kasan_check_range+0x14c/0x198 [ 79.057189] kasan_check_range from kasan_atomics_helper+0xf88/0x5ab0 [ 79.057220] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.057250] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.057281] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.057312] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.057342] kthread from ret_from_fork+0x14/0x20 [ 79.057342] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 79.057373] 3fa0: 00000000 00000000 00000000 00000000 [ 79.057373] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.057403] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.057403] [ 79.174438] Allocated by task 321: [ 79.177856] kasan_save_track+0x30/0x5c [ 79.181732] __kasan_kmalloc+0x8c/0x94 [ 79.185516] kasan_atomics+0xc0/0x33c [ 79.189208] kunit_try_run_case+0x22c/0x5a8 [ 79.193420] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.198944] kthread+0x464/0x810 [ 79.202209] ret_from_fork+0x14/0x20 [ 79.205810] [ 79.207305] The buggy address belongs to the object at cc23e880 [ 79.207305] which belongs to the cache kmalloc-64 of size 64 [ 79.219055] The buggy address is located 0 bytes to the right of [ 79.219055] allocated 48-byte region [cc23e880, cc23e8b0) [ 79.230590] [ 79.232086] The buggy address belongs to the physical page: [ 79.237701] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 79.244964] flags: 0x0(zone=0) [ 79.248046] page_type: f5(slab) [ 79.251220] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.259368] raw: 00000000 [ 79.262023] page dumped because: kasan: bad access detected [ 79.267608] [ 79.269134] Memory state around the buggy address: [ 79.273956] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.280517] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.287078] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.293670] ^ [ 79.297790] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.304351] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.310943] ================================================================== [ 79.318267] ================================================================== [ 79.325531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1034/0x5ab0 [ 79.332977] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 79.339721] [ 79.341247] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 79.341278] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.341278] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.341278] Call trace: [ 79.341308] unwind_backtrace from show_stack+0x18/0x1c [ 79.341308] show_stack from dump_stack_lvl+0x70/0x90 [ 79.341339] dump_stack_lvl from print_report+0x158/0x528 [ 79.341369] print_report from kasan_report+0xdc/0x118 [ 79.341400] kasan_report from kasan_check_range+0x14c/0x198 [ 79.341430] kasan_check_range from kasan_atomics_helper+0x1034/0x5ab0 [ 79.341430] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.341461] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.341491] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.341522] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.341552] kthread from ret_from_fork+0x14/0x20 [ 79.341552] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 79.341583] 3fa0: 00000000 00000000 00000000 00000000 [ 79.341613] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.341613] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.341644] [ 79.458740] Allocated by task 321: [ 79.462158] kasan_save_track+0x30/0x5c [ 79.466033] __kasan_kmalloc+0x8c/0x94 [ 79.469818] kasan_atomics+0xc0/0x33c [ 79.473510] kunit_try_run_case+0x22c/0x5a8 [ 79.477722] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.483245] kthread+0x464/0x810 [ 79.486511] ret_from_fork+0x14/0x20 [ 79.490112] [ 79.491638] The buggy address belongs to the object at cc23e880 [ 79.491638] which belongs to the cache kmalloc-64 of size 64 [ 79.503356] The buggy address is located 0 bytes to the right of [ 79.503356] allocated 48-byte region [cc23e880, cc23e8b0) [ 79.514892] [ 79.516418] The buggy address belongs to the physical page: [ 79.522003] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 79.529296] flags: 0x0(zone=0) [ 79.532379] page_type: f5(slab) [ 79.535522] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.543670] raw: 00000000 [ 79.546325] page dumped because: kasan: bad access detected [ 79.551940] [ 79.553436] Memory state around the buggy address: [ 79.558258] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.564819] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.571380] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.577972] ^ [ 79.582092] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.588653] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.595245] ================================================================== [ 80.733581] ================================================================== [ 80.740844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1360/0x5ab0 [ 80.748291] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 80.755035] [ 80.756561] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 80.756561] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.756591] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.756591] Call trace: [ 80.756591] unwind_backtrace from show_stack+0x18/0x1c [ 80.756622] show_stack from dump_stack_lvl+0x70/0x90 [ 80.756652] dump_stack_lvl from print_report+0x158/0x528 [ 80.756683] print_report from kasan_report+0xdc/0x118 [ 80.756713] kasan_report from kasan_check_range+0x14c/0x198 [ 80.756713] kasan_check_range from kasan_atomics_helper+0x1360/0x5ab0 [ 80.756744] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.756774] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.756805] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.756835] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.756866] kthread from ret_from_fork+0x14/0x20 [ 80.756866] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 80.756896] 3fa0: 00000000 00000000 00000000 00000000 [ 80.756896] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.756927] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.756927] [ 80.874053] Allocated by task 321: [ 80.877471] kasan_save_track+0x30/0x5c [ 80.881347] __kasan_kmalloc+0x8c/0x94 [ 80.885131] kasan_atomics+0xc0/0x33c [ 80.888824] kunit_try_run_case+0x22c/0x5a8 [ 80.893035] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.898559] kthread+0x464/0x810 [ 80.901824] ret_from_fork+0x14/0x20 [ 80.905426] [ 80.906921] The buggy address belongs to the object at cc23e880 [ 80.906921] which belongs to the cache kmalloc-64 of size 64 [ 80.918640] The buggy address is located 0 bytes to the right of [ 80.918640] allocated 48-byte region [cc23e880, cc23e8b0) [ 80.930206] [ 80.931701] The buggy address belongs to the physical page: [ 80.937316] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 80.944580] flags: 0x0(zone=0) [ 80.947662] page_type: f5(slab) [ 80.950836] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.958984] raw: 00000000 [ 80.961608] page dumped because: kasan: bad access detected [ 80.967224] [ 80.968719] Memory state around the buggy address: [ 80.973541] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.980133] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.986694] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.993286] ^ [ 80.997406] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.003967] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.010528] ================================================================== [ 75.630554] ================================================================== [ 75.637817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x790/0x5ab0 [ 75.645202] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 75.651947] [ 75.653442] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 75.653472] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.653472] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.653503] Call trace: [ 75.653503] unwind_backtrace from show_stack+0x18/0x1c [ 75.653533] show_stack from dump_stack_lvl+0x70/0x90 [ 75.653564] dump_stack_lvl from print_report+0x158/0x528 [ 75.653564] print_report from kasan_report+0xdc/0x118 [ 75.653594] kasan_report from kasan_check_range+0x14c/0x198 [ 75.653625] kasan_check_range from kasan_atomics_helper+0x790/0x5ab0 [ 75.653656] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.653686] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.653686] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.653717] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.653747] kthread from ret_from_fork+0x14/0x20 [ 75.653778] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 75.653778] 3fa0: 00000000 00000000 00000000 00000000 [ 75.653808] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.653839] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.653839] [ 75.770843] Allocated by task 321: [ 75.774291] kasan_save_track+0x30/0x5c [ 75.778137] __kasan_kmalloc+0x8c/0x94 [ 75.781951] kasan_atomics+0xc0/0x33c [ 75.785644] kunit_try_run_case+0x22c/0x5a8 [ 75.789855] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.795379] kthread+0x464/0x810 [ 75.798645] ret_from_fork+0x14/0x20 [ 75.802246] [ 75.803741] The buggy address belongs to the object at cc23e880 [ 75.803741] which belongs to the cache kmalloc-64 of size 64 [ 75.815490] The buggy address is located 0 bytes to the right of [ 75.815490] allocated 48-byte region [cc23e880, cc23e8b0) [ 75.827026] [ 75.828521] The buggy address belongs to the physical page: [ 75.834136] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 75.841400] flags: 0x0(zone=0) [ 75.844482] page_type: f5(slab) [ 75.847656] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.855804] raw: 00000000 [ 75.858459] page dumped because: kasan: bad access detected [ 75.864044] [ 75.865570] Memory state around the buggy address: [ 75.870391] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.876953] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.883514] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.890106] ^ [ 75.894226] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.900787] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.907379] ================================================================== [ 86.394714] ================================================================== [ 86.401977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x544c/0x5ab0 [ 86.409454] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 86.416107] [ 86.417602] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 86.417633] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.417633] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.417663] Call trace: [ 86.417663] unwind_backtrace from show_stack+0x18/0x1c [ 86.417694] show_stack from dump_stack_lvl+0x70/0x90 [ 86.417724] dump_stack_lvl from print_report+0x158/0x528 [ 86.417755] print_report from kasan_report+0xdc/0x118 [ 86.417755] kasan_report from kasan_atomics_helper+0x544c/0x5ab0 [ 86.417785] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.417816] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.417846] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.417877] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.417907] kthread from ret_from_fork+0x14/0x20 [ 86.417907] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 86.417938] 3fa0: 00000000 00000000 00000000 00000000 [ 86.417938] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.417968] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.417968] [ 86.528961] Allocated by task 321: [ 86.532379] kasan_save_track+0x30/0x5c [ 86.536254] __kasan_kmalloc+0x8c/0x94 [ 86.540039] kasan_atomics+0xc0/0x33c [ 86.543731] kunit_try_run_case+0x22c/0x5a8 [ 86.547943] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.553497] kthread+0x464/0x810 [ 86.556732] ret_from_fork+0x14/0x20 [ 86.560333] [ 86.561859] The buggy address belongs to the object at cc23e880 [ 86.561859] which belongs to the cache kmalloc-64 of size 64 [ 86.573577] The buggy address is located 0 bytes to the right of [ 86.573577] allocated 48-byte region [cc23e880, cc23e8b0) [ 86.585113] [ 86.586639] The buggy address belongs to the physical page: [ 86.592224] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 86.599517] flags: 0x0(zone=0) [ 86.602600] page_type: f5(slab) [ 86.605773] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.613891] raw: 00000000 [ 86.616546] page dumped because: kasan: bad access detected [ 86.622161] [ 86.623657] Memory state around the buggy address: [ 86.628479] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.635040] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.641632] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.648193] ^ [ 86.652313] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.658905] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.665466] ================================================================== [ 74.778137] ================================================================== [ 74.785400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5a4/0x5ab0 [ 74.792785] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 74.799530] [ 74.801025] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 74.801055] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.801055] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.801086] Call trace: [ 74.801086] unwind_backtrace from show_stack+0x18/0x1c [ 74.801116] show_stack from dump_stack_lvl+0x70/0x90 [ 74.801147] dump_stack_lvl from print_report+0x158/0x528 [ 74.801177] print_report from kasan_report+0xdc/0x118 [ 74.801177] kasan_report from kasan_check_range+0x14c/0x198 [ 74.801208] kasan_check_range from kasan_atomics_helper+0x5a4/0x5ab0 [ 74.801239] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.801269] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.801269] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.801300] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.801330] kthread from ret_from_fork+0x14/0x20 [ 74.801361] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 74.801361] 3fa0: 00000000 00000000 00000000 00000000 [ 74.801391] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.801422] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.801422] [ 74.918426] Allocated by task 321: [ 74.921874] kasan_save_track+0x30/0x5c [ 74.925720] __kasan_kmalloc+0x8c/0x94 [ 74.929504] kasan_atomics+0xc0/0x33c [ 74.933227] kunit_try_run_case+0x22c/0x5a8 [ 74.937438] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.942962] kthread+0x464/0x810 [ 74.946228] ret_from_fork+0x14/0x20 [ 74.949829] [ 74.951324] The buggy address belongs to the object at cc23e880 [ 74.951324] which belongs to the cache kmalloc-64 of size 64 [ 74.963043] The buggy address is located 0 bytes to the right of [ 74.963043] allocated 48-byte region [cc23e880, cc23e8b0) [ 74.974609] [ 74.976104] The buggy address belongs to the physical page: [ 74.981719] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 74.988983] flags: 0x0(zone=0) [ 74.992065] page_type: f5(slab) [ 74.995239] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.003387] raw: 00000000 [ 75.006011] page dumped because: kasan: bad access detected [ 75.011627] [ 75.013153] Memory state around the buggy address: [ 75.017974] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.024536] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.031097] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.037689] ^ [ 75.041809] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.048370] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.054962] ================================================================== [ 84.404602] ================================================================== [ 84.411865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a04/0x5ab0 [ 84.419342] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 84.426086] [ 84.427581] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 84.427612] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.427612] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.427642] Call trace: [ 84.427642] unwind_backtrace from show_stack+0x18/0x1c [ 84.427673] show_stack from dump_stack_lvl+0x70/0x90 [ 84.427703] dump_stack_lvl from print_report+0x158/0x528 [ 84.427734] print_report from kasan_report+0xdc/0x118 [ 84.427734] kasan_report from kasan_check_range+0x14c/0x198 [ 84.427764] kasan_check_range from kasan_atomics_helper+0x1a04/0x5ab0 [ 84.427795] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.427825] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.427856] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.427856] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.427886] kthread from ret_from_fork+0x14/0x20 [ 84.427917] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 84.427917] 3fa0: 00000000 00000000 00000000 00000000 [ 84.427947] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.427978] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.427978] [ 84.545074] Allocated by task 321: [ 84.548522] kasan_save_track+0x30/0x5c [ 84.552368] __kasan_kmalloc+0x8c/0x94 [ 84.556152] kasan_atomics+0xc0/0x33c [ 84.559875] kunit_try_run_case+0x22c/0x5a8 [ 84.564086] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.569610] kthread+0x464/0x810 [ 84.572875] ret_from_fork+0x14/0x20 [ 84.576477] [ 84.577972] The buggy address belongs to the object at cc23e880 [ 84.577972] which belongs to the cache kmalloc-64 of size 64 [ 84.589691] The buggy address is located 0 bytes to the right of [ 84.589691] allocated 48-byte region [cc23e880, cc23e8b0) [ 84.601257] [ 84.602752] The buggy address belongs to the physical page: [ 84.608367] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 84.615631] flags: 0x0(zone=0) [ 84.618713] page_type: f5(slab) [ 84.621887] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.630035] raw: 00000000 [ 84.632659] page dumped because: kasan: bad access detected [ 84.638275] [ 84.639770] Memory state around the buggy address: [ 84.644592] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.651184] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.657745] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.664306] ^ [ 84.668457] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.675018] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.681579] ================================================================== [ 88.662811] ================================================================== [ 88.670074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9c/0x5ab0 [ 88.677520] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 88.684204] [ 88.685699] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 88.685729] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.685729] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.685760] Call trace: [ 88.685760] unwind_backtrace from show_stack+0x18/0x1c [ 88.685791] show_stack from dump_stack_lvl+0x70/0x90 [ 88.685791] dump_stack_lvl from print_report+0x158/0x528 [ 88.685821] print_report from kasan_report+0xdc/0x118 [ 88.685852] kasan_report from kasan_atomics_helper+0x4f9c/0x5ab0 [ 88.685882] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.685913] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.685943] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.685943] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.685974] kthread from ret_from_fork+0x14/0x20 [ 88.686004] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 88.686004] 3fa0: 00000000 00000000 00000000 00000000 [ 88.686035] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.686065] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.686065] [ 88.797058] Allocated by task 321: [ 88.800476] kasan_save_track+0x30/0x5c [ 88.804351] __kasan_kmalloc+0x8c/0x94 [ 88.808135] kasan_atomics+0xc0/0x33c [ 88.811828] kunit_try_run_case+0x22c/0x5a8 [ 88.816040] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.821563] kthread+0x464/0x810 [ 88.824829] ret_from_fork+0x14/0x20 [ 88.828430] [ 88.829925] The buggy address belongs to the object at cc23e880 [ 88.829925] which belongs to the cache kmalloc-64 of size 64 [ 88.841644] The buggy address is located 0 bytes to the right of [ 88.841644] allocated 48-byte region [cc23e880, cc23e8b0) [ 88.853210] [ 88.854705] The buggy address belongs to the physical page: [ 88.860321] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 88.867584] flags: 0x0(zone=0) [ 88.870666] page_type: f5(slab) [ 88.873840] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.881988] raw: 00000000 [ 88.884613] page dumped because: kasan: bad access detected [ 88.890228] [ 88.891723] Memory state around the buggy address: [ 88.896545] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.903137] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.909698] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.916259] ^ [ 88.920379] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.926971] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.933532] ================================================================== [ 82.983093] ================================================================== [ 82.990356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x5ab0 [ 82.997802] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 83.004547] [ 83.006072] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 83.006103] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.006103] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.006103] Call trace: [ 83.006134] unwind_backtrace from show_stack+0x18/0x1c [ 83.006134] show_stack from dump_stack_lvl+0x70/0x90 [ 83.006164] dump_stack_lvl from print_report+0x158/0x528 [ 83.006195] print_report from kasan_report+0xdc/0x118 [ 83.006225] kasan_report from kasan_check_range+0x14c/0x198 [ 83.006256] kasan_check_range from kasan_atomics_helper+0x16d0/0x5ab0 [ 83.006256] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.006286] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.006317] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.006347] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.006378] kthread from ret_from_fork+0x14/0x20 [ 83.006378] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 83.006408] 3fa0: 00000000 00000000 00000000 00000000 [ 83.006439] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.006439] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.006469] [ 83.123565] Allocated by task 321: [ 83.126983] kasan_save_track+0x30/0x5c [ 83.130859] __kasan_kmalloc+0x8c/0x94 [ 83.134643] kasan_atomics+0xc0/0x33c [ 83.138336] kunit_try_run_case+0x22c/0x5a8 [ 83.142547] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.148071] kthread+0x464/0x810 [ 83.151336] ret_from_fork+0x14/0x20 [ 83.154937] [ 83.156433] The buggy address belongs to the object at cc23e880 [ 83.156433] which belongs to the cache kmalloc-64 of size 64 [ 83.168182] The buggy address is located 0 bytes to the right of [ 83.168182] allocated 48-byte region [cc23e880, cc23e8b0) [ 83.179718] [ 83.181213] The buggy address belongs to the physical page: [ 83.186828] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 83.194091] flags: 0x0(zone=0) [ 83.197174] page_type: f5(slab) [ 83.200347] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.208496] raw: 00000000 [ 83.211151] page dumped because: kasan: bad access detected [ 83.216735] [ 83.218261] Memory state around the buggy address: [ 83.223083] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.229644] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.236206] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.242797] ^ [ 83.246917] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.253479] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.260070] ================================================================== [ 74.215820] ================================================================== [ 74.223083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e0/0x5ab0 [ 74.230468] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 74.237213] [ 74.238708] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 74.238739] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.238769] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.238769] Call trace: [ 74.238769] unwind_backtrace from show_stack+0x18/0x1c [ 74.238800] show_stack from dump_stack_lvl+0x70/0x90 [ 74.238830] dump_stack_lvl from print_report+0x158/0x528 [ 74.238861] print_report from kasan_report+0xdc/0x118 [ 74.238891] kasan_report from kasan_check_range+0x14c/0x198 [ 74.238891] kasan_check_range from kasan_atomics_helper+0x4e0/0x5ab0 [ 74.238922] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.238952] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.238983] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.239013] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.239044] kthread from ret_from_fork+0x14/0x20 [ 74.239044] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 74.239074] 3fa0: 00000000 00000000 00000000 00000000 [ 74.239074] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.239105] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.239105] [ 74.356140] Allocated by task 321: [ 74.359558] kasan_save_track+0x30/0x5c [ 74.363433] __kasan_kmalloc+0x8c/0x94 [ 74.367218] kasan_atomics+0xc0/0x33c [ 74.370910] kunit_try_run_case+0x22c/0x5a8 [ 74.375122] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.380645] kthread+0x464/0x810 [ 74.383911] ret_from_fork+0x14/0x20 [ 74.387512] [ 74.389007] The buggy address belongs to the object at cc23e880 [ 74.389007] which belongs to the cache kmalloc-64 of size 64 [ 74.400756] The buggy address is located 0 bytes to the right of [ 74.400756] allocated 48-byte region [cc23e880, cc23e8b0) [ 74.412292] [ 74.413818] The buggy address belongs to the physical page: [ 74.419403] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 74.426696] flags: 0x0(zone=0) [ 74.429779] page_type: f5(slab) [ 74.432922] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.441070] raw: 00000000 [ 74.443725] page dumped because: kasan: bad access detected [ 74.449340] [ 74.450836] Memory state around the buggy address: [ 74.455657] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.462219] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.468811] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.475372] ^ [ 74.479492] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.486083] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.492645] ================================================================== [ 75.914703] ================================================================== [ 75.921966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x834/0x5ab0 [ 75.929321] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 75.936065] [ 75.937591] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 75.937622] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.937622] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.937652] Call trace: [ 75.937652] unwind_backtrace from show_stack+0x18/0x1c [ 75.937683] show_stack from dump_stack_lvl+0x70/0x90 [ 75.937683] dump_stack_lvl from print_report+0x158/0x528 [ 75.937713] print_report from kasan_report+0xdc/0x118 [ 75.937744] kasan_report from kasan_check_range+0x14c/0x198 [ 75.937774] kasan_check_range from kasan_atomics_helper+0x834/0x5ab0 [ 75.937805] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.937805] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.937835] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.937866] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.937896] kthread from ret_from_fork+0x14/0x20 [ 75.937927] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 75.937927] 3fa0: 00000000 00000000 00000000 00000000 [ 75.937957] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.937957] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.937988] [ 76.054992] Allocated by task 321: [ 76.058410] kasan_save_track+0x30/0x5c [ 76.062286] __kasan_kmalloc+0x8c/0x94 [ 76.066070] kasan_atomics+0xc0/0x33c [ 76.069763] kunit_try_run_case+0x22c/0x5a8 [ 76.073974] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.079528] kthread+0x464/0x810 [ 76.082763] ret_from_fork+0x14/0x20 [ 76.086364] [ 76.087890] The buggy address belongs to the object at cc23e880 [ 76.087890] which belongs to the cache kmalloc-64 of size 64 [ 76.099609] The buggy address is located 0 bytes to the right of [ 76.099609] allocated 48-byte region [cc23e880, cc23e8b0) [ 76.111145] [ 76.112670] The buggy address belongs to the physical page: [ 76.118255] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 76.125549] flags: 0x0(zone=0) [ 76.128631] page_type: f5(slab) [ 76.131805] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.139953] raw: 00000000 [ 76.142578] page dumped because: kasan: bad access detected [ 76.148193] [ 76.149688] Memory state around the buggy address: [ 76.154510] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.161071] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.167663] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.174224] ^ [ 76.178344] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.184936] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.191497] ================================================================== [ 73.653686] ================================================================== [ 73.660949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x420/0x5ab0 [ 73.668304] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 73.674957] [ 73.676483] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 73.676513] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.676513] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.676513] Call trace: [ 73.676544] unwind_backtrace from show_stack+0x18/0x1c [ 73.676574] show_stack from dump_stack_lvl+0x70/0x90 [ 73.676574] dump_stack_lvl from print_report+0x158/0x528 [ 73.676605] print_report from kasan_report+0xdc/0x118 [ 73.676635] kasan_report from kasan_check_range+0x14c/0x198 [ 73.676666] kasan_check_range from kasan_atomics_helper+0x420/0x5ab0 [ 73.676696] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.676696] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.676727] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.676757] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.676788] kthread from ret_from_fork+0x14/0x20 [ 73.676818] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 73.676818] 3fa0: 00000000 00000000 00000000 00000000 [ 73.676849] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.676849] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.676879] [ 73.793884] Allocated by task 321: [ 73.797302] kasan_save_track+0x30/0x5c [ 73.801177] __kasan_kmalloc+0x8c/0x94 [ 73.804962] kasan_atomics+0xc0/0x33c [ 73.808654] kunit_try_run_case+0x22c/0x5a8 [ 73.812866] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.818420] kthread+0x464/0x810 [ 73.821655] ret_from_fork+0x14/0x20 [ 73.825286] [ 73.826782] The buggy address belongs to the object at cc23e880 [ 73.826782] which belongs to the cache kmalloc-64 of size 64 [ 73.838500] The buggy address is located 0 bytes to the right of [ 73.838500] allocated 48-byte region [cc23e880, cc23e8b0) [ 73.850067] [ 73.851562] The buggy address belongs to the physical page: [ 73.857177] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 73.864440] flags: 0x0(zone=0) [ 73.867523] page_type: f5(slab) [ 73.870697] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.878845] raw: 00000000 [ 73.881469] page dumped because: kasan: bad access detected [ 73.887084] [ 73.888580] Memory state around the buggy address: [ 73.893402] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.899993] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.906555] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.913116] ^ [ 73.917266] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.923828] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.930389] ================================================================== [ 81.580261] ================================================================== [ 81.587524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52d8/0x5ab0 [ 81.594970] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 81.601623] [ 81.603149] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 81.603179] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.603179] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.603179] Call trace: [ 81.603210] unwind_backtrace from show_stack+0x18/0x1c [ 81.603210] show_stack from dump_stack_lvl+0x70/0x90 [ 81.603240] dump_stack_lvl from print_report+0x158/0x528 [ 81.603271] print_report from kasan_report+0xdc/0x118 [ 81.603302] kasan_report from kasan_atomics_helper+0x52d8/0x5ab0 [ 81.603332] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.603332] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.603363] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.603393] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.603424] kthread from ret_from_fork+0x14/0x20 [ 81.603454] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 81.603454] 3fa0: 00000000 00000000 00000000 00000000 [ 81.603485] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.603485] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.603515] [ 81.714508] Allocated by task 321: [ 81.717926] kasan_save_track+0x30/0x5c [ 81.721801] __kasan_kmalloc+0x8c/0x94 [ 81.725585] kasan_atomics+0xc0/0x33c [ 81.729278] kunit_try_run_case+0x22c/0x5a8 [ 81.733489] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.739013] kthread+0x464/0x810 [ 81.742279] ret_from_fork+0x14/0x20 [ 81.745880] [ 81.747375] The buggy address belongs to the object at cc23e880 [ 81.747375] which belongs to the cache kmalloc-64 of size 64 [ 81.759094] The buggy address is located 0 bytes to the right of [ 81.759094] allocated 48-byte region [cc23e880, cc23e8b0) [ 81.770660] [ 81.772155] The buggy address belongs to the physical page: [ 81.777770] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 81.785034] flags: 0x0(zone=0) [ 81.788116] page_type: f5(slab) [ 81.791290] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.799438] raw: 00000000 [ 81.802093] page dumped because: kasan: bad access detected [ 81.807678] [ 81.809204] Memory state around the buggy address: [ 81.814025] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.820587] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.827148] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.833740] ^ [ 81.837860] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.844421] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.850982] ================================================================== [ 83.551696] ================================================================== [ 83.558959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5ab0 [ 83.566436] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 83.573181] [ 83.574676] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 83.574707] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.574707] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.574737] Call trace: [ 83.574737] unwind_backtrace from show_stack+0x18/0x1c [ 83.574768] show_stack from dump_stack_lvl+0x70/0x90 [ 83.574798] dump_stack_lvl from print_report+0x158/0x528 [ 83.574829] print_report from kasan_report+0xdc/0x118 [ 83.574829] kasan_report from kasan_check_range+0x14c/0x198 [ 83.574859] kasan_check_range from kasan_atomics_helper+0x1818/0x5ab0 [ 83.574890] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.574920] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.574920] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.574951] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.574981] kthread from ret_from_fork+0x14/0x20 [ 83.575012] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 83.575012] 3fa0: 00000000 00000000 00000000 00000000 [ 83.575042] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.575073] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.575073] [ 83.692169] Allocated by task 321: [ 83.695617] kasan_save_track+0x30/0x5c [ 83.699462] __kasan_kmalloc+0x8c/0x94 [ 83.703247] kasan_atomics+0xc0/0x33c [ 83.706939] kunit_try_run_case+0x22c/0x5a8 [ 83.711181] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.716705] kthread+0x464/0x810 [ 83.719940] ret_from_fork+0x14/0x20 [ 83.723571] [ 83.725067] The buggy address belongs to the object at cc23e880 [ 83.725067] which belongs to the cache kmalloc-64 of size 64 [ 83.736785] The buggy address is located 0 bytes to the right of [ 83.736785] allocated 48-byte region [cc23e880, cc23e8b0) [ 83.748321] [ 83.749847] The buggy address belongs to the physical page: [ 83.755432] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 83.762725] flags: 0x0(zone=0) [ 83.765808] page_type: f5(slab) [ 83.768981] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.777099] raw: 00000000 [ 83.779754] page dumped because: kasan: bad access detected [ 83.785369] [ 83.786865] Memory state around the buggy address: [ 83.791687] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.798248] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.804840] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.811401] ^ [ 83.815521] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.822113] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.828674] ================================================================== [ 72.819213] ================================================================== [ 72.826477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x514c/0x5ab0 [ 72.833923] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 72.840667] [ 72.842193] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 72.842224] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.842224] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.842254] Call trace: [ 72.842254] unwind_backtrace from show_stack+0x18/0x1c [ 72.842285] show_stack from dump_stack_lvl+0x70/0x90 [ 72.842285] dump_stack_lvl from print_report+0x158/0x528 [ 72.842315] print_report from kasan_report+0xdc/0x118 [ 72.842346] kasan_report from kasan_atomics_helper+0x514c/0x5ab0 [ 72.842376] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 72.842407] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 72.842437] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.842437] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.842468] kthread from ret_from_fork+0x14/0x20 [ 72.842498] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 72.842498] 3fa0: 00000000 00000000 00000000 00000000 [ 72.842529] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.842559] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.842559] [ 72.953552] Allocated by task 321: [ 72.956970] kasan_save_track+0x30/0x5c [ 72.960845] __kasan_kmalloc+0x8c/0x94 [ 72.964630] kasan_atomics+0xc0/0x33c [ 72.968322] kunit_try_run_case+0x22c/0x5a8 [ 72.972534] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.978088] kthread+0x464/0x810 [ 72.981323] ret_from_fork+0x14/0x20 [ 72.984924] [ 72.986450] The buggy address belongs to the object at cc23e880 [ 72.986450] which belongs to the cache kmalloc-64 of size 64 [ 72.998168] The buggy address is located 0 bytes to the right of [ 72.998168] allocated 48-byte region [cc23e880, cc23e8b0) [ 73.009735] [ 73.011230] The buggy address belongs to the physical page: [ 73.016845] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 73.024108] flags: 0x0(zone=0) [ 73.027191] page_type: f5(slab) [ 73.030364] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.038513] raw: 00000000 [ 73.041137] page dumped because: kasan: bad access detected [ 73.046752] [ 73.048248] Memory state around the buggy address: [ 73.053070] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.059661] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.066223] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.072784] ^ [ 73.076904] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.083496] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.090057] ================================================================== [ 77.335388] ================================================================== [ 77.342651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x5ab0 [ 77.350036] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 77.356781] [ 77.358276] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 77.358306] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.358306] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.358337] Call trace: [ 77.358337] unwind_backtrace from show_stack+0x18/0x1c [ 77.358367] show_stack from dump_stack_lvl+0x70/0x90 [ 77.358398] dump_stack_lvl from print_report+0x158/0x528 [ 77.358428] print_report from kasan_report+0xdc/0x118 [ 77.358428] kasan_report from kasan_check_range+0x14c/0x198 [ 77.358459] kasan_check_range from kasan_atomics_helper+0xb70/0x5ab0 [ 77.358489] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.358520] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.358551] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.358551] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.358581] kthread from ret_from_fork+0x14/0x20 [ 77.358612] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 77.358642] 3fa0: 00000000 00000000 00000000 00000000 [ 77.358642] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.358673] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.358673] [ 77.475708] Allocated by task 321: [ 77.479125] kasan_save_track+0x30/0x5c [ 77.483001] __kasan_kmalloc+0x8c/0x94 [ 77.486755] kasan_atomics+0xc0/0x33c [ 77.490478] kunit_try_run_case+0x22c/0x5a8 [ 77.494689] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.500213] kthread+0x464/0x810 [ 77.503479] ret_from_fork+0x14/0x20 [ 77.507080] [ 77.508575] The buggy address belongs to the object at cc23e880 [ 77.508575] which belongs to the cache kmalloc-64 of size 64 [ 77.520294] The buggy address is located 0 bytes to the right of [ 77.520294] allocated 48-byte region [cc23e880, cc23e8b0) [ 77.531860] [ 77.533355] The buggy address belongs to the physical page: [ 77.538970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 77.546234] flags: 0x0(zone=0) [ 77.549316] page_type: f5(slab) [ 77.552490] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.560638] raw: 00000000 [ 77.563262] page dumped because: kasan: bad access detected [ 77.568878] [ 77.570373] Memory state around the buggy address: [ 77.575195] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.581787] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.588348] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.594940] ^ [ 77.599060] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.605621] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.612182] ================================================================== [ 84.688934] ================================================================== [ 84.696197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1aa8/0x5ab0 [ 84.703643] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 84.710388] [ 84.711914] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 84.711944] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.711944] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.711944] Call trace: [ 84.711944] unwind_backtrace from show_stack+0x18/0x1c [ 84.711975] show_stack from dump_stack_lvl+0x70/0x90 [ 84.712005] dump_stack_lvl from print_report+0x158/0x528 [ 84.712036] print_report from kasan_report+0xdc/0x118 [ 84.712066] kasan_report from kasan_check_range+0x14c/0x198 [ 84.712066] kasan_check_range from kasan_atomics_helper+0x1aa8/0x5ab0 [ 84.712097] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.712127] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.712158] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.712188] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.712219] kthread from ret_from_fork+0x14/0x20 [ 84.712219] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 84.712249] 3fa0: 00000000 00000000 00000000 00000000 [ 84.712249] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.712280] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.712280] [ 84.829406] Allocated by task 321: [ 84.832824] kasan_save_track+0x30/0x5c [ 84.836700] __kasan_kmalloc+0x8c/0x94 [ 84.840484] kasan_atomics+0xc0/0x33c [ 84.844177] kunit_try_run_case+0x22c/0x5a8 [ 84.848388] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.853912] kthread+0x464/0x810 [ 84.857177] ret_from_fork+0x14/0x20 [ 84.860778] [ 84.862274] The buggy address belongs to the object at cc23e880 [ 84.862274] which belongs to the cache kmalloc-64 of size 64 [ 84.873992] The buggy address is located 0 bytes to the right of [ 84.873992] allocated 48-byte region [cc23e880, cc23e8b0) [ 84.885559] [ 84.887054] The buggy address belongs to the physical page: [ 84.892669] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 84.899932] flags: 0x0(zone=0) [ 84.903015] page_type: f5(slab) [ 84.906188] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.914337] raw: 00000000 [ 84.916961] page dumped because: kasan: bad access detected [ 84.922576] [ 84.924072] Memory state around the buggy address: [ 84.928924] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.935485] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.942047] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.948638] ^ [ 84.952758] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.959320] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.965881] ================================================================== [ 88.940856] ================================================================== [ 88.948150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2480/0x5ab0 [ 88.955596] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 88.962341] [ 88.963836] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 88.963867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.963897] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.963897] Call trace: [ 88.963897] unwind_backtrace from show_stack+0x18/0x1c [ 88.963928] show_stack from dump_stack_lvl+0x70/0x90 [ 88.963958] dump_stack_lvl from print_report+0x158/0x528 [ 88.963989] print_report from kasan_report+0xdc/0x118 [ 88.964019] kasan_report from kasan_check_range+0x14c/0x198 [ 88.964019] kasan_check_range from kasan_atomics_helper+0x2480/0x5ab0 [ 88.964050] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.964080] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.964111] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.964141] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.964141] kthread from ret_from_fork+0x14/0x20 [ 88.964172] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 88.964202] 3fa0: 00000000 00000000 00000000 00000000 [ 88.964202] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.964233] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.964233] [ 89.081359] Allocated by task 321: [ 89.084777] kasan_save_track+0x30/0x5c [ 89.088653] __kasan_kmalloc+0x8c/0x94 [ 89.092437] kasan_atomics+0xc0/0x33c [ 89.096130] kunit_try_run_case+0x22c/0x5a8 [ 