Date
April 20, 2025, 11:09 p.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 20.855668] ================================================================== [ 20.856747] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 20.857459] Write of size 1 at addr ffff00000d73600a by task kunit_try_catch/200 [ 20.858143] [ 20.858308] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.858358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.858372] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.858390] Call trace: [ 20.858401] show_stack+0x20/0x38 (C) [ 20.858434] dump_stack_lvl+0x8c/0xd0 [ 20.858465] print_report+0x118/0x608 [ 20.858495] kasan_report+0xdc/0x128 [ 20.858522] __asan_report_store1_noabort+0x20/0x30 [ 20.858556] kmalloc_large_oob_right+0x278/0x2b8 [ 20.858591] kunit_try_run_case+0x170/0x3f0 [ 20.858626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.858665] kthread+0x328/0x630 [ 20.858699] ret_from_fork+0x10/0x20 [ 20.858731] [ 20.864361] The buggy address belongs to the physical page: [ 20.864878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd734 [ 20.865601] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.866306] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.866957] page_type: f8(unknown) [ 20.867293] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.868008] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.868722] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.869444] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.870167] head: 03fffe0000000002 fffffdffc035cd01 00000000ffffffff 00000000ffffffff [ 20.870890] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.871604] page dumped because: kasan: bad access detected [ 20.872118] [ 20.872271] Memory state around the buggy address: [ 20.872719] ffff00000d735f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.873384] ffff00000d735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.874049] >ffff00000d736000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.874710] ^ [ 20.875045] ffff00000d736080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.875710] ffff00000d736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.876371] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 21.524925] ================================================================== [ 21.525977] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 21.526680] Write of size 8 at addr ffff0000015aae71 by task kunit_try_catch/230 [ 21.527367] [ 21.527532] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.527584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.527598] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.527616] Call trace: [ 21.527627] show_stack+0x20/0x38 (C) [ 21.527662] dump_stack_lvl+0x8c/0xd0 [ 21.527693] print_report+0x118/0x608 [ 21.527722] kasan_report+0xdc/0x128 [ 21.527750] kasan_check_range+0x100/0x1a8 [ 21.527781] __asan_memset+0x34/0x78 [ 21.527811] kmalloc_oob_memset_8+0x150/0x2f8 [ 21.527845] kunit_try_run_case+0x170/0x3f0 [ 21.527880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.527920] kthread+0x328/0x630 [ 21.527954] ret_from_fork+0x10/0x20 [ 21.527987] [ 21.533842] Allocated by task 230: [ 21.534168] kasan_save_stack+0x3c/0x68 [ 21.534542] kasan_save_track+0x20/0x40 [ 21.534913] kasan_save_alloc_info+0x40/0x58 [ 21.535325] __kasan_kmalloc+0xd4/0xd8 [ 21.535689] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.536129] kmalloc_oob_memset_8+0xb0/0x2f8 [ 21.536545] kunit_try_run_case+0x170/0x3f0 [ 21.536952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.537476] kthread+0x328/0x630 [ 21.537799] ret_from_fork+0x10/0x20 [ 21.538149] [ 21.538302] The buggy address belongs to the object at ffff0000015aae00 [ 21.538302] which belongs to the cache kmalloc-128 of size 128 [ 21.539436] The buggy address is located 113 bytes inside of [ 21.539436] allocated 120-byte region [ffff0000015aae00, ffff0000015aae78) [ 21.540580] [ 21.540734] The buggy address belongs to the physical page: [ 21.541251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x15aa [ 21.541977] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.542590] page_type: f5(slab) [ 21.542904] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.543620] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.544327] page dumped because: kasan: bad access detected [ 21.544842] [ 21.544995] Memory state around the buggy address: [ 21.545444] ffff0000015aad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.546110] ffff0000015aad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.546777] >ffff0000015aae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.547439] ^ [ 21.548095] ffff0000015aae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.548761] ffff0000015aaf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.549423] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 21.497493] ================================================================== [ 21.498571] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 21.499261] Write of size 4 at addr ffff00000df93575 by task kunit_try_catch/228 [ 21.499945] [ 21.500110] CPU: 2 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.500158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.500172] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.500189] Call trace: [ 21.500201] show_stack+0x20/0x38 (C) [ 21.500234] dump_stack_lvl+0x8c/0xd0 [ 21.500265] print_report+0x118/0x608 [ 21.500294] kasan_report+0xdc/0x128 [ 21.500321] kasan_check_range+0x100/0x1a8 [ 21.500352] __asan_memset+0x34/0x78 [ 21.500382] kmalloc_oob_memset_4+0x150/0x300 [ 21.500416] kunit_try_run_case+0x170/0x3f0 [ 21.500451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.500490] kthread+0x328/0x630 [ 21.500524] ret_from_fork+0x10/0x20 [ 21.500556] [ 21.506409] Allocated by task 228: [ 21.506735] kasan_save_stack+0x3c/0x68 [ 21.507108] kasan_save_track+0x20/0x40 [ 21.507479] kasan_save_alloc_info+0x40/0x58 [ 21.507892] __kasan_kmalloc+0xd4/0xd8 [ 21.508254] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.508695] kmalloc_oob_memset_4+0xb0/0x300 [ 21.509110] kunit_try_run_case+0x170/0x3f0 [ 21.509516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.510039] kthread+0x328/0x630 [ 21.510362] ret_from_fork+0x10/0x20 [ 21.510711] [ 21.510866] The buggy address belongs to the object at ffff00000df93500 [ 21.510866] which belongs to the cache kmalloc-128 of size 128 [ 21.511999] The buggy address is located 117 bytes inside of [ 21.511999] allocated 120-byte region [ffff00000df93500, ffff00000df93578) [ 21.513143] [ 21.513297] The buggy address belongs to the physical page: [ 21.513814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93 [ 21.514541] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.515154] page_type: f5(slab) [ 21.515469] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.516184] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.516892] page dumped because: kasan: bad access detected [ 21.517408] [ 21.517560] Memory state around the buggy address: [ 21.518009] ffff00000df93400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.518677] ffff00000df93480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.519344] >ffff00000df93500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.520006] ^ [ 21.520663] ffff00000df93580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.521329] ffff00000df93600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.521992] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 56.302299] ================================================================== [ 56.302996] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 56.302996] [ 56.303770] Use-after-free read at 0x(____ptrval____) (in kfence-#155): [ 56.304379] test_krealloc+0x51c/0x830 [ 56.304739] kunit_try_run_case+0x170/0x3f0 [ 56.305141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.305658] kthread+0x328/0x630 [ 56.305978] ret_from_fork+0x10/0x20 [ 56.306324] [ 56.306477] kfence-#155: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 56.306477] [ 56.307349] allocated by task 391 on cpu 1 at 56.302204s (0.005143s ago): [ 56.307987] test_alloc+0x29c/0x628 [ 56.308322] test_krealloc+0xc0/0x830 [ 56.308673] kunit_try_run_case+0x170/0x3f0 [ 56.309072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.309587] kthread+0x328/0x630 [ 56.309903] ret_from_fork+0x10/0x20 [ 56.310247] [ 56.310398] freed by task 391 on cpu 1 at 56.302235s (0.008160s ago): [ 56.311004] krealloc_noprof+0x148/0x360 [ 56.311376] test_krealloc+0x1dc/0x830 [ 56.311735] kunit_try_run_case+0x170/0x3f0 [ 56.312134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.312650] kthread+0x328/0x630 [ 56.312965] ret_from_fork+0x10/0x20 [ 56.313310] [ 56.313471] CPU: 1 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 56.314380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.314768] Hardware name: Radxa ROCK Pi 4B (DT) [ 56.315196] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 56.233994] ================================================================== [ 56.234664] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 56.234664] [ 56.235534] Use-after-free read at 0x(____ptrval____) (in kfence-#154): [ 56.236126] test_memcache_typesafe_by_rcu+0x280/0x560 [ 56.236592] kunit_try_run_case+0x170/0x3f0 [ 56.236979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.237477] kthread+0x328/0x630 [ 56.237780] ret_from_fork+0x10/0x20 [ 56.238111] [ 56.238253] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 56.238253] [ 56.239065] allocated by task 389 on cpu 5 at 56.197774s (0.041290s ago): [ 56.239679] test_alloc+0x230/0x628 [ 56.240000] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 56.240464] kunit_try_run_case+0x170/0x3f0 [ 56.240847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.241343] kthread+0x328/0x630 [ 56.241643] ret_from_fork+0x10/0x20 [ 56.241972] [ 56.242112] freed by task 389 on cpu 5 at 56.202312s (0.039799s ago): [ 56.242694] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 56.243158] kunit_try_run_case+0x170/0x3f0 [ 56.243540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.244037] kthread+0x328/0x630 [ 56.244336] ret_from_fork+0x10/0x20 [ 56.244665] [ 56.244812] CPU: 5 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 56.245698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.246070] Hardware name: Radxa ROCK Pi 4B (DT) [ 56.246480] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 33.012423] ================================================================== [ 33.013535] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 33.013535] [ 33.014403] Invalid read at 0x(____ptrval____): [ 33.014849] test_invalid_access+0xdc/0x1f0 [ 33.015268] kunit_try_run_case+0x170/0x3f0 [ 33.015689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.016225] kthread+0x328/0x630 [ 33.016563] ret_from_fork+0x10/0x20 [ 33.016925] [ 33.017101] CPU: 0 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 33.018127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.018534] Hardware name: Radxa ROCK Pi 4B (DT) [ 33.018979] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 32.789981] ================================================================== [ 32.790651] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.790651] [ 32.791498] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#150): [ 32.792398] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.792865] kunit_try_run_case+0x170/0x3f0 [ 32.793245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.793735] kthread+0x328/0x630 [ 32.794032] ret_from_fork+0x10/0x20 [ 32.794356] [ 32.794494] kfence-#150: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 32.794494] [ 32.795344] allocated by task 379 on cpu 4 at 32.789927s (0.005417s ago): [ 32.795950] test_alloc+0x29c/0x628 [ 32.796264] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 32.796722] kunit_try_run_case+0x170/0x3f0 [ 32.797098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.797588] kthread+0x328/0x630 [ 32.797881] ret_from_fork+0x10/0x20 [ 32.798202] [ 32.798341] freed by task 379 on cpu 4 at 32.789937s (0.008403s ago): [ 32.798917] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.799382] kunit_try_run_case+0x170/0x3f0 [ 32.799759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.800249] kthread+0x328/0x630 [ 32.800542] ret_from_fork+0x10/0x20 [ 32.800864] [ 32.801009] CPU: 4 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 32.801887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.802259] Hardware name: Radxa ROCK Pi 4B (DT) [ 32.802669] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 32.581955] ================================================================== [ 32.582633] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 32.582633] [ 32.583495] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#148): [ 32.584160] test_kmalloc_aligned_oob_read+0x238/0x468 [ 32.584621] kunit_try_run_case+0x170/0x3f0 [ 32.585002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.585494] kthread+0x328/0x630 [ 32.585792] ret_from_fork+0x10/0x20 [ 32.586117] [ 32.586256] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 32.586256] [ 32.587106] allocated by task 377 on cpu 4 at 32.581925s (0.005180s ago): [ 32.587714] test_alloc+0x29c/0x628 [ 32.588028] test_kmalloc_aligned_oob_read+0x100/0x468 [ 32.588486] kunit_try_run_case+0x170/0x3f0 [ 32.588862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.589352] kthread+0x328/0x630 [ 32.589645] ret_from_fork+0x10/0x20 [ 32.589968] [ 32.590111] CPU: 4 UID: 0 PID: 377 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 32.590989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.591362] Hardware name: Radxa ROCK Pi 4B (DT) [ 32.591773] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 28.109930] ================================================================== [ 28.110599] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 28.110599] [ 28.111332] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#105): [ 28.112233] test_corruption+0x278/0x378 [ 28.112587] kunit_try_run_case+0x170/0x3f0 [ 28.112967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.113457] kthread+0x328/0x630 [ 28.113754] ret_from_fork+0x10/0x20 [ 28.114079] [ 28.114217] kfence-#105: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 28.114217] [ 28.115068] allocated by task 365 on cpu 4 at 28.109876s (0.005190s ago): [ 28.115673] test_alloc+0x29c/0x628 [ 28.115987] test_corruption+0xdc/0x378 [ 28.116332] kunit_try_run_case+0x170/0x3f0 [ 28.116708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.117198] kthread+0x328/0x630 [ 28.117491] ret_from_fork+0x10/0x20 [ 28.117814] [ 28.117951] freed by task 365 on cpu 4 at 28.109885s (0.008064s ago): [ 28.118527] test_corruption+0x278/0x378 [ 28.118878] kunit_try_run_case+0x170/0x3f0 [ 28.119254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.119743] kthread+0x328/0x630 [ 28.120036] ret_from_fork+0x10/0x20 [ 28.120358] [ 28.120501] CPU: 4 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 28.121379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.121752] Hardware name: Radxa ROCK Pi 4B (DT) [ 28.122162] ================================================================== [ 28.318030] ================================================================== [ 28.318696] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 28.318696] [ 28.319432] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#107): [ 28.320340] test_corruption+0x120/0x378 [ 28.320696] kunit_try_run_case+0x170/0x3f0 [ 28.321078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.321572] kthread+0x328/0x630 [ 28.321871] ret_from_fork+0x10/0x20 [ 28.322197] [ 28.322336] kfence-#107: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 28.322336] [ 28.323143] allocated by task 367 on cpu 4 at 28.317992s (0.005151s ago): [ 28.323751] test_alloc+0x230/0x628 [ 28.324068] test_corruption+0xdc/0x378 [ 28.324413] kunit_try_run_case+0x170/0x3f0 [ 28.324790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.325281] kthread+0x328/0x630 [ 28.325576] ret_from_fork+0x10/0x20 [ 28.325899] [ 28.326038] freed by task 367 on cpu 4 at 28.318000s (0.008037s ago): [ 28.326616] test_corruption+0x120/0x378 [ 28.326969] kunit_try_run_case+0x170/0x3f0 [ 28.327346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.327837] kthread+0x328/0x630 [ 28.328131] ret_from_fork+0x10/0x20 [ 28.328455] [ 28.328600] CPU: 4 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 28.329480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.329852] Hardware name: Radxa ROCK Pi 4B (DT) [ 28.330264] ================================================================== [ 28.213943] ================================================================== [ 28.214608] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 28.214608] [ 28.215340] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#106): [ 28.215964] test_corruption+0x284/0x378 [ 28.216316] kunit_try_run_case+0x170/0x3f0 [ 28.216695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.217186] kthread+0x328/0x630 [ 28.217481] ret_from_fork+0x10/0x20 [ 28.217805] [ 28.217943] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 28.217943] [ 28.218792] allocated by task 365 on cpu 4 at 28.213893s (0.004898s ago): [ 28.219397] test_alloc+0x29c/0x628 [ 28.219711] test_corruption+0x198/0x378 [ 28.220062] kunit_try_run_case+0x170/0x3f0 [ 28.220438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.220928] kthread+0x328/0x630 [ 28.221220] ret_from_fork+0x10/0x20 [ 28.221543] [ 28.221680] freed by task 365 on cpu 4 at 28.213903s (0.007776s ago): [ 28.222256] test_corruption+0x284/0x378 [ 28.222607] kunit_try_run_case+0x170/0x3f0 [ 28.222982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.223471] kthread+0x328/0x630 [ 28.223763] ret_from_fork+0x10/0x20 [ 28.224085] [ 28.224228] CPU: 4 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 28.225106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.225478] Hardware name: Radxa ROCK Pi 4B (DT) [ 28.225888] ================================================================== [ 28.421941] ================================================================== [ 28.422611] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 28.422611] [ 28.423343] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#108): [ 28.423966] test_corruption+0x1d8/0x378 [ 28.424319] kunit_try_run_case+0x170/0x3f0 [ 28.424699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.425190] kthread+0x328/0x630 [ 28.425487] ret_from_fork+0x10/0x20 [ 28.425812] [ 28.425950] kfence-#108: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 28.425950] [ 28.426755] allocated by task 367 on cpu 4 at 28.421892s (0.004862s ago): [ 28.427359] test_alloc+0x230/0x628 [ 28.427672] test_corruption+0x198/0x378 [ 28.428024] kunit_try_run_case+0x170/0x3f0 [ 28.428399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.428890] kthread+0x328/0x630 [ 28.429183] ret_from_fork+0x10/0x20 [ 28.429504] [ 28.429641] freed by task 367 on cpu 4 at 28.421901s (0.007739s ago): [ 28.430216] test_corruption+0x1d8/0x378 [ 28.430568] kunit_try_run_case+0x170/0x3f0 [ 28.430943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.431432] kthread+0x328/0x630 [ 28.431725] ret_from_fork+0x10/0x20 [ 28.432047] [ 28.432189] CPU: 4 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 28.433068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.433439] Hardware name: Radxa ROCK Pi 4B (DT) [ 28.433849] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 27.486100] ================================================================== [ 27.486764] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 27.486764] [ 27.487505] Invalid free of 0x(____ptrval____) (in kfence-#99): [ 27.488032] test_invalid_addr_free+0xec/0x238 [ 27.488431] kunit_try_run_case+0x170/0x3f0 [ 27.488811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.489303] kthread+0x328/0x630 [ 27.489601] ret_from_fork+0x10/0x20 [ 27.489925] [ 27.490063] kfence-#99: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 27.490063] [ 27.490860] allocated by task 363 on cpu 4 at 27.486065s (0.004794s ago): [ 27.491464] test_alloc+0x230/0x628 [ 27.491777] test_invalid_addr_free+0xd4/0x238 [ 27.492175] kunit_try_run_case+0x170/0x3f0 [ 27.492551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.493041] kthread+0x328/0x630 [ 27.493335] ret_from_fork+0x10/0x20 [ 27.493657] [ 27.493801] CPU: 4 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.494679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.495052] Hardware name: Radxa ROCK Pi 4B (DT) [ 27.495462] ================================================================== [ 27.382040] ================================================================== [ 27.382709] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 27.382709] [ 27.383466] Invalid free of 0x(____ptrval____) (in kfence-#98): [ 27.384000] test_invalid_addr_free+0x1ac/0x238 [ 27.384414] kunit_try_run_case+0x170/0x3f0 [ 27.384801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.385300] kthread+0x328/0x630 [ 27.385603] ret_from_fork+0x10/0x20 [ 27.385934] [ 27.386076] kfence-#98: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 27.386076] [ 27.386927] allocated by task 361 on cpu 4 at 27.382002s (0.004923s ago): [ 27.387539] test_alloc+0x29c/0x628 [ 27.387860] test_invalid_addr_free+0xd4/0x238 [ 27.388264] kunit_try_run_case+0x170/0x3f0 [ 27.388647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.389144] kthread+0x328/0x630 [ 27.389444] ret_from_fork+0x10/0x20 [ 27.389772] [ 27.389920] CPU: 4 UID: 0 PID: 361 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.390808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.391185] Hardware name: Radxa ROCK Pi 4B (DT) [ 27.391601] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 27.174074] ================================================================== [ 27.174741] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 27.174741] [ 27.175449] Invalid free of 0x(____ptrval____) (in kfence-#96): [ 27.175979] test_double_free+0x1bc/0x238 [ 27.176345] kunit_try_run_case+0x170/0x3f0 [ 27.176728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.177224] kthread+0x328/0x630 [ 27.177525] ret_from_fork+0x10/0x20 [ 27.177853] [ 27.177994] kfence-#96: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 27.177994] [ 27.178840] allocated by task 357 on cpu 4 at 27.174020s (0.004819s ago): [ 27.179451] test_alloc+0x29c/0x628 [ 27.179768] test_double_free+0xd4/0x238 [ 27.180124] kunit_try_run_case+0x170/0x3f0 [ 27.180503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.180996] kthread+0x328/0x630 [ 27.181295] ret_from_fork+0x10/0x20 [ 27.181619] [ 27.181759] freed by task 357 on cpu 4 at 27.174029s (0.007729s ago): [ 27.182339] test_double_free+0x1ac/0x238 [ 27.182702] kunit_try_run_case+0x170/0x3f0 [ 27.183082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.183575] kthread+0x328/0x630 [ 27.183871] ret_from_fork+0x10/0x20 [ 27.184198] [ 27.184344] CPU: 4 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.185227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.185602] Hardware name: Radxa ROCK Pi 4B (DT) [ 27.186016] ================================================================== [ 27.278141] ================================================================== [ 27.278809] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 27.278809] [ 27.279514] Invalid free of 0x(____ptrval____) (in kfence-#97): [ 27.280043] test_double_free+0x100/0x238 [ 27.280406] kunit_try_run_case+0x170/0x3f0 [ 27.280787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.281281] kthread+0x328/0x630 [ 27.281579] ret_from_fork+0x10/0x20 [ 27.281905] [ 27.282044] kfence-#97: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 27.282044] [ 27.282843] allocated by task 359 on cpu 4 at 27.278093s (0.004749s ago): [ 27.283450] test_alloc+0x230/0x628 [ 27.283766] test_double_free+0xd4/0x238 [ 27.284119] kunit_try_run_case+0x170/0x3f0 [ 27.284497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.284987] kthread+0x328/0x630 [ 27.285282] ret_from_fork+0x10/0x20 [ 27.285606] [ 27.285746] freed by task 359 on cpu 4 at 27.278101s (0.007643s ago): [ 27.286322] test_double_free+0xf0/0x238 [ 27.286676] kunit_try_run_case+0x170/0x3f0 [ 27.287053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.287544] kthread+0x328/0x630 [ 27.287839] ret_from_fork+0x10/0x20 [ 27.288162] [ 27.288307] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.289188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.289562] Hardware name: Radxa ROCK Pi 4B (DT) [ 27.289973] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 26.758046] ================================================================== [ 26.758715] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 26.758715] [ 26.759546] Use-after-free read at 0x(____ptrval____) (in kfence-#92): [ 26.760128] test_use_after_free_read+0x114/0x248 [ 26.760555] kunit_try_run_case+0x170/0x3f0 [ 26.760938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.761433] kthread+0x328/0x630 [ 26.761733] ret_from_fork+0x10/0x20 [ 26.762061] [ 26.762201] kfence-#92: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 26.762201] [ 26.763047] allocated by task 349 on cpu 4 at 26.758006s (0.005040s ago): [ 26.763659] test_alloc+0x29c/0x628 [ 26.763978] test_use_after_free_read+0xd0/0x248 [ 26.764393] kunit_try_run_case+0x170/0x3f0 [ 26.764774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.765268] kthread+0x328/0x630 [ 26.765564] ret_from_fork+0x10/0x20 [ 26.765889] [ 26.766030] freed by task 349 on cpu 4 at 26.758015s (0.008014s ago): [ 26.766612] test_use_after_free_read+0x1c0/0x248 [ 26.767035] kunit_try_run_case+0x170/0x3f0 [ 26.767415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.767907] kthread+0x328/0x630 [ 26.768205] ret_from_fork+0x10/0x20 [ 26.768531] [ 26.768676] CPU: 4 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.769559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.769933] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.770346] ================================================================== [ 26.862109] ================================================================== [ 26.862774] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 26.862774] [ 26.863603] Use-after-free read at 0x(____ptrval____) (in kfence-#93): [ 26.864184] test_use_after_free_read+0x114/0x248 [ 26.864606] kunit_try_run_case+0x170/0x3f0 [ 26.864987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.865479] kthread+0x328/0x630 [ 26.865776] ret_from_fork+0x10/0x20 [ 26.866100] [ 26.866238] kfence-#93: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 26.866238] [ 26.867035] allocated by task 351 on cpu 4 at 26.862070s (0.004964s ago): [ 26.867643] test_alloc+0x230/0x628 [ 26.867958] test_use_after_free_read+0xd0/0x248 [ 26.868370] kunit_try_run_case+0x170/0x3f0 [ 26.868746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.869236] kthread+0x328/0x630 [ 26.869529] ret_from_fork+0x10/0x20 [ 26.869851] [ 26.869989] freed by task 351 on cpu 4 at 26.862078s (0.007910s ago): [ 26.870564] test_use_after_free_read+0xf0/0x248 [ 26.870977] kunit_try_run_case+0x170/0x3f0 [ 26.871352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.871842] kthread+0x328/0x630 [ 26.872135] ret_from_fork+0x10/0x20 [ 26.872457] [ 26.872601] CPU: 4 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.873478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.873851] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.874261] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 26.550171] ================================================================== [ 26.550841] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 26.550841] [ 26.551677] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#90): [ 26.552325] test_out_of_bounds_write+0x100/0x240 [ 26.552755] kunit_try_run_case+0x170/0x3f0 [ 26.553141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.553640] kthread+0x328/0x630 [ 26.553943] ret_from_fork+0x10/0x20 [ 26.554273] [ 26.554415] kfence-#90: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 26.554415] [ 26.555264] allocated by task 345 on cpu 4 at 26.550147s (0.005115s ago): [ 26.555878] test_alloc+0x29c/0x628 [ 26.556199] test_out_of_bounds_write+0xc8/0x240 [ 26.556616] kunit_try_run_case+0x170/0x3f0 [ 26.556999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.557496] kthread+0x328/0x630 [ 26.557796] ret_from_fork+0x10/0x20 [ 26.558124] [ 26.558271] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.559159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.559535] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.559950] ================================================================== [ 26.654038] ================================================================== [ 26.654707] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 26.654707] [ 26.655536] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#91): [ 26.656179] test_out_of_bounds_write+0x100/0x240 [ 26.656605] kunit_try_run_case+0x170/0x3f0 [ 26.656987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.657480] kthread+0x328/0x630 [ 26.657779] ret_from_fork+0x10/0x20 [ 26.658106] [ 26.658245] kfence-#91: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 26.658245] [ 26.659043] allocated by task 347 on cpu 4 at 26.654012s (0.005030s ago): [ 26.659654] test_alloc+0x230/0x628 [ 26.659970] test_out_of_bounds_write+0xc8/0x240 [ 26.660384] kunit_try_run_case+0x170/0x3f0 [ 26.660762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.661254] kthread+0x328/0x630 [ 26.661549] ret_from_fork+0x10/0x20 [ 26.661873] [ 26.662017] CPU: 4 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.662898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.663270] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.663682] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 26.445934] ================================================================== [ 26.446607] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 26.446607] [ 26.447418] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#89): [ 26.448067] test_out_of_bounds_read+0x1c8/0x3e0 [ 26.448480] kunit_try_run_case+0x170/0x3f0 [ 26.448863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.449354] kthread+0x328/0x630 [ 26.449651] ret_from_fork+0x10/0x20 [ 26.449975] [ 26.450112] kfence-#89: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 26.450112] [ 26.450909] allocated by task 343 on cpu 4 at 26.445906s (0.005002s ago): [ 26.451517] test_alloc+0x230/0x628 [ 26.451831] test_out_of_bounds_read+0x198/0x3e0 [ 26.452243] kunit_try_run_case+0x170/0x3f0 [ 26.452618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.453109] kthread+0x328/0x630 [ 26.453402] ret_from_fork+0x10/0x20 [ 26.453725] [ 26.453870] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.454748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.455118] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.455529] ================================================================== [ 26.237948] ================================================================== [ 26.238618] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 26.238618] [ 26.239431] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#87): [ 26.240080] test_out_of_bounds_read+0x1c8/0x3e0 [ 26.240493] kunit_try_run_case+0x170/0x3f0 [ 26.240875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.241366] kthread+0x328/0x630 [ 26.241662] ret_from_fork+0x10/0x20 [ 26.241987] [ 26.242125] kfence-#87: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 26.242125] [ 26.242966] allocated by task 341 on cpu 4 at 26.237922s (0.005044s ago): [ 26.243573] test_alloc+0x29c/0x628 [ 26.243888] test_out_of_bounds_read+0x198/0x3e0 [ 26.244301] kunit_try_run_case+0x170/0x3f0 [ 26.244678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.245167] kthread+0x328/0x630 [ 26.245460] ret_from_fork+0x10/0x20 [ 26.245783] [ 26.245925] CPU: 4 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.246802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.247173] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.247584] ================================================================== [ 26.133947] ================================================================== [ 26.134627] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 26.134627] [ 26.135440] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#86): [ 26.136075] test_out_of_bounds_read+0x114/0x3e0 [ 26.136490] kunit_try_run_case+0x170/0x3f0 [ 26.136871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.137362] kthread+0x328/0x630 [ 26.137660] ret_from_fork+0x10/0x20 [ 26.137985] [ 26.138123] kfence-#86: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 26.138123] [ 26.138966] allocated by task 341 on cpu 4 at 26.133918s (0.005047s ago): [ 26.139574] test_alloc+0x29c/0x628 [ 26.139889] test_out_of_bounds_read+0xdc/0x3e0 [ 26.140293] kunit_try_run_case+0x170/0x3f0 [ 26.140669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.141160] kthread+0x328/0x630 [ 26.141452] ret_from_fork+0x10/0x20 [ 26.141774] [ 26.141918] CPU: 4 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.142796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.143168] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.143578] ================================================================== [ 26.342121] ================================================================== [ 26.342791] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 26.342791] [ 26.343606] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#88): [ 26.344241] test_out_of_bounds_read+0x114/0x3e0 [ 26.344657] kunit_try_run_case+0x170/0x3f0 [ 26.345037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.345530] kthread+0x328/0x630 [ 26.345828] ret_from_fork+0x10/0x20 [ 26.346155] [ 26.346294] kfence-#88: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 26.346294] [ 26.347093] allocated by task 343 on cpu 4 at 26.342095s (0.004997s ago): [ 26.347703] test_alloc+0x230/0x628 [ 26.348018] test_out_of_bounds_read+0xdc/0x3e0 [ 26.348423] kunit_try_run_case+0x170/0x3f0 [ 26.348801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.349291] kthread+0x328/0x630 [ 26.349586] ret_from_fork+0x10/0x20 [ 26.349909] [ 26.350054] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.350934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.351308] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.351719] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 20.805606] ================================================================== [ 20.807692] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 20.807692] [ 20.808569] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#55): [ 20.809555] kmalloc_track_caller_oob_right+0x224/0x488 [ 20.810043] kunit_try_run_case+0x170/0x3f0 [ 20.810439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.810950] kthread+0x328/0x630 [ 20.811263] ret_from_fork+0x10/0x20 [ 20.811603] [ 20.811750] kfence-#55: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 20.811750] [ 20.812627] allocated by task 196 on cpu 3 at 20.805281s (0.007345s ago): [ 20.813255] kmalloc_track_caller_oob_right+0x184/0x488 [ 20.813742] kunit_try_run_case+0x170/0x3f0 [ 20.814136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.814647] kthread+0x328/0x630 [ 20.814957] ret_from_fork+0x10/0x20 [ 20.815296] [ 20.815444] freed by task 196 on cpu 3 at 20.805566s (0.009876s ago): [ 20.816045] kmalloc_track_caller_oob_right+0x224/0x488 [ 20.816533] kunit_try_run_case+0x170/0x3f0 [ 20.816925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.817433] kthread+0x328/0x630 [ 20.817743] ret_from_fork+0x10/0x20 [ 20.818081] [ 20.818237] CPU: 3 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.819141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.819524] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.819948] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-cs_dsp_mock_bin_add_name_or_infoisra
[ 96.316072] ================================================================== [ 96.317282] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348 [ 96.318128] Read of size 12 at addr ffff800084d44de0 by task kunit_try_catch/3375 [ 96.318816] [ 96.318982] CPU: 1 UID: 0 PID: 3375 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT [ 96.319028] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 96.319042] Hardware name: Radxa ROCK Pi 4B (DT) [ 96.319057] Call trace: [ 96.319068] show_stack+0x20/0x38 (C) [ 96.319102] dump_stack_lvl+0x8c/0xd0 [ 96.319133] print_report+0x310/0x608 [ 96.319163] kasan_report+0xdc/0x128 [ 96.319191] kasan_check_range+0x100/0x1a8 [ 96.319221] __asan_memcpy+0x3c/0x98 [ 96.319251] cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348 [ 96.319283] cs_dsp_mock_bin_add_info+0x18/0x30 [ 96.319311] bin_patch_name_and_info+0x168/0x6b0 [ 96.319340] kunit_try_run_case+0x170/0x3f0 [ 96.319374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 96.319409] kthread+0x328/0x630 [ 96.319442] ret_from_fork+0x10/0x20 [ 96.319474] [ 96.326438] The buggy address belongs to the variable: [ 96.326910] __loc.0+0x2c0/0x3a0 [ 96.327237] [ 96.327404] The buggy address belongs to the virtual mapping at [ 96.327404] [ffff800083a50000, ffff800085760000) created by: [ 96.327404] paging_init+0x620/0x7d0 [ 96.327670] dwmmc_rockchip fe310000.mmc: IDMAC supports 32-bit address mode. [ 96.328770] [ 96.329436] dwmmc_rockchip fe310000.mmc: Using internal DMA controller. [ 96.329536] The buggy address belongs to the physical page: [ 96.330150] dwmmc_rockchip fe310000.mmc: Version ID is 270a [ 96.330613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7544 [ 96.331141] dwmmc_rockchip fe310000.mmc: DW MMC controller at irq 49,32 bit host data width,256 deep fifo [ 96.331790] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 96.333285] raw: 03fffe0000002000 fffffdffc01d5108 fffffdffc01d5108 0000000000000000 [ 96.333995] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 96.334695] page dumped because: kasan: bad access detected [ 96.335206] [ 96.335359] Memory state around the buggy address: [ 96.335805] ffff800084d44c80: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9 [ 96.336465] ffff800084d44d00: f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9 [ 96.337126] >ffff800084d44d80: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 96.337782] ^ [ 96.338387] ffff800084d44e00: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9 [ 96.339047] ffff800084d44e80: 00 f9 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 [ 96.339703] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 25.899034] ================================================================== [ 25.899689] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 25.900320] Write of size 1 at addr ffff0000101ea578 by task kunit_try_catch/339 [ 25.900991] [ 25.901139] CPU: 4 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.901171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.901182] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.901192] Call trace: [ 25.901199] show_stack+0x20/0x38 (C) [ 25.901220] dump_stack_lvl+0x8c/0xd0 [ 25.901239] print_report+0x118/0x608 [ 25.901259] kasan_report+0xdc/0x128 [ 25.901277] __asan_report_store1_noabort+0x20/0x30 [ 25.901300] strncpy_from_user+0x270/0x2a0 [ 25.901318] copy_user_test_oob+0x5c0/0xec8 [ 25.901337] kunit_try_run_case+0x170/0x3f0 [ 25.901359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.901385] kthread+0x328/0x630 [ 25.901407] ret_from_fork+0x10/0x20 [ 25.901428] [ 25.907322] Allocated by task 339: [ 25.907637] kasan_save_stack+0x3c/0x68 [ 25.907996] kasan_save_track+0x20/0x40 [ 25.908354] kasan_save_alloc_info+0x40/0x58 [ 25.908753] __kasan_kmalloc+0xd4/0xd8 [ 25.909104] __kmalloc_noprof+0x190/0x4d0 [ 25.909479] kunit_kmalloc_array+0x34/0x88 [ 25.909864] copy_user_test_oob+0xac/0xec8 [ 25.910245] kunit_try_run_case+0x170/0x3f0 [ 25.910637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.911146] kthread+0x328/0x630 [ 25.911454] ret_from_fork+0x10/0x20 [ 25.911792] [ 25.911939] The buggy address belongs to the object at ffff0000101ea500 [ 25.911939] which belongs to the cache kmalloc-128 of size 128 [ 25.913053] The buggy address is located 0 bytes to the right of [ 25.913053] allocated 120-byte region [ffff0000101ea500, ffff0000101ea578) [ 25.914210] [ 25.914357] The buggy address belongs to the physical page: [ 25.914861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea [ 25.915577] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.916171] page_type: f5(slab) [ 25.916469] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.917169] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.917864] page dumped because: kasan: bad access detected [ 25.918368] [ 25.918513] Memory state around the buggy address: [ 25.918950] ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.919603] ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.920256] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.920906] ^ [ 25.921550] ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.922203] ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.922853] ================================================================== [ 25.874177] ================================================================== [ 25.874832] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 25.875459] Write of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339 [ 25.876144] [ 25.876294] CPU: 4 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.876326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.876335] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.876346] Call trace: [ 25.876354] show_stack+0x20/0x38 (C) [ 25.876374] dump_stack_lvl+0x8c/0xd0 [ 25.876392] print_report+0x118/0x608 [ 25.876412] kasan_report+0xdc/0x128 [ 25.876430] kasan_check_range+0x100/0x1a8 [ 25.876451] __kasan_check_write+0x20/0x30 [ 25.876472] strncpy_from_user+0x3c/0x2a0 [ 25.876490] copy_user_test_oob+0x5c0/0xec8 [ 25.876508] kunit_try_run_case+0x170/0x3f0 [ 25.876530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.876557] kthread+0x328/0x630 [ 25.876578] ret_from_fork+0x10/0x20 [ 25.876599] [ 25.882782] Allocated by task 339: [ 25.883098] kasan_save_stack+0x3c/0x68 [ 25.883457] kasan_save_track+0x20/0x40 [ 25.883815] kasan_save_alloc_info+0x40/0x58 [ 25.884214] __kasan_kmalloc+0xd4/0xd8 [ 25.884565] __kmalloc_noprof+0x190/0x4d0 [ 25.884938] kunit_kmalloc_array+0x34/0x88 [ 25.885323] copy_user_test_oob+0xac/0xec8 [ 25.885703] kunit_try_run_case+0x170/0x3f0 [ 25.886095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.886604] kthread+0x328/0x630 [ 25.886913] ret_from_fork+0x10/0x20 [ 25.887251] [ 25.887397] The buggy address belongs to the object at ffff0000101ea500 [ 25.887397] which belongs to the cache kmalloc-128 of size 128 [ 25.888514] The buggy address is located 0 bytes inside of [ 25.888514] allocated 120-byte region [ffff0000101ea500, ffff0000101ea578) [ 25.889626] [ 25.889773] The buggy address belongs to the physical page: [ 25.890276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea [ 25.890991] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.891586] page_type: f5(slab) [ 25.891885] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.892584] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.893280] page dumped because: kasan: bad access detected [ 25.893784] [ 25.893930] Memory state around the buggy address: [ 25.894367] ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.895019] ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.895673] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.896322] ^ [ 25.896967] ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.897621] ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.898271] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 25.749095] ================================================================== [ 25.749790] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 25.750459] Read of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339 [ 25.751154] [ 25.751320] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.751372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.751387] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.751405] Call trace: [ 25.751417] show_stack+0x20/0x38 (C) [ 25.751452] dump_stack_lvl+0x8c/0xd0 [ 25.751483] print_report+0x118/0x608 [ 25.751514] kasan_report+0xdc/0x128 [ 25.751544] kasan_check_range+0x100/0x1a8 [ 25.751576] __kasan_check_read+0x20/0x30 [ 25.751609] copy_user_test_oob+0x728/0xec8 [ 25.751639] kunit_try_run_case+0x170/0x3f0 [ 25.751674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.751716] kthread+0x328/0x630 [ 25.751750] ret_from_fork+0x10/0x20 [ 25.751783] [ 25.757663] Allocated by task 339: [ 25.757990] kasan_save_stack+0x3c/0x68 [ 25.758366] kasan_save_track+0x20/0x40 [ 25.758739] kasan_save_alloc_info+0x40/0x58 [ 25.759153] __kasan_kmalloc+0xd4/0xd8 [ 25.759517] __kmalloc_noprof+0x190/0x4d0 [ 25.759907] kunit_kmalloc_array+0x34/0x88 [ 25.760308] copy_user_test_oob+0xac/0xec8 [ 25.760704] kunit_try_run_case+0x170/0x3f0 [ 25.761111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.761637] kthread+0x328/0x630 [ 25.761961] ret_from_fork+0x10/0x20 [ 25.762311] [ 25.762466] The buggy address belongs to the object at ffff0000101ea500 [ 25.762466] which belongs to the cache kmalloc-128 of size 128 [ 25.763599] The buggy address is located 0 bytes inside of [ 25.763599] allocated 120-byte region [ffff0000101ea500, ffff0000101ea578) [ 25.764729] [ 25.764885] The buggy address belongs to the physical page: [ 25.765402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea [ 25.766135] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.766749] page_type: f5(slab) [ 25.767062] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.767779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.768488] page dumped because: kasan: bad access detected [ 25.769005] [ 25.769158] Memory state around the buggy address: [ 25.769608] ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.770276] ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.770944] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.771608] ^ [ 25.772265] ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.772933] ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.773597] ================================================================== [ 25.722839] ================================================================== [ 25.724086] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 25.724757] Write of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339 [ 25.725459] [ 25.725625] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.725676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.725692] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.725712] Call trace: [ 25.725726] show_stack+0x20/0x38 (C) [ 25.725761] dump_stack_lvl+0x8c/0xd0 [ 25.725795] print_report+0x118/0x608 [ 25.725827] kasan_report+0xdc/0x128 [ 25.725857] kasan_check_range+0x100/0x1a8 [ 25.725891] __kasan_check_write+0x20/0x30 [ 25.725925] copy_user_test_oob+0x234/0xec8 [ 25.725955] kunit_try_run_case+0x170/0x3f0 [ 25.725993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.726033] kthread+0x328/0x630 [ 25.726069] ret_from_fork+0x10/0x20 [ 25.726104] [ 25.731999] Allocated by task 339: [ 25.732332] kasan_save_stack+0x3c/0x68 [ 25.732710] kasan_save_track+0x20/0x40 [ 25.733083] kasan_save_alloc_info+0x40/0x58 [ 25.733497] __kasan_kmalloc+0xd4/0xd8 [ 25.733861] __kmalloc_noprof+0x190/0x4d0 [ 25.734251] kunit_kmalloc_array+0x34/0x88 [ 25.734654] copy_user_test_oob+0xac/0xec8 [ 25.735048] kunit_try_run_case+0x170/0x3f0 [ 25.735456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.735981] kthread+0x328/0x630 [ 25.736305] ret_from_fork+0x10/0x20 [ 25.736657] [ 25.736812] The buggy address belongs to the object at ffff0000101ea500 [ 25.736812] which belongs to the cache kmalloc-128 of size 128 [ 25.737947] The buggy address is located 0 bytes inside of [ 25.737947] allocated 120-byte region [ffff0000101ea500, ffff0000101ea578) [ 25.739076] [ 25.739232] The buggy address belongs to the physical page: [ 25.739750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea [ 25.740482] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.741095] page_type: f5(slab) [ 25.741411] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.742128] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.742838] page dumped because: kasan: bad access detected [ 25.743355] [ 25.743508] Memory state around the buggy address: [ 25.743958] ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.744627] ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.745294] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.745957] ^ [ 25.746614] ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.747282] ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.747945] ================================================================== [ 25.799636] ================================================================== [ 25.800297] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 25.800945] Read of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339 [ 25.801626] [ 25.801783] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.801819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.801831] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.801844] Call trace: [ 25.801853] show_stack+0x20/0x38 (C) [ 25.801876] dump_stack_lvl+0x8c/0xd0 [ 25.801899] print_report+0x118/0x608 [ 25.801922] kasan_report+0xdc/0x128 [ 25.801943] kasan_check_range+0x100/0x1a8 [ 25.801966] __kasan_check_read+0x20/0x30 [ 25.801991] copy_user_test_oob+0x3c8/0xec8 [ 25.802012] kunit_try_run_case+0x170/0x3f0 [ 25.802038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.802067] kthread+0x328/0x630 [ 25.802092] ret_from_fork+0x10/0x20 [ 25.802116] [ 25.807957] Allocated by task 339: [ 25.808280] kasan_save_stack+0x3c/0x68 [ 25.808649] kasan_save_track+0x20/0x40 [ 25.809009] kasan_save_alloc_info+0x40/0x58 [ 25.809412] __kasan_kmalloc+0xd4/0xd8 [ 25.809765] __kmalloc_noprof+0x190/0x4d0 [ 25.810144] kunit_kmalloc_array+0x34/0x88 [ 25.810534] copy_user_test_oob+0xac/0xec8 [ 25.810918] kunit_try_run_case+0x170/0x3f0 [ 25.811312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.811822] kthread+0x328/0x630 [ 25.812135] ret_from_fork+0x10/0x20 [ 25.812474] [ 25.812620] The buggy address belongs to the object at ffff0000101ea500 [ 25.812620] which belongs to the cache kmalloc-128 of size 128 [ 25.813740] The buggy address is located 0 bytes inside of [ 25.813740] allocated 120-byte region [ffff0000101ea500, ffff0000101ea578) [ 25.814854] [ 25.815002] The buggy address belongs to the physical page: [ 25.815510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea [ 25.816230] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.816830] page_type: f5(slab) [ 25.817133] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.817838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.818535] page dumped because: kasan: bad access detected [ 25.819044] [ 25.819191] Memory state around the buggy address: [ 25.819632] ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.820287] ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.820942] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.821594] ^ [ 25.822241] ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.822898] ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.823551] ================================================================== [ 25.824893] ================================================================== [ 25.825570] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 25.826220] Write of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339 [ 25.826909] [ 25.827064] CPU: 4 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.827102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.827112] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.827124] Call trace: [ 25.827133] show_stack+0x20/0x38 (C) [ 25.827158] dump_stack_lvl+0x8c/0xd0 [ 25.827179] print_report+0x118/0x608 [ 25.827199] kasan_report+0xdc/0x128 [ 25.827217] kasan_check_range+0x100/0x1a8 [ 25.827239] __kasan_check_write+0x20/0x30 [ 25.827260] copy_user_test_oob+0x434/0xec8 [ 25.827278] kunit_try_run_case+0x170/0x3f0 [ 25.827302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.827329] kthread+0x328/0x630 [ 25.827352] ret_from_fork+0x10/0x20 [ 25.827374] [ 25.833205] Allocated by task 339: [ 25.833523] kasan_save_stack+0x3c/0x68 [ 25.833884] kasan_save_track+0x20/0x40 [ 25.834243] kasan_save_alloc_info+0x40/0x58 [ 25.834641] __kasan_kmalloc+0xd4/0xd8 [ 25.834993] __kmalloc_noprof+0x190/0x4d0 [ 25.835368] kunit_kmalloc_array+0x34/0x88 [ 25.835753] copy_user_test_oob+0xac/0xec8 [ 25.836134] kunit_try_run_case+0x170/0x3f0 [ 25.836526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.837035] kthread+0x328/0x630 [ 25.837345] ret_from_fork+0x10/0x20 [ 25.837682] [ 25.837829] The buggy address belongs to the object at ffff0000101ea500 [ 25.837829] which belongs to the cache kmalloc-128 of size 128 [ 25.838948] The buggy address is located 0 bytes inside of [ 25.838948] allocated 120-byte region [ffff0000101ea500, ffff0000101ea578) [ 25.840061] [ 25.840208] The buggy address belongs to the physical page: [ 25.840714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea [ 25.841432] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.842029] page_type: f5(slab) [ 25.842329] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.843031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.843728] page dumped because: kasan: bad access detected [ 25.844232] [ 25.844378] Memory state around the buggy address: [ 25.844816] ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.845470] ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.846122] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.846772] ^ [ 25.847416] ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.848069] ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.848718] ================================================================== [ 25.849635] ================================================================== [ 25.850290] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 25.850931] Read of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339 [ 25.851609] [ 25.851759] CPU: 4 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.851791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.851800] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.851812] Call trace: [ 25.851819] show_stack+0x20/0x38 (C) [ 25.851840] dump_stack_lvl+0x8c/0xd0 [ 25.851859] print_report+0x118/0x608 [ 25.851878] kasan_report+0xdc/0x128 [ 25.851897] kasan_check_range+0x100/0x1a8 [ 25.851917] __kasan_check_read+0x20/0x30 [ 25.851939] copy_user_test_oob+0x4a0/0xec8 [ 25.851956] kunit_try_run_case+0x170/0x3f0 [ 25.851979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.852005] kthread+0x328/0x630 [ 25.852027] ret_from_fork+0x10/0x20 [ 25.852048] [ 25.857869] Allocated by task 339: [ 25.858185] kasan_save_stack+0x3c/0x68 [ 25.858546] kasan_save_track+0x20/0x40 [ 25.858905] kasan_save_alloc_info+0x40/0x58 [ 25.859305] __kasan_kmalloc+0xd4/0xd8 [ 25.859654] __kmalloc_noprof+0x190/0x4d0 [ 25.860027] kunit_kmalloc_array+0x34/0x88 [ 25.860412] copy_user_test_oob+0xac/0xec8 [ 25.860793] kunit_try_run_case+0x170/0x3f0 [ 25.861185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.861693] kthread+0x328/0x630 [ 25.862003] ret_from_fork+0x10/0x20 [ 25.862340] [ 25.862486] The buggy address belongs to the object at ffff0000101ea500 [ 25.862486] which belongs to the cache kmalloc-128 of size 128 [ 25.863603] The buggy address is located 0 bytes inside of [ 25.863603] allocated 120-byte region [ffff0000101ea500, ffff0000101ea578) [ 25.864715] [ 25.864861] The buggy address belongs to the physical page: [ 25.865365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea [ 25.866080] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.866675] page_type: f5(slab) [ 25.866972] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.867673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.868368] page dumped because: kasan: bad access detected [ 25.868873] [ 25.869018] Memory state around the buggy address: [ 25.869455] ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.870107] ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.870761] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.871410] ^ [ 25.872054] ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.872706] ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.873355] ================================================================== [ 25.774925] ================================================================== [ 25.775618] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 25.776273] Write of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339 [ 25.776962] [ 25.777119] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.777157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.777168] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.777181] Call trace: [ 25.777191] show_stack+0x20/0x38 (C) [ 25.777214] dump_stack_lvl+0x8c/0xd0 [ 25.777237] print_report+0x118/0x608 [ 25.777261] kasan_report+0xdc/0x128 [ 25.777281] kasan_check_range+0x100/0x1a8 [ 25.777305] __kasan_check_write+0x20/0x30 [ 25.777328] copy_user_test_oob+0x35c/0xec8 [ 25.777349] kunit_try_run_case+0x170/0x3f0 [ 25.777376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.777405] kthread+0x328/0x630 [ 25.777430] ret_from_fork+0x10/0x20 [ 25.777455] [ 25.783298] Allocated by task 339: [ 25.783617] kasan_save_stack+0x3c/0x68 [ 25.783980] kasan_save_track+0x20/0x40 [ 25.784342] kasan_save_alloc_info+0x40/0x58 [ 25.784744] __kasan_kmalloc+0xd4/0xd8 [ 25.785098] __kmalloc_noprof+0x190/0x4d0 [ 25.785475] kunit_kmalloc_array+0x34/0x88 [ 25.785864] copy_user_test_oob+0xac/0xec8 [ 25.786248] kunit_try_run_case+0x170/0x3f0 [ 25.786641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.787152] kthread+0x328/0x630 [ 25.787464] ret_from_fork+0x10/0x20 [ 25.787804] [ 25.787952] The buggy address belongs to the object at ffff0000101ea500 [ 25.787952] which belongs to the cache kmalloc-128 of size 128 [ 25.789072] The buggy address is located 0 bytes inside of [ 25.789072] allocated 120-byte region [ffff0000101ea500, ffff0000101ea578) [ 25.790186] [ 25.790334] The buggy address belongs to the physical page: [ 25.790843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea [ 25.791564] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.792165] page_type: f5(slab) [ 25.792468] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.793172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.793871] page dumped because: kasan: bad access detected [ 25.794377] [ 25.794525] Memory state around the buggy address: [ 25.794965] ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.795622] ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.796278] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.796929] ^ [ 25.797576] ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.798233] ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.798886] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 25.667227] ================================================================== [ 25.668612] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 25.669307] Read of size 8 at addr ffff00001019f778 by task kunit_try_catch/335 [ 25.669978] [ 25.670156] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.670210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.670227] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.670246] Call trace: [ 25.670259] show_stack+0x20/0x38 (C) [ 25.670296] dump_stack_lvl+0x8c/0xd0 [ 25.670330] print_report+0x118/0x608 [ 25.670363] kasan_report+0xdc/0x128 [ 25.670392] __asan_report_load8_noabort+0x20/0x30 [ 25.670428] copy_to_kernel_nofault+0x204/0x250 [ 25.670460] copy_to_kernel_nofault_oob+0x158/0x418 [ 25.670497] kunit_try_run_case+0x170/0x3f0 [ 25.670533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.670574] kthread+0x328/0x630 [ 25.670609] ret_from_fork+0x10/0x20 [ 25.670643] [ 25.676693] Allocated by task 335: [ 25.677021] kasan_save_stack+0x3c/0x68 [ 25.677396] kasan_save_track+0x20/0x40 [ 25.677768] kasan_save_alloc_info+0x40/0x58 [ 25.678183] __kasan_kmalloc+0xd4/0xd8 [ 25.678546] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.678988] copy_to_kernel_nofault_oob+0xc8/0x418 [ 25.679452] kunit_try_run_case+0x170/0x3f0 [ 25.679859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.680385] kthread+0x328/0x630 [ 25.680710] ret_from_fork+0x10/0x20 [ 25.681060] [ 25.681215] The buggy address belongs to the object at ffff00001019f700 [ 25.681215] which belongs to the cache kmalloc-128 of size 128 [ 25.682350] The buggy address is located 0 bytes to the right of [ 25.682350] allocated 120-byte region [ffff00001019f700, ffff00001019f778) [ 25.683526] [ 25.683681] The buggy address belongs to the physical page: [ 25.684199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f [ 25.684933] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.685546] page_type: f5(slab) [ 25.685859] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.686576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.687285] page dumped because: kasan: bad access detected [ 25.687802] [ 25.687955] Memory state around the buggy address: [ 25.688405] ffff00001019f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.689072] ffff00001019f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.689740] >ffff00001019f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.690403] ^ [ 25.691060] ffff00001019f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.691726] ffff00001019f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.692390] ================================================================== [ 25.693455] ================================================================== [ 25.694139] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 25.694824] Write of size 8 at addr ffff00001019f778 by task kunit_try_catch/335 [ 25.695499] [ 25.695657] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.695695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.695707] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.695720] Call trace: [ 25.695730] show_stack+0x20/0x38 (C) [ 25.695755] dump_stack_lvl+0x8c/0xd0 [ 25.695779] print_report+0x118/0x608 [ 25.695802] kasan_report+0xdc/0x128 [ 25.695823] kasan_check_range+0x100/0x1a8 [ 25.695846] __kasan_check_write+0x20/0x30 [ 25.695870] copy_to_kernel_nofault+0x8c/0x250 [ 25.695892] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 25.695918] kunit_try_run_case+0x170/0x3f0 [ 25.695944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.695973] kthread+0x328/0x630 [ 25.695998] ret_from_fork+0x10/0x20 [ 25.696022] [ 25.702318] Allocated by task 335: [ 25.702636] kasan_save_stack+0x3c/0x68 [ 25.703000] kasan_save_track+0x20/0x40 [ 25.703360] kasan_save_alloc_info+0x40/0x58 [ 25.703763] __kasan_kmalloc+0xd4/0xd8 [ 25.704116] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.704546] copy_to_kernel_nofault_oob+0xc8/0x418 [ 25.704995] kunit_try_run_case+0x170/0x3f0 [ 25.705390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.705902] kthread+0x328/0x630 [ 25.706214] ret_from_fork+0x10/0x20 [ 25.706554] [ 25.706702] The buggy address belongs to the object at ffff00001019f700 [ 25.706702] which belongs to the cache kmalloc-128 of size 128 [ 25.707821] The buggy address is located 0 bytes to the right of [ 25.707821] allocated 120-byte region [ffff00001019f700, ffff00001019f778) [ 25.708982] [ 25.709131] The buggy address belongs to the physical page: [ 25.709639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f [ 25.710359] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.710960] page_type: f5(slab) [ 25.711262] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 25.711966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.712665] page dumped because: kasan: bad access detected [ 25.713170] [ 25.713318] Memory state around the buggy address: [ 25.713757] ffff00001019f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.714415] ffff00001019f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.715070] >ffff00001019f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.715722] ^ [ 25.716369] ffff00001019f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.717024] ffff00001019f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.717678] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 25.632063] ================================================================== [ 25.632739] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 25.633369] Read of size 1 at addr ffff800087e9e7f8 by task kunit_try_catch/323 [ 25.634034] [ 25.634191] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.634230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.634242] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.634256] Call trace: [ 25.634265] show_stack+0x20/0x38 (C) [ 25.634291] dump_stack_lvl+0x8c/0xd0 [ 25.634315] print_report+0x310/0x608 [ 25.634337] kasan_report+0xdc/0x128 [ 25.634358] __asan_report_load1_noabort+0x20/0x30 [ 25.634383] vmalloc_oob+0x51c/0x5d0 [ 25.634406] kunit_try_run_case+0x170/0x3f0 [ 25.634433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.634462] kthread+0x328/0x630 [ 25.634488] ret_from_fork+0x10/0x20 [ 25.634513] [ 25.640005] The buggy address belongs to the virtual mapping at [ 25.640005] [ffff800087e9e000, ffff800087ea0000) created by: [ 25.640005] vmalloc_oob+0x98/0x5d0 [ 25.641363] [ 25.641512] The buggy address belongs to the physical page: [ 25.642019] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe99b [ 25.642732] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.643339] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 25.644043] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.644742] page dumped because: kasan: bad access detected [ 25.645248] [ 25.645395] Memory state around the buggy address: [ 25.645834] ffff800087e9e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.646489] ffff800087e9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.647145] >ffff800087e9e780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 25.647796] ^ [ 25.648443] ffff800087e9e800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.649098] ffff800087e9e880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.649751] ================================================================== [ 25.612475] ================================================================== [ 25.613876] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 25.614521] Read of size 1 at addr ffff800087e9e7f3 by task kunit_try_catch/323 [ 25.615201] [ 25.615365] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.615414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.615430] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.615447] Call trace: [ 25.615459] show_stack+0x20/0x38 (C) [ 25.615492] dump_stack_lvl+0x8c/0xd0 [ 25.615524] print_report+0x310/0x608 [ 25.615554] kasan_report+0xdc/0x128 [ 25.615584] __asan_report_load1_noabort+0x20/0x30 [ 25.615619] vmalloc_oob+0x578/0x5d0 [ 25.615651] kunit_try_run_case+0x170/0x3f0 [ 25.615688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.615728] kthread+0x328/0x630 [ 25.615762] ret_from_fork+0x10/0x20 [ 25.615796] [ 25.621330] The buggy address belongs to the virtual mapping at [ 25.621330] [ffff800087e9e000, ffff800087ea0000) created by: [ 25.621330] vmalloc_oob+0x98/0x5d0 [ 25.622708] [ 25.622864] The buggy address belongs to the physical page: [ 25.623381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe99b [ 25.624107] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.624733] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 25.625449] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.626159] page dumped because: kasan: bad access detected [ 25.626677] [ 25.626830] Memory state around the buggy address: [ 25.627280] ffff800087e9e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.627948] ffff800087e9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.628616] >ffff800087e9e780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 25.629279] ^ [ 25.629914] ffff800087e9e800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.630582] ffff800087e9e880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.631246] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 25.394621] ================================================================== [ 25.395259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 25.395913] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.396566] [ 25.396704] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.396718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.396723] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.396728] Call trace: [ 25.396731] show_stack+0x20/0x38 (C) [ 25.396741] dump_stack_lvl+0x8c/0xd0 [ 25.396749] print_report+0x118/0x608 [ 25.396758] kasan_report+0xdc/0x128 [ 25.396766] kasan_check_range+0x100/0x1a8 [ 25.396776] __kasan_check_write+0x20/0x30 [ 25.396786] kasan_atomics_helper+0x15b4/0x4858 [ 25.396794] kasan_atomics+0x198/0x2e0 [ 25.396802] kunit_try_run_case+0x170/0x3f0 [ 25.396812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.396824] kthread+0x328/0x630 [ 25.396834] ret_from_fork+0x10/0x20 [ 25.396843] [ 25.402973] Allocated by task 319: [ 25.403278] kasan_save_stack+0x3c/0x68 [ 25.403623] kasan_save_track+0x20/0x40 [ 25.403967] kasan_save_alloc_info+0x40/0x58 [ 25.404350] __kasan_kmalloc+0xd4/0xd8 [ 25.404687] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.405093] kasan_atomics+0xb8/0x2e0 [ 25.405423] kunit_try_run_case+0x170/0x3f0 [ 25.405799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.406290] kthread+0x328/0x630 [ 25.406583] ret_from_fork+0x10/0x20 [ 25.406905] [ 25.407042] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.407042] which belongs to the cache kmalloc-64 of size 64 [ 25.408125] The buggy address is located 0 bytes to the right of [ 25.408125] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.409254] [ 25.409391] The buggy address belongs to the physical page: [ 25.409882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.410574] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.411153] page_type: f5(slab) [ 25.411437] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.412122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.412803] page dumped because: kasan: bad access detected [ 25.413295] [ 25.413432] Memory state around the buggy address: [ 25.413858] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.414494] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.415133] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.415769] ^ [ 25.416193] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.416830] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.417467] ================================================================== [ 24.312695] ================================================================== [ 24.313350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 24.314015] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.314684] [ 24.314835] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.314867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.314877] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.314887] Call trace: [ 24.314895] show_stack+0x20/0x38 (C) [ 24.314915] dump_stack_lvl+0x8c/0xd0 [ 24.314934] print_report+0x118/0x608 [ 24.314953] kasan_report+0xdc/0x128 [ 24.314972] kasan_check_range+0x100/0x1a8 [ 24.314993] __kasan_check_write+0x20/0x30 [ 24.315014] kasan_atomics_helper+0x47c/0x4858 [ 24.315033] kasan_atomics+0x198/0x2e0 [ 24.315050] kunit_try_run_case+0x170/0x3f0 [ 24.315074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.315099] kthread+0x328/0x630 [ 24.315121] ret_from_fork+0x10/0x20 [ 24.315141] [ 24.321319] Allocated by task 319: [ 24.321635] kasan_save_stack+0x3c/0x68 [ 24.321994] kasan_save_track+0x20/0x40 [ 24.322353] kasan_save_alloc_info+0x40/0x58 [ 24.322752] __kasan_kmalloc+0xd4/0xd8 [ 24.323104] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.323529] kasan_atomics+0xb8/0x2e0 [ 24.323871] kunit_try_run_case+0x170/0x3f0 [ 24.324262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.324771] kthread+0x328/0x630 [ 24.325080] ret_from_fork+0x10/0x20 [ 24.325418] [ 24.325565] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.325565] which belongs to the cache kmalloc-64 of size 64 [ 24.326666] The buggy address is located 0 bytes to the right of [ 24.326666] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.327815] [ 24.327962] The buggy address belongs to the physical page: [ 24.328466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.329173] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.329767] page_type: f5(slab) [ 24.330064] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.330765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.331461] page dumped because: kasan: bad access detected [ 24.331965] [ 24.332111] Memory state around the buggy address: [ 24.332547] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.333199] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.333853] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.334502] ^ [ 24.334940] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.335593] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.336243] ================================================================== [ 24.093589] ================================================================== [ 24.094262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 24.094966] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.095642] [ 24.095798] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.095836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.095847] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.095860] Call trace: [ 24.095870] show_stack+0x20/0x38 (C) [ 24.095894] dump_stack_lvl+0x8c/0xd0 [ 24.095919] print_report+0x118/0x608 [ 24.095941] kasan_report+0xdc/0x128 [ 24.095962] __asan_report_store4_noabort+0x20/0x30 [ 24.095988] kasan_atomics_helper+0x3f7c/0x4858 [ 24.096009] kasan_atomics+0x198/0x2e0 [ 24.096029] kunit_try_run_case+0x170/0x3f0 [ 24.096055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.096085] kthread+0x328/0x630 [ 24.096110] ret_from_fork+0x10/0x20 [ 24.096133] [ 24.102042] Allocated by task 319: [ 24.102362] kasan_save_stack+0x3c/0x68 [ 24.102724] kasan_save_track+0x20/0x40 [ 24.103085] kasan_save_alloc_info+0x40/0x58 [ 24.103487] __kasan_kmalloc+0xd4/0xd8 [ 24.103840] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.104270] kasan_atomics+0xb8/0x2e0 [ 24.104614] kunit_try_run_case+0x170/0x3f0 [ 24.105009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.105520] kthread+0x328/0x630 [ 24.105832] ret_from_fork+0x10/0x20 [ 24.106172] [ 24.106320] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.106320] which belongs to the cache kmalloc-64 of size 64 [ 24.107426] The buggy address is located 0 bytes to the right of [ 24.107426] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.108578] [ 24.108727] The buggy address belongs to the physical page: [ 24.109234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.109948] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.110548] page_type: f5(slab) [ 24.110851] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.111555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.112253] page dumped because: kasan: bad access detected [ 24.112760] [ 24.112907] Memory state around the buggy address: [ 24.113347] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.114001] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.114657] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.115308] ^ [ 24.115747] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.116403] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.117055] ================================================================== [ 24.621648] ================================================================== [ 24.622285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 24.622930] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.623584] [ 24.623723] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.623737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.623742] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.623747] Call trace: [ 24.623750] show_stack+0x20/0x38 (C) [ 24.623760] dump_stack_lvl+0x8c/0xd0 [ 24.623768] print_report+0x118/0x608 [ 24.623777] kasan_report+0xdc/0x128 [ 24.623786] kasan_check_range+0x100/0x1a8 [ 24.623795] __kasan_check_write+0x20/0x30 [ 24.623805] kasan_atomics_helper+0xa04/0x4858 [ 24.623814] kasan_atomics+0x198/0x2e0 [ 24.623821] kunit_try_run_case+0x170/0x3f0 [ 24.623832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.623843] kthread+0x328/0x630 [ 24.623854] ret_from_fork+0x10/0x20 [ 24.623863] [ 24.629986] Allocated by task 319: [ 24.630291] kasan_save_stack+0x3c/0x68 [ 24.630635] kasan_save_track+0x20/0x40 [ 24.630979] kasan_save_alloc_info+0x40/0x58 [ 24.631362] __kasan_kmalloc+0xd4/0xd8 [ 24.631699] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.632106] kasan_atomics+0xb8/0x2e0 [ 24.632435] kunit_try_run_case+0x170/0x3f0 [ 24.632811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.633302] kthread+0x328/0x630 [ 24.633594] ret_from_fork+0x10/0x20 [ 24.633916] [ 24.634053] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.634053] which belongs to the cache kmalloc-64 of size 64 [ 24.635136] The buggy address is located 0 bytes to the right of [ 24.635136] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.636265] [ 24.636402] The buggy address belongs to the physical page: [ 24.636893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.637585] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.638164] page_type: f5(slab) [ 24.638447] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.639131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.639813] page dumped because: kasan: bad access detected [ 24.640305] [ 24.640442] Memory state around the buggy address: [ 24.640867] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.641506] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.642143] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.642778] ^ [ 24.643203] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.643839] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.644475] ================================================================== [ 24.855414] ================================================================== [ 24.856052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 24.856698] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.857352] [ 24.857490] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.857504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.857508] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.857513] Call trace: [ 24.857516] show_stack+0x20/0x38 (C) [ 24.857526] dump_stack_lvl+0x8c/0xd0 [ 24.857534] print_report+0x118/0x608 [ 24.857543] kasan_report+0xdc/0x128 [ 24.857552] kasan_check_range+0x100/0x1a8 [ 24.857561] __kasan_check_write+0x20/0x30 [ 24.857570] kasan_atomics_helper+0xd3c/0x4858 [ 24.857579] kasan_atomics+0x198/0x2e0 [ 24.857587] kunit_try_run_case+0x170/0x3f0 [ 24.857597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.857609] kthread+0x328/0x630 [ 24.857618] ret_from_fork+0x10/0x20 [ 24.857627] [ 24.863746] Allocated by task 319: [ 24.864051] kasan_save_stack+0x3c/0x68 [ 24.864396] kasan_save_track+0x20/0x40 [ 24.864740] kasan_save_alloc_info+0x40/0x58 [ 24.865123] __kasan_kmalloc+0xd4/0xd8 [ 24.865460] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.865867] kasan_atomics+0xb8/0x2e0 [ 24.866195] kunit_try_run_case+0x170/0x3f0 [ 24.866572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.867063] kthread+0x328/0x630 [ 24.867357] ret_from_fork+0x10/0x20 [ 24.867679] [ 24.867816] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.867816] which belongs to the cache kmalloc-64 of size 64 [ 24.868898] The buggy address is located 0 bytes to the right of [ 24.868898] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.870028] [ 24.870165] The buggy address belongs to the physical page: [ 24.870657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.871349] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.871927] page_type: f5(slab) [ 24.872210] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.872894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.873576] page dumped because: kasan: bad access detected [ 24.874068] [ 24.874206] Memory state around the buggy address: [ 24.874632] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.875268] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.875905] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.876541] ^ [ 24.876967] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.877604] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.878241] ================================================================== [ 24.215679] ================================================================== [ 24.216334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 24.216996] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.217666] [ 24.217816] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.217849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.217859] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.217869] Call trace: [ 24.217877] show_stack+0x20/0x38 (C) [ 24.217897] dump_stack_lvl+0x8c/0xd0 [ 24.217916] print_report+0x118/0x608 [ 24.217935] kasan_report+0xdc/0x128 [ 24.217954] kasan_check_range+0x100/0x1a8 [ 24.217975] __kasan_check_write+0x20/0x30 [ 24.217996] kasan_atomics_helper+0x32c/0x4858 [ 24.218015] kasan_atomics+0x198/0x2e0 [ 24.218033] kunit_try_run_case+0x170/0x3f0 [ 24.218056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.218082] kthread+0x328/0x630 [ 24.218104] ret_from_fork+0x10/0x20 [ 24.218124] [ 24.224311] Allocated by task 319: [ 24.224626] kasan_save_stack+0x3c/0x68 [ 24.224986] kasan_save_track+0x20/0x40 [ 24.225344] kasan_save_alloc_info+0x40/0x58 [ 24.225744] __kasan_kmalloc+0xd4/0xd8 [ 24.226095] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.226520] kasan_atomics+0xb8/0x2e0 [ 24.226863] kunit_try_run_case+0x170/0x3f0 [ 24.227256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.227764] kthread+0x328/0x630 [ 24.228073] ret_from_fork+0x10/0x20 [ 24.228412] [ 24.228557] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.228557] which belongs to the cache kmalloc-64 of size 64 [ 24.229658] The buggy address is located 0 bytes to the right of [ 24.229658] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.230807] [ 24.230954] The buggy address belongs to the physical page: [ 24.231457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.232166] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.232760] page_type: f5(slab) [ 24.233058] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.233758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.234453] page dumped because: kasan: bad access detected [ 24.234957] [ 24.235102] Memory state around the buggy address: [ 24.235539] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.236192] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.236844] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.237494] ^ [ 24.237933] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.238585] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.239234] ================================================================== [ 24.692137] ================================================================== [ 24.692775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 24.693428] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.694074] [ 24.694213] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.694227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.694231] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.694236] Call trace: [ 24.694239] show_stack+0x20/0x38 (C) [ 24.694249] dump_stack_lvl+0x8c/0xd0 [ 24.694257] print_report+0x118/0x608 [ 24.694266] kasan_report+0xdc/0x128 [ 24.694274] __asan_report_load4_noabort+0x20/0x30 [ 24.694285] kasan_atomics_helper+0x3dcc/0x4858 [ 24.694293] kasan_atomics+0x198/0x2e0 [ 24.694301] kunit_try_run_case+0x170/0x3f0 [ 24.694311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.694323] kthread+0x328/0x630 [ 24.694333] ret_from_fork+0x10/0x20 [ 24.694342] [ 24.700168] Allocated by task 319: [ 24.700473] kasan_save_stack+0x3c/0x68 [ 24.700818] kasan_save_track+0x20/0x40 [ 24.701162] kasan_save_alloc_info+0x40/0x58 [ 24.701545] __kasan_kmalloc+0xd4/0xd8 [ 24.701883] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.702290] kasan_atomics+0xb8/0x2e0 [ 24.702618] kunit_try_run_case+0x170/0x3f0 [ 24.702994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.703485] kthread+0x328/0x630 [ 24.703778] ret_from_fork+0x10/0x20 [ 24.704100] [ 24.704237] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.704237] which belongs to the cache kmalloc-64 of size 64 [ 24.705320] The buggy address is located 0 bytes to the right of [ 24.705320] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.706450] [ 24.706588] The buggy address belongs to the physical page: [ 24.707080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.707770] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.708348] page_type: f5(slab) [ 24.708631] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.709315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.709997] page dumped because: kasan: bad access detected [ 24.710489] [ 24.710626] Memory state around the buggy address: [ 24.711051] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.711688] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.712326] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.712963] ^ [ 24.713389] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.714028] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.714663] ================================================================== [ 24.167190] ================================================================== [ 24.167846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 24.168511] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.169174] [ 24.169323] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.169356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.169367] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.169378] Call trace: [ 24.169385] show_stack+0x20/0x38 (C) [ 24.169406] dump_stack_lvl+0x8c/0xd0 [ 24.169426] print_report+0x118/0x608 [ 24.169445] kasan_report+0xdc/0x128 [ 24.169464] kasan_check_range+0x100/0x1a8 [ 24.169484] __kasan_check_read+0x20/0x30 [ 24.169507] kasan_atomics_helper+0x2b0/0x4858 [ 24.169526] kasan_atomics+0x198/0x2e0 [ 24.169543] kunit_try_run_case+0x170/0x3f0 [ 24.169566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.169592] kthread+0x328/0x630 [ 24.169613] ret_from_fork+0x10/0x20 [ 24.169633] [ 24.175809] Allocated by task 319: [ 24.176125] kasan_save_stack+0x3c/0x68 [ 24.176484] kasan_save_track+0x20/0x40 [ 24.176844] kasan_save_alloc_info+0x40/0x58 [ 24.177243] __kasan_kmalloc+0xd4/0xd8 [ 24.177595] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.178020] kasan_atomics+0xb8/0x2e0 [ 24.178362] kunit_try_run_case+0x170/0x3f0 [ 24.178755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.179265] kthread+0x328/0x630 [ 24.179574] ret_from_fork+0x10/0x20 [ 24.179911] [ 24.180057] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.180057] which belongs to the cache kmalloc-64 of size 64 [ 24.181159] The buggy address is located 0 bytes to the right of [ 24.181159] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.182308] [ 24.182454] The buggy address belongs to the physical page: [ 24.182957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.183665] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.184261] page_type: f5(slab) [ 24.184560] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.185260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.185955] page dumped because: kasan: bad access detected [ 24.186459] [ 24.186604] Memory state around the buggy address: [ 24.187042] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.187695] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.188347] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.188996] ^ [ 24.189435] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.190089] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.190738] ================================================================== [ 24.668645] ================================================================== [ 24.669282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 24.669928] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.670582] [ 24.670721] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.670735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.670740] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.670745] Call trace: [ 24.670748] show_stack+0x20/0x38 (C) [ 24.670757] dump_stack_lvl+0x8c/0xd0 [ 24.670766] print_report+0x118/0x608 [ 24.670775] kasan_report+0xdc/0x128 [ 24.670783] kasan_check_range+0x100/0x1a8 [ 24.670794] __kasan_check_write+0x20/0x30 [ 24.670804] kasan_atomics_helper+0xad4/0x4858 [ 24.670813] kasan_atomics+0x198/0x2e0 [ 24.670820] kunit_try_run_case+0x170/0x3f0 [ 24.670831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.670843] kthread+0x328/0x630 [ 24.670853] ret_from_fork+0x10/0x20 [ 24.670863] [ 24.676988] Allocated by task 319: [ 24.677293] kasan_save_stack+0x3c/0x68 [ 24.677637] kasan_save_track+0x20/0x40 [ 24.677980] kasan_save_alloc_info+0x40/0x58 [ 24.678363] __kasan_kmalloc+0xd4/0xd8 [ 24.678701] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.679108] kasan_atomics+0xb8/0x2e0 [ 24.679437] kunit_try_run_case+0x170/0x3f0 [ 24.679814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.680303] kthread+0x328/0x630 [ 24.680596] ret_from_fork+0x10/0x20 [ 24.680918] [ 24.681055] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.681055] which belongs to the cache kmalloc-64 of size 64 [ 24.682137] The buggy address is located 0 bytes to the right of [ 24.682137] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.683267] [ 24.683405] The buggy address belongs to the physical page: [ 24.683897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.684589] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.685168] page_type: f5(slab) [ 24.685453] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.686137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.686818] page dumped because: kasan: bad access detected [ 24.687310] [ 24.687447] Memory state around the buggy address: [ 24.687871] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.688508] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.689144] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.689781] ^ [ 24.690208] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.690844] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.691480] ================================================================== [ 24.738801] ================================================================== [ 24.739438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 24.740092] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.740737] [ 24.740875] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.740890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.740894] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.740899] Call trace: [ 24.740902] show_stack+0x20/0x38 (C) [ 24.740911] dump_stack_lvl+0x8c/0xd0 [ 24.740920] print_report+0x118/0x608 [ 24.740929] kasan_report+0xdc/0x128 [ 24.740937] __asan_report_load4_noabort+0x20/0x30 [ 24.740947] kasan_atomics_helper+0x3dbc/0x4858 [ 24.740956] kasan_atomics+0x198/0x2e0 [ 24.740964] kunit_try_run_case+0x170/0x3f0 [ 24.740974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.740985] kthread+0x328/0x630 [ 24.740995] ret_from_fork+0x10/0x20 [ 24.741005] [ 24.746837] Allocated by task 319: [ 24.747142] kasan_save_stack+0x3c/0x68 [ 24.747486] kasan_save_track+0x20/0x40 [ 24.747830] kasan_save_alloc_info+0x40/0x58 [ 24.748213] __kasan_kmalloc+0xd4/0xd8 [ 24.748550] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.748958] kasan_atomics+0xb8/0x2e0 [ 24.749287] kunit_try_run_case+0x170/0x3f0 [ 24.749663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.750153] kthread+0x328/0x630 [ 24.750446] ret_from_fork+0x10/0x20 [ 24.750768] [ 24.750905] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.750905] which belongs to the cache kmalloc-64 of size 64 [ 24.751987] The buggy address is located 0 bytes to the right of [ 24.751987] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.753117] [ 24.753254] The buggy address belongs to the physical page: [ 24.753747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.754439] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.755017] page_type: f5(slab) [ 24.755302] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.755986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.756668] page dumped because: kasan: bad access detected [ 24.757160] [ 24.757296] Memory state around the buggy address: [ 24.757721] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.758358] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.758996] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.759633] ^ [ 24.760059] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.760696] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.761332] ================================================================== [ 24.808673] ================================================================== [ 24.809310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 24.809956] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.810610] [ 24.810748] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.810762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.810767] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.810771] Call trace: [ 24.810775] show_stack+0x20/0x38 (C) [ 24.810785] dump_stack_lvl+0x8c/0xd0 [ 24.810793] print_report+0x118/0x608 [ 24.810801] kasan_report+0xdc/0x128 [ 24.810810] kasan_check_range+0x100/0x1a8 [ 24.810819] __kasan_check_write+0x20/0x30 [ 24.810829] kasan_atomics_helper+0xca0/0x4858 [ 24.810838] kasan_atomics+0x198/0x2e0 [ 24.810845] kunit_try_run_case+0x170/0x3f0 [ 24.810856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.810867] kthread+0x328/0x630 [ 24.810877] ret_from_fork+0x10/0x20 [ 24.810887] [ 24.817010] Allocated by task 319: [ 24.817315] kasan_save_stack+0x3c/0x68 [ 24.817660] kasan_save_track+0x20/0x40 [ 24.818006] kasan_save_alloc_info+0x40/0x58 [ 24.818389] __kasan_kmalloc+0xd4/0xd8 [ 24.818726] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.819134] kasan_atomics+0xb8/0x2e0 [ 24.819463] kunit_try_run_case+0x170/0x3f0 [ 24.819840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.820331] kthread+0x328/0x630 [ 24.820623] ret_from_fork+0x10/0x20 [ 24.820946] [ 24.821082] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.821082] which belongs to the cache kmalloc-64 of size 64 [ 24.822165] The buggy address is located 0 bytes to the right of [ 24.822165] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.823294] [ 24.823433] The buggy address belongs to the physical page: [ 24.823924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.824617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.825195] page_type: f5(slab) [ 24.825480] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.826163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.826845] page dumped because: kasan: bad access detected [ 24.827337] [ 24.827474] Memory state around the buggy address: [ 24.827899] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.828537] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.829174] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.829810] ^ [ 24.830236] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.830873] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.831509] ================================================================== [ 24.925584] ================================================================== [ 24.926222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 24.926876] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.927521] [ 24.927659] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.927674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.927678] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.927683] Call trace: [ 24.927687] show_stack+0x20/0x38 (C) [ 24.927696] dump_stack_lvl+0x8c/0xd0 [ 24.927705] print_report+0x118/0x608 [ 24.927713] kasan_report+0xdc/0x128 [ 24.927722] __asan_report_load8_noabort+0x20/0x30 [ 24.927733] kasan_atomics_helper+0x3f58/0x4858 [ 24.927741] kasan_atomics+0x198/0x2e0 [ 24.927749] kunit_try_run_case+0x170/0x3f0 [ 24.927760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.927771] kthread+0x328/0x630 [ 24.927782] ret_from_fork+0x10/0x20 [ 24.927791] [ 24.933618] Allocated by task 319: [ 24.933921] kasan_save_stack+0x3c/0x68 [ 24.934265] kasan_save_track+0x20/0x40 [ 24.934609] kasan_save_alloc_info+0x40/0x58 [ 24.934992] __kasan_kmalloc+0xd4/0xd8 [ 24.935328] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.935735] kasan_atomics+0xb8/0x2e0 [ 24.936064] kunit_try_run_case+0x170/0x3f0 [ 24.936441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.936932] kthread+0x328/0x630 [ 24.937225] ret_from_fork+0x10/0x20 [ 24.937547] [ 24.937685] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.937685] which belongs to the cache kmalloc-64 of size 64 [ 24.938768] The buggy address is located 0 bytes to the right of [ 24.938768] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.939897] [ 24.940036] The buggy address belongs to the physical page: [ 24.940528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.941218] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.941797] page_type: f5(slab) [ 24.942082] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.942766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.943448] page dumped because: kasan: bad access detected [ 24.943940] [ 24.944076] Memory state around the buggy address: [ 24.944502] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.945138] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.945775] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.946411] ^ [ 24.946837] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.947476] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.948111] ================================================================== [ 24.480221] ================================================================== [ 24.480866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 24.481518] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.482178] [ 24.482321] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.482342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.482349] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.482356] Call trace: [ 24.482361] show_stack+0x20/0x38 (C) [ 24.482375] dump_stack_lvl+0x8c/0xd0 [ 24.482387] print_report+0x118/0x608 [ 24.482401] kasan_report+0xdc/0x128 [ 24.482414] kasan_check_range+0x100/0x1a8 [ 24.482428] __kasan_check_write+0x20/0x30 [ 24.482443] kasan_atomics_helper+0x760/0x4858 [ 24.482456] kasan_atomics+0x198/0x2e0 [ 24.482468] kunit_try_run_case+0x170/0x3f0 [ 24.482484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.482502] kthread+0x328/0x630 [ 24.482516] ret_from_fork+0x10/0x20 [ 24.482530] [ 24.488678] Allocated by task 319: [ 24.488986] kasan_save_stack+0x3c/0x68 [ 24.489338] kasan_save_track+0x20/0x40 [ 24.489688] kasan_save_alloc_info+0x40/0x58 [ 24.490079] __kasan_kmalloc+0xd4/0xd8 [ 24.490422] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.490836] kasan_atomics+0xb8/0x2e0 [ 24.491171] kunit_try_run_case+0x170/0x3f0 [ 24.491554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.492051] kthread+0x328/0x630 [ 24.492351] ret_from_fork+0x10/0x20 [ 24.492679] [ 24.492819] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.492819] which belongs to the cache kmalloc-64 of size 64 [ 24.493909] The buggy address is located 0 bytes to the right of [ 24.493909] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.495046] [ 24.495187] The buggy address belongs to the physical page: [ 24.495684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.496382] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.496968] page_type: f5(slab) [ 24.497257] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.497947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.498634] page dumped because: kasan: bad access detected [ 24.499131] [ 24.499272] Memory state around the buggy address: [ 24.499702] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.500345] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.500988] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.501630] ^ [ 24.502060] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.502703] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.503345] ================================================================== [ 24.504064] ================================================================== [ 24.504709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 24.505362] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.506022] [ 24.506166] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.506188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.506195] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.506202] Call trace: [ 24.506207] show_stack+0x20/0x38 (C) [ 24.506221] dump_stack_lvl+0x8c/0xd0 [ 24.506233] print_report+0x118/0x608 [ 24.506247] kasan_report+0xdc/0x128 [ 24.506260] kasan_check_range+0x100/0x1a8 [ 24.506274] __kasan_check_write+0x20/0x30 [ 24.506289] kasan_atomics_helper+0x7cc/0x4858 [ 24.506302] kasan_atomics+0x198/0x2e0 [ 24.506313] kunit_try_run_case+0x170/0x3f0 [ 24.506329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.506347] kthread+0x328/0x630 [ 24.506361] ret_from_fork+0x10/0x20 [ 24.506376] [ 24.512522] Allocated by task 319: [ 24.512831] kasan_save_stack+0x3c/0x68 [ 24.513182] kasan_save_track+0x20/0x40 [ 24.513533] kasan_save_alloc_info+0x40/0x58 [ 24.513923] __kasan_kmalloc+0xd4/0xd8 [ 24.514265] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.514680] kasan_atomics+0xb8/0x2e0 [ 24.515014] kunit_try_run_case+0x170/0x3f0 [ 24.515397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.515895] kthread+0x328/0x630 [ 24.516194] ret_from_fork+0x10/0x20 [ 24.516522] [ 24.516663] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.516663] which belongs to the cache kmalloc-64 of size 64 [ 24.517752] The buggy address is located 0 bytes to the right of [ 24.517752] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.518889] [ 24.519030] The buggy address belongs to the physical page: [ 24.519527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.520226] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.520811] page_type: f5(slab) [ 24.521101] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.521791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.522477] page dumped because: kasan: bad access detected [ 24.522975] [ 24.523115] Memory state around the buggy address: [ 24.523544] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.524188] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.524831] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.525473] ^ [ 24.525904] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.526547] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.527189] ================================================================== [ 24.240009] ================================================================== [ 24.240663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 24.241332] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.242002] [ 24.242151] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.242183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.242193] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.242203] Call trace: [ 24.242210] show_stack+0x20/0x38 (C) [ 24.242231] dump_stack_lvl+0x8c/0xd0 [ 24.242249] print_report+0x118/0x608 [ 24.242269] kasan_report+0xdc/0x128 [ 24.242287] __asan_report_store4_noabort+0x20/0x30 [ 24.242311] kasan_atomics_helper+0x3f94/0x4858 [ 24.242330] kasan_atomics+0x198/0x2e0 [ 24.242347] kunit_try_run_case+0x170/0x3f0 [ 24.242371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.242396] kthread+0x328/0x630 [ 24.242418] ret_from_fork+0x10/0x20 [ 24.242438] [ 24.248336] Allocated by task 319: [ 24.248652] kasan_save_stack+0x3c/0x68 [ 24.249011] kasan_save_track+0x20/0x40 [ 24.249370] kasan_save_alloc_info+0x40/0x58 [ 24.249769] __kasan_kmalloc+0xd4/0xd8 [ 24.250119] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.250544] kasan_atomics+0xb8/0x2e0 [ 24.250887] kunit_try_run_case+0x170/0x3f0 [ 24.251280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.251788] kthread+0x328/0x630 [ 24.252098] ret_from_fork+0x10/0x20 [ 24.252435] [ 24.252582] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.252582] which belongs to the cache kmalloc-64 of size 64 [ 24.253683] The buggy address is located 0 bytes to the right of [ 24.253683] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.254832] [ 24.254978] The buggy address belongs to the physical page: [ 24.255481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.256189] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.256782] page_type: f5(slab) [ 24.257080] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.257780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.258476] page dumped because: kasan: bad access detected [ 24.258979] [ 24.259125] Memory state around the buggy address: [ 24.259562] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.260214] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.260867] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.261517] ^ [ 24.261954] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.262606] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.263255] ================================================================== [ 24.598157] ================================================================== [ 24.598794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 24.599440] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.600094] [ 24.600233] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.600248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.600252] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.600257] Call trace: [ 24.600261] show_stack+0x20/0x38 (C) [ 24.600270] dump_stack_lvl+0x8c/0xd0 [ 24.600279] print_report+0x118/0x608 [ 24.600288] kasan_report+0xdc/0x128 [ 24.600296] kasan_check_range+0x100/0x1a8 [ 24.600306] __kasan_check_write+0x20/0x30 [ 24.600316] kasan_atomics_helper+0x99c/0x4858 [ 24.600324] kasan_atomics+0x198/0x2e0 [ 24.600332] kunit_try_run_case+0x170/0x3f0 [ 24.600342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.600354] kthread+0x328/0x630 [ 24.600364] ret_from_fork+0x10/0x20 [ 24.600374] [ 24.606496] Allocated by task 319: [ 24.606800] kasan_save_stack+0x3c/0x68 [ 24.607144] kasan_save_track+0x20/0x40 [ 24.607488] kasan_save_alloc_info+0x40/0x58 [ 24.607871] __kasan_kmalloc+0xd4/0xd8 [ 24.608208] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.608614] kasan_atomics+0xb8/0x2e0 [ 24.608943] kunit_try_run_case+0x170/0x3f0 [ 24.609319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.609808] kthread+0x328/0x630 [ 24.610101] ret_from_fork+0x10/0x20 [ 24.610423] [ 24.610561] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.610561] which belongs to the cache kmalloc-64 of size 64 [ 24.611644] The buggy address is located 0 bytes to the right of [ 24.611644] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.612773] [ 24.612910] The buggy address belongs to the physical page: [ 24.613402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.614094] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.614673] page_type: f5(slab) [ 24.614956] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.615639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.616321] page dumped because: kasan: bad access detected [ 24.616813] [ 24.616949] Memory state around the buggy address: [ 24.617375] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.618011] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.618648] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.619284] ^ [ 24.619710] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.620348] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.620984] ================================================================== [ 24.785485] ================================================================== [ 24.786122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 24.786776] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.787422] [ 24.787561] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.787575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.787579] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.787584] Call trace: [ 24.787587] show_stack+0x20/0x38 (C) [ 24.787596] dump_stack_lvl+0x8c/0xd0 [ 24.787605] print_report+0x118/0x608 [ 24.787614] kasan_report+0xdc/0x128 [ 24.787623] __asan_report_load4_noabort+0x20/0x30 [ 24.787633] kasan_atomics_helper+0x3de4/0x4858 [ 24.787641] kasan_atomics+0x198/0x2e0 [ 24.787650] kunit_try_run_case+0x170/0x3f0 [ 24.787660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.787672] kthread+0x328/0x630 [ 24.787681] ret_from_fork+0x10/0x20 [ 24.787691] [ 24.793522] Allocated by task 319: [ 24.793826] kasan_save_stack+0x3c/0x68 [ 24.794171] kasan_save_track+0x20/0x40 [ 24.794515] kasan_save_alloc_info+0x40/0x58 [ 24.794898] __kasan_kmalloc+0xd4/0xd8 [ 24.795236] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.795643] kasan_atomics+0xb8/0x2e0 [ 24.795972] kunit_try_run_case+0x170/0x3f0 [ 24.796348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.796838] kthread+0x328/0x630 [ 24.797131] ret_from_fork+0x10/0x20 [ 24.797454] [ 24.797590] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.797590] which belongs to the cache kmalloc-64 of size 64 [ 24.798673] The buggy address is located 0 bytes to the right of [ 24.798673] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.799802] [ 24.799939] The buggy address belongs to the physical page: [ 24.800432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.801124] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.801701] page_type: f5(slab) [ 24.801986] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.802670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.803352] page dumped because: kasan: bad access detected [ 24.803844] [ 24.803981] Memory state around the buggy address: [ 24.804406] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.805043] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.805681] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.806317] ^ [ 24.806742] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.807379] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.808014] ================================================================== [ 24.948763] ================================================================== [ 24.949400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 24.950046] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.950699] [ 24.950838] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.950852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.950857] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.950862] Call trace: [ 24.950865] show_stack+0x20/0x38 (C) [ 24.950874] dump_stack_lvl+0x8c/0xd0 [ 24.950883] print_report+0x118/0x608 [ 24.950891] kasan_report+0xdc/0x128 [ 24.950900] kasan_check_range+0x100/0x1a8 [ 24.950909] __kasan_check_write+0x20/0x30 [ 24.950919] kasan_atomics_helper+0xe44/0x4858 [ 24.950928] kasan_atomics+0x198/0x2e0 [ 24.950936] kunit_try_run_case+0x170/0x3f0 [ 24.950946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.950957] kthread+0x328/0x630 [ 24.950967] ret_from_fork+0x10/0x20 [ 24.950976] [ 24.957095] Allocated by task 319: [ 24.957399] kasan_save_stack+0x3c/0x68 [ 24.957743] kasan_save_track+0x20/0x40 [ 24.958088] kasan_save_alloc_info+0x40/0x58 [ 24.958472] __kasan_kmalloc+0xd4/0xd8 [ 24.958809] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.959215] kasan_atomics+0xb8/0x2e0 [ 24.959544] kunit_try_run_case+0x170/0x3f0 [ 24.959920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.960411] kthread+0x328/0x630 [ 24.960705] ret_from_fork+0x10/0x20 [ 24.961027] [ 24.961163] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.961163] which belongs to the cache kmalloc-64 of size 64 [ 24.962246] The buggy address is located 0 bytes to the right of [ 24.962246] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.963375] [ 24.963512] The buggy address belongs to the physical page: [ 24.964004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.964696] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.965274] page_type: f5(slab) [ 24.965557] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.966241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.966923] page dumped because: kasan: bad access detected [ 24.967415] [ 24.967552] Memory state around the buggy address: [ 24.967977] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.968616] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.969252] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.969888] ^ [ 24.970314] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.970951] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.971587] ================================================================== [ 25.347618] ================================================================== [ 25.348255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 25.348908] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.349561] [ 25.349700] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.349714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.349719] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.349723] Call trace: [ 25.349726] show_stack+0x20/0x38 (C) [ 25.349736] dump_stack_lvl+0x8c/0xd0 [ 25.349745] print_report+0x118/0x608 [ 25.349753] kasan_report+0xdc/0x128 [ 25.349762] kasan_check_range+0x100/0x1a8 [ 25.349771] __kasan_check_write+0x20/0x30 [ 25.349781] kasan_atomics_helper+0x14e4/0x4858 [ 25.349789] kasan_atomics+0x198/0x2e0 [ 25.349797] kunit_try_run_case+0x170/0x3f0 [ 25.349808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.349819] kthread+0x328/0x630 [ 25.349829] ret_from_fork+0x10/0x20 [ 25.349838] [ 25.355966] Allocated by task 319: [ 25.356270] kasan_save_stack+0x3c/0x68 [ 25.356614] kasan_save_track+0x20/0x40 [ 25.356958] kasan_save_alloc_info+0x40/0x58 [ 25.357341] __kasan_kmalloc+0xd4/0xd8 [ 25.357678] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.358085] kasan_atomics+0xb8/0x2e0 [ 25.358413] kunit_try_run_case+0x170/0x3f0 [ 25.358789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.359278] kthread+0x328/0x630 [ 25.359571] ret_from_fork+0x10/0x20 [ 25.359893] [ 25.360030] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.360030] which belongs to the cache kmalloc-64 of size 64 [ 25.361113] The buggy address is located 0 bytes to the right of [ 25.361113] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.362242] [ 25.362379] The buggy address belongs to the physical page: [ 25.362871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.363563] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.364140] page_type: f5(slab) [ 25.364424] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.365107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.365789] page dumped because: kasan: bad access detected [ 25.366281] [ 25.366417] Memory state around the buggy address: [ 25.366843] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.367480] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.368117] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.368753] ^ [ 25.369179] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.369815] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.370451] ================================================================== [ 24.878899] ================================================================== [ 24.879537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 24.880191] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.880837] [ 24.880975] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.880989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.880994] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.880998] Call trace: [ 24.881002] show_stack+0x20/0x38 (C) [ 24.881011] dump_stack_lvl+0x8c/0xd0 [ 24.881019] print_report+0x118/0x608 [ 24.881028] kasan_report+0xdc/0x128 [ 24.881037] __asan_report_load4_noabort+0x20/0x30 [ 24.881047] kasan_atomics_helper+0x3e04/0x4858 [ 24.881056] kasan_atomics+0x198/0x2e0 [ 24.881063] kunit_try_run_case+0x170/0x3f0 [ 24.881074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.881086] kthread+0x328/0x630 [ 24.881095] ret_from_fork+0x10/0x20 [ 24.881105] [ 24.886935] Allocated by task 319: [ 24.887239] kasan_save_stack+0x3c/0x68 [ 24.887585] kasan_save_track+0x20/0x40 [ 24.887930] kasan_save_alloc_info+0x40/0x58 [ 24.888313] __kasan_kmalloc+0xd4/0xd8 [ 24.888651] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.889058] kasan_atomics+0xb8/0x2e0 [ 24.889386] kunit_try_run_case+0x170/0x3f0 [ 24.889763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.890254] kthread+0x328/0x630 [ 24.890547] ret_from_fork+0x10/0x20 [ 24.890869] [ 24.891006] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.891006] which belongs to the cache kmalloc-64 of size 64 [ 24.892089] The buggy address is located 0 bytes to the right of [ 24.892089] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.893218] [ 24.893355] The buggy address belongs to the physical page: [ 24.893847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.894538] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.895117] page_type: f5(slab) [ 24.895402] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.896086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.896768] page dumped because: kasan: bad access detected [ 24.897260] [ 24.897396] Memory state around the buggy address: [ 24.897822] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.898460] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.899097] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.899732] ^ [ 24.900158] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.900797] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.901432] ================================================================== [ 25.277449] ================================================================== [ 25.278086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 25.278740] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.279386] [ 25.279524] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.279538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.279542] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.279547] Call trace: [ 25.279550] show_stack+0x20/0x38 (C) [ 25.279560] dump_stack_lvl+0x8c/0xd0 [ 25.279568] print_report+0x118/0x608 [ 25.279577] kasan_report+0xdc/0x128 [ 25.279585] __asan_report_load8_noabort+0x20/0x30 [ 25.279596] kasan_atomics_helper+0x3f04/0x4858 [ 25.279604] kasan_atomics+0x198/0x2e0 [ 25.279612] kunit_try_run_case+0x170/0x3f0 [ 25.279622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.279634] kthread+0x328/0x630 [ 25.279644] ret_from_fork+0x10/0x20 [ 25.279653] [ 25.285481] Allocated by task 319: [ 25.285785] kasan_save_stack+0x3c/0x68 [ 25.286129] kasan_save_track+0x20/0x40 [ 25.286474] kasan_save_alloc_info+0x40/0x58 [ 25.286857] __kasan_kmalloc+0xd4/0xd8 [ 25.287194] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.287603] kasan_atomics+0xb8/0x2e0 [ 25.287932] kunit_try_run_case+0x170/0x3f0 [ 25.288307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.288797] kthread+0x328/0x630 [ 25.289089] ret_from_fork+0x10/0x20 [ 25.289412] [ 25.289548] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.289548] which belongs to the cache kmalloc-64 of size 64 [ 25.290631] The buggy address is located 0 bytes to the right of [ 25.290631] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.291761] [ 25.291897] The buggy address belongs to the physical page: [ 25.292389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.293081] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.293660] page_type: f5(slab) [ 25.293943] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.294627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.295309] page dumped because: kasan: bad access detected [ 25.295801] [ 25.295938] Memory state around the buggy address: [ 25.296363] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.297000] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.297637] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.298273] ^ [ 