Date
April 22, 2025, 11:09 a.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 22.154540] ================================================================== [ 22.155193] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 22.155938] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.156599] [ 22.156748] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.156780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.156789] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.156800] Call trace: [ 22.156807] show_stack+0x20/0x38 (C) [ 22.156827] dump_stack_lvl+0x8c/0xd0 [ 22.156846] print_report+0x118/0x608 [ 22.156865] kasan_report+0xdc/0x128 [ 22.156884] __asan_report_load8_noabort+0x20/0x30 [ 22.156906] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 22.156932] kasan_bitops_generic+0x110/0x1c8 [ 22.156951] kunit_try_run_case+0x170/0x3f0 [ 22.156973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.156999] kthread+0x328/0x630 [ 22.157020] ret_from_fork+0x10/0x20 [ 22.157041] [ 22.163048] Allocated by task 319: [ 22.163363] kasan_save_stack+0x3c/0x68 [ 22.163724] kasan_save_track+0x20/0x40 [ 22.164082] kasan_save_alloc_info+0x40/0x58 [ 22.164481] __kasan_kmalloc+0xd4/0xd8 [ 22.164830] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.165254] kasan_bitops_generic+0xa0/0x1c8 [ 22.165650] kunit_try_run_case+0x170/0x3f0 [ 22.166044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.166552] kthread+0x328/0x630 [ 22.166861] ret_from_fork+0x10/0x20 [ 22.167199] [ 22.167345] The buggy address belongs to the object at ffff00000a7446c0 [ 22.167345] which belongs to the cache kmalloc-16 of size 16 [ 22.168446] The buggy address is located 8 bytes inside of [ 22.168446] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.169541] [ 22.169688] The buggy address belongs to the physical page: [ 22.170191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.170899] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.171493] page_type: f5(slab) [ 22.171791] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.172491] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.173186] page dumped because: kasan: bad access detected [ 22.173690] [ 22.173836] Memory state around the buggy address: [ 22.174274] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.174927] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.175579] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.176229] ^ [ 22.176735] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.177388] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.178038] ================================================================== [ 21.957544] ================================================================== [ 21.958221] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 21.958998] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 21.959667] [ 21.959824] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.959862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.959874] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.959887] Call trace: [ 21.959897] show_stack+0x20/0x38 (C) [ 21.959921] dump_stack_lvl+0x8c/0xd0 [ 21.959945] print_report+0x118/0x608 [ 21.959967] kasan_report+0xdc/0x128 [ 21.959988] __asan_report_load8_noabort+0x20/0x30 [ 21.960012] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 21.960040] kasan_bitops_generic+0x110/0x1c8 [ 21.960061] kunit_try_run_case+0x170/0x3f0 [ 21.960088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.960118] kthread+0x328/0x630 [ 21.960143] ret_from_fork+0x10/0x20 [ 21.960168] [ 21.966189] Allocated by task 319: [ 21.966507] kasan_save_stack+0x3c/0x68 [ 21.966869] kasan_save_track+0x20/0x40 [ 21.967231] kasan_save_alloc_info+0x40/0x58 [ 21.967633] __kasan_kmalloc+0xd4/0xd8 [ 21.967986] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.968414] kasan_bitops_generic+0xa0/0x1c8 [ 21.968813] kunit_try_run_case+0x170/0x3f0 [ 21.969209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.969719] kthread+0x328/0x630 [ 21.970030] ret_from_fork+0x10/0x20 [ 21.970371] [ 21.970518] The buggy address belongs to the object at ffff00000a7446c0 [ 21.970518] which belongs to the cache kmalloc-16 of size 16 [ 21.971623] The buggy address is located 8 bytes inside of [ 21.971623] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 21.972721] [ 21.972870] The buggy address belongs to the physical page: [ 21.973377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 21.974089] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.974689] page_type: f5(slab) [ 21.974993] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 21.975698] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.976397] page dumped because: kasan: bad access detected [ 21.976903] [ 21.977050] Memory state around the buggy address: [ 21.977489] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.978145] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 21.978800] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.979452] ^ [ 21.979961] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.980616] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.981269] ================================================================== [ 22.056343] ================================================================== [ 22.056999] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 22.057743] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.058414] [ 22.058563] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.058597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.058606] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.058617] Call trace: [ 22.058625] show_stack+0x20/0x38 (C) [ 22.058645] dump_stack_lvl+0x8c/0xd0 [ 22.058664] print_report+0x118/0x608 [ 22.058683] kasan_report+0xdc/0x128 [ 22.058701] kasan_check_range+0x100/0x1a8 [ 22.058722] __kasan_check_write+0x20/0x30 [ 22.058743] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 22.058769] kasan_bitops_generic+0x110/0x1c8 [ 22.058787] kunit_try_run_case+0x170/0x3f0 [ 22.058811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.058836] kthread+0x328/0x630 [ 22.058858] ret_from_fork+0x10/0x20 [ 22.058879] [ 22.065191] Allocated by task 319: [ 22.065508] kasan_save_stack+0x3c/0x68 [ 22.065867] kasan_save_track+0x20/0x40 [ 22.066227] kasan_save_alloc_info+0x40/0x58 [ 22.066627] __kasan_kmalloc+0xd4/0xd8 [ 22.066978] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.067404] kasan_bitops_generic+0xa0/0x1c8 [ 22.067800] kunit_try_run_case+0x170/0x3f0 [ 22.068193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.068702] kthread+0x328/0x630 [ 22.069011] ret_from_fork+0x10/0x20 [ 22.069349] [ 22.069495] The buggy address belongs to the object at ffff00000a7446c0 [ 22.069495] which belongs to the cache kmalloc-16 of size 16 [ 22.070596] The buggy address is located 8 bytes inside of [ 22.070596] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.071693] [ 22.071838] The buggy address belongs to the physical page: [ 22.072342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.073049] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.073644] page_type: f5(slab) [ 22.073941] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.074642] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.075336] page dumped because: kasan: bad access detected [ 22.075841] [ 22.075986] Memory state around the buggy address: [ 22.076424] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.077075] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.077728] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.078377] ^ [ 22.078884] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.079536] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.080186] ================================================================== [ 22.031604] ================================================================== [ 22.032258] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 22.033004] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.033674] [ 22.033823] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.033856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.033866] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.033877] Call trace: [ 22.033884] show_stack+0x20/0x38 (C) [ 22.033905] dump_stack_lvl+0x8c/0xd0 [ 22.033924] print_report+0x118/0x608 [ 22.033942] kasan_report+0xdc/0x128 [ 22.033961] kasan_check_range+0x100/0x1a8 [ 22.033981] __kasan_check_write+0x20/0x30 [ 22.034003] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 22.034028] kasan_bitops_generic+0x110/0x1c8 [ 22.034047] kunit_try_run_case+0x170/0x3f0 [ 22.034069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.034096] kthread+0x328/0x630 [ 22.034118] ret_from_fork+0x10/0x20 [ 22.034139] [ 22.040450] Allocated by task 319: [ 22.040765] kasan_save_stack+0x3c/0x68 [ 22.041126] kasan_save_track+0x20/0x40 [ 22.041485] kasan_save_alloc_info+0x40/0x58 [ 22.041885] __kasan_kmalloc+0xd4/0xd8 [ 22.042235] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.042660] kasan_bitops_generic+0xa0/0x1c8 [ 22.043056] kunit_try_run_case+0x170/0x3f0 [ 22.043449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.043958] kthread+0x328/0x630 [ 22.044267] ret_from_fork+0x10/0x20 [ 22.044604] [ 22.044750] The buggy address belongs to the object at ffff00000a7446c0 [ 22.044750] which belongs to the cache kmalloc-16 of size 16 [ 22.045852] The buggy address is located 8 bytes inside of [ 22.045852] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.046947] [ 22.047093] The buggy address belongs to the physical page: [ 22.047596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.048304] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.048898] page_type: f5(slab) [ 22.049196] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.049896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.050592] page dumped because: kasan: bad access detected [ 22.051095] [ 22.051241] Memory state around the buggy address: [ 22.051678] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.052330] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.052983] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.053632] ^ [ 22.054139] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.054791] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.055442] ================================================================== [ 21.982009] ================================================================== [ 21.982672] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 21.983423] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 21.984095] [ 21.984252] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.984287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.984298] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.984312] Call trace: [ 21.984320] show_stack+0x20/0x38 (C) [ 21.984344] dump_stack_lvl+0x8c/0xd0 [ 21.984368] print_report+0x118/0x608 [ 21.984390] kasan_report+0xdc/0x128 [ 21.984410] kasan_check_range+0x100/0x1a8 [ 21.984432] __kasan_check_write+0x20/0x30 [ 21.984456] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 21.984484] kasan_bitops_generic+0x110/0x1c8 [ 21.984505] kunit_try_run_case+0x170/0x3f0 [ 21.984530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.984559] kthread+0x328/0x630 [ 21.984583] ret_from_fork+0x10/0x20 [ 21.984607] [ 21.990925] Allocated by task 319: [ 21.991243] kasan_save_stack+0x3c/0x68 [ 21.991605] kasan_save_track+0x20/0x40 [ 21.991966] kasan_save_alloc_info+0x40/0x58 [ 21.992368] __kasan_kmalloc+0xd4/0xd8 [ 21.992720] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.993148] kasan_bitops_generic+0xa0/0x1c8 [ 21.993547] kunit_try_run_case+0x170/0x3f0 [ 21.993942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.994453] kthread+0x328/0x630 [ 21.994764] ret_from_fork+0x10/0x20 [ 21.995103] [ 21.995250] The buggy address belongs to the object at ffff00000a7446c0 [ 21.995250] which belongs to the cache kmalloc-16 of size 16 [ 21.996353] The buggy address is located 8 bytes inside of [ 21.996353] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 21.997452] [ 21.997600] The buggy address belongs to the physical page: [ 21.998108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 21.998819] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.999418] page_type: f5(slab) [ 21.999718] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.000422] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.001119] page dumped because: kasan: bad access detected [ 22.001626] [ 22.001773] Memory state around the buggy address: [ 22.002212] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.002867] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.003522] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.004175] ^ [ 22.004683] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.005338] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.005990] ================================================================== [ 21.931736] ================================================================== [ 21.932799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 21.933572] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 21.934260] [ 21.934425] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.934476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.934492] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.934510] Call trace: [ 21.934523] show_stack+0x20/0x38 (C) [ 21.934557] dump_stack_lvl+0x8c/0xd0 [ 21.934589] print_report+0x118/0x608 [ 21.934619] kasan_report+0xdc/0x128 [ 21.934648] kasan_check_range+0x100/0x1a8 [ 21.934680] __kasan_check_write+0x20/0x30 [ 21.934712] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 21.934752] kasan_bitops_generic+0x110/0x1c8 [ 21.934782] kunit_try_run_case+0x170/0x3f0 [ 21.934817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.934857] kthread+0x328/0x630 [ 21.934891] ret_from_fork+0x10/0x20 [ 21.934924] [ 21.941297] Allocated by task 319: [ 21.941627] kasan_save_stack+0x3c/0x68 [ 21.942003] kasan_save_track+0x20/0x40 [ 21.942376] kasan_save_alloc_info+0x40/0x58 [ 21.942788] __kasan_kmalloc+0xd4/0xd8 [ 21.943153] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.943595] kasan_bitops_generic+0xa0/0x1c8 [ 21.944006] kunit_try_run_case+0x170/0x3f0 [ 21.944415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.944940] kthread+0x328/0x630 [ 21.945265] ret_from_fork+0x10/0x20 [ 21.945616] [ 21.945772] The buggy address belongs to the object at ffff00000a7446c0 [ 21.945772] which belongs to the cache kmalloc-16 of size 16 [ 21.946890] The buggy address is located 8 bytes inside of [ 21.946890] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 21.948003] [ 21.948159] The buggy address belongs to the physical page: [ 21.948677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 21.949404] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.950018] page_type: f5(slab) [ 21.950331] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 21.951048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.951757] page dumped because: kasan: bad access detected [ 21.952273] [ 21.952427] Memory state around the buggy address: [ 21.952877] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.953545] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 21.954213] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.954877] ^ [ 21.955397] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.956064] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.956728] ================================================================== [ 