89.100341] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.105865] kthread+0x464/0x810 [ 89.109130] ret_from_fork+0x14/0x20 [ 89.112731] [ 89.114227] The buggy address belongs to the object at cc23e880 [ 89.114227] which belongs to the cache kmalloc-64 of size 64 [ 89.125946] The buggy address is located 0 bytes to the right of [ 89.125946] allocated 48-byte region [cc23e880, cc23e8b0) [ 89.137512] [ 89.139007] The buggy address belongs to the physical page: [ 89.144622] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 89.151885] flags: 0x0(zone=0) [ 89.154968] page_type: f5(slab) [ 89.158142] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.166290] raw: 00000000 [ 89.168914] page dumped because: kasan: bad access detected [ 89.174530] [ 89.176025] Memory state around the buggy address: [ 89.180847] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.187438] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.194000] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.200561] ^ [ 89.204681] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.211273] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.217834] ================================================================== [ 76.767089] ================================================================== [ 76.774353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa20/0x5ab0 [ 76.781738] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 76.788482] [ 76.789978] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 76.790008] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.790039] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.790039] Call trace: [ 76.790039] unwind_backtrace from show_stack+0x18/0x1c [ 76.790069] show_stack from dump_stack_lvl+0x70/0x90 [ 76.790100] dump_stack_lvl from print_report+0x158/0x528 [ 76.790130] print_report from kasan_report+0xdc/0x118 [ 76.790130] kasan_report from kasan_check_range+0x14c/0x198 [ 76.790161] kasan_check_range from kasan_atomics_helper+0xa20/0x5ab0 [ 76.790191] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.790222] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.790252] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.790283] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.790283] kthread from ret_from_fork+0x14/0x20 [ 76.790313] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 76.790344] 3fa0: 00000000 00000000 00000000 00000000 [ 76.790344] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.790374] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.790374] [ 76.907409] Allocated by task 321: [ 76.910827] kasan_save_track+0x30/0x5c [ 76.914703] __kasan_kmalloc+0x8c/0x94 [ 76.918487] kasan_atomics+0xc0/0x33c [ 76.922180] kunit_try_run_case+0x22c/0x5a8 [ 76.926391] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.931915] kthread+0x464/0x810 [ 76.935180] ret_from_fork+0x14/0x20 [ 76.938781] [ 76.940277] The buggy address belongs to the object at cc23e880 [ 76.940277] which belongs to the cache kmalloc-64 of size 64 [ 76.951995] The buggy address is located 0 bytes to the right of [ 76.951995] allocated 48-byte region [cc23e880, cc23e8b0) [ 76.963562] [ 76.965057] The buggy address belongs to the physical page: [ 76.970672] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 76.977935] flags: 0x0(zone=0) [ 76.981018] page_type: f5(slab) [ 76.984191] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.992340] raw: 00000000 [ 76.994995] page dumped because: kasan: bad access detected [ 77.000579] [ 77.002105] Memory state around the buggy address: [ 77.006927] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.013488] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.020050] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.026641] ^ [ 77.030761] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.037322] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.043914] ================================================================== [ 73.375488] ================================================================== [ 73.382751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x550c/0x5ab0 [ 73.390197] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 73.396972] [ 73.398468] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 73.398498] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.398498] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.398529] Call trace: [ 73.398529] unwind_backtrace from show_stack+0x18/0x1c [ 73.398559] show_stack from dump_stack_lvl+0x70/0x90 [ 73.398590] dump_stack_lvl from print_report+0x158/0x528 [ 73.398590] print_report from kasan_report+0xdc/0x118 [ 73.398620] kasan_report from kasan_atomics_helper+0x550c/0x5ab0 [ 73.398651] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.398681] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.398712] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.398712] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.398742] kthread from ret_from_fork+0x14/0x20 [ 73.398773] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 73.398803] 3fa0: 00000000 00000000 00000000 00000000 [ 73.398803] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.398834] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.398834] [ 73.509826] Allocated by task 321: [ 73.513244] kasan_save_track+0x30/0x5c [ 73.517120] __kasan_kmalloc+0x8c/0x94 [ 73.520904] kasan_atomics+0xc0/0x33c [ 73.524597] kunit_try_run_case+0x22c/0x5a8 [ 73.528808] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.534332] kthread+0x464/0x810 [ 73.537597] ret_from_fork+0x14/0x20 [ 73.541198] [ 73.542724] The buggy address belongs to the object at cc23e880 [ 73.542724] which belongs to the cache kmalloc-64 of size 64 [ 73.554443] The buggy address is located 0 bytes to the right of [ 73.554443] allocated 48-byte region [cc23e880, cc23e8b0) [ 73.565979] [ 73.567504] The buggy address belongs to the physical page: [ 73.573089] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 73.580383] flags: 0x0(zone=0) [ 73.583465] page_type: f5(slab) [ 73.586639] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.594787] raw: 00000000 [ 73.597412] page dumped because: kasan: bad access detected [ 73.603027] [ 73.604522] Memory state around the buggy address: [ 73.609344] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.615905] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.622497] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.629058] ^ [ 73.633178] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.639770] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.646331] ================================================================== [ 75.346405] ================================================================== [ 75.353698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x5ab0 [ 75.361053] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 75.367797] [ 75.369323] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 75.369323] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.369354] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.369354] Call trace: [ 75.369354] unwind_backtrace from show_stack+0x18/0x1c [ 75.369384] show_stack from dump_stack_lvl+0x70/0x90 [ 75.369415] dump_stack_lvl from print_report+0x158/0x528 [ 75.369445] print_report from kasan_report+0xdc/0x118 [ 75.369476] kasan_report from kasan_check_range+0x14c/0x198 [ 75.369476] kasan_check_range from kasan_atomics_helper+0x6ec/0x5ab0 [ 75.369506] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.369537] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.369567] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.369598] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.369628] kthread from ret_from_fork+0x14/0x20 [ 75.369628] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 75.369659] 3fa0: 00000000 00000000 00000000 00000000 [ 75.369659] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.369689] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.369689] [ 75.486724] Allocated by task 321: [ 75.490142] kasan_save_track+0x30/0x5c [ 75.494018] __kasan_kmalloc+0x8c/0x94 [ 75.497802] kasan_atomics+0xc0/0x33c [ 75.501495] kunit_try_run_case+0x22c/0x5a8 [ 75.505706] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.511230] kthread+0x464/0x810 [ 75.514495] ret_from_fork+0x14/0x20 [ 75.518096] [ 75.519592] The buggy address belongs to the object at cc23e880 [ 75.519592] which belongs to the cache kmalloc-64 of size 64 [ 75.531311] The buggy address is located 0 bytes to the right of [ 75.531311] allocated 48-byte region [cc23e880, cc23e8b0) [ 75.542877] [ 75.544372] The buggy address belongs to the physical page: [ 75.549987] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 75.557250] flags: 0x0(zone=0) [ 75.560333] page_type: f5(slab) [ 75.563507] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.571655] raw: 00000000 [ 75.574310] page dumped because: kasan: bad access detected [ 75.579895] [ 75.581420] Memory state around the buggy address: [ 75.586242] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.592803] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.599365] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.605957] ^ [ 75.610076] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.616638] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.623229] ================================================================== [ 78.465881] ================================================================== [ 78.473144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe30/0x5ab0 [ 78.480499] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 78.487243] [ 78.488769] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 78.488800] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.488800] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.488800] Call trace: [ 78.488830] unwind_backtrace from show_stack+0x18/0x1c [ 78.488861] show_stack from dump_stack_lvl+0x70/0x90 [ 78.488861] dump_stack_lvl from print_report+0x158/0x528 [ 78.488891] print_report from kasan_report+0xdc/0x118 [ 78.488922] kasan_report from kasan_check_range+0x14c/0x198 [ 78.488952] kasan_check_range from kasan_atomics_helper+0xe30/0x5ab0 [ 78.488952] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.488983] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.489013] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.489044] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.489074] kthread from ret_from_fork+0x14/0x20 [ 78.489105] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 78.489105] 3fa0: 00000000 00000000 00000000 00000000 [ 78.489135] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.489135] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.489166] [ 78.606170] Allocated by task 321: [ 78.609588] kasan_save_track+0x30/0x5c [ 78.613464] __kasan_kmalloc+0x8c/0x94 [ 78.617248] kasan_atomics+0xc0/0x33c [ 78.620941] kunit_try_run_case+0x22c/0x5a8 [ 78.625152] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.630706] kthread+0x464/0x810 [ 78.633941] ret_from_fork+0x14/0x20 [ 78.637542] [ 78.639068] The buggy address belongs to the object at cc23e880 [ 78.639068] which belongs to the cache kmalloc-64 of size 64 [ 78.650787] The buggy address is located 0 bytes to the right of [ 78.650787] allocated 48-byte region [cc23e880, cc23e8b0) [ 78.662322] [ 78.663848] The buggy address belongs to the physical page: [ 78.669433] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 78.676727] flags: 0x0(zone=0) [ 78.679809] page_type: f5(slab) [ 78.682983] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.691101] raw: 00000000 [ 78.693756] page dumped because: kasan: bad access detected [ 78.699371] [ 78.700866] Memory state around the buggy address: [ 78.705688] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.712249] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.718841] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.725402] ^ [ 78.729522] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.736114] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.742675] ================================================================== [ 89.503234] ================================================================== [ 89.510498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2578/0x5ab0 [ 89.517944] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 89.524688] [ 89.526214] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 89.526245] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.526245] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.526245] Call trace: [ 89.526275] unwind_backtrace from show_stack+0x18/0x1c [ 89.526275] show_stack from dump_stack_lvl+0x70/0x90 [ 89.526306] dump_stack_lvl from print_report+0x158/0x528 [ 89.526336] print_report from kasan_report+0xdc/0x118 [ 89.526367] kasan_report from kasan_check_range+0x14c/0x198 [ 89.526397] kasan_check_range from kasan_atomics_helper+0x2578/0x5ab0 [ 89.526397] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 89.526428] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 89.526458] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.526489] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.526519] kthread from ret_from_fork+0x14/0x20 [ 89.526519] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 89.526550] 3fa0: 00000000 00000000 00000000 00000000 [ 89.526580] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.526580] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.526611] [ 89.643707] Allocated by task 321: [ 89.647125] kasan_save_track+0x30/0x5c [ 89.651000] __kasan_kmalloc+0x8c/0x94 [ 89.654785] kasan_atomics+0xc0/0x33c [ 89.658477] kunit_try_run_case+0x22c/0x5a8 [ 89.662689] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.668212] kthread+0x464/0x810 [ 89.671478] ret_from_fork+0x14/0x20 [ 89.675079] [ 89.676574] The buggy address belongs to the object at cc23e880 [ 89.676574] which belongs to the cache kmalloc-64 of size 64 [ 89.688293] The buggy address is located 0 bytes to the right of [ 89.688293] allocated 48-byte region [cc23e880, cc23e8b0) [ 89.699859] [ 89.701354] The buggy address belongs to the physical page: [ 89.706970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 89.714233] flags: 0x0(zone=0) [ 89.717315] page_type: f5(slab) [ 89.720489] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.728637] raw: 00000000 [ 89.731262] page dumped because: kasan: bad access detected [ 89.736877] [ 89.738372] Memory state around the buggy address: [ 89.743194] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.749786] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.756347] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.762908] ^ [ 89.767028] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.773620] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.780181] ================================================================== [ 82.420623] ================================================================== [ 82.427886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x160c/0x5ab0 [ 82.435333] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 82.442108] [ 82.443603] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 82.443634] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.443634] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.443664] Call trace: [ 82.443664] unwind_backtrace from show_stack+0x18/0x1c [ 82.443695] show_stack from dump_stack_lvl+0x70/0x90 [ 82.443725] dump_stack_lvl from print_report+0x158/0x528 [ 82.443725] print_report from kasan_report+0xdc/0x118 [ 82.443756] kasan_report from kasan_check_range+0x14c/0x198 [ 82.443786] kasan_check_range from kasan_atomics_helper+0x160c/0x5ab0 [ 82.443817] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.443847] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.443847] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.443878] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.443908] kthread from ret_from_fork+0x14/0x20 [ 82.443939] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 82.443939] 3fa0: 00000000 00000000 00000000 00000000 [ 82.443969] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.443969] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.444000] [ 82.561096] Allocated by task 321: [ 82.564514] kasan_save_track+0x30/0x5c [ 82.568389] __kasan_kmalloc+0x8c/0x94 [ 82.572174] kasan_atomics+0xc0/0x33c [ 82.575866] kunit_try_run_case+0x22c/0x5a8 [ 82.580078] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.585632] kthread+0x464/0x810 [ 82.588867] ret_from_fork+0x14/0x20 [ 82.592468] [ 82.593994] The buggy address belongs to the object at cc23e880 [ 82.593994] which belongs to the cache kmalloc-64 of size 64 [ 82.605712] The buggy address is located 0 bytes to the right of [ 82.605712] allocated 48-byte region [cc23e880, cc23e8b0) [ 82.617248] [ 82.618774] The buggy address belongs to the physical page: [ 82.624359] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 82.631652] flags: 0x0(zone=0) [ 82.634735] page_type: f5(slab) [ 82.637878] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.646026] raw: 00000000 [ 82.648681] page dumped because: kasan: bad access detected [ 82.654296] [ 82.655792] Memory state around the buggy address: [ 82.660614] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.667175] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.673767] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.680328] ^ [ 82.684448] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.691009] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.697601] ================================================================== [ 87.241363] ================================================================== [ 87.248657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20a8/0x5ab0 [ 87.256103] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 87.262847] [ 87.264343] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 87.264373] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.264404] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.264404] Call trace: [ 87.264404] unwind_backtrace from show_stack+0x18/0x1c [ 87.264434] show_stack from dump_stack_lvl+0x70/0x90 [ 87.264465] dump_stack_lvl from print_report+0x158/0x528 [ 87.264495] print_report from kasan_report+0xdc/0x118 [ 87.264495] kasan_report from kasan_check_range+0x14c/0x198 [ 87.264526] kasan_check_range from kasan_atomics_helper+0x20a8/0x5ab0 [ 87.264556] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.264587] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.264617] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.264648] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.264648] kthread from ret_from_fork+0x14/0x20 [ 87.264678] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 87.264709] 3fa0: 00000000 00000000 00000000 00000000 [ 87.264709] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.264739] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.264739] [ 87.381835] Allocated by task 321: [ 87.385284] kasan_save_track+0x30/0x5c [ 87.389129] __kasan_kmalloc+0x8c/0x94 [ 87.392913] kasan_atomics+0xc0/0x33c [ 87.396606] kunit_try_run_case+0x22c/0x5a8 [ 87.400848] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.406372] kthread+0x464/0x810 [ 87.409606] ret_from_fork+0x14/0x20 [ 87.413238] [ 87.414733] The buggy address belongs to the object at cc23e880 [ 87.414733] which belongs to the cache kmalloc-64 of size 64 [ 87.426452] The buggy address is located 0 bytes to the right of [ 87.426452] allocated 48-byte region [cc23e880, cc23e8b0) [ 87.437988] [ 87.439514] The buggy address belongs to the physical page: [ 87.445098] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 87.452392] flags: 0x0(zone=0) [ 87.455474] page_type: f5(slab) [ 87.458648] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.466766] raw: 00000000 [ 87.469421] page dumped because: kasan: bad access detected [ 87.475036] [ 87.476531] Memory state around the buggy address: [ 87.481353] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.487915] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.494506] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.501068] ^ [ 87.505187] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.511749] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.518341] ================================================================== [ 83.835998] ================================================================== [ 83.843261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18bc/0x5ab0 [ 83.850738] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 83.857482] [ 83.858978] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 83.859008] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.859008] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.859039] Call trace: [ 83.859039] unwind_backtrace from show_stack+0x18/0x1c [ 83.859069] show_stack from dump_stack_lvl+0x70/0x90 [ 83.859100] dump_stack_lvl from print_report+0x158/0x528 [ 83.859130] print_report from kasan_report+0xdc/0x118 [ 83.859130] kasan_report from kasan_check_range+0x14c/0x198 [ 83.859161] kasan_check_range from kasan_atomics_helper+0x18bc/0x5ab0 [ 83.859191] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.859222] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.859252] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.859252] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.859283] kthread from ret_from_fork+0x14/0x20 [ 83.859313] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 83.859313] 3fa0: 00000000 00000000 00000000 00000000 [ 83.859344] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.859374] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.859374] [ 83.976470] Allocated by task 321: [ 83.979919] kasan_save_track+0x30/0x5c [ 83.983764] __kasan_kmalloc+0x8c/0x94 [ 83.987548] kasan_atomics+0xc0/0x33c [ 83.991241] kunit_try_run_case+0x22c/0x5a8 [ 83.995483] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.001007] kthread+0x464/0x810 [ 84.004272] ret_from_fork+0x14/0x20 [ 84.007873] [ 84.009368] The buggy address belongs to the object at cc23e880 [ 84.009368] which belongs to the cache kmalloc-64 of size 64 [ 84.021087] The buggy address is located 0 bytes to the right of [ 84.021087] allocated 48-byte region [cc23e880, cc23e8b0) [ 84.032653] [ 84.034149] The buggy address belongs to the physical page: [ 84.039764] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 84.047027] flags: 0x0(zone=0) [ 84.050109] page_type: f5(slab) [ 84.053283] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.061431] raw: 00000000 [ 84.064056] page dumped because: kasan: bad access detected [ 84.069671] [ 84.071166] Memory state around the buggy address: [ 84.075988] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.082580] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.089141] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.095703] ^ [ 84.099822] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.106414] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.112976] ================================================================== [ 81.017883] ================================================================== [ 81.025146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x520c/0x5ab0 [ 81.032592] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 81.039245] [ 81.040771] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 81.040802] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.040802] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.040802] Call trace: [ 81.040832] unwind_backtrace from show_stack+0x18/0x1c [ 81.040832] show_stack from dump_stack_lvl+0x70/0x90 [ 81.040863] dump_stack_lvl from print_report+0x158/0x528 [ 81.040893] print_report from kasan_report+0xdc/0x118 [ 81.040924] kasan_report from kasan_atomics_helper+0x520c/0x5ab0 [ 81.040954] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.040954] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.040985] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.041015] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.041046] kthread from ret_from_fork+0x14/0x20 [ 81.041076] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 81.041076] 3fa0: 00000000 00000000 00000000 00000000 [ 81.041107] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.041107] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.041137] [ 81.152130] Allocated by task 321: [ 81.155548] kasan_save_track+0x30/0x5c [ 81.159423] __kasan_kmalloc+0x8c/0x94 [ 81.163208] kasan_atomics+0xc0/0x33c [ 81.166900] kunit_try_run_case+0x22c/0x5a8 [ 81.171112] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.176635] kthread+0x464/0x810 [ 81.179901] ret_from_fork+0x14/0x20 [ 81.183502] [ 81.184997] The buggy address belongs to the object at cc23e880 [ 81.184997] which belongs to the cache kmalloc-64 of size 64 [ 81.196716] The buggy address is located 0 bytes to the right of [ 81.196716] allocated 48-byte region [cc23e880, cc23e8b0) [ 81.208282] [ 81.209777] The buggy address belongs to the physical page: [ 81.215393] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 81.222656] flags: 0x0(zone=0) [ 81.225738] page_type: f5(slab) [ 81.228912] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.237060] raw: 00000000 [ 81.239715] page dumped because: kasan: bad access detected [ 81.245300] [ 81.246826] Memory state around the buggy address: [ 81.251647] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.258209] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.264770] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.271362] ^ [ 81.275482] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.282043] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.288635] ================================================================== [ 84.973236] ================================================================== [ 84.980499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b4c/0x5ab0 [ 84.987945] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 84.994689] [ 84.996215] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 84.996215] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.996246] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.996246] Call trace: [ 84.996246] unwind_backtrace from show_stack+0x18/0x1c [ 84.996276] show_stack from dump_stack_lvl+0x70/0x90 [ 84.996307] dump_stack_lvl from print_report+0x158/0x528 [ 84.996337] print_report from kasan_report+0xdc/0x118 [ 84.996368] kasan_report from kasan_check_range+0x14c/0x198 [ 84.996368] kasan_check_range from kasan_atomics_helper+0x1b4c/0x5ab0 [ 84.996398] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.996429] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.996459] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.996490] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.996520] kthread from ret_from_fork+0x14/0x20 [ 84.996520] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 84.996551] 3fa0: 00000000 00000000 00000000 00000000 [ 84.996551] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.996582] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.996582] [ 85.113708] Allocated by task 321: [ 85.117126] kasan_save_track+0x30/0x5c [ 85.121002] __kasan_kmalloc+0x8c/0x94 [ 85.124786] kasan_atomics+0xc0/0x33c [ 85.128479] kunit_try_run_case+0x22c/0x5a8 [ 85.132690] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.138214] kthread+0x464/0x810 [ 85.141479] ret_from_fork+0x14/0x20 [ 85.145080] [ 85.146575] The buggy address belongs to the object at cc23e880 [ 85.146575] which belongs to the cache kmalloc-64 of size 64 [ 85.158294] The buggy address is located 0 bytes to the right of [ 85.158294] allocated 48-byte region [cc23e880, cc23e8b0) [ 85.169860] [ 85.171356] The buggy address belongs to the physical page: [ 85.176971] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 85.184234] flags: 0x0(zone=0) [ 85.187316] page_type: f5(slab) [ 85.190490] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.198638] raw: 00000000 [ 85.201263] page dumped because: kasan: bad access detected [ 85.206878] [ 85.208374] Memory state around the buggy address: [ 85.213226] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.219787] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.226348] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.232940] ^ [ 85.237060] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.243621] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.250213] ================================================================== [ 73.097381] ================================================================== [ 73.104644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5170/0x5ab0 [ 73.112091] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 73.118743] [ 73.120269] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 73.120300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.120300] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.120330] Call trace: [ 73.120330] unwind_backtrace from show_stack+0x18/0x1c [ 73.120361] show_stack from dump_stack_lvl+0x70/0x90 [ 73.120361] dump_stack_lvl from print_report+0x158/0x528 [ 73.120391] print_report from kasan_report+0xdc/0x118 [ 73.120422] kasan_report from kasan_atomics_helper+0x5170/0x5ab0 [ 73.120452] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.120483] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.120483] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.120513] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.120544] kthread from ret_from_fork+0x14/0x20 [ 73.120574] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 73.120574] 3fa0: 00000000 00000000 00000000 00000000 [ 73.120605] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.120635] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.120635] [ 73.231628] Allocated by task 321: [ 73.235046] kasan_save_track+0x30/0x5c [ 73.238922] __kasan_kmalloc+0x8c/0x94 [ 73.242706] kasan_atomics+0xc0/0x33c [ 73.246398] kunit_try_run_case+0x22c/0x5a8 [ 73.250610] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.256134] kthread+0x464/0x810 [ 73.259399] ret_from_fork+0x14/0x20 [ 73.263000] [ 73.264495] The buggy address belongs to the object at cc23e880 [ 73.264495] which belongs to the cache kmalloc-64 of size 64 [ 73.276245] The buggy address is located 0 bytes to the right of [ 73.276245] allocated 48-byte region [cc23e880, cc23e8b0) [ 73.287780] [ 73.289276] The buggy address belongs to the physical page: [ 73.294891] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 73.302154] flags: 0x0(zone=0) [ 73.305236] page_type: f5(slab) [ 73.308410] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.316558] raw: 00000000 [ 73.319213] page dumped because: kasan: bad access detected [ 73.324798] [ 73.326324] Memory state around the buggy address: [ 73.331146] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.337707] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.344299] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.350860] ^ [ 73.354980] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.361541] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.368133] ================================================================== [ 78.187805] ================================================================== [ 78.195068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5404/0x5ab0 [ 78.202514] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 78.209197] [ 78.210693] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 78.210723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.210723] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.210754] Call trace: [ 78.210754] unwind_backtrace from show_stack+0x18/0x1c [ 78.210784] show_stack from dump_stack_lvl+0x70/0x90 [ 78.210784] dump_stack_lvl from print_report+0x158/0x528 [ 78.210815] print_report from kasan_report+0xdc/0x118 [ 78.210845] kasan_report from kasan_atomics_helper+0x5404/0x5ab0 [ 78.210876] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.210906] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.210937] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.210937] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.210968] kthread from ret_from_fork+0x14/0x20 [ 78.210998] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 78.210998] 3fa0: 00000000 00000000 00000000 00000000 [ 78.211029] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.211059] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.211059] [ 78.322052] Allocated by task 321: [ 78.325469] kasan_save_track+0x30/0x5c [ 78.329345] __kasan_kmalloc+0x8c/0x94 [ 78.333129] kasan_atomics+0xc0/0x33c [ 78.336822] kunit_try_run_case+0x22c/0x5a8 [ 78.341033] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.346557] kthread+0x464/0x810 [ 78.349822] ret_from_fork+0x14/0x20 [ 78.353424] [ 78.354919] The buggy address belongs to the object at cc23e880 [ 78.354919] which belongs to the cache kmalloc-64 of size 64 [ 78.366668] The buggy address is located 0 bytes to the right of [ 78.366668] allocated 48-byte region [cc23e880, cc23e8b0) [ 78.378204] [ 78.379699] The buggy address belongs to the physical page: [ 78.385314] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 78.392578] flags: 0x0(zone=0) [ 78.395660] page_type: f5(slab) [ 78.398834] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.406982] raw: 00000000 [ 78.409637] page dumped because: kasan: bad access detected [ 78.415222] [ 78.416748] Memory state around the buggy address: [ 78.421569] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.428131] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.434692] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.441284] ^ [ 78.445404] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.451965] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.458557] ================================================================== [ 84.120300] ================================================================== [ 84.127563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1960/0x5ab0 [ 84.135009] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 84.141784] [ 84.143280] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 84.143310] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.143310] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.143341] Call trace: [ 84.143341] unwind_backtrace from show_stack+0x18/0x1c [ 84.143371] show_stack from dump_stack_lvl+0x70/0x90 [ 84.143402] dump_stack_lvl from print_report+0x158/0x528 [ 84.143402] print_report from kasan_report+0xdc/0x118 [ 84.143432] kasan_report from kasan_check_range+0x14c/0x198 [ 84.143463] kasan_check_range from kasan_atomics_helper+0x1960/0x5ab0 [ 84.143493] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.143524] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.143524] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.143554] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.143585] kthread from ret_from_fork+0x14/0x20 [ 84.143615] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 84.143615] 3fa0: 00000000 00000000 00000000 00000000 [ 84.143646] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.143646] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.143676] [ 84.260772] Allocated by task 321: [ 84.264190] kasan_save_track+0x30/0x5c [ 84.268066] __kasan_kmalloc+0x8c/0x94 [ 84.271850] kasan_atomics+0xc0/0x33c [ 84.275543] kunit_try_run_case+0x22c/0x5a8 [ 84.279754] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.285308] kthread+0x464/0x810 [ 84.288543] ret_from_fork+0x14/0x20 [ 84.292144] [ 84.293670] The buggy address belongs to the object at cc23e880 [ 84.293670] which belongs to the cache kmalloc-64 of size 64 [ 84.305389] The buggy address is located 0 bytes to the right of [ 84.305389] allocated 48-byte region [cc23e880, cc23e8b0) [ 84.316925] [ 84.318450] The buggy address belongs to the physical page: [ 84.324035] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 84.331329] flags: 0x0(zone=0) [ 84.334411] page_type: f5(slab) [ 84.337585] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.345733] raw: 00000000 [ 84.348358] page dumped because: kasan: bad access detected [ 84.353973] [ 84.355468] Memory state around the buggy address: [ 84.360290] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.366882] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.373443] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.380004] ^ [ 84.384124] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.390716] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.397277] ================================================================== [ 87.525665] ================================================================== [ 87.532928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2154/0x5ab0 [ 87.540405] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 87.547149] [ 87.548645] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 87.548675] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.548675] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.548706] Call trace: [ 87.548706] unwind_backtrace from show_stack+0x18/0x1c [ 87.548736] show_stack from dump_stack_lvl+0x70/0x90 [ 87.548736] dump_stack_lvl from print_report+0x158/0x528 [ 87.548767] print_report from kasan_report+0xdc/0x118 [ 87.548797] kasan_report from kasan_check_range+0x14c/0x198 [ 87.548828] kasan_check_range from kasan_atomics_helper+0x2154/0x5ab0 [ 87.548858] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.548858] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.548889] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.548919] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.548950] kthread from ret_from_fork+0x14/0x20 [ 87.548980] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 87.548980] 3fa0: 00000000 00000000 00000000 00000000 [ 87.549011] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.549011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.549041] [ 87.666137] Allocated by task 321: [ 87.669555] kasan_save_track+0x30/0x5c [ 87.673431] __kasan_kmalloc+0x8c/0x94 [ 87.677215] kasan_atomics+0xc0/0x33c [ 87.680908] kunit_try_run_case+0x22c/0x5a8 [ 87.685119] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.690643] kthread+0x464/0x810 [ 87.693908] ret_from_fork+0x14/0x20 [ 87.697509] [ 87.699005] The buggy address belongs to the object at cc23e880 [ 87.699005] which belongs to the cache kmalloc-64 of size 64 [ 87.710723] The buggy address is located 0 bytes to the right of [ 87.710723] allocated 48-byte region [cc23e880, cc23e8b0) [ 87.722290] [ 87.723785] The buggy address belongs to the physical page: [ 87.729400] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 87.736663] flags: 0x0(zone=0) [ 87.739746] page_type: f5(slab) [ 87.742919] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.751068] raw: 00000000 [ 87.753692] page dumped because: kasan: bad access detected [ 87.759307] [ 87.760803] Memory state around the buggy address: [ 87.765624] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.772216] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.778778] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.785339] ^ [ 87.789489] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.796051] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.802612] ================================================================== [ 76.198822] ================================================================== [ 76.206115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x5ab0 [ 76.213470] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 76.220214] [ 76.221710] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 76.221740] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.221771] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.221771] Call trace: [ 76.221771] unwind_backtrace from show_stack+0x18/0x1c [ 76.221801] show_stack from dump_stack_lvl+0x70/0x90 [ 76.221832] dump_stack_lvl from print_report+0x158/0x528 [ 76.221862] print_report from kasan_report+0xdc/0x118 [ 76.221893] kasan_report from kasan_check_range+0x14c/0x198 [ 76.221893] kasan_check_range from kasan_atomics_helper+0x8d8/0x5ab0 [ 76.221923] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.221954] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.221984] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.222015] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.222045] kthread from ret_from_fork+0x14/0x20 [ 76.222045] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 76.222076] 3fa0: 00000000 00000000 00000000 00000000 [ 76.222076] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.222106] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.222106] [ 76.339141] Allocated by task 321: [ 76.342559] kasan_save_track+0x30/0x5c [ 76.346435] __kasan_kmalloc+0x8c/0x94 [ 76.350219] kasan_atomics+0xc0/0x33c [ 76.353912] kunit_try_run_case+0x22c/0x5a8 [ 76.358123] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.363647] kthread+0x464/0x810 [ 76.366912] ret_from_fork+0x14/0x20 [ 76.370513] [ 76.372009] The buggy address belongs to the object at cc23e880 [ 76.372009] which belongs to the cache kmalloc-64 of size 64 [ 76.383728] The buggy address is located 0 bytes to the right of [ 76.383728] allocated 48-byte region [cc23e880, cc23e8b0) [ 76.395294] [ 76.396789] The buggy address belongs to the physical page: [ 76.402404] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 76.409667] flags: 0x0(zone=0) [ 76.412750] page_type: f5(slab) [ 76.415924] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.424072] raw: 00000000 [ 76.426696] page dumped because: kasan: bad access detected [ 76.432312] [ 76.433837] Memory state around the buggy address: [ 76.438659] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.445220] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.451782] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.458374] ^ [ 76.462493] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.469055] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.475646] ================================================================== [ 80.455474] ================================================================== [ 80.462768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5218/0x5ab0 [ 80.470214] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 80.476867] [ 80.478393] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 80.478393] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.478424] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.478424] Call trace: [ 80.478424] unwind_backtrace from show_stack+0x18/0x1c [ 80.478454] show_stack from dump_stack_lvl+0x70/0x90 [ 80.478485] dump_stack_lvl from print_report+0x158/0x528 [ 80.478515] print_report from kasan_report+0xdc/0x118 [ 80.478546] kasan_report from kasan_atomics_helper+0x5218/0x5ab0 [ 80.478576] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.478576] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.478607] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.478637] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.478668] kthread from ret_from_fork+0x14/0x20 [ 80.478698] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 80.478698] 3fa0: 00000000 00000000 00000000 00000000 [ 80.478729] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.478729] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.478759] [ 80.589721] Allocated by task 321: [ 80.593170] kasan_save_track+0x30/0x5c [ 80.597015] __kasan_kmalloc+0x8c/0x94 [ 80.600799] kasan_atomics+0xc0/0x33c [ 80.604492] kunit_try_run_case+0x22c/0x5a8 [ 80.608734] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.614257] kthread+0x464/0x810 [ 80.617523] ret_from_fork+0x14/0x20 [ 80.621124] [ 80.622619] The buggy address belongs to the object at cc23e880 [ 80.622619] which belongs to the cache kmalloc-64 of size 64 [ 80.634338] The buggy address is located 0 bytes to the right of [ 80.634338] allocated 48-byte region [cc23e880, cc23e8b0) [ 80.645904] [ 80.647399] The buggy address belongs to the physical page: [ 80.653015] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 80.660278] flags: 0x0(zone=0) [ 80.663360] page_type: f5(slab) [ 80.666534] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.674682] raw: 00000000 [ 80.677307] page dumped because: kasan: bad access detected [ 80.682922] [ 80.684417] Memory state around the buggy address: [ 80.689239] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.695831] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.702392] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.708953] ^ [ 80.713104] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.719665] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.726226] ================================================================== [ 72.533111] ================================================================== [ 72.548065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5044/0x5ab0 [ 72.555541] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 72.562194] [ 72.563690] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 72.563720] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.563751] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.563751] Call trace: [ 72.563751] unwind_backtrace from show_stack+0x18/0x1c [ 72.563781] show_stack from dump_stack_lvl+0x70/0x90 [ 72.563812] dump_stack_lvl from print_report+0x158/0x528 [ 72.563842] print_report from kasan_report+0xdc/0x118 [ 72.563873] kasan_report from kasan_atomics_helper+0x5044/0x5ab0 [ 72.563873] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 72.563903] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 72.563934] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.563964] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.563995] kthread from ret_from_fork+0x14/0x20 [ 72.564025] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 72.564025] 3fa0: 00000000 00000000 00000000 00000000 [ 72.564056] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.564056] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.564086] [ 72.675079] Allocated by task 321: [ 72.678497] kasan_save_track+0x30/0x5c [ 72.682373] __kasan_kmalloc+0x8c/0x94 [ 72.686157] kasan_atomics+0xc0/0x33c [ 72.689849] kunit_try_run_case+0x22c/0x5a8 [ 72.694061] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.699584] kthread+0x464/0x810 [ 72.702850] ret_from_fork+0x14/0x20 [ 72.706451] [ 72.707977] The buggy address belongs to the object at cc23e880 [ 72.707977] which belongs to the cache kmalloc-64 of size 64 [ 72.719696] The buggy address is located 0 bytes to the right of [ 72.719696] allocated 48-byte region [cc23e880, cc23e8b0) [ 72.731231] [ 72.732757] The buggy address belongs to the physical page: [ 72.738342] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 72.745635] flags: 0x0(zone=0) [ 72.748718] page_type: f5(slab) [ 72.751892] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 72.760009] raw: 00000000 [ 72.762664] page dumped because: kasan: bad access detected [ 72.768280] [ 72.769775] Memory state around the buggy address: [ 72.774597] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.781158] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.787750] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.794311] ^ [ 72.798431] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.805023] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.811584] ================================================================== [ 77.619537] ================================================================== [ 77.626800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc24/0x5ab0 [ 77.634185] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 77.640930] [ 77.642425] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 77.642456] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.642456] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.642486] Call trace: [ 77.642486] unwind_backtrace from show_stack+0x18/0x1c [ 77.642517] show_stack from dump_stack_lvl+0x70/0x90 [ 77.642547] dump_stack_lvl from print_report+0x158/0x528 [ 77.642547] print_report from kasan_report+0xdc/0x118 [ 77.642578] kasan_report from kasan_check_range+0x14c/0x198 [ 77.642608] kasan_check_range from kasan_atomics_helper+0xc24/0x5ab0 [ 77.642639] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.642669] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.642669] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.642700] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.642730] kthread from ret_from_fork+0x14/0x20 [ 77.642761] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 77.642761] 3fa0: 00000000 00000000 00000000 00000000 [ 77.642791] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.642822] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.642822] [ 77.759826] Allocated by task 321: [ 77.763275] kasan_save_track+0x30/0x5c [ 77.767120] __kasan_kmalloc+0x8c/0x94 [ 77.770904] kasan_atomics+0xc0/0x33c [ 77.774597] kunit_try_run_case+0x22c/0x5a8 [ 77.778839] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.784362] kthread+0x464/0x810 [ 77.787597] ret_from_fork+0x14/0x20 [ 77.791229] [ 77.792724] The buggy address belongs to the object at cc23e880 [ 77.792724] which belongs to the cache kmalloc-64 of size 64 [ 77.804443] The buggy address is located 0 bytes to the right of [ 77.804443] allocated 48-byte region [cc23e880, cc23e8b0) [ 77.816009] [ 77.817504] The buggy address belongs to the physical page: [ 77.823120] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 77.830383] flags: 0x0(zone=0) [ 77.833465] page_type: f5(slab) [ 77.836639] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.844787] raw: 00000000 [ 77.847412] page dumped because: kasan: bad access detected [ 77.853027] [ 77.854522] Memory state around the buggy address: [ 77.859344] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.865936] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.872497] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.879058] ^ [ 77.883209] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.889770] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.896331] ================================================================== [ 89.787506] ================================================================== [ 89.794769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5500/0x5ab0 [ 89.802215] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 89.808898] [ 89.810394] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 89.810424] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.810424] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.810455] Call trace: [ 89.810455] unwind_backtrace from show_stack+0x18/0x1c [ 89.810485] show_stack from dump_stack_lvl+0x70/0x90 [ 89.810516] dump_stack_lvl from print_report+0x158/0x528 [ 89.810516] print_report from kasan_report+0xdc/0x118 [ 89.810546] kasan_report from kasan_atomics_helper+0x5500/0x5ab0 [ 89.810577] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 89.810607] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 89.810638] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.810638] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.810668] kthread from ret_from_fork+0x14/0x20 [ 89.810699] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 89.810729] 3fa0: 00000000 00000000 00000000 00000000 [ 89.810729] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.810760] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.810760] [ 89.921752] Allocated by task 321: [ 89.925170] kasan_save_track+0x30/0x5c [ 89.929046] __kasan_kmalloc+0x8c/0x94 [ 89.932830] kasan_atomics+0xc0/0x33c [ 89.936523] kunit_try_run_case+0x22c/0x5a8 [ 89.940734] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.946258] kthread+0x464/0x810 [ 89.949523] ret_from_fork+0x14/0x20 [ 89.953124] [ 89.954620] The buggy address belongs to the object at cc23e880 [ 89.954620] which belongs to the cache kmalloc-64 of size 64 [ 89.966369] The buggy address is located 0 bytes to the right of [ 89.966369] allocated 48-byte region [cc23e880, cc23e8b0) [ 89.977905] [ 89.979400] The buggy address belongs to the physical page: [ 89.985015] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 89.992279] flags: 0x0(zone=0) [ 89.995361] page_type: f5(slab) [ 89.998535] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 90.006683] raw: 00000000 [ 90.009338] page dumped because: kasan: bad access detected [ 90.014923] [ 90.016448] Memory state around the buggy address: [ 90.021270] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.027832] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.034393] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 90.040985] ^ [ 90.045104] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.051666] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.058227] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_generic