25.298699] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.299336] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.299972] ================================================================== [ 25.136431] ================================================================== [ 25.137068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 25.137722] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.138375] [ 25.138515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.138530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.138534] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.138539] Call trace: [ 25.138542] show_stack+0x20/0x38 (C) [ 25.138552] dump_stack_lvl+0x8c/0xd0 [ 25.138560] print_report+0x118/0x608 [ 25.138569] kasan_report+0xdc/0x128 [ 25.138578] kasan_check_range+0x100/0x1a8 [ 25.138588] __kasan_check_write+0x20/0x30 [ 25.138598] kasan_atomics_helper+0x1128/0x4858 [ 25.138606] kasan_atomics+0x198/0x2e0 [ 25.138614] kunit_try_run_case+0x170/0x3f0 [ 25.138625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.138636] kthread+0x328/0x630 [ 25.138646] ret_from_fork+0x10/0x20 [ 25.138655] [ 25.144784] Allocated by task 319: [ 25.145089] kasan_save_stack+0x3c/0x68 [ 25.145434] kasan_save_track+0x20/0x40 [ 25.145778] kasan_save_alloc_info+0x40/0x58 [ 25.146161] __kasan_kmalloc+0xd4/0xd8 [ 25.146498] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.146905] kasan_atomics+0xb8/0x2e0 [ 25.147234] kunit_try_run_case+0x170/0x3f0 [ 25.147609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.148098] kthread+0x328/0x630 [ 25.148391] ret_from_fork+0x10/0x20 [ 25.148714] [ 25.148851] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.148851] which belongs to the cache kmalloc-64 of size 64 [ 25.149934] The buggy address is located 0 bytes to the right of [ 25.149934] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.151064] [ 25.151200] The buggy address belongs to the physical page: [ 25.151692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.152384] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.152961] page_type: f5(slab) [ 25.153246] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.153929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.154612] page dumped because: kasan: bad access detected [ 25.155104] [ 25.155241] Memory state around the buggy address: [ 25.155665] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.156301] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.156938] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.157576] ^ [ 25.158002] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.158639] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.159275] ================================================================== [ 25.300624] ================================================================== [ 25.301261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 25.301914] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.302567] [ 25.302705] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.302719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.302724] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.302728] Call trace: [ 25.302732] show_stack+0x20/0x38 (C) [ 25.302741] dump_stack_lvl+0x8c/0xd0 [ 25.302749] print_report+0x118/0x608 [ 25.302758] kasan_report+0xdc/0x128 [ 25.302766] kasan_check_range+0x100/0x1a8 [ 25.302776] __kasan_check_write+0x20/0x30 [ 25.302786] kasan_atomics_helper+0x1414/0x4858 [ 25.302794] kasan_atomics+0x198/0x2e0 [ 25.302802] kunit_try_run_case+0x170/0x3f0 [ 25.302812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.302824] kthread+0x328/0x630 [ 25.302833] ret_from_fork+0x10/0x20 [ 25.302843] [ 25.308974] Allocated by task 319: [ 25.309279] kasan_save_stack+0x3c/0x68 [ 25.309623] kasan_save_track+0x20/0x40 [ 25.309966] kasan_save_alloc_info+0x40/0x58 [ 25.310349] __kasan_kmalloc+0xd4/0xd8 [ 25.310687] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.311093] kasan_atomics+0xb8/0x2e0 [ 25.311422] kunit_try_run_case+0x170/0x3f0 [ 25.311798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.312288] kthread+0x328/0x630 [ 25.312581] ret_from_fork+0x10/0x20 [ 25.312903] [ 25.313040] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.313040] which belongs to the cache kmalloc-64 of size 64 [ 25.314122] The buggy address is located 0 bytes to the right of [ 25.314122] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.315252] [ 25.315389] The buggy address belongs to the physical page: [ 25.315882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.316574] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.317151] page_type: f5(slab) [ 25.317434] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.318118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.318800] page dumped because: kasan: bad access detected [ 25.319292] [ 25.319428] Memory state around the buggy address: [ 25.319854] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.320490] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.321129] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.321766] ^ [ 25.322192] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.322829] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.323466] ================================================================== [ 24.408629] ================================================================== [ 24.409274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 24.409926] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.410586] [ 24.410730] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.410752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.410759] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.410766] Call trace: [ 24.410771] show_stack+0x20/0x38 (C) [ 24.410785] dump_stack_lvl+0x8c/0xd0 [ 24.410798] print_report+0x118/0x608 [ 24.410810] kasan_report+0xdc/0x128 [ 24.410823] kasan_check_range+0x100/0x1a8 [ 24.410837] __kasan_check_write+0x20/0x30 [ 24.410852] kasan_atomics_helper+0x61c/0x4858 [ 24.410864] kasan_atomics+0x198/0x2e0 [ 24.410876] kunit_try_run_case+0x170/0x3f0 [ 24.410891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.410908] kthread+0x328/0x630 [ 24.410923] ret_from_fork+0x10/0x20 [ 24.410937] [ 24.417080] Allocated by task 319: [ 24.417388] kasan_save_stack+0x3c/0x68 [ 24.417739] kasan_save_track+0x20/0x40 [ 24.418089] kasan_save_alloc_info+0x40/0x58 [ 24.418480] __kasan_kmalloc+0xd4/0xd8 [ 24.418822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.419236] kasan_atomics+0xb8/0x2e0 [ 24.419571] kunit_try_run_case+0x170/0x3f0 [ 24.419954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.420451] kthread+0x328/0x630 [ 24.420751] ret_from_fork+0x10/0x20 [ 24.421079] [ 24.421220] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.421220] which belongs to the cache kmalloc-64 of size 64 [ 24.422310] The buggy address is located 0 bytes to the right of [ 24.422310] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.423446] [ 24.423587] The buggy address belongs to the physical page: [ 24.424083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.424781] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.425366] page_type: f5(slab) [ 24.425656] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.426345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.427032] page dumped because: kasan: bad access detected [ 24.427529] [ 24.427670] Memory state around the buggy address: [ 24.428099] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.428743] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.429386] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.430028] ^ [ 24.430459] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.431102] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.431744] ================================================================== [ 24.832225] ================================================================== [ 24.832864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 24.833518] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.834163] [ 24.834303] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.834318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.834322] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.834327] Call trace: [ 24.834330] show_stack+0x20/0x38 (C) [ 24.834339] dump_stack_lvl+0x8c/0xd0 [ 24.834347] print_report+0x118/0x608 [ 24.834356] kasan_report+0xdc/0x128 [ 24.834364] __asan_report_load4_noabort+0x20/0x30 [ 24.834375] kasan_atomics_helper+0x3dd8/0x4858 [ 24.834384] kasan_atomics+0x198/0x2e0 [ 24.834391] kunit_try_run_case+0x170/0x3f0 [ 24.834401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.834413] kthread+0x328/0x630 [ 24.834423] ret_from_fork+0x10/0x20 [ 24.834432] [ 24.840262] Allocated by task 319: [ 24.840567] kasan_save_stack+0x3c/0x68 [ 24.840911] kasan_save_track+0x20/0x40 [ 24.841254] kasan_save_alloc_info+0x40/0x58 [ 24.841638] __kasan_kmalloc+0xd4/0xd8 [ 24.841974] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.842381] kasan_atomics+0xb8/0x2e0 [ 24.842710] kunit_try_run_case+0x170/0x3f0 [ 24.843087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.843578] kthread+0x328/0x630 [ 24.843871] ret_from_fork+0x10/0x20 [ 24.844193] [ 24.844330] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.844330] which belongs to the cache kmalloc-64 of size 64 [ 24.845413] The buggy address is located 0 bytes to the right of [ 24.845413] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.846542] [ 24.846680] The buggy address belongs to the physical page: [ 24.847172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.847864] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.848441] page_type: f5(slab) [ 24.848726] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.849409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.850091] page dumped because: kasan: bad access detected [ 24.850583] [ 24.850719] Memory state around the buggy address: [ 24.851145] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.851782] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.852420] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.853056] ^ [ 24.853482] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.854118] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.854754] ================================================================== [ 24.761992] ================================================================== [ 24.762629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 24.763275] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.763928] [ 24.764066] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.764081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.764085] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.764090] Call trace: [ 24.764094] show_stack+0x20/0x38 (C) [ 24.764102] dump_stack_lvl+0x8c/0xd0 [ 24.764111] print_report+0x118/0x608 [ 24.764119] kasan_report+0xdc/0x128 [ 24.764128] kasan_check_range+0x100/0x1a8 [ 24.764137] __kasan_check_write+0x20/0x30 [ 24.764147] kasan_atomics_helper+0xc08/0x4858 [ 24.764155] kasan_atomics+0x198/0x2e0 [ 24.764164] kunit_try_run_case+0x170/0x3f0 [ 24.764174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.764185] kthread+0x328/0x630 [ 24.764195] ret_from_fork+0x10/0x20 [ 24.764204] [ 24.770326] Allocated by task 319: [ 24.770630] kasan_save_stack+0x3c/0x68 [ 24.770974] kasan_save_track+0x20/0x40 [ 24.771319] kasan_save_alloc_info+0x40/0x58 [ 24.771702] __kasan_kmalloc+0xd4/0xd8 [ 24.772039] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.772446] kasan_atomics+0xb8/0x2e0 [ 24.772775] kunit_try_run_case+0x170/0x3f0 [ 24.773150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.773641] kthread+0x328/0x630 [ 24.773934] ret_from_fork+0x10/0x20 [ 24.774256] [ 24.774394] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.774394] which belongs to the cache kmalloc-64 of size 64 [ 24.775476] The buggy address is located 0 bytes to the right of [ 24.775476] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.776606] [ 24.776743] The buggy address belongs to the physical page: [ 24.777235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.777925] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.778503] page_type: f5(slab) [ 24.778787] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.779470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.780152] page dumped because: kasan: bad access detected [ 24.780644] [ 24.780781] Memory state around the buggy address: [ 24.781207] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.781843] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.782480] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.783116] ^ [ 24.783542] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.784178] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.784814] ================================================================== [ 25.018956] ================================================================== [ 25.019594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 25.020240] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.020893] [ 25.021032] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.021046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.021051] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.021056] Call trace: [ 25.021059] show_stack+0x20/0x38 (C) [ 25.021068] dump_stack_lvl+0x8c/0xd0 [ 25.021077] print_report+0x118/0x608 [ 25.021086] kasan_report+0xdc/0x128 [ 25.021095] kasan_check_range+0x100/0x1a8 [ 25.021104] __kasan_check_write+0x20/0x30 [ 25.021115] kasan_atomics_helper+0xf20/0x4858 [ 25.021123] kasan_atomics+0x198/0x2e0 [ 25.021132] kunit_try_run_case+0x170/0x3f0 [ 25.021142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.021154] kthread+0x328/0x630 [ 25.021164] ret_from_fork+0x10/0x20 [ 25.021174] [ 25.027295] Allocated by task 319: [ 25.027598] kasan_save_stack+0x3c/0x68 [ 25.027943] kasan_save_track+0x20/0x40 [ 25.028287] kasan_save_alloc_info+0x40/0x58 [ 25.028670] __kasan_kmalloc+0xd4/0xd8 [ 25.029007] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.029414] kasan_atomics+0xb8/0x2e0 [ 25.029743] kunit_try_run_case+0x170/0x3f0 [ 25.030118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.030608] kthread+0x328/0x630 [ 25.030901] ret_from_fork+0x10/0x20 [ 25.031224] [ 25.031360] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.031360] which belongs to the cache kmalloc-64 of size 64 [ 25.032443] The buggy address is located 0 bytes to the right of [ 25.032443] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.033572] [ 25.033709] The buggy address belongs to the physical page: [ 25.034202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.034894] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.035472] page_type: f5(slab) [ 25.035755] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.036439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.037121] page dumped because: kasan: bad access detected [ 25.037613] [ 25.037750] Memory state around the buggy address: [ 25.038175] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.038814] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.039450] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.040086] ^ [ 25.040512] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.041150] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.041786] ================================================================== [ 24.527967] ================================================================== [ 24.528605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 24.529251] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.529905] [ 24.530044] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.530059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.530063] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.530068] Call trace: [ 24.530072] show_stack+0x20/0x38 (C) [ 24.530081] dump_stack_lvl+0x8c/0xd0 [ 24.530089] print_report+0x118/0x608 [ 24.530098] kasan_report+0xdc/0x128 [ 24.530106] kasan_check_range+0x100/0x1a8 [ 24.530116] __kasan_check_write+0x20/0x30 [ 24.530126] kasan_atomics_helper+0x894/0x4858 [ 24.530134] kasan_atomics+0x198/0x2e0 [ 24.530142] kunit_try_run_case+0x170/0x3f0 [ 24.530152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.530164] kthread+0x328/0x630 [ 24.530174] ret_from_fork+0x10/0x20 [ 24.530183] [ 24.536305] Allocated by task 319: [ 24.536609] kasan_save_stack+0x3c/0x68 [ 24.536954] kasan_save_track+0x20/0x40 [ 24.537297] kasan_save_alloc_info+0x40/0x58 [ 24.537680] __kasan_kmalloc+0xd4/0xd8 [ 24.538017] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.538425] kasan_atomics+0xb8/0x2e0 [ 24.538755] kunit_try_run_case+0x170/0x3f0 [ 24.539130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.539621] kthread+0x328/0x630 [ 24.539913] ret_from_fork+0x10/0x20 [ 24.540236] [ 24.540372] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.540372] which belongs to the cache kmalloc-64 of size 64 [ 24.541455] The buggy address is located 0 bytes to the right of [ 24.541455] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.542585] [ 24.542722] The buggy address belongs to the physical page: [ 24.543214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.543906] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.544485] page_type: f5(slab) [ 24.544770] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.545454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.546136] page dumped because: kasan: bad access detected [ 24.546628] [ 24.546764] Memory state around the buggy address: [ 24.547190] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.547826] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.548464] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.549101] ^ [ 24.549527] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.550164] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.550800] ================================================================== [ 25.488002] ================================================================== [ 25.488640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 25.489295] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.489948] [ 25.490088] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.490103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.490108] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.490113] Call trace: [ 25.490116] show_stack+0x20/0x38 (C) [ 25.490125] dump_stack_lvl+0x8c/0xd0 [ 25.490134] print_report+0x118/0x608 [ 25.490143] kasan_report+0xdc/0x128 [ 25.490152] kasan_check_range+0x100/0x1a8 [ 25.490162] __kasan_check_write+0x20/0x30 [ 25.490172] kasan_atomics_helper+0x16d0/0x4858 [ 25.490180] kasan_atomics+0x198/0x2e0 [ 25.490188] kunit_try_run_case+0x170/0x3f0 [ 25.490199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.490211] kthread+0x328/0x630 [ 25.490221] ret_from_fork+0x10/0x20 [ 25.490231] [ 25.496359] Allocated by task 319: [ 25.496663] kasan_save_stack+0x3c/0x68 [ 25.497008] kasan_save_track+0x20/0x40 [ 25.497351] kasan_save_alloc_info+0x40/0x58 [ 25.497734] __kasan_kmalloc+0xd4/0xd8 [ 25.498072] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.498480] kasan_atomics+0xb8/0x2e0 [ 25.498809] kunit_try_run_case+0x170/0x3f0 [ 25.499185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.499674] kthread+0x328/0x630 [ 25.499967] ret_from_fork+0x10/0x20 [ 25.500289] [ 25.500426] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.500426] which belongs to the cache kmalloc-64 of size 64 [ 25.501508] The buggy address is located 0 bytes to the right of [ 25.501508] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.502638] [ 25.502776] The buggy address belongs to the physical page: [ 25.503269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.503961] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.504539] page_type: f5(slab) [ 25.504824] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.505508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.506190] page dumped because: kasan: bad access detected [ 25.506682] [ 25.506818] Memory state around the buggy address: [ 25.507244] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.507881] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.508518] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.509155] ^ [ 25.509581] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.510218] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.510854] ================================================================== [ 24.288365] ================================================================== [ 24.289019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 24.289682] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.290351] [ 24.290500] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.290532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.290542] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.290552] Call trace: [ 24.290560] show_stack+0x20/0x38 (C) [ 24.290580] dump_stack_lvl+0x8c/0xd0 [ 24.290599] print_report+0x118/0x608 [ 24.290618] kasan_report+0xdc/0x128 [ 24.290637] kasan_check_range+0x100/0x1a8 [ 24.290658] __kasan_check_write+0x20/0x30 [ 24.290680] kasan_atomics_helper+0x414/0x4858 [ 24.290699] kasan_atomics+0x198/0x2e0 [ 24.290716] kunit_try_run_case+0x170/0x3f0 [ 24.290738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.290764] kthread+0x328/0x630 [ 24.290785] ret_from_fork+0x10/0x20 [ 24.290806] [ 24.296989] Allocated by task 319: [ 24.297305] kasan_save_stack+0x3c/0x68 [ 24.297665] kasan_save_track+0x20/0x40 [ 24.298023] kasan_save_alloc_info+0x40/0x58 [ 24.298423] __kasan_kmalloc+0xd4/0xd8 [ 24.298773] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.299198] kasan_atomics+0xb8/0x2e0 [ 24.299539] kunit_try_run_case+0x170/0x3f0 [ 24.299932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.300441] kthread+0x328/0x630 [ 24.300751] ret_from_fork+0x10/0x20 [ 24.301088] [ 24.301234] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.301234] which belongs to the cache kmalloc-64 of size 64 [ 24.302336] The buggy address is located 0 bytes to the right of [ 24.302336] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.303485] [ 24.303632] The buggy address belongs to the physical page: [ 24.304135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.304843] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.305437] page_type: f5(slab) [ 24.305734] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.306433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.307128] page dumped because: kasan: bad access detected [ 24.307632] [ 24.307777] Memory state around the buggy address: [ 24.308214] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.308867] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.309519] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.310169] ^ [ 24.310608] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.311260] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.311910] ================================================================== [ 25.042443] ================================================================== [ 25.043081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 25.043726] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.044380] [ 25.044518] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.044532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.044536] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.044541] Call trace: [ 25.044544] show_stack+0x20/0x38 (C) [ 25.044554] dump_stack_lvl+0x8c/0xd0 [ 25.044562] print_report+0x118/0x608 [ 25.044571] kasan_report+0xdc/0x128 [ 25.044580] kasan_check_range+0x100/0x1a8 [ 25.044589] __kasan_check_write+0x20/0x30 [ 25.044599] kasan_atomics_helper+0xf88/0x4858 [ 25.044607] kasan_atomics+0x198/0x2e0 [ 25.044615] kunit_try_run_case+0x170/0x3f0 [ 25.044625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.044636] kthread+0x328/0x630 [ 25.044646] ret_from_fork+0x10/0x20 [ 25.044656] [ 25.050780] Allocated by task 319: [ 25.051084] kasan_save_stack+0x3c/0x68 [ 25.051429] kasan_save_track+0x20/0x40 [ 25.051772] kasan_save_alloc_info+0x40/0x58 [ 25.052155] __kasan_kmalloc+0xd4/0xd8 [ 25.052493] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.052899] kasan_atomics+0xb8/0x2e0 [ 25.053229] kunit_try_run_case+0x170/0x3f0 [ 25.053604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.054095] kthread+0x328/0x630 [ 25.054387] ret_from_fork+0x10/0x20 [ 25.054709] [ 25.054846] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.054846] which belongs to the cache kmalloc-64 of size 64 [ 25.055929] The buggy address is located 0 bytes to the right of [ 25.055929] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.057058] [ 25.057196] The buggy address belongs to the physical page: [ 25.057688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.058379] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.058958] page_type: f5(slab) [ 25.059241] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.059925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.060607] page dumped because: kasan: bad access detected [ 25.061099] [ 25.061236] Memory state around the buggy address: [ 25.061662] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.062298] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.062935] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.063573] ^ [ 25.063997] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.064635] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.065272] ================================================================== [ 25.464799] ================================================================== [ 25.465436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 25.466089] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.466734] [ 25.466873] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.466887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.466891] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.466896] Call trace: [ 25.466899] show_stack+0x20/0x38 (C) [ 25.466908] dump_stack_lvl+0x8c/0xd0 [ 25.466917] print_report+0x118/0x608 [ 25.466926] kasan_report+0xdc/0x128 [ 25.466934] __asan_report_load8_noabort+0x20/0x30 [ 25.466944] kasan_atomics_helper+0x3df4/0x4858 [ 25.466953] kasan_atomics+0x198/0x2e0 [ 25.466961] kunit_try_run_case+0x170/0x3f0 [ 25.466971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.466983] kthread+0x328/0x630 [ 25.466992] ret_from_fork+0x10/0x20 [ 25.467002] [ 25.472835] Allocated by task 319: [ 25.473138] kasan_save_stack+0x3c/0x68 [ 25.473482] kasan_save_track+0x20/0x40 [ 25.473827] kasan_save_alloc_info+0x40/0x58 [ 25.474210] __kasan_kmalloc+0xd4/0xd8 [ 25.474547] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.474954] kasan_atomics+0xb8/0x2e0 [ 25.475283] kunit_try_run_case+0x170/0x3f0 [ 25.475658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.476149] kthread+0x328/0x630 [ 25.476442] ret_from_fork+0x10/0x20 [ 25.476764] [ 25.476900] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.476900] which belongs to the cache kmalloc-64 of size 64 [ 25.477983] The buggy address is located 0 bytes to the right of [ 25.477983] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.479112] [ 25.479249] The buggy address belongs to the physical page: [ 25.479741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.480433] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.481011] page_type: f5(slab) [ 25.481296] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.481980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.482662] page dumped because: kasan: bad access detected [ 25.483154] [ 25.483290] Memory state around the buggy address: [ 25.483716] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.484354] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.484991] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.485627] ^ [ 25.486053] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.486690] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.487326] ================================================================== [ 24.645141] ================================================================== [ 24.645779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 24.646425] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.647078] [ 24.647218] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.647232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.647237] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.647242] Call trace: [ 24.647245] show_stack+0x20/0x38 (C) [ 24.647255] dump_stack_lvl+0x8c/0xd0 [ 24.647263] print_report+0x118/0x608 [ 24.647272] kasan_report+0xdc/0x128 [ 24.647281] kasan_check_range+0x100/0x1a8 [ 24.647290] __kasan_check_write+0x20/0x30 [ 24.647300] kasan_atomics_helper+0xa6c/0x4858 [ 24.647309] kasan_atomics+0x198/0x2e0 [ 24.647317] kunit_try_run_case+0x170/0x3f0 [ 24.647327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.647339] kthread+0x328/0x630 [ 24.647349] ret_from_fork+0x10/0x20 [ 24.647358] [ 24.653482] Allocated by task 319: [ 24.653787] kasan_save_stack+0x3c/0x68 [ 24.654132] kasan_save_track+0x20/0x40 [ 24.654477] kasan_save_alloc_info+0x40/0x58 [ 24.654861] __kasan_kmalloc+0xd4/0xd8 [ 24.655198] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.655604] kasan_atomics+0xb8/0x2e0 [ 24.655933] kunit_try_run_case+0x170/0x3f0 [ 24.656309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.656800] kthread+0x328/0x630 [ 24.657093] ret_from_fork+0x10/0x20 [ 24.657415] [ 24.657553] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.657553] which belongs to the cache kmalloc-64 of size 64 [ 24.658636] The buggy address is located 0 bytes to the right of [ 24.658636] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.659766] [ 24.659902] The buggy address belongs to the physical page: [ 24.660394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.661086] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.661663] page_type: f5(slab) [ 24.661948] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.662632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.663313] page dumped because: kasan: bad access detected [ 24.663805] [ 24.663942] Memory state around the buggy address: [ 24.664368] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.665004] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.665642] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.666279] ^ [ 24.666705] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.667343] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.667979] ================================================================== [ 24.117772] ================================================================== [ 24.118433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 24.119104] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.119768] [ 24.119923] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.119959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.119969] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.119983] Call trace: [ 24.119992] show_stack+0x20/0x38 (C) [ 24.120014] dump_stack_lvl+0x8c/0xd0 [ 24.120038] print_report+0x118/0x608 [ 24.120059] kasan_report+0xdc/0x128 [ 24.120080] kasan_check_range+0x100/0x1a8 [ 24.120102] __kasan_check_read+0x20/0x30 [ 24.120126] kasan_atomics_helper+0x1ec/0x4858 [ 24.120148] kasan_atomics+0x198/0x2e0 [ 24.120168] kunit_try_run_case+0x170/0x3f0 [ 24.120193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.120221] kthread+0x328/0x630 [ 24.120245] ret_from_fork+0x10/0x20 [ 24.120269] [ 24.126456] Allocated by task 319: [ 24.126774] kasan_save_stack+0x3c/0x68 [ 24.127136] kasan_save_track+0x20/0x40 [ 24.127497] kasan_save_alloc_info+0x40/0x58 [ 24.127899] __kasan_kmalloc+0xd4/0xd8 [ 24.128252] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.128681] kasan_atomics+0xb8/0x2e0 [ 24.129025] kunit_try_run_case+0x170/0x3f0 [ 24.129420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.129931] kthread+0x328/0x630 [ 24.130242] ret_from_fork+0x10/0x20 [ 24.130582] [ 24.130730] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.130730] which belongs to the cache kmalloc-64 of size 64 [ 24.131836] The buggy address is located 0 bytes to the right of [ 24.131836] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.132987] [ 24.133135] The buggy address belongs to the physical page: [ 24.133643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.134354] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.134953] page_type: f5(slab) [ 24.135253] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.135956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.136654] page dumped because: kasan: bad access detected [ 24.137160] [ 24.137308] Memory state around the buggy address: [ 24.137747] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.138402] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.139059] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.139712] ^ [ 24.140151] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.140806] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.141458] ================================================================== [ 24.384789] ================================================================== [ 24.385434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 24.386087] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.386746] [ 24.386889] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.386911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.386917] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.386924] Call trace: [ 24.386929] show_stack+0x20/0x38 (C) [ 24.386943] dump_stack_lvl+0x8c/0xd0 [ 24.386956] print_report+0x118/0x608 [ 24.386969] kasan_report+0xdc/0x128 [ 24.386982] kasan_check_range+0x100/0x1a8 [ 24.386996] __kasan_check_write+0x20/0x30 [ 24.387011] kasan_atomics_helper+0x5b4/0x4858 [ 24.387023] kasan_atomics+0x198/0x2e0 [ 24.387035] kunit_try_run_case+0x170/0x3f0 [ 24.387051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.387068] kthread+0x328/0x630 [ 24.387083] ret_from_fork+0x10/0x20 [ 24.387097] [ 24.393242] Allocated by task 319: [ 24.393551] kasan_save_stack+0x3c/0x68 [ 24.393902] kasan_save_track+0x20/0x40 [ 24.394252] kasan_save_alloc_info+0x40/0x58 [ 24.394642] __kasan_kmalloc+0xd4/0xd8 [ 24.394984] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.395398] kasan_atomics+0xb8/0x2e0 [ 24.395733] kunit_try_run_case+0x170/0x3f0 [ 24.396115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.396613] kthread+0x328/0x630 [ 24.396912] ret_from_fork+0x10/0x20 [ 24.397240] [ 24.397381] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.397381] which belongs to the cache kmalloc-64 of size 64 [ 24.398470] The buggy address is located 0 bytes to the right of [ 24.398470] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.399609] [ 24.399749] The buggy address belongs to the physical page: [ 24.400246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.400944] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.401530] page_type: f5(slab) [ 24.401819] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.402510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.403196] page dumped because: kasan: bad access detected [ 24.403694] [ 24.403834] Memory state around the buggy address: [ 24.404264] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.404907] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.405551] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.406193] ^ [ 24.406623] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.407267] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.407908] ================================================================== [ 25.511524] ================================================================== [ 25.512163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 25.512817] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.513463] [ 25.513601] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.513615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.513620] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.513624] Call trace: [ 25.513628] show_stack+0x20/0x38 (C) [ 25.513637] dump_stack_lvl+0x8c/0xd0 [ 25.513646] print_report+0x118/0x608 [ 25.513655] kasan_report+0xdc/0x128 [ 25.513664] __asan_report_load8_noabort+0x20/0x30 [ 25.513674] kasan_atomics_helper+0x3e10/0x4858 [ 25.513682] kasan_atomics+0x198/0x2e0 [ 25.513690] kunit_try_run_case+0x170/0x3f0 [ 25.513701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.513713] kthread+0x328/0x630 [ 25.513723] ret_from_fork+0x10/0x20 [ 25.513732] [ 25.519563] Allocated by task 319: [ 25.519868] kasan_save_stack+0x3c/0x68 [ 25.520213] kasan_save_track+0x20/0x40 [ 25.520557] kasan_save_alloc_info+0x40/0x58 [ 25.520940] __kasan_kmalloc+0xd4/0xd8 [ 25.521277] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.521684] kasan_atomics+0xb8/0x2e0 [ 25.522013] kunit_try_run_case+0x170/0x3f0 [ 25.522389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.522880] kthread+0x328/0x630 [ 25.523173] ret_from_fork+0x10/0x20 [ 25.523495] [ 25.523632] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.523632] which belongs to the cache kmalloc-64 of size 64 [ 25.524714] The buggy address is located 0 bytes to the right of [ 25.524714] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.525844] [ 25.525981] The buggy address belongs to the physical page: [ 25.526473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.527165] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.527742] page_type: f5(slab) [ 25.528027] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.528710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.529392] page dumped because: kasan: bad access detected [ 25.529884] [ 25.530021] Memory state around the buggy address: [ 25.530445] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.531082] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.531719] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.532355] ^ [ 25.532781] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.533418] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.534055] ================================================================== [ 24.191649] ================================================================== [ 24.192306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 24.192977] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.193639] [ 24.193788] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.193821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.193831] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.193842] Call trace: [ 24.193849] show_stack+0x20/0x38 (C) [ 24.193869] dump_stack_lvl+0x8c/0xd0 [ 24.193889] print_report+0x118/0x608 [ 24.193909] kasan_report+0xdc/0x128 [ 24.193927] __asan_report_load4_noabort+0x20/0x30 [ 24.193951] kasan_atomics_helper+0x40fc/0x4858 [ 24.193970] kasan_atomics+0x198/0x2e0 [ 24.193987] kunit_try_run_case+0x170/0x3f0 [ 24.194011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.194036] kthread+0x328/0x630 [ 24.194058] ret_from_fork+0x10/0x20 [ 24.194079] [ 24.199969] Allocated by task 319: [ 24.200285] kasan_save_stack+0x3c/0x68 [ 24.200645] kasan_save_track+0x20/0x40 [ 24.201003] kasan_save_alloc_info+0x40/0x58 [ 24.201403] __kasan_kmalloc+0xd4/0xd8 [ 24.201753] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.202179] kasan_atomics+0xb8/0x2e0 [ 24.202523] kunit_try_run_case+0x170/0x3f0 [ 24.202916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.203425] kthread+0x328/0x630 [ 24.203735] ret_from_fork+0x10/0x20 [ 24.204073] [ 24.204220] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.204220] which belongs to the cache kmalloc-64 of size 64 [ 24.205320] The buggy address is located 0 bytes to the right of [ 24.205320] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.206469] [ 24.206616] The buggy address belongs to the physical page: [ 24.207120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.207828] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.208421] page_type: f5(slab) [ 24.208719] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.209418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.210113] page dumped because: kasan: bad access detected [ 24.210617] [ 24.210763] Memory state around the buggy address: [ 24.211201] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.211853] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.212506] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.213156] ^ [ 24.213594] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.214246] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.214896] ================================================================== [ 24.574677] ================================================================== [ 24.575314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 24.575960] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.576614] [ 24.576753] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.576768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.576772] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.576777] Call trace: [ 24.576780] show_stack+0x20/0x38 (C) [ 24.576789] dump_stack_lvl+0x8c/0xd0 [ 24.576798] print_report+0x118/0x608 [ 24.576806] kasan_report+0xdc/0x128 [ 24.576815] kasan_check_range+0x100/0x1a8 [ 24.576824] __kasan_check_write+0x20/0x30 [ 24.576835] kasan_atomics_helper+0x934/0x4858 [ 24.576843] kasan_atomics+0x198/0x2e0 [ 24.576851] kunit_try_run_case+0x170/0x3f0 [ 24.576861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.576873] kthread+0x328/0x630 [ 24.576883] ret_from_fork+0x10/0x20 [ 24.576892] [ 24.583018] Allocated by task 319: [ 24.583322] kasan_save_stack+0x3c/0x68 [ 24.583667] kasan_save_track+0x20/0x40 [ 24.584010] kasan_save_alloc_info+0x40/0x58 [ 24.584393] __kasan_kmalloc+0xd4/0xd8 [ 24.584730] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.585138] kasan_atomics+0xb8/0x2e0 [ 24.585467] kunit_try_run_case+0x170/0x3f0 [ 24.585842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.586334] kthread+0x328/0x630 [ 24.586626] ret_from_fork+0x10/0x20 [ 24.586948] [ 24.587085] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.587085] which belongs to the cache kmalloc-64 of size 64 [ 24.588167] The buggy address is located 0 bytes to the right of [ 24.588167] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.589297] [ 24.589433] The buggy address belongs to the physical page: [ 24.589925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.590617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.591194] page_type: f5(slab) [ 24.591477] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.592160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.592842] page dumped because: kasan: bad access detected [ 24.593334] [ 24.593470] Memory state around the buggy address: [ 24.593896] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.594533] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.595170] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.595806] ^ [ 24.596231] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.596868] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.597504] ================================================================== [ 25.581398] ================================================================== [ 25.582034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 25.582687] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.583341] [ 25.583479] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.583494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.583498] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.583503] Call trace: [ 25.583506] show_stack+0x20/0x38 (C) [ 25.583515] dump_stack_lvl+0x8c/0xd0 [ 25.583524] print_report+0x118/0x608 [ 25.583532] kasan_report+0xdc/0x128 [ 25.583541] kasan_check_range+0x100/0x1a8 [ 25.583550] __kasan_check_write+0x20/0x30 [ 25.583561] kasan_atomics_helper+0x17ec/0x4858 [ 25.583569] kasan_atomics+0x198/0x2e0 [ 25.583577] kunit_try_run_case+0x170/0x3f0 [ 25.583587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.583599] kthread+0x328/0x630 [ 25.583609] ret_from_fork+0x10/0x20 [ 25.583618] [ 25.589748] Allocated by task 319: [ 25.590053] kasan_save_stack+0x3c/0x68 [ 25.590398] kasan_save_track+0x20/0x40 [ 25.590743] kasan_save_alloc_info+0x40/0x58 [ 25.591126] __kasan_kmalloc+0xd4/0xd8 [ 25.591463] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.591870] kasan_atomics+0xb8/0x2e0 [ 25.592198] kunit_try_run_case+0x170/0x3f0 [ 25.592574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.593065] kthread+0x328/0x630 [ 25.593357] ret_from_fork+0x10/0x20 [ 25.593680] [ 25.593816] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.593816] which belongs to the cache kmalloc-64 of size 64 [ 25.594899] The buggy address is located 0 bytes to the right of [ 25.594899] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.596028] [ 25.596165] The buggy address belongs to the physical page: [ 25.596657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.597349] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.597926] page_type: f5(slab) [ 25.598209] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.598893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.599575] page dumped because: kasan: bad access detected [ 25.600067] [ 25.600203] Memory state around the buggy address: [ 25.600627] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.601266] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.601904] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.602540] ^ [ 25.602966] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.603602] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.604239] ================================================================== [ 25.065933] ================================================================== [ 25.066570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 25.067216] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.067869] [ 25.068009] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.068023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.068027] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.068032] Call trace: [ 25.068035] show_stack+0x20/0x38 (C) [ 25.068045] dump_stack_lvl+0x8c/0xd0 [ 25.068053] print_report+0x118/0x608 [ 25.068062] kasan_report+0xdc/0x128 [ 25.068070] kasan_check_range+0x100/0x1a8 [ 25.068079] __kasan_check_write+0x20/0x30 [ 25.068089] kasan_atomics_helper+0xff0/0x4858 [ 25.068098] kasan_atomics+0x198/0x2e0 [ 25.068106] kunit_try_run_case+0x170/0x3f0 [ 25.068116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.068127] kthread+0x328/0x630 [ 25.068137] ret_from_fork+0x10/0x20 [ 25.068146] [ 25.074265] Allocated by task 319: [ 25.074570] kasan_save_stack+0x3c/0x68 [ 25.074914] kasan_save_track+0x20/0x40 [ 25.075258] kasan_save_alloc_info+0x40/0x58 [ 25.075641] __kasan_kmalloc+0xd4/0xd8 [ 25.075978] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.076384] kasan_atomics+0xb8/0x2e0 [ 25.076714] kunit_try_run_case+0x170/0x3f0 [ 25.077089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.077579] kthread+0x328/0x630 [ 25.077872] ret_from_fork+0x10/0x20 [ 25.078194] [ 25.078331] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.078331] which belongs to the cache kmalloc-64 of size 64 [ 25.079414] The buggy address is located 0 bytes to the right of [ 25.079414] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.080543] [ 25.080679] The buggy address belongs to the physical page: [ 25.081171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.081862] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.082441] page_type: f5(slab) [ 25.082724] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.083408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.084090] page dumped because: kasan: bad access detected [ 25.084582] [ 25.084718] Memory state around the buggy address: [ 25.085142] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.085779] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.086416] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.087052] ^ [ 25.087477] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.088115] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.088750] ================================================================== [ 24.068083] ================================================================== [ 24.069475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 24.070176] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.070857] [ 24.071023] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.071075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.071091] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.071109] Call trace: [ 24.071122] show_stack+0x20/0x38 (C) [ 24.071157] dump_stack_lvl+0x8c/0xd0 [ 24.071190] print_report+0x118/0x608 [ 24.071222] kasan_report+0xdc/0x128 [ 24.071252] __asan_report_load4_noabort+0x20/0x30 [ 24.071288] kasan_atomics_helper+0x40a8/0x4858 [ 24.071318] kasan_atomics+0x198/0x2e0 [ 24.071346] kunit_try_run_case+0x170/0x3f0 [ 24.071383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.071423] kthread+0x328/0x630 [ 24.071459] ret_from_fork+0x10/0x20 [ 24.071493] [ 24.077442] Allocated by task 319: [ 24.077770] kasan_save_stack+0x3c/0x68 [ 24.078145] kasan_save_track+0x20/0x40 [ 24.078517] kasan_save_alloc_info+0x40/0x58 [ 24.078932] __kasan_kmalloc+0xd4/0xd8 [ 24.079295] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.079738] kasan_atomics+0xb8/0x2e0 [ 24.080095] kunit_try_run_case+0x170/0x3f0 [ 24.080502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.081028] kthread+0x328/0x630 [ 24.081352] ret_from_fork+0x10/0x20 [ 24.081702] [ 24.081856] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.081856] which belongs to the cache kmalloc-64 of size 64 [ 24.082975] The buggy address is located 0 bytes to the right of [ 24.082975] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.084142] [ 24.084297] The buggy address belongs to the physical page: [ 24.084814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.085539] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.086150] page_type: f5(slab) [ 24.086465] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.087183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.087891] page dumped because: kasan: bad access detected [ 24.088408] [ 24.088561] Memory state around the buggy address: [ 24.089012] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.089679] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.090346] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.091009] ^ [ 24.091460] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.092127] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.092790] ================================================================== [ 25.371123] ================================================================== [ 25.371761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 25.372414] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.373068] [ 25.373207] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.373221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.373225] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.373230] Call trace: [ 25.373233] show_stack+0x20/0x38 (C) [ 25.373243] dump_stack_lvl+0x8c/0xd0 [ 25.373251] print_report+0x118/0x608 [ 25.373260] kasan_report+0xdc/0x128 [ 25.373269] kasan_check_range+0x100/0x1a8 [ 25.373278] __kasan_check_write+0x20/0x30 [ 25.373288] kasan_atomics_helper+0x154c/0x4858 [ 25.373297] kasan_atomics+0x198/0x2e0 [ 25.373304] kunit_try_run_case+0x170/0x3f0 [ 25.373315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.373326] kthread+0x328/0x630 [ 25.373336] ret_from_fork+0x10/0x20 [ 25.373346] [ 25.379473] Allocated by task 319: [ 25.379778] kasan_save_stack+0x3c/0x68 [ 25.380122] kasan_save_track+0x20/0x40 [ 25.380467] kasan_save_alloc_info+0x40/0x58 [ 25.380850] __kasan_kmalloc+0xd4/0xd8 [ 25.381187] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.381594] kasan_atomics+0xb8/0x2e0 [ 25.381923] kunit_try_run_case+0x170/0x3f0 [ 25.382298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.382789] kthread+0x328/0x630 [ 25.383082] ret_from_fork+0x10/0x20 [ 25.383404] [ 25.383543] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.383543] which belongs to the cache kmalloc-64 of size 64 [ 25.384625] The buggy address is located 0 bytes to the right of [ 25.384625] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.385755] [ 25.385891] The buggy address belongs to the physical page: [ 25.386383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.387075] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.387654] page_type: f5(slab) [ 25.387938] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.388623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.389304] page dumped because: kasan: bad access detected [ 25.389796] [ 25.389932] Memory state around the buggy address: [ 25.390358] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.390994] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.391633] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.392268] ^ [ 25.392693] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.393329] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.393966] ================================================================== [ 24.432493] ================================================================== [ 24.433137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 24.433791] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.434451] [ 24.434594] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.434616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.434622] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.434630] Call trace: [ 24.434635] show_stack+0x20/0x38 (C) [ 24.434649] dump_stack_lvl+0x8c/0xd0 [ 24.434661] print_report+0x118/0x608 [ 24.434675] kasan_report+0xdc/0x128 [ 24.434688] kasan_check_range+0x100/0x1a8 [ 24.434702] __kasan_check_write+0x20/0x30 [ 24.434718] kasan_atomics_helper+0x684/0x4858 [ 24.434730] kasan_atomics+0x198/0x2e0 [ 24.434742] kunit_try_run_case+0x170/0x3f0 [ 24.434758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.434776] kthread+0x328/0x630 [ 24.434791] ret_from_fork+0x10/0x20 [ 24.434805] [ 24.440950] Allocated by task 319: [ 24.441258] kasan_save_stack+0x3c/0x68 [ 24.441609] kasan_save_track+0x20/0x40 [ 24.441960] kasan_save_alloc_info+0x40/0x58 [ 24.442350] __kasan_kmalloc+0xd4/0xd8 [ 24.442692] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.443107] kasan_atomics+0xb8/0x2e0 [ 24.443443] kunit_try_run_case+0x170/0x3f0 [ 24.443826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.444323] kthread+0x328/0x630 [ 24.444623] ret_from_fork+0x10/0x20 [ 24.444951] [ 24.445091] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.445091] which belongs to the cache kmalloc-64 of size 64 [ 24.446182] The buggy address is located 0 bytes to the right of [ 24.446182] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.447318] [ 24.447459] The buggy address belongs to the physical page: [ 24.447955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.448653] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.449238] page_type: f5(slab) [ 24.449528] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.450218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.450906] page dumped because: kasan: bad access detected [ 24.451404] [ 24.451544] Memory state around the buggy address: [ 24.451974] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.452617] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.453261] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.453902] ^ [ 24.454333] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.454977] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.455618] ================================================================== [ 25.418128] ================================================================== [ 25.418765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 25.419418] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.420064] [ 25.420203] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.420217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.420222] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.420227] Call trace: [ 25.420230] show_stack+0x20/0x38 (C) [ 25.420239] dump_stack_lvl+0x8c/0xd0 [ 25.420247] print_report+0x118/0x608 [ 25.420256] kasan_report+0xdc/0x128 [ 25.420264] __asan_report_load8_noabort+0x20/0x30 [ 25.420275] kasan_atomics_helper+0x3db0/0x4858 [ 25.420284] kasan_atomics+0x198/0x2e0 [ 25.420291] kunit_try_run_case+0x170/0x3f0 [ 25.420302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.420313] kthread+0x328/0x630 [ 25.420323] ret_from_fork+0x10/0x20 [ 25.420333] [ 25.426163] Allocated by task 319: [ 25.426468] kasan_save_stack+0x3c/0x68 [ 25.426813] kasan_save_track+0x20/0x40 [ 25.427158] kasan_save_alloc_info+0x40/0x58 [ 25.427541] __kasan_kmalloc+0xd4/0xd8 [ 25.427876] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.428283] kasan_atomics+0xb8/0x2e0 [ 25.428612] kunit_try_run_case+0x170/0x3f0 [ 25.428987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.429478] kthread+0x328/0x630 [ 25.429771] ret_from_fork+0x10/0x20 [ 25.430093] [ 25.430230] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.430230] which belongs to the cache kmalloc-64 of size 64 [ 25.431312] The buggy address is located 0 bytes to the right of [ 25.431312] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.432442] [ 25.432579] The buggy address belongs to the physical page: [ 25.433071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.433763] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.434340] page_type: f5(slab) [ 25.434624] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.435308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.435990] page dumped because: kasan: bad access detected [ 25.436482] [ 25.436618] Memory state around the buggy address: [ 25.437044] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.437680] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.438317] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.438954] ^ [ 25.439380] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.440017] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.440652] ================================================================== [ 24.142591] ================================================================== [ 24.143265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 24.143939] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.144613] [ 24.144768] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.144805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.144815] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.144827] Call trace: [ 24.144836] show_stack+0x20/0x38 (C) [ 24.144860] dump_stack_lvl+0x8c/0xd0 [ 24.144881] print_report+0x118/0x608 [ 24.144902] kasan_report+0xdc/0x128 [ 24.144921] kasan_check_range+0x100/0x1a8 [ 24.144941] __kasan_check_write+0x20/0x30 [ 24.144964] kasan_atomics_helper+0x24c/0x4858 [ 24.144982] kasan_atomics+0x198/0x2e0 [ 24.145000] kunit_try_run_case+0x170/0x3f0 [ 24.145024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.145050] kthread+0x328/0x630 [ 24.145073] ret_from_fork+0x10/0x20 [ 24.145094] [ 24.151282] Allocated by task 319: [ 24.151600] kasan_save_stack+0x3c/0x68 [ 24.151962] kasan_save_track+0x20/0x40 [ 24.152321] kasan_save_alloc_info+0x40/0x58 [ 24.152721] __kasan_kmalloc+0xd4/0xd8 [ 24.153072] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.153498] kasan_atomics+0xb8/0x2e0 [ 24.153841] kunit_try_run_case+0x170/0x3f0 [ 24.154232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.154742] kthread+0x328/0x630 [ 24.155050] ret_from_fork+0x10/0x20 [ 24.155388] [ 24.155535] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.155535] which belongs to the cache kmalloc-64 of size 64 [ 24.156637] The buggy address is located 0 bytes to the right of [ 24.156637] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.157787] [ 24.157935] The buggy address belongs to the physical page: [ 24.158440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.159151] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.159748] page_type: f5(slab) [ 24.160050] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.160751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.161448] page dumped because: kasan: bad access detected [ 24.161952] [ 24.162098] Memory state around the buggy address: [ 24.162536] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.163189] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.163843] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.164493] ^ [ 