22.105340] ================================================================== [ 22.105993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 22.106736] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.107407] [ 22.107556] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.107588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.107598] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.107608] Call trace: [ 22.107616] show_stack+0x20/0x38 (C) [ 22.107636] dump_stack_lvl+0x8c/0xd0 [ 22.107655] print_report+0x118/0x608 [ 22.107673] kasan_report+0xdc/0x128 [ 22.107692] kasan_check_range+0x100/0x1a8 [ 22.107712] __kasan_check_write+0x20/0x30 [ 22.107733] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 22.107759] kasan_bitops_generic+0x110/0x1c8 [ 22.107778] kunit_try_run_case+0x170/0x3f0 [ 22.107799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.107825] kthread+0x328/0x630 [ 22.107847] ret_from_fork+0x10/0x20 [ 22.107868] [ 22.114177] Allocated by task 319: [ 22.114493] kasan_save_stack+0x3c/0x68 [ 22.114853] kasan_save_track+0x20/0x40 [ 22.115211] kasan_save_alloc_info+0x40/0x58 [ 22.115611] __kasan_kmalloc+0xd4/0xd8 [ 22.115962] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.116387] kasan_bitops_generic+0xa0/0x1c8 [ 22.116784] kunit_try_run_case+0x170/0x3f0 [ 22.117177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.117685] kthread+0x328/0x630 [ 22.117993] ret_from_fork+0x10/0x20 [ 22.118330] [ 22.118476] The buggy address belongs to the object at ffff00000a7446c0 [ 22.118476] which belongs to the cache kmalloc-16 of size 16 [ 22.119577] The buggy address is located 8 bytes inside of [ 22.119577] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.120673] [ 22.120819] The buggy address belongs to the physical page: [ 22.121323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.122030] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.122625] page_type: f5(slab) [ 22.122923] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.123624] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.124319] page dumped because: kasan: bad access detected [ 22.124822] [ 22.124968] Memory state around the buggy address: [ 22.125406] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.126058] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.126710] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.127360] ^ [ 22.127866] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.128519] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.129168] ================================================================== [ 22.081066] ================================================================== [ 22.081723] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 22.082469] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.083130] [ 22.083279] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.083312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.083322] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.083332] Call trace: [ 22.083340] show_stack+0x20/0x38 (C) [ 22.083360] dump_stack_lvl+0x8c/0xd0 [ 22.083381] print_report+0x118/0x608 [ 22.083399] kasan_report+0xdc/0x128 [ 22.083417] __asan_report_load8_noabort+0x20/0x30 [ 22.083439] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 22.083465] kasan_bitops_generic+0x110/0x1c8 [ 22.083484] kunit_try_run_case+0x170/0x3f0 [ 22.083507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.083533] kthread+0x328/0x630 [ 22.083554] ret_from_fork+0x10/0x20 [ 22.083576] [ 22.089588] Allocated by task 319: [ 22.089904] kasan_save_stack+0x3c/0x68 [ 22.090262] kasan_save_track+0x20/0x40 [ 22.090620] kasan_save_alloc_info+0x40/0x58 [ 22.091018] __kasan_kmalloc+0xd4/0xd8 [ 22.091368] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.091794] kasan_bitops_generic+0xa0/0x1c8 [ 22.092189] kunit_try_run_case+0x170/0x3f0 [ 22.092582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.093091] kthread+0x328/0x630 [ 22.093400] ret_from_fork+0x10/0x20 [ 22.093737] [ 22.093883] The buggy address belongs to the object at ffff00000a7446c0 [ 22.093883] which belongs to the cache kmalloc-16 of size 16 [ 22.094984] The buggy address is located 8 bytes inside of [ 22.094984] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.096080] [ 22.096226] The buggy address belongs to the physical page: [ 22.096729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.097437] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.098032] page_type: f5(slab) [ 22.098330] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.099031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.099725] page dumped because: kasan: bad access detected [ 22.100229] [ 22.100375] Memory state around the buggy address: [ 22.100812] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.101464] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.102117] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.102766] ^ [ 22.103271] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.103924] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.104574] ================================================================== [ 22.007156] ================================================================== [ 22.007832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 22.008593] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.009258] [ 22.009414] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.009452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.009463] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.009475] Call trace: [ 22.009484] show_stack+0x20/0x38 (C) [ 22.009508] dump_stack_lvl+0x8c/0xd0 [ 22.009530] print_report+0x118/0x608 [ 22.009549] kasan_report+0xdc/0x128 [ 22.009568] __asan_report_load8_noabort+0x20/0x30 [ 22.009592] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 22.009618] kasan_bitops_generic+0x110/0x1c8 [ 22.009637] kunit_try_run_case+0x170/0x3f0 [ 22.009661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.009687] kthread+0x328/0x630 [ 22.009711] ret_from_fork+0x10/0x20 [ 22.009733] [ 22.015743] Allocated by task 319: [ 22.016061] kasan_save_stack+0x3c/0x68 [ 22.016423] kasan_save_track+0x20/0x40 [ 22.016782] kasan_save_alloc_info+0x40/0x58 [ 22.017181] __kasan_kmalloc+0xd4/0xd8 [ 22.017533] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.017959] kasan_bitops_generic+0xa0/0x1c8 [ 22.018356] kunit_try_run_case+0x170/0x3f0 [ 22.018747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.019255] kthread+0x328/0x630 [ 22.019563] ret_from_fork+0x10/0x20 [ 22.019902] [ 22.020047] The buggy address belongs to the object at ffff00000a7446c0 [ 22.020047] which belongs to the cache kmalloc-16 of size 16 [ 22.021149] The buggy address is located 8 bytes inside of [ 22.021149] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.022247] [ 22.022395] The buggy address belongs to the physical page: [ 22.022900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.023613] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.024211] page_type: f5(slab) [ 22.024512] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.025215] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.025909] page dumped because: kasan: bad access detected [ 22.026414] [ 22.026559] Memory state around the buggy address: [ 22.026996] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.027649] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.028303] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.028951] ^ [ 22.029458] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.030110] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.030760] ================================================================== [ 22.129931] ================================================================== [ 22.130585] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 22.131329] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.131999] [ 22.132148] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.132180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.132190] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.132200] Call trace: [ 22.132208] show_stack+0x20/0x38 (C) [ 22.132227] dump_stack_lvl+0x8c/0xd0 [ 22.132246] print_report+0x118/0x608 [ 22.132265] kasan_report+0xdc/0x128 [ 22.132284] kasan_check_range+0x100/0x1a8 [ 22.132304] __kasan_check_write+0x20/0x30 [ 22.132325] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 22.132351] kasan_bitops_generic+0x110/0x1c8 [ 22.132370] kunit_try_run_case+0x170/0x3f0 [ 22.132392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.132418] kthread+0x328/0x630 [ 22.132440] ret_from_fork+0x10/0x20 [ 22.132460] [ 22.138770] Allocated by task 319: [ 22.139084] kasan_save_stack+0x3c/0x68 [ 22.139442] kasan_save_track+0x20/0x40 [ 22.139801] kasan_save_alloc_info+0x40/0x58 [ 22.140200] __kasan_kmalloc+0xd4/0xd8 [ 22.140550] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.140975] kasan_bitops_generic+0xa0/0x1c8 [ 22.141370] kunit_try_run_case+0x170/0x3f0 [ 22.141762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.142271] kthread+0x328/0x630 [ 22.142579] ret_from_fork+0x10/0x20 [ 22.142917] [ 22.143063] The buggy address belongs to the object at ffff00000a7446c0 [ 22.143063] which belongs to the cache kmalloc-16 of size 16 [ 22.144164] The buggy address is located 8 bytes inside of [ 22.144164] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.145259] [ 22.145405] The buggy address belongs to the physical page: [ 22.145909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.146617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.147211] page_type: f5(slab) [ 22.147508] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.148208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.148903] page dumped because: kasan: bad access detected [ 22.149407] [ 22.149554] Memory state around the buggy address: [ 22.149990] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.150642] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.151294] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.151944] ^ [ 22.152451] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.153104] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.153753] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 56.265833] ================================================================== [ 56.266502] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 56.266502] [ 56.267251] Use-after-free read at 0x(____ptrval____) (in kfence-#175): [ 56.267842] test_krealloc+0x51c/0x830 [ 56.268184] kunit_try_run_case+0x170/0x3f0 [ 56.268570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.269067] kthread+0x328/0x630 [ 56.269366] ret_from_fork+0x10/0x20 [ 56.269695] [ 56.269836] kfence-#175: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 56.269836] [ 56.270689] allocated by task 395 on cpu 4 at 56.265781s (0.004907s ago): [ 56.271301] test_alloc+0x29c/0x628 [ 56.271619] test_krealloc+0xc0/0x830 [ 56.271952] kunit_try_run_case+0x170/0x3f0 [ 56.272332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.272825] kthread+0x328/0x630 [ 56.273121] ret_from_fork+0x10/0x20 [ 56.273449] [ 56.273587] freed by task 395 on cpu 4 at 56.265799s (0.007788s ago): [ 56.274168] krealloc_noprof+0x148/0x360 [ 56.274523] test_krealloc+0x1dc/0x830 [ 56.274862] kunit_try_run_case+0x170/0x3f0 [ 56.275242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.275736] kthread+0x328/0x630 [ 56.276032] ret_from_fork+0x10/0x20 [ 56.276359] [ 56.276504] CPU: 4 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 56.277387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.277762] Hardware name: Radxa ROCK Pi 4B (DT) [ 56.278174] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 56.122925] ================================================================== [ 56.123605] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 56.123605] [ 56.124479] Use-after-free read at 0x(____ptrval____) (in kfence-#173): [ 56.125070] test_memcache_typesafe_by_rcu+0x280/0x560 [ 56.125534] kunit_try_run_case+0x170/0x3f0 [ 56.125914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.126406] kthread+0x328/0x630 [ 56.126702] ret_from_fork+0x10/0x20 [ 56.127027] [ 56.127165] kfence-#173: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 56.127165] [ 56.127970] allocated by task 393 on cpu 4 at 56.057740s (0.070229s ago): [ 56.128578] test_alloc+0x230/0x628 [ 56.128893] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 56.129351] kunit_try_run_case+0x170/0x3f0 [ 56.129727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.130216] kthread+0x328/0x630 [ 56.130509] ret_from_fork+0x10/0x20 [ 56.130831] [ 56.130968] freed by task 393 on cpu 4 at 56.057748s (0.073219s ago): [ 56.131542] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 56.131999] kunit_try_run_case+0x170/0x3f0 [ 56.132375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.132865] kthread+0x328/0x630 [ 56.133157] ret_from_fork+0x10/0x20 [ 56.133479] [ 56.133623] CPU: 5 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 56.134501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.134872] Hardware name: Radxa ROCK Pi 4B (DT) [ 56.135282] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 32.880554] ================================================================== [ 32.881678] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 32.881678] [ 32.882458] Invalid read at 0x(____ptrval____): [ 32.882898] test_invalid_access+0xdc/0x1f0 [ 32.883315] kunit_try_run_case+0x170/0x3f0 [ 32.883736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.884273] kthread+0x328/0x630 [ 32.884609] ret_from_fork+0x10/0x20 [ 32.884973] [ 32.885149] CPU: 2 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 32.886348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.886966] Hardware name: Radxa ROCK Pi 4B (DT) [ 32.887405] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 32.658573] ================================================================== [ 32.659236] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.659236] [ 32.660081] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#169): [ 32.660980] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.661447] kunit_try_run_case+0x170/0x3f0 [ 32.661826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.662316] kthread+0x328/0x630 [ 32.662612] ret_from_fork+0x10/0x20 [ 32.662936] [ 32.663074] kfence-#169: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 32.663074] [ 32.663925] allocated by task 383 on cpu 4 at 32.658531s (0.005393s ago): [ 32.664530] test_alloc+0x29c/0x628 [ 32.664844] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 32.665302] kunit_try_run_case+0x170/0x3f0 [ 32.665679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.666170] kthread+0x328/0x630 [ 32.666462] ret_from_fork+0x10/0x20 [ 32.666784] [ 32.666921] freed by task 383 on cpu 4 at 32.658539s (0.008381s ago): [ 32.667498] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.667963] kunit_try_run_case+0x170/0x3f0 [ 32.668338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.668827] kthread+0x328/0x630 [ 32.669120] ret_from_fork+0x10/0x20 [ 32.669442] [ 32.669587] CPU: 4 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 32.670465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.670838] Hardware name: Radxa ROCK Pi 4B (DT) [ 32.671248] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 32.241704] ================================================================== [ 32.242385] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 32.242385] [ 32.243244] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#165): [ 