[ 70.005340] ================================================================== [ 70.012603] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b10/0x1d70 [ 70.020050] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 70.026733] [ 70.028228] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 70.028259] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.028259] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.028289] Call trace: [ 70.028289] unwind_backtrace from show_stack+0x18/0x1c [ 70.028320] show_stack from dump_stack_lvl+0x70/0x90 [ 70.028350] dump_stack_lvl from print_report+0x158/0x528 [ 70.028350] print_report from kasan_report+0xdc/0x118 [ 70.028381] kasan_report from kasan_bitops_generic+0x1b10/0x1d70 [ 70.028411] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.028442] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.028472] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.028503] kthread from ret_from_fork+0x14/0x20 [ 70.028503] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 70.028533] 3fa0: 00000000 00000000 00000000 00000000 [ 70.028533] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.028564] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.028564] [ 70.134155] Allocated by task 317: [ 70.137573] kasan_save_track+0x30/0x5c [ 70.141448] __kasan_kmalloc+0x8c/0x94 [ 70.145233] kasan_bitops_generic+0xd4/0x1d70 [ 70.149627] kunit_try_run_case+0x22c/0x5a8 [ 70.153839] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.159362] kthread+0x464/0x810 [ 70.162628] ret_from_fork+0x14/0x20 [ 70.166229] [ 70.167724] The buggy address belongs to the object at cc23d380 [ 70.167724] which belongs to the cache kmalloc-64 of size 64 [ 70.179443] The buggy address is located 4 bytes inside of [ 70.179443] allocated 5-byte region [cc23d380, cc23d385) [ 70.190399] [ 70.191894] The buggy address belongs to the physical page: [ 70.197509] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 70.204772] flags: 0x0(zone=0) [ 70.207855] page_type: f5(slab) [ 70.211029] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 70.219177] raw: 00000000 [ 70.221832] page dumped because: kasan: bad access detected [ 70.227416] [ 70.228942] Memory state around the buggy address: [ 70.233764] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.240325] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.246887] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.253479] ^ [ 70.256011] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.262603] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.269165] ================================================================== [ 71.400177] ================================================================== [ 71.407440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bac/0x1d70 [ 71.414916] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 71.421569] [ 71.423065] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 71.423095] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.423126] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.423126] Call trace: [ 71.423126] unwind_backtrace from show_stack+0x18/0x1c [ 71.423156] show_stack from dump_stack_lvl+0x70/0x90 [ 71.423187] dump_stack_lvl from print_report+0x158/0x528 [ 71.423217] print_report from kasan_report+0xdc/0x118 [ 71.423217] kasan_report from kasan_bitops_generic+0x1bac/0x1d70 [ 71.423248] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.423278] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.423309] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.423339] kthread from ret_from_fork+0x14/0x20 [ 71.423339] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 71.423370] 3fa0: 00000000 00000000 00000000 00000000 [ 71.423400] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.423400] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.423431] [ 71.528991] Allocated by task 317: [ 71.532409] kasan_save_track+0x30/0x5c [ 71.536285] __kasan_kmalloc+0x8c/0x94 [ 71.540069] kasan_bitops_generic+0xd4/0x1d70 [ 71.544464] kunit_try_run_case+0x22c/0x5a8 [ 71.548675] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.554199] kthread+0x464/0x810 [ 71.557464] ret_from_fork+0x14/0x20 [ 71.561065] [ 71.562591] The buggy address belongs to the object at cc23d380 [ 71.562591] which belongs to the cache kmalloc-64 of size 64 [ 71.574310] The buggy address is located 4 bytes inside of [ 71.574310] allocated 5-byte region [cc23d380, cc23d385) [ 71.585235] [ 71.586730] The buggy address belongs to the physical page: [ 71.592346] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 71.599639] flags: 0x0(zone=0) [ 71.602691] page_type: f5(slab) [ 71.605865] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 71.614013] raw: 00000000 [ 71.616668] page dumped because: kasan: bad access detected [ 71.622283] [ 71.623779] Memory state around the buggy address: [ 71.628601] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.635162] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.641754] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.648315] ^ [ 71.650878] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.657440] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.664001] ================================================================== [ 70.547943] ================================================================== [ 70.571197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bb8/0x1d70 [ 70.578643] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 70.585296] [ 70.586822] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 70.586853] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.586853] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.586853] Call trace: [ 70.586883] unwind_backtrace from show_stack+0x18/0x1c [ 70.586883] show_stack from dump_stack_lvl+0x70/0x90 [ 70.586914] dump_stack_lvl from print_report+0x158/0x528 [ 70.586944] print_report from kasan_report+0xdc/0x118 [ 70.586975] kasan_report from kasan_bitops_generic+0x1bb8/0x1d70 [ 70.587005] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.587005] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.587036] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.587066] kthread from ret_from_fork+0x14/0x20 [ 70.587097] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 70.587097] 3fa0: 00000000 00000000 00000000 00000000 [ 70.587127] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.587158] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.587158] [ 70.692718] Allocated by task 317: [ 70.696166] kasan_save_track+0x30/0x5c [ 70.700012] __kasan_kmalloc+0x8c/0x94 [ 70.703796] kasan_bitops_generic+0xd4/0x1d70 [ 70.708190] kunit_try_run_case+0x22c/0x5a8 [ 70.712432] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.717956] kthread+0x464/0x810 [ 70.721221] ret_from_fork+0x14/0x20 [ 70.724822] [ 70.726318] The buggy address belongs to the object at cc23d380 [ 70.726318] which belongs to the cache kmalloc-64 of size 64 [ 70.738037] The buggy address is located 4 bytes inside of [ 70.738037] allocated 5-byte region [cc23d380, cc23d385) [ 70.748992] [ 70.750488] The buggy address belongs to the physical page: [ 70.756103] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 70.763366] flags: 0x0(zone=0) [ 70.766448] page_type: f5(slab) [ 70.769622] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 70.777770] raw: 00000000 [ 70.780395] page dumped because: kasan: bad access detected [ 70.786010] [ 70.787506] Memory state around the buggy address: [ 70.792327] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.798919] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.805480] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.812042] ^ [ 70.814605] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.821197] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.827758] ================================================================== [ 70.835296] ================================================================== [ 70.859069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b88/0x1d70 [ 70.866516] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 70.873168] [ 70.874664] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 70.874694] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.874725] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.874725] Call trace: [ 70.874725] unwind_backtrace from show_stack+0x18/0x1c [ 70.874755] show_stack from dump_stack_lvl+0x70/0x90 [ 70.874786] dump_stack_lvl from print_report+0x158/0x528 [ 70.874816] print_report from kasan_report+0xdc/0x118 [ 70.874847] kasan_report from kasan_bitops_generic+0x1b88/0x1d70 [ 70.874847] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.874877] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.874908] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.874938] kthread from ret_from_fork+0x14/0x20 [ 70.874969] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 70.874969] 3fa0: 00000000 00000000 00000000 00000000 [ 70.874999] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.874999] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.875030] [ 70.980590] Allocated by task 317: [ 70.984008] kasan_save_track+0x30/0x5c [ 70.987884] __kasan_kmalloc+0x8c/0x94 [ 70.991668] kasan_bitops_generic+0xd4/0x1d70 [ 70.996063] kunit_try_run_case+0x22c/0x5a8 [ 71.000274] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.005828] kthread+0x464/0x810 [ 71.009063] ret_from_fork+0x14/0x20 [ 71.012664] [ 71.014190] The buggy address belongs to the object at cc23d380 [ 71.014190] which belongs to the cache kmalloc-64 of size 64 [ 71.025909] The buggy address is located 4 bytes inside of [ 71.025909] allocated 5-byte region [cc23d380, cc23d385) [ 71.036834] [ 71.038360] The buggy address belongs to the physical page: [ 71.043945] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 71.051239] flags: 0x0(zone=0) [ 71.054321] page_type: f5(slab) [ 71.057495] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 71.065612] raw: 00000000 [ 71.068267] page dumped because: kasan: bad access detected [ 71.073883] [ 71.075378] Memory state around the buggy address: [ 71.080200] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.086761] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.093353] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.099914] ^ [ 71.102478] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.109039] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.115631] ================================================================== [ 72.247497] ================================================================== [ 72.254791] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b34/0x1d70 [ 72.262237] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 72.268890] [ 72.270416] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 72.270416] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.270446] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.270446] Call trace: [ 72.270446] unwind_backtrace from show_stack+0x18/0x1c [ 72.270477] show_stack from dump_stack_lvl+0x70/0x90 [ 72.270507] dump_stack_lvl from print_report+0x158/0x528 [ 72.270538] print_report from kasan_report+0xdc/0x118 [ 72.270568] kasan_report from kasan_bitops_generic+0x1b34/0x1d70 [ 72.270599] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 72.270599] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.270629] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.270660] kthread from ret_from_fork+0x14/0x20 [ 72.270690] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 72.270690] 3fa0: 00000000 00000000 00000000 00000000 [ 72.270721] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.270721] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.270751] [ 72.376312] Allocated by task 317: [ 72.379730] kasan_save_track+0x30/0x5c [ 72.383605] __kasan_kmalloc+0x8c/0x94 [ 72.387390] kasan_bitops_generic+0xd4/0x1d70 [ 72.391784] kunit_try_run_case+0x22c/0x5a8 [ 72.395996] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.401550] kthread+0x464/0x810 [ 72.404785] ret_from_fork+0x14/0x20 [ 72.408386] [ 72.409912] The buggy address belongs to the object at cc23d380 [ 72.409912] which belongs to the cache kmalloc-64 of size 64 [ 72.421630] The buggy address is located 4 bytes inside of [ 72.421630] allocated 5-byte region [cc23d380, cc23d385) [ 72.432556] [ 72.434082] The buggy address belongs to the physical page: [ 72.439666] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 72.446960] flags: 0x0(zone=0) [ 72.450042] page_type: f5(slab) [ 72.453216] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 72.461364] raw: 00000000 [ 72.463989] page dumped because: kasan: bad access detected [ 72.469604] [ 72.471099] Memory state around the buggy address: [ 72.475921] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.482513] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.489074] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.495635] ^ [ 72.498199] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.504760] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.511352] ================================================================== [ 71.959594] ================================================================== [ 71.983612] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1abc/0x1d70 [ 71.991058] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 71.997741] [ 71.999237] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 71.999267] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.999267] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.999298] Call trace: [ 71.999298] unwind_backtrace from show_stack+0x18/0x1c [ 71.999328] show_stack from dump_stack_lvl+0x70/0x90 [ 71.999359] dump_stack_lvl from print_report+0x158/0x528 [ 71.999359] print_report from kasan_report+0xdc/0x118 [ 71.999389] kasan_report from kasan_bitops_generic+0x1abc/0x1d70 [ 71.999420] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.999450] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.999481] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.999511] kthread from ret_from_fork+0x14/0x20 [ 71.999511] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 71.999542] 3fa0: 00000000 00000000 00000000 00000000 [ 71.999542] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.999572] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.999572] [ 72.105163] Allocated by task 317: [ 72.108581] kasan_save_track+0x30/0x5c [ 72.112457] __kasan_kmalloc+0x8c/0x94 [ 72.116241] kasan_bitops_generic+0xd4/0x1d70 [ 72.120635] kunit_try_run_case+0x22c/0x5a8 [ 72.124847] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.130371] kthread+0x464/0x810 [ 72.133636] ret_from_fork+0x14/0x20 [ 72.137237] [ 72.138732] The buggy address belongs to the object at cc23d380 [ 72.138732] which belongs to the cache kmalloc-64 of size 64 [ 72.150482] The buggy address is located 4 bytes inside of [ 72.150482] allocated 5-byte region [cc23d380, cc23d385) [ 72.161407] [ 72.162902] The buggy address belongs to the physical page: [ 72.168518] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 72.175811] flags: 0x0(zone=0) [ 72.178863] page_type: f5(slab) [ 72.182037] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 72.190185] raw: 00000000 [ 72.192840] page dumped because: kasan: bad access detected [ 72.198425] [ 72.199951] Memory state around the buggy address: [ 72.204772] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.211334] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.217895] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.224487] ^ [ 72.227020] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.233612] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.240173] ================================================================== [ 69.450897] ================================================================== [ 69.458190] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x438/0x1d70 [ 69.465545] Write of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 69.472290] [ 69.473785] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 69.473815] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.473846] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.473846] Call trace: [ 69.473846] unwind_backtrace from show_stack+0x18/0x1c [ 69.473876] show_stack from dump_stack_lvl+0x70/0x90 [ 69.473907] dump_stack_lvl from print_report+0x158/0x528 [ 69.473937] print_report from kasan_report+0xdc/0x118 [ 69.473968] kasan_report from kasan_check_range+0x14c/0x198 [ 69.473968] kasan_check_range from kasan_bitops_generic+0x438/0x1d70 [ 69.473999] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.474029] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.474060] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.474090] kthread from ret_from_fork+0x14/0x20 [ 69.474090] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 69.474121] 3fa0: 00000000 00000000 00000000 00000000 [ 69.474151] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.474151] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.474182] [ 69.585754] Allocated by task 317: [ 69.589202] kasan_save_track+0x30/0x5c [ 69.593048] __kasan_kmalloc+0x8c/0x94 [ 69.596832] kasan_bitops_generic+0xd4/0x1d70 [ 69.601257] kunit_try_run_case+0x22c/0x5a8 [ 69.605468] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.610992] kthread+0x464/0x810 [ 69.614257] ret_from_fork+0x14/0x20 [ 69.617858] [ 69.619354] The buggy address belongs to the object at cc23d380 [ 69.619354] which belongs to the cache kmalloc-64 of size 64 [ 69.631072] The buggy address is located 4 bytes inside of [ 69.631072] allocated 5-byte region [cc23d380, cc23d385) [ 69.642028] [ 69.643524] The buggy address belongs to the physical page: [ 69.649139] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 69.656402] flags: 0x0(zone=0) [ 69.659484] page_type: f5(slab) [ 69.662658] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 69.670806] raw: 00000000 [ 69.673431] page dumped because: kasan: bad access detected [ 69.679046] [ 69.680541] Memory state around the buggy address: [ 69.685363] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.691955] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.698516] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.705108] ^ [ 69.707641] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.714233] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.720794] ================================================================== [ 71.122955] ================================================================== [ 71.130218] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x874/0x1d70 [ 71.137603] Write of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 71.144348] [ 71.145843] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 71.145874] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.145874] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.145904] Call trace: [ 71.145904] unwind_backtrace from show_stack+0x18/0x1c [ 71.145935] show_stack from dump_stack_lvl+0x70/0x90 [ 71.145965] dump_stack_lvl from print_report+0x158/0x528 [ 71.145996] print_report from kasan_report+0xdc/0x118 [ 71.145996] kasan_report from kasan_check_range+0x14c/0x198 [ 71.146026] kasan_check_range from kasan_bitops_generic+0x874/0x1d70 [ 71.146057] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.146087] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.146118] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.146148] kthread from ret_from_fork+0x14/0x20 [ 71.146148] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 71.146179] 3fa0: 00000000 00000000 00000000 00000000 [ 71.146179] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.146209] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.146209] [ 71.257812] Allocated by task 317: [ 71.261230] kasan_save_track+0x30/0x5c [ 71.265106] __kasan_kmalloc+0x8c/0x94 [ 71.268890] kasan_bitops_generic+0xd4/0x1d70 [ 71.273284] kunit_try_run_case+0x22c/0x5a8 [ 71.277526] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.283050] kthread+0x464/0x810 [ 71.286285] ret_from_fork+0x14/0x20 [ 71.289916] [ 71.291412] The buggy address belongs to the object at cc23d380 [ 71.291412] which belongs to the cache kmalloc-64 of size 64 [ 71.303131] The buggy address is located 4 bytes inside of [ 71.303131] allocated 5-byte region [cc23d380, cc23d385) [ 71.314086] [ 71.315582] The buggy address belongs to the physical page: [ 71.321197] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 71.328460] flags: 0x0(zone=0) [ 71.331542] page_type: f5(slab) [ 71.334716] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 71.342864] raw: 00000000 [ 71.345489] page dumped because: kasan: bad access detected [ 71.351104] [ 71.352600] Memory state around the buggy address: [ 71.357421] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.364013] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.370574] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.377136] ^ [ 71.379699] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.386291] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.392852] ================================================================== [ 69.163848] ================================================================== [ 69.187011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bd0/0x1d70 [ 69.194458] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 69.201141] [ 69.202636] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 69.202667] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.202667] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.202697] Call trace: [ 69.202697] unwind_backtrace from show_stack+0x18/0x1c [ 69.202728] show_stack from dump_stack_lvl+0x70/0x90 [ 69.202758] dump_stack_lvl from print_report+0x158/0x528 [ 69.202758] print_report from kasan_report+0xdc/0x118 [ 69.202789] kasan_report from kasan_bitops_generic+0x1bd0/0x1d70 [ 69.202819] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.202850] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.202880] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.202911] kthread from ret_from_fork+0x14/0x20 [ 69.202911] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 69.202941] 3fa0: 00000000 00000000 00000000 00000000 [ 69.202941] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.202972] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.202972] [ 69.308563] Allocated by task 317: [ 69.311981] kasan_save_track+0x30/0x5c [ 69.315856] __kasan_kmalloc+0x8c/0x94 [ 69.319641] kasan_bitops_generic+0xd4/0x1d70 [ 69.324035] kunit_try_run_case+0x22c/0x5a8 [ 69.328247] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.333770] kthread+0x464/0x810 [ 69.337036] ret_from_fork+0x14/0x20 [ 69.340637] [ 69.342132] The buggy address belongs to the object at cc23d380 [ 69.342132] which belongs to the cache kmalloc-64 of size 64 [ 69.353851] The buggy address is located 4 bytes inside of [ 69.353851] allocated 5-byte region [cc23d380, cc23d385) [ 69.364807] [ 69.366302] The buggy address belongs to the physical page: [ 69.371917] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 69.379180] flags: 0x0(zone=0) [ 69.382263] page_type: f5(slab) [ 69.385437] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 69.393585] raw: 00000000 [ 69.396209] page dumped because: kasan: bad access detected [ 69.401824] [ 69.403320] Memory state around the buggy address: [ 69.408172] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.414733] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.421295] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.427886] ^ [ 69.430419] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.437011] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.443572] ================================================================== [ 71.671539] ================================================================== [ 71.695495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a80/0x1d70 [ 71.702941] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 71.709594] [ 71.711120] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 71.711151] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 71.711151] Hardware name: Generic DRA74X (Flattened Device Tree) [ 71.711151] Call trace: [ 71.711181] unwind_backtrace from show_stack+0x18/0x1c [ 71.711181] show_stack from dump_stack_lvl+0x70/0x90 [ 71.711212] dump_stack_lvl from print_report+0x158/0x528 [ 71.711242] print_report from kasan_report+0xdc/0x118 [ 71.711273] kasan_report from kasan_bitops_generic+0x1a80/0x1d70 [ 71.711303] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 71.711303] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.711334] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 71.711364] kthread from ret_from_fork+0x14/0x20 [ 71.711395] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 71.711395] 3fa0: 00000000 00000000 00000000 00000000 [ 71.711425] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 71.711456] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 71.711456] [ 71.817016] Allocated by task 317: [ 71.820465] kasan_save_track+0x30/0x5c [ 71.824310] __kasan_kmalloc+0x8c/0x94 [ 71.828094] kasan_bitops_generic+0xd4/0x1d70 [ 71.832489] kunit_try_run_case+0x22c/0x5a8 [ 71.836730] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 71.842254] kthread+0x464/0x810 [ 71.845489] ret_from_fork+0x14/0x20 [ 71.849121] [ 71.850616] The buggy address belongs to the object at cc23d380 [ 71.850616] which belongs to the cache kmalloc-64 of size 64 [ 71.862335] The buggy address is located 4 bytes inside of [ 71.862335] allocated 5-byte region [cc23d380, cc23d385) [ 71.873291] [ 71.874786] The buggy address belongs to the physical page: [ 71.880401] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 71.887664] flags: 0x0(zone=0) [ 71.890747] page_type: f5(slab) [ 71.893920] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 71.902069] raw: 00000000 [ 71.904693] page dumped because: kasan: bad access detected [ 71.910308] [ 71.911804] Memory state around the buggy address: [ 71.916625] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.923217] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.929779] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.936340] ^ [ 71.938903] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.945495] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.952056] ================================================================== [ 69.728118] ================================================================== [ 69.735382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4e8/0x1d70 [ 69.742767] Write of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 69.749511] [ 69.751007] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 69.751037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 69.751068] Hardware name: Generic DRA74X (Flattened Device Tree) [ 69.751068] Call trace: [ 69.751068] unwind_backtrace from show_stack+0x18/0x1c [ 69.751098] show_stack from dump_stack_lvl+0x70/0x90 [ 69.751129] dump_stack_lvl from print_report+0x158/0x528 [ 69.751159] print_report from kasan_report+0xdc/0x118 [ 69.751159] kasan_report from kasan_check_range+0x14c/0x198 [ 69.751190] kasan_check_range from kasan_bitops_generic+0x4e8/0x1d70 [ 69.751220] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 69.751251] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.751281] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 69.751312] kthread from ret_from_fork+0x14/0x20 [ 69.751312] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 69.751342] 3fa0: 00000000 00000000 00000000 00000000 [ 69.751342] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 69.751373] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 69.751373] [ 69.862976] Allocated by task 317: [ 69.866394] kasan_save_track+0x30/0x5c [ 69.870269] __kasan_kmalloc+0x8c/0x94 [ 69.874053] kasan_bitops_generic+0xd4/0x1d70 [ 69.878448] kunit_try_run_case+0x22c/0x5a8 [ 69.882659] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.888214] kthread+0x464/0x810 [ 69.891448] ret_from_fork+0x14/0x20 [ 69.895050] [ 69.896575] The buggy address belongs to the object at cc23d380 [ 69.896575] which belongs to the cache kmalloc-64 of size 64 [ 69.908294] The buggy address is located 4 bytes inside of [ 69.908294] allocated 5-byte region [cc23d380, cc23d385) [ 69.919250] [ 69.920745] The buggy address belongs to the physical page: [ 69.926361] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 69.933624] flags: 0x0(zone=0) [ 69.936706] page_type: f5(slab) [ 69.939880] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 69.948028] raw: 00000000 [ 69.950653] page dumped because: kasan: bad access detected [ 69.956268] [ 69.957763] Memory state around the buggy address: [ 69.962585] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.969177] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.975738] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.982299] ^ [ 69.984863] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.991424] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.998016] ================================================================== [ 68.876464] ================================================================== [ 68.899444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a50/0x1d70 [ 68.906890] Read of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 68.913543] [ 68.915069] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 68.915100] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 68.915100] Hardware name: Generic DRA74X (Flattened Device Tree) [ 68.915100] Call trace: [ 68.915130] unwind_backtrace from show_stack+0x18/0x1c [ 68.915161] show_stack from dump_stack_lvl+0x70/0x90 [ 68.915161] dump_stack_lvl from print_report+0x158/0x528 [ 68.915191] print_report from kasan_report+0xdc/0x118 [ 68.915222] kasan_report from kasan_bitops_generic+0x1a50/0x1d70 [ 68.915252] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 68.915283] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.915313] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 68.915313] kthread from ret_from_fork+0x14/0x20 [ 68.915344] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 68.915374] 3fa0: 00000000 00000000 00000000 00000000 [ 68.915374] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 68.915405] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 68.915405] [ 69.020996] Allocated by task 317: [ 69.024414] kasan_save_track+0x30/0x5c [ 69.028289] __kasan_kmalloc+0x8c/0x94 [ 69.032073] kasan_bitops_generic+0xd4/0x1d70 [ 69.036468] kunit_try_run_case+0x22c/0x5a8 [ 69.040679] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 69.046203] kthread+0x464/0x810 [ 69.049468] ret_from_fork+0x14/0x20 [ 69.053070] [ 69.054565] The buggy address belongs to the object at cc23d380 [ 69.054565] which belongs to the cache kmalloc-64 of size 64 [ 69.066314] The buggy address is located 4 bytes inside of [ 69.066314] allocated 5-byte region [cc23d380, cc23d385) [ 69.077239] [ 69.078735] The buggy address belongs to the physical page: [ 69.084350] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 69.091644] flags: 0x0(zone=0) [ 69.094696] page_type: f5(slab) [ 69.097869] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 69.106018] raw: 00000000 [ 69.108673] page dumped because: kasan: bad access detected [ 69.114288] [ 69.115783] Memory state around the buggy address: [ 69.120605] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.127166] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.133758] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.140319] ^ [ 69.142883] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.149444] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.156005] ================================================================== [ 70.276489] ================================================================== [ 70.283782] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19f8/0x1d70 [ 70.291229] Write of size 4 at addr cc23d384 by task kunit_try_catch/317 [ 70.297973] [ 70.299468] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 70.299499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 70.299530] Hardware name: Generic DRA74X (Flattened Device Tree) [ 70.299530] Call trace: [ 70.299530] unwind_backtrace from show_stack+0x18/0x1c [ 70.299560] show_stack from dump_stack_lvl+0x70/0x90 [ 70.299591] dump_stack_lvl from print_report+0x158/0x528 [ 70.299621] print_report from kasan_report+0xdc/0x118 [ 70.299652] kasan_report from kasan_bitops_generic+0x19f8/0x1d70 [ 70.299652] kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8 [ 70.299682] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.299713] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 70.299743] kthread from ret_from_fork+0x14/0x20 [ 70.299774] Exception stack(0xf26d3fb0 to 0xf26d3ff8) [ 70.299774] 3fa0: 00000000 00000000 00000000 00000000 [ 70.299804] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 70.299804] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 70.299835] [ 70.405395] Allocated by task 317: [ 70.408813] kasan_save_track+0x30/0x5c [ 70.412689] __kasan_kmalloc+0x8c/0x94 [ 70.416473] kasan_bitops_generic+0xd4/0x1d70 [ 70.420867] kunit_try_run_case+0x22c/0x5a8 [ 70.425079] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 70.430603] kthread+0x464/0x810 [ 70.433868] ret_from_fork+0x14/0x20 [ 70.437469] [ 70.438964] The buggy address belongs to the object at cc23d380 [ 70.438964] which belongs to the cache kmalloc-64 of size 64 [ 70.450714] The buggy address is located 4 bytes inside of [ 70.450714] allocated 5-byte region [cc23d380, cc23d385) [ 70.461639] [ 70.463134] The buggy address belongs to the physical page: [ 70.468749] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23d [ 70.476043] flags: 0x0(zone=0) [ 70.479095] page_type: f5(slab) [ 70.482269] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 70.490417] raw: 00000000 [ 70.493072] page dumped because: kasan: bad access detected [ 70.498687] [ 70.500183] Memory state around the buggy address: [ 70.505004] cc23d280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.511566] cc23d300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.518157] >cc23d380: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.524719] ^ [ 70.527282] cc23d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.533843] cc23d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.540405] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 68.559356] ================================================================== [ 68.566650] BUG: KASAN: slab-use-after-free in strnlen+0x94/0x9c [ 68.572692] Read of size 1 at addr cc23b890 by task kunit_try_catch/315 [ 68.579345] [ 68.580871] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 68.580902] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 68.580902] Hardware name: Generic DRA74X (Flattened Device Tree) [ 68.580902] Call trace: [ 68.580902] unwind_backtrace from show_stack+0x18/0x1c [ 68.580932] show_stack from dump_stack_lvl+0x70/0x90 [ 68.580963] dump_stack_lvl from print_report+0x158/0x528 [ 68.580993] print_report from kasan_report+0xdc/0x118 [ 68.581024] kasan_report from strnlen+0x94/0x9c [ 68.581024] strnlen from kasan_strings+0x670/0xf00 [ 68.581054] kasan_strings from kunit_try_run_case+0x22c/0x5a8 [ 68.581085] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.581115] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 68.581146] kthread from ret_from_fork+0x14/0x20 [ 68.581146] Exception stack(0xf26c3fb0 to 0xf26c3ff8) [ 68.581176] 3fa0: 00000000 00000000 00000000 00000000 [ 68.581207] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 68.581207] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 68.581237] [ 68.689605] Allocated by task 315: [ 68.693023] kasan_save_track+0x30/0x5c [ 68.696899] __kasan_kmalloc+0x8c/0x94 [ 68.700683] kasan_strings+0xe8/0xf00 [ 68.704376] kunit_try_run_case+0x22c/0x5a8 [ 68.708587] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.714111] kthread+0x464/0x810 [ 68.717376] ret_from_fork+0x14/0x20 [ 68.720977] [ 68.722473] Freed by task 315: [ 68.725555] kasan_save_track+0x30/0x5c [ 68.729431] kasan_save_free_info+0x3c/0x48 [ 68.733642] __kasan_slab_free+0x40/0x50 [ 68.737579] kfree+0xe8/0x384 [ 68.740600] kasan_strings+0x310/0xf00 [ 68.744384] kunit_try_run_case+0x22c/0x5a8 [ 68.748596] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.754119] kthread+0x464/0x810 [ 68.757385] ret_from_fork+0x14/0x20 [ 68.760986] [ 68.762481] The buggy address belongs to the object at cc23b880 [ 68.762481] which belongs to the cache kmalloc-64 of size 64 [ 68.774200] The buggy address is located 16 bytes inside of [ 68.774200] freed 64-byte region [cc23b880, cc23b8c0) [ 68.784973] [ 68.786468] The buggy address belongs to the physical page: [ 68.792083] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23b [ 68.799377] flags: 0x0(zone=0) [ 68.802429] page_type: f5(slab) [ 68.805603] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 68.813751] raw: 00000000 [ 68.816406] page dumped because: kasan: bad access detected [ 68.822021] [ 68.823516] Memory state around the buggy address: [ 68.828338] cc23b780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.834899] cc23b800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.841491] >cc23b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.848052] ^ [ 68.851135] cc23b900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.857696] cc23b980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.864288] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 68.247375] ================================================================== [ 68.254638] BUG: KASAN: slab-use-after-free in strlen+0xb0/0xb4 [ 68.260620] Read of size 1 at addr cc23b890 by task kunit_try_catch/315 [ 68.267272] [ 68.268798] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 68.268829] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 68.268829] Hardware name: Generic DRA74X (Flattened Device Tree) [ 68.268829] Call trace: [ 68.268859] unwind_backtrace from show_stack+0x18/0x1c [ 68.268859] show_stack from dump_stack_lvl+0x70/0x90 [ 68.268890] dump_stack_lvl from print_report+0x158/0x528 [ 68.268920] print_report from kasan_report+0xdc/0x118 [ 68.268951] kasan_report from strlen+0xb0/0xb4 [ 68.268981] strlen from kasan_strings+0x5dc/0xf00 [ 68.268981] kasan_strings from kunit_try_run_case+0x22c/0x5a8 [ 68.269012] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.269042] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 68.269073] kthread from ret_from_fork+0x14/0x20 [ 68.269104] Exception stack(0xf26c3fb0 to 0xf26c3ff8) [ 68.269104] 3fa0: 00000000 00000000 00000000 00000000 [ 68.269134] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 68.269134] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 68.269165] [ 68.377349] Allocated by task 315: [ 68.380767] kasan_save_track+0x30/0x5c [ 68.384643] __kasan_kmalloc+0x8c/0x94 [ 68.388427] kasan_strings+0xe8/0xf00 [ 68.392120] kunit_try_run_case+0x22c/0x5a8 [ 68.396331] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.401855] kthread+0x464/0x810 [ 68.405120] ret_from_fork+0x14/0x20 [ 68.408721] [ 68.410247] Freed by task 315: [ 68.413299] kasan_save_track+0x30/0x5c [ 68.417175] kasan_save_free_info+0x3c/0x48 [ 68.421386] __kasan_slab_free+0x40/0x50 [ 68.425354] kfree+0xe8/0x384 [ 68.428344] kasan_strings+0x310/0xf00 [ 68.432128] kunit_try_run_case+0x22c/0x5a8 [ 68.436340] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.441864] kthread+0x464/0x810 [ 68.445129] ret_from_fork+0x14/0x20 [ 68.448730] [ 68.450256] The buggy address belongs to the object at cc23b880 [ 68.450256] which belongs to the cache kmalloc-64 of size 64 [ 68.461975] The buggy address is located 16 bytes inside of [ 68.461975] freed 64-byte region [cc23b880, cc23b8c0) [ 68.472747] [ 68.474243] The buggy address belongs to the physical page: [ 68.479858] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23b [ 68.487121] flags: 0x0(zone=0) [ 68.490203] page_type: f5(slab) [ 68.493377] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 68.501525] raw: 00000000 [ 68.504150] page dumped because: kasan: bad access detected [ 68.509765] [ 68.511260] Memory state around the buggy address: [ 68.516082] cc23b780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.522674] cc23b800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.529235] >cc23b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.535797] ^ [ 68.538879] cc23b900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.545471] cc23b980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.552032] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 67.938629] ================================================================== [ 67.945922] BUG: KASAN: slab-use-after-free in kasan_strings+0xd0c/0xf00 [ 67.952667] Read of size 1 at addr cc23b890 by task kunit_try_catch/315 [ 67.959320] [ 67.960845] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 67.960876] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 67.960876] Hardware name: Generic DRA74X (Flattened Device Tree) [ 67.960876] Call trace: [ 67.960906] unwind_backtrace from show_stack+0x18/0x1c [ 67.960937] show_stack from dump_stack_lvl+0x70/0x90 [ 67.960937] dump_stack_lvl from print_report+0x158/0x528 [ 67.960968] print_report from kasan_report+0xdc/0x118 [ 67.960998] kasan_report from kasan_strings+0xd0c/0xf00 [ 67.961029] kasan_strings from kunit_try_run_case+0x22c/0x5a8 [ 67.961029] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.961059] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 