24.164932] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.165585] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.166236] ================================================================== [ 24.360958] ================================================================== [ 24.361603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 24.362256] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.362915] [ 24.363058] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.363079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.363086] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.363093] Call trace: [ 24.363098] show_stack+0x20/0x38 (C) [ 24.363112] dump_stack_lvl+0x8c/0xd0 [ 24.363124] print_report+0x118/0x608 [ 24.363138] kasan_report+0xdc/0x128 [ 24.363150] kasan_check_range+0x100/0x1a8 [ 24.363165] __kasan_check_write+0x20/0x30 [ 24.363179] kasan_atomics_helper+0x54c/0x4858 [ 24.363192] kasan_atomics+0x198/0x2e0 [ 24.363204] kunit_try_run_case+0x170/0x3f0 [ 24.363219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.363237] kthread+0x328/0x630 [ 24.363252] ret_from_fork+0x10/0x20 [ 24.363266] [ 24.369412] Allocated by task 319: [ 24.369720] kasan_save_stack+0x3c/0x68 [ 24.370071] kasan_save_track+0x20/0x40 [ 24.370422] kasan_save_alloc_info+0x40/0x58 [ 24.370812] __kasan_kmalloc+0xd4/0xd8 [ 24.371155] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.371570] kasan_atomics+0xb8/0x2e0 [ 24.371903] kunit_try_run_case+0x170/0x3f0 [ 24.372286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.372783] kthread+0x328/0x630 [ 24.373083] ret_from_fork+0x10/0x20 [ 24.373411] [ 24.373552] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.373552] which belongs to the cache kmalloc-64 of size 64 [ 24.374642] The buggy address is located 0 bytes to the right of [ 24.374642] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.375778] [ 24.375919] The buggy address belongs to the physical page: [ 24.376415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.377111] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.377697] page_type: f5(slab) [ 24.377985] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.378676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.379363] page dumped because: kasan: bad access detected [ 24.379860] [ 24.380001] Memory state around the buggy address: [ 24.380430] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.381074] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.381718] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.382359] ^ [ 24.382791] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.383434] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.384075] ================================================================== [ 25.112904] ================================================================== [ 25.113542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 25.114195] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.114849] [ 25.114987] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.115001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.115006] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.115010] Call trace: [ 25.115014] show_stack+0x20/0x38 (C) [ 25.115023] dump_stack_lvl+0x8c/0xd0 [ 25.115032] print_report+0x118/0x608 [ 25.115040] kasan_report+0xdc/0x128 [ 25.115049] kasan_check_range+0x100/0x1a8 [ 25.115058] __kasan_check_write+0x20/0x30 [ 25.115068] kasan_atomics_helper+0x10c0/0x4858 [ 25.115077] kasan_atomics+0x198/0x2e0 [ 25.115085] kunit_try_run_case+0x170/0x3f0 [ 25.115095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.115107] kthread+0x328/0x630 [ 25.115116] ret_from_fork+0x10/0x20 [ 25.115126] [ 25.121257] Allocated by task 319: [ 25.121562] kasan_save_stack+0x3c/0x68 [ 25.121907] kasan_save_track+0x20/0x40 [ 25.122252] kasan_save_alloc_info+0x40/0x58 [ 25.122635] __kasan_kmalloc+0xd4/0xd8 [ 25.122972] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.123380] kasan_atomics+0xb8/0x2e0 [ 25.123709] kunit_try_run_case+0x170/0x3f0 [ 25.124085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.124575] kthread+0x328/0x630 [ 25.124868] ret_from_fork+0x10/0x20 [ 25.125190] [ 25.125327] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.125327] which belongs to the cache kmalloc-64 of size 64 [ 25.126410] The buggy address is located 0 bytes to the right of [ 25.126410] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.127539] [ 25.127676] The buggy address belongs to the physical page: [ 25.128167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.128860] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.129438] page_type: f5(slab) [ 25.129723] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.130407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.131088] page dumped because: kasan: bad access detected [ 25.131580] [ 25.131716] Memory state around the buggy address: [ 25.132142] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.132780] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.133417] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.134053] ^ [ 25.134479] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.135116] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.135751] ================================================================== [ 24.972242] ================================================================== [ 24.972880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 24.973533] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.974186] [ 24.974325] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.974339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.974343] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.974348] Call trace: [ 24.974352] show_stack+0x20/0x38 (C) [ 24.974361] dump_stack_lvl+0x8c/0xd0 [ 24.974369] print_report+0x118/0x608 [ 24.974378] kasan_report+0xdc/0x128 [ 24.974387] __asan_report_store8_noabort+0x20/0x30 [ 24.974397] kasan_atomics_helper+0x3e5c/0x4858 [ 24.974406] kasan_atomics+0x198/0x2e0 [ 24.974414] kunit_try_run_case+0x170/0x3f0 [ 24.974424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.974435] kthread+0x328/0x630 [ 24.974445] ret_from_fork+0x10/0x20 [ 24.974454] [ 24.980290] Allocated by task 319: [ 24.980594] kasan_save_stack+0x3c/0x68 [ 24.980939] kasan_save_track+0x20/0x40 [ 24.981285] kasan_save_alloc_info+0x40/0x58 [ 24.981668] __kasan_kmalloc+0xd4/0xd8 [ 24.982005] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.982411] kasan_atomics+0xb8/0x2e0 [ 24.982740] kunit_try_run_case+0x170/0x3f0 [ 24.983115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.983606] kthread+0x328/0x630 [ 24.983899] ret_from_fork+0x10/0x20 [ 24.984221] [ 24.984358] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.984358] which belongs to the cache kmalloc-64 of size 64 [ 24.985440] The buggy address is located 0 bytes to the right of [ 24.985440] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.986569] [ 24.986706] The buggy address belongs to the physical page: [ 24.987197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.987887] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.988465] page_type: f5(slab) [ 24.988749] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.989433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.990115] page dumped because: kasan: bad access detected [ 24.990607] [ 24.990743] Memory state around the buggy address: [ 24.991168] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.991805] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.992442] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.993079] ^ [ 24.993505] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.994142] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.994778] ================================================================== [ 25.324119] ================================================================== [ 25.324757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 25.325410] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.326064] [ 25.326202] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.326216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.326220] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.326225] Call trace: [ 25.326228] show_stack+0x20/0x38 (C) [ 25.326237] dump_stack_lvl+0x8c/0xd0 [ 25.326246] print_report+0x118/0x608 [ 25.326255] kasan_report+0xdc/0x128 [ 25.326263] kasan_check_range+0x100/0x1a8 [ 25.326272] __kasan_check_write+0x20/0x30 [ 25.326283] kasan_atomics_helper+0x147c/0x4858 [ 25.326291] kasan_atomics+0x198/0x2e0 [ 25.326299] kunit_try_run_case+0x170/0x3f0 [ 25.326309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.326321] kthread+0x328/0x630 [ 25.326331] ret_from_fork+0x10/0x20 [ 25.326340] [ 25.332464] Allocated by task 319: [ 25.332768] kasan_save_stack+0x3c/0x68 [ 25.333112] kasan_save_track+0x20/0x40 [ 25.333456] kasan_save_alloc_info+0x40/0x58 [ 25.333839] __kasan_kmalloc+0xd4/0xd8 [ 25.334176] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.334583] kasan_atomics+0xb8/0x2e0 [ 25.334911] kunit_try_run_case+0x170/0x3f0 [ 25.335287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.335776] kthread+0x328/0x630 [ 25.336069] ret_from_fork+0x10/0x20 [ 25.336391] [ 25.336528] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.336528] which belongs to the cache kmalloc-64 of size 64 [ 25.337611] The buggy address is located 0 bytes to the right of [ 25.337611] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.338741] [ 25.338878] The buggy address belongs to the physical page: [ 25.339369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.340062] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.340640] page_type: f5(slab) [ 25.340924] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.341609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.342290] page dumped because: kasan: bad access detected [ 25.342782] [ 25.342919] Memory state around the buggy address: [ 25.343344] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.343981] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.344618] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.345254] ^ [ 25.345679] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.346317] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.346952] ================================================================== [ 24.995458] ================================================================== [ 24.996095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 24.996741] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.997394] [ 24.997533] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.997547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.997552] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.997556] Call trace: [ 24.997560] show_stack+0x20/0x38 (C) [ 24.997569] dump_stack_lvl+0x8c/0xd0 [ 24.997577] print_report+0x118/0x608 [ 24.997586] kasan_report+0xdc/0x128 [ 24.997595] kasan_check_range+0x100/0x1a8 [ 24.997604] __kasan_check_write+0x20/0x30 [ 24.997614] kasan_atomics_helper+0xeb8/0x4858 [ 24.997622] kasan_atomics+0x198/0x2e0 [ 24.997631] kunit_try_run_case+0x170/0x3f0 [ 24.997640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.997652] kthread+0x328/0x630 [ 24.997662] ret_from_fork+0x10/0x20 [ 24.997672] [ 25.003794] Allocated by task 319: [ 25.004099] kasan_save_stack+0x3c/0x68 [ 25.004444] kasan_save_track+0x20/0x40 [ 25.004788] kasan_save_alloc_info+0x40/0x58 [ 25.005171] __kasan_kmalloc+0xd4/0xd8 [ 25.005508] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.005915] kasan_atomics+0xb8/0x2e0 [ 25.006243] kunit_try_run_case+0x170/0x3f0 [ 25.006619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.007110] kthread+0x328/0x630 [ 25.007403] ret_from_fork+0x10/0x20 [ 25.007725] [ 25.007862] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.007862] which belongs to the cache kmalloc-64 of size 64 [ 25.008944] The buggy address is located 0 bytes to the right of [ 25.008944] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.010074] [ 25.010211] The buggy address belongs to the physical page: [ 25.010703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.011393] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.011972] page_type: f5(slab) [ 25.012255] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.012939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.013621] page dumped because: kasan: bad access detected [ 25.014113] [ 25.014250] Memory state around the buggy address: [ 25.014675] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.015313] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.015952] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.016587] ^ [ 25.017013] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.017649] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.018285] ================================================================== [ 25.558212] ================================================================== [ 25.558849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 25.559502] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.560148] [ 25.560288] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.560302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.560306] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.560311] Call trace: [ 25.560314] show_stack+0x20/0x38 (C) [ 25.560324] dump_stack_lvl+0x8c/0xd0 [ 25.560332] print_report+0x118/0x608 [ 25.560341] kasan_report+0xdc/0x128 [ 25.560349] __asan_report_load8_noabort+0x20/0x30 [ 25.560360] kasan_atomics_helper+0x3e20/0x4858 [ 25.560369] kasan_atomics+0x198/0x2e0 [ 25.560376] kunit_try_run_case+0x170/0x3f0 [ 25.560387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.560398] kthread+0x328/0x630 [ 25.560408] ret_from_fork+0x10/0x20 [ 25.560417] [ 25.566248] Allocated by task 319: [ 25.566552] kasan_save_stack+0x3c/0x68 [ 25.566897] kasan_save_track+0x20/0x40 [ 25.567241] kasan_save_alloc_info+0x40/0x58 [ 25.567625] __kasan_kmalloc+0xd4/0xd8 [ 25.567961] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.568368] kasan_atomics+0xb8/0x2e0 [ 25.568697] kunit_try_run_case+0x170/0x3f0 [ 25.569074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.569564] kthread+0x328/0x630 [ 25.569857] ret_from_fork+0x10/0x20 [ 25.570180] [ 25.570316] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.570316] which belongs to the cache kmalloc-64 of size 64 [ 25.571399] The buggy address is located 0 bytes to the right of [ 25.571399] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.572529] [ 25.572665] The buggy address belongs to the physical page: [ 25.573157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.573849] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.574426] page_type: f5(slab) [ 25.574709] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.575393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.576075] page dumped because: kasan: bad access detected [ 25.576567] [ 25.576704] Memory state around the buggy address: [ 25.577130] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.577767] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.578404] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.579040] ^ [ 25.579465] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.580102] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.580738] ================================================================== [ 24.337094] ================================================================== [ 24.337741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 24.338395] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.339054] [ 24.339197] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.339219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.339225] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.339233] Call trace: [ 24.339238] show_stack+0x20/0x38 (C) [ 24.339252] dump_stack_lvl+0x8c/0xd0 [ 24.339265] print_report+0x118/0x608 [ 24.339279] kasan_report+0xdc/0x128 [ 24.339291] kasan_check_range+0x100/0x1a8 [ 24.339305] __kasan_check_write+0x20/0x30 [ 24.339321] kasan_atomics_helper+0x4e4/0x4858 [ 24.339333] kasan_atomics+0x198/0x2e0 [ 24.339345] kunit_try_run_case+0x170/0x3f0 [ 24.339360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.339378] kthread+0x328/0x630 [ 24.339393] ret_from_fork+0x10/0x20 [ 24.339407] [ 24.345552] Allocated by task 319: [ 24.345860] kasan_save_stack+0x3c/0x68 [ 24.346211] kasan_save_track+0x20/0x40 [ 24.346562] kasan_save_alloc_info+0x40/0x58 [ 24.346952] __kasan_kmalloc+0xd4/0xd8 [ 24.347294] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.347708] kasan_atomics+0xb8/0x2e0 [ 24.348043] kunit_try_run_case+0x170/0x3f0 [ 24.348426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.348923] kthread+0x328/0x630 [ 24.349223] ret_from_fork+0x10/0x20 [ 24.349551] [ 24.349691] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.349691] which belongs to the cache kmalloc-64 of size 64 [ 24.350782] The buggy address is located 0 bytes to the right of [ 24.350782] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.351920] [ 24.352061] The buggy address belongs to the physical page: [ 24.352558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.353256] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.353841] page_type: f5(slab) [ 24.354132] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.354822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.355509] page dumped because: kasan: bad access detected [ 24.356007] [ 24.356147] Memory state around the buggy address: [ 24.356577] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.357221] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.357864] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.358505] ^ [ 24.358936] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.359580] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.360221] ================================================================== [ 24.902099] ================================================================== [ 24.902737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 24.903383] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.904029] [ 24.904167] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.904182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.904186] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.904191] Call trace: [ 24.904194] show_stack+0x20/0x38 (C) [ 24.904203] dump_stack_lvl+0x8c/0xd0 [ 24.904213] print_report+0x118/0x608 [ 24.904222] kasan_report+0xdc/0x128 [ 24.904230] kasan_check_range+0x100/0x1a8 [ 24.904239] __kasan_check_read+0x20/0x30 [ 24.904250] kasan_atomics_helper+0xdd4/0x4858 [ 24.904259] kasan_atomics+0x198/0x2e0 [ 24.904266] kunit_try_run_case+0x170/0x3f0 [ 24.904277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.904290] kthread+0x328/0x630 [ 24.904300] ret_from_fork+0x10/0x20 [ 24.904309] [ 24.910423] Allocated by task 319: [ 24.910728] kasan_save_stack+0x3c/0x68 [ 24.911072] kasan_save_track+0x20/0x40 [ 24.911416] kasan_save_alloc_info+0x40/0x58 [ 24.911799] __kasan_kmalloc+0xd4/0xd8 [ 24.912136] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.912543] kasan_atomics+0xb8/0x2e0 [ 24.912870] kunit_try_run_case+0x170/0x3f0 [ 24.913247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.913739] kthread+0x328/0x630 [ 24.914032] ret_from_fork+0x10/0x20 [ 24.914354] [ 24.914492] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.914492] which belongs to the cache kmalloc-64 of size 64 [ 24.915575] The buggy address is located 0 bytes to the right of [ 24.915575] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.916705] [ 24.916843] The buggy address belongs to the physical page: [ 24.917335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.918027] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.918605] page_type: f5(slab) [ 24.918888] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.919572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.920253] page dumped because: kasan: bad access detected [ 24.920745] [ 24.920883] Memory state around the buggy address: [ 24.921309] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.921947] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.922584] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.923221] ^ [ 24.923647] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.924284] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.924921] ================================================================== [ 25.183431] ================================================================== [ 25.184070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 25.184723] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.185376] [ 25.185515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.185529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.185533] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.185538] Call trace: [ 25.185541] show_stack+0x20/0x38 (C) [ 25.185551] dump_stack_lvl+0x8c/0xd0 [ 25.185559] print_report+0x118/0x608 [ 25.185568] kasan_report+0xdc/0x128 [ 25.185576] kasan_check_range+0x100/0x1a8 [ 25.185586] __kasan_check_write+0x20/0x30 [ 25.185595] kasan_atomics_helper+0x11f8/0x4858 [ 25.185604] kasan_atomics+0x198/0x2e0 [ 25.185612] kunit_try_run_case+0x170/0x3f0 [ 25.185622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.185634] kthread+0x328/0x630 [ 25.185644] ret_from_fork+0x10/0x20 [ 25.185653] [ 25.191780] Allocated by task 319: [ 25.192085] kasan_save_stack+0x3c/0x68 [ 25.192429] kasan_save_track+0x20/0x40 [ 25.192772] kasan_save_alloc_info+0x40/0x58 [ 25.193155] __kasan_kmalloc+0xd4/0xd8 [ 25.193492] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.193899] kasan_atomics+0xb8/0x2e0 [ 25.194228] kunit_try_run_case+0x170/0x3f0 [ 25.194604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.195093] kthread+0x328/0x630 [ 25.195386] ret_from_fork+0x10/0x20 [ 25.195708] [ 25.195845] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.195845] which belongs to the cache kmalloc-64 of size 64 [ 25.196928] The buggy address is located 0 bytes to the right of [ 25.196928] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.198058] [ 25.198195] The buggy address belongs to the physical page: [ 25.198687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.199378] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.199956] page_type: f5(slab) [ 25.200240] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.200924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.201606] page dumped because: kasan: bad access detected [ 25.202100] [ 25.202238] Memory state around the buggy address: [ 25.202663] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.203301] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.203937] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.204573] ^ [ 25.204999] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.205636] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.206272] ================================================================== [ 25.230434] ================================================================== [ 25.231071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 25.231724] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.232377] [ 25.232515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.232530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.232534] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.232538] Call trace: [ 25.232542] show_stack+0x20/0x38 (C) [ 25.232551] dump_stack_lvl+0x8c/0xd0 [ 25.232559] print_report+0x118/0x608 [ 25.232567] kasan_report+0xdc/0x128 [ 25.232576] kasan_check_range+0x100/0x1a8 [ 25.232586] __kasan_check_write+0x20/0x30 [ 25.232595] kasan_atomics_helper+0x12d8/0x4858 [ 25.232604] kasan_atomics+0x198/0x2e0 [ 25.232612] kunit_try_run_case+0x170/0x3f0 [ 25.232622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.232633] kthread+0x328/0x630 [ 25.232643] ret_from_fork+0x10/0x20 [ 25.232652] [ 25.238779] Allocated by task 319: [ 25.239084] kasan_save_stack+0x3c/0x68 [ 25.239429] kasan_save_track+0x20/0x40 [ 25.239774] kasan_save_alloc_info+0x40/0x58 [ 25.240157] __kasan_kmalloc+0xd4/0xd8 [ 25.240494] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.240902] kasan_atomics+0xb8/0x2e0 [ 25.241231] kunit_try_run_case+0x170/0x3f0 [ 25.241607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.242097] kthread+0x328/0x630 [ 25.242390] ret_from_fork+0x10/0x20 [ 25.242712] [ 25.242850] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.242850] which belongs to the cache kmalloc-64 of size 64 [ 25.243932] The buggy address is located 0 bytes to the right of [ 25.243932] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.245062] [ 25.245198] The buggy address belongs to the physical page: [ 25.245690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.246381] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.246960] page_type: f5(slab) [ 25.247244] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.247927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.248609] page dumped because: kasan: bad access detected [ 25.249101] [ 25.249238] Memory state around the buggy address: [ 25.249663] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.250300] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.250937] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.251573] ^ [ 25.251999] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.252635] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.253272] ================================================================== [ 25.089403] ================================================================== [ 25.090040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 25.090693] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.091347] [ 25.091485] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.091499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.091503] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.091508] Call trace: [ 25.091511] show_stack+0x20/0x38 (C) [ 25.091520] dump_stack_lvl+0x8c/0xd0 [ 25.091529] print_report+0x118/0x608 [ 25.091537] kasan_report+0xdc/0x128 [ 25.091546] kasan_check_range+0x100/0x1a8 [ 25.091555] __kasan_check_write+0x20/0x30 [ 25.091565] kasan_atomics_helper+0x1058/0x4858 [ 25.091574] kasan_atomics+0x198/0x2e0 [ 25.091582] kunit_try_run_case+0x170/0x3f0 [ 25.091592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.091604] kthread+0x328/0x630 [ 25.091613] ret_from_fork+0x10/0x20 [ 25.091622] [ 25.097752] Allocated by task 319: [ 25.098057] kasan_save_stack+0x3c/0x68 [ 25.098402] kasan_save_track+0x20/0x40 [ 25.098746] kasan_save_alloc_info+0x40/0x58 [ 25.099128] __kasan_kmalloc+0xd4/0xd8 [ 25.099465] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.099872] kasan_atomics+0xb8/0x2e0 [ 25.100201] kunit_try_run_case+0x170/0x3f0 [ 25.100578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.101067] kthread+0x328/0x630 [ 25.101360] ret_from_fork+0x10/0x20 [ 25.101682] [ 25.101819] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.101819] which belongs to the cache kmalloc-64 of size 64 [ 25.102901] The buggy address is located 0 bytes to the right of [ 25.102901] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.104031] [ 25.104168] The buggy address belongs to the physical page: [ 25.104659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.105351] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.105929] page_type: f5(slab) [ 25.106213] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.106896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.107578] page dumped because: kasan: bad access detected [ 25.108070] [ 25.108207] Memory state around the buggy address: [ 25.108632] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.109271] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.109907] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.110545] ^ [ 25.110971] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.111608] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.112243] ================================================================== [ 24.456376] ================================================================== [ 24.457023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 24.457677] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.458338] [ 24.458481] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.458503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.458510] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.458517] Call trace: [ 24.458523] show_stack+0x20/0x38 (C) [ 24.458537] dump_stack_lvl+0x8c/0xd0 [ 24.458550] print_report+0x118/0x608 [ 24.458563] kasan_report+0xdc/0x128 [ 24.458575] kasan_check_range+0x100/0x1a8 [ 24.458590] __kasan_check_write+0x20/0x30 [ 24.458605] kasan_atomics_helper+0x6ec/0x4858 [ 24.458617] kasan_atomics+0x198/0x2e0 [ 24.458629] kunit_try_run_case+0x170/0x3f0 [ 24.458645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.458663] kthread+0x328/0x630 [ 24.458678] ret_from_fork+0x10/0x20 [ 24.458692] [ 24.464839] Allocated by task 319: [ 24.465148] kasan_save_stack+0x3c/0x68 [ 24.465499] kasan_save_track+0x20/0x40 [ 24.465849] kasan_save_alloc_info+0x40/0x58 [ 24.466239] __kasan_kmalloc+0xd4/0xd8 [ 24.466581] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.466995] kasan_atomics+0xb8/0x2e0 [ 24.467330] kunit_try_run_case+0x170/0x3f0 [ 24.467712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.468210] kthread+0x328/0x630 [ 24.468509] ret_from_fork+0x10/0x20 [ 24.468838] [ 24.468979] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.468979] which belongs to the cache kmalloc-64 of size 64 [ 24.470069] The buggy address is located 0 bytes to the right of [ 24.470069] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.471205] [ 24.471346] The buggy address belongs to the physical page: [ 24.471844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.472542] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.473126] page_type: f5(slab) [ 24.473415] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.474106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.474792] page dumped because: kasan: bad access detected [ 24.475289] [ 24.475430] Memory state around the buggy address: [ 24.475859] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.476503] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.477147] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.477788] ^ [ 24.478219] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.478862] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.479504] ================================================================== [ 24.715325] ================================================================== [ 24.715962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 24.716608] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.717261] [ 24.717400] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.717414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.717418] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.717423] Call trace: [ 24.717426] show_stack+0x20/0x38 (C) [ 24.717435] dump_stack_lvl+0x8c/0xd0 [ 24.717444] print_report+0x118/0x608 [ 24.717452] kasan_report+0xdc/0x128 [ 24.717461] kasan_check_range+0x100/0x1a8 [ 24.717470] __kasan_check_write+0x20/0x30 [ 24.717480] kasan_atomics_helper+0xb70/0x4858 [ 24.717489] kasan_atomics+0x198/0x2e0 [ 24.717496] kunit_try_run_case+0x170/0x3f0 [ 24.717507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.717518] kthread+0x328/0x630 [ 24.717528] ret_from_fork+0x10/0x20 [ 24.717538] [ 24.723661] Allocated by task 319: [ 24.723966] kasan_save_stack+0x3c/0x68 [ 24.724311] kasan_save_track+0x20/0x40 [ 24.724655] kasan_save_alloc_info+0x40/0x58 [ 24.725038] __kasan_kmalloc+0xd4/0xd8 [ 24.725375] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.725782] kasan_atomics+0xb8/0x2e0 [ 24.726111] kunit_try_run_case+0x170/0x3f0 [ 24.726488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.726979] kthread+0x328/0x630 [ 24.727272] ret_from_fork+0x10/0x20 [ 24.727594] [ 24.727730] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.727730] which belongs to the cache kmalloc-64 of size 64 [ 24.728813] The buggy address is located 0 bytes to the right of [ 24.728813] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.729943] [ 24.730080] The buggy address belongs to the physical page: [ 24.730572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.731264] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.731842] page_type: f5(slab) [ 24.732126] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.732809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.733492] page dumped because: kasan: bad access detected [ 24.733983] [ 24.734120] Memory state around the buggy address: [ 24.734544] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.735180] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.735817] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.736453] ^ [ 24.736877] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.737514] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.738150] ================================================================== [ 25.253938] ================================================================== [ 25.254575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 25.255229] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.255883] [ 25.256021] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.256036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.256040] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.256045] Call trace: [ 25.256048] show_stack+0x20/0x38 (C) [ 25.256057] dump_stack_lvl+0x8c/0xd0 [ 25.256066] print_report+0x118/0x608 [ 25.256075] kasan_report+0xdc/0x128 [ 25.256083] kasan_check_range+0x100/0x1a8 [ 25.256092] __kasan_check_write+0x20/0x30 [ 25.256103] kasan_atomics_helper+0x1384/0x4858 [ 25.256111] kasan_atomics+0x198/0x2e0 [ 25.256119] kunit_try_run_case+0x170/0x3f0 [ 25.256129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.256141] kthread+0x328/0x630 [ 25.256151] ret_from_fork+0x10/0x20 [ 25.256160] [ 25.262293] Allocated by task 319: [ 25.262598] kasan_save_stack+0x3c/0x68 [ 25.262942] kasan_save_track+0x20/0x40 [ 25.263286] kasan_save_alloc_info+0x40/0x58 [ 25.263669] __kasan_kmalloc+0xd4/0xd8 [ 25.264006] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.264413] kasan_atomics+0xb8/0x2e0 [ 25.264742] kunit_try_run_case+0x170/0x3f0 [ 25.265117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.265608] kthread+0x328/0x630 [ 25.265901] ret_from_fork+0x10/0x20 [ 25.266223] [ 25.266361] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.266361] which belongs to the cache kmalloc-64 of size 64 [ 25.267445] The buggy address is located 0 bytes to the right of [ 25.267445] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.268575] [ 25.268713] The buggy address belongs to the physical page: [ 25.269205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.269895] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.270472] page_type: f5(slab) [ 25.270755] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.271440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.272121] page dumped because: kasan: bad access detected [ 25.272614] [ 25.272751] Memory state around the buggy address: [ 25.273176] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.273813] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.274450] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.275086] ^ [ 25.275512] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.276151] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.276786] ================================================================== [ 25.159928] ================================================================== [ 25.160565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 25.161218] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.161872] [ 25.162010] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.162024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.162028] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.162033] Call trace: [ 25.162036] show_stack+0x20/0x38 (C) [ 25.162045] dump_stack_lvl+0x8c/0xd0 [ 25.162054] print_report+0x118/0x608 [ 25.162063] kasan_report+0xdc/0x128 [ 25.162071] kasan_check_range+0x100/0x1a8 [ 25.162080] __kasan_check_write+0x20/0x30 [ 25.162091] kasan_atomics_helper+0x1190/0x4858 [ 25.162099] kasan_atomics+0x198/0x2e0 [ 25.162107] kunit_try_run_case+0x170/0x3f0 [ 25.162117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.162129] kthread+0x328/0x630 [ 25.162139] ret_from_fork+0x10/0x20 [ 25.162148] [ 25.168276] Allocated by task 319: [ 25.168580] kasan_save_stack+0x3c/0x68 [ 25.168924] kasan_save_track+0x20/0x40 [ 25.169269] kasan_save_alloc_info+0x40/0x58 [ 25.169653] __kasan_kmalloc+0xd4/0xd8 [ 25.169990] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.170396] kasan_atomics+0xb8/0x2e0 [ 25.170725] kunit_try_run_case+0x170/0x3f0 [ 25.171102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.171592] kthread+0x328/0x630 [ 25.171884] ret_from_fork+0x10/0x20 [ 25.172206] [ 25.172344] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.172344] which belongs to the cache kmalloc-64 of size 64 [ 25.173427] The buggy address is located 0 bytes to the right of [ 25.173427] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.174557] [ 25.174695] The buggy address belongs to the physical page: [ 25.175187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.175879] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.176456] page_type: f5(slab) [ 25.176739] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.177424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.178105] page dumped because: kasan: bad access detected [ 25.178599] [ 25.178737] Memory state around the buggy address: [ 25.179162] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.179799] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.180438] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.181074] ^ [ 25.181500] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.182136] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.182772] ================================================================== [ 24.551473] ================================================================== [ 24.552112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 24.552767] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.553412] [ 24.553550] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.553565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.553570] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.553574] Call trace: [ 24.553578] show_stack+0x20/0x38 (C) [ 24.553587] dump_stack_lvl+0x8c/0xd0 [ 24.553596] print_report+0x118/0x608 [ 24.553605] kasan_report+0xdc/0x128 [ 24.553614] __asan_report_load4_noabort+0x20/0x30 [ 24.553624] kasan_atomics_helper+0x42d8/0x4858 [ 24.553633] kasan_atomics+0x198/0x2e0 [ 24.553640] kunit_try_run_case+0x170/0x3f0 [ 24.553651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.553663] kthread+0x328/0x630 [ 24.553673] ret_from_fork+0x10/0x20 [ 24.553682] [ 24.559515] Allocated by task 319: [ 24.559819] kasan_save_stack+0x3c/0x68 [ 24.560163] kasan_save_track+0x20/0x40 [ 24.560508] kasan_save_alloc_info+0x40/0x58 [ 24.560891] __kasan_kmalloc+0xd4/0xd8 [ 24.561228] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.561636] kasan_atomics+0xb8/0x2e0 [ 24.561965] kunit_try_run_case+0x170/0x3f0 [ 24.562340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.562831] kthread+0x328/0x630 [ 24.563124] ret_from_fork+0x10/0x20 [ 24.563446] [ 24.563582] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.563582] which belongs to the cache kmalloc-64 of size 64 [ 24.564665] The buggy address is located 0 bytes to the right of [ 24.564665] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.565795] [ 24.565932] The buggy address belongs to the physical page: [ 24.566424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.567116] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.567695] page_type: f5(slab) [ 24.567979] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.568663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.569345] page dumped because: kasan: bad access detected [ 24.569837] [ 24.569975] Memory state around the buggy address: [ 24.570401] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.571038] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.571675] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.572311] ^ [ 24.572737] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.573375] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.574011] ================================================================== [ 25.441303] ================================================================== [ 25.441941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 25.442594] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.443247] [ 25.443385] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.443400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.443403] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.443408] Call trace: [ 25.443412] show_stack+0x20/0x38 (C) [ 25.443421] dump_stack_lvl+0x8c/0xd0 [ 25.443430] print_report+0x118/0x608 [ 25.443438] kasan_report+0xdc/0x128 [ 25.443447] kasan_check_range+0x100/0x1a8 [ 25.443456] __kasan_check_write+0x20/0x30 [ 25.443466] kasan_atomics_helper+0x1644/0x4858 [ 25.443475] kasan_atomics+0x198/0x2e0 [ 25.443482] kunit_try_run_case+0x170/0x3f0 [ 25.443492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.443504] kthread+0x328/0x630 [ 25.443514] ret_from_fork+0x10/0x20 [ 25.443523] [ 25.449654] Allocated by task 319: [ 25.449959] kasan_save_stack+0x3c/0x68 [ 25.450302] kasan_save_track+0x20/0x40 [ 25.450646] kasan_save_alloc_info+0x40/0x58 [ 25.451029] __kasan_kmalloc+0xd4/0xd8 [ 25.451364] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.451772] kasan_atomics+0xb8/0x2e0 [ 25.452101] kunit_try_run_case+0x170/0x3f0 [ 25.452477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.452967] kthread+0x328/0x630 [ 25.453260] ret_from_fork+0x10/0x20 [ 25.453582] [ 25.453720] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.453720] which belongs to the cache kmalloc-64 of size 64 [ 25.454803] The buggy address is located 0 bytes to the right of [ 25.454803] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.455932] [ 25.456069] The buggy address belongs to the physical page: [ 25.456561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.457251] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.457828] page_type: f5(slab) [ 25.458113] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.458797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.459477] page dumped because: kasan: bad access detected [ 25.459969] [ 25.460106] Memory state around the buggy address: [ 25.460531] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.461168] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.461805] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.462441] ^ [ 25.462867] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.463503] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.464139] ================================================================== [ 25.206929] ================================================================== [ 25.207568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 25.208220] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.208874] [ 25.209014] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.209028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.209032] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.209037] Call trace: [ 25.209040] show_stack+0x20/0x38 (C) [ 25.209050] dump_stack_lvl+0x8c/0xd0 [ 25.209058] print_report+0x118/0x608 [ 25.209067] kasan_report+0xdc/0x128 [ 25.209075] kasan_check_range+0x100/0x1a8 [ 25.209085] __kasan_check_write+0x20/0x30 [ 25.209094] kasan_atomics_helper+0x126c/0x4858 [ 25.209103] kasan_atomics+0x198/0x2e0 [ 25.209111] kunit_try_run_case+0x170/0x3f0 [ 25.209122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.209133] kthread+0x328/0x630 [ 25.209143] ret_from_fork+0x10/0x20 [ 25.209152] [ 25.215282] Allocated by task 319: [ 25.215586] kasan_save_stack+0x3c/0x68 [ 25.215931] kasan_save_track+0x20/0x40 [ 25.216275] kasan_save_alloc_info+0x40/0x58 [ 25.216658] __kasan_kmalloc+0xd4/0xd8 [ 25.216995] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.217402] kasan_atomics+0xb8/0x2e0 [ 25.217731] kunit_try_run_case+0x170/0x3f0 [ 25.218106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.218596] kthread+0x328/0x630 [ 25.218888] ret_from_fork+0x10/0x20 [ 25.219211] [ 25.219347] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.219347] which belongs to the cache kmalloc-64 of size 64 [ 25.220430] The buggy address is located 0 bytes to the right of [ 25.220430] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.221559] [ 25.221696] The buggy address belongs to the physical page: [ 25.222187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.222879] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.223457] page_type: f5(slab) [ 25.223741] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.224425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.225107] page dumped because: kasan: bad access detected [ 25.225599] [ 25.225735] Memory state around the buggy address: [ 25.226159] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.226796] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.227433] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.228069] ^ [ 25.228494] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.229132] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.229767] ================================================================== [ 25.534710] ================================================================== [ 25.535347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 25.536000] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.536653] [ 25.536792] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.536806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.536810] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.536815] Call trace: [ 25.536818] show_stack+0x20/0x38 (C) [ 25.536827] dump_stack_lvl+0x8c/0xd0 [ 25.536836] print_report+0x118/0x608 [ 25.536844] kasan_report+0xdc/0x128 [ 25.536853] kasan_check_range+0x100/0x1a8 [ 25.536862] __kasan_check_write+0x20/0x30 [ 25.536872] kasan_atomics_helper+0x175c/0x4858 [ 25.536881] kasan_atomics+0x198/0x2e0 [ 25.536889] kunit_try_run_case+0x170/0x3f0 [ 25.536899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.536911] kthread+0x328/0x630 [ 25.536920] ret_from_fork+0x10/0x20 [ 25.536930] [ 25.543059] Allocated by task 319: [ 25.543364] kasan_save_stack+0x3c/0x68 [ 25.543708] kasan_save_track+0x20/0x40 [ 25.544051] kasan_save_alloc_info+0x40/0x58 [ 25.544434] __kasan_kmalloc+0xd4/0xd8 [ 25.544771] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.545178] kasan_atomics+0xb8/0x2e0 [ 25.545507] kunit_try_run_case+0x170/0x3f0 [ 25.545883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.546373] kthread+0x328/0x630 [ 25.546667] ret_from_fork+0x10/0x20 [ 25.546989] [ 25.547126] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.547126] which belongs to the cache kmalloc-64 of size 64 [ 25.548209] The buggy address is located 0 bytes to the right of [ 25.548209] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.549339] [ 25.549476] The buggy address belongs to the physical page: [ 25.549968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.550658] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.551237] page_type: f5(slab) [ 25.551522] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.552205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.552887] page dumped because: kasan: bad access detected [ 25.553379] [ 25.553515] Memory state around the buggy address: [ 25.553941] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.554578] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.555215] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.555851] ^ [ 25.556277] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.556915] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.557550] ================================================================== [ 24.264029] ================================================================== [ 24.264684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 24.265346] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.266017] [ 24.266166] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.266197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.266207] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.266218] Call trace: [ 24.266225] show_stack+0x20/0x38 (C) [ 24.266245] dump_stack_lvl+0x8c/0xd0 [ 24.266264] print_report+0x118/0x608 [ 24.266283] kasan_report+0xdc/0x128 [ 24.266301] kasan_check_range+0x100/0x1a8 [ 24.266322] __kasan_check_write+0x20/0x30 [ 24.266344] kasan_atomics_helper+0x3ac/0x4858 [ 24.266363] kasan_atomics+0x198/0x2e0 [ 24.266381] kunit_try_run_case+0x170/0x3f0 [ 24.266404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.266429] kthread+0x328/0x630 [ 24.266451] ret_from_fork+0x10/0x20 [ 24.266472] [ 24.272649] Allocated by task 319: [ 24.272966] kasan_save_stack+0x3c/0x68 [ 24.273325] kasan_save_track+0x20/0x40 [ 24.273683] kasan_save_alloc_info+0x40/0x58 [ 24.274082] __kasan_kmalloc+0xd4/0xd8 [ 24.274433] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.274858] kasan_atomics+0xb8/0x2e0 [ 24.275200] kunit_try_run_case+0x170/0x3f0 [ 24.275592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.276100] kthread+0x328/0x630 [ 24.276409] ret_from_fork+0x10/0x20 [ 24.276747] [ 24.276893] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.276893] which belongs to the cache kmalloc-64 of size 64 [ 24.277994] The buggy address is located 0 bytes to the right of [ 24.277994] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.279143] [ 24.279289] The buggy address belongs to the physical page: [ 24.279793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.280500] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.281095] page_type: f5(slab) [ 24.281393] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.282093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.282788] page dumped because: kasan: bad access detected [ 24.283292] [ 24.283437] Memory state around the buggy address: [ 24.283874] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.284528] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.285180] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.285830] ^ [ 24.286268] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.286921] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.287570] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 23.845737] ================================================================== [ 23.846388] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 23.847183] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.847847] [ 23.847992] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.848019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.848027] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.848036] Call trace: [ 23.848042] show_stack+0x20/0x38 (C) [ 23.848059] dump_stack_lvl+0x8c/0xd0 [ 23.848074] print_report+0x118/0x608 [ 23.848090] kasan_report+0xdc/0x128 [ 23.848105] kasan_check_range+0x100/0x1a8 [ 23.848122] __kasan_check_write+0x20/0x30 [ 23.848138] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 23.848156] kasan_bitops_generic+0x11c/0x1c8 [ 23.848171] kunit_try_run_case+0x170/0x3f0 [ 23.848190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.848211] kthread+0x328/0x630 [ 23.848229] ret_from_fork+0x10/0x20 [ 23.848246] [ 23.854593] Allocated by task 315: [ 23.854904] kasan_save_stack+0x3c/0x68 [ 23.855258] kasan_save_track+0x20/0x40 [ 23.855611] kasan_save_alloc_info+0x40/0x58 [ 23.856004] __kasan_kmalloc+0xd4/0xd8 [ 23.856349] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.856769] kasan_bitops_generic+0xa0/0x1c8 [ 23.857160] kunit_try_run_case+0x170/0x3f0 [ 23.857547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.858049] kthread+0x328/0x630 [ 23.858352] ret_from_fork+0x10/0x20 [ 23.858683] [ 23.858827] The buggy address belongs to the object at ffff000001193200 [ 23.858827] which belongs to the cache kmalloc-16 of size 16 [ 23.859920] The buggy address is located 8 bytes inside of [ 23.859920] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.861008] [ 23.861151] The buggy address belongs to the physical page: [ 23.861651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.862353] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.862943] page_type: f5(slab) [ 23.863236] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.863930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.864621] page dumped because: kasan: bad access detected [ 23.865121] [ 23.865263] Memory state around the buggy address: [ 23.865697] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.866344] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.866992] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.867636] ^ [ 23.867956] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.868603] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.869248] ================================================================== [ 23.966393] ================================================================== [ 23.967043] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 23.967844] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.968501] [ 23.968647] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.968672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.968680] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.968690] Call trace: [ 23.968695] show_stack+0x20/0x38 (C) [ 23.968712] dump_stack_lvl+0x8c/0xd0 [ 23.968727] print_report+0x118/0x608 [ 23.968743] kasan_report+0xdc/0x128 [ 23.968758] __asan_report_load8_noabort+0x20/0x30 [ 23.968776] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 23.968794] kasan_bitops_generic+0x11c/0x1c8 [ 23.968809] kunit_try_run_case+0x170/0x3f0 [ 23.968828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.968849] kthread+0x328/0x630 [ 23.968867] ret_from_fork+0x10/0x20 [ 23.968884] [ 23.974936] Allocated by task 315: [ 23.975248] kasan_save_stack+0x3c/0x68 [ 23.975602] kasan_save_track+0x20/0x40 [ 23.975956] kasan_save_alloc_info+0x40/0x58 [ 23.976349] __kasan_kmalloc+0xd4/0xd8 [ 23.976695] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.977114] kasan_bitops_generic+0xa0/0x1c8 [ 23.977506] kunit_try_run_case+0x170/0x3f0 [ 23.977893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.978395] kthread+0x328/0x630 [ 23.978699] ret_from_fork+0x10/0x20 [ 23.979031] [ 23.979173] The buggy address belongs to the object at ffff000001193200 [ 23.979173] which belongs to the cache kmalloc-16 of size 16 [ 23.980268] The buggy address is located 8 bytes inside of [ 23.980268] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.981358] [ 23.981500] The buggy address belongs to the physical page: [ 23.981999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.982701] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.983290] page_type: f5(slab) [ 23.983582] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.984276] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.984966] page dumped because: kasan: bad access detected [ 23.985467] [ 23.985609] Memory state around the buggy address: [ 23.986041] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.986689] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.987335] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.987980] ^ [ 23.988300] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.988947] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.989592] ================================================================== [ 23.869996] ================================================================== [ 23.870646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 23.871445] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.872102] [ 23.872247] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.872274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.872281] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.872290] Call trace: [ 23.872296] show_stack+0x20/0x38 (C) [ 23.872312] dump_stack_lvl+0x8c/0xd0 [ 23.872327] print_report+0x118/0x608 [ 23.872342] kasan_report+0xdc/0x128 [ 23.872357] __asan_report_load8_noabort+0x20/0x30 [ 23.872376] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 23.872393] kasan_bitops_generic+0x11c/0x1c8 [ 23.872408] kunit_try_run_case+0x170/0x3f0 [ 23.872426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.872447] kthread+0x328/0x630 [ 23.872465] ret_from_fork+0x10/0x20 [ 23.872482] [ 23.878535] Allocated by task 315: [ 23.878846] kasan_save_stack+0x3c/0x68 [ 23.879200] kasan_save_track+0x20/0x40 [ 23.879553] kasan_save_alloc_info+0x40/0x58 [ 23.879947] __kasan_kmalloc+0xd4/0xd8 [ 23.880292] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.880712] kasan_bitops_generic+0xa0/0x1c8 [ 23.881103] kunit_try_run_case+0x170/0x3f0 [ 23.881489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.881991] kthread+0x328/0x630 [ 23.882295] ret_from_fork+0x10/0x20 [ 23.882627] [ 23.882769] The buggy address belongs to the object at ffff000001193200 [ 23.882769] which belongs to the cache kmalloc-16 of size 16 [ 23.883863] The buggy address is located 8 bytes inside of [ 23.883863] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.884952] [ 23.885094] The buggy address belongs to the physical page: [ 23.885594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.886297] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.886886] page_type: f5(slab) [ 23.887179] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.887873] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.888564] page dumped because: kasan: bad access detected [ 23.889065] [ 23.889206] Memory state around the buggy address: [ 23.889639] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.890286] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.890934] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.891579] ^ [ 23.891899] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.892546] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.893191] ================================================================== [ 24.038037] ================================================================== [ 24.038676] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 24.039465] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 24.040110] [ 24.040248] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.040263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.040267] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.040272] Call trace: [ 24.040276] show_stack+0x20/0x38 (C) [ 24.040284] dump_stack_lvl+0x8c/0xd0 [ 24.040293] print_report+0x118/0x608 [ 24.040301] kasan_report+0xdc/0x128 [ 24.040310] __asan_report_load8_noabort+0x20/0x30 [ 24.040320] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 24.040330] kasan_bitops_generic+0x11c/0x1c8 [ 24.040338] kunit_try_run_case+0x170/0x3f0 [ 24.040349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.040361] kthread+0x328/0x630 [ 24.040370] ret_from_fork+0x10/0x20 [ 24.040380] [ 24.046399] Allocated by task 315: [ 24.046704] kasan_save_stack+0x3c/0x68 [ 24.047048] kasan_save_track+0x20/0x40 [ 24.047391] kasan_save_alloc_info+0x40/0x58 [ 24.047774] __kasan_kmalloc+0xd4/0xd8 [ 24.048111] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.048518] kasan_bitops_generic+0xa0/0x1c8 [ 24.048899] kunit_try_run_case+0x170/0x3f0 [ 24.049275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.049765] kthread+0x328/0x630 [ 24.050058] ret_from_fork+0x10/0x20 [ 24.050380] [ 24.050517] The buggy address belongs to the object at ffff000001193200 [ 24.050517] which belongs to the cache kmalloc-16 of size 16 [ 24.051599] The buggy address is located 8 bytes inside of [ 24.051599] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 24.052674] [ 24.052811] The buggy address belongs to the physical page: [ 24.053302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 24.053994] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.054571] page_type: f5(slab) [ 24.054855] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 24.055538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.056220] page dumped because: kasan: bad access detected [ 24.056712] [ 24.056850] Memory state around the buggy address: [ 