32.243909] test_kmalloc_aligned_oob_read+0x238/0x468 [ 32.244370] kunit_try_run_case+0x170/0x3f0 [ 32.244751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.245241] kthread+0x328/0x630 [ 32.245538] ret_from_fork+0x10/0x20 [ 32.245862] [ 32.246000] kfence-#165: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 32.246000] [ 32.246850] allocated by task 381 on cpu 4 at 32.241677s (0.005172s ago): [ 32.247459] test_alloc+0x29c/0x628 [ 32.247773] test_kmalloc_aligned_oob_read+0x100/0x468 [ 32.248231] kunit_try_run_case+0x170/0x3f0 [ 32.248606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.249097] kthread+0x328/0x630 [ 32.249390] ret_from_fork+0x10/0x20 [ 32.249712] [ 32.249855] CPU: 4 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 32.250733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.251106] Hardware name: Radxa ROCK Pi 4B (DT) [ 32.251516] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 27.457882] ================================================================== [ 27.458548] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 27.458548] [ 27.459283] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#119): [ 27.460193] test_corruption+0x120/0x378 [ 27.460548] kunit_try_run_case+0x170/0x3f0 [ 27.460930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.461424] kthread+0x328/0x630 [ 27.461722] ret_from_fork+0x10/0x20 [ 27.462048] [ 27.462187] kfence-#119: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 27.462187] [ 27.462994] allocated by task 371 on cpu 4 at 27.457841s (0.005153s ago): [ 27.463600] test_alloc+0x230/0x628 [ 27.463915] test_corruption+0xdc/0x378 [ 27.464262] kunit_try_run_case+0x170/0x3f0 [ 27.464639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.465130] kthread+0x328/0x630 [ 27.465424] ret_from_fork+0x10/0x20 [ 27.465748] [ 27.465886] freed by task 371 on cpu 4 at 27.457849s (0.008036s ago): [ 27.466462] test_corruption+0x120/0x378 [ 27.466815] kunit_try_run_case+0x170/0x3f0 [ 27.467193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.467685] kthread+0x328/0x630 [ 27.467980] ret_from_fork+0x10/0x20 [ 27.468303] [ 27.468448] CPU: 4 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.469328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.469701] Hardware name: Radxa ROCK Pi 4B (DT) [ 27.470112] ================================================================== [ 27.353706] ================================================================== [ 27.354377] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 27.354377] [ 27.355109] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#118): [ 27.355733] test_corruption+0x284/0x378 [ 27.356086] kunit_try_run_case+0x170/0x3f0 [ 27.356466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.356957] kthread+0x328/0x630 [ 27.357253] ret_from_fork+0x10/0x20 [ 27.357577] [ 27.357715] kfence-#118: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 27.357715] [ 27.358566] allocated by task 369 on cpu 4 at 27.353654s (0.004911s ago): [ 27.359172] test_alloc+0x29c/0x628 [ 27.359485] test_corruption+0x198/0x378 [ 27.359837] kunit_try_run_case+0x170/0x3f0 [ 27.360212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.360702] kthread+0x328/0x630 [ 27.360995] ret_from_fork+0x10/0x20 [ 27.361317] [ 27.361454] freed by task 369 on cpu 4 at 27.353663s (0.007790s ago): [ 27.362030] test_corruption+0x284/0x378 [ 27.362382] kunit_try_run_case+0x170/0x3f0 [ 27.362758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.363247] kthread+0x328/0x630 [ 27.363540] ret_from_fork+0x10/0x20 [ 27.363862] [ 27.364006] CPU: 4 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.364883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.365254] Hardware name: Radxa ROCK Pi 4B (DT) [ 27.365665] ================================================================== [ 27.041704] ================================================================== [ 27.042373] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 27.042373] [ 27.043107] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#115): [ 27.044008] test_corruption+0x278/0x378 [ 27.044362] kunit_try_run_case+0x170/0x3f0 [ 27.044743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.045234] kthread+0x328/0x630 [ 27.045530] ret_from_fork+0x10/0x20 [ 27.045855] [ 27.045993] kfence-#115: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 27.045993] [ 27.046843] allocated by task 369 on cpu 4 at 27.041652s (0.005189s ago): [ 27.047449] test_alloc+0x29c/0x628 [ 27.047763] test_corruption+0xdc/0x378 [ 27.048108] kunit_try_run_case+0x170/0x3f0 [ 27.048484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.048974] kthread+0x328/0x630 [ 27.049267] ret_from_fork+0x10/0x20 [ 27.049589] [ 27.049727] freed by task 369 on cpu 4 at 27.041662s (0.008063s ago): [ 27.050303] test_corruption+0x278/0x378 [ 27.050654] kunit_try_run_case+0x170/0x3f0 [ 27.051030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.051519] kthread+0x328/0x630 [ 27.051812] ret_from_fork+0x10/0x20 [ 27.052133] [ 27.052277] CPU: 4 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.053155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.053526] Hardware name: Radxa ROCK Pi 4B (DT) [ 27.053936] ================================================================== [ 27.561612] ================================================================== [ 27.562274] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 27.562274] [ 27.563004] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#120): [ 27.563627] test_corruption+0x1d8/0x378 [ 27.563980] kunit_try_run_case+0x170/0x3f0 [ 27.564359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.564850] kthread+0x328/0x630 [ 27.565146] ret_from_fork+0x10/0x20 [ 27.565471] [ 27.565609] kfence-#120: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 27.565609] [ 27.566414] allocated by task 371 on cpu 4 at 27.561570s (0.004843s ago): [ 27.567020] test_alloc+0x230/0x628 [ 27.567335] test_corruption+0x198/0x378 [ 27.567686] kunit_try_run_case+0x170/0x3f0 [ 27.568062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.568552] kthread+0x328/0x630 [ 27.568845] ret_from_fork+0x10/0x20 [ 27.569167] [ 27.569304] freed by task 371 on cpu 4 at 27.561579s (0.007725s ago): [ 27.569879] test_corruption+0x1d8/0x378 [ 27.570231] kunit_try_run_case+0x170/0x3f0 [ 27.570606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.571097] kthread+0x328/0x630 [ 27.571390] ret_from_fork+0x10/0x20 [ 27.571712] [ 27.571855] CPU: 4 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.572732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.573105] Hardware name: Radxa ROCK Pi 4B (DT) [ 27.573515] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 26.729858] ================================================================== [ 26.730524] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 26.730524] [ 26.731270] Invalid free of 0x(____ptrval____) (in kfence-#112): [ 26.731808] test_invalid_addr_free+0xec/0x238 [ 26.732212] kunit_try_run_case+0x170/0x3f0 [ 26.732596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.733092] kthread+0x328/0x630 [ 26.733393] ret_from_fork+0x10/0x20 [ 26.733721] [ 26.733861] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 26.733861] [ 26.734670] allocated by task 367 on cpu 4 at 26.729822s (0.004847s ago): [ 26.735280] test_alloc+0x230/0x628 [ 26.735598] test_invalid_addr_free+0xd4/0x238 [ 26.735999] kunit_try_run_case+0x170/0x3f0 [ 26.736378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.736871] kthread+0x328/0x630 [ 26.737168] ret_from_fork+0x10/0x20 [ 26.737493] [ 26.737639] CPU: 4 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.738522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.738896] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.739309] ================================================================== [ 26.625929] ================================================================== [ 26.626597] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 26.626597] [ 26.627355] Invalid free of 0x(____ptrval____) (in kfence-#111): [ 26.627897] test_invalid_addr_free+0x1ac/0x238 [ 26.628311] kunit_try_run_case+0x170/0x3f0 [ 26.628698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.629198] kthread+0x328/0x630 [ 26.629500] ret_from_fork+0x10/0x20 [ 26.629831] [ 26.629973] kfence-#111: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 26.629973] [ 26.630830] allocated by task 365 on cpu 4 at 26.625892s (0.004937s ago): [ 26.631442] test_alloc+0x29c/0x628 [ 26.631763] test_invalid_addr_free+0xd4/0x238 [ 26.632168] kunit_try_run_case+0x170/0x3f0 [ 26.632551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.633048] kthread+0x328/0x630 [ 26.633348] ret_from_fork+0x10/0x20 [ 26.633678] [ 26.633825] CPU: 4 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.634713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.635089] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.635504] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 26.522171] ================================================================== [ 26.522838] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 26.522838] [ 26.523543] Invalid free of 0x(____ptrval____) (in kfence-#110): [ 26.524080] test_double_free+0x100/0x238 [ 26.524443] kunit_try_run_case+0x170/0x3f0 [ 26.524826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.525318] kthread+0x328/0x630 [ 26.525618] ret_from_fork+0x10/0x20 [ 26.525945] [ 26.526084] kfence-#110: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 26.526084] [ 26.526891] allocated by task 363 on cpu 4 at 26.522121s (0.004769s ago): [ 26.527499] test_alloc+0x230/0x628 [ 26.527814] test_double_free+0xd4/0x238 [ 26.528167] kunit_try_run_case+0x170/0x3f0 [ 26.528545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.529037] kthread+0x328/0x630 [ 26.529331] ret_from_fork+0x10/0x20 [ 26.529655] [ 26.529794] freed by task 363 on cpu 4 at 26.522130s (0.007663s ago): [ 26.530372] test_double_free+0xf0/0x238 [ 26.530724] kunit_try_run_case+0x170/0x3f0 [ 26.531101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.531594] kthread+0x328/0x630 [ 26.531888] ret_from_fork+0x10/0x20 [ 26.532212] [ 26.532357] CPU: 4 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.533238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.533612] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.534023] ================================================================== [ 26.417880] ================================================================== [ 26.418549] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 26.418549] [ 26.419256] Invalid free of 0x(____ptrval____) (in kfence-#109): [ 26.419796] test_double_free+0x1bc/0x238 [ 26.420162] kunit_try_run_case+0x170/0x3f0 [ 26.420545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.421041] kthread+0x328/0x630 [ 26.421341] ret_from_fork+0x10/0x20 [ 26.421670] [ 26.421810] kfence-#109: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 26.421810] [ 26.422664] allocated by task 361 on cpu 4 at 26.417827s (0.004835s ago): [ 26.423274] test_alloc+0x29c/0x628 [ 26.423591] test_double_free+0xd4/0x238 [ 26.423946] kunit_try_run_case+0x170/0x3f0 [ 26.424325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.424818] kthread+0x328/0x630 [ 26.425115] ret_from_fork+0x10/0x20 [ 26.425442] [ 26.425581] freed by task 361 on cpu 4 at 26.417837s (0.007743s ago): [ 26.426162] test_double_free+0x1ac/0x238 [ 26.426526] kunit_try_run_case+0x170/0x3f0 [ 26.426905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.427399] kthread+0x328/0x630 [ 26.427697] ret_from_fork+0x10/0x20 [ 26.428022] [ 26.428168] CPU: 4 UID: 0 PID: 361 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.429052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.429426] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.429840] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 26.001999] ================================================================== [ 26.002668] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 26.002668] [ 26.003503] Use-after-free read at 0x(____ptrval____) (in kfence-#105): [ 26.004097] test_use_after_free_read+0x114/0x248 [ 26.004526] kunit_try_run_case+0x170/0x3f0 [ 26.004913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.005411] kthread+0x328/0x630 [ 26.005715] ret_from_fork+0x10/0x20 [ 26.006045] [ 26.006187] kfence-#105: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 26.006187] [ 26.007043] allocated by task 353 on cpu 4 at 26.001960s (0.005081s ago): [ 26.007659] test_alloc+0x29c/0x628 [ 26.007979] test_use_after_free_read+0xd0/0x248 [ 26.008398] kunit_try_run_case+0x170/0x3f0 [ 26.008781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.009278] kthread+0x328/0x630 [ 26.009577] ret_from_fork+0x10/0x20 [ 26.009905] [ 26.010046] freed by task 353 on cpu 4 at 26.001969s (0.008076s ago): [ 26.010631] test_use_after_free_read+0x1c0/0x248 [ 26.011057] kunit_try_run_case+0x170/0x3f0 [ 26.011440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.011936] kthread+0x328/0x630 [ 26.012236] ret_from_fork+0x10/0x20 [ 26.012564] [ 26.012711] CPU: 4 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.013599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.013976] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.014391] ================================================================== [ 26.105972] ================================================================== [ 26.106640] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 26.106640] [ 26.107470] Use-after-free read at 0x(____ptrval____) (in kfence-#106): [ 26.108058] test_use_after_free_read+0x114/0x248 [ 26.108483] kunit_try_run_case+0x170/0x3f0 [ 26.108865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.109359] kthread+0x328/0x630 [ 26.109657] ret_from_fork+0x10/0x20 [ 26.109983] [ 26.110123] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 26.110123] [ 26.110929] allocated by task 355 on cpu 4 at 26.105931s (0.004997s ago): [ 26.111539] test_alloc+0x230/0x628 [ 26.111856] test_use_after_free_read+0xd0/0x248 [ 26.112270] kunit_try_run_case+0x170/0x3f0 [ 26.112649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.113140] kthread+0x328/0x630 [ 26.113435] ret_from_fork+0x10/0x20 [ 26.113759] [ 26.113896] freed by task 355 on cpu 4 at 26.105939s (0.007956s ago): [ 26.114474] test_use_after_free_read+0xf0/0x248 [ 26.114887] kunit_try_run_case+0x170/0x3f0 [ 26.115264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.115755] kthread+0x328/0x630 [ 26.116049] ret_from_fork+0x10/0x20 [ 26.116373] [ 26.116518] CPU: 4 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.117398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.117770] Hardware name: Radxa ROCK Pi 4B (DT) [ 26.118181] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 25.897705] ================================================================== [ 25.898381] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 25.898381] [ 25.899210] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#104): [ 25.899859] test_out_of_bounds_write+0x100/0x240 [ 25.900282] kunit_try_run_case+0x170/0x3f0 [ 25.900664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.901155] kthread+0x328/0x630 [ 25.901452] ret_from_fork+0x10/0x20 [ 25.901777] [ 25.901915] kfence-#104: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 25.901915] [ 25.902720] allocated by task 351 on cpu 4 at 25.897674s (0.005044s ago): [ 25.903328] test_alloc+0x230/0x628 [ 25.903643] test_out_of_bounds_write+0xc8/0x240 [ 