67.961090] kthread from ret_from_fork+0x14/0x20 [ 67.961120] Exception stack(0xf26c3fb0 to 0xf26c3ff8) [ 67.961120] 3fa0: 00000000 00000000 00000000 00000000 [ 67.961151] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 67.961181] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 67.961181] [ 68.065368] Allocated by task 315: [ 68.068786] kasan_save_track+0x30/0x5c [ 68.072662] __kasan_kmalloc+0x8c/0x94 [ 68.076446] kasan_strings+0xe8/0xf00 [ 68.080139] kunit_try_run_case+0x22c/0x5a8 [ 68.084350] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.089874] kthread+0x464/0x810 [ 68.093139] ret_from_fork+0x14/0x20 [ 68.096740] [ 68.098236] Freed by task 315: [ 68.101318] kasan_save_track+0x30/0x5c [ 68.105194] kasan_save_free_info+0x3c/0x48 [ 68.109405] __kasan_slab_free+0x40/0x50 [ 68.113372] kfree+0xe8/0x384 [ 68.116363] kasan_strings+0x310/0xf00 [ 68.120147] kunit_try_run_case+0x22c/0x5a8 [ 68.124359] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 68.129882] kthread+0x464/0x810 [ 68.133148] ret_from_fork+0x14/0x20 [ 68.136749] [ 68.138244] The buggy address belongs to the object at cc23b880 [ 68.138244] which belongs to the cache kmalloc-64 of size 64 [ 68.149993] The buggy address is located 16 bytes inside of [ 68.149993] freed 64-byte region [cc23b880, cc23b8c0) [ 68.160736] [ 68.162261] The buggy address belongs to the physical page: [ 68.167846] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23b [ 68.175140] flags: 0x0(zone=0) [ 68.178222] page_type: f5(slab) [ 68.181365] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 68.189514] raw: 00000000 [ 68.192169] page dumped because: kasan: bad access detected [ 68.197784] [ 68.199279] Memory state around the buggy address: [ 68.204101] cc23b780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.210662] cc23b800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.217254] >cc23b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.223815] ^ [ 68.226898] cc23b900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.233459] cc23b980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.240051] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 67.609863] ================================================================== [ 67.633911] BUG: KASAN: slab-use-after-free in strcmp+0xcc/0xd4 [ 67.639862] Read of size 1 at addr cc23b890 by task kunit_try_catch/315 [ 67.646545] [ 67.648040] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 67.648071] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 67.648071] Hardware name: Generic DRA74X (Flattened Device Tree) [ 67.648101] Call trace: [ 67.648101] unwind_backtrace from show_stack+0x18/0x1c [ 67.648132] show_stack from dump_stack_lvl+0x70/0x90 [ 67.648162] dump_stack_lvl from print_report+0x158/0x528 [ 67.648193] print_report from kasan_report+0xdc/0x118 [ 67.648193] kasan_report from strcmp+0xcc/0xd4 [ 67.648223] strcmp from kasan_strings+0x490/0xf00 [ 67.648254] kasan_strings from kunit_try_run_case+0x22c/0x5a8 [ 67.648284] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.648284] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 67.648315] kthread from ret_from_fork+0x14/0x20 [ 67.648345] Exception stack(0xf26c3fb0 to 0xf26c3ff8) [ 67.648376] 3fa0: 00000000 00000000 00000000 00000000 [ 67.648376] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 67.648406] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 67.648406] [ 67.756622] Allocated by task 315: [ 67.760040] kasan_save_track+0x30/0x5c [ 67.763916] __kasan_kmalloc+0x8c/0x94 [ 67.767700] kasan_strings+0xe8/0xf00 [ 67.771392] kunit_try_run_case+0x22c/0x5a8 [ 67.775604] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.781127] kthread+0x464/0x810 [ 67.784393] ret_from_fork+0x14/0x20 [ 67.787994] [ 67.789489] Freed by task 315: [ 67.792572] kasan_save_track+0x30/0x5c [ 67.796447] kasan_save_free_info+0x3c/0x48 [ 67.800659] __kasan_slab_free+0x40/0x50 [ 67.804626] kfree+0xe8/0x384 [ 67.807617] kasan_strings+0x310/0xf00 [ 67.811401] kunit_try_run_case+0x22c/0x5a8 [ 67.815612] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.821136] kthread+0x464/0x810 [ 67.824401] ret_from_fork+0x14/0x20 [ 67.828002] [ 67.829528] The buggy address belongs to the object at cc23b880 [ 67.829528] which belongs to the cache kmalloc-64 of size 64 [ 67.841247] The buggy address is located 16 bytes inside of [ 67.841247] freed 64-byte region [cc23b880, cc23b8c0) [ 67.852020] [ 67.853515] The buggy address belongs to the physical page: [ 67.859130] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23b [ 67.866394] flags: 0x0(zone=0) [ 67.869476] page_type: f5(slab) [ 67.872650] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000 [ 67.880798] raw: 00000000 [ 67.883422] page dumped because: kasan: bad access detected [ 67.889038] [ 67.890533] Memory state around the buggy address: [ 67.895355] cc23b780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.901947] cc23b800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.908508] >cc23b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.915069] ^ [ 67.918151] cc23b900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.924743] cc23b980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.931304] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 67.292022] ================================================================== [ 67.303039] BUG: KASAN: slab-out-of-bounds in memcmp+0x19c/0x1b0 [ 67.309112] Read of size 1 at addr cc23b718 by task kunit_try_catch/313 [ 67.315765] [ 67.317291] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 67.317321] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 67.317321] Hardware name: Generic DRA74X (Flattened Device Tree) [ 67.317321] Call trace: [ 67.317352] unwind_backtrace from show_stack+0x18/0x1c [ 67.317382] show_stack from dump_stack_lvl+0x70/0x90 [ 67.317382] dump_stack_lvl from print_report+0x158/0x528 [ 67.317413] print_report from kasan_report+0xdc/0x118 [ 67.317443] kasan_report from memcmp+0x19c/0x1b0 [ 67.317474] memcmp from kasan_memcmp+0x1d0/0x388 [ 67.317504] kasan_memcmp from kunit_try_run_case+0x22c/0x5a8 [ 67.317504] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.317535] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 67.317565] kthread from ret_from_fork+0x14/0x20 [ 67.317596] Exception stack(0xf26b3fb0 to 0xf26b3ff8) [ 67.317596] 3fa0: 00000000 00000000 00000000 00000000 [ 67.317626] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 67.317626] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 67.317657] [ 67.425842] Allocated by task 313: [ 67.429290] kasan_save_track+0x30/0x5c [ 67.433135] __kasan_kmalloc+0x8c/0x94 [ 67.436920] kasan_memcmp+0xe0/0x388 [ 67.440551] kunit_try_run_case+0x22c/0x5a8 [ 67.444763] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.450286] kthread+0x464/0x810 [ 67.453552] ret_from_fork+0x14/0x20 [ 67.457153] [ 67.458648] The buggy address belongs to the object at cc23b700 [ 67.458648] which belongs to the cache kmalloc-64 of size 64 [ 67.470367] The buggy address is located 0 bytes to the right of [ 67.470367] allocated 24-byte region [cc23b700, cc23b718) [ 67.481933] [ 67.483428] The buggy address belongs to the physical page: [ 67.489044] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23b [ 67.496307] flags: 0x0(zone=0) [ 67.499389] page_type: f5(slab) [ 67.502563] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 67.510711] raw: 00000000 [ 67.513366] page dumped because: kasan: bad access detected [ 67.518951] [ 67.520477] Memory state around the buggy address: [ 67.525299] cc23b600: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.531860] cc23b680: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.538421] >cc23b700: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.545013] ^ [ 67.548339] cc23b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.554931] cc23b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.561492] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 67.028442] ================================================================== [ 67.039916] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x314/0x34c [ 67.047546] Read of size 1 at addr f2693c8a by task kunit_try_catch/309 [ 67.054199] [ 67.055694] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 67.055725] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 67.055755] Hardware name: Generic DRA74X (Flattened Device Tree) [ 67.055755] Call trace: [ 67.055755] unwind_backtrace from show_stack+0x18/0x1c [ 67.055786] show_stack from dump_stack_lvl+0x70/0x90 [ 67.055816] dump_stack_lvl from print_report+0x158/0x528 [ 67.055847] print_report from kasan_report+0xdc/0x118 [ 67.055877] kasan_report from kasan_alloca_oob_right+0x314/0x34c [ 67.055877] kasan_alloca_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 67.055908] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 67.055938] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 67.055969] kthread from ret_from_fork+0x14/0x20 [ 67.055999] Exception stack(0xf2693fb0 to 0xf2693ff8) [ 67.055999] 3fa0: 00000000 00000000 00000000 00000000 [ 67.056030] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 67.056030] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 67.056060] [ 67.161804] The buggy address belongs to stack of task kunit_try_catch/309 [ 67.168731] [ 67.170227] The buggy address belongs to the virtual mapping at [ 67.170227] [f2690000, f2695000) created by: [ 67.170227] kernel_clone+0x174/0x794 [ 67.184234] [ 67.185729] The buggy address belongs to the physical page: [ 67.191345] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d7a [ 67.198638] flags: 0x80000000(zone=2) [ 67.202331] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 67.210479] raw: 00000000 [ 67.213104] page dumped because: kasan: bad access detected [ 67.218719] [ 67.220214] Memory state around the buggy address: [ 67.225036] f2693b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.231628] f2693c00: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca [ 67.238189] >f2693c80: 00 02 cb cb cb cb cb cb 00 00 00 00 00 00 00 00 [ 67.244750] ^ [ 67.247589] f2693d00: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3 [ 67.254150] f2693d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.260711] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 66.785125] ================================================================== [ 66.796081] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x304/0x33c [ 66.803619] Read of size 1 at addr f268bc7f by task kunit_try_catch/307 [ 66.810302] [ 66.811798] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 66.811828] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 66.811828] Hardware name: Generic DRA74X (Flattened Device Tree) [ 66.811859] Call trace: [ 66.811859] unwind_backtrace from show_stack+0x18/0x1c [ 66.811889] show_stack from dump_stack_lvl+0x70/0x90 [ 66.811920] dump_stack_lvl from print_report+0x158/0x528 [ 66.811950] print_report from kasan_report+0xdc/0x118 [ 66.811950] kasan_report from kasan_alloca_oob_left+0x304/0x33c [ 66.811981] kasan_alloca_oob_left from kunit_try_run_case+0x22c/0x5a8 [ 66.812011] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 66.812042] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 66.812072] kthread from ret_from_fork+0x14/0x20 [ 66.812103] Exception stack(0xf268bfb0 to 0xf268bff8) [ 66.812103] bfa0: 00000000 00000000 00000000 00000000 [ 66.812133] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 66.812133] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 66.812164] [ 66.917755] The buggy address belongs to stack of task kunit_try_catch/307 [ 66.924652] [ 66.926177] The buggy address belongs to the virtual mapping at [ 66.926177] [f2688000, f268d000) created by: [ 66.926177] kernel_clone+0x174/0x794 [ 66.940185] [ 66.941680] The buggy address belongs to the physical page: [ 66.947296] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d76 [ 66.954559] flags: 0x80000000(zone=2) [ 66.958251] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 66.966400] raw: 00000000 [ 66.969055] page dumped because: kasan: bad access detected [ 66.974670] [ 66.976165] Memory state around the buggy address: [ 66.980987] f268bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.987548] f268bb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.994140] >f268bc00: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca [ 67.000701] ^ [ 67.007202] f268bc80: 00 02 cb cb cb cb cb cb 00 00 00 00 00 00 00 00 [ 67.013763] f268bd00: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3 [ 67.020324] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 66.512145] ================================================================== [ 66.527313] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2a8/0x2dc [ 66.534240] Read of size 1 at addr f2683d6a by task kunit_try_catch/305 [ 66.540893] [ 66.542388] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 66.542419] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 66.542449] Hardware name: Generic DRA74X (Flattened Device Tree) [ 66.542449] Call trace: [ 66.542449] unwind_backtrace from show_stack+0x18/0x1c [ 66.542480] show_stack from dump_stack_lvl+0x70/0x90 [ 66.542510] dump_stack_lvl from print_report+0x158/0x528 [ 66.542541] print_report from kasan_report+0xdc/0x118 [ 66.542572] kasan_report from kasan_stack_oob+0x2a8/0x2dc [ 66.542572] kasan_stack_oob from kunit_try_run_case+0x22c/0x5a8 [ 66.542602] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 66.542633] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 66.542663] kthread from ret_from_fork+0x14/0x20 [ 66.542663] Exception stack(0xf2683fb0 to 0xf2683ff8) [ 66.542694] 3fa0: 00000000 00000000 00000000 00000000 [ 66.542724] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 66.542724] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 66.542755] [ 66.647277] The buggy address belongs to stack of task kunit_try_catch/305 [ 66.654174] and is located at offset 106 in frame: [ 66.659088] kasan_stack_oob+0x0/0x2dc [ 66.662872] [ 66.664398] This frame has 4 objects: [ 66.668090] [32, 33) '__assertion' [ 66.668090] [48, 52) 'array' [ 66.671600] [64, 72) '__assertion' [ 66.674591] [96, 106) 'stack_array' [ 66.678100] [ 66.683197] The buggy address belongs to the virtual mapping at [ 66.683197] [f2680000, f2685000) created by: [ 66.683197] kernel_clone+0x174/0x794 [ 66.697204] [ 66.698730] The buggy address belongs to the physical page: [ 66.704315] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d72 [ 66.711608] flags: 0x80000000(zone=2) [ 66.715301] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 66.723449] raw: 00000000 [ 66.726074] page dumped because: kasan: bad access detected [ 66.731689] [ 66.733184] Memory state around the buggy address: [ 66.738006] f2683c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.744598] f2683c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.751159] >f2683d00: f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 02 f3 f3 [ 66.757720] ^ [ 66.763702] f2683d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.770263] f2683e00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 [ 66.776824] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 66.276733] ================================================================== [ 66.289337] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x284/0x2bc [ 66.296966] Read of size 1 at addr c6a6ec4d by task kunit_try_catch/301 [ 66.303619] [ 66.305145] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 66.305175] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 66.305175] Hardware name: Generic DRA74X (Flattened Device Tree) [ 66.305175] Call trace: [ 66.305175] unwind_backtrace from show_stack+0x18/0x1c [ 66.305206] show_stack from dump_stack_lvl+0x70/0x90 [ 66.305236] dump_stack_lvl from print_report+0x158/0x528 [ 66.305267] print_report from kasan_report+0xdc/0x118 [ 66.305297] kasan_report from kasan_global_oob_right+0x284/0x2bc [ 66.305328] kasan_global_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 66.305328] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 66.305358] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 66.305389] kthread from ret_from_fork+0x14/0x20 [ 66.305419] Exception stack(0xf2663fb0 to 0xf2663ff8) [ 66.305419] 3fa0: 00000000 00000000 00000000 00000000 [ 66.305450] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 66.305450] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 66.305480] [ 66.411224] The buggy address belongs to the variable: [ 66.416412] global_array+0xd/0x40 [ 66.419830] [ 66.421325] The buggy address belongs to the physical page: [ 66.426940] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x86a6e [ 66.434234] flags: 0x2000(reserved|zone=0) [ 66.438354] raw: 00002000 eeaee77c eeaee77c 00000000 00000000 00000000 ffffffff 00000001 [ 66.446502] raw: 00000000 [ 66.449157] page dumped because: kasan: bad access detected [ 66.454742] [ 66.456237] Memory state around the buggy address: [ 66.461090] c6a6eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.467651] c6a6eb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.474212] >c6a6ec00: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 66.480804] ^ [ 66.485717] c6a6ec80: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 66.492279] c6a6ed00: 01 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 66.498840] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 66.002136] ================================================================== [ 66.014221] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 66.022308] Free of addr ccc10001 by task kunit_try_catch/299 [ 66.028076] [ 66.029602] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 66.029632] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 66.029632] Hardware name: Generic DRA74X (Flattened Device Tree) [ 66.029632] Call trace: [ 66.029663] unwind_backtrace from show_stack+0x18/0x1c [ 66.029663] show_stack from dump_stack_lvl+0x70/0x90 [ 66.029693] dump_stack_lvl from print_report+0x158/0x528 [ 66.029724] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 66.029754] kasan_report_invalid_free from __kasan_mempool_poison_object+0xd0/0x128 [ 66.029785] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 66.029785] mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 66.029815] mempool_kmalloc_invalid_free_helper from mempool_kmalloc_large_invalid_free+0xb8/0x104 [ 66.029846] mempool_kmalloc_large_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 66.029876] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 66.029907] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 66.029937] kthread from ret_from_fork+0x14/0x20 [ 66.029968] Exception stack(0xf2653fb0 to 0xf2653ff8) [ 66.029968] 3fa0: 00000000 00000000 00000000 00000000 [ 66.029998] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 66.029998] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 66.030029] [ 66.162567] The buggy address belongs to the physical page: [ 66.168182] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc10 [ 66.175476] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.183166] flags: 0x40(head|zone=0) [ 66.186767] page_type: f8(unknown) [ 66.190216] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 66.198364] raw: 00000000 [ 66.200988] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 66.209228] head: 00000000 00000002 eebca241 ffffffff 00000000 ffffffff 00000000 ffffffff [ 66.217468] head: 00000000 00000004 [ 66.220977] page dumped because: kasan: bad access detected [ 66.226593] [ 66.228088] Memory state around the buggy address: [ 66.232910] ccc0ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.239501] ccc0ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.246063] >ccc10000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.252624] ^ [ 66.255187] ccc10080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.261749] ccc10100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.268341] ================================================================== [ 65.681884] ================================================================== [ 65.694152] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.702209] Free of addr cc22df01 by task kunit_try_catch/297 [ 65.708007] [ 65.709503] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 65.709533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.709533] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.709564] Call trace: [ 65.709564] unwind_backtrace from show_stack+0x18/0x1c [ 65.709594] show_stack from dump_stack_lvl+0x70/0x90 [ 65.709625] dump_stack_lvl from print_report+0x158/0x528 [ 65.709625] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 65.709655] kasan_report_invalid_free from check_slab_allocation+0xd0/0xd8 [ 65.709686] check_slab_allocation from __kasan_mempool_poison_object+0x54/0x128 [ 65.709716] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 65.709747] mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.709777] mempool_kmalloc_invalid_free_helper from mempool_kmalloc_invalid_free+0xb8/0x104 [ 65.709777] mempool_kmalloc_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 65.709808] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.709838] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.709869] kthread from ret_from_fork+0x14/0x20 [ 65.709899] Exception stack(0xf2643fb0 to 0xf2643ff8) [ 65.709899] 3fa0: 00000000 00000000 00000000 00000000 [ 65.709930] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.709930] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.709960] [ 65.848114] Allocated by task 297: [ 65.851531] kasan_save_track+0x30/0x5c [ 65.855407] remove_element+0x180/0x264 [ 65.859283] mempool_alloc_preallocated+0x60/0x9c [ 65.864013] mempool_kmalloc_invalid_free_helper+0x90/0x2f8 [ 65.869628] mempool_kmalloc_invalid_free+0xb8/0x104 [ 65.874633] kunit_try_run_case+0x22c/0x5a8 [ 65.878845] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.884399] kthread+0x464/0x810 [ 65.887634] ret_from_fork+0x14/0x20 [ 65.891265] [ 65.892761] The buggy address belongs to the object at cc22df00 [ 65.892761] which belongs to the cache kmalloc-128 of size 128 [ 65.904663] The buggy address is located 1 bytes inside of [ 65.904663] 128-byte region [cc22df00, cc22df80) [ 65.914886] [ 65.916412] The buggy address belongs to the physical page: [ 65.921997] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22d [ 65.929290] flags: 0x0(zone=0) [ 65.932373] page_type: f5(slab) [ 65.935546] raw: 00000000 c7001400 00000122 00000000 00000000 00100010 f5000000 00000000 [ 65.943664] raw: 00000000 [ 65.946319] page dumped because: kasan: bad access detected [ 65.951934] [ 65.953430] Memory state around the buggy address: [ 65.958251] cc22de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.964813] cc22de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.971405] >cc22df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.977966] ^ [ 65.980529] cc22df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.987091] cc22e000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.993682] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 65.169555] ================================================================== [ 65.181579] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368 [ 65.188751] Free of addr ccc0c000 by task kunit_try_catch/293 [ 65.194549] [ 65.196044] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 65.196075] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.196075] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.196105] Call trace: [ 65.196105] unwind_backtrace from show_stack+0x18/0x1c [ 65.196136] show_stack from dump_stack_lvl+0x70/0x90 [ 65.196166] dump_stack_lvl from print_report+0x158/0x528 [ 65.196197] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 65.196197] kasan_report_invalid_free from __kasan_mempool_poison_object+0x124/0x128 [ 65.196228] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 65.196258] mempool_free from mempool_double_free_helper+0x1c4/0x368 [ 65.196289] mempool_double_free_helper from mempool_kmalloc_large_double_free+0xb8/0x104 [ 65.196319] mempool_kmalloc_large_double_free from kunit_try_run_case+0x22c/0x5a8 [ 65.196350] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.196350] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.196380] kthread from ret_from_fork+0x14/0x20 [ 65.196411] Exception stack(0xf2623fb0 to 0xf2623ff8) [ 65.196411] 3fa0: 00000000 00000000 00000000 00000000 [ 65.196441] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.196472] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.196472] [ 65.327392] The buggy address belongs to the physical page: [ 65.332977] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c [ 65.340270] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.347961] flags: 0x40(head|zone=0) [ 65.351562] page_type: f8(unknown) [ 65.355010] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 65.363128] raw: 00000000 [ 65.365783] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 65.374023] head: 00000000 00000002 eebca1b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 65.382263] head: 00000000 00000004 [ 65.385772] page dumped because: kasan: bad access detected [ 65.391387] [ 65.392883] Memory state around the buggy address: [ 65.397705] ccc0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.404266] ccc0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.410858] >ccc0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.417419] ^ [ 65.419952] ccc0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.426544] ccc0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.433105] ================================================================== [ 65.441894] ================================================================== [ 65.454406] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368 [ 65.461608] Free of addr ccc0c000 by task kunit_try_catch/295 [ 65.467407] [ 65.468902] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 65.468933] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.468933] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.468963] Call trace: [ 65.468963] unwind_backtrace from show_stack+0x18/0x1c [ 65.468994] show_stack from dump_stack_lvl+0x70/0x90 [ 65.469024] dump_stack_lvl from print_report+0x158/0x528 [ 65.469024] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 65.469055] kasan_report_invalid_free from __kasan_mempool_poison_pages+0xdc/0xe0 [ 65.469085] __kasan_mempool_poison_pages from mempool_free+0x314/0x440 [ 65.469116] mempool_free from mempool_double_free_helper+0x1c4/0x368 [ 65.469116] mempool_double_free_helper from mempool_page_alloc_double_free+0xb4/0x100 [ 65.469146] mempool_page_alloc_double_free from kunit_try_run_case+0x22c/0x5a8 [ 65.469177] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.469207] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.469238] kthread from ret_from_fork+0x14/0x20 [ 65.469268] Exception stack(0xf2633fb0 to 0xf2633ff8) [ 65.469268] 3fa0: 00000000 00000000 00000000 00000000 [ 65.469299] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.469299] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.469329] [ 65.599365] The buggy address belongs to the physical page: [ 65.604949] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c [ 65.612243] flags: 0x0(zone=0) [ 65.615325] raw: 00000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 65.623474] raw: 00000000 [ 65.626098] page dumped because: kasan: bad access detected [ 65.631713] [ 65.633209] Memory state around the buggy address: [ 65.638031] ccc0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.644592] ccc0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.651184] >ccc0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.657745] ^ [ 65.660308] ccc0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.666870] ccc0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.673431] ================================================================== [ 64.805633] ================================================================== [ 64.817199] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368 [ 64.824401] Free of addr cc22db00 by task kunit_try_catch/291 [ 64.830169] [ 64.831695] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 64.831695] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.831726] Hardware name: Generic DRA74X (Flattened Device Tree) [ 64.831726] Call trace: [ 64.831726] unwind_backtrace from show_stack+0x18/0x1c [ 64.831756] show_stack from dump_stack_lvl+0x70/0x90 [ 64.831787] dump_stack_lvl from print_report+0x158/0x528 [ 64.831817] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 64.831848] kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8 [ 64.831878] check_slab_allocation from __kasan_mempool_poison_object+0x54/0x128 [ 64.831909] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 64.831909] mempool_free from mempool_double_free_helper+0x1c4/0x368 [ 64.831939] mempool_double_free_helper from mempool_kmalloc_double_free+0xb8/0x104 [ 64.831970] mempool_kmalloc_double_free from kunit_try_run_case+0x22c/0x5a8 [ 64.832000] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.832031] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 64.832061] kthread from ret_from_fork+0x14/0x20 [ 64.832061] Exception stack(0xf2613fb0 to 0xf2613ff8) [ 64.832092] 3fa0: 00000000 00000000 00000000 00000000 [ 64.832092] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 64.832122] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 64.832122] [ 64.968536] Allocated by task 291: [ 64.971984] kasan_save_track+0x30/0x5c [ 64.975830] remove_element+0x180/0x264 [ 64.979705] mempool_alloc_preallocated+0x60/0x9c [ 64.984436] mempool_double_free_helper+0x8c/0x368 [ 64.989288] mempool_kmalloc_double_free+0xb8/0x104 [ 64.994201] kunit_try_run_case+0x22c/0x5a8 [ 64.998413] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.003936] kthread+0x464/0x810 [ 65.007202] ret_from_fork+0x14/0x20 [ 65.010803] [ 65.012298] Freed by task 291: [ 65.015380] kasan_save_track+0x30/0x5c [ 65.019256] kasan_save_free_info+0x3c/0x48 [ 65.023468] __kasan_mempool_poison_object+0x94/0x128 [ 65.028564] mempool_free+0x360/0x440 [ 65.032257] mempool_double_free_helper+0x13c/0x368 [ 65.037170] mempool_kmalloc_double_free+0xb8/0x104 [ 65.042083] kunit_try_run_case+0x22c/0x5a8 [ 65.046295] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.051818] kthread+0x464/0x810 [ 65.055084] ret_from_fork+0x14/0x20 [ 65.058685] [ 65.060180] The buggy address belongs to the object at cc22db00 [ 65.060180] which belongs to the cache kmalloc-128 of size 128 [ 65.072082] The buggy address is located 0 bytes inside of [ 65.072082] 128-byte region [cc22db00, cc22db80) [ 65.082336] [ 65.083831] The buggy address belongs to the physical page: [ 65.089447] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22d [ 65.096710] flags: 0x0(zone=0) [ 65.099792] page_type: f5(slab) [ 65.102966] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 65.111114] raw: 00000000 [ 65.113739] page dumped because: kasan: bad access detected [ 65.119354] [ 65.120849] Memory state around the buggy address: [ 65.125671] cc22da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.132263] cc22da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.138824] >cc22db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.145385] ^ [ 65.147949] cc22db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.154541] cc22dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.161102] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 64.584930] ================================================================== [ 64.595977] BUG: KASAN: use-after-free in mempool_uaf_helper+0x388/0x3b8 [ 64.602752] Read of size 1 at addr ccc0c000 by task kunit_try_catch/289 [ 64.609405] [ 64.610900] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 64.610931] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.610961] Hardware name: Generic DRA74X (Flattened Device Tree) [ 64.610961] Call trace: [ 64.610961] unwind_backtrace from show_stack+0x18/0x1c [ 64.610992] show_stack from dump_stack_lvl+0x70/0x90 [ 64.611022] dump_stack_lvl from print_report+0x158/0x528 [ 64.611053] print_report from kasan_report+0xdc/0x118 [ 64.611083] kasan_report from mempool_uaf_helper+0x388/0x3b8 [ 64.611083] mempool_uaf_helper from mempool_page_alloc_uaf+0xb8/0x104 [ 64.611114] mempool_page_alloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 64.611145] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.611175] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 64.611206] kthread from ret_from_fork+0x14/0x20 [ 64.611236] Exception stack(0xf2603fb0 to 0xf2603ff8) [ 64.611236] 3fa0: 00000000 00000000 00000000 00000000 [ 64.611267] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 64.611267] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 64.611297] [ 64.723236] The buggy address belongs to the physical page: [ 64.728851] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c [ 64.736114] flags: 0x0(zone=0) [ 64.739227] raw: 00000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 64.747375] raw: 00000000 [ 64.749999] page dumped because: kasan: bad access detected [ 64.755615] [ 64.757110] Memory state around the buggy address: [ 64.761932] ccc0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.768524] ccc0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.775085] >ccc0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.781646] ^ [ 64.784210] ccc0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.790771] ccc0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.797332] ================================================================== [ 63.982269] ================================================================== [ 63.993560] BUG: KASAN: use-after-free in mempool_uaf_helper+0x388/0x3b8 [ 64.000305] Read of size 1 at addr ccc0c000 by task kunit_try_catch/285 [ 64.006958] [ 64.008483] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 64.008514] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.008514] Hardware name: Generic DRA74X (Flattened Device Tree) [ 64.008514] Call trace: [ 64.008544] unwind_backtrace from show_stack+0x18/0x1c [ 64.008575] show_stack from dump_stack_lvl+0x70/0x90 [ 64.008575] dump_stack_lvl from print_report+0x158/0x528 [ 64.008605] print_report from kasan_report+0xdc/0x118 [ 64.008636] kasan_report from mempool_uaf_helper+0x388/0x3b8 [ 64.008666] mempool_uaf_helper from mempool_kmalloc_large_uaf+0xbc/0x108 [ 64.008697] mempool_kmalloc_large_uaf from kunit_try_run_case+0x22c/0x5a8 [ 64.008697] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.008728] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 64.008758] kthread from ret_from_fork+0x14/0x20 [ 64.008789] Exception stack(0xf25e3fb0 to 0xf25e3ff8) [ 64.008789] 3fa0: 00000000 00000000 00000000 00000000 [ 64.008819] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 64.008819] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 64.008850] [ 64.121307] The buggy address belongs to the physical page: [ 64.126922] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c [ 64.134185] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.141906] flags: 0x40(head|zone=0) [ 64.145507] page_type: f8(unknown) [ 64.148956] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 64.157073] raw: 00000000 [ 64.159729] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 64.167968] head: 00000000 00000002 eebca1b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 64.176208] head: 00000000 00000004 [ 64.179718] page dumped because: kasan: bad access detected [ 64.185302] [ 64.186828] Memory state around the buggy address: [ 64.191650] ccc0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.198211] ccc0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.204772] >ccc0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.211364] ^ [ 64.213897] ccc0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.220489] ccc0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.227050] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 63.645019] ================================================================== [ 63.656585] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x388/0x3b8 [ 63.663787] Read of size 1 at addr cc22d700 by task kunit_try_catch/283 [ 63.670471] [ 63.671966] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 63.671997] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.671997] Hardware name: Generic DRA74X (Flattened Device Tree) [ 63.672027] Call trace: [ 63.672027] unwind_backtrace from show_stack+0x18/0x1c [ 63.672058] show_stack from dump_stack_lvl+0x70/0x90 [ 63.672088] dump_stack_lvl from print_report+0x158/0x528 [ 63.672119] print_report from kasan_report+0xdc/0x118 [ 63.672119] kasan_report from mempool_uaf_helper+0x388/0x3b8 [ 63.672149] mempool_uaf_helper from mempool_kmalloc_uaf+0xbc/0x108 [ 63.672180] mempool_kmalloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 63.672210] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.672241] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 63.672271] kthread from ret_from_fork+0x14/0x20 [ 63.672271] Exception stack(0xf25d3fb0 to 0xf25d3ff8) [ 63.672302] 3fa0: 00000000 00000000 00000000 00000000 [ 63.672302] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 63.672332] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 63.672332] [ 63.783782] Allocated by task 283: [ 63.787200] kasan_save_track+0x30/0x5c [ 63.791076] remove_element+0x180/0x264 [ 63.794952] mempool_alloc_preallocated+0x60/0x9c [ 63.799682] mempool_uaf_helper+0x90/0x3b8 [ 63.803802] mempool_kmalloc_uaf+0xbc/0x108 [ 63.808044] kunit_try_run_case+0x22c/0x5a8 [ 63.812255] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.817779] kthread+0x464/0x810 [ 63.821044] ret_from_fork+0x14/0x20 [ 63.824645] [ 63.826141] Freed by task 283: [ 63.829223] kasan_save_track+0x30/0x5c [ 63.833099] kasan_save_free_info+0x3c/0x48 [ 63.837310] __kasan_mempool_poison_object+0x94/0x128 [ 63.842407] mempool_free+0x360/0x440 [ 63.846099] mempool_uaf_helper+0x13c/0x3b8 [ 63.850311] mempool_kmalloc_uaf+0xbc/0x108 [ 63.854522] kunit_try_run_case+0x22c/0x5a8 [ 63.858734] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.864257] kthread+0x464/0x810 [ 63.867523] ret_from_fork+0x14/0x20 [ 63.871124] [ 63.872619] The buggy address belongs to the object at cc22d700 [ 63.872619] which belongs to the cache kmalloc-128 of size 128 [ 63.884521] The buggy address is located 0 bytes inside of [ 63.884521] freed 128-byte region [cc22d700, cc22d780) [ 63.895294] [ 63.896789] The buggy address belongs to the physical page: [ 63.902404] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22d [ 63.909698] flags: 0x0(zone=0) [ 63.912780] page_type: f5(slab) [ 63.915924] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 63.924072] raw: 00000000 [ 63.926727] page dumped because: kasan: bad access detected [ 63.932342] [ 63.933837] Memory state around the buggy address: [ 63.938659] cc22d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.945220] cc22d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.951812] >cc22d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.958374] ^ [ 63.960937] cc22d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.967498] cc22d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.974060] ================================================================== [ 64.235748] ================================================================== [ 64.247589] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x388/0x3b8 [ 64.254760] Read of size 1 at addr cc23a240 by task kunit_try_catch/287 [ 64.261444] [ 64.262939] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 64.262969] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.262969] Hardware name: Generic DRA74X (Flattened Device Tree) [ 64.263000] Call trace: [ 64.263000] unwind_backtrace from show_stack+0x18/0x1c [ 64.263031] show_stack from dump_stack_lvl+0x70/0x90 [ 64.263061] dump_stack_lvl from print_report+0x158/0x528 [ 64.263061] print_report from kasan_report+0xdc/0x118 [ 64.263092] kasan_report from mempool_uaf_helper+0x388/0x3b8 [ 64.263122] mempool_uaf_helper from mempool_slab_uaf+0xb8/0x100 [ 64.263153] mempool_slab_uaf from kunit_try_run_case+0x22c/0x5a8 [ 64.263153] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.263183] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 64.263214] kthread from ret_from_fork+0x14/0x20 [ 64.263244] Exception stack(0xf25f3fb0 to 0xf25f3ff8) [ 64.263244] 3fa0: 00000000 00000000 00000000 00000000 [ 64.263275] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 64.263305] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 64.263305] [ 64.374206] Allocated by task 287: [ 64.377624] kasan_save_track+0x30/0x5c [ 64.381500] __kasan_mempool_unpoison_object+0xec/0x14c [ 64.386749] remove_element+0x1d4/0x264 [ 64.390624] mempool_alloc_preallocated+0x60/0x9c [ 64.395355] mempool_uaf_helper+0x90/0x3b8 [ 64.399505] mempool_slab_uaf+0xb8/0x100 [ 64.403442] kunit_try_run_case+0x22c/0x5a8 [ 64.407684] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.413208] kthread+0x464/0x810 [ 64.416473] ret_from_fork+0x14/0x20 [ 64.420074] [ 64.421569] Freed by task 287: [ 64.424652] kasan_save_track+0x30/0x5c [ 64.428497] kasan_save_free_info+0x3c/0x48 [ 64.432708] __kasan_mempool_poison_object+0x94/0x128 [ 64.437805] mempool_free+0x360/0x440 [ 64.441497] mempool_uaf_helper+0x13c/0x3b8 [ 64.445709] mempool_slab_uaf+0xb8/0x100 [ 64.449676] kunit_try_run_case+0x22c/0x5a8 [ 64.453887] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.459442] kthread+0x464/0x810 [ 64.462677] ret_from_fork+0x14/0x20 [ 64.466278] [ 64.467803] The buggy address belongs to the object at cc23a240 [ 64.467803] which belongs to the cache test_cache of size 123 [ 64.479614] The buggy address is located 0 bytes inside of [ 64.479614] freed 123-byte region [cc23a240, cc23a2bb) [ 64.490356] [ 64.491882] The buggy address belongs to the physical page: [ 64.497467] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23a [ 64.504760] flags: 0x0(zone=0) [ 64.507843] page_type: f5(slab) [ 64.511016] raw: 00000000 cc22f800 00000122 00000000 00000000 80150015 f5000000 00000000 [ 64.519134] raw: 00000000 [ 64.521789] page dumped because: kasan: bad access detected [ 64.527404] [ 64.528900] Memory state around the buggy address: [ 64.533721] cc23a100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.540283] cc23a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.546874] >cc23a200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 64.553436] ^ [ 64.558074] cc23a280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.564666] cc23a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.571228] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 62.782592] ================================================================== [ 62.793579] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 62.801208] Read of size 1 at addr cc22d373 by task kunit_try_catch/277 [ 62.807891] [ 62.809387] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 62.809448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 62.809448] Hardware name: Generic DRA74X (Flattened Device Tree) [ 62.809448] Call trace: [ 62.809478] unwind_backtrace from show_stack+0x18/0x1c [ 62.809509] show_stack from dump_stack_lvl+0x70/0x90 [ 62.809539] dump_stack_lvl from print_report+0x158/0x528 [ 62.809570] print_report from kasan_report+0xdc/0x118 [ 62.809600] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 62.809631] mempool_oob_right_helper from mempool_kmalloc_oob_right+0xbc/0x108 [ 62.809661] mempool_kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 62.809692] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.809722] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 62.809783] kthread from ret_from_fork+0x14/0x20 [ 62.809814] Exception stack(0xf25b3fb0 to 0xf25b3ff8) [ 62.809814] 3fa0: 00000000 00000000 00000000 00000000 [ 62.809844] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 62.809875] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 62.809875] [ 62.923431] Allocated by task 277: [ 62.926849] kasan_save_track+0x30/0x5c [ 62.930725] remove_element+0x180/0x264 [ 62.934600] mempool_alloc_preallocated+0x60/0x9c [ 62.939331] mempool_oob_right_helper+0x94/0x334 [ 62.944000] mempool_kmalloc_oob_right+0xbc/0x108 [ 62.948730] kunit_try_run_case+0x22c/0x5a8 [ 62.952941] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.958465] kthread+0x464/0x810 [ 62.961730] ret_from_fork+0x14/0x20 [ 62.965332] [ 62.966827] The buggy address belongs to the object at cc22d300 [ 62.966827] which belongs to the cache kmalloc-128 of size 128 [ 62.978729] The buggy address is located 0 bytes to the right of [ 62.978729] allocated 115-byte region [cc22d300, cc22d373) [ 62.990386] [ 62.991882] The buggy address belongs to the physical page: [ 62.997497] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22d [ 63.004760] flags: 0x0(zone=0) [ 63.007843] page_type: f5(slab) [ 63.011016] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 63.019165] raw: 00000000 [ 63.021820] page dumped because: kasan: bad access detected [ 63.027404] [ 63.028900] Memory state around the buggy address: [ 63.033752] cc22d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.040313] cc22d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.046874] >cc22d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 63.053466] ^ [ 63.059661] cc22d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.066253] cc22d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 63.072814] ================================================================== [ 63.081176] ================================================================== [ 63.092987] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 63.100616] Read of size 1 at addr ccc0e001 by task kunit_try_catch/279 [ 63.107299] [ 63.108795] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 63.108825] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.108825] Hardware name: Generic DRA74X (Flattened Device Tree) [ 63.108856] Call trace: [ 63.108856] unwind_backtrace from show_stack+0x18/0x1c [ 63.108886] show_stack from dump_stack_lvl+0x70/0x90 [ 63.108917] dump_stack_lvl from print_report+0x158/0x528 [ 63.108917] print_report from kasan_report+0xdc/0x118 [ 63.108947] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 63.108978] mempool_oob_right_helper from mempool_kmalloc_large_oob_right+0xbc/0x108 [ 63.109008] mempool_kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 63.109039] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.109069] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 63.109069] kthread from ret_from_fork+0x14/0x20 [ 63.109100] Exception stack(0xf25bbfb0 to 0xf25bbff8) [ 63.109130] bfa0: 00000000 00000000 00000000 00000000 [ 63.109130] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 63.109161] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 63.109161] [ 63.223724] The buggy address belongs to the physical page: [ 63.229339] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c [ 63.236602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.244323] flags: 0x40(head|zone=0) [ 63.247924] page_type: f8(unknown) [ 