24.057275] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.057912] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 24.058549] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.059185] ^ [ 24.059498] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.060135] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.060771] ================================================================== [ 23.893918] ================================================================== [ 23.894565] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 23.895365] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.896029] [ 23.896174] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.896200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.896208] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.896216] Call trace: [ 23.896222] show_stack+0x20/0x38 (C) [ 23.896238] dump_stack_lvl+0x8c/0xd0 [ 23.896253] print_report+0x118/0x608 [ 23.896269] kasan_report+0xdc/0x128 [ 23.896284] kasan_check_range+0x100/0x1a8 [ 23.896300] __kasan_check_write+0x20/0x30 [ 23.896317] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 23.896335] kasan_bitops_generic+0x11c/0x1c8 [ 23.896350] kunit_try_run_case+0x170/0x3f0 [ 23.896368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.896389] kthread+0x328/0x630 [ 23.896406] ret_from_fork+0x10/0x20 [ 23.896423] [ 23.902778] Allocated by task 315: [ 23.903088] kasan_save_stack+0x3c/0x68 [ 23.903443] kasan_save_track+0x20/0x40 [ 23.903796] kasan_save_alloc_info+0x40/0x58 [ 23.904190] __kasan_kmalloc+0xd4/0xd8 [ 23.904535] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.904954] kasan_bitops_generic+0xa0/0x1c8 [ 23.905346] kunit_try_run_case+0x170/0x3f0 [ 23.905732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.906234] kthread+0x328/0x630 [ 23.906537] ret_from_fork+0x10/0x20 [ 23.906869] [ 23.907011] The buggy address belongs to the object at ffff000001193200 [ 23.907011] which belongs to the cache kmalloc-16 of size 16 [ 23.908105] The buggy address is located 8 bytes inside of [ 23.908105] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.909194] [ 23.909337] The buggy address belongs to the physical page: [ 23.909836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.910538] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.911126] page_type: f5(slab) [ 23.911420] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.912114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.912804] page dumped because: kasan: bad access detected [ 23.913305] [ 23.913446] Memory state around the buggy address: [ 23.913879] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.914526] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.915173] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.915819] ^ [ 23.916139] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.916786] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.917431] ================================================================== [ 23.990313] ================================================================== [ 23.990961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 23.991761] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.992425] [ 23.992570] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.992596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.992604] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.992612] Call trace: [ 23.992618] show_stack+0x20/0x38 (C) [ 23.992635] dump_stack_lvl+0x8c/0xd0 [ 23.992649] print_report+0x118/0x608 [ 23.992665] kasan_report+0xdc/0x128 [ 23.992680] kasan_check_range+0x100/0x1a8 [ 23.992696] __kasan_check_write+0x20/0x30 [ 23.992714] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 23.992731] kasan_bitops_generic+0x11c/0x1c8 [ 23.992746] kunit_try_run_case+0x170/0x3f0 [ 23.992765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.992785] kthread+0x328/0x630 [ 23.992803] ret_from_fork+0x10/0x20 [ 23.992820] [ 23.999174] Allocated by task 315: [ 23.999485] kasan_save_stack+0x3c/0x68 [ 23.999839] kasan_save_track+0x20/0x40 [ 24.000192] kasan_save_alloc_info+0x40/0x58 [ 24.000586] __kasan_kmalloc+0xd4/0xd8 [ 24.000932] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.001350] kasan_bitops_generic+0xa0/0x1c8 [ 24.001743] kunit_try_run_case+0x170/0x3f0 [ 24.002130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.002631] kthread+0x328/0x630 [ 24.002935] ret_from_fork+0x10/0x20 [ 24.003267] [ 24.003410] The buggy address belongs to the object at ffff000001193200 [ 24.003410] which belongs to the cache kmalloc-16 of size 16 [ 24.004504] The buggy address is located 8 bytes inside of [ 24.004504] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 24.005592] [ 24.005735] The buggy address belongs to the physical page: [ 24.006235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 24.006935] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.007524] page_type: f5(slab) [ 24.007818] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 24.008511] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.009201] page dumped because: kasan: bad access detected [ 24.009702] [ 24.009844] Memory state around the buggy address: [ 24.010277] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.010923] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 24.011570] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.012214] ^ [ 24.012535] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.013182] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.013826] ================================================================== [ 23.918183] ================================================================== [ 23.918831] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 23.919631] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.920288] [ 23.920434] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.920459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.920467] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.920476] Call trace: [ 23.920482] show_stack+0x20/0x38 (C) [ 23.920498] dump_stack_lvl+0x8c/0xd0 [ 23.920513] print_report+0x118/0x608 [ 23.920529] kasan_report+0xdc/0x128 [ 23.920544] __asan_report_load8_noabort+0x20/0x30 [ 23.920562] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 23.920580] kasan_bitops_generic+0x11c/0x1c8 [ 23.920594] kunit_try_run_case+0x170/0x3f0 [ 23.920612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.920633] kthread+0x328/0x630 [ 23.920651] ret_from_fork+0x10/0x20 [ 23.920668] [ 23.926719] Allocated by task 315: [ 23.927031] kasan_save_stack+0x3c/0x68 [ 23.927385] kasan_save_track+0x20/0x40 [ 23.927738] kasan_save_alloc_info+0x40/0x58 [ 23.928132] __kasan_kmalloc+0xd4/0xd8 [ 23.928477] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.928896] kasan_bitops_generic+0xa0/0x1c8 [ 23.929287] kunit_try_run_case+0x170/0x3f0 [ 23.929674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.930176] kthread+0x328/0x630 [ 23.930479] ret_from_fork+0x10/0x20 [ 23.930811] [ 23.930954] The buggy address belongs to the object at ffff000001193200 [ 23.930954] which belongs to the cache kmalloc-16 of size 16 [ 23.932048] The buggy address is located 8 bytes inside of [ 23.932048] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.933137] [ 23.933279] The buggy address belongs to the physical page: [ 23.933778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.934479] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.935067] page_type: f5(slab) [ 23.935361] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.936054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.936744] page dumped because: kasan: bad access detected [ 23.937245] [ 23.937387] Memory state around the buggy address: [ 23.937820] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.938466] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.939114] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.939759] ^ [ 23.940079] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.940726] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.941371] ================================================================== [ 24.014638] ================================================================== [ 24.015277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 24.016066] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 24.016712] [ 24.016850] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.016865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.016869] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.016875] Call trace: [ 24.016878] show_stack+0x20/0x38 (C) [ 24.016887] dump_stack_lvl+0x8c/0xd0 [ 24.016896] print_report+0x118/0x608 [ 24.016904] kasan_report+0xdc/0x128 [ 24.016913] __asan_report_load8_noabort+0x20/0x30 [ 24.016923] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 24.016933] kasan_bitops_generic+0x11c/0x1c8 [ 24.016941] kunit_try_run_case+0x170/0x3f0 [ 24.016952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.016963] kthread+0x328/0x630 [ 24.016974] ret_from_fork+0x10/0x20 [ 24.016983] [ 24.023000] Allocated by task 315: [ 24.023304] kasan_save_stack+0x3c/0x68 [ 24.023650] kasan_save_track+0x20/0x40 [ 24.023993] kasan_save_alloc_info+0x40/0x58 [ 24.024376] __kasan_kmalloc+0xd4/0xd8 [ 24.024713] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.025120] kasan_bitops_generic+0xa0/0x1c8 [ 24.025502] kunit_try_run_case+0x170/0x3f0 [ 24.025879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.026370] kthread+0x328/0x630 [ 24.026663] ret_from_fork+0x10/0x20 [ 24.026985] [ 24.027123] The buggy address belongs to the object at ffff000001193200 [ 24.027123] which belongs to the cache kmalloc-16 of size 16 [ 24.028206] The buggy address is located 8 bytes inside of [ 24.028206] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 24.029282] [ 24.029419] The buggy address belongs to the physical page: [ 24.029911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 24.030603] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.031181] page_type: f5(slab) [ 24.031465] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 24.032149] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.032831] page dumped because: kasan: bad access detected [ 24.033322] [ 24.033460] Memory state around the buggy address: [ 24.033886] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.034523] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 24.035160] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.035796] ^ [ 24.036108] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.036745] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.037381] ================================================================== [ 23.942128] ================================================================== [ 23.942776] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 23.943576] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.944240] [ 23.944385] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.944411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.944419] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.944428] Call trace: [ 23.944434] show_stack+0x20/0x38 (C) [ 23.944450] dump_stack_lvl+0x8c/0xd0 [ 23.944465] print_report+0x118/0x608 [ 23.944480] kasan_report+0xdc/0x128 [ 23.944495] kasan_check_range+0x100/0x1a8 [ 23.944512] __kasan_check_write+0x20/0x30 [ 23.944530] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 23.944547] kasan_bitops_generic+0x11c/0x1c8 [ 23.944562] kunit_try_run_case+0x170/0x3f0 [ 23.944581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.944602] kthread+0x328/0x630 [ 23.944619] ret_from_fork+0x10/0x20 [ 23.944636] [ 23.950988] Allocated by task 315: [ 23.951299] kasan_save_stack+0x3c/0x68 [ 23.951653] kasan_save_track+0x20/0x40 [ 23.952007] kasan_save_alloc_info+0x40/0x58 [ 23.952401] __kasan_kmalloc+0xd4/0xd8 [ 23.952747] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.953166] kasan_bitops_generic+0xa0/0x1c8 [ 23.953557] kunit_try_run_case+0x170/0x3f0 [ 23.953944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.954446] kthread+0x328/0x630 [ 23.954750] ret_from_fork+0x10/0x20 [ 23.955082] [ 23.955224] The buggy address belongs to the object at ffff000001193200 [ 23.955224] which belongs to the cache kmalloc-16 of size 16 [ 23.956318] The buggy address is located 8 bytes inside of [ 23.956318] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.957407] [ 23.957550] The buggy address belongs to the physical page: [ 23.958050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.958751] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.959340] page_type: f5(slab) [ 23.959633] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.960327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.961017] page dumped because: kasan: bad access detected [ 23.961517] [ 23.961659] Memory state around the buggy address: [ 23.962092] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.962739] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.963387] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.964032] ^ [ 23.964351] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.964999] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.965643] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 23.724262] ================================================================== [ 23.724917] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 23.725660] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.726331] [ 23.726480] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.726513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.726523] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.726533] Call trace: [ 23.726541] show_stack+0x20/0x38 (C) [ 23.726561] dump_stack_lvl+0x8c/0xd0 [ 23.726579] print_report+0x118/0x608 [ 23.726598] kasan_report+0xdc/0x128 [ 23.726617] kasan_check_range+0x100/0x1a8 [ 23.726637] __kasan_check_write+0x20/0x30 [ 23.726658] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 23.726684] kasan_bitops_generic+0x110/0x1c8 [ 23.726703] kunit_try_run_case+0x170/0x3f0 [ 23.726726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.726751] kthread+0x328/0x630 [ 23.726774] ret_from_fork+0x10/0x20 [ 23.726795] [ 23.733103] Allocated by task 315: [ 23.733418] kasan_save_stack+0x3c/0x68 [ 23.733778] kasan_save_track+0x20/0x40 [ 23.734136] kasan_save_alloc_info+0x40/0x58 [ 23.734536] __kasan_kmalloc+0xd4/0xd8 [ 23.734886] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.735312] kasan_bitops_generic+0xa0/0x1c8 [ 23.735708] kunit_try_run_case+0x170/0x3f0 [ 23.736101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.736610] kthread+0x328/0x630 [ 23.736920] ret_from_fork+0x10/0x20 [ 23.737258] [ 23.737404] The buggy address belongs to the object at ffff000001193200 [ 23.737404] which belongs to the cache kmalloc-16 of size 16 [ 23.738505] The buggy address is located 8 bytes inside of [ 23.738505] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.739601] [ 23.739746] The buggy address belongs to the physical page: [ 23.740251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.740958] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.741551] page_type: f5(slab) [ 23.741849] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.742550] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.743246] page dumped because: kasan: bad access detected [ 23.743750] [ 23.743896] Memory state around the buggy address: [ 23.744333] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.744985] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.745637] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.746286] ^ [ 23.746610] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.747263] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.747912] ================================================================== [ 23.675690] ================================================================== [ 23.676345] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 23.677089] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.677753] [ 23.677902] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.677935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.677945] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.677956] Call trace: [ 23.677964] show_stack+0x20/0x38 (C) [ 23.677984] dump_stack_lvl+0x8c/0xd0 [ 23.678003] print_report+0x118/0x608 [ 23.678022] kasan_report+0xdc/0x128 [ 23.678041] __asan_report_load8_noabort+0x20/0x30 [ 23.678064] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 23.678090] kasan_bitops_generic+0x110/0x1c8 [ 23.678109] kunit_try_run_case+0x170/0x3f0 [ 23.678132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.678158] kthread+0x328/0x630 [ 23.678180] ret_from_fork+0x10/0x20 [ 23.678201] [ 23.684211] Allocated by task 315: [ 23.684525] kasan_save_stack+0x3c/0x68 [ 23.684884] kasan_save_track+0x20/0x40 [ 23.685244] kasan_save_alloc_info+0x40/0x58 [ 23.685642] __kasan_kmalloc+0xd4/0xd8 [ 23.685993] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.686419] kasan_bitops_generic+0xa0/0x1c8 [ 23.686816] kunit_try_run_case+0x170/0x3f0 [ 23.687208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.687716] kthread+0x328/0x630 [ 23.688026] ret_from_fork+0x10/0x20 [ 23.688364] [ 23.688510] The buggy address belongs to the object at ffff000001193200 [ 23.688510] which belongs to the cache kmalloc-16 of size 16 [ 23.689612] The buggy address is located 8 bytes inside of [ 23.689612] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.690706] [ 23.690852] The buggy address belongs to the physical page: [ 23.691356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.692064] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.692657] page_type: f5(slab) [ 23.692956] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.693656] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.694351] page dumped because: kasan: bad access detected [ 23.694855] [ 23.695001] Memory state around the buggy address: [ 23.695438] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.696090] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.696743] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.697392] ^ [ 23.697715] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.698367] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.699017] ================================================================== [ 23.748692] ================================================================== [ 23.749347] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 23.750091] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.750753] [ 23.750902] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.750934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.750944] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.750954] Call trace: [ 23.750962] show_stack+0x20/0x38 (C) [ 23.750982] dump_stack_lvl+0x8c/0xd0 [ 23.751001] print_report+0x118/0x608 [ 23.751020] kasan_report+0xdc/0x128 [ 23.751039] __asan_report_load8_noabort+0x20/0x30 [ 23.751061] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 23.751087] kasan_bitops_generic+0x110/0x1c8 [ 23.751105] kunit_try_run_case+0x170/0x3f0 [ 23.751128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.751154] kthread+0x328/0x630 [ 23.751176] ret_from_fork+0x10/0x20 [ 23.751197] [ 23.757201] Allocated by task 315: [ 23.757516] kasan_save_stack+0x3c/0x68 [ 23.757876] kasan_save_track+0x20/0x40 [ 23.758234] kasan_save_alloc_info+0x40/0x58 [ 23.758633] __kasan_kmalloc+0xd4/0xd8 [ 23.758984] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.759409] kasan_bitops_generic+0xa0/0x1c8 [ 23.759806] kunit_try_run_case+0x170/0x3f0 [ 23.760200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.760708] kthread+0x328/0x630 [ 23.761018] ret_from_fork+0x10/0x20 [ 23.761356] [ 23.761502] The buggy address belongs to the object at ffff000001193200 [ 23.761502] which belongs to the cache kmalloc-16 of size 16 [ 23.762603] The buggy address is located 8 bytes inside of [ 23.762603] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.763699] [ 23.763845] The buggy address belongs to the physical page: [ 23.764349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.765056] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.765650] page_type: f5(slab) [ 23.765949] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.766650] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.767344] page dumped because: kasan: bad access detected [ 23.767849] [ 23.767994] Memory state around the buggy address: [ 23.768431] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.769083] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.769734] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.770385] ^ [ 23.770708] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.771360] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.772009] ================================================================== [ 23.772770] ================================================================== [ 23.773425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 23.774169] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.774838] [ 23.774988] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.775020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.775029] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.775040] Call trace: [ 23.775047] show_stack+0x20/0x38 (C) [ 23.775067] dump_stack_lvl+0x8c/0xd0 [ 23.775086] print_report+0x118/0x608 [ 23.775105] kasan_report+0xdc/0x128 [ 23.775123] kasan_check_range+0x100/0x1a8 [ 23.775143] __kasan_check_write+0x20/0x30 [ 23.775165] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 23.775191] kasan_bitops_generic+0x110/0x1c8 [ 23.775210] kunit_try_run_case+0x170/0x3f0 [ 23.775232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.775258] kthread+0x328/0x630 [ 23.775280] ret_from_fork+0x10/0x20 [ 23.775300] [ 23.781612] Allocated by task 315: [ 23.781928] kasan_save_stack+0x3c/0x68 [ 23.782288] kasan_save_track+0x20/0x40 [ 23.782646] kasan_save_alloc_info+0x40/0x58 [ 23.783045] __kasan_kmalloc+0xd4/0xd8 [ 23.783397] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.783823] kasan_bitops_generic+0xa0/0x1c8 [ 23.784220] kunit_try_run_case+0x170/0x3f0 [ 23.784613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.785121] kthread+0x328/0x630 [ 23.785430] ret_from_fork+0x10/0x20 [ 23.785767] [ 23.785913] The buggy address belongs to the object at ffff000001193200 [ 23.785913] which belongs to the cache kmalloc-16 of size 16 [ 23.787014] The buggy address is located 8 bytes inside of [ 23.787014] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.788110] [ 23.788257] The buggy address belongs to the physical page: [ 23.788761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.789468] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.790061] page_type: f5(slab) [ 23.790360] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.791060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.791755] page dumped because: kasan: bad access detected [ 23.792259] [ 23.792405] Memory state around the buggy address: [ 23.792841] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.793494] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.794146] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.794795] ^ [ 23.795119] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.795771] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.796420] ================================================================== [ 23.821857] ================================================================== [ 23.822509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 23.823247] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.823904] [ 23.824050] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.824077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.824084] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.824093] Call trace: [ 23.824099] show_stack+0x20/0x38 (C) [ 23.824116] dump_stack_lvl+0x8c/0xd0 [ 23.824132] print_report+0x118/0x608 [ 23.824147] kasan_report+0xdc/0x128 [ 23.824162] __asan_report_load8_noabort+0x20/0x30 [ 23.824180] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 23.824201] kasan_bitops_generic+0x110/0x1c8 [ 23.824216] kunit_try_run_case+0x170/0x3f0 [ 23.824235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.824256] kthread+0x328/0x630 [ 23.824274] ret_from_fork+0x10/0x20 [ 23.824291] [ 23.830277] Allocated by task 315: [ 23.830589] kasan_save_stack+0x3c/0x68 [ 23.830943] kasan_save_track+0x20/0x40 [ 23.831297] kasan_save_alloc_info+0x40/0x58 [ 23.831691] __kasan_kmalloc+0xd4/0xd8 [ 23.832036] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.832456] kasan_bitops_generic+0xa0/0x1c8 [ 23.832847] kunit_try_run_case+0x170/0x3f0 [ 23.833233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.833735] kthread+0x328/0x630 [ 23.834039] ret_from_fork+0x10/0x20 [ 23.834370] [ 23.834513] The buggy address belongs to the object at ffff000001193200 [ 23.834513] which belongs to the cache kmalloc-16 of size 16 [ 23.835608] The buggy address is located 8 bytes inside of [ 23.835608] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.836697] [ 23.836841] The buggy address belongs to the physical page: [ 23.837341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.838044] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.838633] page_type: f5(slab) [ 23.838926] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.839620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.840310] page dumped because: kasan: bad access detected [ 23.840809] [ 23.840950] Memory state around the buggy address: [ 23.841383] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.842031] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.842678] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.843323] ^ [ 23.843643] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.844290] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.844935] ================================================================== [ 23.625892] ================================================================== [ 23.626578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 23.627354] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.628033] [ 23.628199] CPU: 2 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.628249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.628265] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.628283] Call trace: [ 23.628295] show_stack+0x20/0x38 (C) [ 23.628329] dump_stack_lvl+0x8c/0xd0 [ 23.628361] print_report+0x118/0x608 [ 23.628392] kasan_report+0xdc/0x128 [ 23.628420] __asan_report_load8_noabort+0x20/0x30 [ 23.628455] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 23.628494] kasan_bitops_generic+0x110/0x1c8 [ 23.628523] kunit_try_run_case+0x170/0x3f0 [ 23.628560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.628600] kthread+0x328/0x630 [ 23.628634] ret_from_fork+0x10/0x20 [ 23.628668] [ 23.634734] Allocated by task 315: [ 23.635061] kasan_save_stack+0x3c/0x68 [ 23.635435] kasan_save_track+0x20/0x40 [ 23.635808] kasan_save_alloc_info+0x40/0x58 [ 23.636221] __kasan_kmalloc+0xd4/0xd8 [ 23.636585] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.637028] kasan_bitops_generic+0xa0/0x1c8 [ 23.637439] kunit_try_run_case+0x170/0x3f0 [ 23.637848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.638374] kthread+0x328/0x630 [ 23.638697] ret_from_fork+0x10/0x20 [ 23.639049] [ 23.639203] The buggy address belongs to the object at ffff000001193200 [ 23.639203] which belongs to the cache kmalloc-16 of size 16 [ 23.640321] The buggy address is located 8 bytes inside of [ 23.640321] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.641436] [ 23.641592] The buggy address belongs to the physical page: [ 23.642107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.642834] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.643446] page_type: f5(slab) [ 23.643760] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.644476] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.645185] page dumped because: kasan: bad access detected [ 23.645701] [ 23.645856] Memory state around the buggy address: [ 23.646305] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.646974] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.647642] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.648305] ^ [ 23.648641] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.649308] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.649972] ================================================================== [ 23.699814] ================================================================== [ 23.700470] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 23.701214] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.701884] [ 23.702034] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.702068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.702077] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.702088] Call trace: [ 23.702095] show_stack+0x20/0x38 (C) [ 23.702116] dump_stack_lvl+0x8c/0xd0 [ 23.702135] print_report+0x118/0x608 [ 23.702154] kasan_report+0xdc/0x128 [ 23.702172] kasan_check_range+0x100/0x1a8 [ 23.702193] __kasan_check_write+0x20/0x30 [ 23.702214] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 23.702240] kasan_bitops_generic+0x110/0x1c8 [ 23.702258] kunit_try_run_case+0x170/0x3f0 [ 23.702281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.702307] kthread+0x328/0x630 [ 23.702329] ret_from_fork+0x10/0x20 [ 23.702350] [ 23.708660] Allocated by task 315: [ 23.708975] kasan_save_stack+0x3c/0x68 [ 23.709336] kasan_save_track+0x20/0x40 [ 23.709695] kasan_save_alloc_info+0x40/0x58 [ 23.710093] __kasan_kmalloc+0xd4/0xd8 [ 23.710443] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.710868] kasan_bitops_generic+0xa0/0x1c8 [ 23.711265] kunit_try_run_case+0x170/0x3f0 [ 23.711657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.712166] kthread+0x328/0x630 [ 23.712476] ret_from_fork+0x10/0x20 [ 23.712812] [ 23.712958] The buggy address belongs to the object at ffff000001193200 [ 23.712958] which belongs to the cache kmalloc-16 of size 16 [ 23.714058] The buggy address is located 8 bytes inside of [ 23.714058] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.715155] [ 23.715300] The buggy address belongs to the physical page: [ 23.715803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.716510] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.717104] page_type: f5(slab) [ 23.717401] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.718102] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.718796] page dumped because: kasan: bad access detected [ 23.719301] [ 23.719446] Memory state around the buggy address: [ 23.719883] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.720535] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.721187] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.721837] ^ [ 23.722160] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.722812] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.723462] ================================================================== [ 23.797186] ================================================================== [ 23.797839] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 23.798583] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.799253] [ 23.799402] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.799433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.799442] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.799453] Call trace: [ 23.799460] show_stack+0x20/0x38 (C) [ 23.799480] dump_stack_lvl+0x8c/0xd0 [ 23.799499] print_report+0x118/0x608 [ 23.799517] kasan_report+0xdc/0x128 [ 23.799535] kasan_check_range+0x100/0x1a8 [ 23.799556] __kasan_check_write+0x20/0x30 [ 23.799577] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 23.799602] kasan_bitops_generic+0x110/0x1c8 [ 23.799621] kunit_try_run_case+0x170/0x3f0 [ 23.799643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.799669] kthread+0x328/0x630 [ 23.799690] ret_from_fork+0x10/0x20 [ 23.799711] [ 23.806023] Allocated by task 315: [ 23.806339] kasan_save_stack+0x3c/0x68 [ 23.806697] kasan_save_track+0x20/0x40 [ 23.807056] kasan_save_alloc_info+0x40/0x58 [ 23.807455] __kasan_kmalloc+0xd4/0xd8 [ 23.807806] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.808232] kasan_bitops_generic+0xa0/0x1c8 [ 23.808627] kunit_try_run_case+0x170/0x3f0 [ 23.809019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.809527] kthread+0x328/0x630 [ 23.809837] ret_from_fork+0x10/0x20 [ 23.810175] [ 23.810321] The buggy address belongs to the object at ffff000001193200 [ 23.810321] which belongs to the cache kmalloc-16 of size 16 [ 23.811421] The buggy address is located 8 bytes inside of [ 23.811421] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.812516] [ 23.812662] The buggy address belongs to the physical page: [ 23.813166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.813873] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.814468] page_type: f5(slab) [ 23.814765] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.815465] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.816160] page dumped because: kasan: bad access detected [ 23.816664] [ 23.816809] Memory state around the buggy address: [ 23.817247] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.817900] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.818552] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.819202] ^ [ 23.819526] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.820177] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.820826] ================================================================== [ 23.600005] ================================================================== [ 23.601047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 23.601821] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.602508] [ 23.602671] CPU: 2 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.602722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.602737] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.602756] Call trace: [ 23.602768] show_stack+0x20/0x38 (C) [ 23.602802] dump_stack_lvl+0x8c/0xd0 [ 23.602834] print_report+0x118/0x608 [ 23.602864] kasan_report+0xdc/0x128 [ 23.602893] kasan_check_range+0x100/0x1a8 [ 23.602925] __kasan_check_write+0x20/0x30 [ 23.602957] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 23.602998] kasan_bitops_generic+0x110/0x1c8 [ 23.603027] kunit_try_run_case+0x170/0x3f0 [ 23.603063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.603103] kthread+0x328/0x630 [ 23.603137] ret_from_fork+0x10/0x20 [ 23.603170] [ 23.609541] Allocated by task 315: [ 23.609868] kasan_save_stack+0x3c/0x68 [ 23.610242] kasan_save_track+0x20/0x40 [ 23.610615] kasan_save_alloc_info+0x40/0x58 [ 23.611030] __kasan_kmalloc+0xd4/0xd8 [ 23.611395] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.611838] kasan_bitops_generic+0xa0/0x1c8 [ 23.612248] kunit_try_run_case+0x170/0x3f0 [ 23.612656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.613182] kthread+0x328/0x630 [ 23.613505] ret_from_fork+0x10/0x20 [ 23.613857] [ 23.614012] The buggy address belongs to the object at ffff000001193200 [ 23.614012] which belongs to the cache kmalloc-16 of size 16 [ 23.615131] The buggy address is located 8 bytes inside of [ 23.615131] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.616246] [ 23.616401] The buggy address belongs to the physical page: [ 23.616918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.617645] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.618257] page_type: f5(slab) [ 23.618572] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.619289] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.619998] page dumped because: kasan: bad access detected [ 23.620513] [ 23.620666] Memory state around the buggy address: [ 23.621116] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.621784] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.622454] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.623117] ^ [ 23.623453] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.624121] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.624784] ================================================================== [ 23.651105] ================================================================== [ 23.651779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 23.652539] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.653212] [ 23.653368] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.653405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.653415] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.653428] Call trace: [ 23.653436] show_stack+0x20/0x38 (C) [ 23.653460] dump_stack_lvl+0x8c/0xd0 [ 23.653482] print_report+0x118/0x608 [ 23.653502] kasan_report+0xdc/0x128 [ 23.653520] kasan_check_range+0x100/0x1a8 [ 23.653540] __kasan_check_write+0x20/0x30 [ 23.653562] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 23.653588] kasan_bitops_generic+0x110/0x1c8 [ 23.653607] kunit_try_run_case+0x170/0x3f0 [ 23.653631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.653658] kthread+0x328/0x630 [ 23.653681] ret_from_fork+0x10/0x20 [ 23.653703] [ 23.660014] Allocated by task 315: [ 23.660333] kasan_save_stack+0x3c/0x68 [ 23.660695] kasan_save_track+0x20/0x40 [ 23.661054] kasan_save_alloc_info+0x40/0x58 [ 23.661452] __kasan_kmalloc+0xd4/0xd8 [ 23.661803] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.662230] kasan_bitops_generic+0xa0/0x1c8 [ 23.662628] kunit_try_run_case+0x170/0x3f0 [ 23.663021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.663531] kthread+0x328/0x630 [ 23.663840] ret_from_fork+0x10/0x20 [ 23.664179] [ 23.664326] The buggy address belongs to the object at ffff000001193200 [ 23.664326] which belongs to the cache kmalloc-16 of size 16 [ 23.665428] The buggy address is located 8 bytes inside of [ 23.665428] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.666524] [ 23.666671] The buggy address belongs to the physical page: [ 23.667176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.667886] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.668484] page_type: f5(slab) [ 23.668785] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.669487] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.670182] page dumped because: kasan: bad access detected [ 23.670687] [ 23.670832] Memory state around the buggy address: [ 23.671269] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.671923] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.672575] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.673225] ^ [ 23.673548] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.674201] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.674850] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 23.568931] ================================================================== [ 23.569608] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 23.570173] Read of size 1 at addr ffff0000101e8f90 by task kunit_try_catch/313 [ 23.570839] [ 23.570994] CPU: 4 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.571032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.571043] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.571056] Call trace: [ 23.571064] show_stack+0x20/0x38 (C) [ 23.571089] dump_stack_lvl+0x8c/0xd0 [ 23.571110] print_report+0x118/0x608 [ 23.571131] kasan_report+0xdc/0x128 [ 23.571150] __asan_report_load1_noabort+0x20/0x30 [ 23.571173] strnlen+0x80/0x88 [ 23.571194] kasan_strings+0x478/0xb00 [ 23.571218] kunit_try_run_case+0x170/0x3f0 [ 23.571242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.571268] kthread+0x328/0x630 [ 23.571292] ret_from_fork+0x10/0x20 [ 23.571313] [ 23.577081] Allocated by task 313: [ 23.577398] kasan_save_stack+0x3c/0x68 [ 23.577762] kasan_save_track+0x20/0x40 [ 23.578121] kasan_save_alloc_info+0x40/0x58 [ 23.578521] __kasan_kmalloc+0xd4/0xd8 [ 23.578873] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.579299] kasan_strings+0xc8/0xb00 [ 23.579646] kunit_try_run_case+0x170/0x3f0 [ 23.580039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.580549] kthread+0x328/0x630 [ 23.580858] ret_from_fork+0x10/0x20 [ 23.581196] [ 23.581343] Freed by task 313: [ 23.581629] kasan_save_stack+0x3c/0x68 [ 23.581987] kasan_save_track+0x20/0x40 [ 23.582346] kasan_save_free_info+0x4c/0x78 [ 23.582737] __kasan_slab_free+0x6c/0x98 [ 23.583104] kfree+0x214/0x3c8 [ 23.583399] kasan_strings+0x24c/0xb00 [ 23.583753] kunit_try_run_case+0x170/0x3f0 [ 23.584145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.584654] kthread+0x328/0x630 [ 23.584964] ret_from_fork+0x10/0x20 [ 23.585300] [ 23.585447] The buggy address belongs to the object at ffff0000101e8f80 [ 23.585447] which belongs to the cache kmalloc-32 of size 32 [ 23.586549] The buggy address is located 16 bytes inside of [ 23.586549] freed 32-byte region [ffff0000101e8f80, ffff0000101e8fa0) [ 23.587631] [ 23.587777] The buggy address belongs to the physical page: [ 23.588283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e8 [ 23.589002] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.589601] page_type: f5(slab) [ 23.589902] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 23.590602] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 23.591298] page dumped because: kasan: bad access detected [ 23.591802] [ 23.591947] Memory state around the buggy address: [ 23.592385] ffff0000101e8e80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.593038] ffff0000101e8f00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 23.593691] >ffff0000101e8f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.594340] ^ [ 23.594687] ffff0000101e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.595340] ffff0000101e9080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 23.595989] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 23.539683] ================================================================== [ 23.540355] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 23.540926] Read of size 1 at addr ffff0000101e8f90 by task kunit_try_catch/313 [ 23.541603] [ 23.541768] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.541818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.541834] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.541852] Call trace: [ 23.541864] show_stack+0x20/0x38 (C) [ 23.541898] dump_stack_lvl+0x8c/0xd0 [ 23.541930] print_report+0x118/0x608 [ 23.541963] kasan_report+0xdc/0x128 [ 23.541993] __asan_report_load1_noabort+0x20/0x30 [ 23.542029] strlen+0xa8/0xb0 [ 23.542061] kasan_strings+0x418/0xb00 [ 23.542098] kunit_try_run_case+0x170/0x3f0 [ 23.542137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.542178] kthread+0x328/0x630 [ 23.542214] ret_from_fork+0x10/0x20 [ 23.542248] [ 23.548067] Allocated by task 313: [ 23.548398] kasan_save_stack+0x3c/0x68 [ 23.548773] kasan_save_track+0x20/0x40 [ 23.549146] kasan_save_alloc_info+0x40/0x58 [ 23.549561] __kasan_kmalloc+0xd4/0xd8 [ 23.549925] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.550368] kasan_strings+0xc8/0xb00 [ 23.550731] kunit_try_run_case+0x170/0x3f0 [ 23.551139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.551664] kthread+0x328/0x630 [ 23.551989] ret_from_fork+0x10/0x20 [ 23.552339] [ 23.552493] Freed by task 313: [ 23.552789] kasan_save_stack+0x3c/0x68 [ 23.553162] kasan_save_track+0x20/0x40 [ 23.553534] kasan_save_free_info+0x4c/0x78 [ 23.553940] __kasan_slab_free+0x6c/0x98 [ 23.554320] kfree+0x214/0x3c8 [ 23.554630] kasan_strings+0x24c/0xb00 [ 23.555000] kunit_try_run_case+0x170/0x3f0 [ 23.555408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.555933] kthread+0x328/0x630 [ 23.556256] ret_from_fork+0x10/0x20 [ 23.556606] [ 23.556761] The buggy address belongs to the object at ffff0000101e8f80 [ 23.556761] which belongs to the cache kmalloc-32 of size 32 [ 23.557882] The buggy address is located 16 bytes inside of [ 23.557882] freed 32-byte region [ffff0000101e8f80, ffff0000101e8fa0) [ 23.558980] [ 23.559135] The buggy address belongs to the physical page: [ 23.559652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e8 [ 23.560385] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.560998] page_type: f5(slab) [ 23.561312] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 23.562029] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 23.562738] page dumped because: kasan: bad access detected [ 23.563254] [ 23.563408] Memory state around the buggy address: [ 23.563856] ffff0000101e8e80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.564524] ffff0000101e8f00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 23.565191] >ffff0000101e8f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.565854] ^ [ 23.566212] ffff0000101e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.566879] ffff0000101e9080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 23.567543] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 23.511264] ================================================================== [ 23.511945] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 23.512587] Read of size 1 at addr ffff0000101e8f90 by task kunit_try_catch/313 [ 23.513266] [ 23.513431] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.513482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.513496] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.513515] Call trace: [ 23.513527] show_stack+0x20/0x38 (C) [ 23.513559] dump_stack_lvl+0x8c/0xd0 [ 23.513592] print_report+0x118/0x608 [ 23.513623] kasan_report+0xdc/0x128 [ 23.513652] __asan_report_load1_noabort+0x20/0x30 [ 23.513687] kasan_strings+0x95c/0xb00 [ 23.513720] kunit_try_run_case+0x170/0x3f0 [ 23.513757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.513797] kthread+0x328/0x630 [ 23.513832] ret_from_fork+0x10/0x20 [ 23.513866] [ 23.519413] Allocated by task 313: [ 23.519742] kasan_save_stack+0x3c/0x68 [ 23.520117] kasan_save_track+0x20/0x40 [ 23.520490] kasan_save_alloc_info+0x40/0x58 [ 23.520905] __kasan_kmalloc+0xd4/0xd8 [ 23.521269] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.521712] kasan_strings+0xc8/0xb00 [ 23.522074] kunit_try_run_case+0x170/0x3f0 [ 23.522482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.523008] kthread+0x328/0x630 [ 23.523332] ret_from_fork+0x10/0x20 [ 23.523683] [ 23.523837] Freed by task 313: [ 23.524132] kasan_save_stack+0x3c/0x68 [ 23.524506] kasan_save_track+0x20/0x40 [ 23.524878] kasan_save_free_info+0x4c/0x78 [ 23.525284] __kasan_slab_free+0x6c/0x98 [ 23.525663] kfree+0x214/0x3c8 [ 23.525972] kasan_strings+0x24c/0xb00 [ 23.526342] kunit_try_run_case+0x170/0x3f0 [ 23.526750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.527275] kthread+0x328/0x630 [ 23.527599] ret_from_fork+0x10/0x20 [ 23.527950] [ 23.528105] The buggy address belongs to the object at ffff0000101e8f80 [ 23.528105] which belongs to the cache kmalloc-32 of size 32 [ 23.529224] The buggy address is located 16 bytes inside of [ 23.529224] freed 32-byte region [ffff0000101e8f80, ffff0000101e8fa0) [ 23.530321] [ 23.530476] The buggy address belongs to the physical page: [ 23.530994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e8 [ 23.531727] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.532341] page_type: f5(slab) [ 23.532655] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 23.533372] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 23.534081] page dumped because: kasan: bad access detected [ 23.534598] [ 23.534751] Memory state around the buggy address: [ 23.535201] ffff0000101e8e80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.535868] ffff0000101e8f00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 23.536535] >ffff0000101e8f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.537198] ^ [ 23.537556] ffff0000101e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.538223] ffff0000101e9080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 23.538886] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 23.481062] ================================================================== [ 23.483184] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 23.483756] Read of size 1 at addr ffff0000101e8f90 by task kunit_try_catch/313 [ 23.484433] [ 23.484599] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.484650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.484666] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.484684] Call trace: [ 23.484696] show_stack+0x20/0x38 (C) [ 23.484731] dump_stack_lvl+0x8c/0xd0 [ 23.484762] print_report+0x118/0x608 [ 23.484795] kasan_report+0xdc/0x128 [ 23.484824] __asan_report_load1_noabort+0x20/0x30 [ 23.484861] strcmp+0xc0/0xc8 [ 23.484891] kasan_strings+0x340/0xb00 [ 23.484925] kunit_try_run_case+0x170/0x3f0 [ 23.484962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.485003] kthread+0x328/0x630 [ 23.485038] ret_from_fork+0x10/0x20 [ 23.485073] [ 23.490886] Allocated by task 313: [ 23.491214] kasan_save_stack+0x3c/0x68 [ 23.491591] kasan_save_track+0x20/0x40 [ 23.491964] kasan_save_alloc_info+0x40/0x58 [ 23.492379] __kasan_kmalloc+0xd4/0xd8 [ 23.492744] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.493187] kasan_strings+0xc8/0xb00 [ 23.493551] kunit_try_run_case+0x170/0x3f0 [ 23.493960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.494486] kthread+0x328/0x630 [ 23.494812] ret_from_fork+0x10/0x20 [ 23.495163] [ 23.495317] Freed by task 313: [ 23.495613] kasan_save_stack+0x3c/0x68 [ 23.495987] kasan_save_track+0x20/0x40 [ 23.496360] kasan_save_free_info+0x4c/0x78 [ 23.496766] __kasan_slab_free+0x6c/0x98 [ 23.497146] kfree+0x214/0x3c8 [ 23.497455] kasan_strings+0x24c/0xb00 [ 23.497825] kunit_try_run_case+0x170/0x3f0 [ 23.498233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.498761] kthread+0x328/0x630 [ 23.499086] ret_from_fork+0x10/0x20 [ 23.499438] [ 23.499592] The buggy address belongs to the object at ffff0000101e8f80 [ 23.499592] which belongs to the cache kmalloc-32 of size 32 [ 23.500711] The buggy address is located 16 bytes inside of [ 23.500711] freed 32-byte region [ffff0000101e8f80, ffff0000101e8fa0) [ 23.501810] [ 23.501966] The buggy address belongs to the physical page: [ 23.502484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e8 [ 23.503217] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.503831] page_type: f5(slab) [ 23.504148] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 23.504864] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 23.505573] page dumped because: kasan: bad access detected [ 23.506089] [ 23.506242] Memory state around the buggy address: [ 23.506693] ffff0000101e8e80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.507360] ffff0000101e8f00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 23.508028] >ffff0000101e8f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.508691] ^ [ 23.509049] ffff0000101e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.509716] ffff0000101e9080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 23.510380] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 23.449322] ================================================================== [ 23.450369] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 23.450956] Read of size 1 at addr ffff00000ee4dbd8 by task kunit_try_catch/311 [ 23.451635] [ 23.451801] CPU: 2 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.451853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.451868] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.451886] Call trace: [ 23.451899] show_stack+0x20/0x38 (C) [ 23.451935] dump_stack_lvl+0x8c/0xd0 [ 23.451966] print_report+0x118/0x608 [ 23.451998] kasan_report+0xdc/0x128 [ 23.452027] __asan_report_load1_noabort+0x20/0x30 [ 23.452064] memcmp+0x198/0x1d8 [ 23.452095] kasan_memcmp+0x16c/0x300 [ 23.452129] kunit_try_run_case+0x170/0x3f0 [ 23.452166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.452206] kthread+0x328/0x630 [ 23.452241] ret_from_fork+0x10/0x20 [ 23.452275] [ 23.458092] Allocated by task 311: [ 23.458420] kasan_save_stack+0x3c/0x68 [ 23.458795] kasan_save_track+0x20/0x40 [ 23.459168] kasan_save_alloc_info+0x40/0x58 [ 23.459583] __kasan_kmalloc+0xd4/0xd8 [ 23.459947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.460390] kasan_memcmp+0xbc/0x300 [ 23.460744] kunit_try_run_case+0x170/0x3f0 [ 23.461152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.461679] kthread+0x328/0x630 [ 23.462004] ret_from_fork+0x10/0x20 [ 23.462356] [ 23.462510] The buggy address belongs to the object at ffff00000ee4dbc0 [ 23.462510] which belongs to the cache kmalloc-32 of size 32 [ 23.463630] The buggy address is located 0 bytes to the right of [ 23.463630] allocated 24-byte region [ffff00000ee4dbc0, ffff00000ee4dbd8) [ 23.464798] [ 23.464953] The buggy address belongs to the physical page: [ 23.465470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xee4d [ 23.466197] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.466811] page_type: f5(slab) [ 23.467127] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 23.467844] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 23.468553] page dumped because: kasan: bad access detected [ 23.469071] [ 23.469225] Memory state around the buggy address: [ 23.469675] ffff00000ee4da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.470345] ffff00000ee4db00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.471012] >ffff00000ee4db80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.471675] ^ [ 23.472241] ffff00000ee4dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.472909] ffff00000ee4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.473572] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 23.422847] ================================================================== [ 23.423938] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 23.424661] Read of size 1 at addr ffff800089717b4a by task kunit_try_catch/307 [ 23.425340] [ 23.425506] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.425556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.425572] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.425590] Call trace: [ 23.425604] show_stack+0x20/0x38 (C) [ 23.425637] dump_stack_lvl+0x8c/0xd0 [ 23.425669] print_report+0x310/0x608 [ 23.425701] kasan_report+0xdc/0x128 [ 23.425731] __asan_report_load1_noabort+0x20/0x30 [ 23.425767] kasan_alloca_oob_right+0x2dc/0x340 [ 23.425804] kunit_try_run_case+0x170/0x3f0 [ 23.425843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.425883] kthread+0x328/0x630 [ 23.425919] ret_from_fork+0x10/0x20 [ 23.425953] [ 23.431572] The buggy address belongs to stack of task kunit_try_catch/307 [ 23.432228] [ 23.432385] The buggy address belongs to the virtual mapping at [ 23.432385] [ffff800089710000, ffff800089719000) created by: [ 23.432385] kernel_clone+0x150/0x7a8 [ 23.433778] [ 23.433934] The buggy address belongs to the physical page: [ 23.434452] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfdf2 [ 23.435179] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.435804] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.436522] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.437231] page dumped because: kasan: bad access detected [ 23.437748] [ 23.437902] Memory state around the buggy address: [ 23.438351] ffff800089717a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.439019] ffff800089717a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.439686] >ffff800089717b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 23.440348] ^ [ 23.440868] ffff800089717b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 23.441535] ffff800089717c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 23.442198] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 23.400290] ================================================================== [ 23.401333] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 23.402050] Read of size 1 at addr ffff8000896f7b5f by task kunit_try_catch/305 [ 23.402730] [ 23.402895] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.402948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.402964] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.402983] Call trace: [ 23.402996] show_stack+0x20/0x38 (C) [ 23.403031] dump_stack_lvl+0x8c/0xd0 [ 23.403064] print_report+0x310/0x608 [ 23.403095] kasan_report+0xdc/0x128 [ 23.403123] __asan_report_load1_noabort+0x20/0x30 [ 23.403159] kasan_alloca_oob_left+0x2b8/0x310 [ 23.403195] kunit_try_run_case+0x170/0x3f0 [ 23.403231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.403271] kthread+0x328/0x630 [ 23.403306] ret_from_fork+0x10/0x20 [ 23.403340] [ 23.408949] The buggy address belongs to stack of task kunit_try_catch/305 [ 23.409603] [ 23.409764] The buggy address belongs to the virtual mapping at [ 23.409764] [ffff8000896f0000, ffff8000896f9000) created by: [ 23.409764] kernel_clone+0x150/0x7a8 [ 23.411157] [ 23.411313] The buggy address belongs to the physical page: [ 23.411832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfe83 [ 23.412558] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.413183] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.413900] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.414608] page dumped because: kasan: bad access detected [ 23.415125] [ 23.415278] Memory state around the buggy address: [ 23.415728] ffff8000896f7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.416395] ffff8000896f7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.417063] >ffff8000896f7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 23.417726] ^ [ 23.418292] ffff8000896f7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 23.418960] ffff8000896f7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 23.419623] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 23.374424] ================================================================== [ 23.375842] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 23.376505] Read of size 1 at addr ffff8000896d7c2a by task kunit_try_catch/303 [ 23.377184] [ 23.377350] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.377402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.377417] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.377435] Call trace: [ 23.377449] show_stack+0x20/0x38 (C) [ 23.377482] dump_stack_lvl+0x8c/0xd0 [ 23.377514] print_report+0x310/0x608 [ 23.377545] kasan_report+0xdc/0x128 [ 23.377573] __asan_report_load1_noabort+0x20/0x30 [ 23.377608] kasan_stack_oob+0x238/0x270 [ 23.377641] kunit_try_run_case+0x170/0x3f0 [ 23.377678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.377721] kthread+0x328/0x630 [ 23.377757] ret_from_fork+0x10/0x20 [ 23.377792] [ 23.383354] The buggy address belongs to stack of task kunit_try_catch/303 [ 23.383988] and is located at offset 138 in frame: [ 23.384442] kasan_stack_oob+0x0/0x270 [ 23.384815] [ 23.384970] This frame has 4 objects: [ 23.385321] [48, 49) '__assertion' [ 23.385344] [64, 72) 'array' [ 23.385679] [96, 112) '__assertion' [ 23.385971] [128, 138) 'stack_array' [ 23.386315] [ 23.386805] The buggy address belongs to the virtual mapping at [ 23.386805] [ffff8000896d0000, ffff8000896d9000) created by: [ 23.386805] kernel_clone+0x150/0x7a8 [ 23.388198] [ 23.388355] The buggy address belongs to the physical page: [ 23.388873] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1387 [ 23.389600] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.390224] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.390941] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.391650] page dumped because: kasan: bad access detected [ 23.392167] [ 23.392321] Memory state around the buggy address: [ 23.392770] ffff8000896d7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.393438] ffff8000896d7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 23.394105] >ffff8000896d7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 23.394769] ^ [ 23.395196] ffff8000896d7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 23.395864] ffff8000896d7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 23.396528] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 23.348348] ================================================================== [ 23.349505] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 23.350219] Read of size 1 at addr ffff800087b3e48d by task kunit_try_catch/299 [ 23.350923] [ 23.351098] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.351164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.351183] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.351206] Call trace: [ 23.351222] show_stack+0x20/0x38 (C) [ 23.351267] dump_stack_lvl+0x8c/0xd0 [ 23.351307] print_report+0x310/0x608 [ 23.351345] kasan_report+0xdc/0x128 [ 23.351381] __asan_report_load1_noabort+0x20/0x30 [ 23.351424] kasan_global_oob_right+0x230/0x270 [ 23.351468] kunit_try_run_case+0x170/0x3f0 [ 23.351513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.351563] kthread+0x328/0x630 [ 23.351606] ret_from_fork+0x10/0x20 [ 23.351648] [ 23.357302] The buggy address belongs to the variable: [ 23.357786] global_array+0xd/0x40 [ 23.358132] [ 23.358305] The buggy address belongs to the virtual mapping at [ 23.358305] [ffff800085d10000, ffff800087bf1000) created by: [ 23.358305] paging_init+0x670/0x7d0 [ 23.359708] [ 23.359871] The buggy address belongs to the physical page: [ 23.360397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa33e [ 23.361134] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 23.361844] raw: 03fffe0000002000 fffffdffc028cf88 fffffdffc028cf88 0000000000000000 [ 23.362572] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.363292] page dumped because: kasan: bad access detected [ 23.363817] [ 23.363978] Memory state around the buggy address: [ 23.364436] ffff800087b3e380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.365114] ffff800087b3e400: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 23.365791] >ffff800087b3e480: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 23.366465] ^ [ 23.366808] ffff800087b3e500: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 23.367486] ffff800087b3e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.368158] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 23.292942] ================================================================== [ 23.294088] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.294860] Free of addr ffff00001019f501 by task kunit_try_catch/295 [ 23.295460] [ 23.295627] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.295678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.295694] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.295713] Call trace: [ 23.295726] show_stack+0x20/0x38 (C) [ 23.295758] dump_stack_lvl+0x8c/0xd0 [ 23.295791] print_report+0x118/0x608 [ 23.295821] kasan_report_invalid_free+0xc0/0xe8 [ 23.295853] check_slab_allocation+0xfc/0x108 [ 23.295884] __kasan_mempool_poison_object+0x78/0x150 [ 23.295917] mempool_free+0x28c/0x328 [ 23.295954] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.295994] mempool_kmalloc_invalid_free+0xc0/0x118 [ 23.296030] kunit_try_run_case+0x170/0x3f0 [ 23.296066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.296107] kthread+0x328/0x630 [ 23.296142] ret_from_fork+0x10/0x20 [ 23.296176] [ 23.303155] Allocated by task 295: [ 23.303483] kasan_save_stack+0x3c/0x68 [ 23.303859] kasan_save_track+0x20/0x40 [ 23.304231] kasan_save_alloc_info+0x40/0x58 [ 23.304646] __kasan_mempool_unpoison_object+0x11c/0x180 [ 23.305152] remove_element+0x130/0x1f8 [ 23.305530] mempool_alloc_preallocated+0x58/0xc0 [ 23.305985] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 23.306520] mempool_kmalloc_invalid_free+0xc0/0x118 [ 23.306999] kunit_try_run_case+0x170/0x3f0 [ 23.307406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.307932] kthread+0x328/0x630 [ 23.308256] ret_from_fork+0x10/0x20 [ 23.308607] [ 23.308762] The buggy address belongs to the object at ffff00001019f500 [ 23.308762] which belongs to the cache kmalloc-128 of size 128 [ 23.309898] The buggy address is located 1 bytes inside of [ 23.309898] 128-byte region [ffff00001019f500, ffff00001019f580) [ 23.310950] [ 23.311105] The buggy address belongs to the physical page: [ 23.311624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f [ 23.312356] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.312969] page_type: f5(slab) [ 23.313285] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 23.314002] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.314712] page dumped because: kasan: bad access detected [ 23.315225] [ 23.315380] Memory state around the buggy address: [ 23.315829] ffff00001019f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.316497] ffff00001019f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.317164] >ffff00001019f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.317827] ^ [ 23.318140] ffff00001019f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.318808] ffff00001019f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.319470] ================================================================== [ 23.323176] ================================================================== [ 23.324345] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.325107] Free of addr ffff00000dc7c001 by task kunit_try_catch/297 [ 23.325706] [ 23.325875] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.325929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.325945] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.325963] Call trace: [ 23.325976] show_stack+0x20/0x38 (C) [ 23.326011] dump_stack_lvl+0x8c/0xd0 [ 23.326044] print_report+0x118/0x608 [ 23.326075] kasan_report_invalid_free+0xc0/0xe8 [ 23.326108] __kasan_mempool_poison_object+0xfc/0x150 [ 23.326142] mempool_free+0x28c/0x328 [ 23.326179] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.326219] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 23.326258] kunit_try_run_case+0x170/0x3f0 [ 23.326295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.326336] kthread+0x328/0x630 [ 23.326371] ret_from_fork+0x10/0x20 [ 23.326405] [ 23.333043] The buggy address belongs to the physical page: [ 23.333561] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc7c [ 23.334288] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.334996] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 23.335649] page_type: f8(unknown) [ 23.335985] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.336702] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.337419] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.338144] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.338869] head: 03fffe0000000002 fffffdffc0371f01 00000000ffffffff 00000000ffffffff [ 23.339593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.340310] page dumped because: kasan: bad access detected [ 23.340825] [ 23.340980] Memory state around the buggy address: [ 23.341429] ffff00000dc7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.342096] ffff00000dc7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.342764] >ffff00000dc7c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.343427] ^ [ 23.343739] ffff00000dc7c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.344406] ffff00000dc7c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.345069] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 23.246704] ================================================================== [ 23.247836] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 23.248521] Free of addr ffff00000df00000 by task kunit_try_catch/291 [ 23.249118] [ 23.249283] CPU: 2 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.249334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.249347] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.249366] Call trace: [ 23.249378] show_stack+0x20/0x38 (C) [ 23.249411] dump_stack_lvl+0x8c/0xd0 [ 23.249442] print_report+0x118/0x608 [ 23.249472] kasan_report_invalid_free+0xc0/0xe8 [ 23.249502] __kasan_mempool_poison_object+0x14c/0x150 [ 23.249537] mempool_free+0x28c/0x328 [ 23.249571] mempool_double_free_helper+0x150/0x2e8 [ 23.249607] mempool_kmalloc_large_double_free+0xc0/0x118 [ 23.249645] kunit_try_run_case+0x170/0x3f0 [ 23.249682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.249722] kthread+0x328/0x630 [ 23.249757] ret_from_fork+0x10/0x20 [ 23.249791] [ 23.256360] The buggy address belongs to the physical page: [ 23.256878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf00 [ 23.257603] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.258310] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 23.258962] page_type: f8(unknown) [ 23.259298] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.260014] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.260729] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.261452] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.262175] head: 03fffe0000000002 fffffdffc037c001 00000000ffffffff 00000000ffffffff [ 23.262898] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.263613] page dumped because: kasan: bad access detected [ 23.264128] [ 23.264280] Memory state around the buggy address: [ 23.264729] ffff00000defff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.265395] ffff00000defff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.266062] >ffff00000df00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.266723] ^ [ 23.267034] ffff00000df00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.267700] ffff00000df00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.268362] ================================================================== [ 23.212805] ================================================================== [ 23.213872] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 23.214550] Free of addr ffff0000101ea200 by task kunit_try_catch/289 [ 23.215143] [ 23.215303] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.215346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.215359] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.215373] Call trace: [ 23.215384] show_stack+0x20/0x38 (C) [ 23.215412] dump_stack_lvl+0x8c/0xd0 [ 23.215438] print_report+0x118/0x608 [ 23.215463] kasan_report_invalid_free+0xc0/0xe8 [ 23.215489] check_slab_allocation+0xd4/0x108 [ 23.215514] __kasan_mempool_poison_object+0x78/0x150 [ 23.215542] mempool_free+0x28c/0x328 [ 23.215571] mempool_double_free_helper+0x150/0x2e8 [ 23.215603] mempool_kmalloc_double_free+0xc0/0x118 [ 23.215633] kunit_try_run_case+0x170/0x3f0 [ 23.215664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.215697] kthread+0x328/0x630 [ 23.215727] ret_from_fork+0x10/0x20 [ 23.215754] [ 23.222625] Allocated by task 289: [ 23.222946] kasan_save_stack+0x3c/0x68 [ 23.223312] kasan_save_track+0x20/0x40 [ 23.223678] kasan_save_alloc_info+0x40/0x58 [ 23.224084] __kasan_mempool_unpoison_object+0x11c/0x180 [ 23.224581] remove_element+0x130/0x1f8 [ 23.224951] mempool_alloc_preallocated+0x58/0xc0 [ 23.225397] mempool_double_free_helper+0x94/0x2e8 [ 23.225852] mempool_kmalloc_double_free+0xc0/0x118 [ 23.226313] kunit_try_run_case+0x170/0x3f0 [ 23.226713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.227229] kthread+0x328/0x630 [ 23.227544] ret_from_fork+0x10/0x20 [ 23.227887] [ 23.228036] Freed by task 289: [ 23.228325] kasan_save_stack+0x3c/0x68 [ 23.228691] kasan_save_track+0x20/0x40 [ 23.229055] kasan_save_free_info+0x4c/0x78 [ 23.229453] __kasan_mempool_poison_object+0xc0/0x150 [ 23.229928] mempool_free+0x28c/0x328 [ 23.230282] mempool_double_free_helper+0x100/0x2e8 [ 23.230744] mempool_kmalloc_double_free+0xc0/0x118 [ 23.231205] kunit_try_run_case+0x170/0x3f0 [ 23.231605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.232120] kthread+0x328/0x630 [ 23.232436] ret_from_fork+0x10/0x20 [ 23.232779] [ 23.232929] The buggy address belongs to the object at ffff0000101ea200 [ 23.232929] which belongs to the cache kmalloc-128 of size 128 [ 23.234053] The buggy address is located 0 bytes inside of [ 23.234053] 128-byte region [ffff0000101ea200, ffff0000101ea280) [ 23.235097] [ 23.235247] The buggy address belongs to the physical page: [ 23.235758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea [ 23.236484] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.237089] page_type: f5(slab) [ 23.237397] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 23.238106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.238807] page dumped because: kasan: bad access detected [ 23.239317] [ 23.239466] Memory state around the buggy address: [ 23.239909] ffff0000101ea100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.240568] ffff0000101ea180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.241228] >ffff0000101ea200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.241884] ^ [ 23.242189] ffff0000101ea280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.242849] ffff0000101ea300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.243505] ================================================================== [ 23.271597] ================================================================== [ 23.272750] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 23.273418] Free of addr ffff00000d73c000 by task kunit_try_catch/293 [ 23.274006] [ 23.274171] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.274223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.274237] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.274254] Call trace: [ 23.274266] show_stack+0x20/0x38 (C) [ 23.274301] dump_stack_lvl+0x8c/0xd0 [ 23.274331] print_report+0x118/0x608 [ 23.274362] kasan_report_invalid_free+0xc0/0xe8 [ 23.274393] __kasan_mempool_poison_pages+0xe0/0xe8 [ 23.274425] mempool_free+0x24c/0x328 [ 23.274460] mempool_double_free_helper+0x150/0x2e8 [ 23.274498] mempool_page_alloc_double_free+0xbc/0x118 [ 23.274531] kunit_try_run_case+0x170/0x3f0 [ 23.274567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.274607] kthread+0x328/0x630 [ 23.274641] ret_from_fork+0x10/0x20 [ 23.274673] [ 23.281196] The buggy address belongs to the physical page: [ 23.281713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd73c [ 23.282439] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.283063] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.283781] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.284488] page dumped because: kasan: bad access detected [ 23.285002] [ 23.285154] Memory state around the buggy address: [ 23.285603] ffff00000d73bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.286269] ffff00000d73bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.286936] >ffff00000d73c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.287600] ^ [ 23.287911] ffff00000d73c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.288578] ffff00000d73c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.289241] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 23.192697] ================================================================== [ 23.193739] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 23.194391] Read of size 1 at addr ffff00000df00000 by task kunit_try_catch/287 [ 23.195069] [ 23.195234] CPU: 2 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.195285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.195299] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.195317] Call trace: [ 23.195328] show_stack+0x20/0x38 (C) [ 23.195361] dump_stack_lvl+0x8c/0xd0 [ 23.195393] print_report+0x118/0x608 [ 23.195422] kasan_report+0xdc/0x128 [ 23.195450] __asan_report_load1_noabort+0x20/0x30 [ 23.195484] mempool_uaf_helper+0x314/0x340 [ 23.195517] mempool_page_alloc_uaf+0xc0/0x118 [ 23.195554] kunit_try_run_case+0x170/0x3f0 [ 23.195589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.195629] kthread+0x328/0x630 [ 23.195663] ret_from_fork+0x10/0x20 [ 23.195696] [ 23.201674] The buggy address belongs to the physical page: [ 23.202191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf00 [ 23.202916] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.203539] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.204254] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.204962] page dumped because: kasan: bad access detected [ 23.205477] [ 23.205630] Memory state around the buggy address: [ 23.206079] ffff00000defff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.206746] ffff00000defff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.207412] >ffff00000df00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.208074] ^ [ 23.208385] ffff00000df00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.209052] ffff00000df00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.209714] ================================================================== [ 23.121231] ================================================================== [ 23.122283] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 23.122985] Read of size 1 at addr ffff00000dc7c000 by task kunit_try_catch/283 [ 23.123694] [ 23.123879] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.123963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.123988] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.124015] Call trace: [ 23.124034] show_stack+0x20/0x38 (C) [ 23.124086] dump_stack_lvl+0x8c/0xd0 [ 23.124137] print_report+0x118/0x608 [ 23.124186] kasan_report+0xdc/0x128 [ 23.124234] __asan_report_load1_noabort+0x20/0x30 [ 23.124289] mempool_uaf_helper+0x314/0x340 [ 23.124347] mempool_kmalloc_large_uaf+0xc4/0x120 [ 23.124408] kunit_try_run_case+0x170/0x3f0 [ 23.124465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.124531] kthread+0x328/0x630 [ 23.124587] ret_from_fork+0x10/0x20 [ 23.124640] [ 23.130754] The buggy address belongs to the physical page: [ 23.131293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc7c [ 23.132048] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.132781] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 23.133467] page_type: f8(unknown) [ 23.133830] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.134578] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.135326] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.136081] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.136837] head: 03fffe0000000002 fffffdffc0371f01 00000000ffffffff 00000000ffffffff [ 23.137593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.138336] page dumped because: kasan: bad access detected [ 23.138872] [ 23.139042] Memory state around the buggy address: [ 23.139513] ffff00000dc7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.140209] ffff00000dc7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.140903] >ffff00000dc7c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.141590] ^ [ 23.141923] ffff00000dc7c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.142617] ffff00000dc7c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.143305] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 23.148568] ================================================================== [ 23.149688] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 23.150377] Read of size 1 at addr ffff0000101ea240 by task kunit_try_catch/285 [ 23.151056] [ 23.151222] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.151272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.151287] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.151304] Call trace: [ 23.151317] show_stack+0x20/0x38 (C) [ 23.151349] dump_stack_lvl+0x8c/0xd0 [ 23.151381] print_report+0x118/0x608 [ 23.151411] kasan_report+0xdc/0x128 [ 23.151439] __asan_report_load1_noabort+0x20/0x30 [ 23.151473] mempool_uaf_helper+0x314/0x340 [ 23.151507] mempool_slab_uaf+0xc0/0x118 [ 23.151536] kunit_try_run_case+0x170/0x3f0 [ 23.151571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.151610] kthread+0x328/0x630 [ 23.151645] ret_from_fork+0x10/0x20 [ 23.151678] [ 23.157609] Allocated by task 285: [ 23.157935] kasan_save_stack+0x3c/0x68 [ 23.158312] kasan_save_track+0x20/0x40 [ 23.158694] kasan_save_alloc_info+0x40/0x58 [ 23.159119] __kasan_mempool_unpoison_object+0xbc/0x180 [ 23.159628] remove_element+0x16c/0x1f8 [ 23.160017] mempool_alloc_preallocated+0x58/0xc0 [ 23.160483] mempool_uaf_helper+0xa4/0x340 [ 23.160894] mempool_slab_uaf+0xc0/0x118 [ 23.161283] kunit_try_run_case+0x170/0x3f0 [ 23.161701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.162237] kthread+0x328/0x630 [ 23.162572] ret_from_fork+0x10/0x20 [ 23.162933] [ 23.163093] Freed by task 285: [ 23.163394] kasan_save_stack+0x3c/0x68 [ 23.163774] kasan_save_track+0x20/0x40 [ 23.164155] kasan_save_free_info+0x4c/0x78 [ 23.164570] __kasan_mempool_poison_object+0xc0/0x150 [ 23.165061] mempool_free+0x28c/0x328 [ 23.165432] mempool_uaf_helper+0x104/0x340 [ 23.165850] mempool_slab_uaf+0xc0/0x118 [ 23.166237] kunit_try_run_case+0x170/0x3f0 [ 23.166654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.167191] kthread+0x328/0x630 [ 23.167523] ret_from_fork+0x10/0x20 [ 23.167881] [ 23.168040] The buggy address belongs to the object at ffff0000101ea240 [ 23.168040] which belongs to the cache test_cache of size 123 [ 23.169176] The buggy address is located 0 bytes inside of [ 23.169176] freed 123-byte region [ffff0000101ea240, ffff0000101ea2bb) [ 23.170288] [ 23.170448] The buggy address belongs to the physical page: [ 23.170972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea [ 23.171715] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.172337] page_type: f5(slab) [ 23.172660] raw: 03fffe0000000000 ffff000000d1bb80 dead000000000122 0000000000000000 [ 23.173389] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 23.174105] page dumped because: kasan: bad access detected [ 23.174629] [ 23.174787] Memory state around the buggy address: [ 23.175243] ffff0000101ea100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.175920] ffff0000101ea180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.176594] >ffff0000101ea200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 23.177265] ^ [ 23.177768] ffff0000101ea280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.178443] ffff0000101ea300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.179113] ================================================================== [ 23.088699] ================================================================== [ 23.089794] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 23.090481] Read of size 1 at addr ffff00000ea7eb00 by task kunit_try_catch/281 [ 23.091160] [ 23.091324] CPU: 3 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.091373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.091388] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.091405] Call trace: [ 23.091417] show_stack+0x20/0x38 (C) [ 23.091450] dump_stack_lvl+0x8c/0xd0 [ 23.091482] print_report+0x118/0x608 [ 23.091512] kasan_report+0xdc/0x128 [ 23.091539] __asan_report_load1_noabort+0x20/0x30 [ 23.091573] mempool_uaf_helper+0x314/0x340 [ 23.091607] mempool_kmalloc_uaf+0xc4/0x120 [ 23.091641] kunit_try_run_case+0x170/0x3f0 [ 23.091677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.091716] kthread+0x328/0x630 [ 23.091750] ret_from_fork+0x10/0x20 [ 23.091783] [ 23.097734] Allocated by task 281: [ 23.098060] kasan_save_stack+0x3c/0x68 [ 23.098435] kasan_save_track+0x20/0x40 [ 23.098805] kasan_save_alloc_info+0x40/0x58 [ 23.099219] __kasan_mempool_unpoison_object+0x11c/0x180 [ 23.099722] remove_element+0x130/0x1f8 [ 23.100102] mempool_alloc_preallocated+0x58/0xc0 [ 23.100555] mempool_uaf_helper+0xa4/0x340 [ 23.100955] mempool_kmalloc_uaf+0xc4/0x120 [ 23.101363] kunit_try_run_case+0x170/0x3f0 [ 23.101771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.102295] kthread+0x328/0x630 [ 23.102619] ret_from_fork+0x10/0x20 [ 23.102969] [ 23.103121] Freed by task 281: [ 23.103417] kasan_save_stack+0x3c/0x68 [ 23.103789] kasan_save_track+0x20/0x40 [ 23.104161] kasan_save_free_info+0x4c/0x78 [ 23.104565] __kasan_mempool_poison_object+0xc0/0x150 [ 23.105048] mempool_free+0x28c/0x328 [ 23.105408] mempool_uaf_helper+0x104/0x340 [ 23.105816] mempool_kmalloc_uaf+0xc4/0x120 [ 23.106224] kunit_try_run_case+0x170/0x3f0 [ 23.106630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.107154] kthread+0x328/0x630 [ 23.107477] ret_from_fork+0x10/0x20 [ 23.107827] [ 23.107980] The buggy address belongs to the object at ffff00000ea7eb00 [ 23.107980] which belongs to the cache kmalloc-128 of size 128 [ 23.109115] The buggy address is located 0 bytes inside of [ 23.109115] freed 128-byte region [ffff00000ea7eb00, ffff00000ea7eb80) [ 23.110214] [ 23.110368] The buggy address belongs to the physical page: [ 23.110885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e [ 23.111611] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.112223] page_type: f5(slab) [ 23.112538] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 23.113254] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.113962] page dumped because: kasan: bad access detected [ 23.114477] [ 23.114629] Memory state around the buggy address: [ 23.115078] ffff00000ea7ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.115745] ffff00000ea7ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.116411] >ffff00000ea7eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.117073] ^ [ 23.117383] ffff00000ea7eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.118050] ffff00000ea7ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.118711] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 23.027135] ================================================================== [ 23.028245] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 23.028967] Read of size 1 at addr ffff00000d73e001 by task kunit_try_catch/277 [ 23.029644] [ 23.029810] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.029859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.029873] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.029891] Call trace: [ 23.029903] show_stack+0x20/0x38 (C) [ 23.029937] dump_stack_lvl+0x8c/0xd0 [ 23.029968] print_report+0x118/0x608 [ 23.029999] kasan_report+0xdc/0x128 [ 23.030027] __asan_report_load1_noabort+0x20/0x30 [ 23.030062] mempool_oob_right_helper+0x2ac/0x2f0 [ 23.030098] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 23.030136] kunit_try_run_case+0x170/0x3f0 [ 23.030171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.030211] kthread+0x328/0x630 [ 23.030245] ret_from_fork+0x10/0x20 [ 23.030279] [ 23.036369] The buggy address belongs to the physical page: [ 23.036885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd73c [ 23.037610] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.038317] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 23.038969] page_type: f8(unknown) [ 23.039304] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.040020] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.040735] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.041459] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.042183] head: 03fffe0000000002 fffffdffc035cf01 00000000ffffffff 00000000ffffffff [ 23.042905] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.043621] page dumped because: kasan: bad access detected [ 23.044136] [ 23.044288] Memory state around the buggy address: [ 23.044737] ffff00000d73df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.045403] ffff00000d73df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.046069] >ffff00000d73e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.046730] ^ [ 23.047041] ffff00000d73e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.047707] ffff00000d73e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.048369] ================================================================== [ 23.053074] ================================================================== [ 23.054235] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 23.054959] Read of size 1 at addr ffff0000101e72bb by task kunit_try_catch/279 [ 23.055638] [ 23.055804] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.055854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.055869] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.055886] Call trace: [ 23.055898] show_stack+0x20/0x38 (C) [ 23.055930] dump_stack_lvl+0x8c/0xd0 [ 23.055962] print_report+0x118/0x608 [ 23.055991] kasan_report+0xdc/0x128 [ 23.056020] __asan_report_load1_noabort+0x20/0x30 [ 23.056053] mempool_oob_right_helper+0x2ac/0x2f0 [ 23.056088] mempool_slab_oob_right+0xc0/0x118 [ 23.056118] kunit_try_run_case+0x170/0x3f0 [ 23.056153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.056193] kthread+0x328/0x630 [ 23.056226] ret_from_fork+0x10/0x20 [ 23.056260] [ 23.062284] Allocated by task 279: [ 23.062612] kasan_save_stack+0x3c/0x68 [ 23.062988] kasan_save_track+0x20/0x40 [ 23.063359] kasan_save_alloc_info+0x40/0x58 [ 23.063771] __kasan_mempool_unpoison_object+0xbc/0x180 [ 23.064269] remove_element+0x16c/0x1f8 [ 23.064648] mempool_alloc_preallocated+0x58/0xc0 [ 23.065101] mempool_oob_right_helper+0x98/0x2f0 [ 23.065549] mempool_slab_oob_right+0xc0/0x118 [ 23.065976] kunit_try_run_case+0x170/0x3f0 [ 23.066384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.066909] kthread+0x328/0x630 [ 23.067232] ret_from_fork+0x10/0x20 [ 23.067582] [ 23.067736] The buggy address belongs to the object at ffff0000101e7240 [ 23.067736] which belongs to the cache test_cache of size 123 [ 23.068863] The buggy address is located 0 bytes to the right of [ 23.068863] allocated 123-byte region [ffff0000101e7240, ffff0000101e72bb) [ 23.070038] [ 23.070192] The buggy address belongs to the physical page: [ 23.070709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7 [ 23.071441] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.072054] page_type: f5(slab) [ 23.072367] raw: 03fffe0000000000 ffff000000d1ba40 dead000000000122 0000000000000000 [ 23.073083] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 23.073791] page dumped because: kasan: bad access detected [ 23.074307] [ 23.074460] Memory state around the buggy address: [ 23.074908] ffff0000101e7180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.075575] ffff0000101e7200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 23.076241] >ffff0000101e7280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 23.076903] ^ [ 23.077376] ffff0000101e7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.078043] ffff0000101e7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.078705] ================================================================== [ 22.997841] ================================================================== [ 22.998889] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 22.999615] Read of size 1 at addr ffff00001019f173 by task kunit_try_catch/275 [ 23.000295] [ 23.000461] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.000512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.000526] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.000545] Call trace: [ 23.000556] show_stack+0x20/0x38 (C) [ 23.000589] dump_stack_lvl+0x8c/0xd0 [ 23.000621] print_report+0x118/0x608 [ 23.000650] kasan_report+0xdc/0x128 [ 23.000679] __asan_report_load1_noabort+0x20/0x30 [ 23.000713] mempool_oob_right_helper+0x2ac/0x2f0 [ 23.000750] mempool_kmalloc_oob_right+0xc4/0x120 [ 23.000786] kunit_try_run_case+0x170/0x3f0 [ 23.000822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.000862] kthread+0x328/0x630 [ 23.000896] ret_from_fork+0x10/0x20 [ 23.000929] [ 23.006973] Allocated by task 275: [ 23.007300] kasan_save_stack+0x3c/0x68 [ 23.007675] kasan_save_track+0x20/0x40 [ 23.008046] kasan_save_alloc_info+0x40/0x58 [ 23.008459] __kasan_mempool_unpoison_object+0x11c/0x180 [ 23.008964] remove_element+0x130/0x1f8 [ 23.009343] mempool_alloc_preallocated+0x58/0xc0 [ 23.009797] mempool_oob_right_helper+0x98/0x2f0 [ 23.010245] mempool_kmalloc_oob_right+0xc4/0x120 [ 23.010699] kunit_try_run_case+0x170/0x3f0 [ 23.011106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.011630] kthread+0x328/0x630 [ 23.011954] ret_from_fork+0x10/0x20 [ 23.012304] [ 23.012458] The buggy address belongs to the object at ffff00001019f100 [ 23.012458] which belongs to the cache kmalloc-128 of size 128 [ 23.013591] The buggy address is located 0 bytes to the right of [ 23.013591] allocated 115-byte region [ffff00001019f100, ffff00001019f173) [ 23.014766] [ 23.014921] The buggy address belongs to the physical page: [ 23.015438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f [ 23.016171] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.016783] page_type: f5(slab) [ 23.017096] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 23.017813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.018521] page dumped because: kasan: bad access detected [ 23.019036] [ 23.019188] Memory state around the buggy address: [ 23.019637] ffff00001019f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.020304] ffff00001019f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.020971] >ffff00001019f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.021633] ^ [ 23.022266] ffff00001019f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.022931] ffff00001019f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.023592] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 22.407891] ================================================================== [ 22.408958] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 22.409696] Read of size 1 at addr ffff00000b416140 by task kunit_try_catch/269 [ 22.410377] [ 22.410542] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.410592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.410606] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.410624] Call trace: [ 22.410636] show_stack+0x20/0x38 (C) [ 22.410669] dump_stack_lvl+0x8c/0xd0 [ 22.410701] print_report+0x118/0x608 [ 22.410732] kasan_report+0xdc/0x128 [ 22.410760] __kasan_check_byte+0x54/0x70 [ 22.410789] kmem_cache_destroy+0x34/0x218 [ 22.410819] kmem_cache_double_destroy+0x174/0x300 [ 22.410856] kunit_try_run_case+0x170/0x3f0 [ 22.410891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.410930] kthread+0x328/0x630 [ 22.410965] ret_from_fork+0x10/0x20 [ 22.410998] [ 22.416928] Allocated by task 269: [ 22.417253] kasan_save_stack+0x3c/0x68 [ 22.417628] kasan_save_track+0x20/0x40 [ 22.418000] kasan_save_alloc_info+0x40/0x58 [ 22.418412] __kasan_slab_alloc+0xa8/0xb0 [ 22.418800] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 22.419243] __kmem_cache_create_args+0x178/0x280 [ 22.419699] kmem_cache_double_destroy+0xc0/0x300 [ 22.420154] kunit_try_run_case+0x170/0x3f0 [ 22.420561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.421085] kthread+0x328/0x630 [ 22.421408] ret_from_fork+0x10/0x20 [ 22.421758] [ 22.421912] Freed by task 269: [ 22.422205] kasan_save_stack+0x3c/0x68 [ 22.422577] kasan_save_track+0x20/0x40 [ 22.422949] kasan_save_free_info+0x4c/0x78 [ 22.423354] __kasan_slab_free+0x6c/0x98 [ 22.423735] kmem_cache_free+0x260/0x470 [ 22.424115] slab_kmem_cache_release+0x38/0x50 [ 22.424539] kmem_cache_release+0x1c/0x30 [ 22.424934] kobject_put+0x17c/0x430 [ 22.425286] sysfs_slab_release+0x1c/0x30 [ 22.425674] kmem_cache_destroy+0x118/0x218 [ 22.426075] kmem_cache_double_destroy+0x128/0x300 [ 22.426539] kunit_try_run_case+0x170/0x3f0 [ 22.426945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.427468] kthread+0x328/0x630 [ 22.427790] ret_from_fork+0x10/0x20 [ 22.428140] [ 22.428293] The buggy address belongs to the object at ffff00000b416140 [ 22.428293] which belongs to the cache kmem_cache of size 208 [ 22.429419] The buggy address is located 0 bytes inside of [ 22.429419] freed 208-byte region [ffff00000b416140, ffff00000b416210) [ 22.430515] [ 22.430669] The buggy address belongs to the physical page: [ 22.431185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb416 [ 22.431910] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.432615] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 22.433268] page_type: f5(slab) [ 22.433580] raw: 03fffe0000000040 ffff000000402000 dead000000000122 0000000000000000 [ 22.434296] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 22.435012] head: 03fffe0000000040 ffff000000402000 dead000000000122 0000000000000000 [ 22.435735] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 22.436458] head: 03fffe0000000001 fffffdffc02d0581 00000000ffffffff 00000000ffffffff [ 22.437182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.437897] page dumped because: kasan: bad access detected [ 22.438412] [ 22.438564] Memory state around the buggy address: [ 22.439011] ffff00000b416000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.439678] ffff00000b416080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 22.440344] >ffff00000b416100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 22.441005] ^ [ 22.441499] ffff00000b416180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.442165] ffff00000b416200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.442828] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 22.330527] ================================================================== [ 22.331649] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 22.332348] Read of size 1 at addr ffff00000e9c4000 by task kunit_try_catch/267 [ 22.333037] [ 22.333209] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.333268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.333287] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.333307] Call trace: [ 22.333321] show_stack+0x20/0x38 (C) [ 22.333362] dump_stack_lvl+0x8c/0xd0 [ 22.333400] print_report+0x118/0x608 [ 22.333437] kasan_report+0xdc/0x128 [ 22.333473] __asan_report_load1_noabort+0x20/0x30 [ 22.333514] kmem_cache_rcu_uaf+0x388/0x468 [ 22.333557] kunit_try_run_case+0x170/0x3f0 [ 22.333601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.333649] kthread+0x328/0x630 [ 22.333691] ret_from_fork+0x10/0x20 [ 22.333732] [ 22.339354] Allocated by task 267: [ 22.339690] kasan_save_stack+0x3c/0x68 [ 22.340073] kasan_save_track+0x20/0x40 [ 22.340455] kasan_save_alloc_info+0x40/0x58 [ 22.340879] __kasan_slab_alloc+0xa8/0xb0 [ 22.341276] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 22.341729] kmem_cache_rcu_uaf+0x12c/0x468 [ 22.342148] kunit_try_run_case+0x170/0x3f0 [ 22.342569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.343105] kthread+0x328/0x630 [ 22.343438] ret_from_fork+0x10/0x20 [ 22.343799] [ 22.343958] Freed by task 0: [ 22.344245] kasan_save_stack+0x3c/0x68 [ 22.344627] kasan_save_track+0x20/0x40 [ 22.345009] kasan_save_free_info+0x4c/0x78 [ 22.345422] __kasan_slab_free+0x6c/0x98 [ 22.345811] slab_free_after_rcu_debug+0xd4/0x2f8 [ 22.346269] rcu_core+0x9f4/0x1e20 [ 22.346614] rcu_core_si+0x18/0x30 [ 22.346957] handle_softirqs+0x374/0xb28 [ 22.347348] __do_softirq+0x1c/0x28 [ 22.347697] [ 22.347856] Last potentially related work creation: [ 22.348315] kasan_save_stack+0x3c/0x68 [ 22.348698] kasan_record_aux_stack+0xb4/0xc8 [ 22.349129] kmem_cache_free+0x120/0x470 [ 22.349517] kmem_cache_rcu_uaf+0x16c/0x468 [ 22.349937] kunit_try_run_case+0x170/0x3f0 [ 22.350354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.350891] kthread+0x328/0x630 [ 22.351225] ret_from_fork+0x10/0x20 [ 22.351585] [ 22.351744] The buggy address belongs to the object at ffff00000e9c4000 [ 22.351744] which belongs to the cache test_cache of size 200 [ 22.352882] The buggy address is located 0 bytes inside of [ 22.352882] freed 200-byte region [ffff00000e9c4000, ffff00000e9c40c8) [ 22.353992] [ 22.354154] The buggy address belongs to the physical page: [ 22.354678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe9c4 [ 22.355413] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.356130] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 22.356794] page_type: f5(slab) [ 22.357116] raw: 03fffe0000000040 ffff00000e9c2000 dead000000000122 0000000000000000 [ 22.357843] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 22.358571] head: 03fffe0000000040 ffff00000e9c2000 dead000000000122 0000000000000000 [ 22.359304] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 22.360038] head: 03fffe0000000001 fffffdffc03a7101 00000000ffffffff 00000000ffffffff [ 22.360773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.361496] page dumped because: kasan: bad access detected [ 22.362017] [ 22.362176] Memory state around the buggy address: [ 22.362632] ffff00000e9c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.363308] ffff00000e9c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.363983] >ffff00000e9c4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.364654] ^ [ 22.364973] ffff00000e9c4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 22.365649] ffff00000e9c4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.366320] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 22.196119] ================================================================== [ 22.197216] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 22.197884] Free of addr ffff000010130001 by task kunit_try_catch/265 [ 22.198483] [ 22.198648] CPU: 3 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.198698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.198713] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.198730] Call trace: [ 22.198743] show_stack+0x20/0x38 (C) [ 22.198775] dump_stack_lvl+0x8c/0xd0 [ 22.198807] print_report+0x118/0x608 [ 22.198837] kasan_report_invalid_free+0xc0/0xe8 [ 22.198869] check_slab_allocation+0xfc/0x108 [ 22.198898] __kasan_slab_pre_free+0x2c/0x48 [ 22.198928] kmem_cache_free+0xf0/0x470 [ 22.198957] kmem_cache_invalid_free+0x184/0x3c8 [ 22.198994] kunit_try_run_case+0x170/0x3f0 [ 22.199030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.199069] kthread+0x328/0x630 [ 22.199104] ret_from_fork+0x10/0x20 [ 22.199136] [ 22.205530] Allocated by task 265: [ 22.205857] kasan_save_stack+0x3c/0x68 [ 22.206230] kasan_save_track+0x20/0x40 [ 22.206602] kasan_save_alloc_info+0x40/0x58 [ 22.207014] __kasan_slab_alloc+0xa8/0xb0 [ 22.207401] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 22.207844] kmem_cache_invalid_free+0x12c/0x3c8 [ 22.208292] kunit_try_run_case+0x170/0x3f0 [ 22.208698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.209222] kthread+0x328/0x630 [ 22.209545] ret_from_fork+0x10/0x20 [ 22.209894] [ 22.210048] The buggy address belongs to the object at ffff000010130000 [ 22.210048] which belongs to the cache test_cache of size 200 [ 22.211175] The buggy address is located 1 bytes inside of [ 22.211175] 200-byte region [ffff000010130000, ffff0000101300c8) [ 22.212226] [ 22.212380] The buggy address belongs to the physical page: [ 22.212897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10130 [ 22.213629] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.214335] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 22.214988] page_type: f5(slab) [ 22.215302] raw: 03fffe0000000040 ffff0000100bc140 dead000000000122 0000000000000000 [ 22.216018] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 22.216734] head: 03fffe0000000040 ffff0000100bc140 dead000000000122 0000000000000000 [ 22.217458] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 22.218181] head: 03fffe0000000001 fffffdffc0404c01 00000000ffffffff 00000000ffffffff [ 22.218904] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.219619] page dumped because: kasan: bad access detected [ 22.220134] [ 22.220286] Memory state around the buggy address: [ 22.220734] ffff00001012ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.221401] ffff00001012ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.222068] >ffff000010130000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.222730] ^ [ 22.223041] ffff000010130080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 22.223708] ffff000010130100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.224371] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 22.147992] ================================================================== [ 22.149030] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 22.149684] Free of addr ffff00000a8a8000 by task kunit_try_catch/263 [ 22.150282] [ 22.150446] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.150498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.150512] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.150529] Call trace: [ 22.150542] show_stack+0x20/0x38 (C) [ 22.150574] dump_stack_lvl+0x8c/0xd0 [ 22.150606] print_report+0x118/0x608 [ 22.150635] kasan_report_invalid_free+0xc0/0xe8 [ 22.150667] check_slab_allocation+0xd4/0x108 [ 22.150696] __kasan_slab_pre_free+0x2c/0x48 [ 22.150726] kmem_cache_free+0xf0/0x470 [ 22.150754] kmem_cache_double_free+0x190/0x3c8 [ 22.150791] kunit_try_run_case+0x170/0x3f0 [ 22.150826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.150865] kthread+0x328/0x630 [ 22.150899] ret_from_fork+0x10/0x20 [ 22.150933] [ 22.157320] Allocated by task 263: [ 22.157647] kasan_save_stack+0x3c/0x68 [ 22.158022] kasan_save_track+0x20/0x40 [ 22.158394] kasan_save_alloc_info+0x40/0x58 [ 22.158806] __kasan_slab_alloc+0xa8/0xb0 [ 22.159192] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 22.159635] kmem_cache_double_free+0x12c/0x3c8 [ 22.160073] kunit_try_run_case+0x170/0x3f0 [ 22.160480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.161004] kthread+0x328/0x630 [ 22.161327] ret_from_fork+0x10/0x20 [ 22.161677] [ 22.161831] Freed by task 263: [ 22.162125] kasan_save_stack+0x3c/0x68 [ 22.162498] kasan_save_track+0x20/0x40 [ 22.162867] kasan_save_free_info+0x4c/0x78 [ 22.163271] __kasan_slab_free+0x6c/0x98 [ 22.163650] kmem_cache_free+0x260/0x470 [ 22.164028] kmem_cache_double_free+0x140/0x3c8 [ 22.164467] kunit_try_run_case+0x170/0x3f0 [ 22.164873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.165396] kthread+0x328/0x630 [ 22.165720] ret_from_fork+0x10/0x20 [ 22.166070] [ 22.166223] The buggy address belongs to the object at ffff00000a8a8000 [ 22.166223] which belongs to the cache test_cache of size 200 [ 22.167350] The buggy address is located 0 bytes inside of [ 22.167350] 200-byte region [ffff00000a8a8000, ffff00000a8a80c8) [ 22.168402] [ 22.168557] The buggy address belongs to the physical page: [ 22.169073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa8a8 [ 22.169798] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.170505] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 22.171160] page_type: f5(slab) [ 22.171474] raw: 03fffe0000000040 ffff00000b416000 dead000000000122 0000000000000000 [ 22.172190] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 22.172906] head: 03fffe0000000040 ffff00000b416000 dead000000000122 0000000000000000 [ 22.173629] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 22.174353] head: 03fffe0000000001 fffffdffc02a2a01 00000000ffffffff 00000000ffffffff [ 22.175076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.175793] page dumped because: kasan: bad access detected [ 22.176308] [ 22.176460] Memory state around the buggy address: [ 22.176909] ffff00000a8a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.177575] ffff00000a8a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.178241] >ffff00000a8a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.178903] ^ [ 22.179215] ffff00000a8a8080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 22.179881] ffff00000a8a8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.180543] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 20.899675] ================================================================== [ 20.900726] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 20.901256] Free of addr ffff00000def4001 by task kunit_try_catch/204 [ 20.901853] [ 20.902018] CPU: 2 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.902068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.902083] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.902100] Call trace: [ 20.902111] show_stack+0x20/0x38 (C) [ 20.902145] dump_stack_lvl+0x8c/0xd0 [ 20.902176] print_report+0x118/0x608 [ 20.902207] kasan_report_invalid_free+0xc0/0xe8 [ 20.902238] __kasan_kfree_large+0x5c/0xa8 [ 20.902268] free_large_kmalloc+0x64/0x190 [ 20.902303] kfree+0x270/0x3c8 [ 20.902334] kmalloc_large_invalid_free+0x108/0x270 [ 20.902371] kunit_try_run_case+0x170/0x3f0 [ 20.902406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.902445] kthread+0x328/0x630 [ 20.902480] ret_from_fork+0x10/0x20 [ 20.902513] [ 20.908824] The buggy address belongs to the physical page: [ 20.909340] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 20.910064] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.910769] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.911420] page_type: f8(unknown) [ 20.911756] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.912470] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.913184] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.913908] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.914631] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 20.915353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.916067] page dumped because: kasan: bad access detected [ 20.916581] [ 20.916734] Memory state around the buggy address: [ 20.917183] ffff00000def3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.917848] ffff00000def3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.918513] >ffff00000def4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.919173] ^ [ 20.919484] ffff00000def4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.920148] ffff00000def4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.920809] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 22.087341] ================================================================== [ 22.088376] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 22.089024] Read of size 1 at addr ffff0000100be0c8 by task kunit_try_catch/261 [ 22.089703] [ 22.089871] CPU: 3 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.089922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.089936] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.089954] Call trace: [ 22.089966] show_stack+0x20/0x38 (C) [ 22.090000] dump_stack_lvl+0x8c/0xd0 [ 22.090032] print_report+0x118/0x608 [ 22.090063] kasan_report+0xdc/0x128 [ 22.090091] __asan_report_load1_noabort+0x20/0x30 [ 22.090124] kmem_cache_oob+0x344/0x430 [ 22.090158] kunit_try_run_case+0x170/0x3f0 [ 22.090193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.090233] kthread+0x328/0x630 [ 22.090267] ret_from_fork+0x10/0x20 [ 22.090300] [ 22.095854] Allocated by task 261: [ 22.096179] kasan_save_stack+0x3c/0x68 [ 22.096552] kasan_save_track+0x20/0x40 [ 22.096924] kasan_save_alloc_info+0x40/0x58 [ 22.097337] __kasan_slab_alloc+0xa8/0xb0 [ 22.097724] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 22.098169] kmem_cache_oob+0x12c/0x430 [ 22.098544] kunit_try_run_case+0x170/0x3f0 [ 22.098951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.099476] kthread+0x328/0x630 [ 22.099798] ret_from_fork+0x10/0x20 [ 22.100149] [ 22.100302] The buggy address belongs to the object at ffff0000100be000 [ 22.100302] which belongs to the cache test_cache of size 200 [ 22.101428] The buggy address is located 0 bytes to the right of [ 22.101428] allocated 200-byte region [ffff0000100be000, ffff0000100be0c8) [ 22.102604] [ 22.102758] The buggy address belongs to the physical page: [ 22.103274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100be [ 22.104007] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.104713] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 22.105365] page_type: f5(slab) [ 22.105678] raw: 03fffe0000000040 ffff0000100bc000 dead000000000122 0000000000000000 [ 22.106396] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 22.107111] head: 03fffe0000000040 ffff0000100bc000 dead000000000122 0000000000000000 [ 22.107835] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 22.108559] head: 03fffe0000000001 fffffdffc0402f81 00000000ffffffff 00000000ffffffff [ 22.109282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 22.109997] page dumped because: kasan: bad access detected [ 22.110512] [ 22.110664] Memory state around the buggy address: [ 22.111114] ffff0000100bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.111780] ffff0000100be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.112447] >ffff0000100be080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 22.113109] ^ [ 22.113628] ffff0000100be100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.114295] ffff0000100be180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.114957] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 22.046334] ================================================================== [ 22.047316] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 22.047954] Read of size 8 at addr ffff00000fe3b940 by task kunit_try_catch/254 [ 22.048625] [ 22.048786] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.048829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.048841] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.048856] Call trace: [ 22.048867] show_stack+0x20/0x38 (C) [ 22.048894] dump_stack_lvl+0x8c/0xd0 [ 22.048922] print_report+0x118/0x608 [ 22.048947] kasan_report+0xdc/0x128 [ 22.048971] __asan_report_load8_noabort+0x20/0x30 [ 22.049000] workqueue_uaf+0x480/0x4a8 [ 22.049028] kunit_try_run_case+0x170/0x3f0 [ 22.049058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.049092] kthread+0x328/0x630 [ 22.049120] ret_from_fork+0x10/0x20 [ 22.049148] [ 22.054674] Allocated by task 254: [ 22.055005] kasan_save_stack+0x3c/0x68 [ 22.055383] kasan_save_track+0x20/0x40 [ 22.055755] kasan_save_alloc_info+0x40/0x58 [ 22.056168] __kasan_kmalloc+0xd4/0xd8 [ 22.056531] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.056972] workqueue_uaf+0x13c/0x4a8 [ 22.057341] kunit_try_run_case+0x170/0x3f0 [ 22.057748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.058274] kthread+0x328/0x630 [ 22.058598] ret_from_fork+0x10/0x20 [ 22.058949] [ 22.059102] Freed by task 84: [ 22.059389] kasan_save_stack+0x3c/0x68 [ 22.059761] kasan_save_track+0x20/0x40 [ 22.060132] kasan_save_free_info+0x4c/0x78 [ 22.060536] __kasan_slab_free+0x6c/0x98 [ 22.060914] kfree+0x214/0x3c8 [ 22.061221] workqueue_uaf_work+0x18/0x30 [ 22.061613] process_one_work+0x530/0xf98 [ 22.062000] worker_thread+0x8ac/0xf28 [ 22.062364] kthread+0x328/0x630 [ 22.062686] ret_from_fork+0x10/0x20 [ 22.063036] [ 22.063189] Last potentially related work creation: [ 22.063639] kasan_save_stack+0x3c/0x68 [ 22.064011] kasan_record_aux_stack+0xb4/0xc8 [ 22.064431] __queue_work+0x65c/0x1010 [ 22.064795] queue_work_on+0xbc/0xf8 [ 22.065144] workqueue_uaf+0x210/0x4a8 [ 22.065512] kunit_try_run_case+0x170/0x3f0 [ 22.065920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.066445] kthread+0x328/0x630 [ 22.066769] ret_from_fork+0x10/0x20 [ 22.067119] [ 22.067271] The buggy address belongs to the object at ffff00000fe3b940 [ 22.067271] which belongs to the cache kmalloc-32 of size 32 [ 22.068391] The buggy address is located 0 bytes inside of [ 22.068391] freed 32-byte region [ffff00000fe3b940, ffff00000fe3b960) [ 22.069481] [ 22.069636] The buggy address belongs to the physical page: [ 22.070153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfe3b [ 22.070879] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.071492] page_type: f5(slab) [ 22.071805] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 22.072521] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 22.073228] page dumped because: kasan: bad access detected [ 22.073744] [ 22.073896] Memory state around the buggy address: [ 22.074345] ffff00000fe3b800: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.075013] ffff00000fe3b880: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.075680] >ffff00000fe3b900: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 22.076342] ^ [ 22.076837] ffff00000fe3b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.077503] ffff00000fe3ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.078166] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 22.002172] ================================================================== [ 22.003214] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 22.003891] Read of size 4 at addr ffff00000ff077c0 by task swapper/1/0 [ 22.004537] [ 22.004721] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.004801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.004825] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.004854] Call trace: [ 22.004873] show_stack+0x20/0x38 (C) [ 22.004926] dump_stack_lvl+0x8c/0xd0 [ 22.004978] print_report+0x118/0x608 [ 22.005027] kasan_report+0xdc/0x128 [ 22.005075] __asan_report_load4_noabort+0x20/0x30 [ 22.005133] rcu_uaf_reclaim+0x64/0x70 [ 22.005186] rcu_core+0x9f4/0x1e20 [ 22.005234] rcu_core_si+0x18/0x30 [ 22.005279] handle_softirqs+0x374/0xb28 [ 22.005331] __do_softirq+0x1c/0x28 [ 22.005374] ____do_softirq+0x18/0x30 [ 22.005424] call_on_irq_stack+0x24/0x58 [ 22.005477] do_softirq_own_stack+0x24/0x38 [ 22.005528] __irq_exit_rcu+0x1fc/0x318 [ 22.005578] irq_exit_rcu+0x1c/0x80 [ 22.005624] el1_interrupt+0x38/0x58 [ 22.005677] el1h_64_irq_handler+0x18/0x28 [ 22.005729] el1h_64_irq+0x6c/0x70 [ 22.005774] arch_local_irq_enable+0x4/0x8 (P) [ 22.005839] cpuidle_enter+0x60/0xb8 [ 22.005886] do_idle+0x36c/0x4e8 [ 22.005935] cpu_startup_entry+0x64/0x80 [ 22.005985] secondary_start_kernel+0x288/0x340 [ 22.006047] __secondary_switched+0xc0/0xc8 [ 22.006109] [ 22.016403] Allocated by task 252: [ 22.016751] kasan_save_stack+0x3c/0x68 [ 22.017152] kasan_save_track+0x20/0x40 [ 22.017553] kasan_save_alloc_info+0x40/0x58 [ 22.017994] __kasan_kmalloc+0xd4/0xd8 [ 22.018385] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.018859] rcu_uaf+0xb0/0x2d8 [ 22.019204] kunit_try_run_case+0x170/0x3f0 [ 22.019643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.020201] kthread+0x328/0x630 [ 22.020556] ret_from_fork+0x10/0x20 [ 22.020935] [ 22.021104] Freed by task 0: [ 22.021403] kasan_save_stack+0x3c/0x68 [ 22.021800] kasan_save_track+0x20/0x40 [ 22.022199] kasan_save_free_info+0x4c/0x78 [ 22.022632] __kasan_slab_free+0x6c/0x98 [ 22.023039] kfree+0x214/0x3c8 [ 22.023374] rcu_uaf_reclaim+0x28/0x70 [ 22.023772] rcu_core+0x9f4/0x1e20 [ 22.024131] rcu_core_si+0x18/0x30 [ 22.024491] handle_softirqs+0x374/0xb28 [ 22.024900] __do_softirq+0x1c/0x28 [ 22.025264] [ 22.025432] Last potentially related work creation: [ 22.025903] kasan_save_stack+0x3c/0x68 [ 22.026301] kasan_record_aux_stack+0xb4/0xc8 [ 22.026749] __call_rcu_common.constprop.0+0x70/0x8b0 [ 22.027257] call_rcu+0x18/0x30 [ 22.027590] rcu_uaf+0x14c/0x2d8 [ 22.027941] kunit_try_run_case+0x170/0x3f0 [ 22.028378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.028936] kthread+0x328/0x630 [ 22.029289] ret_from_fork+0x10/0x20 [ 22.029667] [ 22.029835] The buggy address belongs to the object at ffff00000ff077c0 [ 22.029835] which belongs to the cache kmalloc-32 of size 32 [ 22.030987] The buggy address is located 0 bytes inside of [ 22.030987] freed 32-byte region [ffff00000ff077c0, ffff00000ff077e0) [ 22.032112] [ 22.032283] The buggy address belongs to the physical page: [ 22.032821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xff07 [ 22.033576] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.034217] page_type: f5(slab) [ 22.034556] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 22.035305] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 22.036040] page dumped because: kasan: bad access detected [ 22.036576] [ 22.036745] Memory state around the buggy address: [ 22.037217] ffff00000ff07680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.037912] ffff00000ff07700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.038608] >ffff00000ff07780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.039296] ^ [ 22.039816] ffff00000ff07800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.040511] ffff00000ff07880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.041196] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 21.933904] ================================================================== [ 21.934593] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 21.935202] Read of size 1 at addr ffff00000df93778 by task kunit_try_catch/250 [ 21.935880] [ 21.936044] CPU: 2 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.936094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.936108] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.936126] Call trace: [ 21.936138] show_stack+0x20/0x38 (C) [ 21.936170] dump_stack_lvl+0x8c/0xd0 [ 21.936201] print_report+0x118/0x608 [ 21.936231] kasan_report+0xdc/0x128 [ 21.936260] __asan_report_load1_noabort+0x20/0x30 [ 21.936294] ksize_uaf+0x544/0x5f8 [ 21.936326] kunit_try_run_case+0x170/0x3f0 [ 21.936361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.936401] kthread+0x328/0x630 [ 21.936435] ret_from_fork+0x10/0x20 [ 21.936467] [ 21.941981] Allocated by task 250: [ 21.942306] kasan_save_stack+0x3c/0x68 [ 21.942678] kasan_save_track+0x20/0x40 [ 21.943049] kasan_save_alloc_info+0x40/0x58 [ 21.943463] __kasan_kmalloc+0xd4/0xd8 [ 21.943826] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.944266] ksize_uaf+0xb8/0x5f8 [ 21.944598] kunit_try_run_case+0x170/0x3f0 [ 21.945003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.945527] kthread+0x328/0x630 [ 21.945850] ret_from_fork+0x10/0x20 [ 21.946200] [ 21.946353] Freed by task 250: [ 21.946647] kasan_save_stack+0x3c/0x68 [ 21.947018] kasan_save_track+0x20/0x40 [ 21.947390] kasan_save_free_info+0x4c/0x78 [ 21.947795] __kasan_slab_free+0x6c/0x98 [ 