25.904056] kunit_try_run_case+0x170/0x3f0 [ 25.904432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.904923] kthread+0x328/0x630 [ 25.905216] ret_from_fork+0x10/0x20 [ 25.905539] [ 25.905682] CPU: 4 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.906560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.906931] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.907341] ================================================================== [ 25.689706] ================================================================== [ 25.690381] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 25.690381] [ 25.691208] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#102): [ 25.691857] test_out_of_bounds_write+0x100/0x240 [ 25.692280] kunit_try_run_case+0x170/0x3f0 [ 25.692661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.693154] kthread+0x328/0x630 [ 25.693451] ret_from_fork+0x10/0x20 [ 25.693776] [ 25.693915] kfence-#102: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 25.693915] [ 25.694765] allocated by task 349 on cpu 4 at 25.689678s (0.005086s ago): [ 25.695372] test_alloc+0x29c/0x628 [ 25.695686] test_out_of_bounds_write+0xc8/0x240 [ 25.696098] kunit_try_run_case+0x170/0x3f0 [ 25.696474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.696964] kthread+0x328/0x630 [ 25.697257] ret_from_fork+0x10/0x20 [ 25.697579] [ 25.697723] CPU: 4 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.698602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.698973] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.699383] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 19.166114] ================================================================== [ 19.167191] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 19.167902] Write of size 1 at addr ffff00000e7be00a by task kunit_try_catch/204 [ 19.168586] [ 19.168749] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.168798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.168812] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.168828] Call trace: [ 19.168840] show_stack+0x20/0x38 (C) [ 19.168871] dump_stack_lvl+0x8c/0xd0 [ 19.168902] print_report+0x118/0x608 [ 19.168931] kasan_report+0xdc/0x128 [ 19.168959] __asan_report_store1_noabort+0x20/0x30 [ 19.168993] kmalloc_large_oob_right+0x278/0x2b8 [ 19.169027] kunit_try_run_case+0x170/0x3f0 [ 19.169062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.169101] kthread+0x328/0x630 [ 19.169135] ret_from_fork+0x10/0x20 [ 19.169168] [ 19.174797] The buggy address belongs to the physical page: [ 19.175313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe7bc [ 19.176037] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.176740] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.177391] page_type: f8(unknown) [ 19.177728] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.178442] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.179156] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.179877] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.180600] head: 03fffe0000000002 fffffdffc039ef01 00000000ffffffff 00000000ffffffff [ 19.181322] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.182037] page dumped because: kasan: bad access detected [ 19.182551] [ 19.182703] Memory state around the buggy address: [ 19.183151] ffff00000e7bdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.183816] ffff00000e7bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.184481] >ffff00000e7be000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.185141] ^ [ 19.185476] ffff00000e7be080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.186141] ffff00000e7be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.186802] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 24.337846] ================================================================== [ 24.338519] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 24.338519] [ 24.339344] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#89): [ 24.339987] test_out_of_bounds_read+0x114/0x3e0 [ 24.340414] kunit_try_run_case+0x170/0x3f0 [ 24.340805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.341309] kthread+0x328/0x630 [ 24.341615] ret_from_fork+0x10/0x20 [ 24.341950] [ 24.342094] kfence-#89: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 24.342094] [ 24.342947] allocated by task 345 on cpu 4 at 24.337819s (0.005127s ago): [ 24.343568] test_alloc+0x29c/0x628 [ 24.343892] test_out_of_bounds_read+0xdc/0x3e0 [ 24.344307] kunit_try_run_case+0x170/0x3f0 [ 24.344693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.345195] kthread+0x328/0x630 [ 24.345499] ret_from_fork+0x10/0x20 [ 24.345832] [ 24.345982] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.346875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.347254] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.347673] ================================================================== [ 24.753870] ================================================================== [ 24.754538] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 24.754538] [ 24.755353] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#93): [ 24.755989] test_out_of_bounds_read+0x114/0x3e0 [ 24.756406] kunit_try_run_case+0x170/0x3f0 [ 24.756789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.757283] kthread+0x328/0x630 [ 24.757581] ret_from_fork+0x10/0x20 [ 24.757907] [ 24.758046] kfence-#93: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 24.758046] [ 24.758844] allocated by task 347 on cpu 4 at 24.753845s (0.004998s ago): [ 24.759454] test_alloc+0x230/0x628 [ 24.759771] test_out_of_bounds_read+0xdc/0x3e0 [ 24.760176] kunit_try_run_case+0x170/0x3f0 [ 24.760553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.761046] kthread+0x328/0x630 [ 24.761340] ret_from_fork+0x10/0x20 [ 24.761664] [ 24.761809] CPU: 4 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.762689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.763063] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.763474] ================================================================== [ 24.649707] ================================================================== [ 24.650379] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 24.650379] [ 24.651192] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#92): [ 24.651840] test_out_of_bounds_read+0x1c8/0x3e0 [ 24.652253] kunit_try_run_case+0x170/0x3f0 [ 24.652635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.653127] kthread+0x328/0x630 [ 24.653424] ret_from_fork+0x10/0x20 [ 24.653748] [ 24.653886] kfence-#92: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 24.653886] [ 24.654727] allocated by task 345 on cpu 4 at 24.649676s (0.005050s ago): [ 24.655335] test_alloc+0x29c/0x628 [ 24.655648] test_out_of_bounds_read+0x198/0x3e0 [ 24.656061] kunit_try_run_case+0x170/0x3f0 [ 24.656438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.656929] kthread+0x328/0x630 [ 24.657222] ret_from_fork+0x10/0x20 [ 24.657544] [ 24.657688] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.658566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.658938] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.659348] ================================================================== [ 25.377675] ================================================================== [ 25.378348] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 25.378348] [ 25.379162] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#99): [ 25.379810] test_out_of_bounds_read+0x1c8/0x3e0 [ 25.380224] kunit_try_run_case+0x170/0x3f0 [ 25.380606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.381097] kthread+0x328/0x630 [ 25.381395] ret_from_fork+0x10/0x20 [ 25.381719] [ 25.381857] kfence-#99: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 25.381857] [ 25.382654] allocated by task 347 on cpu 4 at 25.377648s (0.005005s ago): [ 25.383262] test_alloc+0x230/0x628 [ 25.383576] test_out_of_bounds_read+0x198/0x3e0 [ 25.383988] kunit_try_run_case+0x170/0x3f0 [ 25.384364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.384854] kthread+0x328/0x630 [ 25.385147] ret_from_fork+0x10/0x20 [ 25.385470] [ 25.385613] CPU: 4 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.386490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.386861] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.387271] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 19.114689] ================================================================== [ 19.116779] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 19.116779] [ 19.117667] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#59): [ 19.118721] kmalloc_track_caller_oob_right+0x224/0x488 [ 19.119225] kunit_try_run_case+0x170/0x3f0 [ 19.119634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.120159] kthread+0x328/0x630 [ 19.120484] ret_from_fork+0x10/0x20 [ 19.120834] [ 19.120988] kfence-#59: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 19.120988] [ 19.121877] allocated by task 200 on cpu 2 at 19.114273s (0.007602s ago): [ 19.122520] kmalloc_track_caller_oob_right+0x184/0x488 [ 19.123023] kunit_try_run_case+0x170/0x3f0 [ 19.123428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.123951] kthread+0x328/0x630 [ 19.124273] ret_from_fork+0x10/0x20 [ 19.124623] [ 19.124775] freed by task 200 on cpu 2 at 19.114647s (0.010126s ago): [ 19.125390] kmalloc_track_caller_oob_right+0x224/0x488 [ 19.125891] kunit_try_run_case+0x170/0x3f0 [ 19.126296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.126819] kthread+0x328/0x630 [ 19.127140] ret_from_fork+0x10/0x20 [ 19.127489] [ 19.127652] CPU: 2 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.128573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.128965] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.129397] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-cs_dsp_mock_bin_add_name_or_infoisra
[ 94.668110] ================================================================== [ 94.669311] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348 [ 94.670155] Read of size 12 at addr ffff800084d44de0 by task kunit_try_catch/3379 [ 94.670849] [ 94.671016] CPU: 0 UID: 0 PID: 3379 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT [ 94.671061] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 94.671075] Hardware name: Radxa ROCK Pi 4B (DT) [ 94.671089] Call trace: [ 94.671101] show_stack+0x20/0x38 (C) [ 94.671136] dump_stack_lvl+0x8c/0xd0 [ 94.671166] print_report+0x310/0x608 [ 94.671196] kasan_report+0xdc/0x128 [ 94.671223] kasan_check_range+0x100/0x1a8 [ 94.671253] __asan_memcpy+0x3c/0x98 [ 94.671283] cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348 [ 94.671315] cs_dsp_mock_bin_add_info+0x18/0x30 [ 94.671342] bin_patch_name_and_info+0x168/0x6b0 [ 94.671373] kunit_try_run_case+0x170/0x3f0 [ 94.671406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.671441] kthread+0x328/0x630 [ 94.671475] ret_from_fork+0x10/0x20 [ 94.671506] [ 94.678469] The buggy address belongs to the variable: [ 94.678943] __loc.0+0x2c0/0x3a0 [ 94.679268] [ 94.679435] The buggy address belongs to the virtual mapping at [ 94.679435] [ffff800083a50000, ffff800085760000) created by: [ 94.679435] paging_init+0x620/0x7d0 [ 94.680808] [ 94.680885] dwmmc_rockchip fe310000.mmc: IDMAC supports 32-bit address mode. [ 94.680960] The buggy address belongs to the physical page: [ 94.681669] dwmmc_rockchip fe310000.mmc: Using internal DMA controller. [ 94.682081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7544 [ 94.682669] dwmmc_rockchip fe310000.mmc: Version ID is 270a [ 94.683350] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 94.683897] dwmmc_rockchip fe310000.mmc: DW MMC controller at irq 49,32 bit host data width,256 deep fifo [ 94.684496] raw: 03fffe0000002000 fffffdffc01d5108 fffffdffc01d5108 0000000000000000 [ 94.686014] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 94.686714] page dumped because: kasan: bad access detected [ 94.687225] [ 94.687379] Memory state around the buggy address: [ 94.687826] ffff800084d44c80: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9 [ 94.688486] ffff800084d44d00: f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9 [ 94.689147] >ffff800084d44d80: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 94.689802] ^ [ 94.690407] ffff800084d44e00: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9 [ 94.691066] ffff800084d44e80: 00 f9 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 [ 94.691722] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 24.206382] ================================================================== [ 24.207037] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 24.207663] Write of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343 [ 24.208348] [ 24.208498] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.208529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.208539] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.208550] Call trace: [ 24.208557] show_stack+0x20/0x38 (C) [ 24.208578] dump_stack_lvl+0x8c/0xd0 [ 24.208596] print_report+0x118/0x608 [ 24.208615] kasan_report+0xdc/0x128 [ 24.208633] kasan_check_range+0x100/0x1a8 [ 24.208654] __kasan_check_write+0x20/0x30 [ 24.208675] strncpy_from_user+0x3c/0x2a0 [ 24.208693] copy_user_test_oob+0x5c0/0xec8 [ 24.208711] kunit_try_run_case+0x170/0x3f0 [ 24.208733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.208760] kthread+0x328/0x630 [ 24.208782] ret_from_fork+0x10/0x20 [ 24.208802] [ 24.214984] Allocated by task 343: [ 24.215300] kasan_save_stack+0x3c/0x68 [ 24.215659] kasan_save_track+0x20/0x40 [ 24.216016] kasan_save_alloc_info+0x40/0x58 [ 24.216415] __kasan_kmalloc+0xd4/0xd8 [ 24.216766] __kmalloc_noprof+0x190/0x4d0 [ 24.217140] kunit_kmalloc_array+0x34/0x88 [ 24.217525] copy_user_test_oob+0xac/0xec8 [ 24.217905] kunit_try_run_case+0x170/0x3f0 [ 24.218297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.218805] kthread+0x328/0x630 [ 24.219114] ret_from_fork+0x10/0x20 [ 24.219451] [ 24.219598] The buggy address belongs to the object at ffff00000c98ed00 [ 24.219598] which belongs to the cache kmalloc-128 of size 128 [ 24.220714] The buggy address is located 0 bytes inside of [ 24.220714] allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78) [ 24.221824] [ 24.221971] The buggy address belongs to the physical page: [ 24.222475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 24.223182] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.223776] page_type: f5(slab) [ 24.224075] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 24.224776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.225472] page dumped because: kasan: bad access detected [ 24.225975] [ 24.226122] Memory state around the buggy address: [ 24.226559] ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.227211] ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.227863] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.228512] ^ [ 24.229157] ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.229810] ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.230460] ================================================================== [ 24.231238] ================================================================== [ 24.231893] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 24.232524] Write of size 1 at addr ffff00000c98ed78 by task kunit_try_catch/343 [ 24.233194] [ 24.233343] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.233376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.233386] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.233396] Call