63.251373] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 63.259521] raw: 00000000 [ 63.262145] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 63.270385] head: 00000000 00000002 eebca1b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 63.278625] head: 00000000 00000004 [ 63.282135] page dumped because: kasan: bad access detected [ 63.287750] [ 63.289245] Memory state around the buggy address: [ 63.294067] ccc0df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.300628] ccc0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.307220] >ccc0e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 63.313781] ^ [ 63.316345] ccc0e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 63.322906] ccc0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 63.329467] ================================================================== [ 63.338226] ================================================================== [ 63.350585] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 63.358215] Read of size 1 at addr cc2382bb by task kunit_try_catch/281 [ 63.364868] [ 63.366363] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 63.366394] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.366424] Hardware name: Generic DRA74X (Flattened Device Tree) [ 63.366424] Call trace: [ 63.366424] unwind_backtrace from show_stack+0x18/0x1c [ 63.366455] show_stack from dump_stack_lvl+0x70/0x90 [ 63.366485] dump_stack_lvl from print_report+0x158/0x528 [ 63.366516] print_report from kasan_report+0xdc/0x118 [ 63.366516] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 63.366546] mempool_oob_right_helper from mempool_slab_oob_right+0xb8/0x100 [ 63.366577] mempool_slab_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 63.366607] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.366638] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 63.366668] kthread from ret_from_fork+0x14/0x20 [ 63.366668] Exception stack(0xf25c3fb0 to 0xf25c3ff8) [ 63.366699] 3fa0: 00000000 00000000 00000000 00000000 [ 63.366699] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 63.366729] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 63.366729] [ 63.479736] Allocated by task 281: [ 63.483154] kasan_save_track+0x30/0x5c [ 63.487030] __kasan_mempool_unpoison_object+0xec/0x14c [ 63.492309] remove_element+0x1d4/0x264 [ 63.496154] mempool_alloc_preallocated+0x60/0x9c [ 63.500915] mempool_oob_right_helper+0x94/0x334 [ 63.505554] mempool_slab_oob_right+0xb8/0x100 [ 63.510040] kunit_try_run_case+0x22c/0x5a8 [ 63.514251] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.519805] kthread+0x464/0x810 [ 63.523040] ret_from_fork+0x14/0x20 [ 63.526672] [ 63.528167] The buggy address belongs to the object at cc238240 [ 63.528167] which belongs to the cache test_cache of size 123 [ 63.539978] The buggy address is located 0 bytes to the right of [ 63.539978] allocated 123-byte region [cc238240, cc2382bb) [ 63.551605] [ 63.553100] The buggy address belongs to the physical page: [ 63.558715] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c238 [ 63.566009] flags: 0x0(zone=0) [ 63.569061] page_type: f5(slab) [ 63.572235] raw: 00000000 cc22f700 00000122 00000000 00000000 80150015 f5000000 00000000 [ 63.580383] raw: 00000000 [ 63.583038] page dumped because: kasan: bad access detected [ 63.588623] [ 63.590148] Memory state around the buggy address: [ 63.594970] cc238180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.601531] cc238200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 63.608093] >cc238280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 63.614685] ^ [ 63.619049] cc238300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.625640] cc238380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.632202] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 61.872985] ================================================================== [ 61.884216] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1e8/0x398 [ 61.892059] Read of size 1 at addr cc22f400 by task kunit_try_catch/271 [ 61.898742] [ 61.900238] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 61.900299] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 61.900299] Hardware name: Generic DRA74X (Flattened Device Tree) [ 61.900329] Call trace: [ 61.900329] unwind_backtrace from show_stack+0x18/0x1c [ 61.900390] show_stack from dump_stack_lvl+0x70/0x90 [ 61.900421] dump_stack_lvl from print_report+0x158/0x528 [ 61.900451] print_report from kasan_report+0xdc/0x118 [ 61.900482] kasan_report from __kasan_check_byte+0x34/0x3c [ 61.900512] __kasan_check_byte from kmem_cache_destroy+0x24/0x1ec [ 61.900543] kmem_cache_destroy from kmem_cache_double_destroy+0x1e8/0x398 [ 61.900604] kmem_cache_double_destroy from kunit_try_run_case+0x22c/0x5a8 [ 61.900634] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.900665] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 61.900726] kthread from ret_from_fork+0x14/0x20 [ 61.900756] Exception stack(0xf258bfb0 to 0xf258bff8) [ 61.900756] bfa0: 00000000 00000000 00000000 00000000 [ 61.900787] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 61.900817] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 61.900848] [ 62.019500] Allocated by task 271: [ 62.022918] kasan_save_track+0x30/0x5c [ 62.026794] __kasan_slab_alloc+0x60/0x68 [ 62.030822] kmem_cache_alloc_noprof+0x17c/0x36c [ 62.035491] __kmem_cache_create_args+0x1c0/0x2c0 [ 62.040222] kmem_cache_double_destroy+0xc0/0x398 [ 62.044982] kunit_try_run_case+0x22c/0x5a8 [ 62.049194] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.054718] kthread+0x464/0x810 [ 62.057983] ret_from_fork+0x14/0x20 [ 62.061584] [ 62.063079] Freed by task 271: [ 62.066162] kasan_save_track+0x30/0x5c [ 62.070037] kasan_save_free_info+0x3c/0x48 [ 62.074249] __kasan_slab_free+0x40/0x50 [ 62.078186] kmem_cache_free+0x100/0x470 [ 62.082153] kobject_put+0x21c/0x678 [ 62.085754] kmem_cache_double_destroy+0x168/0x398 [ 62.090576] kunit_try_run_case+0x22c/0x5a8 [ 62.094818] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.100341] kthread+0x464/0x810 [ 62.103607] ret_from_fork+0x14/0x20 [ 62.107208] [ 62.108703] The buggy address belongs to the object at cc22f400 [ 62.108703] which belongs to the cache kmem_cache of size 132 [ 62.120513] The buggy address is located 0 bytes inside of [ 62.120513] freed 132-byte region [cc22f400, cc22f484) [ 62.131286] [ 62.132781] The buggy address belongs to the physical page: [ 62.138397] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22f [ 62.145660] flags: 0x0(zone=0) [ 62.148742] page_type: f5(slab) [ 62.151916] raw: 00000000 c7001000 00000122 00000000 00000000 80100010 f5000000 00000000 [ 62.160064] raw: 00000000 [ 62.162689] page dumped because: kasan: bad access detected [ 62.168304] [ 62.169799] Memory state around the buggy address: [ 62.174621] cc22f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.181213] cc22f380: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.187774] >cc22f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.194335] ^ [ 62.196899] cc22f480: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.203460] cc22f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.210052] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 61.430297] ================================================================== [ 61.441955] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x430/0x550 [ 61.449188] Read of size 1 at addr cc235000 by task kunit_try_catch/269 [ 61.455841] [ 61.457366] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 61.457397] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 61.457427] Hardware name: Generic DRA74X (Flattened Device Tree) [ 61.457427] Call trace: [ 61.457458] unwind_backtrace from show_stack+0x18/0x1c [ 61.457489] show_stack from dump_stack_lvl+0x70/0x90 [ 61.457519] dump_stack_lvl from print_report+0x158/0x528 [ 61.457580] print_report from kasan_report+0xdc/0x118 [ 61.457611] kasan_report from kmem_cache_rcu_uaf+0x430/0x550 [ 61.457641] kmem_cache_rcu_uaf from kunit_try_run_case+0x22c/0x5a8 [ 61.457672] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.457733] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 61.457763] kthread from ret_from_fork+0x14/0x20 [ 61.457794] Exception stack(0xf257bfb0 to 0xf257bff8) [ 61.457824] bfa0: 00000000 00000000 00000000 00000000 [ 61.457824] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 61.457855] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 61.457885] [ 61.562988] Allocated by task 269: [ 61.566406] kasan_save_track+0x30/0x5c [ 61.570312] __kasan_slab_alloc+0x60/0x68 [ 61.574340] kmem_cache_alloc_noprof+0x17c/0x36c [ 61.579040] kmem_cache_rcu_uaf+0x174/0x550 [ 61.583251] kunit_try_run_case+0x22c/0x5a8 [ 61.587493] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.593017] kthread+0x464/0x810 [ 61.596282] ret_from_fork+0x14/0x20 [ 61.599914] [ 61.601409] Freed by task 22: [ 61.604431] kasan_save_track+0x30/0x5c [ 61.608306] kasan_save_free_info+0x3c/0x48 [ 61.612518] __kasan_slab_free+0x40/0x50 [ 61.616485] slab_free_after_rcu_debug+0xb0/0x290 [ 61.621246] rcu_core+0x84c/0x1aa4 [ 61.624694] handle_softirqs+0x3d8/0xc7c [ 61.628662] run_ksoftirqd+0x7c/0x9c [ 61.632263] smpboot_thread_fn+0x46c/0xa68 [ 61.636413] kthread+0x464/0x810 [ 61.639678] ret_from_fork+0x14/0x20 [ 61.643310] [ 61.644805] Last potentially related work creation: [ 61.649719] kasan_save_stack+0x30/0x4c [ 61.653625] kasan_record_aux_stack+0x80/0x88 [ 61.658020] kmem_cache_free+0x1f0/0x470 [ 61.661987] kmem_cache_rcu_uaf+0x1b8/0x550 [ 61.666198] kunit_try_run_case+0x22c/0x5a8 [ 61.670440] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.675994] kthread+0x464/0x810 [ 61.679260] ret_from_fork+0x14/0x20 [ 61.682861] [ 61.684387] The buggy address belongs to the object at cc235000 [ 61.684387] which belongs to the cache test_cache of size 200 [ 61.696197] The buggy address is located 0 bytes inside of [ 61.696197] freed 200-byte region [cc235000, cc2350c8) [ 61.706970] [ 61.708496] The buggy address belongs to the physical page: [ 61.714111] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c235 [ 61.721405] flags: 0x0(zone=0) [ 61.724487] page_type: f5(slab) [ 61.727661] raw: 00000000 cc22f300 00000122 00000000 00000000 800f000f f5000000 00000000 [ 61.735809] raw: 00000000 [ 61.738464] page dumped because: kasan: bad access detected [ 61.744079] [ 61.745605] Memory state around the buggy address: [ 61.750427] cc234f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.757019] cc234f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.763610] >cc235000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.770172] ^ [ 61.772735] cc235080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 61.779327] cc235100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.785919] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 60.927276] ================================================================== [ 60.938873] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x200/0x4c0 [ 60.945892] Free of addr cc234001 by task kunit_try_catch/267 [ 60.951660] [ 60.953186] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 60.953216] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 60.953216] Hardware name: Generic DRA74X (Flattened Device Tree) [ 60.953216] Call trace: [ 60.953247] unwind_backtrace from show_stack+0x18/0x1c [ 60.953277] show_stack from dump_stack_lvl+0x70/0x90 [ 60.953308] dump_stack_lvl from print_report+0x158/0x528 [ 60.953308] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 60.953338] kasan_report_invalid_free from check_slab_allocation+0xd0/0xd8 [ 60.953369] check_slab_allocation from kmem_cache_free+0x1c0/0x470 [ 60.953399] kmem_cache_free from kmem_cache_invalid_free+0x200/0x4c0 [ 60.953430] kmem_cache_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 60.953460] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.953491] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 60.953491] kthread from ret_from_fork+0x14/0x20 [ 60.953521] Exception stack(0xf256bfb0 to 0xf256bff8) [ 60.953552] bfa0: 00000000 00000000 00000000 00000000 [ 60.953552] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 60.953582] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 60.953582] [ 61.074096] Allocated by task 267: [ 61.077545] kasan_save_track+0x30/0x5c [ 61.081390] __kasan_slab_alloc+0x60/0x68 [ 61.085449] kmem_cache_alloc_noprof+0x17c/0x36c [ 61.090087] kmem_cache_invalid_free+0x16c/0x4c0 [ 61.094757] kunit_try_run_case+0x22c/0x5a8 [ 61.098968] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.104492] kthread+0x464/0x810 [ 61.107757] ret_from_fork+0x14/0x20 [ 61.111358] [ 61.112854] The buggy address belongs to the object at cc234000 [ 61.112854] which belongs to the cache test_cache of size 200 [ 61.124694] The buggy address is located 1 bytes inside of [ 61.124694] 200-byte region [cc234000, cc2340c8) [ 61.134918] [ 61.136413] The buggy address belongs to the physical page: [ 61.142028] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c234 [ 61.149291] flags: 0x0(zone=0) [ 61.152374] page_type: f5(slab) [ 61.155548] raw: 00000000 cc22f200 00000122 00000000 00000000 800f000f f5000000 00000000 [ 61.163696] raw: 00000000 [ 61.166351] page dumped because: kasan: bad access detected [ 61.171936] [ 61.173461] Memory state around the buggy address: [ 61.178283] cc233f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.184844] cc233f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.191406] >cc234000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.197998] ^ [ 61.200531] cc234080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 61.207122] cc234100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.213684] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 60.587066] ================================================================== [ 60.597961] BUG: KASAN: double-free in kmem_cache_double_free+0x208/0x4bc [ 60.604827] Free of addr cc232000 by task kunit_try_catch/265 [ 60.610626] [ 60.612152] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 60.612182] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 60.612213] Hardware name: Generic DRA74X (Flattened Device Tree) [ 60.612213] Call trace: [ 60.612213] unwind_backtrace from show_stack+0x18/0x1c [ 60.612274] show_stack from dump_stack_lvl+0x70/0x90 [ 60.612304] dump_stack_lvl from print_report+0x158/0x528 [ 60.612335] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 60.612396] kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8 [ 60.612426] check_slab_allocation from kmem_cache_free+0xe0/0x470 [ 60.612457] kmem_cache_free from kmem_cache_double_free+0x208/0x4bc [ 60.612487] kmem_cache_double_free from kunit_try_run_case+0x22c/0x5a8 [ 60.612548] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.612579] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 60.612609] kthread from ret_from_fork+0x14/0x20 [ 60.612640] Exception stack(0xf255bfb0 to 0xf255bff8) [ 60.612670] bfa0: 00000000 00000000 00000000 00000000 [ 60.612701] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 60.612731] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 60.612731] [ 60.733032] Allocated by task 265: [ 60.736450] kasan_save_track+0x30/0x5c [ 60.740325] __kasan_slab_alloc+0x60/0x68 [ 60.744354] kmem_cache_alloc_noprof+0x17c/0x36c [ 60.749023] kmem_cache_double_free+0x16c/0x4bc [ 60.753601] kunit_try_run_case+0x22c/0x5a8 [ 60.757812] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.763336] kthread+0x464/0x810 [ 60.766601] ret_from_fork+0x14/0x20 [ 60.770202] [ 60.771697] Freed by task 265: [ 60.774780] kasan_save_track+0x30/0x5c [ 60.778656] kasan_save_free_info+0x3c/0x48 [ 60.782867] __kasan_slab_free+0x40/0x50 [ 60.786834] kmem_cache_free+0x100/0x470 [ 60.790771] kmem_cache_double_free+0x184/0x4bc [ 60.795349] kunit_try_run_case+0x22c/0x5a8 [ 60.799560] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.805084] kthread+0x464/0x810 [ 60.808349] ret_from_fork+0x14/0x20 [ 60.811950] [ 60.813446] The buggy address belongs to the object at cc232000 [ 60.813446] which belongs to the cache test_cache of size 200 [ 60.825256] The buggy address is located 0 bytes inside of [ 60.825256] 200-byte region [cc232000, cc2320c8) [ 60.835510] [ 60.837005] The buggy address belongs to the physical page: [ 60.842620] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c232 [ 60.849884] flags: 0x0(zone=0) [ 60.852966] page_type: f5(slab) [ 60.856140] raw: 00000000 cc22f100 00000122 00000000 00000000 800f000f f5000000 00000000 [ 60.864288] raw: 00000000 [ 60.866943] page dumped because: kasan: bad access detected [ 60.872528] [ 60.874053] Memory state around the buggy address: [ 60.878875] cc231f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.885437] cc231f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.891998] >cc232000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.898590] ^ [ 60.901123] cc232080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 60.907714] cc232100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.914276] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 60.273284] ================================================================== [ 60.284179] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x3e0/0x524 [ 60.290924] Read of size 1 at addr cc2310c8 by task kunit_try_catch/263 [ 60.297576] [ 60.299102] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 60.299133] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 60.299133] Hardware name: Generic DRA74X (Flattened Device Tree) [ 60.299133] Call trace: [ 60.299163] unwind_backtrace from show_stack+0x18/0x1c [ 60.299163] show_stack from dump_stack_lvl+0x70/0x90 [ 60.299194] dump_stack_lvl from print_report+0x158/0x528 [ 60.299224] print_report from kasan_report+0xdc/0x118 [ 60.299255] kasan_report from kmem_cache_oob+0x3e0/0x524 [ 60.299285] kmem_cache_oob from kunit_try_run_case+0x22c/0x5a8 [ 60.299285] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.299316] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 60.299346] kthread from ret_from_fork+0x14/0x20 [ 60.299377] Exception stack(0xf254bfb0 to 0xf254bff8) [ 60.299377] bfa0: 00000000 00000000 00000000 00000000 [ 60.299407] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 60.299407] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 60.299438] [ 60.403778] Allocated by task 263: [ 60.407226] kasan_save_track+0x30/0x5c [ 60.411071] __kasan_slab_alloc+0x60/0x68 [ 60.415130] kmem_cache_alloc_noprof+0x17c/0x36c [ 60.419769] kmem_cache_oob+0x170/0x524 [ 60.423645] kunit_try_run_case+0x22c/0x5a8 [ 60.427856] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.433410] kthread+0x464/0x810 [ 60.436645] ret_from_fork+0x14/0x20 [ 60.440246] [ 60.441772] The buggy address belongs to the object at cc231000 [ 60.441772] which belongs to the cache test_cache of size 200 [ 60.453582] The buggy address is located 0 bytes to the right of [ 60.453582] allocated 200-byte region [cc231000, cc2310c8) [ 60.465209] [ 60.466735] The buggy address belongs to the physical page: [ 60.472320] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c231 [ 60.479614] flags: 0x0(zone=0) [ 60.482666] page_type: f5(slab) [ 60.485839] raw: 00000000 cc22f000 00000122 00000000 00000000 800f000f f5000000 00000000 [ 60.493988] raw: 00000000 [ 60.496643] page dumped because: kasan: bad access detected [ 60.502258] [ 60.503753] Memory state around the buggy address: [ 60.508575] cc230f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.515136] cc231000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 60.521697] >cc231080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 60.528289] ^ [ 60.533203] cc231100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.539764] cc231180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.546325] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 59.915161] ================================================================== [ 59.925415] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x580/0x5b8 [ 59.932159] Read of size 4 at addr cc22cc00 by task kunit_try_catch/256 [ 59.938842] [ 59.940338] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 59.940368] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 59.940368] Hardware name: Generic DRA74X (Flattened Device Tree) [ 59.940399] Call trace: [ 59.940399] unwind_backtrace from show_stack+0x18/0x1c [ 59.940429] show_stack from dump_stack_lvl+0x70/0x90 [ 59.940460] dump_stack_lvl from print_report+0x158/0x528 [ 59.940460] print_report from kasan_report+0xdc/0x118 [ 59.940490] kasan_report from workqueue_uaf+0x580/0x5b8 [ 59.940521] workqueue_uaf from kunit_try_run_case+0x22c/0x5a8 [ 59.940551] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.940582] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 59.940582] kthread from ret_from_fork+0x14/0x20 [ 59.940612] Exception stack(0xf2513fb0 to 0xf2513ff8) [ 59.940643] 3fa0: 00000000 00000000 00000000 00000000 [ 59.940643] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 59.940673] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 59.940673] [ 60.044860] Allocated by task 256: [ 60.048278] kasan_save_track+0x30/0x5c [ 60.052154] __kasan_kmalloc+0x8c/0x94 [ 60.055938] workqueue_uaf+0x184/0x5b8 [ 60.059722] kunit_try_run_case+0x22c/0x5a8 [ 60.063934] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.069458] kthread+0x464/0x810 [ 60.072723] ret_from_fork+0x14/0x20 [ 60.076324] [ 60.077819] Freed by task 80: [ 60.080810] kasan_save_track+0x30/0x5c [ 60.084686] kasan_save_free_info+0x3c/0x48 [ 60.088897] __kasan_slab_free+0x40/0x50 [ 60.092864] kfree+0xe8/0x384 [ 60.095855] process_one_work+0x7dc/0x1304 [ 60.099975] worker_thread+0xb98/0x1658 [ 60.103851] kthread+0x464/0x810 [ 60.107116] ret_from_fork+0x14/0x20 [ 60.110717] [ 60.112213] Last potentially related work creation: [ 60.117126] kasan_save_stack+0x30/0x4c [ 60.121002] kasan_record_aux_stack+0x80/0x88 [ 60.125396] __queue_work+0x878/0x1780 [ 60.129150] queue_work_on+0xbc/0xc0 [ 60.132781] workqueue_uaf+0x2e4/0x5b8 [ 60.136535] kunit_try_run_case+0x22c/0x5a8 [ 60.140777] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 60.146301] kthread+0x464/0x810 [ 60.149536] ret_from_fork+0x14/0x20 [ 60.153167] [ 60.154663] The buggy address belongs to the object at cc22cc00 [ 60.154663] which belongs to the cache kmalloc-64 of size 64 [ 60.166381] The buggy address is located 0 bytes inside of [ 60.166381] freed 64-byte region [cc22cc00, cc22cc40) [ 60.177062] [ 60.178558] The buggy address belongs to the physical page: [ 60.184173] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22c [ 60.191436] flags: 0x0(zone=0) [ 60.194519] page_type: f5(slab) [ 60.197692] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 60.205841] raw: 00000000 [ 60.208496] page dumped because: kasan: bad access detected [ 60.214080] [ 60.215576] Memory state around the buggy address: [ 60.220428] cc22cb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.226989] cc22cb80: 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc [ 60.233551] >cc22cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.240142] ^ [ 60.242675] cc22cc80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.249267] cc22cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.255828] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 59.540405] ================================================================== [ 59.550842] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x5c/0x60 [ 59.557617] Read of size 4 at addr cc22c700 by task ksoftirqd/1/22 [ 59.563842] [ 59.565368] CPU: 1 UID: 0 PID: 22 Comm: ksoftirqd/1 Tainted: G B W N 6.15.0-rc3 #1 NONE [ 59.565399] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 59.565429] Hardware name: Generic DRA74X (Flattened Device Tree) [ 59.565429] Call trace: [ 59.565460] unwind_backtrace from show_stack+0x18/0x1c [ 59.565490] show_stack from dump_stack_lvl+0x70/0x90 [ 59.565521] dump_stack_lvl from print_report+0x158/0x528 [ 59.565551] print_report from kasan_report+0xdc/0x118 [ 59.565582] kasan_report from rcu_uaf_reclaim+0x5c/0x60 [ 59.565612] rcu_uaf_reclaim from rcu_core+0x84c/0x1aa4 [ 59.565673] rcu_core from handle_softirqs+0x3d8/0xc7c [ 59.565704] handle_softirqs from run_ksoftirqd+0x7c/0x9c [ 59.565734] run_ksoftirqd from smpboot_thread_fn+0x46c/0xa68 [ 59.565765] smpboot_thread_fn from kthread+0x464/0x810 [ 59.565795] kthread from ret_from_fork+0x14/0x20 [ 59.565826] Exception stack(0xf00c3fb0 to 0xf00c3ff8) [ 59.565856] 3fa0: 00000000 00000000 00000000 00000000 [ 59.565887] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 59.565917] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 59.565917] [ 59.676361] Allocated by task 254: [ 59.679809] kasan_save_track+0x30/0x5c [ 59.683685] __kasan_kmalloc+0x8c/0x94 [ 59.687469] rcu_uaf+0xd0/0x354 [ 59.690673] kunit_try_run_case+0x22c/0x5a8 [ 59.694885] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.700439] kthread+0x464/0x810 [ 59.703704] ret_from_fork+0x14/0x20 [ 59.707305] [ 59.708831] Freed by task 22: [ 59.711822] kasan_save_track+0x30/0x5c [ 59.715698] kasan_save_free_info+0x3c/0x48 [ 59.719940] __kasan_slab_free+0x40/0x50 [ 59.723876] kfree+0xe8/0x384 [ 59.726898] rcu_uaf_reclaim+0x1c/0x60 [ 59.730682] rcu_core+0x84c/0x1aa4 [ 59.734130] handle_softirqs+0x3d8/0xc7c [ 59.738098] run_ksoftirqd+0x7c/0x9c [ 59.741729] smpboot_thread_fn+0x46c/0xa68 [ 59.745849] kthread+0x464/0x810 [ 59.749114] ret_from_fork+0x14/0x20 [ 59.752746] [ 59.754241] Last potentially related work creation: [ 59.759155] kasan_save_stack+0x30/0x4c [ 59.763061] kasan_record_aux_stack+0x80/0x88 [ 59.767456] __call_rcu_common.constprop.0+0x98/0xb80 [ 59.772552] rcu_uaf+0x1a4/0x354 [ 59.775817] kunit_try_run_case+0x22c/0x5a8 [ 59.780059] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.785614] kthread+0x464/0x810 [ 59.788879] ret_from_fork+0x14/0x20 [ 59.792480] [ 59.793975] The buggy address belongs to the object at cc22c700 [ 59.793975] which belongs to the cache kmalloc-64 of size 64 [ 59.805725] The buggy address is located 0 bytes inside of [ 59.805725] freed 64-byte region [cc22c700, cc22c740) [ 59.816406] [ 59.817932] The buggy address belongs to the physical page: [ 59.823547] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22c [ 59.830841] flags: 0x0(zone=0) [ 59.833923] page_type: f5(slab) [ 59.837097] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 59.845275] raw: 00000000 [ 59.847900] page dumped because: kasan: bad access detected [ 59.853515] [ 59.855041] Memory state around the buggy address: [ 59.859863] cc22c600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.866455] cc22c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.873046] >cc22c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.879608] ^ [ 59.882171] cc22c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.888763] cc22c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.895355] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 59.175659] ================================================================== [ 59.182922] BUG: KASAN: slab-use-after-free in ksize_uaf+0x68c/0x740 [ 59.189331] Read of size 1 at addr cc228f78 by task kunit_try_catch/252 [ 59.195983] [ 59.197509] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 59.197540] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 59.197540] Hardware name: Generic DRA74X (Flattened Device Tree) [ 59.197540] Call trace: [ 59.197570] unwind_backtrace from show_stack+0x18/0x1c [ 59.197601] show_stack from dump_stack_lvl+0x70/0x90 [ 59.197601] dump_stack_lvl from print_report+0x158/0x528 [ 59.197631] print_report from kasan_report+0xdc/0x118 [ 59.197662] kasan_report from ksize_uaf+0x68c/0x740 [ 59.197692] ksize_uaf from kunit_try_run_case+0x22c/0x5a8 [ 59.197692] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.197723] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 59.197753] kthread from ret_from_fork+0x14/0x20 [ 59.197784] Exception stack(0xf24fbfb0 to 0xf24fbff8) [ 59.197784] bfa0: 00000000 00000000 00000000 00000000 [ 59.197814] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 59.197814] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 59.197845] [ 59.301300] Allocated by task 252: [ 59.304748] kasan_save_track+0x30/0x5c [ 59.308593] __kasan_kmalloc+0x8c/0x94 [ 59.312377] ksize_uaf+0xd0/0x740 [ 59.315734] kunit_try_run_case+0x22c/0x5a8 [ 59.319946] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.325469] kthread+0x464/0x810 [ 59.328735] ret_from_fork+0x14/0x20 [ 59.332336] [ 59.333831] Freed by task 252: [ 59.336914] kasan_save_track+0x30/0x5c [ 59.340789] kasan_save_free_info+0x3c/0x48 [ 59.345001] __kasan_slab_free+0x40/0x50 [ 59.348937] kfree+0xe8/0x384 [ 59.351959] ksize_uaf+0x174/0x740 [ 59.355377] kunit_try_run_case+0x22c/0x5a8 [ 59.359588] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.365112] kthread+0x464/0x810 [ 59.368377] ret_from_fork+0x14/0x20 [ 59.371978] [ 59.373474] The buggy address belongs to the object at cc228f00 [ 59.373474] which belongs to the cache kmalloc-128 of size 128 [ 59.385375] The buggy address is located 120 bytes inside of [ 59.385375] freed 128-byte region [cc228f00, cc228f80) [ 59.396331] [ 59.397827] The buggy address belongs to the physical page: [ 59.403442] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 59.410705] flags: 0x0(zone=0) [ 59.413787] page_type: f5(slab) [ 59.416961] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 59.425079] raw: 00000000 [ 59.427734] page dumped because: kasan: bad access detected [ 59.433349] [ 59.434844] Memory state around the buggy address: [ 59.439666] cc228e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.446228] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.452819] >cc228f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.459381] ^ [ 59.465850] cc228f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.472442] cc229000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.479003] ================================================================== [ 58.547912] ================================================================== [ 58.559448] BUG: KASAN: slab-use-after-free in ksize_uaf+0x1f0/0x740 [ 58.565856] Read of size 1 at addr cc228f00 by task kunit_try_catch/252 [ 58.572509] [ 58.574035] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 58.574066] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.574066] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.574066] Call trace: [ 58.574066] unwind_backtrace from show_stack+0x18/0x1c [ 58.574096] show_stack from dump_stack_lvl+0x70/0x90 [ 58.574127] dump_stack_lvl from print_report+0x158/0x528 [ 58.574157] print_report from kasan_report+0xdc/0x118 [ 58.574188] kasan_report from __kasan_check_byte+0x34/0x3c [ 58.574188] __kasan_check_byte from ksize+0x20/0x3c [ 58.574218] ksize from ksize_uaf+0x1f0/0x740 [ 58.574249] ksize_uaf from kunit_try_run_case+0x22c/0x5a8 [ 58.574249] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.574279] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.574310] kthread from ret_from_fork+0x14/0x20 [ 58.574340] Exception stack(0xf24fbfb0 to 0xf24fbff8) [ 58.574340] bfa0: 00000000 00000000 00000000 00000000 [ 58.574371] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.574371] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.574401] [ 58.687835] Allocated by task 252: [ 58.691253] kasan_save_track+0x30/0x5c [ 58.695129] __kasan_kmalloc+0x8c/0x94 [ 58.698913] ksize_uaf+0xd0/0x740 [ 58.702270] kunit_try_run_case+0x22c/0x5a8 [ 58.706481] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.712005] kthread+0x464/0x810 [ 58.715270] ret_from_fork+0x14/0x20 [ 58.718872] [ 58.720367] Freed by task 252: [ 58.723449] kasan_save_track+0x30/0x5c [ 58.727294] kasan_save_free_info+0x3c/0x48 [ 58.731536] __kasan_slab_free+0x40/0x50 [ 58.735473] kfree+0xe8/0x384 [ 58.738464] ksize_uaf+0x174/0x740 [ 58.741912] kunit_try_run_case+0x22c/0x5a8 [ 58.746124] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.751647] kthread+0x464/0x810 [ 58.754913] ret_from_fork+0x14/0x20 [ 58.758514] [ 58.760009] The buggy address belongs to the object at cc228f00 [ 58.760009] which belongs to the cache kmalloc-128 of size 128 [ 58.771911] The buggy address is located 0 bytes inside of [ 58.771911] freed 128-byte region [cc228f00, cc228f80) [ 58.782684] [ 58.784179] The buggy address belongs to the physical page: [ 58.789794] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 58.797058] flags: 0x0(zone=0) [ 58.800140] page_type: f5(slab) [ 58.803314] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 58.811462] raw: 00000000 [ 58.814086] page dumped because: kasan: bad access detected [ 58.819702] [ 58.821197] Memory state around the buggy address: [ 58.826019] cc228e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.832611] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.839172] >cc228f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.845733] ^ [ 58.848297] cc228f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.854858] cc229000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.861450] ================================================================== [ 58.869079] ================================================================== [ 58.876373] BUG: KASAN: slab-use-after-free in ksize_uaf+0x6c8/0x740 [ 58.882751] Read of size 1 at addr cc228f00 by task kunit_try_catch/252 [ 58.889434] [ 58.890930] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 58.890960] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.890960] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.890991] Call trace: [ 58.890991] unwind_backtrace from show_stack+0x18/0x1c [ 58.891021] show_stack from dump_stack_lvl+0x70/0x90 [ 58.891021] dump_stack_lvl from print_report+0x158/0x528 [ 58.891052] print_report from kasan_report+0xdc/0x118 [ 58.891082] kasan_report from ksize_uaf+0x6c8/0x740 [ 58.891113] ksize_uaf from kunit_try_run_case+0x22c/0x5a8 [ 58.891113] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.891143] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.891174] kthread from ret_from_fork+0x14/0x20 [ 58.891204] Exception stack(0xf24fbfb0 to 0xf24fbff8) [ 58.891204] bfa0: 00000000 00000000 00000000 00000000 [ 58.891235] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.891235] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.891265] [ 58.994720] Allocated by task 252: [ 58.998168] kasan_save_track+0x30/0x5c [ 59.002014] __kasan_kmalloc+0x8c/0x94 [ 59.005828] ksize_uaf+0xd0/0x740 [ 59.009155] kunit_try_run_case+0x22c/0x5a8 [ 59.013366] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.018890] kthread+0x464/0x810 [ 59.022155] ret_from_fork+0x14/0x20 [ 59.025756] [ 59.027252] Freed by task 252: [ 59.030334] kasan_save_track+0x30/0x5c [ 59.034210] kasan_save_free_info+0x3c/0x48 [ 59.038421] __kasan_slab_free+0x40/0x50 [ 59.042358] kfree+0xe8/0x384 [ 59.045379] ksize_uaf+0x174/0x740 [ 59.048797] kunit_try_run_case+0x22c/0x5a8 [ 59.053009] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.058532] kthread+0x464/0x810 [ 59.061798] ret_from_fork+0x14/0x20 [ 59.065399] [ 59.066894] The buggy address belongs to the object at cc228f00 [ 59.066894] which belongs to the cache kmalloc-128 of size 128 [ 59.078796] The buggy address is located 0 bytes inside of [ 59.078796] freed 128-byte region [cc228f00, cc228f80) [ 59.089569] [ 59.091064] The buggy address belongs to the physical page: [ 59.096679] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 59.103973] flags: 0x0(zone=0) [ 59.107025] page_type: f5(slab) [ 59.110198] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 59.118347] raw: 00000000 [ 59.121002] page dumped because: kasan: bad access detected [ 59.126586] [ 59.128112] Memory state around the buggy address: [ 59.132934] cc228e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.139495] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.146057] >cc228f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.152648] ^ [ 59.155181] cc228f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.161773] cc229000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.168334] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 57.994628] ================================================================== [ 58.001892] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f0/0x908 [ 58.009338] Read of size 1 at addr cc228e78 by task kunit_try_catch/250 [ 58.016021] [ 58.017517] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 58.017547] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.017547] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.017578] Call trace: [ 58.017578] unwind_backtrace from show_stack+0x18/0x1c [ 58.017608] show_stack from dump_stack_lvl+0x70/0x90 [ 58.017608] dump_stack_lvl from print_report+0x158/0x528 [ 58.017639] print_report from kasan_report+0xdc/0x118 [ 58.017669] kasan_report from ksize_unpoisons_memory+0x7f0/0x908 [ 58.017700] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 58.017730] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.017730] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.017761] kthread from ret_from_fork+0x14/0x20 [ 58.017791] Exception stack(0xf24ebfb0 to 0xf24ebff8) [ 58.017791] bfa0: 00000000 00000000 00000000 00000000 [ 58.017822] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.017852] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.017852] [ 58.123596] Allocated by task 250: [ 58.127014] kasan_save_track+0x30/0x5c [ 58.130889] __kasan_kmalloc+0x8c/0x94 [ 58.134674] ksize_unpoisons_memory+0xe8/0x908 [ 58.139160] kunit_try_run_case+0x22c/0x5a8 [ 58.143371] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.148895] kthread+0x464/0x810 [ 58.152160] ret_from_fork+0x14/0x20 [ 58.155761] [ 58.157257] The buggy address belongs to the object at cc228e00 [ 58.157257] which belongs to the cache kmalloc-128 of size 128 [ 58.169158] The buggy address is located 5 bytes to the right of [ 58.169158] allocated 115-byte region [cc228e00, cc228e73) [ 58.180816] [ 58.182312] The buggy address belongs to the physical page: [ 58.187927] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 58.195190] flags: 0x0(zone=0) [ 58.198272] page_type: f5(slab) [ 58.201446] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 58.209594] raw: 00000000 [ 58.212219] page dumped because: kasan: bad access detected [ 58.217834] [ 58.219329] Memory state around the buggy address: [ 58.224151] cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.230712] cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.237304] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 58.243865] ^ [ 58.250366] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.256927] cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.263488] ================================================================== [ 57.713684] ================================================================== [ 57.725158] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f8/0x908 [ 57.732604] Read of size 1 at addr cc228e73 by task kunit_try_catch/250 [ 57.739288] [ 57.740783] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 57.740814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 57.740814] Hardware name: Generic DRA74X (Flattened Device Tree) [ 57.740844] Call trace: [ 57.740844] unwind_backtrace from show_stack+0x18/0x1c [ 57.740875] show_stack from dump_stack_lvl+0x70/0x90 [ 57.740905] dump_stack_lvl from print_report+0x158/0x528 [ 57.740905] print_report from kasan_report+0xdc/0x118 [ 57.740936] kasan_report from ksize_unpoisons_memory+0x7f8/0x908 [ 57.740966] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 57.740997] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.741027] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 57.741027] kthread from ret_from_fork+0x14/0x20 [ 57.741058] Exception stack(0xf24ebfb0 to 0xf24ebff8) [ 57.741088] bfa0: 00000000 00000000 00000000 00000000 [ 57.741088] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 57.741119] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 57.741119] [ 57.846862] Allocated by task 250: [ 57.850280] kasan_save_track+0x30/0x5c [ 57.854156] __kasan_kmalloc+0x8c/0x94 [ 57.857940] ksize_unpoisons_memory+0xe8/0x908 [ 57.862426] kunit_try_run_case+0x22c/0x5a8 [ 57.866638] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.872161] kthread+0x464/0x810 [ 57.875427] ret_from_fork+0x14/0x20 [ 57.879028] [ 57.880523] The buggy address belongs to the object at cc228e00 [ 57.880523] which belongs to the cache kmalloc-128 of size 128 [ 57.892425] The buggy address is located 0 bytes to the right of [ 57.892425] allocated 115-byte region [cc228e00, cc228e73) [ 57.904083] [ 57.905578] The buggy address belongs to the physical page: [ 57.911193] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 57.918457] flags: 0x0(zone=0) [ 57.921539] page_type: f5(slab) [ 57.924713] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 57.932861] raw: 00000000 [ 57.935485] page dumped because: kasan: bad access detected [ 57.941101] [ 57.942596] Memory state around the buggy address: [ 57.947418] cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.953979] cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.960571] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 57.967132] ^ [ 57.973358] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.979919] cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.986511] ================================================================== [ 58.270843] ================================================================== [ 58.278106] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x858/0x908 [ 58.285552] Read of size 1 at addr cc228e7f by task kunit_try_catch/250 [ 58.292205] [ 58.293731] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 58.293762] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.293762] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.293762] Call trace: [ 58.293792] unwind_backtrace from show_stack+0x18/0x1c [ 58.293792] show_stack from dump_stack_lvl+0x70/0x90 [ 58.293823] dump_stack_lvl from print_report+0x158/0x528 [ 58.293853] print_report from kasan_report+0xdc/0x118 [ 58.293884] kasan_report from ksize_unpoisons_memory+0x858/0x908 [ 58.293884] ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8 [ 58.293914] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.293945] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.293975] kthread from ret_from_fork+0x14/0x20 [ 58.294006] Exception stack(0xf24ebfb0 to 0xf24ebff8) [ 58.294006] bfa0: 00000000 00000000 00000000 00000000 [ 58.294036] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.294036] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.294067] [ 58.399810] Allocated by task 250: [ 58.403228] kasan_save_track+0x30/0x5c [ 58.407104] __kasan_kmalloc+0x8c/0x94 [ 58.410888] ksize_unpoisons_memory+0xe8/0x908 [ 58.415374] kunit_try_run_case+0x22c/0x5a8 [ 58.419586] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.425109] kthread+0x464/0x810 [ 58.428375] ret_from_fork+0x14/0x20 [ 58.431976] [ 58.433471] The buggy address belongs to the object at cc228e00 [ 58.433471] which belongs to the cache kmalloc-128 of size 128 [ 58.445373] The buggy address is located 12 bytes to the right of [ 58.445373] allocated 115-byte region [cc228e00, cc228e73) [ 58.457092] [ 58.458587] The buggy address belongs to the physical page: [ 58.464202] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 58.471466] flags: 0x0(zone=0) [ 58.474548] page_type: f5(slab) [ 58.477722] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 58.485870] raw: 00000000 [ 58.488494] page dumped because: kasan: bad access detected [ 58.494110] [ 58.495605] Memory state around the buggy address: [ 58.500427] cc228d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.507019] cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.513580] >cc228e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 58.520141] ^ [ 58.526641] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.533203] cc228f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.539764] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-kmalloc_double_kzfree