21.948174] kfree+0x214/0x3c8 [ 21.948481] ksize_uaf+0x11c/0x5f8 [ 21.948818] kunit_try_run_case+0x170/0x3f0 [ 21.949225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.949748] kthread+0x328/0x630 [ 21.950071] ret_from_fork+0x10/0x20 [ 21.950421] [ 21.950574] The buggy address belongs to the object at ffff00000df93700 [ 21.950574] which belongs to the cache kmalloc-128 of size 128 [ 21.951708] The buggy address is located 120 bytes inside of [ 21.951708] freed 128-byte region [ffff00000df93700, ffff00000df93780) [ 21.952820] [ 21.952974] The buggy address belongs to the physical page: [ 21.953490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93 [ 21.954214] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.954824] page_type: f5(slab) [ 21.955136] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.955852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.956559] page dumped because: kasan: bad access detected [ 21.957075] [ 21.957227] Memory state around the buggy address: [ 21.957675] ffff00000df93600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.958342] ffff00000df93680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.959007] >ffff00000df93700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.959669] ^ [ 21.960325] ffff00000df93780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.960992] ffff00000df93800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.961654] ================================================================== [ 21.876364] ================================================================== [ 21.877462] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 21.878078] Read of size 1 at addr ffff00000df93700 by task kunit_try_catch/250 [ 21.878759] [ 21.878924] CPU: 2 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.878976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.878990] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.879008] Call trace: [ 21.879020] show_stack+0x20/0x38 (C) [ 21.879053] dump_stack_lvl+0x8c/0xd0 [ 21.879086] print_report+0x118/0x608 [ 21.879117] kasan_report+0xdc/0x128 [ 21.879145] __kasan_check_byte+0x54/0x70 [ 21.879174] ksize+0x30/0x88 [ 21.879201] ksize_uaf+0x168/0x5f8 [ 21.879233] kunit_try_run_case+0x170/0x3f0 [ 21.879269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.879308] kthread+0x328/0x630 [ 21.879343] ret_from_fork+0x10/0x20 [ 21.879377] [ 21.885083] Allocated by task 250: [ 21.885408] kasan_save_stack+0x3c/0x68 [ 21.885782] kasan_save_track+0x20/0x40 [ 21.886154] kasan_save_alloc_info+0x40/0x58 [ 21.886569] __kasan_kmalloc+0xd4/0xd8 [ 21.886930] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.887373] ksize_uaf+0xb8/0x5f8 [ 21.887703] kunit_try_run_case+0x170/0x3f0 [ 21.888111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.888636] kthread+0x328/0x630 [ 21.888958] ret_from_fork+0x10/0x20 [ 21.889308] [ 21.889460] Freed by task 250: [ 21.889754] kasan_save_stack+0x3c/0x68 [ 21.890127] kasan_save_track+0x20/0x40 [ 21.890498] kasan_save_free_info+0x4c/0x78 [ 21.890903] __kasan_slab_free+0x6c/0x98 [ 21.891281] kfree+0x214/0x3c8 [ 21.891588] ksize_uaf+0x11c/0x5f8 [ 21.891926] kunit_try_run_case+0x170/0x3f0 [ 21.892332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.892856] kthread+0x328/0x630 [ 21.893178] ret_from_fork+0x10/0x20 [ 21.893528] [ 21.893681] The buggy address belongs to the object at ffff00000df93700 [ 21.893681] which belongs to the cache kmalloc-128 of size 128 [ 21.894815] The buggy address is located 0 bytes inside of [ 21.894815] freed 128-byte region [ffff00000df93700, ffff00000df93780) [ 21.895914] [ 21.896068] The buggy address belongs to the physical page: [ 21.896586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93 [ 21.897310] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.897923] page_type: f5(slab) [ 21.898238] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.898954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.899662] page dumped because: kasan: bad access detected [ 21.900178] [ 21.900331] Memory state around the buggy address: [ 21.900779] ffff00000df93600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.901446] ffff00000df93680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.902113] >ffff00000df93700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.902776] ^ [ 21.903086] ffff00000df93780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.903753] ffff00000df93800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.904414] ================================================================== [ 21.905496] ================================================================== [ 21.906181] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 21.906792] Read of size 1 at addr ffff00000df93700 by task kunit_try_catch/250 [ 21.907468] [ 21.907633] CPU: 2 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.907682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.907696] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.907714] Call trace: [ 21.907726] show_stack+0x20/0x38 (C) [ 21.907758] dump_stack_lvl+0x8c/0xd0 [ 21.907791] print_report+0x118/0x608 [ 21.907819] kasan_report+0xdc/0x128 [ 21.907848] __asan_report_load1_noabort+0x20/0x30 [ 21.907881] ksize_uaf+0x598/0x5f8 [ 21.907914] kunit_try_run_case+0x170/0x3f0 [ 21.907949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.907988] kthread+0x328/0x630 [ 21.908022] ret_from_fork+0x10/0x20 [ 21.908054] [ 21.913568] Allocated by task 250: [ 21.913894] kasan_save_stack+0x3c/0x68 [ 21.914268] kasan_save_track+0x20/0x40 [ 21.914638] kasan_save_alloc_info+0x40/0x58 [ 21.915053] __kasan_kmalloc+0xd4/0xd8 [ 21.915415] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.915856] ksize_uaf+0xb8/0x5f8 [ 21.916187] kunit_try_run_case+0x170/0x3f0 [ 21.916594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.917117] kthread+0x328/0x630 [ 21.917441] ret_from_fork+0x10/0x20 [ 21.917789] [ 21.917942] Freed by task 250: [ 21.918237] kasan_save_stack+0x3c/0x68 [ 21.918609] kasan_save_track+0x20/0x40 [ 21.918980] kasan_save_free_info+0x4c/0x78 [ 21.919385] __kasan_slab_free+0x6c/0x98 [ 21.919765] kfree+0x214/0x3c8 [ 21.920073] ksize_uaf+0x11c/0x5f8 [ 21.920411] kunit_try_run_case+0x170/0x3f0 [ 21.920818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.921342] kthread+0x328/0x630 [ 21.921665] ret_from_fork+0x10/0x20 [ 21.922016] [ 21.922168] The buggy address belongs to the object at ffff00000df93700 [ 21.922168] which belongs to the cache kmalloc-128 of size 128 [ 21.923302] The buggy address is located 0 bytes inside of [ 21.923302] freed 128-byte region [ffff00000df93700, ffff00000df93780) [ 21.924399] [ 21.924553] The buggy address belongs to the physical page: [ 21.925069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93 [ 21.925794] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.926406] page_type: f5(slab) [ 21.926718] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.927435] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.928142] page dumped because: kasan: bad access detected [ 21.928657] [ 21.928809] Memory state around the buggy address: [ 21.929258] ffff00000df93600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.929924] ffff00000df93680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.930591] >ffff00000df93700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.931253] ^ [ 21.931563] ffff00000df93780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.932230] ffff00000df93800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.932892] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 21.848186] ================================================================== [ 21.848885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 21.849600] Read of size 1 at addr ffff00000ea7e87f by task kunit_try_catch/248 [ 21.850268] [ 21.850432] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.850473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.850484] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.850498] Call trace: [ 21.850507] show_stack+0x20/0x38 (C) [ 21.850534] dump_stack_lvl+0x8c/0xd0 [ 21.850557] print_report+0x118/0x608 [ 21.850578] kasan_report+0xdc/0x128 [ 21.850599] __asan_report_load1_noabort+0x20/0x30 [ 21.850623] ksize_unpoisons_memory+0x690/0x740 [ 21.850648] kunit_try_run_case+0x170/0x3f0 [ 21.850674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.850703] kthread+0x328/0x630 [ 21.850729] ret_from_fork+0x10/0x20 [ 21.850753] [ 21.856323] Allocated by task 248: [ 21.856641] kasan_save_stack+0x3c/0x68 [ 21.857003] kasan_save_track+0x20/0x40 [ 21.857363] kasan_save_alloc_info+0x40/0x58 [ 21.857763] __kasan_kmalloc+0xd4/0xd8 [ 21.858116] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.858544] ksize_unpoisons_memory+0xc0/0x740 [ 21.858962] kunit_try_run_case+0x170/0x3f0 [ 21.859356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.859868] kthread+0x328/0x630 [ 21.860177] ret_from_fork+0x10/0x20 [ 21.860517] [ 21.860664] The buggy address belongs to the object at ffff00000ea7e800 [ 21.860664] which belongs to the cache kmalloc-128 of size 128 [ 21.861784] The buggy address is located 12 bytes to the right of [ 21.861784] allocated 115-byte region [ffff00000ea7e800, ffff00000ea7e873) [ 21.862951] [ 21.863100] The buggy address belongs to the physical page: [ 21.863607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e [ 21.864317] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.864917] page_type: f5(slab) [ 21.865219] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.865922] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.866619] page dumped because: kasan: bad access detected [ 21.867125] [ 21.867272] Memory state around the buggy address: [ 21.867711] ffff00000ea7e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.868366] ffff00000ea7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.869020] >ffff00000ea7e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.869672] ^ [ 21.870318] ffff00000ea7e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.870972] ffff00000ea7e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.871624] ================================================================== [ 21.797501] ================================================================== [ 21.798571] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 21.799281] Read of size 1 at addr ffff00000ea7e873 by task kunit_try_catch/248 [ 21.799953] [ 21.800115] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.800158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.800172] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.800187] Call trace: [ 21.800198] show_stack+0x20/0x38 (C) [ 21.800226] dump_stack_lvl+0x8c/0xd0 [ 21.800254] print_report+0x118/0x608 [ 21.800279] kasan_report+0xdc/0x128 [ 21.800303] __asan_report_load1_noabort+0x20/0x30 [ 21.800332] ksize_unpoisons_memory+0x628/0x740 [ 21.800362] kunit_try_run_case+0x170/0x3f0 [ 21.800393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.800427] kthread+0x328/0x630 [ 21.800457] ret_from_fork+0x10/0x20 [ 21.800486] [ 21.806075] Allocated by task 248: [ 21.806399] kasan_save_stack+0x3c/0x68 [ 21.806767] kasan_save_track+0x20/0x40 [ 21.807133] kasan_save_alloc_info+0x40/0x58 [ 21.807538] __kasan_kmalloc+0xd4/0xd8 [ 21.807896] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.808329] ksize_unpoisons_memory+0xc0/0x740 [ 21.808753] kunit_try_run_case+0x170/0x3f0 [ 21.809154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.809671] kthread+0x328/0x630 [ 21.809987] ret_from_fork+0x10/0x20 [ 21.810331] [ 21.810480] The buggy address belongs to the object at ffff00000ea7e800 [ 21.810480] which belongs to the cache kmalloc-128 of size 128 [ 21.811605] The buggy address is located 0 bytes to the right of [ 21.811605] allocated 115-byte region [ffff00000ea7e800, ffff00000ea7e873) [ 21.812770] [ 21.812921] The buggy address belongs to the physical page: [ 21.813433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e [ 21.814150] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.814755] page_type: f5(slab) [ 21.815063] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.815771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.816472] page dumped because: kasan: bad access detected [ 21.816982] [ 21.817131] Memory state around the buggy address: [ 21.817574] ffff00000ea7e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.818232] ffff00000ea7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.818893] >ffff00000ea7e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.819548] ^ [ 21.820176] ffff00000ea7e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.820836] ffff00000ea7e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.821492] ================================================================== [ 21.822635] ================================================================== [ 21.823359] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 21.824090] Read of size 1 at addr ffff00000ea7e878 by task kunit_try_catch/248 [ 21.824779] [ 21.824950] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.825012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.825029] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.825050] Call trace: [ 21.825065] show_stack+0x20/0x38 (C) [ 21.825103] dump_stack_lvl+0x8c/0xd0 [ 21.825141] print_report+0x118/0x608 [ 21.825176] kasan_report+0xdc/0x128 [ 21.825211] __asan_report_load1_noabort+0x20/0x30 [ 21.825253] ksize_unpoisons_memory+0x618/0x740 [ 21.825296] kunit_try_run_case+0x170/0x3f0 [ 21.825340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.825389] kthread+0x328/0x630 [ 21.825430] ret_from_fork+0x10/0x20 [ 21.825471] [ 21.831121] Allocated by task 248: [ 21.831461] kasan_save_stack+0x3c/0x68 [ 21.831847] kasan_save_track+0x20/0x40 [ 21.832228] kasan_save_alloc_info+0x40/0x58 [ 21.832651] __kasan_kmalloc+0xd4/0xd8 [ 21.833023] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.833476] ksize_unpoisons_memory+0xc0/0x740 [ 21.833919] kunit_try_run_case+0x170/0x3f0 [ 21.834339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.834877] kthread+0x328/0x630 [ 21.835211] ret_from_fork+0x10/0x20 [ 21.835572] [ 21.835732] The buggy address belongs to the object at ffff00000ea7e800 [ 21.835732] which belongs to the cache kmalloc-128 of size 128 [ 21.836878] The buggy address is located 5 bytes to the right of [ 21.836878] allocated 115-byte region [ffff00000ea7e800, ffff00000ea7e873) [ 21.838065] [ 21.838225] The buggy address belongs to the physical page: [ 21.838749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e [ 21.839484] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.840107] page_type: f5(slab) [ 21.840429] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.841159] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.841876] page dumped because: kasan: bad access detected [ 21.842398] [ 21.842558] Memory state around the buggy address: [ 21.843015] ffff00000ea7e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.843691] ffff00000ea7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.844368] >ffff00000ea7e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.845039] ^ [ 21.845705] ffff00000ea7e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.846382] ffff00000ea7e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.847054] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 20.879493] ================================================================== [ 20.880569] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 20.881191] Read of size 1 at addr ffff00000def4000 by task kunit_try_catch/202 [ 20.881855] [ 20.882014] CPU: 2 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.882052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.882062] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.882075] Call trace: [ 20.882084] show_stack+0x20/0x38 (C) [ 20.882110] dump_stack_lvl+0x8c/0xd0 [ 20.882132] print_report+0x118/0x608 [ 20.882153] kasan_report+0xdc/0x128 [ 20.882173] __asan_report_load1_noabort+0x20/0x30 [ 20.882197] kmalloc_large_uaf+0x2cc/0x2f8 [ 20.882221] kunit_try_run_case+0x170/0x3f0 [ 20.882246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.882274] kthread+0x328/0x630 [ 20.882299] ret_from_fork+0x10/0x20 [ 20.882323] [ 20.887860] The buggy address belongs to the physical page: [ 20.888366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 20.889077] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.889685] raw: 03fffe0000000000 fffffdffc037be08 ffff0000d171c740 0000000000000000 [ 20.890389] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 20.891086] page dumped because: kasan: bad access detected [ 20.891591] [ 20.891737] Memory state around the buggy address: [ 20.892176] ffff00000def3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.892831] ffff00000def3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.893485] >ffff00000def4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.894136] ^ [ 20.894438] ffff00000def4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.895091] ffff00000def4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.895743] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 21.469673] ================================================================== [ 21.470748] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 21.471427] Write of size 2 at addr ffff00000df93477 by task kunit_try_catch/226 [ 21.472099] [ 21.472257] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.472291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.472302] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.472314] Call trace: [ 21.472323] show_stack+0x20/0x38 (C) [ 21.472347] dump_stack_lvl+0x8c/0xd0 [ 21.472370] print_report+0x118/0x608 [ 21.472391] kasan_report+0xdc/0x128 [ 21.472411] kasan_check_range+0x100/0x1a8 [ 21.472433] __asan_memset+0x34/0x78 [ 21.472454] kmalloc_oob_memset_2+0x150/0x2f8 [ 21.472477] kunit_try_run_case+0x170/0x3f0 [ 21.472503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.472531] kthread+0x328/0x630 [ 21.472555] ret_from_fork+0x10/0x20 [ 21.472579] [ 21.478388] Allocated by task 226: [ 21.478706] kasan_save_stack+0x3c/0x68 [ 21.479069] kasan_save_track+0x20/0x40 [ 21.479428] kasan_save_alloc_info+0x40/0x58 [ 21.479829] __kasan_kmalloc+0xd4/0xd8 [ 21.480181] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.480609] kmalloc_oob_memset_2+0xb0/0x2f8 [ 21.481010] kunit_try_run_case+0x170/0x3f0 [ 21.481405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.481916] kthread+0x328/0x630 [ 21.482228] ret_from_fork+0x10/0x20 [ 21.482565] [ 21.482712] The buggy address belongs to the object at ffff00000df93400 [ 21.482712] which belongs to the cache kmalloc-128 of size 128 [ 21.483830] The buggy address is located 119 bytes inside of [ 21.483830] allocated 120-byte region [ffff00000df93400, ffff00000df93478) [ 21.484957] [ 21.485104] The buggy address belongs to the physical page: [ 21.485612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93 [ 21.486323] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.486920] page_type: f5(slab) [ 21.487222] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.487924] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.488620] page dumped because: kasan: bad access detected [ 21.489125] [ 21.489272] Memory state around the buggy address: [ 21.489710] ffff00000df93300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.490364] ffff00000df93380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.491018] >ffff00000df93400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.491668] ^ [ 21.492311] ffff00000df93480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.492964] ffff00000df93500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.493615] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 21.766533] ================================================================== [ 21.767203] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 21.767763] Free of addr ffff0000015a8c60 by task kunit_try_catch/246 [ 21.768349] [ 21.768506] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.768542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.768553] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.768565] Call trace: [ 21.768574] show_stack+0x20/0x38 (C) [ 21.768598] dump_stack_lvl+0x8c/0xd0 [ 21.768621] print_report+0x118/0x608 [ 21.768643] kasan_report_invalid_free+0xc0/0xe8 [ 21.768666] check_slab_allocation+0xd4/0x108 [ 21.768688] __kasan_slab_pre_free+0x2c/0x48 [ 21.768709] kfree+0xe8/0x3c8 [ 21.768732] kfree_sensitive+0x3c/0xb0 [ 21.768752] kmalloc_double_kzfree+0x168/0x308 [ 21.768780] kunit_try_run_case+0x170/0x3f0 [ 21.768805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.768833] kthread+0x328/0x630 [ 21.768857] ret_from_fork+0x10/0x20 [ 21.768880] [ 21.775471] Allocated by task 246: [ 21.775794] kasan_save_stack+0x3c/0x68 [ 21.776158] kasan_save_track+0x20/0x40 [ 21.776519] kasan_save_alloc_info+0x40/0x58 [ 21.776919] __kasan_kmalloc+0xd4/0xd8 [ 21.777272] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.777700] kmalloc_double_kzfree+0xb8/0x308 [ 21.778111] kunit_try_run_case+0x170/0x3f0 [ 21.778507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.779017] kthread+0x328/0x630 [ 21.779328] ret_from_fork+0x10/0x20 [ 21.779667] [ 21.779814] Freed by task 246: [ 21.780101] kasan_save_stack+0x3c/0x68 [ 21.780460] kasan_save_track+0x20/0x40 [ 21.780820] kasan_save_free_info+0x4c/0x78 [ 21.781213] __kasan_slab_free+0x6c/0x98 [ 21.781581] kfree+0x214/0x3c8 [ 21.781875] kfree_sensitive+0x80/0xb0 [ 21.782227] kmalloc_double_kzfree+0x11c/0x308 [ 21.782646] kunit_try_run_case+0x170/0x3f0 [ 21.783039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.783549] kthread+0x328/0x630 [ 21.783859] ret_from_fork+0x10/0x20 [ 21.784197] [ 21.784343] The buggy address belongs to the object at ffff0000015a8c60 [ 21.784343] which belongs to the cache kmalloc-16 of size 16 [ 21.785448] The buggy address is located 0 bytes inside of [ 21.785448] 16-byte region [ffff0000015a8c60, ffff0000015a8c70) [ 21.786478] [ 21.786624] The buggy address belongs to the physical page: [ 21.787132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x15a8 [ 21.787844] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.788444] page_type: f5(slab) [ 21.788746] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 21.789448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.790144] page dumped because: kasan: bad access detected [ 21.790649] [ 21.790795] Memory state around the buggy address: [ 21.791234] ffff0000015a8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.791889] ffff0000015a8b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.792543] >ffff0000015a8c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.793196] ^ [ 21.793772] ffff0000015a8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.794428] ffff0000015a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.795080] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 21.735942] ================================================================== [ 21.737265] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 21.737972] Read of size 1 at addr ffff0000015a8c60 by task kunit_try_catch/246 [ 21.738656] [ 21.738830] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.738891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.738909] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.738931] Call trace: [ 21.738945] show_stack+0x20/0x38 (C) [ 21.738987] dump_stack_lvl+0x8c/0xd0 [ 21.739024] print_report+0x118/0x608 [ 21.739062] kasan_report+0xdc/0x128 [ 21.739096] __kasan_check_byte+0x54/0x70 [ 21.739133] kfree_sensitive+0x30/0xb0 [ 21.739169] kmalloc_double_kzfree+0x168/0x308 [ 21.739213] kunit_try_run_case+0x170/0x3f0 [ 21.739257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.739305] kthread+0x328/0x630 [ 21.739346] ret_from_fork+0x10/0x20 [ 21.739387] [ 21.745297] Allocated by task 246: [ 21.745630] kasan_save_stack+0x3c/0x68 [ 21.746014] kasan_save_track+0x20/0x40 [ 21.746395] kasan_save_alloc_info+0x40/0x58 [ 21.746817] __kasan_kmalloc+0xd4/0xd8 [ 21.747190] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.747644] kmalloc_double_kzfree+0xb8/0x308 [ 21.748081] kunit_try_run_case+0x170/0x3f0 [ 21.748500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.749034] kthread+0x328/0x630 [ 21.749368] ret_from_fork+0x10/0x20 [ 21.749728] [ 21.749888] Freed by task 246: [ 21.750190] kasan_save_stack+0x3c/0x68 [ 21.750571] kasan_save_track+0x20/0x40 [ 21.750951] kasan_save_free_info+0x4c/0x78 [ 21.751366] __kasan_slab_free+0x6c/0x98 [ 21.751755] kfree+0x214/0x3c8 [ 21.752073] kfree_sensitive+0x80/0xb0 [ 21.752446] kmalloc_double_kzfree+0x11c/0x308 [ 21.752889] kunit_try_run_case+0x170/0x3f0 [ 21.753305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.753841] kthread+0x328/0x630 [ 21.754176] ret_from_fork+0x10/0x20 [ 21.754537] [ 21.754696] The buggy address belongs to the object at ffff0000015a8c60 [ 21.754696] which belongs to the cache kmalloc-16 of size 16 [ 21.755825] The buggy address is located 0 bytes inside of [ 21.755825] freed 16-byte region [ffff0000015a8c60, ffff0000015a8c70) [ 21.756903] [ 21.757051] The buggy address belongs to the physical page: [ 21.757559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x15a8 [ 21.758272] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.758872] page_type: f5(slab) [ 21.759176] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 21.759880] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.760578] page dumped because: kasan: bad access detected [ 21.761084] [ 21.761231] Memory state around the buggy address: [ 21.761670] ffff0000015a8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.762326] ffff0000015a8b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.762980] >ffff0000015a8c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.763632] ^ [ 21.764209] ffff0000015a8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.764864] ffff0000015a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.765515] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 21.701017] ================================================================== [ 21.702078] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 21.702740] Read of size 1 at addr ffff00000ff06928 by task kunit_try_catch/242 [ 21.703433] [ 21.703605] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.703668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.703685] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.703707] Call trace: [ 21.703721] show_stack+0x20/0x38 (C) [ 21.703763] dump_stack_lvl+0x8c/0xd0 [ 21.703801] print_report+0x118/0x608 [ 21.703838] kasan_report+0xdc/0x128 [ 21.703873] __asan_report_load1_noabort+0x20/0x30 [ 21.703915] kmalloc_uaf2+0x3f4/0x468 [ 21.703954] kunit_try_run_case+0x170/0x3f0 [ 21.703997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.704046] kthread+0x328/0x630 [ 21.704087] ret_from_fork+0x10/0x20 [ 21.704127] [ 21.709701] Allocated by task 242: [ 21.710036] kasan_save_stack+0x3c/0x68 [ 21.710419] kasan_save_track+0x20/0x40 [ 21.710800] kasan_save_alloc_info+0x40/0x58 [ 21.711223] __kasan_kmalloc+0xd4/0xd8 [ 21.711597] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.712051] kmalloc_uaf2+0xc4/0x468 [ 21.712414] kunit_try_run_case+0x170/0x3f0 [ 21.712831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.713367] kthread+0x328/0x630 [ 21.713699] ret_from_fork+0x10/0x20 [ 21.714059] [ 21.714217] Freed by task 242: [ 21.714519] kasan_save_stack+0x3c/0x68 [ 21.714901] kasan_save_track+0x20/0x40 [ 21.715280] kasan_save_free_info+0x4c/0x78 [ 21.715696] __kasan_slab_free+0x6c/0x98 [ 21.716084] kfree+0x214/0x3c8 [ 21.716400] kmalloc_uaf2+0x134/0x468 [ 21.716771] kunit_try_run_case+0x170/0x3f0 [ 21.717188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.717724] kthread+0x328/0x630 [ 21.718056] ret_from_fork+0x10/0x20 [ 21.718416] [ 21.718574] The buggy address belongs to the object at ffff00000ff06900 [ 21.718574] which belongs to the cache kmalloc-64 of size 64 [ 21.719704] The buggy address is located 40 bytes inside of [ 21.719704] freed 64-byte region [ffff00000ff06900, ffff00000ff06940) [ 21.720812] [ 21.720972] The buggy address belongs to the physical page: [ 21.721494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xff06 [ 21.722227] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.722850] page_type: f5(slab) [ 21.723172] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 21.723900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.724617] page dumped because: kasan: bad access detected [ 21.725139] [ 21.725296] Memory state around the buggy address: [ 21.725753] ffff00000ff06800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.726430] ffff00000ff06880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.727106] >ffff00000ff06900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.727776] ^ [ 21.728210] ffff00000ff06980: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 21.728887] ffff00000ff06a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.729557] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 21.668439] ================================================================== [ 21.669451] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 21.670133] Write of size 33 at addr ffff00000ff06800 by task kunit_try_catch/240 [ 21.670827] [ 21.670992] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.671042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.671056] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.671074] Call trace: [ 21.671086] show_stack+0x20/0x38 (C) [ 21.671121] dump_stack_lvl+0x8c/0xd0 [ 21.671152] print_report+0x118/0x608 [ 21.671181] kasan_report+0xdc/0x128 [ 21.671209] kasan_check_range+0x100/0x1a8 [ 21.671241] __asan_memset+0x34/0x78 [ 21.671272] kmalloc_uaf_memset+0x170/0x310 [ 21.671305] kunit_try_run_case+0x170/0x3f0 [ 21.671341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.671381] kthread+0x328/0x630 [ 21.671415] ret_from_fork+0x10/0x20 [ 21.671448] [ 21.677313] Allocated by task 240: [ 21.677651] kasan_save_stack+0x3c/0x68 [ 21.678037] kasan_save_track+0x20/0x40 [ 21.678419] kasan_save_alloc_info+0x40/0x58 [ 21.678844] __kasan_kmalloc+0xd4/0xd8 [ 21.679217] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.679670] kmalloc_uaf_memset+0xb8/0x310 [ 21.680081] kunit_try_run_case+0x170/0x3f0 [ 21.680498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.681036] kthread+0x328/0x630 [ 21.681370] ret_from_fork+0x10/0x20 [ 21.681731] [ 21.681889] Freed by task 240: [ 21.682192] kasan_save_stack+0x3c/0x68 [ 21.682574] kasan_save_track+0x20/0x40 [ 21.682955] kasan_save_free_info+0x4c/0x78 [ 21.683368] __kasan_slab_free+0x6c/0x98 [ 21.683758] kfree+0x214/0x3c8 [ 21.684075] kmalloc_uaf_memset+0x11c/0x310 [ 21.684494] kunit_try_run_case+0x170/0x3f0 [ 21.684911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.685447] kthread+0x328/0x630 [ 21.685779] ret_from_fork+0x10/0x20 [ 21.686140] [ 21.686299] The buggy address belongs to the object at ffff00000ff06800 [ 21.686299] which belongs to the cache kmalloc-64 of size 64 [ 21.687429] The buggy address is located 0 bytes inside of [ 21.687429] freed 64-byte region [ffff00000ff06800, ffff00000ff06840) [ 21.688530] [ 21.688689] The buggy address belongs to the physical page: [ 21.689214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xff06 [ 21.689951] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.690573] page_type: f5(slab) [ 21.690895] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 21.691623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.692340] page dumped because: kasan: bad access detected [ 21.692862] [ 21.693022] Memory state around the buggy address: [ 21.693477] ffff00000ff06700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.694153] ffff00000ff06780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.694829] >ffff00000ff06800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.695501] ^ [ 21.695818] ffff00000ff06880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.696494] ffff00000ff06900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.697165] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 21.636650] ================================================================== [ 21.637787] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 21.638421] Read of size 1 at addr ffff00000aa08688 by task kunit_try_catch/238 [ 21.639100] [ 21.639266] CPU: 3 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.639317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.639332] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.639350] Call trace: [ 21.639362] show_stack+0x20/0x38 (C) [ 21.639394] dump_stack_lvl+0x8c/0xd0 [ 21.639426] print_report+0x118/0x608 [ 21.639456] kasan_report+0xdc/0x128 [ 21.639484] __asan_report_load1_noabort+0x20/0x30 [ 21.639518] kmalloc_uaf+0x300/0x338 [ 21.639551] kunit_try_run_case+0x170/0x3f0 [ 21.639586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.639625] kthread+0x328/0x630 [ 21.639659] ret_from_fork+0x10/0x20 [ 21.639692] [ 21.645222] Allocated by task 238: [ 21.645549] kasan_save_stack+0x3c/0x68 [ 21.645922] kasan_save_track+0x20/0x40 [ 21.646294] kasan_save_alloc_info+0x40/0x58 [ 21.646707] __kasan_kmalloc+0xd4/0xd8 [ 21.647070] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.647510] kmalloc_uaf+0xb8/0x338 [ 21.647855] kunit_try_run_case+0x170/0x3f0 [ 21.648263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.648787] kthread+0x328/0x630 [ 21.649110] ret_from_fork+0x10/0x20 [ 21.649460] [ 21.649612] Freed by task 238: [ 21.649907] kasan_save_stack+0x3c/0x68 [ 21.650279] kasan_save_track+0x20/0x40 [ 21.650651] kasan_save_free_info+0x4c/0x78 [ 21.651056] __kasan_slab_free+0x6c/0x98 [ 21.651435] kfree+0x214/0x3c8 [ 21.651742] kmalloc_uaf+0x11c/0x338 [ 21.652095] kunit_try_run_case+0x170/0x3f0 [ 21.652500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.653025] kthread+0x328/0x630 [ 21.653348] ret_from_fork+0x10/0x20 [ 21.653697] [ 21.653851] The buggy address belongs to the object at ffff00000aa08680 [ 21.653851] which belongs to the cache kmalloc-16 of size 16 [ 21.654969] The buggy address is located 8 bytes inside of [ 21.654969] freed 16-byte region [ffff00000aa08680, ffff00000aa08690) [ 21.656058] [ 21.656213] The buggy address belongs to the physical page: [ 21.656730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xaa08 [ 21.657455] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.658066] page_type: f5(slab) [ 21.658379] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 21.659095] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.659803] page dumped because: kasan: bad access detected [ 21.660317] [ 21.660470] Memory state around the buggy address: [ 21.660918] ffff00000aa08580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.661584] ffff00000aa08600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.662250] >ffff00000aa08680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.662912] ^ [ 21.663247] ffff00000aa08700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.663913] ffff00000aa08780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.664576] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 21.608196] ================================================================== [ 21.609311] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 21.610051] Read of size 64 at addr ffff00000ff06504 by task kunit_try_catch/236 [ 21.610730] [ 21.610904] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.610958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.610974] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.610991] Call trace: [ 21.611002] show_stack+0x20/0x38 (C) [ 21.611039] dump_stack_lvl+0x8c/0xd0 [ 21.611070] print_report+0x118/0x608 [ 21.611100] kasan_report+0xdc/0x128 [ 21.611129] kasan_check_range+0x100/0x1a8 [ 21.611159] __asan_memmove+0x3c/0x98 [ 21.611191] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 21.611228] kunit_try_run_case+0x170/0x3f0 [ 21.611263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.611303] kthread+0x328/0x630 [ 21.611337] ret_from_fork+0x10/0x20 [ 21.611369] [ 21.617295] Allocated by task 236: [ 21.617621] kasan_save_stack+0x3c/0x68 [ 21.617996] kasan_save_track+0x20/0x40 [ 21.618368] kasan_save_alloc_info+0x40/0x58 [ 21.618780] __kasan_kmalloc+0xd4/0xd8 [ 21.619142] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.619584] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 21.620063] kunit_try_run_case+0x170/0x3f0 [ 21.620470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.620995] kthread+0x328/0x630 [ 21.621318] ret_from_fork+0x10/0x20 [ 21.621668] [ 21.621822] The buggy address belongs to the object at ffff00000ff06500 [ 21.621822] which belongs to the cache kmalloc-64 of size 64 [ 21.622940] The buggy address is located 4 bytes inside of [ 21.622940] allocated 64-byte region [ffff00000ff06500, ffff00000ff06540) [ 21.624061] [ 21.624215] The buggy address belongs to the physical page: [ 21.624731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xff06 [ 21.625456] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.626069] page_type: f5(slab) [ 21.626382] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 21.627099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.627807] page dumped because: kasan: bad access detected [ 21.628322] [ 21.628474] Memory state around the buggy address: [ 21.628923] ffff00000ff06400: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.629589] ffff00000ff06480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.630256] >ffff00000ff06500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.630918] ^ [ 21.631414] ffff00000ff06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.632080] ffff00000ff06600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.632742] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 21.580514] ================================================================== [ 21.581582] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 21.582295] Read of size 18446744073709551614 at addr ffff00000fdabc04 by task kunit_try_catch/234 [ 21.583127] [ 21.583292] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.583344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.583359] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.583377] Call trace: [ 21.583388] show_stack+0x20/0x38 (C) [ 21.583423] dump_stack_lvl+0x8c/0xd0 [ 21.583454] print_report+0x118/0x608 [ 21.583485] kasan_report+0xdc/0x128 [ 21.583513] kasan_check_range+0x100/0x1a8 [ 21.583544] __asan_memmove+0x3c/0x98 [ 21.583575] kmalloc_memmove_negative_size+0x154/0x2e0 [ 21.583613] kunit_try_run_case+0x170/0x3f0 [ 21.583648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.583688] kthread+0x328/0x630 [ 21.583723] ret_from_fork+0x10/0x20 [ 21.583756] [ 21.589691] Allocated by task 234: [ 21.590018] kasan_save_stack+0x3c/0x68 [ 21.590393] kasan_save_track+0x20/0x40 [ 21.590765] kasan_save_alloc_info+0x40/0x58 [ 21.591179] __kasan_kmalloc+0xd4/0xd8 [ 21.591543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.591984] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 21.592471] kunit_try_run_case+0x170/0x3f0 [ 21.592878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.593404] kthread+0x328/0x630 [ 21.593727] ret_from_fork+0x10/0x20 [ 21.594078] [ 21.594230] The buggy address belongs to the object at ffff00000fdabc00 [ 21.594230] which belongs to the cache kmalloc-64 of size 64 [ 21.595348] The buggy address is located 4 bytes inside of [ 21.595348] 64-byte region [ffff00000fdabc00, ffff00000fdabc40) [ 21.596392] [ 21.596546] The buggy address belongs to the physical page: [ 21.597062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfdab [ 21.597787] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.598399] page_type: f5(slab) [ 21.598713] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 21.599429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.600138] page dumped because: kasan: bad access detected [ 21.600652] [ 21.600805] Memory state around the buggy address: [ 21.601253] ffff00000fdabb00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 21.601920] ffff00000fdabb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.602586] >ffff00000fdabc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.603247] ^ [ 21.603558] ffff00000fdabc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.604224] ffff00000fdabd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.604887] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 21.552501] ================================================================== [ 21.553559] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 21.554243] Write of size 16 at addr ffff00000df93669 by task kunit_try_catch/232 [ 21.554925] [ 21.555083] CPU: 2 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.555119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.555130] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.555143] Call trace: [ 21.555152] show_stack+0x20/0x38 (C) [ 21.555178] dump_stack_lvl+0x8c/0xd0 [ 21.555201] print_report+0x118/0x608 [ 21.555223] kasan_report+0xdc/0x128 [ 21.555243] kasan_check_range+0x100/0x1a8 [ 21.555265] __asan_memset+0x34/0x78 [ 21.555287] kmalloc_oob_memset_16+0x150/0x2f8 [ 21.555311] kunit_try_run_case+0x170/0x3f0 [ 21.555337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.555366] kthread+0x328/0x630 [ 21.555391] ret_from_fork+0x10/0x20 [ 21.555415] [ 21.561236] Allocated by task 232: [ 21.561554] kasan_save_stack+0x3c/0x68 [ 21.561915] kasan_save_track+0x20/0x40 [ 21.562276] kasan_save_alloc_info+0x40/0x58 [ 21.562675] __kasan_kmalloc+0xd4/0xd8 [ 21.563027] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.563456] kmalloc_oob_memset_16+0xb0/0x2f8 [ 21.563865] kunit_try_run_case+0x170/0x3f0 [ 21.564259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.564769] kthread+0x328/0x630 [ 21.565081] ret_from_fork+0x10/0x20 [ 21.565419] [ 21.565566] The buggy address belongs to the object at ffff00000df93600 [ 21.565566] which belongs to the cache kmalloc-128 of size 128 [ 21.566685] The buggy address is located 105 bytes inside of [ 21.566685] allocated 120-byte region [ffff00000df93600, ffff00000df93678) [ 21.567814] [ 21.567962] The buggy address belongs to the physical page: [ 21.568469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93 [ 21.569182] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.569782] page_type: f5(slab) [ 21.570085] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.570789] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.571487] page dumped because: kasan: bad access detected [ 21.571991] [ 21.572138] Memory state around the buggy address: [ 21.572577] ffff00000df93500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.573231] ffff00000df93580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.573885] >ffff00000df93600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.574537] ^ [ 21.575182] ffff00000df93680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.575837] ffff00000df93700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.576489] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 21.442229] ================================================================== [ 21.443294] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 21.444024] Write of size 128 at addr ffff00000ea7e700 by task kunit_try_catch/224 [ 21.444753] [ 21.444937] CPU: 3 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.445015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.445038] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.445065] Call trace: [ 21.445083] show_stack+0x20/0x38 (C) [ 21.445135] dump_stack_lvl+0x8c/0xd0 [ 21.445185] print_report+0x118/0x608 [ 21.445232] kasan_report+0xdc/0x128 [ 21.445279] kasan_check_range+0x100/0x1a8 [ 21.445330] __asan_memset+0x34/0x78 [ 21.445380] kmalloc_oob_in_memset+0x144/0x2d0 [ 21.445436] kunit_try_run_case+0x170/0x3f0 [ 21.445493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.445557] kthread+0x328/0x630 [ 21.445611] ret_from_fork+0x10/0x20 [ 21.445664] [ 21.451548] Allocated by task 224: [ 21.451884] kasan_save_stack+0x3c/0x68 [ 21.452262] kasan_save_track+0x20/0x40 [ 21.452634] kasan_save_alloc_info+0x40/0x58 [ 21.453046] __kasan_kmalloc+0xd4/0xd8 [ 21.453408] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.453850] kmalloc_oob_in_memset+0xb0/0x2d0 [ 21.454273] kunit_try_run_case+0x170/0x3f0 [ 21.454680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.455204] kthread+0x328/0x630 [ 21.455527] ret_from_fork+0x10/0x20 [ 21.455877] [ 21.456030] The buggy address belongs to the object at ffff00000ea7e700 [ 21.456030] which belongs to the cache kmalloc-128 of size 128 [ 21.457163] The buggy address is located 0 bytes inside of [ 21.457163] allocated 120-byte region [ffff00000ea7e700, ffff00000ea7e778) [ 21.458290] [ 21.458445] The buggy address belongs to the physical page: [ 21.458961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e [ 21.459685] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.460296] page_type: f5(slab) [ 21.460609] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.461324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.462031] page dumped because: kasan: bad access detected [ 21.462545] [ 21.462697] Memory state around the buggy address: [ 21.463145] ffff00000ea7e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.463811] ffff00000ea7e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.464476] >ffff00000ea7e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.465137] ^ [ 21.465791] ffff00000ea7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.466457] ffff00000ea7e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.467118] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 21.410880] ================================================================== [ 21.411917] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 21.412568] Read of size 16 at addr ffff00000aa08660 by task kunit_try_catch/222 [ 21.413251] [ 21.413416] CPU: 3 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.413464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.413478] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.413496] Call trace: [ 21.413507] show_stack+0x20/0x38 (C) [ 21.413540] dump_stack_lvl+0x8c/0xd0 [ 21.413571] print_report+0x118/0x608 [ 21.413600] kasan_report+0xdc/0x128 [ 21.413628] __asan_report_load16_noabort+0x20/0x30 [ 21.413661] kmalloc_uaf_16+0x3bc/0x438 [ 21.413694] kunit_try_run_case+0x170/0x3f0 [ 21.413729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.413768] kthread+0x328/0x630 [ 21.413802] ret_from_fork+0x10/0x20 [ 21.413834] [ 21.419390] Allocated by task 222: [ 21.419716] kasan_save_stack+0x3c/0x68 [ 21.420088] kasan_save_track+0x20/0x40 [ 21.420459] kasan_save_alloc_info+0x40/0x58 [ 21.420871] __kasan_kmalloc+0xd4/0xd8 [ 21.421234] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.421674] kmalloc_uaf_16+0x140/0x438 [ 21.422050] kunit_try_run_case+0x170/0x3f0 [ 21.422456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.422979] kthread+0x328/0x630 [ 21.423302] ret_from_fork+0x10/0x20 [ 21.423651] [ 21.423803] Freed by task 222: [ 21.424097] kasan_save_stack+0x3c/0x68 [ 21.424468] kasan_save_track+0x20/0x40 [ 21.424839] kasan_save_free_info+0x4c/0x78 [ 21.425243] __kasan_slab_free+0x6c/0x98 [ 21.425622] kfree+0x214/0x3c8 [ 21.425929] kmalloc_uaf_16+0x190/0x438 [ 21.426305] kunit_try_run_case+0x170/0x3f0 [ 21.426709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.427232] kthread+0x328/0x630 [ 21.427554] ret_from_fork+0x10/0x20 [ 21.427903] [ 21.428056] The buggy address belongs to the object at ffff00000aa08660 [ 21.428056] which belongs to the cache kmalloc-16 of size 16 [ 21.429172] The buggy address is located 0 bytes inside of [ 21.429172] freed 16-byte region [ffff00000aa08660, ffff00000aa08670) [ 21.430260] [ 21.430414] The buggy address belongs to the physical page: [ 21.430929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xaa08 [ 21.431653] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.432264] page_type: f5(slab) [ 21.432577] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 21.433292] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.433998] page dumped because: kasan: bad access detected [ 21.434512] [ 21.434664] Memory state around the buggy address: [ 21.435112] ffff00000aa08500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.435777] ffff00000aa08580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.436442] >ffff00000aa08600: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 21.437103] ^ [ 21.437689] ffff00000aa08680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.438354] ffff00000aa08700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.439015] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 21.384046] ================================================================== [ 21.385091] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 21.385742] Write of size 16 at addr ffff00000aa08600 by task kunit_try_catch/220 [ 21.386437] [ 21.386603] CPU: 3 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.386653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.386667] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.386684] Call trace: [ 21.386696] show_stack+0x20/0x38 (C) [ 21.386729] dump_stack_lvl+0x8c/0xd0 [ 21.386760] print_report+0x118/0x608 [ 21.386790] kasan_report+0xdc/0x128 [ 21.386818] __asan_report_store16_noabort+0x20/0x30 [ 21.386853] kmalloc_oob_16+0x3a0/0x3f8 [ 21.386885] kunit_try_run_case+0x170/0x3f0 [ 21.386920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.386959] kthread+0x328/0x630 [ 21.386993] ret_from_fork+0x10/0x20 [ 21.387025] [ 21.392595] Allocated by task 220: [ 21.392921] kasan_save_stack+0x3c/0x68 [ 21.393294] kasan_save_track+0x20/0x40 [ 21.393665] kasan_save_alloc_info+0x40/0x58 [ 21.394076] __kasan_kmalloc+0xd4/0xd8 [ 21.394439] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.394880] kmalloc_oob_16+0xb4/0x3f8 [ 21.395247] kunit_try_run_case+0x170/0x3f0 [ 21.395653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.396177] kthread+0x328/0x630 [ 21.396500] ret_from_fork+0x10/0x20 [ 21.396849] [ 21.397002] The buggy address belongs to the object at ffff00000aa08600 [ 21.397002] which belongs to the cache kmalloc-16 of size 16 [ 21.398119] The buggy address is located 0 bytes inside of [ 21.398119] allocated 13-byte region [ffff00000aa08600, ffff00000aa0860d) [ 21.399239] [ 21.399392] The buggy address belongs to the physical page: [ 21.399908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xaa08 [ 21.400632] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.401243] page_type: f5(slab) [ 21.401555] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 21.402270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.402977] page dumped because: kasan: bad access detected [ 21.403490] [ 21.403643] Memory state around the buggy address: [ 21.404091] ffff00000aa08500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.404756] ffff00000aa08580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.405421] >ffff00000aa08600: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.406082] ^ [ 21.406416] ffff00000aa08680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.407081] ffff00000aa08700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.407742] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 21.348823] ================================================================== [ 21.349488] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 21.350105] Read of size 1 at addr ffff00000eea2400 by task kunit_try_catch/218 [ 21.350769] [ 21.350926] CPU: 3 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.350960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.350971] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.350983] Call trace: [ 21.350992] show_stack+0x20/0x38 (C) [ 21.351016] dump_stack_lvl+0x8c/0xd0 [ 21.351039] print_report+0x118/0x608 [ 21.351060] kasan_report+0xdc/0x128 [ 21.351080] __asan_report_load1_noabort+0x20/0x30 [ 21.351104] krealloc_uaf+0x4c8/0x520 [ 21.351127] kunit_try_run_case+0x170/0x3f0 [ 21.351153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.351181] kthread+0x328/0x630 [ 21.351204] ret_from_fork+0x10/0x20 [ 21.351227] [ 21.356723] Allocated by task 218: [ 21.357041] kasan_save_stack+0x3c/0x68 [ 21.357402] kasan_save_track+0x20/0x40 [ 21.357763] kasan_save_alloc_info+0x40/0x58 [ 21.358162] __kasan_kmalloc+0xd4/0xd8 [ 21.358515] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.358943] krealloc_uaf+0xc8/0x520 [ 21.359284] kunit_try_run_case+0x170/0x3f0 [ 21.359677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.360188] kthread+0x328/0x630 [ 21.360498] ret_from_fork+0x10/0x20 [ 21.360836] [ 21.360982] Freed by task 218: [ 21.361266] kasan_save_stack+0x3c/0x68 [ 21.361626] kasan_save_track+0x20/0x40 [ 21.361986] kasan_save_free_info+0x4c/0x78 [ 21.362378] __kasan_slab_free+0x6c/0x98 [ 21.362745] kfree+0x214/0x3c8 [ 21.363041] krealloc_uaf+0x12c/0x520 [ 21.363389] kunit_try_run_case+0x170/0x3f0 [ 21.363784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.364294] kthread+0x328/0x630 [ 21.364605] ret_from_fork+0x10/0x20 [ 21.364943] [ 21.365091] The buggy address belongs to the object at ffff00000eea2400 [ 21.365091] which belongs to the cache kmalloc-256 of size 256 [ 21.366210] The buggy address is located 0 bytes inside of [ 21.366210] freed 256-byte region [ffff00000eea2400, ffff00000eea2500) [ 21.367290] [ 21.367438] The buggy address belongs to the physical page: [ 21.367945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xeea2 [ 21.368654] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.369347] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.369985] page_type: f5(slab) [ 21.370285] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.370989] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.371691] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.372400] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.373111] head: 03fffe0000000001 fffffdffc03ba881 00000000ffffffff 00000000ffffffff [ 21.373820] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.374524] page dumped because: kasan: bad access detected [ 21.375028] [ 21.375174] Memory state around the buggy address: [ 21.375613] ffff00000eea2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.376267] ffff00000eea2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.376920] >ffff00000eea2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.377571] ^ [ 21.377874] ffff00000eea2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.378528] ffff00000eea2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.379178] ================================================================== [ 21.316303] ================================================================== [ 21.317404] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 21.318040] Read of size 1 at addr ffff00000eea2400 by task kunit_try_catch/218 [ 21.318718] [ 21.318883] CPU: 3 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.318932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.318946] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.318963] Call trace: [ 21.318975] show_stack+0x20/0x38 (C) [ 21.319008] dump_stack_lvl+0x8c/0xd0 [ 21.319039] print_report+0x118/0x608 [ 21.319069] kasan_report+0xdc/0x128 [ 21.319097] __kasan_check_byte+0x54/0x70 [ 21.319125] krealloc_noprof+0x44/0x360 [ 21.319154] krealloc_uaf+0x180/0x520 [ 21.319187] kunit_try_run_case+0x170/0x3f0 [ 21.319222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.319261] kthread+0x328/0x630 [ 21.319294] ret_from_fork+0x10/0x20 [ 21.319327] [ 21.325139] Allocated by task 218: [ 21.325465] kasan_save_stack+0x3c/0x68 [ 21.325839] kasan_save_track+0x20/0x40 [ 21.326210] kasan_save_alloc_info+0x40/0x58 [ 21.326623] __kasan_kmalloc+0xd4/0xd8 [ 21.326986] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.327427] krealloc_uaf+0xc8/0x520 [ 21.327780] kunit_try_run_case+0x170/0x3f0 [ 21.328186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.328710] kthread+0x328/0x630 [ 21.329033] ret_from_fork+0x10/0x20 [ 21.329382] [ 21.329535] Freed by task 218: [ 21.329829] kasan_save_stack+0x3c/0x68 [ 21.330201] kasan_save_track+0x20/0x40 [ 21.330571] kasan_save_free_info+0x4c/0x78 [ 21.330975] __kasan_slab_free+0x6c/0x98 [ 21.331353] kfree+0x214/0x3c8 [ 21.331661] krealloc_uaf+0x12c/0x520 [ 21.332022] kunit_try_run_case+0x170/0x3f0 [ 21.332428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.332952] kthread+0x328/0x630 [ 21.333274] ret_from_fork+0x10/0x20 [ 21.333624] [ 21.333777] The buggy address belongs to the object at ffff00000eea2400 [ 21.333777] which belongs to the cache kmalloc-256 of size 256 [ 21.334910] The buggy address is located 0 bytes inside of [ 21.334910] freed 256-byte region [ffff00000eea2400, ffff00000eea2500) [ 21.336006] [ 21.336160] The buggy address belongs to the physical page: [ 21.336676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xeea2 [ 21.337400] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.338106] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.338762] page_type: f5(slab) [ 21.339077] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.339782] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.340485] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.341195] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.341905] head: 03fffe0000000001 fffffdffc03ba881 00000000ffffffff 00000000ffffffff [ 21.342613] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.343317] page dumped because: kasan: bad access detected [ 21.343822] [ 21.343968] Memory state around the buggy address: [ 21.344407] ffff00000eea2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.345062] ffff00000eea2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.345716] >ffff00000eea2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.346366] ^ [ 21.346669] ffff00000eea2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.347323] ffff00000eea2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.347975] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 21.067591] ================================================================== [ 21.068266] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 21.068969] Write of size 1 at addr ffff00000dc594da by task kunit_try_catch/212 [ 21.069642] [ 21.069797] CPU: 4 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.069833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.069842] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.069853] Call trace: [ 21.069862] show_stack+0x20/0x38 (C) [ 21.069885] dump_stack_lvl+0x8c/0xd0 [ 21.069905] print_report+0x118/0x608 [ 21.069924] kasan_report+0xdc/0x128 [ 21.069942] __asan_report_store1_noabort+0x20/0x30 [ 21.069964] krealloc_less_oob_helper+0xa80/0xc50 [ 21.069988] krealloc_less_oob+0x20/0x38 [ 21.070010] kunit_try_run_case+0x170/0x3f0 [ 21.070034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.070059] kthread+0x328/0x630 [ 21.070082] ret_from_fork+0x10/0x20 [ 21.070103] [ 21.076032] Allocated by task 212: [ 21.076349] kasan_save_stack+0x3c/0x68 [ 21.076711] kasan_save_track+0x20/0x40 [ 21.077068] kasan_save_alloc_info+0x40/0x58 [ 21.077467] __kasan_krealloc+0x118/0x178 [ 21.077840] krealloc_noprof+0x128/0x360 [ 21.078207] krealloc_less_oob_helper+0x168/0xc50 [ 21.078645] krealloc_less_oob+0x20/0x38 [ 21.079015] kunit_try_run_case+0x170/0x3f0 [ 21.079407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.079915] kthread+0x328/0x630 [ 21.080223] ret_from_fork+0x10/0x20 [ 21.080560] [ 21.080706] The buggy address belongs to the object at ffff00000dc59400 [ 21.080706] which belongs to the cache kmalloc-256 of size 256 [ 21.081822] The buggy address is located 17 bytes to the right of [ 21.081822] allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9) [ 21.082987] [ 21.083133] The buggy address belongs to the physical page: [ 21.083638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58 [ 21.084347] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.085037] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.085673] page_type: f5(slab) [ 21.085971] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.086671] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.087370] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.088076] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.088782] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff [ 21.089488] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.090189] page dumped because: kasan: bad access detected [ 21.090693] [ 21.090837] Memory state around the buggy address: [ 21.091273] ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.091926] ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.092578] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.093227] ^ [ 21.093778] ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.094430] ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.095079] ================================================================== [ 21.248842] ================================================================== [ 21.249514] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 21.250217] Write of size 1 at addr ffff00000def60da by task kunit_try_catch/216 [ 21.250890] [ 21.251045] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.251081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.251090] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.251102] Call trace: [ 21.251110] show_stack+0x20/0x38 (C) [ 21.251133] dump_stack_lvl+0x8c/0xd0 [ 21.251154] print_report+0x118/0x608 [ 21.251173] kasan_report+0xdc/0x128 [ 21.251191] __asan_report_store1_noabort+0x20/0x30 [ 21.251213] krealloc_less_oob_helper+0xa80/0xc50 [ 21.251237] krealloc_large_less_oob+0x20/0x38 [ 21.251260] kunit_try_run_case+0x170/0x3f0 [ 21.251283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.251309] kthread+0x328/0x630 [ 21.251332] ret_from_fork+0x10/0x20 [ 21.251353] [ 21.257329] The buggy address belongs to the physical page: [ 21.257834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 21.258544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.259235] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.259870] page_type: f8(unknown) [ 21.260193] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.260892] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.261592] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.262299] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.263005] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 21.263711] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.264412] page dumped because: kasan: bad access detected [ 21.264915] [ 21.265060] Memory state around the buggy address: [ 21.265497] ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.266149] ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.266801] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.267449] ^ [ 21.268001] ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.268653] ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.269301] ================================================================== [ 21.124347] ================================================================== [ 21.125001] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 21.125692] Write of size 1 at addr ffff00000dc594eb by task kunit_try_catch/212 [ 21.126361] [ 21.126510] CPU: 4 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.126542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.126550] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.126560] Call trace: [ 21.126567] show_stack+0x20/0x38 (C) [ 21.126587] dump_stack_lvl+0x8c/0xd0 [ 21.126605] print_report+0x118/0x608 [ 21.126623] kasan_report+0xdc/0x128 [ 21.126641] __asan_report_store1_noabort+0x20/0x30 [ 21.126663] krealloc_less_oob_helper+0xa58/0xc50 [ 21.126686] krealloc_less_oob+0x20/0x38 [ 21.126708] kunit_try_run_case+0x170/0x3f0 [ 21.126731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.126756] kthread+0x328/0x630 [ 21.126777] ret_from_fork+0x10/0x20 [ 21.126797] [ 21.132727] Allocated by task 212: [ 21.133042] kasan_save_stack+0x3c/0x68 [ 21.133400] kasan_save_track+0x20/0x40 [ 21.133756] kasan_save_alloc_info+0x40/0x58 [ 21.134155] __kasan_krealloc+0x118/0x178 [ 21.134529] krealloc_noprof+0x128/0x360 [ 21.134894] krealloc_less_oob_helper+0x168/0xc50 [ 21.135333] krealloc_less_oob+0x20/0x38 [ 21.135702] kunit_try_run_case+0x170/0x3f0 [ 21.136095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.136602] kthread+0x328/0x630 [ 21.136911] ret_from_fork+0x10/0x20 [ 21.137247] [ 21.137392] The buggy address belongs to the object at ffff00000dc59400 [ 21.137392] which belongs to the cache kmalloc-256 of size 256 [ 21.138507] The buggy address is located 34 bytes to the right of [ 21.138507] allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9) [ 21.139670] [ 21.139816] The buggy address belongs to the physical page: [ 21.140319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58 [ 21.141026] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.141715] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.142347] page_type: f5(slab) [ 21.142643] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.143343] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.144043] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.144750] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.145456] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff [ 21.146162] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.146863] page dumped because: kasan: bad access detected [ 21.147367] [ 21.147511] Memory state around the buggy address: [ 21.147946] ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.148597] ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.149249] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.149897] ^ [ 21.150494] ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.151145] ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.151793] ================================================================== [ 21.038263] ================================================================== [ 21.038936] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 21.039650] Write of size 1 at addr ffff00000dc594d0 by task kunit_try_catch/212 [ 21.040334] [ 21.040497] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.040545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.040559] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.040576] Call trace: [ 21.040586] show_stack+0x20/0x38 (C) [ 21.040617] dump_stack_lvl+0x8c/0xd0 [ 21.040648] print_report+0x118/0x608 [ 21.040677] kasan_report+0xdc/0x128 [ 21.040704] __asan_report_store1_noabort+0x20/0x30 [ 21.040738] krealloc_less_oob_helper+0xb9c/0xc50 [ 21.040773] krealloc_less_oob+0x20/0x38 [ 21.040806] kunit_try_run_case+0x170/0x3f0 [ 21.040840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.040878] kthread+0x328/0x630 [ 21.040911] ret_from_fork+0x10/0x20 [ 21.040942] [ 21.046921] Allocated by task 212: [ 21.047247] kasan_save_stack+0x3c/0x68 [ 21.047618] kasan_save_track+0x20/0x40 [ 21.047990] kasan_save_alloc_info+0x40/0x58 [ 21.048401] __kasan_krealloc+0x118/0x178 [ 21.048788] krealloc_noprof+0x128/0x360 [ 21.049168] krealloc_less_oob_helper+0x168/0xc50 [ 21.049622] krealloc_less_oob+0x20/0x38 [ 21.050005] kunit_try_run_case+0x170/0x3f0 [ 21.050409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.050933] kthread+0x328/0x630 [ 21.051255] ret_from_fork+0x10/0x20 [ 21.051604] [ 21.051757] The buggy address belongs to the object at ffff00000dc59400 [ 21.051757] which belongs to the cache kmalloc-256 of size 256 [ 21.052888] The buggy address is located 7 bytes to the right of [ 21.052888] allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9) [ 21.054061] [ 21.054214] The buggy address belongs to the physical page: [ 21.054729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58 [ 21.055452] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.056156] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.056807] page_type: f5(slab) [ 21.057119] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.057834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.058549] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.059271] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.059994] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff [ 21.060716] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.061431] page dumped because: kasan: bad access detected [ 21.061943] [ 21.062096] Memory state around the buggy address: [ 21.062543] ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.063208] ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.063873] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.064534] ^ [ 21.065073] ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.065738] ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.066400] ================================================================== [ 21.096023] ================================================================== [ 21.096676] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 21.097367] Write of size 1 at addr ffff00000dc594ea by task kunit_try_catch/212 [ 21.098035] [ 21.098184] CPU: 4 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.098216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.098224] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.098234] Call trace: [ 21.098241] show_stack+0x20/0x38 (C) [ 21.098260] dump_stack_lvl+0x8c/0xd0 [ 21.098278] print_report+0x118/0x608 [ 21.098296] kasan_report+0xdc/0x128 [ 21.098314] __asan_report_store1_noabort+0x20/0x30 [ 21.098336] krealloc_less_oob_helper+0xae4/0xc50 [ 21.098359] krealloc_less_oob+0x20/0x38 [ 21.098381] kunit_try_run_case+0x170/0x3f0 [ 21.098403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.098428] kthread+0x328/0x630 [ 21.098450] ret_from_fork+0x10/0x20 [ 21.098470] [ 21.104398] Allocated by task 212: [ 21.104712] kasan_save_stack+0x3c/0x68 [ 21.105072] kasan_save_track+0x20/0x40 [ 21.105431] kasan_save_alloc_info+0x40/0x58 [ 21.105829] __kasan_krealloc+0x118/0x178 [ 21.106203] krealloc_noprof+0x128/0x360 [ 21.106567] krealloc_less_oob_helper+0x168/0xc50 [ 21.107005] krealloc_less_oob+0x20/0x38 [ 21.107375] kunit_try_run_case+0x170/0x3f0 [ 21.107767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.108274] kthread+0x328/0x630 [ 21.108584] ret_from_fork+0x10/0x20 [ 21.108921] [ 21.109066] The buggy address belongs to the object at ffff00000dc59400 [ 21.109066] which belongs to the cache kmalloc-256 of size 256 [ 21.110182] The buggy address is located 33 bytes to the right of [ 21.110182] allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9) [ 21.111345] [ 21.111491] The buggy address belongs to the physical page: [ 21.111993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58 [ 21.112700] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.113389] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.114021] page_type: f5(slab) [ 21.114319] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.115018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.115717] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.116424] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.117131] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff [ 21.117836] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.118536] page dumped because: kasan: bad access detected [ 21.119040] [ 21.119185] Memory state around the buggy address: [ 21.119620] ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.120271] ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.120921] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.121570] ^ [ 21.122167] ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.122818] ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.123466] ================================================================== [ 21.008896] ================================================================== [ 21.009937] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 21.010658] Write of size 1 at addr ffff00000dc594c9 by task kunit_try_catch/212 [ 21.011342] [ 21.011505] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.011553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.011567] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.011583] Call trace: [ 21.011594] show_stack+0x20/0x38 (C) [ 21.011626] dump_stack_lvl+0x8c/0xd0 [ 21.011657] print_report+0x118/0x608 [ 21.011686] kasan_report+0xdc/0x128 [ 21.011713] __asan_report_store1_noabort+0x20/0x30 [ 21.011747] krealloc_less_oob_helper+0xa48/0xc50 [ 21.011783] krealloc_less_oob+0x20/0x38 [ 21.011816] kunit_try_run_case+0x170/0x3f0 [ 21.011850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.011889] kthread+0x328/0x630 [ 21.011922] ret_from_fork+0x10/0x20 [ 21.011954] [ 21.017936] Allocated by task 212: [ 21.018261] kasan_save_stack+0x3c/0x68 [ 21.018634] kasan_save_track+0x20/0x40 [ 21.019005] kasan_save_alloc_info+0x40/0x58 [ 21.019417] __kasan_krealloc+0x118/0x178 [ 21.019804] krealloc_noprof+0x128/0x360 [ 21.020183] krealloc_less_oob_helper+0x168/0xc50 [ 21.020637] krealloc_less_oob+0x20/0x38 [ 21.021021] kunit_try_run_case+0x170/0x3f0 [ 21.021426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.021950] kthread+0x328/0x630 [ 21.022273] ret_from_fork+0x10/0x20 [ 21.022623] [ 21.022776] The buggy address belongs to the object at ffff00000dc59400 [ 21.022776] which belongs to the cache kmalloc-256 of size 256 [ 21.023907] The buggy address is located 0 bytes to the right of [ 21.023907] allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9) [ 21.025079] [ 21.025233] The buggy address belongs to the physical page: [ 21.025750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58 [ 21.026473] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.027178] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.027831] page_type: f5(slab) [ 21.028145] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.028860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.029575] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 21.030297] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.031020] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff [ 21.031742] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.032457] page dumped because: kasan: bad access detected [ 21.032972] [ 21.033124] Memory state around the buggy address: [ 21.033572] ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.034237] ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.034902] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.035563] ^ [ 21.036081] ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.036746] ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.037407] ================================================================== [ 21.291373] ================================================================== [ 21.292027] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 21.292716] Write of size 1 at addr ffff00000def60eb by task kunit_try_catch/216 [ 21.293385] [ 21.293534] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.293565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.293574] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.293583] Call trace: [ 21.293590] show_stack+0x20/0x38 (C) [ 21.293610] dump_stack_lvl+0x8c/0xd0 [ 21.293628] print_report+0x118/0x608 [ 21.293646] kasan_report+0xdc/0x128 [ 21.293664] __asan_report_store1_noabort+0x20/0x30 [ 21.293686] krealloc_less_oob_helper+0xa58/0xc50 [ 21.293709] krealloc_large_less_oob+0x20/0x38 [ 21.293732] kunit_try_run_case+0x170/0x3f0 [ 21.293754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.293780] kthread+0x328/0x630 [ 21.293802] ret_from_fork+0x10/0x20 [ 21.293821] [ 21.299792] The buggy address belongs to the physical page: [ 21.300296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 21.301002] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.301692] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.302323] page_type: f8(unknown) [ 21.302643] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.303342] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.304040] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.304746] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.305453] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 21.306158] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.306860] page dumped because: kasan: bad access detected [ 21.307363] [ 21.307508] Memory state around the buggy address: [ 21.307944] ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.308596] ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.309247] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.309895] ^ [ 21.310492] ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.311142] ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.311791] ================================================================== [ 21.227232] ================================================================== [ 21.227894] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 21.228594] Write of size 1 at addr ffff00000def60d0 by task kunit_try_catch/216 [ 21.229265] [ 21.229419] CPU: 2 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.229453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.229463] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.229476] Call trace: [ 21.229484] show_stack+0x20/0x38 (C) [ 21.229507] dump_stack_lvl+0x8c/0xd0 [ 21.229529] print_report+0x118/0x608 [ 21.229550] kasan_report+0xdc/0x128 [ 21.229569] __asan_report_store1_noabort+0x20/0x30 [ 21.229594] krealloc_less_oob_helper+0xb9c/0xc50 [ 21.229619] krealloc_large_less_oob+0x20/0x38 [ 21.229644] kunit_try_run_case+0x170/0x3f0 [ 21.229669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.229697] kthread+0x328/0x630 [ 21.229722] ret_from_fork+0x10/0x20 [ 21.229745] [ 21.235732] The buggy address belongs to the physical page: [ 21.236238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 21.236948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.237641] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.238278] page_type: f8(unknown) [ 21.238601] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.239302] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.240004] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.240712] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.241422] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 21.242132] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.242835] page dumped because: kasan: bad access detected [ 21.243341] [ 21.243486] Memory state around the buggy address: [ 21.243924] ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.244577] ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.245231] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.245882] ^ [ 21.246411] ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.247064] ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.247714] ================================================================== [ 21.205424] ================================================================== [ 21.206504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 21.207217] Write of size 1 at addr ffff00000def60c9 by task kunit_try_catch/216 [ 21.207889] [ 21.208046] CPU: 2 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.208082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.208092] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.208104] Call trace: [ 21.208113] show_stack+0x20/0x38 (C) [ 21.208137] dump_stack_lvl+0x8c/0xd0 [ 21.208160] print_report+0x118/0x608 [ 21.208181] kasan_report+0xdc/0x128 [ 21.208201] __asan_report_store1_noabort+0x20/0x30 [ 21.208226] krealloc_less_oob_helper+0xa48/0xc50 [ 21.208251] krealloc_large_less_oob+0x20/0x38 [ 21.208276] kunit_try_run_case+0x170/0x3f0 [ 21.208302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.208330] kthread+0x328/0x630 [ 21.208355] ret_from_fork+0x10/0x20 [ 21.208379] [ 21.214365] The buggy address belongs to the physical page: [ 21.214872] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 21.215583] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.216277] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.216914] page_type: f8(unknown) [ 21.217238] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.217941] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.218643] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.219352] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.220062] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 21.220772] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.221476] page dumped because: kasan: bad access detected [ 21.221982] [ 21.222128] Memory state around the buggy address: [ 21.222567] ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.223221] ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.223875] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.224526] ^ [ 21.225034] ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.225687] ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.226337] ================================================================== [ 21.270138] ================================================================== [ 21.270790] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 21.271480] Write of size 1 at addr ffff00000def60ea by task kunit_try_catch/216 [ 21.272149] [ 21.272297] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.272329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.272337] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.272347] Call trace: [ 21.272354] show_stack+0x20/0x38 (C) [ 21.272373] dump_stack_lvl+0x8c/0xd0 [ 21.272392] print_report+0x118/0x608 [ 21.272410] kasan_report+0xdc/0x128 [ 21.272428] __asan_report_store1_noabort+0x20/0x30 [ 21.272450] krealloc_less_oob_helper+0xae4/0xc50 [ 21.272473] krealloc_large_less_oob+0x20/0x38 [ 21.272496] kunit_try_run_case+0x170/0x3f0 [ 21.272518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.272544] kthread+0x328/0x630 [ 21.272565] ret_from_fork+0x10/0x20 [ 21.272586] [ 21.278561] The buggy address belongs to the physical page: [ 21.279064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 21.279773] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.280463] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.281095] page_type: f8(unknown) [ 21.281415] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.282115] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.282814] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.283520] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.284226] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 21.284932] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.285634] page dumped because: kasan: bad access detected [ 21.286137] [ 21.286282] Memory state around the buggy address: [ 21.286719] ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.287370] ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.288022] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.288671] ^ [ 21.289269] ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.289920] ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.290568] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 20.946348] ================================================================== [ 20.947383] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 20.948105] Write of size 1 at addr ffff00000240faeb by task kunit_try_catch/210 [ 20.948789] [ 20.948954] CPU: 2 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.949002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.949015] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.949033] Call trace: [ 20.949044] show_stack+0x20/0x38 (C) [ 20.949076] dump_stack_lvl+0x8c/0xd0 [ 20.949107] print_report+0x118/0x608 [ 20.949136] kasan_report+0xdc/0x128 [ 20.949164] __asan_report_store1_noabort+0x20/0x30 [ 20.949198] krealloc_more_oob_helper+0x60c/0x678 [ 20.949234] krealloc_more_oob+0x20/0x38 [ 20.949267] kunit_try_run_case+0x170/0x3f0 [ 20.949302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.949340] kthread+0x328/0x630 [ 20.949374] ret_from_fork+0x10/0x20 [ 20.949407] [ 20.955392] Allocated by task 210: [ 20.955722] kasan_save_stack+0x3c/0x68 [ 20.956096] kasan_save_track+0x20/0x40 [ 20.956468] kasan_save_alloc_info+0x40/0x58 [ 20.956880] __kasan_krealloc+0x118/0x178 [ 20.957267] krealloc_noprof+0x128/0x360 [ 20.957648] krealloc_more_oob_helper+0x168/0x678 [ 20.958102] krealloc_more_oob+0x20/0x38 [ 20.958486] kunit_try_run_case+0x170/0x3f0 [ 20.958892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.959416] kthread+0x328/0x630 [ 20.959739] ret_from_fork+0x10/0x20 [ 20.960090] [ 20.960243] The buggy address belongs to the object at ffff00000240fa00 [ 20.960243] which belongs to the cache kmalloc-256 of size 256 [ 20.961376] The buggy address is located 0 bytes to the right of [ 20.961376] allocated 235-byte region [ffff00000240fa00, ffff00000240faeb) [ 20.962549] [ 20.962704] The buggy address belongs to the physical page: [ 20.963220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x240e [ 20.963945] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.964650] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.965301] page_type: f5(slab) [ 20.965615] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.966330] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.967046] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.967768] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.968491] head: 03fffe0000000001 fffffdffc0090381 00000000ffffffff 00000000ffffffff [ 20.969213] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.969928] page dumped because: kasan: bad access detected [ 20.970443] [ 20.970595] Memory state around the buggy address: [ 20.971044] ffff00000240f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.971708] ffff00000240fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.972373] >ffff00000240fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 20.973034] ^ [ 20.973643] ffff00000240fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.974308] ffff00000240fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.974969] ================================================================== [ 20.976293] ================================================================== [ 20.976969] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 20.977674] Write of size 1 at addr ffff00000240faf0 by task kunit_try_catch/210 [ 20.978347] [ 20.978501] CPU: 4 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.978537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.978547] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.978558] Call trace: [ 20.978567] show_stack+0x20/0x38 (C) [ 20.978590] dump_stack_lvl+0x8c/0xd0 [ 20.978610] print_report+0x118/0x608 [ 20.978629] kasan_report+0xdc/0x128 [ 20.978647] __asan_report_store1_noabort+0x20/0x30 [ 20.978670] krealloc_more_oob_helper+0x5c0/0x678 [ 20.978693] krealloc_more_oob+0x20/0x38 [ 20.978715] kunit_try_run_case+0x170/0x3f0 [ 20.978738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.978763] kthread+0x328/0x630 [ 20.978785] ret_from_fork+0x10/0x20 [ 20.978806] [ 20.984739] Allocated by task 210: [ 20.985055] kasan_save_stack+0x3c/0x68 [ 20.985416] kasan_save_track+0x20/0x40 [ 20.985774] kasan_save_alloc_info+0x40/0x58 [ 20.986172] __kasan_krealloc+0x118/0x178 [ 20.986546] krealloc_noprof+0x128/0x360 [ 20.986913] krealloc_more_oob_helper+0x168/0x678 [ 20.987351] krealloc_more_oob+0x20/0x38 [ 20.987721] kunit_try_run_case+0x170/0x3f0 [ 20.988112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.988620] kthread+0x328/0x630 [ 20.988928] ret_from_fork+0x10/0x20 [ 20.989265] [ 20.989410] The buggy address belongs to the object at ffff00000240fa00 [ 20.989410] which belongs to the cache kmalloc-256 of size 256 [ 20.990528] The buggy address is located 5 bytes to the right of [ 20.990528] allocated 235-byte region [ffff00000240fa00, ffff00000240faeb) [ 20.991685] [ 20.991831] The buggy address belongs to the physical page: [ 20.992336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x240e [ 20.993044] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.993734] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.994370] page_type: f5(slab) [ 20.994669] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.995368] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.996068] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.996773] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.997479] head: 03fffe0000000001 fffffdffc0090381 00000000ffffffff 00000000ffffffff [ 20.998185] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.998886] page dumped because: kasan: bad access detected [ 20.999388] [ 20.999533] Memory state around the buggy address: [ 20.999971] ffff00000240f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.000623] ffff00000240fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.001274] >ffff00000240fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 21.001923] ^ [ 21.002544] ffff00000240fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.003194] ffff00000240fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.003842] ================================================================== [ 21.180096] ================================================================== [ 21.180790] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 21.181536] Write of size 1 at addr ffff00000d7360f0 by task kunit_try_catch/214 [ 21.182250] [ 21.182432] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.182509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.182532] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.182559] Call trace: [ 21.182577] show_stack+0x20/0x38 (C) [ 21.182626] dump_stack_lvl+0x8c/0xd0 [ 21.182675] print_report+0x118/0x608 [ 21.182723] kasan_report+0xdc/0x128 [ 21.182769] __asan_report_store1_noabort+0x20/0x30 [ 21.182825] krealloc_more_oob_helper+0x5c0/0x678 [ 21.182885] krealloc_large_more_oob+0x20/0x38 [ 21.182943] kunit_try_run_case+0x170/0x3f0 [ 21.182999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.183064] kthread+0x328/0x630 [ 21.183118] ret_from_fork+0x10/0x20 [ 21.183170] [ 21.189314] The buggy address belongs to the physical page: [ 21.189850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd734 [ 21.190603] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.191336] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.192017] page_type: f8(unknown) [ 21.192377] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.193122] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.193869] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.194622] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.195376] head: 03fffe0000000002 fffffdffc035cd01 00000000ffffffff 00000000ffffffff [ 21.196129] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.196870] page dumped because: kasan: bad access detected [ 21.197405] [ 21.197573] Memory state around the buggy address: [ 21.198042] ffff00000d735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.198735] ffff00000d736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.199427] >ffff00000d736080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 21.200113] ^ [ 21.200770] ffff00000d736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.201462] ffff00000d736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.202148] ================================================================== [ 21.156729] ================================================================== [ 21.157821] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 21.158582] Write of size 1 at addr ffff00000d7360eb by task kunit_try_catch/214 [ 21.159296] [ 21.159481] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.159559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.159582] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.159609] Call trace: [ 21.159627] show_stack+0x20/0x38 (C) [ 21.159680] dump_stack_lvl+0x8c/0xd0 [ 21.159730] print_report+0x118/0x608 [ 21.159778] kasan_report+0xdc/0x128 [ 21.159826] __asan_report_store1_noabort+0x20/0x30 [ 21.159882] krealloc_more_oob_helper+0x60c/0x678 [ 21.159943] krealloc_large_more_oob+0x20/0x38 [ 21.160002] kunit_try_run_case+0x170/0x3f0 [ 21.160059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.160123] kthread+0x328/0x630 [ 21.160179] ret_from_fork+0x10/0x20 [ 21.160232] [ 21.166379] The buggy address belongs to the physical page: [ 21.166916] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd734 [ 21.167670] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.168403] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.169085] page_type: f8(unknown) [ 21.169448] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.170194] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.170941] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.171694] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.172449] head: 03fffe0000000002 fffffdffc035cd01 00000000ffffffff 00000000ffffffff [ 21.173203] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.173944] page dumped because: kasan: bad access detected [ 21.174479] [ 21.174648] Memory state around the buggy address: [ 21.175117] ffff00000d735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.175810] ffff00000d736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.176503] >ffff00000d736080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 21.177188] ^ [ 21.177823] ffff00000d736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.178515] ffff00000d736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.179201] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 20.925672] ================================================================== [ 20.927057] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 20.927681] Read of size 1 at addr ffff00000fe90000 by task kunit_try_catch/208 [ 20.928360] [ 20.928525] CPU: 3 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.928574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.928588] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.928605] Call trace: [ 20.928617] show_stack+0x20/0x38 (C) [ 20.928649] dump_stack_lvl+0x8c/0xd0 [ 20.928680] print_report+0x118/0x608 [ 20.928709] kasan_report+0xdc/0x128 [ 20.928737] __asan_report_load1_noabort+0x20/0x30 [ 20.928771] page_alloc_uaf+0x328/0x350 [ 20.928804] kunit_try_run_case+0x170/0x3f0 [ 20.928839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.928878] kthread+0x328/0x630 [ 20.928912] ret_from_fork+0x10/0x20 [ 20.928945] [ 20.934499] The buggy address belongs to the physical page: [ 20.935015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfe90 [ 20.935738] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.936349] page_type: f0(buddy) [ 20.936670] raw: 03fffe0000000000 ffff0000f75f2620 ffff0000f75f2620 0000000000000000 [ 20.937385] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 20.938093] page dumped because: kasan: bad access detected [ 20.938608] [ 20.938760] Memory state around the buggy address: [ 20.939208] ffff00000fe8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.939873] ffff00000fe8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.940539] >ffff00000fe90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.941200] ^ [ 20.941510] ffff00000fe90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.942176] ffff00000fe90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.942837] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 20.824272] ================================================================== [ 20.825454] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 20.826152] Write of size 1 at addr ffff00000d77df00 by task kunit_try_catch/198 [ 20.826837] [ 20.827002] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.827051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.827065] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.827082] Call trace: [ 20.827094] show_stack+0x20/0x38 (C) [ 20.827128] dump_stack_lvl+0x8c/0xd0 [ 20.827159] print_report+0x118/0x608 [ 20.827189] kasan_report+0xdc/0x128 [ 20.827217] __asan_report_store1_noabort+0x20/0x30 [ 20.827251] kmalloc_big_oob_right+0x2a4/0x2f0 [ 20.827285] kunit_try_run_case+0x170/0x3f0 [ 20.827320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.827358] kthread+0x328/0x630 [ 20.827392] ret_from_fork+0x10/0x20 [ 20.827425] [ 20.833036] Allocated by task 198: [ 20.833362] kasan_save_stack+0x3c/0x68 [ 20.833735] kasan_save_track+0x20/0x40 [ 20.834107] kasan_save_alloc_info+0x40/0x58 [ 20.834519] __kasan_kmalloc+0xd4/0xd8 [ 20.834882] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.835323] kmalloc_big_oob_right+0xb8/0x2f0 [ 20.835745] kunit_try_run_case+0x170/0x3f0 [ 20.836151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.836674] kthread+0x328/0x630 [ 20.836997] ret_from_fork+0x10/0x20 [ 20.837347] [ 20.837500] The buggy address belongs to the object at ffff00000d77c000 [ 20.837500] which belongs to the cache kmalloc-8k of size 8192 [ 20.838632] The buggy address is located 0 bytes to the right of [ 20.838632] allocated 7936-byte region [ffff00000d77c000, ffff00000d77df00) [ 20.839812] [ 20.839966] The buggy address belongs to the physical page: [ 20.840482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd778 [ 20.841205] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.841910] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.842562] page_type: f5(slab) [ 20.842876] raw: 03fffe0000000040 ffff000000403180 dead000000000122 0000000000000000 [ 20.843591] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 20.844306] head: 03fffe0000000040 ffff000000403180 dead000000000122 0000000000000000 [ 20.845029] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 20.845752] head: 03fffe0000000003 fffffdffc035de01 00000000ffffffff 00000000ffffffff [ 20.846474] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 20.847189] page dumped because: kasan: bad access detected [ 20.847703] [ 20.847855] Memory state around the buggy address: [ 20.848302] ffff00000d77de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.848968] ffff00000d77de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.849633] >ffff00000d77df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.850294] ^ [ 20.850605] ffff00000d77df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.851270] ffff00000d77e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.851931] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 20.779804] ================================================================== [ 20.780889] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.781656] Write of size 1 at addr ffff00000ea7e578 by task kunit_try_catch/196 [ 20.782344] [ 20.782509] CPU: 3 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.782558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.782572] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.782590] Call trace: [ 20.782601] show_stack+0x20/0x38 (C) [ 20.782634] dump_stack_lvl+0x8c/0xd0 [ 20.782665] print_report+0x118/0x608 [ 20.782695] kasan_report+0xdc/0x128 [ 20.782722] __asan_report_store1_noabort+0x20/0x30 [ 20.782755] kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.782793] kunit_try_run_case+0x170/0x3f0 [ 20.782829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.782868] kthread+0x328/0x630 [ 20.782902] ret_from_fork+0x10/0x20 [ 20.782935] [ 20.788614] Allocated by task 196: [ 20.788940] kasan_save_stack+0x3c/0x68 [ 20.789313] kasan_save_track+0x20/0x40 [ 20.789685] kasan_save_alloc_info+0x40/0x58 [ 20.790099] __kasan_kmalloc+0xd4/0xd8 [ 20.790465] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 20.790994] kmalloc_track_caller_oob_right+0xa8/0x488 [ 20.791487] kunit_try_run_case+0x170/0x3f0 [ 20.791896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.792420] kthread+0x328/0x630 [ 20.792744] ret_from_fork+0x10/0x20 [ 20.793094] [ 20.793247] The buggy address belongs to the object at ffff00000ea7e500 [ 20.793247] which belongs to the cache kmalloc-128 of size 128 [ 20.794380] The buggy address is located 0 bytes to the right of [ 20.794380] allocated 120-byte region [ffff00000ea7e500, ffff00000ea7e578) [ 20.795554] [ 20.795708] The buggy address belongs to the physical page: [ 20.796224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e [ 20.796949] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.797560] page_type: f5(slab) [ 20.797875] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.798591] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.799298] page dumped because: kasan: bad access detected [ 20.799813] [ 20.799965] Memory state around the buggy address: [ 20.800413] ffff00000ea7e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.801079] ffff00000ea7e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.801744] >ffff00000ea7e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.802406] ^ [ 20.803062] ffff00000ea7e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.803728] ffff00000ea7e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.804390] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 20.748153] ================================================================== [ 20.749196] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 20.749903] Read of size 1 at addr ffff00000f447000 by task kunit_try_catch/194 [ 20.750584] [ 20.750752] CPU: 3 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.750803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.750817] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.750835] Call trace: [ 20.750847] show_stack+0x20/0x38 (C) [ 20.750883] dump_stack_lvl+0x8c/0xd0 [ 20.750915] print_report+0x118/0x608 [ 20.750944] kasan_report+0xdc/0x128 [ 20.750972] __asan_report_load1_noabort+0x20/0x30 [ 20.751005] kmalloc_node_oob_right+0x2f4/0x330 [ 20.751042] kunit_try_run_case+0x170/0x3f0 [ 20.751077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.751116] kthread+0x328/0x630 [ 20.751150] ret_from_fork+0x10/0x20 [ 20.751183] [ 20.756796] Allocated by task 194: [ 20.757121] kasan_save_stack+0x3c/0x68 [ 20.757494] kasan_save_track+0x20/0x40 [ 20.757866] kasan_save_alloc_info+0x40/0x58 [ 20.758280] __kasan_kmalloc+0xd4/0xd8 [ 20.758643] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 20.759116] kmalloc_node_oob_right+0xbc/0x330 [ 20.759547] kunit_try_run_case+0x170/0x3f0 [ 20.759954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.760479] kthread+0x328/0x630 [ 20.760803] ret_from_fork+0x10/0x20 [ 20.761153] [ 20.761306] The buggy address belongs to the object at ffff00000f446000 [ 20.761306] which belongs to the cache kmalloc-4k of size 4096 [ 20.762439] The buggy address is located 0 bytes to the right of [ 20.762439] allocated 4096-byte region [ffff00000f446000, ffff00000f447000) [ 20.763620] [ 20.763774] The buggy address belongs to the physical page: [ 20.764291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf440 [ 20.765015] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.765720] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.766371] page_type: f5(slab) [ 20.766683] raw: 03fffe0000000040 ffff000000403040 dead000000000122 0000000000000000 [ 20.767398] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.768114] head: 03fffe0000000040 ffff000000403040 dead000000000122 0000000000000000 [ 20.768836] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.769559] head: 03fffe0000000003 fffffdffc03d1001 00000000ffffffff 00000000ffffffff [ 20.770282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 20.770996] page dumped because: kasan: bad access detected [ 20.771511] [ 20.771663] Memory state around the buggy address: [ 20.772111] ffff00000f446f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.772777] ffff00000f446f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.773443] >ffff00000f447000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.774104] ^ [ 20.774414] ffff00000f447080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.775079] ffff00000f447100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.775740] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 20.704598] ================================================================== [ 20.705648] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 20.706313] Read of size 1 at addr ffff0000025a2dff by task kunit_try_catch/192 [ 20.706992] [ 20.707158] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.707208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.707222] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.707238] Call trace: [ 20.707251] show_stack+0x20/0x38 (C) [ 20.707285] dump_stack_lvl+0x8c/0xd0 [ 20.707316] print_report+0x118/0x608 [ 20.707347] kasan_report+0xdc/0x128 [ 20.707374] __asan_report_load1_noabort+0x20/0x30 [ 20.707408] kmalloc_oob_left+0x2ec/0x320 [ 20.707441] kunit_try_run_case+0x170/0x3f0 [ 20.707476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.707515] kthread+0x328/0x630 [ 20.707549] ret_from_fork+0x10/0x20 [ 20.707581] [ 20.713149] Allocated by task 11: [ 20.713468] kasan_save_stack+0x3c/0x68 [ 20.713840] kasan_save_track+0x20/0x40 [ 20.714211] kasan_save_alloc_info+0x40/0x58 [ 20.714623] __kasan_kmalloc+0xd4/0xd8 [ 20.714986] __kmalloc_noprof+0x190/0x4d0 [ 20.715373] usb_hcd_submit_urb+0x444/0x1a58 [ 20.715789] usb_submit_urb+0x564/0x1198 [ 20.716170] usb_start_wait_urb+0x120/0x3e8 [ 20.716574] usb_control_msg+0x2b4/0x3e0 [ 20.716957] hub_ext_port_status+0x114/0x580 [ 20.717374] hub_activate+0x2a4/0x1340 [ 20.717736] hub_resume+0xa8/0x380 [ 20.718068] usb_resume_interface.isra.0+0x1f8/0x348 [ 20.718545] usb_suspend_both+0x250/0x6f0 [ 20.718936] usb_runtime_suspend+0x3c/0xf8 [ 20.719334] __rpm_callback+0xa0/0x470 [ 20.719701] rpm_callback+0x168/0x1b0 [ 20.720058] rpm_suspend+0x1bc/0xcd8 [ 20.720406] __pm_runtime_suspend+0x5c/0x1e8 [ 20.720817] usb_runtime_idle+0x48/0x68 [ 20.721193] rpm_idle+0x13c/0x708 [ 20.721519] pm_runtime_work+0x110/0x170 [ 20.721899] process_one_work+0x530/0xf98 [ 20.722288] worker_thread+0x8ac/0xf28 [ 20.722650] kthread+0x328/0x630 [ 20.722972] ret_from_fork+0x10/0x20 [ 20.723322] [ 20.723474] Freed by task 11: [ 20.723760] kasan_save_stack+0x3c/0x68 [ 20.724132] kasan_save_track+0x20/0x40 [ 20.724503] kasan_save_free_info+0x4c/0x78 [ 20.724907] __kasan_slab_free+0x6c/0x98 [ 20.725287] kfree+0x214/0x3c8 [ 20.725594] usb_hcd_submit_urb+0x518/0x1a58 [ 20.726007] usb_submit_urb+0x564/0x1198 [ 20.726387] usb_start_wait_urb+0x120/0x3e8 [ 20.726793] usb_control_msg+0x2b4/0x3e0 [ 20.727174] hub_ext_port_status+0x114/0x580 [ 20.727589] hub_activate+0x2a4/0x1340 [ 20.727951] hub_resume+0xa8/0x380 [ 20.728281] usb_resume_interface.isra.0+0x1f8/0x348 [ 20.728757] usb_suspend_both+0x250/0x6f0 [ 20.729148] usb_runtime_suspend+0x3c/0xf8 [ 20.729546] __rpm_callback+0xa0/0x470 [ 20.729911] rpm_callback+0x168/0x1b0 [ 20.730268] rpm_suspend+0x1bc/0xcd8 [ 20.730617] __pm_runtime_suspend+0x5c/0x1e8 [ 20.731028] usb_runtime_idle+0x48/0x68 [ 20.731404] rpm_idle+0x13c/0x708 [ 20.731730] pm_runtime_work+0x110/0x170 [ 20.732111] process_one_work+0x530/0xf98 [ 20.732498] worker_thread+0x8ac/0xf28 [ 20.732860] kthread+0x328/0x630 [ 20.733182] ret_from_fork+0x10/0x20 [ 20.733532] [ 20.733684] The buggy address belongs to the object at ffff0000025a2de0 [ 20.733684] which belongs to the cache kmalloc-16 of size 16 [ 20.734802] The buggy address is located 15 bytes to the right of [ 20.734802] allocated 16-byte region [ffff0000025a2de0, ffff0000025a2df0) [ 20.735975] [ 20.736129] The buggy address belongs to the physical page: [ 20.736646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x25a2 [ 20.737370] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.737982] page_type: f5(slab) [ 20.738296] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 20.739011] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.739718] page dumped because: kasan: bad access detected [ 20.740232] [ 20.740384] Memory state around the buggy address: [ 20.740832] ffff0000025a2c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.741498] ffff0000025a2d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.742162] >ffff0000025a2d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.742823] ^ [ 20.743479] ffff0000025a2e00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.744144] ffff0000025a2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.744805] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 20.628685] ================================================================== [ 20.629366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 20.630026] Write of size 1 at addr ffff00000c9cff73 by task kunit_try_catch/190 [ 20.630714] [ 20.630880] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G N 6.15.0-rc3 #1 PREEMPT [ 20.630926] Tainted: [N]=TEST [ 20.630938] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.630955] Call trace: [ 20.630967] show_stack+0x20/0x38 (C) [ 20.631001] dump_stack_lvl+0x8c/0xd0 [ 20.631033] print_report+0x118/0x608 [ 20.631062] kasan_report+0xdc/0x128 [ 20.631090] __asan_report_store1_noabort+0x20/0x30 [ 20.631125] kmalloc_oob_right+0x5a4/0x660 [ 20.631158] kunit_try_run_case+0x170/0x3f0 [ 20.631193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.631231] kthread+0x328/0x630 [ 20.631265] ret_from_fork+0x10/0x20 [ 20.631298] [ 20.636776] Allocated by task 190: [ 20.637106] kasan_save_stack+0x3c/0x68 [ 20.637484] kasan_save_track+0x20/0x40 [ 20.637855] kasan_save_alloc_info+0x40/0x58 [ 20.638270] __kasan_kmalloc+0xd4/0xd8 [ 20.638632] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.639073] kmalloc_oob_right+0xb0/0x660 [ 20.639466] kunit_try_run_case+0x170/0x3f0 [ 20.639873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.640398] kthread+0x328/0x630 [ 20.640721] ret_from_fork+0x10/0x20 [ 20.641070] [ 20.641224] The buggy address belongs to the object at ffff00000c9cff00 [ 20.641224] which belongs to the cache kmalloc-128 of size 128 [ 20.642356] The buggy address is located 0 bytes to the right of [ 20.642356] allocated 115-byte region [ffff00000c9cff00, ffff00000c9cff73) [ 20.643530] [ 20.643683] The buggy address belongs to the physical page: [ 20.644200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc9cf [ 20.644924] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.645535] page_type: f5(slab) [ 20.645849] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.646565] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.647272] page dumped because: kasan: bad access detected [ 20.647786] [ 20.647938] Memory state around the buggy address: [ 20.648386] ffff00000c9cfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.649052] ffff00000c9cfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.649717] >ffff00000c9cff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.650377] ^ [ 20.651010] ffff00000c9cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.651675] ffff00000c9d0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.652336] ================================================================== [ 20.654402] ================================================================== [ 20.655057] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 20.655708] Write of size 1 at addr ffff00000c9cff78 by task kunit_try_catch/190 [ 20.656381] [ 20.656536] CPU: 4 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.656571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.656581] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.656593] Call trace: [ 20.656601] show_stack+0x20/0x38 (C) [ 20.656625] dump_stack_lvl+0x8c/0xd0 [ 20.656645] print_report+0x118/0x608 [ 20.656664] kasan_report+0xdc/0x128 [ 20.656682] __asan_report_store1_noabort+0x20/0x30 [ 20.656704] kmalloc_oob_right+0x538/0x660 [ 20.656726] kunit_try_run_case+0x170/0x3f0 [ 20.656750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.656775] kthread+0x328/0x630 [ 20.656798] ret_from_fork+0x10/0x20 [ 20.656819] [ 20.662350] Allocated by task 190: [ 20.662667] kasan_save_stack+0x3c/0x68 [ 20.663028] kasan_save_track+0x20/0x40 [ 20.663387] kasan_save_alloc_info+0x40/0x58 [ 20.663785] __kasan_kmalloc+0xd4/0xd8 [ 20.664136] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.664561] kmalloc_oob_right+0xb0/0x660 [ 20.664939] kunit_try_run_case+0x170/0x3f0 [ 20.665330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.665838] kthread+0x328/0x630 [ 20.666147] ret_from_fork+0x10/0x20 [ 20.666484] [ 20.666630] The buggy address belongs to the object at ffff00000c9cff00 [ 20.666630] which belongs to the cache kmalloc-128 of size 128 [ 20.667746] The buggy address is located 5 bytes to the right of [ 20.667746] allocated 115-byte region [ffff00000c9cff00, ffff00000c9cff73) [ 20.668903] [ 20.669049] The buggy address belongs to the physical page: [ 20.669553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc9cf [ 20.670262] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.670859] page_type: f5(slab) [ 20.671158] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.671858] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.672552] page dumped because: kasan: bad access detected [ 20.673055] [ 20.673200] Memory state around the buggy address: [ 20.673637] ffff00000c9cfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.674289] ffff00000c9cfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.674941] >ffff00000c9cff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.675590] ^ [ 20.676233] ffff00000c9cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.676884] ffff00000c9d0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.677532] ================================================================== [ 20.678323] ================================================================== [ 20.678976] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 20.679613] Read of size 1 at addr ffff00000c9cff80 by task kunit_try_catch/190 [ 20.680276] [ 20.680425] CPU: 4 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.680457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.680466] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.680476] Call trace: [ 20.680483] show_stack+0x20/0x38 (C) [ 20.680502] dump_stack_lvl+0x8c/0xd0 [ 20.680520] print_report+0x118/0x608 [ 20.680539] kasan_report+0xdc/0x128 [ 20.680557] __asan_report_load1_noabort+0x20/0x30 [ 20.680579] kmalloc_oob_right+0x5d0/0x660 [ 20.680600] kunit_try_run_case+0x170/0x3f0 [ 20.680623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.680648] kthread+0x328/0x630 [ 20.680669] ret_from_fork+0x10/0x20 [ 20.680688] [ 20.686211] Allocated by task 190: [ 20.686525] kasan_save_stack+0x3c/0x68 [ 20.686884] kasan_save_track+0x20/0x40 [ 20.687242] kasan_save_alloc_info+0x40/0x58 [ 20.687639] __kasan_kmalloc+0xd4/0xd8 [ 20.687989] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.688414] kmalloc_oob_right+0xb0/0x660 [ 20.688790] kunit_try_run_case+0x170/0x3f0 [ 20.689182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.689689] kthread+0x328/0x630 [ 20.689998] ret_from_fork+0x10/0x20 [ 20.690335] [ 20.690480] The buggy address belongs to the object at ffff00000c9cff00 [ 20.690480] which belongs to the cache kmalloc-128 of size 128 [ 20.691595] The buggy address is located 13 bytes to the right of [ 20.691595] allocated 115-byte region [ffff00000c9cff00, ffff00000c9cff73) [ 20.692758] [ 20.692903] The buggy address belongs to the physical page: [ 20.693407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc9cf [ 20.694114] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.694707] page_type: f5(slab) [ 20.695004] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.695703] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.696397] page dumped because: kasan: bad access detected [ 20.696901] [ 20.697045] Memory state around the buggy address: [ 20.697482] ffff00000c9cfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.698134] ffff00000c9cff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.698785] >ffff00000c9cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.699433] ^ [ 20.699734] ffff00000c9d0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.700385] ffff00000c9d0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.701033] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 67.566809] WARNING: CPU: 5 PID: 711 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 67.567507] Modules linked in: [ 67.567807] CPU: 5 UID: 0 PID: 711 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT [ 67.568707] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 67.569233] Hardware name: Radxa ROCK Pi 4B (DT) [ 67.569652] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 67.570282] pc : intlog10+0x38/0x48 [ 67.570612] lr : intlog10_test+0xe4/0x200 [ 67.570987] sp : ffff80008a907c10 [ 67.571293] x29: ffff80008a907c90 x28: 0000000000000000 x27: 0000000000000000 [ 67.571960] x26: 1fffe00001d23f61 x25: 0000000000000000 x24: ffff80008a907ce0 [ 67.572625] x23: ffff80008a907d00 x22: 0000000000000000 x21: 1ffff00011520f82 [ 67.573288] x20: ffff800083cc3840 x19: ffff800087cd7990 x18: 00000000e2331d29 [ 67.573952] x17: 000000040044ffff x16: 00500074b5503510 x15: 0000000000000000 [ 67.574614] x14: ffff000000f0e540 x13: ffff80004bbd3000 x12: ffff700010f61161 [ 67.575277] x11: 1ffff00010f61160 x10: ffff700010f61160 x9 : ffff80008120d60c [ 67.575939] x8 : ffff800087b08b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 67.576601] x5 : ffff700011520f82 x4 : 1ffff00010f9af3a x3 : 1ffff00010798708 [ 67.577264] x2 : 1ffff00010798708 x1 : 0000000000000003 x0 : 0000000000000000 [ 67.577926] Call trace: [ 67.578158] intlog10+0x38/0x48 (P) [ 67.578495] kunit_try_run_case+0x170/0x3f0 [ 67.578890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.579401] kthread+0x328/0x630 [ 67.579715] ret_from_fork+0x10/0x20 [ 67.580058] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 67.528731] WARNING: CPU: 1 PID: 693 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 67.529418] Modules linked in: [ 67.529725] CPU: 1 UID: 0 PID: 693 Comm: kunit_try_catch Tainted: G B D N 6.15.0-rc3 #1 PREEMPT [ 67.530631] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 67.531091] Hardware name: Radxa ROCK Pi 4B (DT) [ 67.531522] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 67.532167] pc : intlog2+0xd8/0xf8 [ 67.532505] lr : intlog2_test+0xe4/0x200 [ 67.532886] sp : ffff80008a937c10 [ 67.533202] x29: ffff80008a937c90 x28: 0000000000000000 x27: 0000000000000000 [ 67.533894] x26: 1fffe0000047dbc1 x25: 0000000000000000 x24: ffff80008a937ce0 [ 67.534581] x23: ffff80008a937d00 x22: 0000000000000000 x21: 1ffff00011526f82 [ 67.535268] x20: ffff800083cc3740 x19: ffff800087cd7990 x18: 000000006fe47e91 [ 67.535956] x17: 000000040044ffff x16: 00500072b5503510 x15: 0000000000000000 [ 67.536644] x14: ffff000000f09440 x13: ffff80004bb4b000 x12: ffff700010f61161 [ 67.537331] x11: 1ffff00010f61160 x10: ffff700010f61160 x9 : ffff80008120d80c [ 67.538019] x8 : ffff800087b08b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 67.538704] x5 : ffff700011526f82 x4 : 1ffff00010f9af3a x3 : 1ffff000107986e8 [ 67.539390] x2 : 1ffff000107986e8 x1 : 0000000000000003 x0 : 0000000000000000 [ 67.540075] Call trace: [ 67.540315] intlog2+0xd8/0xf8 (P) [ 67.540658] kunit_try_run_case+0x170/0x3f0 [ 67.541070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.541597] kthread+0x328/0x630 [ 67.541928] ret_from_fork+0x10/0x20 [ 67.542287] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/uboot-action
(no logs available)
Failure - lava/uboot-commands
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot/internal-error-oops-oops-smp
KNOWN ISSUE - qemu-arm64: Internal error: Oops at kunit_test_null_dereference - kunit_generic_run_threadfn_adapter
[ 67.095965] Internal error: Oops: 0000000096000005 [#1] SMP [ 67.096476] Modules linked in: [ 67.096770] CPU: 4 UID: 0 PID: 586 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 67.097661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.098038] Hardware name: Radxa ROCK Pi 4B (DT) [ 67.098455] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 67.099080] pc : kunit_test_null_dereference+0x70/0x170 [ 67.099563] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.100096] sp : ffff80008a4e7d30 [ 67.100399] x29: ffff80008a4e7d90 x28: 0000000000000000 x27: 0000000000000000 [ 67.101057] x26: 1fffe000019378a1 x25: 0000000000000000 x24: 0000000000000004 [ 67.101712] x23: ffff00000c9bc50c x22: ffff8000811fabe8 x21: ffff00001513ff08 [ 67.102368] x20: 1ffff0001149cfa6 x19: ffff800087cd7990 x18: 00000000c730dc2d [ 67.103022] x17: ffff8000811f21d8 x16: ffff8000801f5e0c x15: ffff00000d6c6960 [ 67.103677] x14: ffff8000808d3e34 x13: ffff800085ba7700 x12: ffff600001ad8dc4 [ 67.104332] x11: 1fffe00001ad8dc3 x10: ffff600001ad8dc3 x9 : ffff8000811f2050 [ 67.104986] x8 : ffff80008a4e7c38 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 67.105641] x5 : ffff70001149cfa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 67.106294] x2 : dfff800000000000 x1 : ffff00000d6c6540 x0 : ffff800087cd7990 [ 67.106948] Call trace: [ 67.107175] kunit_test_null_dereference+0x70/0x170 (P) [ 67.107655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.108158] kthread+0x328/0x630 [ 67.108467] ret_from_fork+0x10/0x20 [ 67.108809] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 67.108847] dwmmc_rockchip fe310000.mmc: IDMAC supports 32-bit address mode. [ 67.109352] ---[ end trace 0000000000000000 ]---