trace: [ 24.233404] show_stack+0x20/0x38 (C) [ 24.233424] dump_stack_lvl+0x8c/0xd0 [ 24.233443] print_report+0x118/0x608 [ 24.233462] kasan_report+0xdc/0x128 [ 24.233480] __asan_report_store1_noabort+0x20/0x30 [ 24.233503] strncpy_from_user+0x270/0x2a0 [ 24.233521] copy_user_test_oob+0x5c0/0xec8 [ 24.233539] kunit_try_run_case+0x170/0x3f0 [ 24.233562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.233588] kthread+0x328/0x630 [ 24.233610] ret_from_fork+0x10/0x20 [ 24.233631] [ 24.239527] Allocated by task 343: [ 24.239843] kasan_save_stack+0x3c/0x68 [ 24.240203] kasan_save_track+0x20/0x40 [ 24.240561] kasan_save_alloc_info+0x40/0x58 [ 24.240961] __kasan_kmalloc+0xd4/0xd8 [ 24.241311] __kmalloc_noprof+0x190/0x4d0 [ 24.241685] kunit_kmalloc_array+0x34/0x88 [ 24.242069] copy_user_test_oob+0xac/0xec8 [ 24.242449] kunit_try_run_case+0x170/0x3f0 [ 24.242840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.243349] kthread+0x328/0x630 [ 24.243659] ret_from_fork+0x10/0x20 [ 24.243996] [ 24.244143] The buggy address belongs to the object at ffff00000c98ed00 [ 24.244143] which belongs to the cache kmalloc-128 of size 128 [ 24.245259] The buggy address is located 0 bytes to the right of [ 24.245259] allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78) [ 24.246415] [ 24.246561] The buggy address belongs to the physical page: [ 24.247065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 24.247772] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.248367] page_type: f5(slab) [ 24.248665] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 24.249366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.250060] page dumped because: kasan: bad access detected [ 24.250565] [ 24.250710] Memory state around the buggy address: [ 24.251147] ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.251799] ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.252451] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.253101] ^ [ 24.253744] ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.254397] ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.255047] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 24.056969] ================================================================== [ 24.058211] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 24.058898] Write of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343 [ 24.059602] [ 24.059768] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.059821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.059837] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.059855] Call trace: [ 24.059868] show_stack+0x20/0x38 (C) [ 24.059901] dump_stack_lvl+0x8c/0xd0 [ 24.059934] print_report+0x118/0x608 [ 24.059964] kasan_report+0xdc/0x128 [ 24.059993] kasan_check_range+0x100/0x1a8 [ 24.060027] __kasan_check_write+0x20/0x30 [ 24.060060] copy_user_test_oob+0x234/0xec8 [ 24.060088] kunit_try_run_case+0x170/0x3f0 [ 24.060125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.060165] kthread+0x328/0x630 [ 24.060201] ret_from_fork+0x10/0x20 [ 24.060235] [ 24.066123] Allocated by task 343: [ 24.066453] kasan_save_stack+0x3c/0x68 [ 24.066831] kasan_save_track+0x20/0x40 [ 24.067204] kasan_save_alloc_info+0x40/0x58 [ 24.067620] __kasan_kmalloc+0xd4/0xd8 [ 24.067984] __kmalloc_noprof+0x190/0x4d0 [ 24.068373] kunit_kmalloc_array+0x34/0x88 [ 24.068776] copy_user_test_oob+0xac/0xec8 [ 24.069171] kunit_try_run_case+0x170/0x3f0 [ 24.069579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.070106] kthread+0x328/0x630 [ 24.070430] ret_from_fork+0x10/0x20 [ 24.070781] [ 24.070936] The buggy address belongs to the object at ffff00000c98ed00 [ 24.070936] which belongs to the cache kmalloc-128 of size 128 [ 24.072072] The buggy address is located 0 bytes inside of [ 24.072072] allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78) [ 24.073201] [ 24.073356] The buggy address belongs to the physical page: [ 24.073875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 24.074600] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.075213] page_type: f5(slab) [ 24.075528] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 24.076246] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.076956] page dumped because: kasan: bad access detected [ 24.077472] [ 24.077627] Memory state around the buggy address: [ 24.078078] ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.078746] ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.079414] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.080078] ^ [ 24.080735] ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.081403] ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.082068] ================================================================== [ 24.107767] ================================================================== [ 24.108430] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 24.109078] Write of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343 [ 24.109766] [ 24.109923] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.109961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.109972] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.109985] Call trace: [ 24.109995] show_stack+0x20/0x38 (C) [ 24.110019] dump_stack_lvl+0x8c/0xd0 [ 24.110042] print_report+0x118/0x608 [ 24.110064] kasan_report+0xdc/0x128 [ 24.110085] kasan_check_range+0x100/0x1a8 [ 24.110109] __kasan_check_write+0x20/0x30 [ 24.110133] copy_user_test_oob+0x35c/0xec8 [ 24.110153] kunit_try_run_case+0x170/0x3f0 [ 24.110179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.110208] kthread+0x328/0x630 [ 24.110232] ret_from_fork+0x10/0x20 [ 24.110257] [ 24.116095] Allocated by task 343: [ 24.116412] kasan_save_stack+0x3c/0x68 [ 24.116775] kasan_save_track+0x20/0x40 [ 24.117136] kasan_save_alloc_info+0x40/0x58 [ 24.117538] __kasan_kmalloc+0xd4/0xd8 [ 24.117893] __kmalloc_noprof+0x190/0x4d0 [ 24.118270] kunit_kmalloc_array+0x34/0x88 [ 24.118658] copy_user_test_oob+0xac/0xec8 [ 24.119042] kunit_try_run_case+0x170/0x3f0 [ 24.119436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.119947] kthread+0x328/0x630 [ 24.120258] ret_from_fork+0x10/0x20 [ 24.120598] [ 24.120744] The buggy address belongs to the object at ffff00000c98ed00 [ 24.120744] which belongs to the cache kmalloc-128 of size 128 [ 24.121864] The buggy address is located 0 bytes inside of [ 24.121864] allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78) [ 24.122978] [ 24.123126] The buggy address belongs to the physical page: [ 24.123634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 24.124347] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.124947] page_type: f5(slab) [ 24.125249] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 24.125953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.126653] page dumped because: kasan: bad access detected [ 24.127161] [ 24.127308] Memory state around the buggy address: [ 24.127747] ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.128404] ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.129059] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.129711] ^ [ 24.130358] ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.131014] ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.131666] ================================================================== [ 24.082940] ================================================================== [ 24.083619] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 24.084281] Read of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343 [ 24.084963] [ 24.085119] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.085157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.085168] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.085181] Call trace: [ 24.085191] show_stack+0x20/0x38 (C) [ 24.085215] dump_stack_lvl+0x8c/0xd0 [ 24.085239] print_report+0x118/0x608 [ 24.085261] kasan_report+0xdc/0x128 [ 24.085282] kasan_check_range+0x100/0x1a8 [ 24.085305] __kasan_check_read+0x20/0x30 [ 24.085329] copy_user_test_oob+0x728/0xec8 [ 24.085349] kunit_try_run_case+0x170/0x3f0 [ 24.085375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.085404] kthread+0x328/0x630 [ 24.085429] ret_from_fork+0x10/0x20 [ 24.085455] [ 24.091289] Allocated by task 343: [ 24.091611] kasan_save_stack+0x3c/0x68 [ 24.091976] kasan_save_track+0x20/0x40 [ 24.092338] kasan_save_alloc_info+0x40/0x58 [ 24.092740] __kasan_kmalloc+0xd4/0xd8 [ 24.093094] __kmalloc_noprof+0x190/0x4d0 [ 24.093473] kunit_kmalloc_array+0x34/0x88 [ 24.093862] copy_user_test_oob+0xac/0xec8 [ 24.094247] kunit_try_run_case+0x170/0x3f0 [ 24.094642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.095152] kthread+0x328/0x630 [ 24.095466] ret_from_fork+0x10/0x20 [ 24.095804] [ 24.095952] The buggy address belongs to the object at ffff00000c98ed00 [ 24.095952] which belongs to the cache kmalloc-128 of size 128 [ 24.097072] The buggy address is located 0 bytes inside of [ 24.097072] allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78) [ 24.098186] [ 24.098334] The buggy address belongs to the physical page: [ 24.098843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 24.099555] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.100156] page_type: f5(slab) [ 24.100459] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 24.101162] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.101860] page dumped because: kasan: bad access detected [ 24.102367] [ 24.102515] Memory state around the buggy address: [ 24.102955] ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.103611] ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.104266] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.104918] ^ [ 24.105564] ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.106219] ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.106872] ================================================================== [ 24.181822] ================================================================== [ 24.182477] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 24.183117] Read of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343 [ 24.183794] [ 24.183942] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.183974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.183984] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.183995] Call trace: [ 24.184002] show_stack+0x20/0x38 (C) [ 24.184023] dump_stack_lvl+0x8c/0xd0 [ 24.184042] print_report+0x118/0x608 [ 24.184061] kasan_report+0xdc/0x128 [ 24.184079] kasan_check_range+0x100/0x1a8 [ 24.184100] __kasan_check_read+0x20/0x30 [ 24.184121] copy_user_test_oob+0x4a0/0xec8 [ 24.184139] kunit_try_run_case+0x170/0x3f0 [ 24.184161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.184188] kthread+0x328/0x630 [ 24.184209] ret_from_fork+0x10/0x20 [ 24.184230] [ 24.190052] Allocated by task 343: [ 24.190368] kasan_save_stack+0x3c/0x68 [ 24.190726] kasan_save_track+0x20/0x40 [ 24.191084] kasan_save_alloc_info+0x40/0x58 [ 24.191483] __kasan_kmalloc+0xd4/0xd8 [ 24.191834] __kmalloc_noprof+0x190/0x4d0 [ 24.192207] kunit_kmalloc_array+0x34/0x88 [ 24.192591] copy_user_test_oob+0xac/0xec8 [ 24.192971] kunit_try_run_case+0x170/0x3f0 [ 24.193363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.193872] kthread+0x328/0x630 [ 24.194181] ret_from_fork+0x10/0x20 [ 24.194519] [ 24.194664] The buggy address belongs to the object at ffff00000c98ed00 [ 24.194664] which belongs to the cache kmalloc-128 of size 128 [ 24.195780] The buggy address is located 0 bytes inside of [ 24.195780] allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78) [ 24.196892] [ 24.197038] The buggy address belongs to the physical page: [ 24.197542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 24.198250] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.198845] page_type: f5(slab) [ 24.199143] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 24.199844] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.200539] page dumped because: kasan: bad access detected [ 24.201043] [ 24.201189] Memory state around the buggy address: [ 24.201626] ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.202278] ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.202931] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.203580] ^ [ 24.204225] ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.204878] ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.205528] ================================================================== [ 24.157295] ================================================================== [ 24.157950] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 24.158588] Write of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343 [ 24.159273] [ 24.159423] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.159456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.159465] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.159476] Call trace: [ 24.159483] show_stack+0x20/0x38 (C) [ 24.159505] dump_stack_lvl+0x8c/0xd0 [ 24.159523] print_report+0x118/0x608 [ 24.159542] kasan_report+0xdc/0x128 [ 24.159561] kasan_check_range+0x100/0x1a8 [ 24.159581] __kasan_check_write+0x20/0x30 [ 24.159602] copy_user_test_oob+0x434/0xec8 [ 24.159620] kunit_try_run_case+0x170/0x3f0 [ 24.159642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.159669] kthread+0x328/0x630 [ 24.159691] ret_from_fork+0x10/0x20 [ 24.159712] [ 24.165545] Allocated by task 343: [ 24.165862] kasan_save_stack+0x3c/0x68 [ 24.166223] kasan_save_track+0x20/0x40 [ 24.166581] kasan_save_alloc_info+0x40/0x58 [ 24.166980] __kasan_kmalloc+0xd4/0xd8 [ 24.167331] __kmalloc_noprof+0x190/0x4d0 [ 24.167706] kunit_kmalloc_array+0x34/0x88 [ 24.168091] copy_user_test_oob+0xac/0xec8 [ 24.168470] kunit_try_run_case+0x170/0x3f0 [ 24.168862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.169371] kthread+0x328/0x630 [ 24.169680] ret_from_fork+0x10/0x20 [ 24.170018] [ 24.170165] The buggy address belongs to the object at ffff00000c98ed00 [ 24.170165] which belongs to the cache kmalloc-128 of size 128 [ 24.171281] The buggy address is located 0 bytes inside of [ 24.171281] allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78) [ 24.172393] [ 24.172539] The buggy address belongs to the physical page: [ 24.173043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 24.173751] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.174346] page_type: f5(slab) [ 24.174644] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 24.175345] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.176041] page dumped because: kasan: bad access detected [ 24.176546] [ 24.176692] Memory state around the buggy address: [ 24.177130] ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.177782] ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.178434] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.179084] ^ [ 24.179727] ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.180381] ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.181030] ================================================================== [ 24.132667] ================================================================== [ 24.133343] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 24.133993] Read of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343 [ 24.134675] [ 24.134830] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.134867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.134877] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.134890] Call trace: [ 24.134898] show_stack+0x20/0x38 (C) [ 24.134922] dump_stack_lvl+0x8c/0xd0 [ 24.134944] print_report+0x118/0x608 [ 24.134964] kasan_report+0xdc/0x128 [ 24.134983] kasan_check_range+0x100/0x1a8 [ 24.135003] __kasan_check_read+0x20/0x30 [ 24.135025] copy_user_test_oob+0x3c8/0xec8 [ 24.135043] kunit_try_run_case+0x170/0x3f0 [ 24.135067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.135094] kthread+0x328/0x630 [ 24.135117] ret_from_fork+0x10/0x20 [ 24.135138] [ 24.140969] Allocated by task 343: [ 24.141286] kasan_save_stack+0x3c/0x68 [ 24.141649] kasan_save_track+0x20/0x40 [ 24.142008] kasan_save_alloc_info+0x40/0x58 [ 24.142408] __kasan_kmalloc+0xd4/0xd8 [ 24.142759] __kmalloc_noprof+0x190/0x4d0 [ 24.143135] kunit_kmalloc_array+0x34/0x88 [ 24.143520] copy_user_test_oob+0xac/0xec8 [ 24.143901] kunit_try_run_case+0x170/0x3f0 [ 24.144293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.144802] kthread+0x328/0x630 [ 24.145111] ret_from_fork+0x10/0x20 [ 24.145448] [ 24.145595] The buggy address belongs to the object at ffff00000c98ed00 [ 24.145595] which belongs to the cache kmalloc-128 of size 128 [ 24.146713] The buggy address is located 0 bytes inside of [ 24.146713] allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78) [ 24.147825] [ 24.147972] The buggy address belongs to the physical page: [ 24.148477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 24.149189] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.149785] page_type: f5(slab) [ 24.150086] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 24.150788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.151484] page dumped because: kasan: bad access detected [ 24.151989] [ 24.152136] Memory state around the buggy address: [ 24.152574] ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.153226] ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.153879] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.154528] ^ [ 24.155174] ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.155827] ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.156478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 24.026331] ================================================================== [ 24.027007] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 24.027699] Write of size 8 at addr ffff00000c992d78 by task kunit_try_catch/339 [ 24.028373] [ 24.028531] CPU: 3 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.028568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.028579] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.028593] Call trace: [ 24.028602] show_stack+0x20/0x38 (C) [ 24.028627] dump_stack_lvl+0x8c/0xd0 [ 24.028651] print_report+0x118/0x608 [ 24.028674] kasan_report+0xdc/0x128 [ 24.028695] kasan_check_range+0x100/0x1a8 [ 24.028718] __kasan_check_write+0x20/0x30 [ 24.028742] copy_to_kernel_nofault+0x8c/0x250 [ 24.028763] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 24.028790] kunit_try_run_case+0x170/0x3f0 [ 24.028816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.028845] kthread+0x328/0x630 [ 24.028870] ret_from_fork+0x10/0x20 [ 24.028895] [ 24.035188] Allocated by task 339: [ 24.035509] kasan_save_stack+0x3c/0x68 [ 24.035873] kasan_save_track+0x20/0x40 [ 24.036234] kasan_save_alloc_info+0x40/0x58 [ 24.036637] __kasan_kmalloc+0xd4/0xd8 [ 24.036989] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.037418] copy_to_kernel_nofault_oob+0xc8/0x418 [ 24.037867] kunit_try_run_case+0x170/0x3f0 [ 24.038262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.038773] kthread+0x328/0x630 [ 24.039084] ret_from_fork+0x10/0x20 [ 24.039425] [ 24.039573] The buggy address belongs to the object at ffff00000c992d00 [ 24.039573] which belongs to the cache kmalloc-128 of size 128 [ 24.040692] The buggy address is located 0 bytes to the right of [ 24.040692] allocated 120-byte region [ffff00000c992d00, ffff00000c992d78) [ 24.041851] [ 24.041999] The buggy address belongs to the physical page: [ 24.042507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 24.043220] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.043819] page_type: f5(slab) [ 24.044120] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 24.044823] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.045522] page dumped because: kasan: bad access detected [ 24.046029] [ 24.046175] Memory state around the buggy address: [ 24.046615] ffff00000c992c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.047271] ffff00000c992c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.047926] >ffff00000c992d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.048578] ^ [ 24.049224] ffff00000c992d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.049879] ffff00000c992e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.050533] ================================================================== [ 24.000387] ================================================================== [ 24.001759] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 24.002463] Read of size 8 at addr ffff00000c992d78 by task kunit_try_catch/339 [ 24.003142] [ 24.003309] CPU: 3 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.003360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.003376] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.003395] Call trace: [ 24.003408] show_stack+0x20/0x38 (C) [ 24.003442] dump_stack_lvl+0x8c/0xd0 [ 24.003475] print_report+0x118/0x608 [ 24.003508] kasan_report+0xdc/0x128 [ 24.003537] __asan_report_load8_noabort+0x20/0x30 [ 24.003572] copy_to_kernel_nofault+0x204/0x250 [ 24.003603] copy_to_kernel_nofault_oob+0x158/0x418 [ 24.003640] kunit_try_run_case+0x170/0x3f0 [ 24.003677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.003717] kthread+0x328/0x630 [ 24.003752] ret_from_fork+0x10/0x20 [ 24.003786] [ 24.009829] Allocated by task 339: [ 24.010165] kasan_save_stack+0x3c/0x68 [ 24.010544] kasan_save_track+0x20/0x40 [ 24.010919] kasan_save_alloc_info+0x40/0x58 [ 24.011333] __kasan_kmalloc+0xd4/0xd8 [ 24.011698] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.012141] copy_to_kernel_nofault_oob+0xc8/0x418 [ 24.012604] kunit_try_run_case+0x170/0x3f0 [ 24.013013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.013539] kthread+0x328/0x630 [ 24.013867] ret_from_fork+0x10/0x20 [ 24.014218] [ 24.014372] The buggy address belongs to the object at ffff00000c992d00 [ 24.014372] which belongs to the cache kmalloc-128 of size 128 [ 24.015507] The buggy address is located 0 bytes to the right of [ 24.015507] allocated 120-byte region [ffff00000c992d00, ffff00000c992d78) [ 24.016683] [ 24.016839] The buggy address belongs to the physical page: [ 24.017357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 24.018081] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.018697] page_type: f5(slab) [ 24.019012] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 24.019729] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.020438] page dumped because: kasan: bad access detected [ 24.020955] [ 24.021108] Memory state around the buggy address: [ 24.021559] ffff00000c992c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.022227] ffff00000c992c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.022896] >ffff00000c992d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.023560] ^ [ 24.024216] ffff00000c992d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.024884] ffff00000c992e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.025547] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 23.965501] ================================================================== [ 23.966174] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 23.966817] Read of size 1 at addr ffff800087e9c7f8 by task kunit_try_catch/327 [ 23.967496] [ 23.967661] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.967713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.967728] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.967745] Call trace: [ 23.967758] show_stack+0x20/0x38 (C) [ 23.967790] dump_stack_lvl+0x8c/0xd0 [ 23.967822] print_report+0x310/0x608 [ 23.967852] kasan_report+0xdc/0x128 [ 23.967882] __asan_report_load1_noabort+0x20/0x30 [ 23.967917] vmalloc_oob+0x51c/0x5d0 [ 23.967950] kunit_try_run_case+0x170/0x3f0 [ 23.967986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.968026] kthread+0x328/0x630 [ 23.968063] ret_from_fork+0x10/0x20 [ 23.968096] [ 23.973633] The buggy address belongs to the virtual mapping at [ 23.973633] [ffff800087e9c000, ffff800087e9e000) created by: [ 23.973633] vmalloc_oob+0x98/0x5d0 [ 23.975011] [ 23.975166] The buggy address belongs to the physical page: [ 23.975685] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c0c [ 23.976418] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.977041] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.977758] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.978468] page dumped because: kasan: bad access detected [ 23.978983] [ 23.979137] Memory state around the buggy address: [ 23.979586] ffff800087e9c680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.980253] ffff800087e9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.980920] >ffff800087e9c780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 23.981583] ^ [ 23.982242] ffff800087e9c800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 23.982909] ffff800087e9c880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 23.983572] ================================================================== [ 23.945889] ================================================================== [ 23.947296] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 23.947939] Read of size 1 at addr ffff800087e9c7f3 by task kunit_try_catch/327 [ 23.948619] [ 23.948784] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.948834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.948849] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.948867] Call trace: [ 23.948881] show_stack+0x20/0x38 (C) [ 23.948914] dump_stack_lvl+0x8c/0xd0 [ 23.948946] print_report+0x310/0x608 [ 23.948977] kasan_report+0xdc/0x128 [ 23.949007] __asan_report_load1_noabort+0x20/0x30 [ 23.949042] vmalloc_oob+0x578/0x5d0 [ 23.949074] kunit_try_run_case+0x170/0x3f0 [ 23.949111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.949152] kthread+0x328/0x630 [ 23.949186] ret_from_fork+0x10/0x20 [ 23.949220] [ 23.954756] The buggy address belongs to the virtual mapping at [ 23.954756] [ffff800087e9c000, ffff800087e9e000) created by: [ 23.954756] vmalloc_oob+0x98/0x5d0 [ 23.956135] [ 23.956291] The buggy address belongs to the physical page: [ 23.956808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c0c [ 23.957541] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.958168] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.958883] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.959592] page dumped because: kasan: bad access detected [ 23.960109] [ 23.960263] Memory state around the buggy address: [ 23.960714] ffff800087e9c680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.961382] ffff800087e9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.962050] >ffff800087e9c780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 23.962713] ^ [ 23.963348] ffff800087e9c800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 23.964015] ffff800087e9c880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 23.964679] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 22.477909] ================================================================== [ 22.478584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 22.479258] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.479932] [ 22.480087] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.480124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.480134] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.480146] Call trace: [ 22.480155] show_stack+0x20/0x38 (C) [ 22.480178] dump_stack_lvl+0x8c/0xd0 [ 22.480200] print_report+0x118/0x608 [ 22.480219] kasan_report+0xdc/0x128 [ 22.480238] kasan_check_range+0x100/0x1a8 [ 22.480259] __kasan_check_write+0x20/0x30 [ 22.480281] kasan_atomics_helper+0x24c/0x4858 [ 22.480299] kasan_atomics+0x198/0x2e0 [ 22.480317] kunit_try_run_case+0x170/0x3f0 [ 22.480342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.480368] kthread+0x328/0x630 [ 22.480391] ret_from_fork+0x10/0x20 [ 22.480413] [ 22.486599] Allocated by task 323: [ 22.486917] kasan_save_stack+0x3c/0x68 [ 22.487278] kasan_save_track+0x20/0x40 [ 22.487637] kasan_save_alloc_info+0x40/0x58 [ 22.488037] __kasan_kmalloc+0xd4/0xd8 [ 22.488388] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.488815] kasan_atomics+0xb8/0x2e0 [ 22.489157] kunit_try_run_case+0x170/0x3f0 [ 22.489550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.490058] kthread+0x328/0x630 [ 22.490368] ret_from_fork+0x10/0x20 [ 22.490705] [ 22.490852] The buggy address belongs to the object at ffff00000ea09200 [ 22.490852] which belongs to the cache kmalloc-64 of size 64 [ 22.491953] The buggy address is located 0 bytes to the right of [ 22.491953] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.493104] [ 22.493251] The buggy address belongs to the physical page: [ 22.493757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.494468] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.495066] page_type: f5(slab) [ 22.495367] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.496068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.496764] page dumped because: kasan: bad access detected [ 22.497269] [ 22.497414] Memory state around the buggy address: [ 22.497853] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.498505] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.499158] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.499809] ^ [ 22.500247] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.500901] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.501551] ================================================================== [ 22.862340] ================================================================== [ 22.862980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 22.863626] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.864280] [ 22.864420] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.864434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.864438] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.864444] Call trace: [ 22.864447] show_stack+0x20/0x38 (C) [ 22.864457] dump_stack_lvl+0x8c/0xd0 [ 22.864466] print_report+0x118/0x608 [ 22.864475] kasan_report+0xdc/0x128 [ 22.864483] kasan_check_range+0x100/0x1a8 [ 22.864492] __kasan_check_write+0x20/0x30 [ 22.864502] kasan_atomics_helper+0x894/0x4858 [ 22.864510] kasan_atomics+0x198/0x2e0 [ 22.864518] kunit_try_run_case+0x170/0x3f0 [ 22.864529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.864541] kthread+0x328/0x630 [ 22.864551] ret_from_fork+0x10/0x20 [ 22.864561] [ 22.870686] Allocated by task 323: [ 22.870990] kasan_save_stack+0x3c/0x68 [ 22.871334] kasan_save_track+0x20/0x40 [ 22.871678] kasan_save_alloc_info+0x40/0x58 [ 22.872060] __kasan_kmalloc+0xd4/0xd8 [ 22.872397] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.872805] kasan_atomics+0xb8/0x2e0 [ 22.873134] kunit_try_run_case+0x170/0x3f0 [ 22.873509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.874000] kthread+0x328/0x630 [ 22.874293] ret_from_fork+0x10/0x20 [ 22.874615] [ 22.874752] The buggy address belongs to the object at ffff00000ea09200 [ 22.874752] which belongs to the cache kmalloc-64 of size 64 [ 22.875834] The buggy address is located 0 bytes to the right of [ 