[ 57.390624] ================================================================== [ 57.397918] BUG: KASAN: double-free in kmalloc_double_kzfree+0x1f4/0x3a8 [ 57.404663] Free of addr cc22c380 by task kunit_try_catch/248 [ 57.410461] [ 57.411956] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 57.411987] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 57.411987] Hardware name: Generic DRA74X (Flattened Device Tree) [ 57.411987] Call trace: [ 57.412017] unwind_backtrace from show_stack+0x18/0x1c [ 57.412048] show_stack from dump_stack_lvl+0x70/0x90 [ 57.412048] dump_stack_lvl from print_report+0x158/0x528 [ 57.412078] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 57.412109] kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8 [ 57.412139] check_slab_allocation from kfree+0xc8/0x384 [ 57.412170] kfree from kmalloc_double_kzfree+0x1f4/0x3a8 [ 57.412200] kmalloc_double_kzfree from kunit_try_run_case+0x22c/0x5a8 [ 57.412200] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.412231] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 57.412261] kthread from ret_from_fork+0x14/0x20 [ 57.412292] Exception stack(0xf24dbfb0 to 0xf24dbff8) [ 57.412292] bfa0: 00000000 00000000 00000000 00000000 [ 57.412322] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 57.412322] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 57.412353] [ 57.530670] Allocated by task 248: [ 57.534088] kasan_save_track+0x30/0x5c [ 57.537963] __kasan_kmalloc+0x8c/0x94 [ 57.541748] kmalloc_double_kzfree+0xcc/0x3a8 [ 57.546142] kunit_try_run_case+0x22c/0x5a8 [ 57.550354] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.555877] kthread+0x464/0x810 [ 57.559143] ret_from_fork+0x14/0x20 [ 57.562744] [ 57.564239] Freed by task 248: [ 57.567321] kasan_save_track+0x30/0x5c [ 57.571197] kasan_save_free_info+0x3c/0x48 [ 57.575408] __kasan_slab_free+0x40/0x50 [ 57.579345] kfree+0xe8/0x384 [ 57.582366] kmalloc_double_kzfree+0x174/0x3a8 [ 57.586822] kunit_try_run_case+0x22c/0x5a8 [ 57.591033] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.596588] kthread+0x464/0x810 [ 57.599822] ret_from_fork+0x14/0x20 [ 57.603424] [ 57.604949] The buggy address belongs to the object at cc22c380 [ 57.604949] which belongs to the cache kmalloc-64 of size 64 [ 57.616668] The buggy address is located 0 bytes inside of [ 57.616668] 64-byte region [cc22c380, cc22c3c0) [ 57.626831] [ 57.628326] The buggy address belongs to the physical page: [ 57.633941] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22c [ 57.641204] flags: 0x0(zone=0) [ 57.644287] page_type: f5(slab) [ 57.647430] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 57.655578] raw: 00000000 [ 57.658233] page dumped because: kasan: bad access detected [ 57.663818] [ 57.665344] Memory state around the buggy address: [ 57.670166] cc22c280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.676727] cc22c300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.683288] >cc22c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.689880] ^ [ 57.692413] cc22c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.699005] cc22c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.705566] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 57.059814] ================================================================== [ 57.074340] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x1f4/0x3a8 [ 57.081787] Read of size 1 at addr cc22c380 by task kunit_try_catch/248 [ 57.088439] [ 57.089935] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 57.089965] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 57.089996] Hardware name: Generic DRA74X (Flattened Device Tree) [ 57.089996] Call trace: [ 57.089996] unwind_backtrace from show_stack+0x18/0x1c [ 57.090026] show_stack from dump_stack_lvl+0x70/0x90 [ 57.090057] dump_stack_lvl from print_report+0x158/0x528 [ 57.090087] print_report from kasan_report+0xdc/0x118 [ 57.090087] kasan_report from __kasan_check_byte+0x34/0x3c [ 57.090118] __kasan_check_byte from kfree_sensitive+0x20/0x6c [ 57.090148] kfree_sensitive from kmalloc_double_kzfree+0x1f4/0x3a8 [ 57.090179] kmalloc_double_kzfree from kunit_try_run_case+0x22c/0x5a8 [ 57.090209] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.090209] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 57.090240] kthread from ret_from_fork+0x14/0x20 [ 57.090270] Exception stack(0xf24dbfb0 to 0xf24dbff8) [ 57.090270] bfa0: 00000000 00000000 00000000 00000000 [ 57.090301] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 57.090332] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 57.090332] [ 57.207611] Allocated by task 248: [ 57.211029] kasan_save_track+0x30/0x5c [ 57.214904] __kasan_kmalloc+0x8c/0x94 [ 57.218688] kmalloc_double_kzfree+0xcc/0x3a8 [ 57.223083] kunit_try_run_case+0x22c/0x5a8 [ 57.227294] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.232818] kthread+0x464/0x810 [ 57.236083] ret_from_fork+0x14/0x20 [ 57.239685] [ 57.241180] Freed by task 248: [ 57.244262] kasan_save_track+0x30/0x5c [ 57.248138] kasan_save_free_info+0x3c/0x48 [ 57.252349] __kasan_slab_free+0x40/0x50 [ 57.256317] kfree+0xe8/0x384 [ 57.259307] kmalloc_double_kzfree+0x174/0x3a8 [ 57.263793] kunit_try_run_case+0x22c/0x5a8 [ 57.268005] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 57.273529] kthread+0x464/0x810 [ 57.276794] ret_from_fork+0x14/0x20 [ 57.280395] [ 57.281890] The buggy address belongs to the object at cc22c380 [ 57.281890] which belongs to the cache kmalloc-64 of size 64 [ 57.293609] The buggy address is located 0 bytes inside of [ 57.293609] freed 64-byte region [cc22c380, cc22c3c0) [ 57.304290] [ 57.305786] The buggy address belongs to the physical page: [ 57.311401] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22c [ 57.318664] flags: 0x0(zone=0) [ 57.321746] page_type: f5(slab) [ 57.324920] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 57.333068] raw: 00000000 [ 57.335693] page dumped because: kasan: bad access detected [ 57.341308] [ 57.342803] Memory state around the buggy address: [ 57.347625] cc22c280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.354217] cc22c300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.360778] >cc22c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.367340] ^ [ 57.369903] cc22c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.376464] cc22c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.383056] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 56.741607] ================================================================== [ 56.752838] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4d0/0x550 [ 56.759490] Read of size 1 at addr cc22c0a8 by task kunit_try_catch/244 [ 56.766143] [ 56.767669] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 56.767700] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 56.767700] Hardware name: Generic DRA74X (Flattened Device Tree) [ 56.767700] Call trace: [ 56.767730] unwind_backtrace from show_stack+0x18/0x1c [ 56.767761] show_stack from dump_stack_lvl+0x70/0x90 [ 56.767761] dump_stack_lvl from print_report+0x158/0x528 [ 56.767791] print_report from kasan_report+0xdc/0x118 [ 56.767822] kasan_report from kmalloc_uaf2+0x4d0/0x550 [ 56.767852] kmalloc_uaf2 from kunit_try_run_case+0x22c/0x5a8 [ 56.767852] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.767883] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 56.767913] kthread from ret_from_fork+0x14/0x20 [ 56.767944] Exception stack(0xf24bbfb0 to 0xf24bbff8) [ 56.767944] bfa0: 00000000 00000000 00000000 00000000 [ 56.767974] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 56.767974] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 56.768005] [ 56.872009] Allocated by task 244: [ 56.875427] kasan_save_track+0x30/0x5c [ 56.879302] __kasan_kmalloc+0x8c/0x94 [ 56.883087] kmalloc_uaf2+0xd8/0x550 [ 56.886688] kunit_try_run_case+0x22c/0x5a8 [ 56.890899] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.896423] kthread+0x464/0x810 [ 56.899688] ret_from_fork+0x14/0x20 [ 56.903289] [ 56.904785] Freed by task 244: [ 56.907867] kasan_save_track+0x30/0x5c [ 56.911743] kasan_save_free_info+0x3c/0x48 [ 56.915954] __kasan_slab_free+0x40/0x50 [ 56.919891] kfree+0xe8/0x384 [ 56.922912] kmalloc_uaf2+0x184/0x550 [ 56.926605] kunit_try_run_case+0x22c/0x5a8 [ 56.930816] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.936340] kthread+0x464/0x810 [ 56.939605] ret_from_fork+0x14/0x20 [ 56.943206] [ 56.944702] The buggy address belongs to the object at cc22c080 [ 56.944702] which belongs to the cache kmalloc-64 of size 64 [ 56.956420] The buggy address is located 40 bytes inside of [ 56.956420] freed 64-byte region [cc22c080, cc22c0c0) [ 56.967193] [ 56.968688] The buggy address belongs to the physical page: [ 56.974304] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22c [ 56.981567] flags: 0x0(zone=0) [ 56.984649] page_type: f5(slab) [ 56.987823] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 56.995971] raw: 00000000 [ 56.998596] page dumped because: kasan: bad access detected [ 57.004211] [ 57.005706] Memory state around the buggy address: [ 57.010528] cc22bf80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.017120] cc22c000: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.023681] >cc22c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.030242] ^ [ 57.034118] cc22c100: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 57.040679] cc22c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.047271] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 56.415374] ================================================================== [ 56.425994] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1fc/0x3b0 [ 56.433166] Write of size 33 at addr cc22bf00 by task kunit_try_catch/242 [ 56.440002] [ 56.441528] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 56.441558] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 56.441558] Hardware name: Generic DRA74X (Flattened Device Tree) [ 56.441558] Call trace: [ 56.441558] unwind_backtrace from show_stack+0x18/0x1c [ 56.441589] show_stack from dump_stack_lvl+0x70/0x90 [ 56.441619] dump_stack_lvl from print_report+0x158/0x528 [ 56.441650] print_report from kasan_report+0xdc/0x118 [ 56.441680] kasan_report from kasan_check_range+0x14c/0x198 [ 56.441680] kasan_check_range from __asan_memset+0x20/0x3c [ 56.441711] __asan_memset from kmalloc_uaf_memset+0x1fc/0x3b0 [ 56.441741] kmalloc_uaf_memset from kunit_try_run_case+0x22c/0x5a8 [ 56.441772] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.441772] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 56.441802] kthread from ret_from_fork+0x14/0x20 [ 56.441833] Exception stack(0xf24abfb0 to 0xf24abff8) [ 56.441833] bfa0: 00000000 00000000 00000000 00000000 [ 56.441864] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 56.441894] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 56.441894] [ 56.558319] Allocated by task 242: [ 56.561737] kasan_save_track+0x30/0x5c [ 56.565612] __kasan_kmalloc+0x8c/0x94 [ 56.569396] kmalloc_uaf_memset+0xcc/0x3b0 [ 56.573516] kunit_try_run_case+0x22c/0x5a8 [ 56.577728] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.583251] kthread+0x464/0x810 [ 56.586517] ret_from_fork+0x14/0x20 [ 56.590118] [ 56.591613] Freed by task 242: [ 56.594696] kasan_save_track+0x30/0x5c [ 56.598571] kasan_save_free_info+0x3c/0x48 [ 56.602783] __kasan_slab_free+0x40/0x50 [ 56.606750] kfree+0xe8/0x384 [ 56.609741] kmalloc_uaf_memset+0x174/0x3b0 [ 56.613952] kunit_try_run_case+0x22c/0x5a8 [ 56.618164] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.623687] kthread+0x464/0x810 [ 56.626953] ret_from_fork+0x14/0x20 [ 56.630554] [ 56.632049] The buggy address belongs to the object at cc22bf00 [ 56.632049] which belongs to the cache kmalloc-64 of size 64 [ 56.643768] The buggy address is located 0 bytes inside of [ 56.643768] freed 64-byte region [cc22bf00, cc22bf40) [ 56.654449] [ 56.655975] The buggy address belongs to the physical page: [ 56.661560] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b [ 56.668853] flags: 0x0(zone=0) [ 56.671905] page_type: f5(slab) [ 56.675079] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 56.683227] raw: 00000000 [ 56.685882] page dumped because: kasan: bad access detected [ 56.691467] [ 56.692993] Memory state around the buggy address: [ 56.697814] cc22be00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.704376] cc22be80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.710937] >cc22bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.717529] ^ [ 56.720062] cc22bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.726654] cc22c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.733215] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 56.102111] ================================================================== [ 56.114196] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x398/0x3d8 [ 56.120788] Read of size 1 at addr cc22bd88 by task kunit_try_catch/240 [ 56.127441] [ 56.128936] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 56.128967] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 56.128997] Hardware name: Generic DRA74X (Flattened Device Tree) [ 56.128997] Call trace: [ 56.128997] unwind_backtrace from show_stack+0x18/0x1c [ 56.129028] show_stack from dump_stack_lvl+0x70/0x90 [ 56.129058] dump_stack_lvl from print_report+0x158/0x528 [ 56.129089] print_report from kasan_report+0xdc/0x118 [ 56.129089] kasan_report from kmalloc_uaf+0x398/0x3d8 [ 56.129119] kmalloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 56.129150] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.129180] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 56.129211] kthread from ret_from_fork+0x14/0x20 [ 56.129211] Exception stack(0xf249bfb0 to 0xf249bff8) [ 56.129241] bfa0: 00000000 00000000 00000000 00000000 [ 56.129241] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 56.129272] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 56.129272] [ 56.233093] Allocated by task 240: [ 56.236541] kasan_save_track+0x30/0x5c [ 56.240386] __kasan_kmalloc+0x8c/0x94 [ 56.244171] kmalloc_uaf+0xcc/0x3d8 [ 56.247711] kunit_try_run_case+0x22c/0x5a8 [ 56.251922] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.257446] kthread+0x464/0x810 [ 56.260711] ret_from_fork+0x14/0x20 [ 56.264312] [ 56.265808] Freed by task 240: [ 56.268890] kasan_save_track+0x30/0x5c [ 56.272735] kasan_save_free_info+0x3c/0x48 [ 56.276977] __kasan_slab_free+0x40/0x50 [ 56.280914] kfree+0xe8/0x384 [ 56.283905] kmalloc_uaf+0x174/0x3d8 [ 56.287536] kunit_try_run_case+0x22c/0x5a8 [ 56.291748] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 56.297271] kthread+0x464/0x810 [ 56.300537] ret_from_fork+0x14/0x20 [ 56.304138] [ 56.305633] The buggy address belongs to the object at cc22bd80 [ 56.305633] which belongs to the cache kmalloc-64 of size 64 [ 56.317352] The buggy address is located 8 bytes inside of [ 56.317352] freed 64-byte region [cc22bd80, cc22bdc0) [ 56.328033] [ 56.329528] The buggy address belongs to the physical page: [ 56.335144] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b [ 56.342407] flags: 0x0(zone=0) [ 56.345489] page_type: f5(slab) [ 56.348663] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 56.356811] raw: 00000000 [ 56.359436] page dumped because: kasan: bad access detected [ 56.365051] [ 56.366546] Memory state around the buggy address: [ 56.371368] cc22bc80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.377960] cc22bd00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.384521] >cc22bd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.391082] ^ [ 56.393920] cc22be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.400482] cc22be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.407043] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 55.808807] ================================================================== [ 55.820983] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x1b4/0x360 [ 55.828979] Read of size 64 at addr cc22bc04 by task kunit_try_catch/238 [ 55.835723] [ 55.837219] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 55.837249] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 55.837249] Hardware name: Generic DRA74X (Flattened Device Tree) [ 55.837280] Call trace: [ 55.837280] unwind_backtrace from show_stack+0x18/0x1c [ 55.837310] show_stack from dump_stack_lvl+0x70/0x90 [ 55.837341] dump_stack_lvl from print_report+0x158/0x528 [ 55.837371] print_report from kasan_report+0xdc/0x118 [ 55.837371] kasan_report from kasan_check_range+0x14c/0x198 [ 55.837402] kasan_check_range from __asan_memmove+0x28/0x68 [ 55.837432] __asan_memmove from kmalloc_memmove_invalid_size+0x1b4/0x360 [ 55.837463] kmalloc_memmove_invalid_size from kunit_try_run_case+0x22c/0x5a8 [ 55.837463] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.837493] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 55.837524] kthread from ret_from_fork+0x14/0x20 [ 55.837554] Exception stack(0xf248bfb0 to 0xf248bff8) [ 55.837554] bfa0: 00000000 00000000 00000000 00000000 [ 55.837585] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 55.837585] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 55.837615] [ 55.955932] Allocated by task 238: [ 55.959350] kasan_save_track+0x30/0x5c [ 55.963226] __kasan_kmalloc+0x8c/0x94 [ 55.967010] kmalloc_memmove_invalid_size+0xd0/0x360 [ 55.972015] kunit_try_run_case+0x22c/0x5a8 [ 55.976226] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.981750] kthread+0x464/0x810 [ 55.985015] ret_from_fork+0x14/0x20 [ 55.988616] [ 55.990142] The buggy address belongs to the object at cc22bc00 [ 55.990142] which belongs to the cache kmalloc-64 of size 64 [ 56.001861] The buggy address is located 4 bytes inside of [ 56.001861] allocated 64-byte region [cc22bc00, cc22bc40) [ 56.012878] [ 56.014373] The buggy address belongs to the physical page: [ 56.019989] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b [ 56.027252] flags: 0x0(zone=0) [ 56.030334] page_type: f5(slab) [ 56.033508] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 56.041656] raw: 00000000 [ 56.044281] page dumped because: kasan: bad access detected [ 56.049896] [ 56.051391] Memory state around the buggy address: [ 56.056243] cc22bb00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.062805] cc22bb80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.069366] >cc22bc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.075958] ^ [ 56.080596] cc22bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.087158] cc22bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.093749] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 55.518432] ================================================================== [ 55.529907] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x1b4/0x360 [ 55.537536] Read of size 4294967294 at addr cc22ba84 by task kunit_try_catch/236 [ 55.544982] [ 55.546508] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 55.546508] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 55.546539] Hardware name: Generic DRA74X (Flattened Device Tree) [ 55.546539] Call trace: [ 55.546539] unwind_backtrace from show_stack+0x18/0x1c [ 55.546569] show_stack from dump_stack_lvl+0x70/0x90 [ 55.546600] dump_stack_lvl from print_report+0x158/0x528 [ 55.546630] print_report from kasan_report+0xdc/0x118 [ 55.546661] kasan_report from kasan_check_range+0x14c/0x198 [ 55.546661] kasan_check_range from __asan_memmove+0x28/0x68 [ 55.546691] __asan_memmove from kmalloc_memmove_negative_size+0x1b4/0x360 [ 55.546722] kmalloc_memmove_negative_size from kunit_try_run_case+0x22c/0x5a8 [ 55.546752] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.546783] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 55.546783] kthread from ret_from_fork+0x14/0x20 [ 55.546813] Exception stack(0xf247bfb0 to 0xf247bff8) [ 55.546844] bfa0: 00000000 00000000 00000000 00000000 [ 55.546844] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 55.546874] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 55.546874] [ 55.665374] Allocated by task 236: [ 55.668823] kasan_save_track+0x30/0x5c [ 55.672668] __kasan_kmalloc+0x8c/0x94 [ 55.676452] kmalloc_memmove_negative_size+0xd0/0x360 [ 55.681549] kunit_try_run_case+0x22c/0x5a8 [ 55.685760] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.691314] kthread+0x464/0x810 [ 55.694549] ret_from_fork+0x14/0x20 [ 55.698150] [ 55.699676] The buggy address belongs to the object at cc22ba80 [ 55.699676] which belongs to the cache kmalloc-64 of size 64 [ 55.711395] The buggy address is located 4 bytes inside of [ 55.711395] 64-byte region [cc22ba80, cc22bac0) [ 55.721557] [ 55.723052] The buggy address belongs to the physical page: [ 55.728637] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b [ 55.735931] flags: 0x0(zone=0) [ 55.739013] page_type: f5(slab) [ 55.742187] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 55.750305] raw: 00000000 [ 55.752960] page dumped because: kasan: bad access detected [ 55.758575] [ 55.760070] Memory state around the buggy address: [ 55.764892] cc22b980: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.771453] cc22ba00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.778045] >cc22ba80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 55.784606] ^ [ 55.787170] cc22bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.793731] cc22bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.800292] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 55.226196] ================================================================== [ 55.237579] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x1b0/0x35c [ 55.244964] Write of size 16 at addr cc228d69 by task kunit_try_catch/234 [ 55.251800] [ 55.253295] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 55.253326] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 55.253326] Hardware name: Generic DRA74X (Flattened Device Tree) [ 55.253356] Call trace: [ 55.253356] unwind_backtrace from show_stack+0x18/0x1c [ 55.253387] show_stack from dump_stack_lvl+0x70/0x90 [ 55.253417] dump_stack_lvl from print_report+0x158/0x528 [ 55.253417] print_report from kasan_report+0xdc/0x118 [ 55.253448] kasan_report from kasan_check_range+0x14c/0x198 [ 55.253479] kasan_check_range from __asan_memset+0x20/0x3c [ 55.253479] __asan_memset from kmalloc_oob_memset_16+0x1b0/0x35c [ 55.253509] kmalloc_oob_memset_16 from kunit_try_run_case+0x22c/0x5a8 [ 55.253540] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.253570] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 55.253601] kthread from ret_from_fork+0x14/0x20 [ 55.253601] Exception stack(0xf246bfb0 to 0xf246bff8) [ 55.253631] bfa0: 00000000 00000000 00000000 00000000 [ 55.253631] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 55.253662] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 55.253662] [ 55.370605] Allocated by task 234: [ 55.374023] kasan_save_track+0x30/0x5c [ 55.377899] __kasan_kmalloc+0x8c/0x94 [ 55.381683] kmalloc_oob_memset_16+0xcc/0x35c [ 55.386047] kunit_try_run_case+0x22c/0x5a8 [ 55.390289] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.395812] kthread+0x464/0x810 [ 55.399047] ret_from_fork+0x14/0x20 [ 55.402679] [ 55.404174] The buggy address belongs to the object at cc228d00 [ 55.404174] which belongs to the cache kmalloc-128 of size 128 [ 55.416076] The buggy address is located 105 bytes inside of [ 55.416076] allocated 120-byte region [cc228d00, cc228d78) [ 55.427337] [ 55.428863] The buggy address belongs to the physical page: [ 55.434448] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 55.441741] flags: 0x0(zone=0) [ 55.444824] page_type: f5(slab) [ 55.447998] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 55.456115] raw: 00000000 [ 55.458770] page dumped because: kasan: bad access detected [ 55.464355] [ 55.465881] Memory state around the buggy address: [ 55.470703] cc228c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.477264] cc228c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.483825] >cc228d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 55.490417] ^ [ 55.496887] cc228d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.503479] cc228e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.510040] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 54.934478] ================================================================== [ 54.945861] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x1b0/0x35c [ 54.953124] Write of size 8 at addr cc228c71 by task kunit_try_catch/232 [ 54.959869] [ 54.961395] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 54.961425] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.961425] Hardware name: Generic DRA74X (Flattened Device Tree) [ 54.961425] Call trace: [ 54.961425] unwind_backtrace from show_stack+0x18/0x1c [ 54.961456] show_stack from dump_stack_lvl+0x70/0x90 [ 54.961486] dump_stack_lvl from print_report+0x158/0x528 [ 54.961517] print_report from kasan_report+0xdc/0x118 [ 54.961547] kasan_report from kasan_check_range+0x14c/0x198 [ 54.961547] kasan_check_range from __asan_memset+0x20/0x3c [ 54.961578] __asan_memset from kmalloc_oob_memset_8+0x1b0/0x35c [ 54.961608] kmalloc_oob_memset_8 from kunit_try_run_case+0x22c/0x5a8 [ 54.961608] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.961639] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 54.961669] kthread from ret_from_fork+0x14/0x20 [ 54.961700] Exception stack(0xf245bfb0 to 0xf245bff8) [ 54.961700] bfa0: 00000000 00000000 00000000 00000000 [ 54.961730] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 54.961730] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 54.961761] [ 55.078491] Allocated by task 232: [ 55.081939] kasan_save_track+0x30/0x5c [ 55.085784] __kasan_kmalloc+0x8c/0x94 [ 55.089569] kmalloc_oob_memset_8+0xcc/0x35c [ 55.093872] kunit_try_run_case+0x22c/0x5a8 [ 55.098114] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 55.103637] kthread+0x464/0x810 [ 55.106872] ret_from_fork+0x14/0x20 [ 55.110473] [ 55.111999] The buggy address belongs to the object at cc228c00 [ 55.111999] which belongs to the cache kmalloc-128 of size 128 [ 55.123901] The buggy address is located 113 bytes inside of [ 55.123901] allocated 120-byte region [cc228c00, cc228c78) [ 55.135162] [ 55.136688] The buggy address belongs to the physical page: [ 55.142272] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 55.149566] flags: 0x0(zone=0) [ 55.152648] page_type: f5(slab) [ 55.155792] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 55.163940] raw: 00000000 [ 55.166595] page dumped because: kasan: bad access detected [ 55.172180] [ 55.173706] Memory state around the buggy address: [ 55.178527] cc228b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.185089] cc228b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.191650] >cc228c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 55.198242] ^ [ 55.204711] cc228c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.211273] cc228d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.217864] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 54.642669] ================================================================== [ 54.654052] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x1b0/0x35c [ 54.661346] Write of size 4 at addr cc228b75 by task kunit_try_catch/230 [ 54.668090] [ 54.669586] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 54.669616] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.669616] Hardware name: Generic DRA74X (Flattened Device Tree) [ 54.669647] Call trace: [ 54.669647] unwind_backtrace from show_stack+0x18/0x1c [ 54.669677] show_stack from dump_stack_lvl+0x70/0x90 [ 54.669677] dump_stack_lvl from print_report+0x158/0x528 [ 54.669708] print_report from kasan_report+0xdc/0x118 [ 54.669738] kasan_report from kasan_check_range+0x14c/0x198 [ 54.669769] kasan_check_range from __asan_memset+0x20/0x3c [ 54.669769] __asan_memset from kmalloc_oob_memset_4+0x1b0/0x35c [ 54.669799] kmalloc_oob_memset_4 from kunit_try_run_case+0x22c/0x5a8 [ 54.669830] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.669860] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 54.669860] kthread from ret_from_fork+0x14/0x20 [ 54.669891] Exception stack(0xf244bfb0 to 0xf244bff8) [ 54.669921] bfa0: 00000000 00000000 00000000 00000000 [ 54.669921] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 54.669952] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 54.669952] [ 54.786712] Allocated by task 230: [ 54.790130] kasan_save_track+0x30/0x5c [ 54.794006] __kasan_kmalloc+0x8c/0x94 [ 54.797790] kmalloc_oob_memset_4+0xcc/0x35c [ 54.802093] kunit_try_run_case+0x22c/0x5a8 [ 54.806304] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.811828] kthread+0x464/0x810 [ 54.815093] ret_from_fork+0x14/0x20 [ 54.818695] [ 54.820190] The buggy address belongs to the object at cc228b00 [ 54.820190] which belongs to the cache kmalloc-128 of size 128 [ 54.832092] The buggy address is located 117 bytes inside of [ 54.832092] allocated 120-byte region [cc228b00, cc228b78) [ 54.843383] [ 54.844879] The buggy address belongs to the physical page: [ 54.850494] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 54.857757] flags: 0x0(zone=0) [ 54.860839] page_type: f5(slab) [ 54.864013] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 54.872161] raw: 00000000 [ 54.874786] page dumped because: kasan: bad access detected [ 54.880401] [ 54.881896] Memory state around the buggy address: [ 54.886718] cc228a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.893310] cc228a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.899871] >cc228b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.906433] ^ [ 54.912902] cc228b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.919494] cc228c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.926055] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 54.350830] ================================================================== [ 54.362304] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x1b0/0x35c [ 54.369567] Write of size 2 at addr cc228a77 by task kunit_try_catch/228 [ 54.376312] [ 54.377838] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 54.377868] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.377868] Hardware name: Generic DRA74X (Flattened Device Tree) [ 54.377868] Call trace: [ 54.377899] unwind_backtrace from show_stack+0x18/0x1c [ 54.377899] show_stack from dump_stack_lvl+0x70/0x90 [ 54.377929] dump_stack_lvl from print_report+0x158/0x528 [ 54.377960] print_report from kasan_report+0xdc/0x118 [ 54.377990] kasan_report from kasan_check_range+0x14c/0x198 [ 54.377990] kasan_check_range from __asan_memset+0x20/0x3c [ 54.378021] __asan_memset from kmalloc_oob_memset_2+0x1b0/0x35c [ 54.378051] kmalloc_oob_memset_2 from kunit_try_run_case+0x22c/0x5a8 [ 54.378051] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.378082] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 54.378112] kthread from ret_from_fork+0x14/0x20 [ 54.378143] Exception stack(0xf243bfb0 to 0xf243bff8) [ 54.378143] bfa0: 00000000 00000000 00000000 00000000 [ 54.378173] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 54.378173] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 54.378204] [ 54.494934] Allocated by task 228: [ 54.498382] kasan_save_track+0x30/0x5c [ 54.502227] __kasan_kmalloc+0x8c/0x94 [ 54.506011] kmalloc_oob_memset_2+0xcc/0x35c [ 54.510314] kunit_try_run_case+0x22c/0x5a8 [ 54.514556] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.520080] kthread+0x464/0x810 [ 54.523315] ret_from_fork+0x14/0x20 [ 54.526947] [ 54.528442] The buggy address belongs to the object at cc228a00 [ 54.528442] which belongs to the cache kmalloc-128 of size 128 [ 54.540344] The buggy address is located 119 bytes inside of [ 54.540344] allocated 120-byte region [cc228a00, cc228a78) [ 54.551635] [ 54.553131] The buggy address belongs to the physical page: [ 54.558746] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 54.566009] flags: 0x0(zone=0) [ 54.569091] page_type: f5(slab) [ 54.572265] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 54.580383] raw: 00000000 [ 54.583038] page dumped because: kasan: bad access detected [ 54.588653] [ 54.590148] Memory state around the buggy address: [ 54.594970] cc228900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.601531] cc228980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.608093] >cc228a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.614685] ^ [ 54.621154] cc228a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.627716] cc228b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.634307] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 54.059204] ================================================================== [ 54.070068] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x1a4/0x350 [ 54.077423] Write of size 128 at addr cc228900 by task kunit_try_catch/226 [ 54.084350] [ 54.085845] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 54.085876] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.085906] Hardware name: Generic DRA74X (Flattened Device Tree) [ 54.085906] Call trace: [ 54.085906] unwind_backtrace from show_stack+0x18/0x1c [ 54.085937] show_stack from dump_stack_lvl+0x70/0x90 [ 54.085968] dump_stack_lvl from print_report+0x158/0x528 [ 54.085998] print_report from kasan_report+0xdc/0x118 [ 54.085998] kasan_report from kasan_check_range+0x14c/0x198 [ 54.086029] kasan_check_range from __asan_memset+0x20/0x3c [ 54.086059] __asan_memset from kmalloc_oob_in_memset+0x1a4/0x350 [ 54.086059] kmalloc_oob_in_memset from kunit_try_run_case+0x22c/0x5a8 [ 54.086090] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.086120] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 54.086151] kthread from ret_from_fork+0x14/0x20 [ 54.086181] Exception stack(0xf242bfb0 to 0xf242bff8) [ 54.086181] bfa0: 00000000 00000000 00000000 00000000 [ 54.086212] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 54.086212] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 54.086242] [ 54.203155] Allocated by task 226: [ 54.206573] kasan_save_track+0x30/0x5c [ 54.210449] __kasan_kmalloc+0x8c/0x94 [ 54.214233] kmalloc_oob_in_memset+0xd0/0x350 [ 54.218627] kunit_try_run_case+0x22c/0x5a8 [ 54.222839] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 54.228363] kthread+0x464/0x810 [ 54.231628] ret_from_fork+0x14/0x20 [ 54.235229] [ 54.236724] The buggy address belongs to the object at cc228900 [ 54.236724] which belongs to the cache kmalloc-128 of size 128 [ 54.248626] The buggy address is located 0 bytes inside of [ 54.248626] allocated 120-byte region [cc228900, cc228978) [ 54.259735] [ 54.261230] The buggy address belongs to the physical page: [ 54.266845] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 54.274108] flags: 0x0(zone=0) [ 54.277191] page_type: f5(slab) [ 54.280364] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 54.288513] raw: 00000000 [ 54.291137] page dumped because: kasan: bad access detected [ 54.296752] [ 54.298248] Memory state around the buggy address: [ 54.303070] cc228800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.309661] cc228880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.316223] >cc228900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.322784] ^ [ 54.329284] cc228980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.335845] cc228a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.342407] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 53.746002] ================================================================== [ 53.756866] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x484/0x518 [ 53.763702] Read of size 16 at addr cc22b400 by task kunit_try_catch/224 [ 53.770446] [ 53.771972] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 53.772003] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 53.772003] Hardware name: Generic DRA74X (Flattened Device Tree) [ 53.772003] Call trace: [ 53.772003] unwind_backtrace from show_stack+0x18/0x1c [ 53.772033] show_stack from dump_stack_lvl+0x70/0x90 [ 53.772064] dump_stack_lvl from print_report+0x158/0x528 [ 53.772094] print_report from kasan_report+0xdc/0x118 [ 53.772125] kasan_report from kmalloc_uaf_16+0x484/0x518 [ 53.772125] kmalloc_uaf_16 from kunit_try_run_case+0x22c/0x5a8 [ 53.772155] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.772186] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 53.772216] kthread from ret_from_fork+0x14/0x20 [ 53.772216] Exception stack(0xf241bfb0 to 0xf241bff8) [ 53.772247] bfa0: 00000000 00000000 00000000 00000000 [ 53.772247] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 53.772277] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 53.772277] [ 53.876617] Allocated by task 224: [ 53.880065] kasan_save_track+0x30/0x5c [ 53.883911] __kasan_kmalloc+0x8c/0x94 [ 53.887695] kmalloc_uaf_16+0x1b0/0x518 [ 53.891571] kunit_try_run_case+0x22c/0x5a8 [ 53.895782] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.901306] kthread+0x464/0x810 [ 53.904571] ret_from_fork+0x14/0x20 [ 53.908172] [ 53.909667] Freed by task 224: [ 53.912750] kasan_save_track+0x30/0x5c [ 53.916625] kasan_save_free_info+0x3c/0x48 [ 53.920837] __kasan_slab_free+0x40/0x50 [ 53.924774] kfree+0xe8/0x384 [ 53.927795] kmalloc_uaf_16+0x234/0x518 [ 53.931640] kunit_try_run_case+0x22c/0x5a8 [ 53.935852] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.941406] kthread+0x464/0x810 [ 53.944641] ret_from_fork+0x14/0x20 [ 53.948242] [ 53.949768] The buggy address belongs to the object at cc22b400 [ 53.949768] which belongs to the cache kmalloc-64 of size 64 [ 53.961486] The buggy address is located 0 bytes inside of [ 53.961486] freed 64-byte region [cc22b400, cc22b440) [ 53.972167] [ 53.973663] The buggy address belongs to the physical page: [ 53.979248] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b [ 53.986541] flags: 0x0(zone=0) [ 53.989624] page_type: f5(slab) [ 53.992797] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 54.000915] raw: 00000000 [ 54.003570] page dumped because: kasan: bad access detected [ 54.009185] [ 54.010681] Memory state around the buggy address: [ 54.015502] cc22b300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.022064] cc22b380: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.028656] >cc22b400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.035217] ^ [ 54.037750] cc22b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.044342] cc22b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.050903] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 53.472595] ================================================================== [ 53.483306] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x4b0/0x520 [ 53.490051] Write of size 16 at addr cc22b180 by task kunit_try_catch/222 [ 53.496887] [ 53.498382] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 53.498413] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 53.498413] Hardware name: Generic DRA74X (Flattened Device Tree) [ 53.498443] Call trace: [ 53.498443] unwind_backtrace from show_stack+0x18/0x1c [ 53.498474] show_stack from dump_stack_lvl+0x70/0x90 [ 53.498504] dump_stack_lvl from print_report+0x158/0x528 [ 53.498504] print_report from kasan_report+0xdc/0x118 [ 53.498535] kasan_report from kmalloc_oob_16+0x4b0/0x520 [ 53.498565] kmalloc_oob_16 from kunit_try_run_case+0x22c/0x5a8 [ 53.498596] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.498596] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 53.498626] kthread from ret_from_fork+0x14/0x20 [ 53.498657] Exception stack(0xf240bfb0 to 0xf240bff8) [ 53.498657] bfa0: 00000000 00000000 00000000 00000000 [ 53.498687] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 53.498687] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 53.498718] [ 53.603057] Allocated by task 222: [ 53.606475] kasan_save_track+0x30/0x5c [ 53.610351] __kasan_kmalloc+0x8c/0x94 [ 53.614135] kmalloc_oob_16+0xcc/0x520 [ 53.617919] kunit_try_run_case+0x22c/0x5a8 [ 53.622131] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.627655] kthread+0x464/0x810 [ 53.630920] ret_from_fork+0x14/0x20 [ 53.634521] [ 53.636016] The buggy address belongs to the object at cc22b180 [ 53.636016] which belongs to the cache kmalloc-64 of size 64 [ 53.647735] The buggy address is located 0 bytes inside of [ 53.647735] allocated 13-byte region [cc22b180, cc22b18d) [ 53.658782] [ 53.660278] The buggy address belongs to the physical page: [ 53.665893] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22b [ 53.673156] flags: 0x0(zone=0) [ 53.676239] page_type: f5(slab) [ 53.679412] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 53.687561] raw: 00000000 [ 53.690185] page dumped because: kasan: bad access detected [ 53.695800] [ 53.697296] Memory state around the buggy address: [ 53.702117] cc22b080: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.708679] cc22b100: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.715270] >cc22b180: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.721832] ^ [ 53.724639] cc22b200: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.731231] cc22b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.737792] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 52.783081] ================================================================== [ 52.794708] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x208/0x5d4 [ 52.801391] Read of size 1 at addr cb2d1c00 by task kunit_try_catch/220 [ 52.808044] [ 52.809539] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 52.809570] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.809570] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.809600] Call trace: [ 52.809600] unwind_backtrace from show_stack+0x18/0x1c [ 52.809631] show_stack from dump_stack_lvl+0x70/0x90 [ 52.809661] dump_stack_lvl from print_report+0x158/0x528 [ 52.809661] print_report from kasan_report+0xdc/0x118 [ 52.809692] kasan_report from __kasan_check_byte+0x34/0x3c [ 52.809722] __kasan_check_byte from krealloc_noprof+0x30/0x2e4 [ 52.809753] krealloc_noprof from krealloc_uaf+0x208/0x5d4 [ 52.809753] krealloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 52.809783] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.809814] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.809844] kthread from ret_from_fork+0x14/0x20 [ 52.809844] Exception stack(0xf23fbfb0 to 0xf23fbff8) [ 52.809875] bfa0: 00000000 00000000 00000000 00000000 [ 52.809875] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.809906] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.809906] [ 52.925720] Allocated by task 220: [ 52.929138] kasan_save_track+0x30/0x5c [ 52.933013] __kasan_kmalloc+0x8c/0x94 [ 52.936798] krealloc_uaf+0xd8/0x5d4 [ 52.940399] kunit_try_run_case+0x22c/0x5a8 [ 52.944610] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.950134] kthread+0x464/0x810 [ 52.953399] ret_from_fork+0x14/0x20 [ 52.957000] [ 52.958496] Freed by task 220: [ 52.961578] kasan_save_track+0x30/0x5c [ 52.965454] kasan_save_free_info+0x3c/0x48 [ 52.969665] __kasan_slab_free+0x40/0x50 [ 52.973632] kfree+0xe8/0x384 [ 52.976623] krealloc_uaf+0x180/0x5d4 [ 52.980316] kunit_try_run_case+0x22c/0x5a8 [ 52.984527] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.990051] kthread+0x464/0x810 [ 52.993316] ret_from_fork+0x14/0x20 [ 52.996917] [ 52.998413] The buggy address belongs to the object at cb2d1c00 [ 52.998413] which belongs to the cache kmalloc-256 of size 256 [ 53.010314] The buggy address is located 0 bytes inside of [ 53.010314] freed 256-byte region [cb2d1c00, cb2d1d00) [ 53.021057] [ 53.022583] The buggy address belongs to the physical page: [ 53.028167] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0 [ 53.035461] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.043151] flags: 0x40(head|zone=0) [ 53.046752] page_type: f5(slab) [ 53.049926] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.058074] raw: 00000000 [ 53.060729] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.068969] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff [ 53.077178] head: 00000000 00000002 [ 53.080688] page dumped because: kasan: bad access detected [ 53.086303] [ 53.087799] Memory state around the buggy address: [ 53.092620] cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.099212] cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.105773] >cb2d1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.112335] ^ [ 53.114898] cb2d1c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.121459] cb2d1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.128051] ================================================================== [ 53.135650] ================================================================== [ 53.142944] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x580/0x5d4 [ 53.149597] Read of size 1 at addr cb2d1c00 by task kunit_try_catch/220 [ 53.156249] [ 53.157745] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 53.157775] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 53.157806] Hardware name: Generic DRA74X (Flattened Device Tree) [ 53.157806] Call trace: [ 53.157806] unwind_backtrace from show_stack+0x18/0x1c [ 53.157836] show_stack from dump_stack_lvl+0x70/0x90 [ 53.157867] dump_stack_lvl from print_report+0x158/0x528 [ 53.157897] print_report from kasan_report+0xdc/0x118 [ 53.157897] kasan_report from krealloc_uaf+0x580/0x5d4 [ 53.157928] krealloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 53.157958] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.157989] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 53.157989] kthread from ret_from_fork+0x14/0x20 [ 53.158020] Exception stack(0xf23fbfb0 to 0xf23fbff8) [ 53.158050] bfa0: 00000000 00000000 00000000 00000000 [ 53.158050] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 53.158081] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 53.158081] [ 53.262084] Allocated by task 220: [ 53.265502] kasan_save_track+0x30/0x5c [ 53.269378] __kasan_kmalloc+0x8c/0x94 [ 53.273162] krealloc_uaf+0xd8/0x5d4 [ 53.276763] kunit_try_run_case+0x22c/0x5a8 [ 53.280975] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.286499] kthread+0x464/0x810 [ 53.289764] ret_from_fork+0x14/0x20 [ 53.293365] [ 53.294860] Freed by task 220: [ 53.297943] kasan_save_track+0x30/0x5c [ 53.301818] kasan_save_free_info+0x3c/0x48 [ 53.306030] __kasan_slab_free+0x40/0x50 [ 53.309967] kfree+0xe8/0x384 [ 53.312988] krealloc_uaf+0x180/0x5d4 [ 53.316680] kunit_try_run_case+0x22c/0x5a8 [ 53.320892] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.326416] kthread+0x464/0x810 [ 53.329681] ret_from_fork+0x14/0x20 [ 53.333282] [ 53.334777] The buggy address belongs to the object at cb2d1c00 [ 53.334777] which belongs to the cache kmalloc-256 of size 256 [ 53.346679] The buggy address is located 0 bytes inside of [ 53.346679] freed 256-byte region [cb2d1c00, cb2d1d00) [ 53.357452] [ 53.358947] The buggy address belongs to the physical page: [ 53.364562] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0 [ 53.371826] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.379516] flags: 0x40(head|zone=0) [ 53.383117] page_type: f5(slab) [ 53.386291] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.394439] raw: 00000000 [ 53.397094] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.405334] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff [ 53.413543] head: 00000000 00000002 [ 53.417053] page dumped because: kasan: bad access detected [ 53.422668] [ 53.424163] Memory state around the buggy address: [ 53.428985] cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.435577] cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.442138] >cb2d1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.448699] ^ [ 53.451263] cb2d1c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.457824] cb2d1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.464385] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 50.434387] ================================================================== [ 50.441650] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4 [ 50.449279] Write of size 1 at addr cb2d1aea by task kunit_try_catch/214 [ 50.456024] [ 50.457519] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 50.457550] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 50.457550] Hardware name: Generic DRA74X (Flattened Device Tree) [ 50.457580] Call trace: [ 50.457580] unwind_backtrace from show_stack+0x18/0x1c [ 50.457611] show_stack from dump_stack_lvl+0x70/0x90 [ 50.457611] dump_stack_lvl from print_report+0x158/0x528 [ 50.457641] print_report from kasan_report+0xdc/0x118 [ 50.457672] kasan_report from krealloc_less_oob_helper+0xd58/0xea4 [ 50.457702] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 50.457702] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.457733] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 50.457763] kthread from ret_from_fork+0x14/0x20 [ 50.457794] Exception stack(0xf23cbfb0 to 0xf23cbff8) [ 50.457794] bfa0: 00000000 00000000 00000000 00000000 [ 50.457824] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 50.457824] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 50.457855] [ 50.563934] Allocated by task 214: [ 50.567352] kasan_save_track+0x30/0x5c [ 50.571228] __kasan_krealloc+0xf4/0x140 [ 50.575195] krealloc_noprof+0x104/0x2e4 [ 50.579132] krealloc_less_oob_helper+0x1d8/0xea4 [ 50.583892] kunit_try_run_case+0x22c/0x5a8 [ 50.588104] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.593627] kthread+0x464/0x810 [ 50.596893] ret_from_fork+0x14/0x20 [ 50.600494] [ 50.601989] The buggy address belongs to the object at cb2d1a00 [ 50.601989] which belongs to the cache kmalloc-256 of size 256 [ 50.613891] The buggy address is located 33 bytes to the right of [ 50.613891] allocated 201-byte region [cb2d1a00, cb2d1ac9) [ 50.625610] [ 50.627105] The buggy address belongs to the physical page: [ 50.632720] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0 [ 50.639984] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.647705] flags: 0x40(head|zone=0) [ 50.651306] page_type: f5(slab) [ 50.654479] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.662597] raw: 00000000 [ 50.665252] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.673492] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.681732] head: 00000000 00000002 [ 50.685241] page dumped because: kasan: bad access detected [ 50.690826] [ 50.692321] Memory state around the buggy address: [ 50.697143] cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.703735] cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.710296] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 50.716857] ^ [ 50.722839] cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.729400] cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.735961] ================================================================== [ 50.743286] ================================================================== [ 50.750549] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4 [ 50.758178] Write of size 1 at addr cb2d1aeb by task kunit_try_catch/214 [ 50.764923] [ 50.766448] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 50.766448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 50.766479] Hardware name: Generic DRA74X (Flattened Device Tree) [ 50.766479] Call trace: [ 50.766479] unwind_backtrace from show_stack+0x18/0x1c [ 50.766510] show_stack from dump_stack_lvl+0x70/0x90 [ 50.766540] dump_stack_lvl from print_report+0x158/0x528 [ 50.766571] print_report from kasan_report+0xdc/0x118 [ 50.766571] kasan_report from krealloc_less_oob_helper+0xd00/0xea4 [ 50.766601] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 50.766632] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.766662] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 50.766693] kthread from ret_from_fork+0x14/0x20 [ 50.766693] Exception stack(0xf23cbfb0 to 0xf23cbff8) [ 50.766723] bfa0: 00000000 00000000 00000000 00000000 [ 50.766723] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 50.766754] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 50.766754] [ 50.872863] Allocated by task 214: [ 50.876281] kasan_save_track+0x30/0x5c [ 50.880157] __kasan_krealloc+0xf4/0x140 [ 50.884094] krealloc_noprof+0x104/0x2e4 [ 50.888061] krealloc_less_oob_helper+0x1d8/0xea4 [ 50.892791] kunit_try_run_case+0x22c/0x5a8 [ 50.897003] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.902526] kthread+0x464/0x810 [ 50.905792] ret_from_fork+0x14/0x20 [ 50.909393] [ 50.910919] The buggy address belongs to the object at cb2d1a00 [ 50.910919] which belongs to the cache kmalloc-256 of size 256 [ 50.922790] The buggy address is located 34 bytes to the right of [ 50.922790] allocated 201-byte region [cb2d1a00, cb2d1ac9) [ 50.934539] [ 50.936035] The buggy address belongs to the physical page: [ 50.941650] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0 [ 50.948913] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.956604] flags: 0x40(head|zone=0) [ 50.960205] page_type: f5(slab) [ 50.963378] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.971527] raw: 00000000 [ 50.974182] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.982421] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.990631] head: 00000000 00000002 [ 50.994140] page dumped because: kasan: bad access detected [ 50.999755] [ 51.001251] Memory state around the buggy address: [ 51.006072] cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.012664] cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.019226] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 51.025787] ^ [ 51.031738] cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.038330] cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.044891] ================================================================== [ 52.044830] ================================================================== [ 52.052124] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4 [ 52.059722] Write of size 1 at addr ccb3a0da by task kunit_try_catch/218 [ 52.066467] [ 52.067993] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 52.068023] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.068023] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.068023] Call trace: [ 52.068054] unwind_backtrace from show_stack+0x18/0x1c [ 52.068054] show_stack from dump_stack_lvl+0x70/0x90 [ 52.068084] dump_stack_lvl from print_report+0x158/0x528 [ 52.068115] print_report from kasan_report+0xdc/0x118 [ 52.068145] kasan_report from krealloc_less_oob_helper+0xd18/0xea4 [ 52.068145] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 52.068176] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.068206] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.068237] kthread from ret_from_fork+0x14/0x20 [ 52.068237] Exception stack(0xf23ebfb0 to 0xf23ebff8) [ 52.068267] bfa0: 00000000 00000000 00000000 00000000 [ 52.068267] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.068298] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.068298] [ 52.174407] The buggy address belongs to the physical page: [ 52.180023] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38 [ 52.187286] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.194976] flags: 0x40(head|zone=0) [ 52.198577] page_type: f8(unknown) [ 52.202026] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.210174] raw: 00000000 [ 52.212799] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.221038] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 52.229278] head: 00000000 00000004 [ 52.232788] page dumped because: kasan: bad access detected [ 52.238372] [ 52.239898] Memory state around the buggy address: [ 52.244720] ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.251281] ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.257843] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 52.264434] ^ [ 52.269866] ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.276428] ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.282989] ================================================================== [ 52.536315] ================================================================== [ 52.543579] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4 [ 52.551208] Write of size 1 at addr ccb3a0eb by task kunit_try_catch/218 [ 52.557952] [ 52.559448] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 52.559478] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.559509] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.559509] Call trace: [ 52.559509] unwind_backtrace from show_stack+0x18/0x1c [ 52.559539] show_stack from dump_stack_lvl+0x70/0x90 [ 52.559570] dump_stack_lvl from print_report+0x158/0x528 [ 52.559600] print_report from kasan_report+0xdc/0x118 [ 52.559600] kasan_report from krealloc_less_oob_helper+0xd00/0xea4 [ 52.559631] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 52.559661] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.559692] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.559722] kthread from ret_from_fork+0x14/0x20 [ 52.559722] Exception stack(0xf23ebfb0 to 0xf23ebff8) [ 52.559753] bfa0: 00000000 00000000 00000000 00000000 [ 52.559753] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.559783] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.559783] [ 52.665893] The buggy address belongs to the physical page: [ 52.671478] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38 [ 52.678771] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.686462] flags: 0x40(head|zone=0) [ 52.690063] page_type: f8(unknown) [ 52.693511] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.701660] raw: 00000000 [ 52.704284] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.712524] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 52.720764] head: 00000000 00000004 [ 52.724273] page dumped because: kasan: bad access detected [ 52.729858] [ 52.731384] Memory state around the buggy address: [ 52.736206] ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.742767] ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.749328] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 52.755920] ^ [ 52.761871] ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.768432] ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.774993] ================================================================== [ 51.550170] ================================================================== [ 51.561798] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4 [ 51.569427] Write of size 1 at addr ccb3a0c9 by task kunit_try_catch/218 [ 51.576171] [ 51.577697] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 51.577728] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.577728] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.577728] Call trace: [ 51.577728] unwind_backtrace from show_stack+0x18/0x1c [ 51.577758] show_stack from dump_stack_lvl+0x70/0x90 [ 51.577789] dump_stack_lvl from print_report+0x158/0x528 [ 51.577819] print_report from kasan_report+0xdc/0x118 [ 51.577850] kasan_report from krealloc_less_oob_helper+0xcf4/0xea4 [ 51.577850] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.577880] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.577911] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.577941] kthread from ret_from_fork+0x14/0x20 [ 51.577941] Exception stack(0xf23ebfb0 to 0xf23ebff8) [ 51.577972] bfa0: 00000000 00000000 00000000 00000000 [ 51.577972] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.578002] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.578002] [ 51.684112] The buggy address belongs to the physical page: [ 51.689727] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38 [ 51.696990] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.704711] flags: 0x40(head|zone=0) [ 51.708312] page_type: f8(unknown) [ 51.711730] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.719879] raw: 00000000 [ 51.722534] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.730743] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.738983] head: 00000000 00000004 [ 51.742492] page dumped because: kasan: bad access detected [ 51.748107] [ 51.749603] Memory state around the buggy address: [ 51.754425] ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.760986] ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.767578] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 51.774139] ^ [ 51.779052] ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.785614] ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.792175] ================================================================== [ 52.290313] ================================================================== [ 52.297576] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4 [ 52.305206] Write of size 1 at addr ccb3a0ea by task kunit_try_catch/218 [ 52.311950] [ 52.313476] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 52.313476] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.313507] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.313507] Call trace: [ 52.313507] unwind_backtrace from show_stack+0x18/0x1c [ 52.313537] show_stack from dump_stack_lvl+0x70/0x90 [ 52.313568] dump_stack_lvl from print_report+0x158/0x528 [ 52.313598] print_report from kasan_report+0xdc/0x118 [ 52.313598] kasan_report from krealloc_less_oob_helper+0xd58/0xea4 [ 52.313629] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 52.313659] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.313690] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.313720] kthread from ret_from_fork+0x14/0x20 [ 52.313720] Exception stack(0xf23ebfb0 to 0xf23ebff8) [ 52.313751] bfa0: 00000000 00000000 00000000 00000000 [ 52.313751] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.313781] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.313781] [ 52.419891] The buggy address belongs to the physical page: [ 52.425476] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38 [ 52.432769] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.440460] flags: 0x40(head|zone=0) [ 52.444061] page_type: f8(unknown) [ 52.447509] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.455627] raw: 00000000 [ 52.458282] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 52.466522] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 52.474761] head: 00000000 00000004 [ 52.478271] page dumped because: kasan: bad access detected [ 52.483856] [ 52.485382] Memory state around the buggy address: [ 52.490203] ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.496765] ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.503326] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 52.509918] ^ [ 52.515869] ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.522430] ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.528991] ================================================================== [ 49.506317] ================================================================== [ 49.517425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4 [ 49.525054] Write of size 1 at addr cb2d1ac9 by task kunit_try_catch/214 [ 49.531799] [ 49.533325] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 49.533355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 49.533355] Hardware name: Generic DRA74X (Flattened Device Tree) [ 49.533355] Call trace: [ 49.533355] unwind_backtrace from show_stack+0x18/0x1c [ 49.533386] show_stack from dump_stack_lvl+0x70/0x90 [ 49.533416] dump_stack_lvl from print_report+0x158/0x528 [ 49.533447] print_report from kasan_report+0xdc/0x118 [ 49.533477] kasan_report from krealloc_less_oob_helper+0xcf4/0xea4 [ 49.533477] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 49.533508] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.533538] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 49.533569] kthread from ret_from_fork+0x14/0x20 [ 49.533569] Exception stack(0xf23cbfb0 to 0xf23cbff8) [ 49.533599] bfa0: 00000000 00000000 00000000 00000000 [ 49.533599] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 49.533630] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 49.533630] [ 49.639739] Allocated by task 214: [ 49.643157] kasan_save_track+0x30/0x5c [ 49.647033] __kasan_krealloc+0xf4/0x140 [ 49.650970] krealloc_noprof+0x104/0x2e4 [ 49.654937] krealloc_less_oob_helper+0x1d8/0xea4 [ 49.659667] kunit_try_run_case+0x22c/0x5a8 [ 49.663909] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.669433] kthread+0x464/0x810 [ 49.672668] ret_from_fork+0x14/0x20 [ 49.676300] [ 49.677795] The buggy address belongs to the object at cb2d1a00 [ 49.677795] which belongs to the cache kmalloc-256 of size 256 [ 49.689697] The buggy address is located 0 bytes to the right of [ 49.689697] allocated 201-byte region [cb2d1a00, cb2d1ac9) [ 49.701324] [ 49.702819] The buggy address belongs to the physical page: [ 49.708435] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0 [ 49.715698] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.723419] flags: 0x40(head|zone=0) [ 49.727020] page_type: f5(slab) [ 49.730194] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.738342] raw: 00000000 [ 49.740966] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.749206] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff [ 49.757446] head: 00000000 00000002 [ 49.760955] page dumped because: kasan: bad access detected [ 49.766571] [ 49.768066] Memory state around the buggy address: [ 49.772888] cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.779449] cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.786041] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 49.792602] ^ [ 49.797515] cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.804077] cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.810638] ================================================================== [ 50.125976] ================================================================== [ 50.133270] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4 [ 50.140899] Write of size 1 at addr cb2d1ada by task kunit_try_catch/214 [ 50.147644] [ 50.149139] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 50.149169] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 50.149169] Hardware name: Generic DRA74X (Flattened Device Tree) [ 50.149169] Call trace: [ 50.149200] unwind_backtrace from show_stack+0x18/0x1c [ 50.149200] show_stack from dump_stack_lvl+0x70/0x90 [ 50.149230] dump_stack_lvl from print_report+0x158/0x528 [ 50.149261] print_report from kasan_report+0xdc/0x118 [ 50.149291] kasan_report from krealloc_less_oob_helper+0xd18/0xea4 [ 50.149291] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 50.149322] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.149353] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 50.149383] kthread from ret_from_fork+0x14/0x20 [ 50.149414] Exception stack(0xf23cbfb0 to 0xf23cbff8) [ 50.149414] bfa0: 00000000 00000000 00000000 00000000 [ 50.149444] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 50.149444] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 50.149475] [ 50.255554] Allocated by task 214: [ 50.258972] kasan_save_track+0x30/0x5c [ 50.262847] __kasan_krealloc+0xf4/0x140 [ 50.266815] krealloc_noprof+0x104/0x2e4 [ 50.270751] krealloc_less_oob_helper+0x1d8/0xea4 [ 50.275512] kunit_try_run_case+0x22c/0x5a8 [ 50.279724] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 50.285247] kthread+0x464/0x810 [ 50.288513] ret_from_fork+0x14/0x20 [ 50.292114] [ 50.293609] The buggy address belongs to the object at cb2d1a00 [ 50.293609] which belongs to the cache kmalloc-256 of size 256 [ 50.305511] The buggy address is located 17 bytes to the right of [ 50.305511] allocated 201-byte region [cb2d1a00, cb2d1ac9) [ 50.317230] [ 50.318725] The buggy address belongs to the physical page: [ 50.324340] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0 [ 50.331604] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.339324] flags: 0x40(head|zone=0) [ 50.342926] page_type: f5(slab) [ 50.346099] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.354217] raw: 00000000 [ 50.356872] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.365112] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.373352] head: 00000000 00000002 [ 50.376861] page dumped because: kasan: bad access detected [ 50.382446] [ 50.383972] Memory state around the buggy address: [ 50.388793] cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.395355] cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.401916] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 50.408477] ^ [ 50.413940] cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.420501] cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.427062] ================================================================== [ 51.799621] ================================================================== [ 51.806884] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4 [ 51.814514] Write of size 1 at addr ccb3a0d0 by task kunit_try_catch/218 [ 51.821258] [ 51.822784] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 51.822814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.822814] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.822814] Call trace: [ 51.822814] unwind_backtrace from show_stack+0x18/0x1c [ 51.822845] show_stack from dump_stack_lvl+0x70/0x90 [ 51.822875] dump_stack_lvl from print_report+0x158/0x528 [ 51.822906] print_report from kasan_report+0xdc/0x118 [ 51.822937] kasan_report from krealloc_less_oob_helper+0xdd0/0xea4 [ 51.822937] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.822967] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.822998] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.823028] kthread from ret_from_fork+0x14/0x20 [ 51.823028] Exception stack(0xf23ebfb0 to 0xf23ebff8) [ 51.823059] bfa0: 00000000 00000000 00000000 00000000 [ 51.823059] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.823089] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.823089] [ 51.929199] The buggy address belongs to the physical page: [ 51.934814] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38 [ 51.942077] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.949768] flags: 0x40(head|zone=0) [ 51.953369] page_type: f8(unknown) [ 51.956817] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.964965] raw: 00000000 [ 51.967590] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.975830] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.984069] head: 00000000 00000004 [ 51.987579] page dumped because: kasan: bad access detected [ 51.993194] [ 51.994689] Memory state around the buggy address: [ 51.999511] ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.006072] ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.012634] >ccb3a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 52.019226] ^ [ 52.024383] ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.030975] ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.037536] ================================================================== [ 49.817962] ================================================================== [ 49.825225] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4 [ 49.832855] Write of size 1 at addr cb2d1ad0 by task kunit_try_catch/214 [ 49.839599] [ 49.841094] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 49.841125] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 49.841125] Hardware name: Generic DRA74X (Flattened Device Tree) [ 49.841156] Call trace: [ 49.841156] unwind_backtrace from show_stack+0x18/0x1c [ 49.841186] show_stack from dump_stack_lvl+0x70/0x90 [ 49.841186] dump_stack_lvl from print_report+0x158/0x528 [ 49.841217] print_report from kasan_report+0xdc/0x118 [ 49.841247] kasan_report from krealloc_less_oob_helper+0xdd0/0xea4 [ 49.841278] krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 49.841308] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.841308] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 49.841339] kthread from ret_from_fork+0x14/0x20 [ 49.841369] Exception stack(0xf23cbfb0 to 0xf23cbff8) [ 49.841369] bfa0: 00000000 00000000 00000000 00000000 [ 49.841400] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 49.841400] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 49.841430] [ 49.947509] Allocated by task 214: [ 49.950927] kasan_save_track+0x30/0x5c [ 49.954803] __kasan_krealloc+0xf4/0x140 [ 49.958770] krealloc_noprof+0x104/0x2e4 [ 49.962707] krealloc_less_oob_helper+0x1d8/0xea4 [ 49.967468] kunit_try_run_case+0x22c/0x5a8 [ 49.971679] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.977203] kthread+0x464/0x810 [ 49.980468] ret_from_fork+0x14/0x20 [ 49.984069] [ 49.985565] The buggy address belongs to the object at cb2d1a00 [ 49.985565] which belongs to the cache kmalloc-256 of size 256 [ 49.997467] The buggy address is located 7 bytes to the right of [ 49.997467] allocated 201-byte region [cb2d1a00, cb2d1ac9) [ 50.009094] [ 50.010589] The buggy address belongs to the physical page: [ 50.016204] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0 [ 50.023468] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.031188] flags: 0x40(head|zone=0) [ 50.034790] page_type: f5(slab) [ 50.037963] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.046112] raw: 00000000 [ 50.048736] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 50.056976] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff [ 50.065216] head: 00000000 00000002 [ 50.068725] page dumped because: kasan: bad access detected [ 50.074310] [ 50.075836] Memory state around the buggy address: [ 50.080657] cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.087219] cb2d1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.093780] >cb2d1a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 50.100372] ^ [ 50.105529] cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.112091] cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.118682] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 49.196197] ================================================================== [ 49.203491] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x72c/0x808 [ 49.211120] Write of size 1 at addr cb2d18f0 by task kunit_try_catch/212 [ 49.217864] [ 49.219360] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 49.219390] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 49.219390] Hardware name: Generic DRA74X (Flattened Device Tree) [ 49.219421] Call trace: [ 49.219421] unwind_backtrace from show_stack+0x18/0x1c [ 49.219451] show_stack from dump_stack_lvl+0x70/0x90 [ 49.219451] dump_stack_lvl from print_report+0x158/0x528 [ 49.219482] print_report from kasan_report+0xdc/0x118 [ 49.219512] kasan_report from krealloc_more_oob_helper+0x72c/0x808 [ 49.219543] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 49.219543] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.219573] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 49.219604] kthread from ret_from_fork+0x14/0x20 [ 49.219635] Exception stack(0xf23c3fb0 to 0xf23c3ff8) [ 49.219635] 3fa0: 00000000 00000000 00000000 00000000 [ 49.219665] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 49.219665] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 49.219696] [ 49.325775] Allocated by task 212: [ 49.329193] kasan_save_track+0x30/0x5c [ 49.333068] __kasan_krealloc+0xf4/0x140 [ 49.337005] krealloc_noprof+0x104/0x2e4 [ 49.340972] krealloc_more_oob_helper+0x1e0/0x808 [ 49.345733] kunit_try_run_case+0x22c/0x5a8 [ 49.349945] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.355468] kthread+0x464/0x810 [ 49.358734] ret_from_fork+0x14/0x20 [ 49.362335] [ 49.363830] The buggy address belongs to the object at cb2d1800 [ 49.363830] which belongs to the cache kmalloc-256 of size 256 [ 49.375732] The buggy address is located 5 bytes to the right of [ 49.375732] allocated 235-byte region [cb2d1800, cb2d18eb) [ 49.387359] [ 49.388854] The buggy address belongs to the physical page: [ 49.394470] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0 [ 49.401733] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.409454] flags: 0x40(head|zone=0) [ 49.413055] page_type: f5(slab) [ 49.416229] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.424377] raw: 00000000 [ 49.427001] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.435241] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff [ 49.443481] head: 00000000 00000002 [ 49.446990] page dumped because: kasan: bad access detected [ 49.452575] [ 49.454101] Memory state around the buggy address: [ 49.458923] cb2d1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.465484] cb2d1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.472045] >cb2d1880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 49.478637] ^ [ 49.484832] cb2d1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.491424] cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.497985] ================================================================== [ 48.883544] ================================================================== [ 48.894409] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x77c/0x808 [ 48.902038] Write of size 1 at addr cb2d18eb by task kunit_try_catch/212 [ 48.908782] [ 48.910278] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 48.910308] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 48.910339] Hardware name: Generic DRA74X (Flattened Device Tree) [ 48.910339] Call trace: [ 48.910339] unwind_backtrace from show_stack+0x18/0x1c [ 48.910369] show_stack from dump_stack_lvl+0x70/0x90 [ 48.910400] dump_stack_lvl from print_report+0x158/0x528 [ 48.910430] print_report from kasan_report+0xdc/0x118 [ 48.910430] kasan_report from krealloc_more_oob_helper+0x77c/0x808 [ 48.910461] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 48.910491] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.910522] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 48.910552] kthread from ret_from_fork+0x14/0x20 [ 48.910552] Exception stack(0xf23c3fb0 to 0xf23c3ff8) [ 48.910583] 3fa0: 00000000 00000000 00000000 00000000 [ 48.910583] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 48.910614] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 48.910614] [ 49.016723] Allocated by task 212: [ 49.020141] kasan_save_track+0x30/0x5c [ 49.024017] __kasan_krealloc+0xf4/0x140 [ 49.027954] krealloc_noprof+0x104/0x2e4 [ 49.031921] krealloc_more_oob_helper+0x1e0/0x808 [ 49.036651] kunit_try_run_case+0x22c/0x5a8 [ 49.040893] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 49.046417] kthread+0x464/0x810 [ 49.049652] ret_from_fork+0x14/0x20 [ 49.053253] [ 49.054779] The buggy address belongs to the object at cb2d1800 [ 49.054779] which belongs to the cache kmalloc-256 of size 256 [ 49.066680] The buggy address is located 0 bytes to the right of [ 49.066680] allocated 235-byte region [cb2d1800, cb2d18eb) [ 49.078308] [ 49.079803] The buggy address belongs to the physical page: [ 49.085418] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0 [ 49.092681] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.100402] flags: 0x40(head|zone=0) [ 49.104003] page_type: f5(slab) [ 49.107177] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.115325] raw: 00000000 [ 49.117950] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 49.126190] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff [ 49.134429] head: 00000000 00000002 [ 49.137939] page dumped because: kasan: bad access detected [ 49.143554] [ 49.145050] Memory state around the buggy address: [ 49.149871] cb2d1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.156433] cb2d1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.163024] >cb2d1880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 49.169586] ^ [ 49.175537] cb2d1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.182098] cb2d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.188690] ================================================================== [ 51.052917] ================================================================== [ 51.064056] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x77c/0x808 [ 51.071685] Write of size 1 at addr ccb3a0eb by task kunit_try_catch/216 [ 51.078430] [ 51.079925] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 51.079956] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.079956] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.079986] Call trace: [ 51.079986] unwind_backtrace from show_stack+0x18/0x1c [ 51.080017] show_stack from dump_stack_lvl+0x70/0x90 [ 51.080017] dump_stack_lvl from print_report+0x158/0x528 [ 51.080047] print_report from kasan_report+0xdc/0x118 [ 51.080078] kasan_report from krealloc_more_oob_helper+0x77c/0x808 [ 51.080108] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.080139] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.080139] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.080169] kthread from ret_from_fork+0x14/0x20 [ 51.080200] Exception stack(0xf23dbfb0 to 0xf23dbff8) [ 51.080200] bfa0: 00000000 00000000 00000000 00000000 [ 51.080230] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.080230] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.080261] [ 51.186340] The buggy address belongs to the physical page: [ 51.191955] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38 [ 51.199218] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.206939] flags: 0x40(head|zone=0) [ 51.210540] page_type: f8(unknown) [ 51.213958] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.222106] raw: 00000000 [ 51.224761] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.233001] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.241241] head: 00000000 00000004 [ 51.244750] page dumped because: kasan: bad access detected [ 51.250335] [ 51.251831] Memory state around the buggy address: [ 51.256652] ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.263244] ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.269805] >ccb3a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 51.276367] ^ [ 51.282348] ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.288909] ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.295471] ================================================================== [ 51.302978] ================================================================== [ 51.310272] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x72c/0x808 [ 51.317871] Write of size 1 at addr ccb3a0f0 by task kunit_try_catch/216 [ 51.324645] [ 51.326141] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 51.326171] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 51.326171] Hardware name: Generic DRA74X (Flattened Device Tree) [ 51.326171] Call trace: [ 51.326202] unwind_backtrace from show_stack+0x18/0x1c [ 51.326202] show_stack from dump_stack_lvl+0x70/0x90 [ 51.326232] dump_stack_lvl from print_report+0x158/0x528 [ 51.326263] print_report from kasan_report+0xdc/0x118 [ 51.326293] kasan_report from krealloc_more_oob_helper+0x72c/0x808 [ 51.326293] krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8 [ 51.326324] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 51.326354] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 51.326385] kthread from ret_from_fork+0x14/0x20 [ 51.326416] Exception stack(0xf23dbfb0 to 0xf23dbff8) [ 51.326416] bfa0: 00000000 00000000 00000000 00000000 [ 51.326446] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 51.326446] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 51.326446] [ 51.432556] The buggy address belongs to the physical page: [ 51.438171] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38 [ 51.445434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.453155] flags: 0x40(head|zone=0) [ 51.456756] page_type: f8(unknown) [ 51.460174] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.468322] raw: 00000000 [ 51.470977] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 51.479217] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 51.487426] head: 00000000 00000004 [ 51.490936] page dumped because: kasan: bad access detected [ 51.496551] [ 51.498046] Memory state around the buggy address: [ 51.502868] ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.509460] ccb3a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.516021] >ccb3a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 51.522583] ^ [ 51.528808] ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.535369] ccb3a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 51.541961] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 48.663543] ================================================================== [ 48.678680] BUG: KASAN: use-after-free in page_alloc_uaf+0x368/0x39c [ 48.685089] Read of size 1 at addr ccbb0000 by task kunit_try_catch/210 [ 48.691741] [ 48.693237] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 48.693267] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 48.693298] Hardware name: Generic DRA74X (Flattened Device Tree) [ 48.693298] Call trace: [ 48.693298] unwind_backtrace from show_stack+0x18/0x1c [ 48.693328] show_stack from dump_stack_lvl+0x70/0x90 [ 48.693359] dump_stack_lvl from print_report+0x158/0x528 [ 48.693389] print_report from kasan_report+0xdc/0x118 [ 48.693389] kasan_report from page_alloc_uaf+0x368/0x39c [ 48.693420] page_alloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 48.693450] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.693481] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 48.693481] kthread from ret_from_fork+0x14/0x20 [ 48.693511] Exception stack(0xf23bbfb0 to 0xf23bbff8) [ 48.693542] bfa0: 00000000 00000000 00000000 00000000 [ 48.693542] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 48.693572] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 48.693572] [ 48.797912] The buggy address belongs to the physical page: [ 48.803527] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cbb0 [ 48.810791] flags: 0x0(zone=0) [ 48.813873] page_type: f0(buddy) [ 48.817138] raw: 00000000 c69ddb10 c69ddb10 00000000 00000000 00000004 f0000000 00000000 [ 48.825286] raw: 00000000 [ 48.827911] page dumped because: kasan: bad access detected [ 48.833526] [ 48.835021] Memory state around the buggy address: [ 48.839843] ccbaff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.846435] ccbaff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.852996] >ccbb0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.859558] ^ [ 48.862121] ccbb0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.868682] ccbb0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.875244] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-kmalloc_large_invalid_free
[ 48.403320] ================================================================== [ 48.414367] BUG: KASAN: invalid-free in kmalloc_large_invalid_free+0x14c/0x2dc [ 48.421630] Free of addr ccb38001 by task kunit_try_catch/206 [ 48.427429] [ 48.428924] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 48.428955] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 48.428985] Hardware name: Generic DRA74X (Flattened Device Tree) [ 48.428985] Call trace: [ 48.428985] unwind_backtrace from show_stack+0x18/0x1c [ 48.429016] show_stack from dump_stack_lvl+0x70/0x90 [ 48.429046] dump_stack_lvl from print_report+0x158/0x528 [ 48.429077] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 48.429077] kasan_report_invalid_free from free_large_kmalloc+0x54/0x194 [ 48.429107] free_large_kmalloc from kmalloc_large_invalid_free+0x14c/0x2dc [ 48.429138] kmalloc_large_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 48.429168] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.429199] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 48.429199] kthread from ret_from_fork+0x14/0x20 [ 48.429229] Exception stack(0xf239bfb0 to 0xf239bff8) [ 48.429260] bfa0: 00000000 00000000 00000000 00000000 [ 48.429260] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 48.429290] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 48.429290] [ 48.544128] The buggy address belongs to the physical page: [ 48.549743] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38 [ 48.557006] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.564697] flags: 0x40(head|zone=0) [ 48.568328] page_type: f8(unknown) [ 48.571746] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 48.579895] raw: 00000000 [ 48.582519] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 48.590759] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 48.598999] head: 00000000 00000004 [ 48.602508] page dumped because: kasan: bad access detected [ 48.608123] [ 48.609619] Memory state around the buggy address: [ 48.614440] ccb37f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.621002] ccb37f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.627593] >ccb38000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.634155] ^ [ 48.636718] ccb38080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.643280] ccb38100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.649841] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 48.189483] ================================================================== [ 48.201049] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x358/0x388 [ 48.207702] Read of size 1 at addr ccb38000 by task kunit_try_catch/204 [ 48.214355] [ 48.215881] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 48.215911] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 48.215911] Hardware name: Generic DRA74X (Flattened Device Tree) [ 48.215911] Call trace: [ 48.215942] unwind_backtrace from show_stack+0x18/0x1c [ 48.215942] show_stack from dump_stack_lvl+0x70/0x90 [ 48.215972] dump_stack_lvl from print_report+0x158/0x528 [ 48.216003] print_report from kasan_report+0xdc/0x118 [ 48.216033] kasan_report from kmalloc_large_uaf+0x358/0x388 [ 48.216033] kmalloc_large_uaf from kunit_try_run_case+0x22c/0x5a8 [ 48.216064] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 48.216094] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 48.216125] kthread from ret_from_fork+0x14/0x20 [ 48.216125] Exception stack(0xf238bfb0 to 0xf238bff8) [ 48.216156] bfa0: 00000000 00000000 00000000 00000000 [ 48.216186] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 48.216186] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 48.216186] [ 48.321075] The buggy address belongs to the physical page: [ 48.326690] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38 [ 48.333953] flags: 0x0(zone=0) [ 48.337036] raw: 00000000 eebc8474 e8a4cbcc 00000000 00000000 00000000 ffffffff 00000000 [ 48.345184] raw: 00000000 [ 48.347808] page dumped because: kasan: bad access detected [ 48.353424] [ 48.354919] Memory state around the buggy address: [ 48.359741] ccb37f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.366333] ccb37f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.372894] >ccb38000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.379455] ^ [ 48.382019] ccb38080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.388580] ccb38100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.395141] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 47.941772] ================================================================== [ 47.953155] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e8/0x330 [ 47.960693] Write of size 1 at addr ccb3a00a by task kunit_try_catch/202 [ 47.967437] [ 47.968933] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 47.968963] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 47.968994] Hardware name: Generic DRA74X (Flattened Device Tree) [ 47.968994] Call trace: [ 47.968994] unwind_backtrace from show_stack+0x18/0x1c [ 47.969024] show_stack from dump_stack_lvl+0x70/0x90 [ 47.969055] dump_stack_lvl from print_report+0x158/0x528 [ 47.969085] print_report from kasan_report+0xdc/0x118 [ 47.969085] kasan_report from kmalloc_large_oob_right+0x2e8/0x330 [ 47.969116] kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 47.969146] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.969177] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 47.969207] kthread from ret_from_fork+0x14/0x20 [ 47.969207] Exception stack(0xf237bfb0 to 0xf237bff8) [ 47.969238] bfa0: 00000000 00000000 00000000 00000000 [ 47.969238] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 47.969268] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 47.969268] [ 48.075195] The buggy address belongs to the physical page: [ 48.080810] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb38 [ 48.088073] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.095794] flags: 0x40(head|zone=0) [ 48.099395] page_type: f8(unknown) [ 48.102813] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 48.110961] raw: 00000000 [ 48.113616] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 48.121826] head: 00000000 00000002 eebc83e1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 48.130065] head: 00000000 00000004 [ 48.133575] page dumped because: kasan: bad access detected [ 48.139190] [ 48.140686] Memory state around the buggy address: [ 48.145507] ccb39f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.152099] ccb39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.158660] >ccb3a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 48.165222] ^ [ 48.168029] ccb3a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 48.174621] ccb3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 48.181182] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 47.635650] ================================================================== [ 47.647827] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x324/0x37c [ 47.655181] Write of size 1 at addr cbaedf00 by task kunit_try_catch/200 [ 47.661926] [ 47.663452] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 47.663482] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 47.663482] Hardware name: Generic DRA74X (Flattened Device Tree) [ 47.663482] Call trace: [ 47.663482] unwind_backtrace from show_stack+0x18/0x1c [ 47.663513] show_stack from dump_stack_lvl+0x70/0x90 [ 47.663543] dump_stack_lvl from print_report+0x158/0x528 [ 47.663574] print_report from kasan_report+0xdc/0x118 [ 47.663604] kasan_report from kmalloc_big_oob_right+0x324/0x37c [ 47.663604] kmalloc_big_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 47.663635] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.663665] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 47.663696] kthread from ret_from_fork+0x14/0x20 [ 47.663696] Exception stack(0xf236bfb0 to 0xf236bff8) [ 47.663726] bfa0: 00000000 00000000 00000000 00000000 [ 47.663726] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 47.663757] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 47.663757] [ 47.769348] Allocated by task 200: [ 47.772766] kasan_save_track+0x30/0x5c [ 47.776641] __kasan_kmalloc+0x8c/0x94 [ 47.780426] kmalloc_big_oob_right+0xd0/0x37c [ 47.784820] kunit_try_run_case+0x22c/0x5a8 [ 47.789031] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.794555] kthread+0x464/0x810 [ 47.797790] ret_from_fork+0x14/0x20 [ 47.801422] [ 47.802917] The buggy address belongs to the object at cbaec000 [ 47.802917] which belongs to the cache kmalloc-8k of size 8192 [ 47.814819] The buggy address is located 0 bytes to the right of [ 47.814819] allocated 7936-byte region [cbaec000, cbaedf00) [ 47.826538] [ 47.828033] The buggy address belongs to the physical page: [ 47.833648] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8bae8 [ 47.840911] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.848632] flags: 0x40(head|zone=0) [ 47.852233] page_type: f5(slab) [ 47.855407] raw: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000 [ 47.863525] raw: 00000000 [ 47.866180] head: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000 [ 47.874420] head: 00000000 00000003 eeba38a1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 47.882659] head: 00000000 00000008 [ 47.886169] page dumped because: kasan: bad access detected [ 47.891754] [ 47.893280] Memory state around the buggy address: [ 47.898101] cbaede00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.904663] cbaede80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.911224] >cbaedf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.917816] ^ [ 47.920349] cbaedf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.926910] cbaee000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.933502] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 47.060974] ================================================================== [ 47.072448] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c0/0x548 [ 47.080596] Write of size 1 at addr cc228778 by task kunit_try_catch/198 [ 47.087341] [ 47.088867] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 47.088897] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 47.088897] Hardware name: Generic DRA74X (Flattened Device Tree) [ 47.088897] Call trace: [ 47.088897] unwind_backtrace from show_stack+0x18/0x1c [ 47.088928] show_stack from dump_stack_lvl+0x70/0x90 [ 47.088958] dump_stack_lvl from print_report+0x158/0x528 [ 47.088989] print_report from kasan_report+0xdc/0x118 [ 47.089019] kasan_report from kmalloc_track_caller_oob_right+0x4c0/0x548 [ 47.089019] kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 47.089050] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.089080] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 47.089111] kthread from ret_from_fork+0x14/0x20 [ 47.089111] Exception stack(0xf2363fb0 to 0xf2363ff8) [ 47.089141] 3fa0: 00000000 00000000 00000000 00000000 [ 47.089141] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 47.089172] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 47.089172] [ 47.196319] Allocated by task 198: [ 47.199737] kasan_save_track+0x30/0x5c [ 47.203613] __kasan_kmalloc+0x8c/0x94 [ 47.207397] __kmalloc_node_track_caller_noprof+0x210/0x470 [ 47.213012] kmalloc_track_caller_oob_right+0x98/0x548 [ 47.218200] kunit_try_run_case+0x22c/0x5a8 [ 47.222412] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.227935] kthread+0x464/0x810 [ 47.231201] ret_from_fork+0x14/0x20 [ 47.234802] [ 47.236297] The buggy address belongs to the object at cc228700 [ 47.236297] which belongs to the cache kmalloc-128 of size 128 [ 47.248199] The buggy address is located 0 bytes to the right of [ 47.248199] allocated 120-byte region [cc228700, cc228778) [ 47.259826] [ 47.261352] The buggy address belongs to the physical page: [ 47.266937] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 47.274230] flags: 0x0(zone=0) [ 47.277313] page_type: f5(slab) [ 47.280456] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 47.288604] raw: 00000000 [ 47.291259] page dumped because: kasan: bad access detected [ 47.296844] [ 47.298370] Memory state around the buggy address: [ 47.303192] cc228600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.309753] cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.316314] >cc228700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 47.322906] ^ [ 47.329376] cc228780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.335937] cc228800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.342529] ================================================================== [ 47.350158] ================================================================== [ 47.357421] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x548 [ 47.365600] Write of size 1 at addr cc228878 by task kunit_try_catch/198 [ 47.372344] [ 47.373840] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 47.373870] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 47.373870] Hardware name: Generic DRA74X (Flattened Device Tree) [ 47.373901] Call trace: [ 47.373901] unwind_backtrace from show_stack+0x18/0x1c [ 47.373931] show_stack from dump_stack_lvl+0x70/0x90 [ 47.373931] dump_stack_lvl from print_report+0x158/0x528 [ 47.373962] print_report from kasan_report+0xdc/0x118 [ 47.373992] kasan_report from kmalloc_track_caller_oob_right+0x4c8/0x548 [ 47.374023] kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 47.374053] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.374053] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 47.374084] kthread from ret_from_fork+0x14/0x20 [ 47.374114] Exception stack(0xf2363fb0 to 0xf2363ff8) [ 47.374114] 3fa0: 00000000 00000000 00000000 00000000 [ 47.374145] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 47.374145] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 47.374176] [ 47.481323] Allocated by task 198: [ 47.484741] kasan_save_track+0x30/0x5c [ 47.488616] __kasan_kmalloc+0x8c/0x94 [ 47.492370] __kmalloc_node_track_caller_noprof+0x210/0x470 [ 47.498016] kmalloc_track_caller_oob_right+0x1c4/0x548 [ 47.503265] kunit_try_run_case+0x22c/0x5a8 [ 47.507476] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 47.513031] kthread+0x464/0x810 [ 47.516265] ret_from_fork+0x14/0x20 [ 47.519866] [ 47.521362] The buggy address belongs to the object at cc228800 [ 47.521362] which belongs to the cache kmalloc-128 of size 128 [ 47.533264] The buggy address is located 0 bytes to the right of [ 47.533264] allocated 120-byte region [cc228800, cc228878) [ 47.544921] [ 47.546417] The buggy address belongs to the physical page: [ 47.552032] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 47.559295] flags: 0x0(zone=0) [ 47.562377] page_type: f5(slab) [ 47.565551] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 47.573669] raw: 00000000 [ 47.576324] page dumped because: kasan: bad access detected [ 47.581939] [ 47.583435] Memory state around the buggy address: [ 47.588256] cc228700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.594818] cc228780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.601409] >cc228800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 47.607971] ^ [ 47.614440] cc228880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.621032] cc228900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.627593] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 46.756042] ================================================================== [ 46.766998] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x380/0x3c4 [ 46.774444] Read of size 1 at addr ccb57000 by task kunit_try_catch/196 [ 46.781097] [ 46.782592] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 46.782623] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 46.782653] Hardware name: Generic DRA74X (Flattened Device Tree) [ 46.782653] Call trace: [ 46.782653] unwind_backtrace from show_stack+0x18/0x1c [ 46.782684] show_stack from dump_stack_lvl+0x70/0x90 [ 46.782714] dump_stack_lvl from print_report+0x158/0x528 [ 46.782745] print_report from kasan_report+0xdc/0x118 [ 46.782745] kasan_report from kmalloc_node_oob_right+0x380/0x3c4 [ 46.782775] kmalloc_node_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 46.782806] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.782836] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 46.782867] kthread from ret_from_fork+0x14/0x20 [ 46.782867] Exception stack(0xf22f3fb0 to 0xf22f3ff8) [ 46.782897] 3fa0: 00000000 00000000 00000000 00000000 [ 46.782897] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 46.782928] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 46.782928] [ 46.888671] Allocated by task 196: [ 46.892120] kasan_save_track+0x30/0x5c [ 46.895965] __kasan_kmalloc+0x8c/0x94 [ 46.899749] kmalloc_node_oob_right+0xd4/0x3c4 [ 46.904235] kunit_try_run_case+0x22c/0x5a8 [ 46.908447] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.913970] kthread+0x464/0x810 [ 46.917236] ret_from_fork+0x14/0x20 [ 46.920837] [ 46.922332] The buggy address belongs to the object at ccb56000 [ 46.922332] which belongs to the cache kmalloc-4k of size 4096 [ 46.934234] The buggy address is located 0 bytes to the right of [ 46.934234] allocated 4096-byte region [ccb56000, ccb57000) [ 46.945953] [ 46.947479] The buggy address belongs to the physical page: [ 46.953063] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cb50 [ 46.960357] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.968048] flags: 0x40(head|zone=0) [ 46.971649] page_type: f5(slab) [ 46.974822] raw: 00000040 c7001900 00000122 00000000 00000000 80040004 f5000000 00000000 [ 46.982971] raw: 00000000 [ 46.985626] head: 00000040 c7001900 00000122 00000000 00000000 80040004 f5000000 00000000 [ 46.993865] head: 00000000 00000003 eebc8741 ffffffff 00000000 ffffffff 00000000 ffffffff [ 47.002075] head: 00000000 00000008 [ 47.005584] page dumped because: kasan: bad access detected [ 47.011199] [ 47.012695] Memory state around the buggy address: [ 47.017517] ccb56f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.024108] ccb56f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.030670] >ccb57000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.037231] ^ [ 47.039794] ccb57080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.046356] ccb57100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.052947] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 46.446166] ================================================================== [ 46.457214] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x378/0x3b8 [ 46.464141] Read of size 1 at addr cc22a47f by task kunit_try_catch/194 [ 46.470794] [ 46.472320] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 46.472320] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 46.472351] Hardware name: Generic DRA74X (Flattened Device Tree) [ 46.472351] Call trace: [ 46.472351] unwind_backtrace from show_stack+0x18/0x1c [ 46.472381] show_stack from dump_stack_lvl+0x70/0x90 [ 46.472412] dump_stack_lvl from print_report+0x158/0x528 [ 46.472442] print_report from kasan_report+0xdc/0x118 [ 46.472473] kasan_report from kmalloc_oob_left+0x378/0x3b8 [ 46.472473] kmalloc_oob_left from kunit_try_run_case+0x22c/0x5a8 [ 46.472503] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.472534] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 46.472564] kthread from ret_from_fork+0x14/0x20 [ 46.472564] Exception stack(0xf22e3fb0 to 0xf22e3ff8) [ 46.472595] 3fa0: 00000000 00000000 00000000 00000000 [ 46.472595] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 46.472625] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 46.472625] [ 46.577331] Allocated by task 1: [ 46.580566] kasan_save_track+0x30/0x5c [ 46.584442] __kasan_kmalloc+0x8c/0x94 [ 46.588226] __kmalloc_node_track_caller_noprof+0x210/0x470 [ 46.593841] kvasprintf+0xac/0x128 [ 46.597290] __kthread_create_on_node+0x1d4/0x41c [ 46.602020] kthread_create_on_node+0x88/0xbc [ 46.606414] kunit_try_catch_run+0xe0/0x844 [ 46.610626] kunit_run_case_catch_errors+0x17c/0x350 [ 46.615631] kunit_run_tests+0xa58/0xd34 [ 46.619598] __kunit_test_suites_init+0x314/0x4b4 [ 46.624328] kunit_run_all_tests+0x13c/0x4b0 [ 46.628631] kernel_init_freeable+0x498/0x4d8 [ 46.633026] kernel_init+0x20/0x14c [ 46.636535] ret_from_fork+0x14/0x20 [ 46.640167] [ 46.641662] The buggy address belongs to the object at cc22a400 [ 46.641662] which belongs to the cache kmalloc-64 of size 64 [ 46.653381] The buggy address is located 104 bytes to the right of [ 46.653381] allocated 23-byte region [cc22a400, cc22a417) [ 46.665100] [ 46.666595] The buggy address belongs to the physical page: [ 46.672210] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22a [ 46.679473] flags: 0x0(zone=0) [ 46.682556] page_type: f5(slab) [ 46.685729] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 46.693878] raw: 00000000 [ 46.696533] page dumped because: kasan: bad access detected [ 46.702117] [ 46.703613] Memory state around the buggy address: [ 46.708465] cc22a300: 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc [ 46.715026] cc22a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.721588] >cc22a400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.728149] ^ [ 46.734649] cc22a480: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.741210] cc22a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.747802] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 46.174499] ================================================================== [ 46.181762] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6c0/0x744 [ 46.188781] Read of size 1 at addr cc228680 by task kunit_try_catch/192 [ 46.195434] [ 46.196960] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 46.196960] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 46.196990] Hardware name: Generic DRA74X (Flattened Device Tree) [ 46.196990] Call trace: [ 46.196990] unwind_backtrace from show_stack+0x18/0x1c [ 46.197021] show_stack from dump_stack_lvl+0x70/0x90 [ 46.197052] dump_stack_lvl from print_report+0x158/0x528 [ 46.197082] print_report from kasan_report+0xdc/0x118 [ 46.197082] kasan_report from kmalloc_oob_right+0x6c0/0x744 [ 46.197113] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 46.197143] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.197174] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 46.197204] kthread from ret_from_fork+0x14/0x20 [ 46.197204] Exception stack(0xf22d3fb0 to 0xf22d3ff8) [ 46.197235] 3fa0: 00000000 00000000 00000000 00000000 [ 46.197235] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 46.197265] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 46.197265] [ 46.302154] Allocated by task 192: [ 46.305572] kasan_save_track+0x30/0x5c [ 46.309417] __kasan_kmalloc+0x8c/0x94 [ 46.313201] kmalloc_oob_right+0xcc/0x744 [ 46.317260] kunit_try_run_case+0x22c/0x5a8 [ 46.321472] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.326995] kthread+0x464/0x810 [ 46.330261] ret_from_fork+0x14/0x20 [ 46.333862] [ 46.335357] The buggy address belongs to the object at cc228600 [ 46.335357] which belongs to the cache kmalloc-128 of size 128 [ 46.347259] The buggy address is located 13 bytes to the right of [ 46.347259] allocated 115-byte region [cc228600, cc228673) [ 46.358978] [ 46.360504] The buggy address belongs to the physical page: [ 46.366088] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 46.373382] flags: 0x0(zone=0) [ 46.376434] page_type: f5(slab) [ 46.379608] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 46.387756] raw: 00000000 [ 46.390411] page dumped because: kasan: bad access detected [ 46.395996] [ 46.397491] Memory state around the buggy address: [ 46.402313] cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.408905] cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.415466] >cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.422027] ^ [ 46.424591] cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.431152] cc228780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.437713] ================================================================== [ 45.899719] ================================================================== [ 45.907012] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x660/0x744 [ 45.914001] Write of size 1 at addr cc228678 by task kunit_try_catch/192 [ 45.920776] [ 45.922271] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 45.922302] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 45.922302] Hardware name: Generic DRA74X (Flattened Device Tree) [ 45.922332] Call trace: [ 45.922332] unwind_backtrace from show_stack+0x18/0x1c [ 45.922363] show_stack from dump_stack_lvl+0x70/0x90 [ 45.922363] dump_stack_lvl from print_report+0x158/0x528 [ 45.922393] print_report from kasan_report+0xdc/0x118 [ 45.922424] kasan_report from kmalloc_oob_right+0x660/0x744 [ 45.922454] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 45.922454] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.922485] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 45.922515] kthread from ret_from_fork+0x14/0x20 [ 45.922546] Exception stack(0xf22d3fb0 to 0xf22d3ff8) [ 45.922546] 3fa0: 00000000 00000000 00000000 00000000 [ 45.922576] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 45.922576] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 45.922607] [ 46.027465] Allocated by task 192: [ 46.030883] kasan_save_track+0x30/0x5c [ 46.034759] __kasan_kmalloc+0x8c/0x94 [ 46.038543] kmalloc_oob_right+0xcc/0x744 [ 46.042602] kunit_try_run_case+0x22c/0x5a8 [ 46.046813] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 46.052337] kthread+0x464/0x810 [ 46.055603] ret_from_fork+0x14/0x20 [ 46.059204] [ 46.060699] The buggy address belongs to the object at cc228600 [ 46.060699] which belongs to the cache kmalloc-128 of size 128 [ 46.072601] The buggy address is located 5 bytes to the right of [ 46.072601] allocated 115-byte region [cc228600, cc228673) [ 46.084228] [ 46.085723] The buggy address belongs to the physical page: [ 46.091339] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 46.098602] flags: 0x0(zone=0) [ 46.101684] page_type: f5(slab) [ 46.104858] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 46.113006] raw: 00000000 [ 46.115661] page dumped because: kasan: bad access detected [ 46.121246] [ 46.122741] Memory state around the buggy address: [ 46.127593] cc228500: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fc fc [ 46.134155] cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.140716] >cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.147277] ^ [ 46.153778] cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.160339] cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.166900] ================================================================== [ 45.621215] ================================================================== [ 45.628509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6a4/0x744 [ 45.635528] Write of size 1 at addr cc228673 by task kunit_try_catch/192 [ 45.642272] [ 45.643768] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G W N 6.15.0-rc3 #1 NONE [ 45.643798] Tainted: [W]=WARN, [N]=TEST [ 45.643829] Hardware name: Generic DRA74X (Flattened Device Tree) [ 45.643829] Call trace: [ 45.643829] unwind_backtrace from show_stack+0x18/0x1c [ 45.643859] show_stack from dump_stack_lvl+0x70/0x90 [ 45.643890] dump_stack_lvl from print_report+0x158/0x528 [ 45.643920] print_report from kasan_report+0xdc/0x118 [ 45.643951] kasan_report from kmalloc_oob_right+0x6a4/0x744 [ 45.643951] kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 45.643981] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.644012] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 45.644042] kthread from ret_from_fork+0x14/0x20 [ 45.644073] Exception stack(0xf22d3fb0 to 0xf22d3ff8) [ 45.644073] 3fa0: 00000000 00000000 00000000 00000000 [ 45.644104] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 45.644104] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 45.644134] [ 45.747772] Allocated by task 192: [ 45.751220] kasan_save_track+0x30/0x5c [ 45.755065] __kasan_kmalloc+0x8c/0x94 [ 45.758850] kmalloc_oob_right+0xcc/0x744 [ 45.762908] kunit_try_run_case+0x22c/0x5a8 [ 45.767120] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 45.772644] kthread+0x464/0x810 [ 45.775909] ret_from_fork+0x14/0x20 [ 45.779510] [ 45.781005] The buggy address belongs to the object at cc228600 [ 45.781005] which belongs to the cache kmalloc-128 of size 128 [ 45.792907] The buggy address is located 0 bytes to the right of [ 45.792907] allocated 115-byte region [cc228600, cc228673) [ 45.804534] [ 45.806060] The buggy address belongs to the physical page: [ 45.811645] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 45.818939] flags: 0x0(zone=0) [ 45.822021] page_type: f5(slab) [ 45.825195] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 45.833312] raw: 00000000 [ 45.835968] page dumped because: kasan: bad access detected [ 45.841583] [ 45.843078] Memory state around the buggy address: [ 45.847900] cc228500: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fc fc [ 45.854461] cc228580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.861053] >cc228600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 45.867614] ^ [ 45.873840] cc228680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.880401] cc228700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.886962] ==================================================================
Failure - log-parser-test/exception-warning-cpu-pid-at-driversbusomap_l3_noc-l3_interrupt_handler
------------[ cut here ]------------ [ 200.396392] WARNING: CPU: 0 PID: 77 at drivers/bus/omap_l3_noc.c:133 l3_interrupt_handler+0x6e0/0xb2c [ 200.400299] # rtc_time64_to_tm_test_date_range_160000.speed: slow [ 200.405700] 44000000.l3-noc:L3 Custom Error: MASTER MPU TARGET L4_PER1_P3 (Read): Data Access in User mode during Functional access [ 200.405731] ok 2 rtc_time64_to_tm_test_date_range_160000 [ 200.412200] Modules linked in: [ 200.412231] CPU: 0 UID: 0 PID: 77 Comm: irq/115-4807000 Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 200.412261] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 200.412261] Hardware name: Generic DRA74X (Flattened Device Tree) [ 200.412292] Call trace: [ 200.412292] unwind_backtrace from show_stack+0x18/0x1c [ 200.412322] show_stack from dump_stack_lvl+0x70/0x90 [ 200.412353] dump_stack_lvl from __warn+0x154/0x2e0 [ 200.412384] __warn from warn_slowpath_fmt+0x200/0x258 [ 200.412414] warn_slowpath_fmt from l3_interrupt_handler+0x6e0/0xb2c [ 200.412445] l3_interrupt_handler from __handle_irq_event_percpu+0x25c/0x5ec [ 200.412475] __handle_irq_event_percpu from handle_irq_event+0x10c/0x268 [ 200.412506] handle_irq_event from handle_fasteoi_irq+0x27c/0x934 [ 200.412536] handle_fasteoi_irq from handle_irq_desc+0x128/0x17c [ 200.412567] handle_irq_desc from gic_handle_irq+0xc8/0x138 [ 200.412597] gic_handle_irq from generic_handle_arch_irq+0x30/0x40 [ 200.412628] generic_handle_arch_irq from call_with_stack+0x18/0x20 [ 200.412658] call_with_stack from __irq_svc+0x90/0xac [ 200.412689] Exception stack(0xf067bd40 to 0xf067bd88) [ 200.412689] bd40: c50b2382 00000028 00000000 00000000 ca84a840 19509509 1950950f 19509508 [ 200.412719] bd60: 00000000 00000007 00000007 c50b2380 00000000 f067bd90 c3331280 c33304b8 [ 200.412750] bd80: 60000113 ffffffff [ 200.412750] __irq_svc from omap_i2c_xfer_data+0xbd4/0x136c [ 200.412780] omap_i2c_xfer_data from omap_i2c_isr_thread+0x18/0x88 [ 200.412811] omap_i2c_isr_thread from irq_thread_fn+0xb8/0x19c [ 200.412841] irq_thread_fn from irq_thread+0x410/0x75c [ 200.412872] irq_thread from kthread+0x464/0x810 [ 200.412902] kthread from ret_from_fork+0x14/0x20 [ 200.412902] Exception stack(0xf067bfb0 to 0xf067bff8) [ 200.412933] bfa0: 00000000 00000000 00000000 00000000 [ 200.412963] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 200.412963] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 200.412994] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale
------------[ cut here ]------------ [ 163.238922] WARNING: CPU: 0 PID: 2952 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x180/0x1d0 [ 163.249114] Modules linked in: [ 163.252288] CPU: 0 UID: 0 PID: 2952 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 163.252319] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 163.252319] Hardware name: Generic DRA74X (Flattened Device Tree) [ 163.252319] Call trace: [ 163.252319] unwind_backtrace from show_stack+0x18/0x1c [ 163.252349] show_stack from dump_stack_lvl+0x70/0x90 [ 163.252380] dump_stack_lvl from __warn+0x154/0x2e0 [ 163.252410] __warn from warn_slowpath_fmt+0x24c/0x258 [ 163.252441] warn_slowpath_fmt from drm_rect_calc_vscale+0x180/0x1d0 [ 163.252441] drm_rect_calc_vscale from drm_test_rect_calc_vscale+0x134/0x2c4 [ 163.252471] drm_test_rect_calc_vscale from kunit_try_run_case+0x22c/0x5a8 [ 163.252502] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 163.252532] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 163.252532] kthread from ret_from_fork+0x14/0x20 [ 163.252563] Exception stack(0xf2393fb0 to 0xf2393ff8) [ 163.252593] 3fa0: 00000000 00000000 00000000 00000000 [ 163.252593] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 163.252593] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 163.252624] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 163.380126] WARNING: CPU: 0 PID: 2954 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x180/0x1d0 [ 163.389709] Modules linked in: [ 163.392791] CPU: 0 UID: 0 PID: 2954 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 163.392822] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 163.392822] Hardware name: Generic DRA74X (Flattened Device Tree) [ 163.392822] Call trace: [ 163.392852] unwind_backtrace from show_stack+0x18/0x1c [ 163.392883] show_stack from dump_stack_lvl+0x70/0x90 [ 163.392883] dump_stack_lvl from __warn+0x154/0x2e0 [ 163.392913] __warn from warn_slowpath_fmt+0x24c/0x258 [ 163.392944] warn_slowpath_fmt from drm_rect_calc_vscale+0x180/0x1d0 [ 163.392944] drm_rect_calc_vscale from drm_test_rect_calc_vscale+0x134/0x2c4 [ 163.392974] drm_test_rect_calc_vscale from kunit_try_run_case+0x22c/0x5a8 [ 163.393005] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 163.393035] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 163.393066] kthread from ret_from_fork+0x14/0x20 [ 163.393066] Exception stack(0xf239bfb0 to 0xf239bff8) [ 163.393096] bfa0: 00000000 00000000 00000000 00000000 [ 163.393096] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 163.393096] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 163.393127] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale
------------[ cut here ]------------ [ 163.060089] WARNING: CPU: 0 PID: 2942 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x178/0x1d0 [ 163.069671] Modules linked in: [ 163.072784] CPU: 0 UID: 0 PID: 2942 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 163.072814] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 163.072814] Hardware name: Generic DRA74X (Flattened Device Tree) [ 163.072845] Call trace: [ 163.072845] unwind_backtrace from show_stack+0x18/0x1c [ 163.072875] show_stack from dump_stack_lvl+0x70/0x90 [ 163.072906] dump_stack_lvl from __warn+0x154/0x2e0 [ 163.072937] __warn from warn_slowpath_fmt+0x24c/0x258 [ 163.072967] warn_slowpath_fmt from drm_rect_calc_hscale+0x178/0x1d0 [ 163.072998] drm_rect_calc_hscale from drm_test_rect_calc_hscale+0x134/0x2c4 [ 163.073028] drm_test_rect_calc_hscale from kunit_try_run_case+0x22c/0x5a8 [ 163.073059] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 163.073089] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 163.073120] kthread from ret_from_fork+0x14/0x20 [ 163.073120] Exception stack(0xf7ae3fb0 to 0xf7ae3ff8) [ 163.073150] 3fa0: 00000000 00000000 00000000 00000000 [ 163.073181] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 163.073181] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 163.073211] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 162.920440] WARNING: CPU: 0 PID: 2940 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x178/0x1d0 [ 162.930053] Modules linked in: [ 162.933166] CPU: 0 UID: 0 PID: 2940 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 162.933197] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 162.933197] Hardware name: Generic DRA74X (Flattened Device Tree) [ 162.933227] Call trace: [ 162.933227] unwind_backtrace from show_stack+0x18/0x1c [ 162.933258] show_stack from dump_stack_lvl+0x70/0x90 [ 162.933288] dump_stack_lvl from __warn+0x154/0x2e0 [ 162.933319] __warn from warn_slowpath_fmt+0x24c/0x258 [ 162.933349] warn_slowpath_fmt from drm_rect_calc_hscale+0x178/0x1d0 [ 162.933380] drm_rect_calc_hscale from drm_test_rect_calc_hscale+0x134/0x2c4 [ 162.933410] drm_test_rect_calc_hscale from kunit_try_run_case+0x22c/0x5a8 [ 162.933441] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 162.933471] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 162.933502] kthread from ret_from_fork+0x14/0x20 [ 162.933532] Exception stack(0xf22dbfb0 to 0xf22dbff8) [ 162.933563] bfa0: 00000000 00000000 00000000 00000000 [ 162.933563] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 162.933593] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 162.933593] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init
------------[ cut here ]------------ [ 161.368530] WARNING: CPU: 0 PID: 2738 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x2f4/0x384 [ 161.378753] Modules linked in: [ 161.381896] CPU: 0 UID: 0 PID: 2738 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 161.381927] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 161.381927] Hardware name: Generic DRA74X (Flattened Device Tree) [ 161.381927] Call trace: [ 161.381958] unwind_backtrace from show_stack+0x18/0x1c [ 161.381988] show_stack from dump_stack_lvl+0x70/0x90 [ 161.382019] dump_stack_lvl from __warn+0x154/0x2e0 [ 161.382049] __warn from warn_slowpath_fmt+0x24c/0x258 [ 161.382080] warn_slowpath_fmt from drm_framebuffer_init+0x2f4/0x384 [ 161.382110] drm_framebuffer_init from drm_test_framebuffer_init_bad_format+0x110/0x24c [ 161.382141] drm_test_framebuffer_init_bad_format from kunit_try_run_case+0x22c/0x5a8 [ 161.382171] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 161.382202] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 161.382232] kthread from ret_from_fork+0x14/0x20 [ 161.382232] Exception stack(0xf7873fb0 to 0xf7873ff8) [ 161.382263] 3fa0: 00000000 00000000 00000000 00000000 [ 161.382293] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 161.382293] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 161.382293] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_free
------------[ cut here ]------------ [ 161.198608] WARNING: CPU: 0 PID: 2734 at drivers/gpu/drm/drm_framebuffer.c:832 drm_framebuffer_free+0x1e0/0x28c [ 161.209228] drm-kunit-mock-device drm_test_framebuffer_free.drm-kunit-mock-device: [drm] drm_WARN_ON(!list_empty(&fb->filp_head)) [ 161.209228] Modules linked in: [ 161.224121] CPU: 0 UID: 0 PID: 2734 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 161.224151] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 161.224151] Hardware name: Generic DRA74X (Flattened Device Tree) [ 161.224151] Call trace: [ 161.224182] unwind_backtrace from show_stack+0x18/0x1c [ 161.224212] show_stack from dump_stack_lvl+0x70/0x90 [ 161.224243] dump_stack_lvl from __warn+0x154/0x2e0 [ 161.224273] __warn from warn_slowpath_fmt+0x200/0x258 [ 161.224304] warn_slowpath_fmt from drm_framebuffer_free+0x1e0/0x28c [ 161.224334] drm_framebuffer_free from drm_test_framebuffer_free+0x1fc/0x5b8 [ 161.224365] drm_test_framebuffer_free from kunit_try_run_case+0x22c/0x5a8 [ 161.224395] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 161.224426] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 161.224456] kthread from ret_from_fork+0x14/0x20 [ 161.224456] Exception stack(0xf785bfb0 to 0xf785bff8) [ 161.224487] bfa0: 00000000 00000000 00000000 00000000 [ 161.224517] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 161.224517] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 161.224548] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register
------------[ cut here ]------------ [ 157.754364] WARNING: CPU: 1 PID: 2172 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0x11c/0x14c [ 157.765258] Modules linked in: [ 157.768371] CPU: 1 UID: 0 PID: 2172 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 157.768402] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 157.768402] Hardware name: Generic DRA74X (Flattened Device Tree) [ 157.768402] Call trace: [ 157.768432] unwind_backtrace from show_stack+0x18/0x1c [ 157.768463] show_stack from dump_stack_lvl+0x70/0x90 [ 157.768463] dump_stack_lvl from __warn+0x154/0x2e0 [ 157.768493] __warn from warn_slowpath_fmt+0x24c/0x258 [ 157.768524] warn_slowpath_fmt from drm_connector_dynamic_register+0x11c/0x14c [ 157.768554] drm_connector_dynamic_register from drm_test_drm_connector_dynamic_register_no_init+0x12c/0x2c4 [ 157.768585] drm_test_drm_connector_dynamic_register_no_init from kunit_try_run_case+0x22c/0x5a8 [ 157.768615] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 157.768615] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 157.768646] kthread from ret_from_fork+0x14/0x20 [ 157.768676] Exception stack(0xf6b93fb0 to 0xf6b93ff8) [ 157.768676] 3fa0: 00000000 00000000 00000000 00000000 [ 157.768707] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 157.768707] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 157.768707] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 157.475769] WARNING: CPU: 1 PID: 2164 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0x11c/0x14c [ 157.486663] Modules linked in: [ 157.489776] CPU: 1 UID: 0 PID: 2164 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 157.489807] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 157.489837] Hardware name: Generic DRA74X (Flattened Device Tree) [ 157.489837] Call trace: [ 157.489837] unwind_backtrace from show_stack+0x18/0x1c [ 157.489868] show_stack from dump_stack_lvl+0x70/0x90 [ 157.489898] dump_stack_lvl from __warn+0x154/0x2e0 [ 157.489929] __warn from warn_slowpath_fmt+0x24c/0x258 [ 157.489959] warn_slowpath_fmt from drm_connector_dynamic_register+0x11c/0x14c [ 157.489959] drm_connector_dynamic_register from drm_test_drm_connector_dynamic_register_early_no_init+0x12c/0x2c4 [ 157.490020] drm_test_drm_connector_dynamic_register_early_no_init from kunit_try_run_case+0x22c/0x5a8 [ 157.490020] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 157.490051] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 157.490081] kthread from ret_from_fork+0x14/0x20 [ 157.490112] Exception stack(0xf6b63fb0 to 0xf6b63ff8) [ 157.490112] 3fa0: 00000000 00000000 00000000 00000000 [ 157.490142] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 157.490142] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 157.490142] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_init_only
------------[ cut here ]------------ [ 154.696990] WARNING: CPU: 1 PID: 1774 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308 [ 154.707611] Modules linked in: [ 154.710937] CPU: 1 UID: 0 PID: 1774 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 154.710968] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 154.710998] Hardware name: Generic DRA74X (Flattened Device Tree) [ 154.710998] Call trace: [ 154.710998] unwind_backtrace from show_stack+0x18/0x1c [ 154.711029] show_stack from dump_stack_lvl+0x70/0x90 [ 154.711059] dump_stack_lvl from __warn+0x154/0x2e0 [ 154.711090] __warn from warn_slowpath_fmt+0x24c/0x258 [ 154.711120] warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308 [ 154.711120] drm_connector_init_only from drmm_connector_init+0x158/0x218 [ 154.711151] drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704 [ 154.711181] drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8 [ 154.711212] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 154.711242] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 154.711242] kthread from ret_from_fork+0x14/0x20 [ 154.711273] Exception stack(0xf648bfb0 to 0xf648bff8) [ 154.711273] bfa0: 00000000 00000000 00000000 00000000 [ 154.711303] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 154.711303] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 154.711334] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 154.238555] WARNING: CPU: 1 PID: 1768 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308 [ 154.248962] Modules linked in: [ 154.252075] CPU: 1 UID: 0 PID: 1768 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 154.252105] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 154.252136] Hardware name: Generic DRA74X (Flattened Device Tree) [ 154.252136] Call trace: [ 154.252136] unwind_backtrace from show_stack+0x18/0x1c [ 154.252197] show_stack from dump_stack_lvl+0x70/0x90 [ 154.252227] dump_stack_lvl from __warn+0x154/0x2e0 [ 154.252258] __warn from warn_slowpath_fmt+0x24c/0x258 [ 154.252288] warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308 [ 154.252319] drm_connector_init_only from drmm_connector_init+0x158/0x218 [ 154.252349] drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704 [ 154.252380] drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8 [ 154.252410] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 154.252441] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 154.252471] kthread from ret_from_fork+0x14/0x20 [ 154.252471] Exception stack(0xf646bfb0 to 0xf646bff8) [ 154.252502] bfa0: 00000000 00000000 00000000 00000000 [ 154.252532] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 154.252532] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 154.252563] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 154.073059] WARNING: CPU: 1 PID: 1766 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308 [ 154.083496] Modules linked in: [ 154.086578] CPU: 1 UID: 0 PID: 1766 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 154.086608] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 154.086639] Hardware name: Generic DRA74X (Flattened Device Tree) [ 154.086639] Call trace: [ 154.086639] unwind_backtrace from show_stack+0x18/0x1c [ 154.086669] show_stack from dump_stack_lvl+0x70/0x90 [ 154.086700] dump_stack_lvl from __warn+0x154/0x2e0 [ 154.086730] __warn from warn_slowpath_fmt+0x24c/0x258 [ 154.086761] warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308 [ 154.086791] drm_connector_init_only from drmm_connector_init+0x158/0x218 [ 154.086791] drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704 [ 154.086822] drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8 [ 154.086853] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 154.086883] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 154.086914] kthread from ret_from_fork+0x14/0x20 [ 154.086914] Exception stack(0xf645bfb0 to 0xf645bff8) [ 154.086944] bfa0: 00000000 00000000 00000000 00000000 [ 154.086944] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 154.086975] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 154.086975] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 154.544433] WARNING: CPU: 1 PID: 1772 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308 [ 154.555053] Modules linked in: [ 154.558166] CPU: 1 UID: 0 PID: 1772 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 154.558197] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 154.558197] Hardware name: Generic DRA74X (Flattened Device Tree) [ 154.558197] Call trace: [ 154.558227] unwind_backtrace from show_stack+0x18/0x1c [ 154.558258] show_stack from dump_stack_lvl+0x70/0x90 [ 154.558258] dump_stack_lvl from __warn+0x154/0x2e0 [ 154.558288] __warn from warn_slowpath_fmt+0x24c/0x258 [ 154.558319] warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308 [ 154.558349] drm_connector_init_only from drmm_connector_init+0x158/0x218 [ 154.558349] drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704 [ 154.558380] drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8 [ 154.558410] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 154.558441] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 154.558471] kthread from ret_from_fork+0x14/0x20 [ 154.558471] Exception stack(0xf6483fb0 to 0xf6483ff8) [ 154.558502] 3fa0: 00000000 00000000 00000000 00000000 [ 154.558502] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 154.558532] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 154.558532] ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ [ 154.391174] WARNING: CPU: 1 PID: 1770 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308 [ 154.401855] Modules linked in: [ 154.404937] CPU: 1 UID: 0 PID: 1770 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 154.404968] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 154.404968] Hardware name: Generic DRA74X (Flattened Device Tree) [ 154.404998] Call trace: [ 154.404998] unwind_backtrace from show_stack+0x18/0x1c [ 154.405029] show_stack from dump_stack_lvl+0x70/0x90 [ 154.405059] dump_stack_lvl from __warn+0x154/0x2e0 [ 154.405090] __warn from warn_slowpath_fmt+0x24c/0x258 [ 154.405090] warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308 [ 154.405120] drm_connector_init_only from drmm_connector_init+0x158/0x218 [ 154.405151] drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704 [ 154.405181] drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8 [ 154.405212] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 154.405212] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 154.405242] kthread from ret_from_fork+0x14/0x20 [ 154.405273] Exception stack(0xf6473fb0 to 0xf6473ff8) [ 154.405273] 3fa0: 00000000 00000000 00000000 00000000 [ 154.405303] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 154.405303] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 154.405334] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 103.225891] WARNING: CPU: 1 PID: 656 at lib/math/int_log.c:120 intlog10+0x10c/0x140 [ 103.234008] Modules linked in: [ 103.237121] CPU: 1 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 103.237152] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 103.237152] Hardware name: Generic DRA74X (Flattened Device Tree) [ 103.237182] Call trace: [ 103.237182] unwind_backtrace from show_stack+0x18/0x1c [ 103.237213] show_stack from dump_stack_lvl+0x70/0x90 [ 103.237243] dump_stack_lvl from __warn+0x154/0x2e0 [ 103.237274] __warn from warn_slowpath_fmt+0x24c/0x258 [ 103.237304] warn_slowpath_fmt from intlog10+0x10c/0x140 [ 103.237335] intlog10 from intlog10_test+0x124/0x258 [ 103.237365] intlog10_test from kunit_try_run_case+0x22c/0x5a8 [ 103.237365] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 103.237396] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 103.237426] kthread from ret_from_fork+0x14/0x20 [ 103.237457] Exception stack(0xf3023fb0 to 0xf3023ff8) [ 103.237487] 3fa0: 00000000 00000000 00000000 00000000 [ 103.237487] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 103.237518] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 103.237518] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 103.038269] WARNING: CPU: 1 PID: 638 at lib/math/int_log.c:63 intlog2+0xf8/0x12c [ 103.045776] Modules linked in: [ 103.048858] CPU: 1 UID: 0 PID: 638 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 103.048889] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 103.048919] Hardware name: Generic DRA74X (Flattened Device Tree) [ 103.048919] Call trace: [ 103.048919] unwind_backtrace from show_stack+0x18/0x1c [ 103.048950] show_stack from dump_stack_lvl+0x70/0x90 [ 103.048980] dump_stack_lvl from __warn+0x154/0x2e0 [ 103.049011] __warn from warn_slowpath_fmt+0x24c/0x258 [ 103.049011] warn_slowpath_fmt from intlog2+0xf8/0x12c [ 103.049041] intlog2 from intlog2_test+0x124/0x258 [ 103.049072] intlog2_test from kunit_try_run_case+0x22c/0x5a8 [ 103.049072] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 103.049102] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 103.049133] kthread from ret_from_fork+0x14/0x20 [ 103.049163] Exception stack(0xf2f9bfb0 to 0xf2f9bff8) [ 103.049163] bfa0: 00000000 00000000 00000000 00000000 [ 103.049194] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 103.049194] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 103.049194] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-unable-to-handle-kernel-paging-request-at-virtual-address-when-read
--- cut here --- [ 101.396911] Unable to handle kernel paging request at virtual address 9f000000 when read [ 101.405670] [9f000000] *pgd=80000080206003, *pmd=00000000 [ 101.411163] Internal error: Oops: 206 [#1] SMP ARM [ 101.415985] Modules linked in: [ 101.419067] CPU: 0 UID: 0 PID: 532 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 101.428802] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 101.433898] Hardware name: Generic DRA74X (Flattened Device Tree) [ 101.440032] PC is at kunit_test_null_dereference+0x74/0x1a0 [ 101.445648] LR is at kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 101.451873] pc : [<c1645858>] lr : [<c163b110>] psr: 60000013 [ 101.458190] sp : f2ce3e48 ip : 41b58ab3 fp : ccf55450 [ 101.463439] r10: b89eaa8a r9 : cceb5400 r8 : c16457e4 [ 101.468688] r7 : b86c89f0 r6 : cb644f84 r5 : bd59c7cc r4 : f0013b40 [ 101.475280] r3 : f2ce3ec0 r2 : ccf55240 r1 : 9f000000 r0 : 00000000 [ 101.481842] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 101.489044] Control: 30c5387d Table: 80203000 DAC: fffffffd [ 101.494812] Register r0 information: NULL pointer [ 101.499542] Register r1 information: non-paged memory [ 101.504638] Register r2 information: slab task_struct start ccf55240 pointer offset 0 size 2880 [ 101.513427] Register r3 information: 4-page vmalloc region starting at 0xf2ce0000 allocated at kernel_clone+0x174/0x794 [ 101.524291] Register r4 information: 4-page vmalloc region starting at 0xf0010000 allocated at kernel_clone+0x174/0x794 [ 101.535156] Register r5 information: non-paged memory [ 101.540252] Register r6 information: slab kmalloc-64 start cb644f80 pointer offset 4 size 64 [ 101.548797] Register r7 information: non-paged memory [ 101.553863] Register r8 information: non-slab/vmalloc memory [ 101.559570] Register r9 information: slab kmalloc-128 start cceb5400 pointer offset 0 size 128 [ 101.568267] Register r10 information: non-paged memory [ 101.573455] Register r11 information: slab task_struct start ccf55240 pointer offset 528 size 2880 [ 101.582519] Register r12 information: non-paged memory [ 101.587677] Process kunit_try_catch (pid: 532, stack limit = 0xfc87c6b5) [ 101.594421] Stack: (0xf2ce3e48 to 0xf2ce4000) [ 101.598815] 3e40: c05d832c 00000000 00000000 00000000 00000000 00000000 [ 101.607055] 3e60: 41b58ab3 c57895a4 c16457e4 c5cc1574 c69e64e0 c431e200 22d73000 ccf55a54 [ 101.615295] 3e80: ccf55240 cceb5400 199eaa88 c088f7f8 ccf55a54 60000013 00000003 c69e56e0 [ 101.623535] 3ea0: ccf55a54 ccf55240 cceb5400 c431e200 c69e56e4 00000007 00000003 c0592d28 [ 101.631744] 3ec0: 00000003 ccf55440 00000003 199d6a80 00000000 f5199995 f2ce3ef4 cb644f80 [ 101.639984] 3ee0: 00000004 c163b110 cceb5400 ccf55240 f2ce3f80 c163b04c cb644f80 c0593b68 [ 101.648223] 3f00: 22d73000 00000000 22d73000 00000000 f2ce3f8c c088f7f8 e8a37500 c5cc4500 [ 101.656463] 3f20: 41b58ab3 c572ed4c c0593704 22d73000 00000000 c05be8d0 00000000 00000000 [ 101.664672] 3f40: fefefefe 00000000 00000000 00000000 c05cbb24 c5cc1574 c69e64e0 c0544ac8 [ 101.672912] 3f60: 22d73000 00000000 00000000 00000000 00000000 c088f7f8 ccf46780 ccf559f4 [ 101.681152] 3f80: ccf55240 f5199995 00000000 cb647080 c0593704 00000000 00000000 00000000 [ 101.689392] 3fa0: 00000000 00000000 00000000 c0400254 00000000 00000000 00000000 00000000 [ 101.697601] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 101.705841] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000 [ 101.714080] Call trace: [ 101.714080] kunit_test_null_dereference from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 101.725036] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 101.731811] kthread from ret_from_fork+0x14/0x20 [ 101.736541] Exception stack(0xf2ce3fb0 to 0xf2ce3ff8) [ 101.741638] 3fa0: 00000000 00000000 00000000 00000000 [ 101.749877] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 101.758117] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 101.764770] Code: e1a04000 e5920678 e58d008c e3a00000 (e1d110d0) [ 101.770935] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-kerneltraceftrace-ftrace_bug
------------[ cut here ]------------ [ 0.000000] WARNING: CPU: 0 PID: 0 at kernel/trace/ftrace.c:2213 ftrace_bug+0x548/0x5b8 [ 0.000000] Modules linked in: [ 0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.15.0-rc3 #1 NONE [ 0.000000] Tainted: [W]=WARN [ 0.000000] Hardware name: Generic DRA74X (Flattened Device Tree) [ 0.000000] Call trace: [ 0.000000] unwind_backtrace from show_stack+0x18/0x1c [ 0.000000] show_stack from dump_stack_lvl+0x70/0x90 [ 0.000000] dump_stack_lvl from __warn+0x154/0x2e0 [ 0.000000] __warn from warn_slowpath_fmt+0x24c/0x258 [ 0.000000] warn_slowpath_fmt from ftrace_bug+0x548/0x5b8 [ 0.000000] ftrace_bug from ftrace_process_locs+0xe88/0xeb0 [ 0.000000] ftrace_process_locs from ftrace_init+0x6c/0x140 [ 0.000000] ftrace_init from start_kernel+0x1a8/0x3b8 [ 0.000000] start_kernel from 0x0 [ 0.000000] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-archarmkernelinsn-__arm_gen_branch
------------[ cut here ]------------ [ 0.000000] WARNING: CPU: 0 PID: 0 at arch/arm/kernel/insn.c:48 __arm_gen_branch+0x74/0x7c [ 0.000000] Modules linked in: [ 0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.15.0-rc3 #1 NONE [ 0.000000] Hardware name: Generic DRA74X (Flattened Device Tree) [ 0.000000] Call trace: [ 0.000000] unwind_backtrace from show_stack+0x18/0x1c [ 0.000000] show_stack from dump_stack_lvl+0x70/0x90 [ 0.000000] dump_stack_lvl from __warn+0x154/0x2e0 [ 0.000000] __warn from warn_slowpath_fmt+0x24c/0x258 [ 0.000000] warn_slowpath_fmt from __arm_gen_branch+0x74/0x7c [ 0.000000] __arm_gen_branch from ftrace_make_nop+0x10c/0x24c [ 0.000000] ftrace_make_nop from ftrace_process_locs+0x490/0xeb0 [ 0.000000] ftrace_process_locs from ftrace_init+0x6c/0x140 [ 0.000000] ftrace_init from start_kernel+0x1a8/0x3b8 [ 0.000000] start_kernel from 0x0 [ 0.000000] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/uboot-action
(no logs available)
Failure - lava/uboot-commands
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)