22.875834] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.876963] [ 22.877102] The buggy address belongs to the physical page: [ 22.877593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.878285] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.878862] page_type: f5(slab) [ 22.879147] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.879831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.880513] page dumped because: kasan: bad access detected [ 22.881005] [ 22.881143] Memory state around the buggy address: [ 22.881568] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.882206] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.882843] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.883481] ^ [ 22.883907] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.884543] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.885180] ================================================================== [ 23.096545] ================================================================== [ 23.097183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 23.097829] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.098483] [ 23.098621] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.098636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.098641] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.098646] Call trace: [ 23.098649] show_stack+0x20/0x38 (C) [ 23.098658] dump_stack_lvl+0x8c/0xd0 [ 23.098667] print_report+0x118/0x608 [ 23.098676] kasan_report+0xdc/0x128 [ 23.098684] kasan_check_range+0x100/0x1a8 [ 23.098694] __kasan_check_write+0x20/0x30 [ 23.098704] kasan_atomics_helper+0xc08/0x4858 [ 23.098712] kasan_atomics+0x198/0x2e0 [ 23.098720] kunit_try_run_case+0x170/0x3f0 [ 23.098732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.098744] kthread+0x328/0x630 [ 23.098754] ret_from_fork+0x10/0x20 [ 23.098764] [ 23.104885] Allocated by task 323: [ 23.105189] kasan_save_stack+0x3c/0x68 [ 23.105535] kasan_save_track+0x20/0x40 [ 23.105878] kasan_save_alloc_info+0x40/0x58 [ 23.106261] __kasan_kmalloc+0xd4/0xd8 [ 23.106598] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.107005] kasan_atomics+0xb8/0x2e0 [ 23.107334] kunit_try_run_case+0x170/0x3f0 [ 23.107710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.108199] kthread+0x328/0x630 [ 23.108492] ret_from_fork+0x10/0x20 [ 23.108814] [ 23.108952] The buggy address belongs to the object at ffff00000ea09200 [ 23.108952] which belongs to the cache kmalloc-64 of size 64 [ 23.110034] The buggy address is located 0 bytes to the right of [ 23.110034] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.111164] [ 23.111301] The buggy address belongs to the physical page: [ 23.111794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.112485] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.113063] page_type: f5(slab) [ 23.113346] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.114030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.114712] page dumped because: kasan: bad access detected [ 23.115204] [ 23.115341] Memory state around the buggy address: [ 23.115765] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.116401] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.117038] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.117674] ^ [ 23.118098] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.118735] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.119370] ================================================================== [ 22.401964] ================================================================== [ 22.403347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 22.404047] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.404727] [ 22.404894] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.404944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.404959] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.404978] Call trace: [ 22.404991] show_stack+0x20/0x38 (C) [ 22.405024] dump_stack_lvl+0x8c/0xd0 [ 22.405058] print_report+0x118/0x608 [ 22.405090] kasan_report+0xdc/0x128 [ 22.405119] __asan_report_load4_noabort+0x20/0x30 [ 22.405154] kasan_atomics_helper+0x40a8/0x4858 [ 22.405184] kasan_atomics+0x198/0x2e0 [ 22.405211] kunit_try_run_case+0x170/0x3f0 [ 22.405247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.405288] kthread+0x328/0x630 [ 22.405323] ret_from_fork+0x10/0x20 [ 22.405358] [ 22.411305] Allocated by task 323: [ 22.411632] kasan_save_stack+0x3c/0x68 [ 22.412008] kasan_save_track+0x20/0x40 [ 22.412380] kasan_save_alloc_info+0x40/0x58 [ 22.412794] __kasan_kmalloc+0xd4/0xd8 [ 22.413159] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.413602] kasan_atomics+0xb8/0x2e0 [ 22.413959] kunit_try_run_case+0x170/0x3f0 [ 22.414367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.414893] kthread+0x328/0x630 [ 22.415219] ret_from_fork+0x10/0x20 [ 22.415570] [ 22.415725] The buggy address belongs to the object at ffff00000ea09200 [ 22.415725] which belongs to the cache kmalloc-64 of size 64 [ 22.416845] The buggy address is located 0 bytes to the right of [ 22.416845] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.418012] [ 22.418168] The buggy address belongs to the physical page: [ 22.418685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.419412] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.420025] page_type: f5(slab) [ 22.420340] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.421057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.421766] page dumped because: kasan: bad access detected [ 22.422283] [ 22.422436] Memory state around the buggy address: [ 22.422886] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.423554] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.424222] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.424886] ^ [ 22.425336] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.426004] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.426667] ================================================================== [ 22.909039] ================================================================== [ 22.909676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 22.910322] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.910975] [ 22.911114] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.911128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.911132] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.911137] Call trace: [ 22.911140] show_stack+0x20/0x38 (C) [ 22.911149] dump_stack_lvl+0x8c/0xd0 [ 22.911158] print_report+0x118/0x608 [ 22.911167] kasan_report+0xdc/0x128 [ 22.911175] kasan_check_range+0x100/0x1a8 [ 22.911184] __kasan_check_write+0x20/0x30 [ 22.911194] kasan_atomics_helper+0x934/0x4858 [ 22.911203] kasan_atomics+0x198/0x2e0 [ 22.911211] kunit_try_run_case+0x170/0x3f0 [ 22.911221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.911233] kthread+0x328/0x630 [ 22.911242] ret_from_fork+0x10/0x20 [ 22.911252] [ 22.917372] Allocated by task 323: [ 22.917676] kasan_save_stack+0x3c/0x68 [ 22.918021] kasan_save_track+0x20/0x40 [ 22.918365] kasan_save_alloc_info+0x40/0x58 [ 22.918747] __kasan_kmalloc+0xd4/0xd8 [ 22.919084] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.919491] kasan_atomics+0xb8/0x2e0 [ 22.919820] kunit_try_run_case+0x170/0x3f0 [ 22.920195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.920685] kthread+0x328/0x630 [ 22.920978] ret_from_fork+0x10/0x20 [ 22.921300] [ 22.921436] The buggy address belongs to the object at ffff00000ea09200 [ 22.921436] which belongs to the cache kmalloc-64 of size 64 [ 22.922519] The buggy address is located 0 bytes to the right of [ 22.922519] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.923648] [ 22.923785] The buggy address belongs to the physical page: [ 22.924276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.924968] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.925547] page_type: f5(slab) [ 22.925831] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.926515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.927197] page dumped because: kasan: bad access detected [ 22.927689] [ 22.927825] Memory state around the buggy address: [ 22.928251] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.928888] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.929525] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.930161] ^ [ 22.930586] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.931225] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.931862] ================================================================== [ 23.588495] ================================================================== [ 23.589132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 23.589785] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.590439] [ 23.590577] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.590591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.590595] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.590601] Call trace: [ 23.590604] show_stack+0x20/0x38 (C) [ 23.590613] dump_stack_lvl+0x8c/0xd0 [ 23.590621] print_report+0x118/0x608 [ 23.590630] kasan_report+0xdc/0x128 [ 23.590638] kasan_check_range+0x100/0x1a8 [ 23.590648] __kasan_check_write+0x20/0x30 [ 23.590657] kasan_atomics_helper+0x1384/0x4858 [ 23.590666] kasan_atomics+0x198/0x2e0 [ 23.590674] kunit_try_run_case+0x170/0x3f0 [ 23.590684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.590695] kthread+0x328/0x630 [ 23.590705] ret_from_fork+0x10/0x20 [ 23.590715] [ 23.596845] Allocated by task 323: [ 23.597149] kasan_save_stack+0x3c/0x68 [ 23.597495] kasan_save_track+0x20/0x40 [ 23.597838] kasan_save_alloc_info+0x40/0x58 [ 23.598221] __kasan_kmalloc+0xd4/0xd8 [ 23.598558] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.598965] kasan_atomics+0xb8/0x2e0 [ 23.599293] kunit_try_run_case+0x170/0x3f0 [ 23.599671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.600161] kthread+0x328/0x630 [ 23.600454] ret_from_fork+0x10/0x20 [ 23.600777] [ 23.600913] The buggy address belongs to the object at ffff00000ea09200 [ 23.600913] which belongs to the cache kmalloc-64 of size 64 [ 23.601996] The buggy address is located 0 bytes to the right of [ 23.601996] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.603125] [ 23.603262] The buggy address belongs to the physical page: [ 23.603754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.604445] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.605024] page_type: f5(slab) [ 23.605307] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.605991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.606673] page dumped because: kasan: bad access detected [ 23.607166] [ 23.607302] Memory state around the buggy address: [ 23.607727] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.608364] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.609001] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.609637] ^ [ 23.610063] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.610700] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.611336] ================================================================== [ 22.599189] ================================================================== [ 22.599843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 22.600505] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.601174] [ 22.601323] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.601355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.601365] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.601376] Call trace: [ 22.601383] show_stack+0x20/0x38 (C) [ 22.601403] dump_stack_lvl+0x8c/0xd0 [ 22.601422] print_report+0x118/0x608 [ 22.601442] kasan_report+0xdc/0x128 [ 22.601461] kasan_check_range+0x100/0x1a8 [ 22.601481] __kasan_check_write+0x20/0x30 [ 22.601502] kasan_atomics_helper+0x3ac/0x4858 [ 22.601522] kasan_atomics+0x198/0x2e0 [ 22.601539] kunit_try_run_case+0x170/0x3f0 [ 22.601561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.601588] kthread+0x328/0x630 [ 22.601610] ret_from_fork+0x10/0x20 [ 22.601631] [ 22.607813] Allocated by task 323: [ 22.608129] kasan_save_stack+0x3c/0x68 [ 22.608489] kasan_save_track+0x20/0x40 [ 22.608847] kasan_save_alloc_info+0x40/0x58 [ 22.609246] __kasan_kmalloc+0xd4/0xd8 [ 22.609597] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.610023] kasan_atomics+0xb8/0x2e0 [ 22.610365] kunit_try_run_case+0x170/0x3f0 [ 22.610757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.611266] kthread+0x328/0x630 [ 22.611575] ret_from_fork+0x10/0x20 [ 22.611913] [ 22.612059] The buggy address belongs to the object at ffff00000ea09200 [ 22.612059] which belongs to the cache kmalloc-64 of size 64 [ 22.613160] The buggy address is located 0 bytes to the right of [ 22.613160] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.614309] [ 22.614455] The buggy address belongs to the physical page: [ 22.614958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.615665] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.616258] page_type: f5(slab) [ 22.616555] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.617254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.617949] page dumped because: kasan: bad access detected [ 22.618453] [ 22.618598] Memory state around the buggy address: [ 22.619035] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.619688] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.620340] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.620990] ^ [ 22.621427] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.622080] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.622729] ================================================================== [ 22.695668] ================================================================== [ 22.696312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 22.696965] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.697625] [ 22.697768] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.697790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.697796] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.697804] Call trace: [ 22.697809] show_stack+0x20/0x38 (C) [ 22.697823] dump_stack_lvl+0x8c/0xd0 [ 22.697836] print_report+0x118/0x608 [ 22.697849] kasan_report+0xdc/0x128 [ 22.697861] kasan_check_range+0x100/0x1a8 [ 22.697875] __kasan_check_write+0x20/0x30 [ 22.697890] kasan_atomics_helper+0x54c/0x4858 [ 22.697903] kasan_atomics+0x198/0x2e0 [ 22.697915] kunit_try_run_case+0x170/0x3f0 [ 22.697930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.697948] kthread+0x328/0x630 [ 22.697963] ret_from_fork+0x10/0x20 [ 22.697978] [ 22.704121] Allocated by task 323: [ 22.704430] kasan_save_stack+0x3c/0x68 [ 22.704781] kasan_save_track+0x20/0x40 [ 22.705131] kasan_save_alloc_info+0x40/0x58 [ 22.705520] __kasan_kmalloc+0xd4/0xd8 [ 22.705862] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.706277] kasan_atomics+0xb8/0x2e0 [ 22.706612] kunit_try_run_case+0x170/0x3f0 [ 22.706994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.707492] kthread+0x328/0x630 [ 22.707792] ret_from_fork+0x10/0x20 [ 22.708120] [ 22.708260] The buggy address belongs to the object at ffff00000ea09200 [ 22.708260] which belongs to the cache kmalloc-64 of size 64 [ 22.709350] The buggy address is located 0 bytes to the right of [ 22.709350] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.710487] [ 22.710627] The buggy address belongs to the physical page: [ 22.711124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.711822] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.712407] page_type: f5(slab) [ 22.712697] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.713387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.714073] page dumped because: kasan: bad access detected [ 22.714571] [ 22.714711] Memory state around the buggy address: [ 22.715141] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.715784] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.716428] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.717069] ^ [ 22.717500] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.718144] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.718785] ================================================================== [ 23.120032] ================================================================== [ 23.120670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 23.121323] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.121968] [ 23.122108] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.122122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.122126] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.122131] Call trace: [ 23.122135] show_stack+0x20/0x38 (C) [ 23.122144] dump_stack_lvl+0x8c/0xd0 [ 23.122153] print_report+0x118/0x608 [ 23.122161] kasan_report+0xdc/0x128 [ 23.122170] __asan_report_load4_noabort+0x20/0x30 [ 23.122180] kasan_atomics_helper+0x3de4/0x4858 [ 23.122189] kasan_atomics+0x198/0x2e0 [ 23.122197] kunit_try_run_case+0x170/0x3f0 [ 23.122207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.122219] kthread+0x328/0x630 [ 23.122229] ret_from_fork+0x10/0x20 [ 23.122239] [ 23.128068] Allocated by task 323: [ 23.128373] kasan_save_stack+0x3c/0x68 [ 23.128717] kasan_save_track+0x20/0x40 [ 23.129061] kasan_save_alloc_info+0x40/0x58 [ 23.129444] __kasan_kmalloc+0xd4/0xd8 [ 23.129781] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.130188] kasan_atomics+0xb8/0x2e0 [ 23.130517] kunit_try_run_case+0x170/0x3f0 [ 23.130893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.131383] kthread+0x328/0x630 [ 23.131677] ret_from_fork+0x10/0x20 [ 23.131999] [ 23.132136] The buggy address belongs to the object at ffff00000ea09200 [ 23.132136] which belongs to the cache kmalloc-64 of size 64 [ 23.133219] The buggy address is located 0 bytes to the right of [ 23.133219] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.134348] [ 23.134485] The buggy address belongs to the physical page: [ 23.134977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.135669] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.136247] page_type: f5(slab) [ 23.136532] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.137216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.137897] page dumped because: kasan: bad access detected [ 23.138389] [ 23.138526] Memory state around the buggy address: [ 23.138951] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.139590] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.140226] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.140862] ^ [ 23.141288] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.141925] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.142560] ================================================================== [ 22.452586] ================================================================== [ 22.453260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 22.453941] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.454620] [ 22.454785] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.454836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.454851] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.454869] Call trace: [ 22.454882] show_stack+0x20/0x38 (C) [ 22.454914] dump_stack_lvl+0x8c/0xd0 [ 22.454947] print_report+0x118/0x608 [ 22.454978] kasan_report+0xdc/0x128 [ 22.455007] kasan_check_range+0x100/0x1a8 [ 22.455040] __kasan_check_read+0x20/0x30 [ 22.455073] kasan_atomics_helper+0x1ec/0x4858 [ 22.455103] kasan_atomics+0x198/0x2e0 [ 22.455131] kunit_try_run_case+0x170/0x3f0 [ 22.455167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.455207] kthread+0x328/0x630 [ 22.455242] ret_from_fork+0x10/0x20 [ 22.455275] [ 22.461516] Allocated by task 323: [ 22.461844] kasan_save_stack+0x3c/0x68 [ 22.462219] kasan_save_track+0x20/0x40 [ 22.462592] kasan_save_alloc_info+0x40/0x58 [ 22.463007] __kasan_kmalloc+0xd4/0xd8 [ 22.463371] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.463815] kasan_atomics+0xb8/0x2e0 [ 22.464171] kunit_try_run_case+0x170/0x3f0 [ 22.464580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.465105] kthread+0x328/0x630 [ 22.465430] ret_from_fork+0x10/0x20 [ 22.465782] [ 22.465937] The buggy address belongs to the object at ffff00000ea09200 [ 22.465937] which belongs to the cache kmalloc-64 of size 64 [ 22.467057] The buggy address is located 0 bytes to the right of [ 22.467057] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.468224] [ 22.468380] The buggy address belongs to the physical page: [ 22.468897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.469624] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.470238] page_type: f5(slab) [ 22.470551] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.471268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.471977] page dumped because: kasan: bad access detected [ 22.472494] [ 22.472648] Memory state around the buggy address: [ 22.473096] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.473764] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.474432] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.475094] ^ [ 22.475543] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.476211] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.476874] ================================================================== [ 23.705677] ================================================================== [ 23.706315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 23.706967] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.707621] [ 23.707759] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.707773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.707778] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.707783] Call trace: [ 23.707786] show_stack+0x20/0x38 (C) [ 23.707795] dump_stack_lvl+0x8c/0xd0 [ 23.707803] print_report+0x118/0x608 [ 23.707812] kasan_report+0xdc/0x128 [ 23.707821] kasan_check_range+0x100/0x1a8 [ 23.707830] __kasan_check_write+0x20/0x30 [ 23.707840] kasan_atomics_helper+0x154c/0x4858 [ 23.707848] kasan_atomics+0x198/0x2e0 [ 23.707856] kunit_try_run_case+0x170/0x3f0 [ 23.707867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.707878] kthread+0x328/0x630 [ 23.707888] ret_from_fork+0x10/0x20 [ 23.707898] [ 23.714025] Allocated by task 323: [ 23.714330] kasan_save_stack+0x3c/0x68 [ 23.714674] kasan_save_track+0x20/0x40 [ 23.715018] kasan_save_alloc_info+0x40/0x58 [ 23.715401] __kasan_kmalloc+0xd4/0xd8 [ 23.715738] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.716145] kasan_atomics+0xb8/0x2e0 [ 23.716474] kunit_try_run_case+0x170/0x3f0 [ 23.716849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.717339] kthread+0x328/0x630 [ 23.717632] ret_from_fork+0x10/0x20 [ 23.717954] [ 23.718090] The buggy address belongs to the object at ffff00000ea09200 [ 23.718090] which belongs to the cache kmalloc-64 of size 64 [ 23.719173] The buggy address is located 0 bytes to the right of [ 23.719173] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.720303] [ 23.720440] The buggy address belongs to the physical page: [ 23.720931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.721623] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.722200] page_type: f5(slab) [ 23.722485] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.723169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.723851] page dumped because: kasan: bad access detected [ 23.724343] [ 23.724481] Memory state around the buggy address: [ 23.724906] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.725544] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.726182] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.726818] ^ [ 23.727243] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.727880] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.728515] ================================================================== [ 23.143222] ================================================================== [ 23.143859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 23.144504] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.145158] [ 23.145296] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.145311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.145315] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.145320] Call trace: [ 23.145323] show_stack+0x20/0x38 (C) [ 23.145332] dump_stack_lvl+0x8c/0xd0 [ 23.145341] print_report+0x118/0x608 [ 23.145350] kasan_report+0xdc/0x128 [ 23.145358] kasan_check_range+0x100/0x1a8 [ 23.145367] __kasan_check_write+0x20/0x30 [ 23.145377] kasan_atomics_helper+0xca0/0x4858 [ 23.145385] kasan_atomics+0x198/0x2e0 [ 23.145393] kunit_try_run_case+0x170/0x3f0 [ 23.145404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.145416] kthread+0x328/0x630 [ 23.145426] ret_from_fork+0x10/0x20 [ 23.145436] [ 23.151559] Allocated by task 323: [ 23.151863] kasan_save_stack+0x3c/0x68 [ 23.152207] kasan_save_track+0x20/0x40 [ 23.152552] kasan_save_alloc_info+0x40/0x58 [ 23.152935] __kasan_kmalloc+0xd4/0xd8 [ 23.153272] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.153679] kasan_atomics+0xb8/0x2e0 [ 23.154008] kunit_try_run_case+0x170/0x3f0 [ 23.154384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.154875] kthread+0x328/0x630 [ 23.155168] ret_from_fork+0x10/0x20 [ 23.155490] [ 23.155627] The buggy address belongs to the object at ffff00000ea09200 [ 23.155627] which belongs to the cache kmalloc-64 of size 64 [ 23.156709] The buggy address is located 0 bytes to the right of [ 23.156709] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.157838] [ 23.157976] The buggy address belongs to the physical page: [ 23.158467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.159159] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.159738] page_type: f5(slab) [ 23.160022] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.160706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.161388] page dumped because: kasan: bad access detected [ 23.161879] [ 23.162016] Memory state around the buggy address: [ 23.162441] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.163078] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.163715] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.164350] ^ [ 23.164775] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.165413] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.166049] ================================================================== [ 23.541475] ================================================================== [ 23.542112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 23.542765] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.543419] [ 23.543557] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.543571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.543575] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.543581] Call trace: [ 23.543584] show_stack+0x20/0x38 (C) [ 23.543593] dump_stack_lvl+0x8c/0xd0 [ 23.543601] print_report+0x118/0x608 [ 23.543610] kasan_report+0xdc/0x128 [ 23.543618] kasan_check_range+0x100/0x1a8 [ 23.543627] __kasan_check_write+0x20/0x30 [ 23.543637] kasan_atomics_helper+0x126c/0x4858 [ 23.543646] kasan_atomics+0x198/0x2e0 [ 23.543654] kunit_try_run_case+0x170/0x3f0 [ 23.543664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.543675] kthread+0x328/0x630 [ 23.543685] ret_from_fork+0x10/0x20 [ 23.543695] [ 23.549823] Allocated by task 323: [ 23.550127] kasan_save_stack+0x3c/0x68 [ 23.550471] kasan_save_track+0x20/0x40 [ 23.550815] kasan_save_alloc_info+0x40/0x58 [ 23.551198] __kasan_kmalloc+0xd4/0xd8 [ 23.551534] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.551942] kasan_atomics+0xb8/0x2e0 [ 23.552270] kunit_try_run_case+0x170/0x3f0 [ 23.552646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.553137] kthread+0x328/0x630 [ 23.553429] ret_from_fork+0x10/0x20 [ 23.553752] [ 23.553888] The buggy address belongs to the object at ffff00000ea09200 [ 23.553888] which belongs to the cache kmalloc-64 of size 64 [ 23.554971] The buggy address is located 0 bytes to the right of [ 23.554971] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.556100] [ 23.556238] The buggy address belongs to the physical page: [ 23.556729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.557421] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.558000] page_type: f5(slab) [ 23.558284] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.558968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.559650] page dumped because: kasan: bad access detected [ 23.560142] [ 23.560280] Memory state around the buggy address: [ 23.560705] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.561344] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.561981] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.562618] ^ [ 23.563044] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.563681] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.564316] ================================================================== [ 23.729167] ================================================================== [ 23.729804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 23.730457] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.731111] [ 23.731249] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.731263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.731268] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.731273] Call trace: [ 23.731276] show_stack+0x20/0x38 (C) [ 23.731285] dump_stack_lvl+0x8c/0xd0 [ 23.731294] print_report+0x118/0x608 [ 23.731302] kasan_report+0xdc/0x128 [ 23.731311] kasan_check_range+0x100/0x1a8 [ 23.731320] __kasan_check_write+0x20/0x30 [ 23.731329] kasan_atomics_helper+0x15b4/0x4858 [ 23.731338] kasan_atomics+0x198/0x2e0 [ 23.731346] kunit_try_run_case+0x170/0x3f0 [ 23.731356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.731368] kthread+0x328/0x630 [ 23.731378] ret_from_fork+0x10/0x20 [ 23.731388] [ 23.737512] Allocated by task 323: [ 23.737816] kasan_save_stack+0x3c/0x68 [ 23.738161] kasan_save_track+0x20/0x40 [ 23.738505] kasan_save_alloc_info+0x40/0x58 [ 23.738888] __kasan_kmalloc+0xd4/0xd8 [ 23.739225] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.739632] kasan_atomics+0xb8/0x2e0 [ 23.739961] kunit_try_run_case+0x170/0x3f0 [ 23.740337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.740827] kthread+0x328/0x630 [ 23.741120] ret_from_fork+0x10/0x20 [ 23.741443] [ 23.741579] The buggy address belongs to the object at ffff00000ea09200 [ 23.741579] which belongs to the cache kmalloc-64 of size 64 [ 23.742662] The buggy address is located 0 bytes to the right of [ 23.742662] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.743791] [ 23.743928] The buggy address belongs to the physical page: [ 23.744419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.745111] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.745688] page_type: f5(slab) [ 23.745972] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.746656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.747338] page dumped because: kasan: bad access detected [ 23.747830] [ 23.747966] Memory state around the buggy address: [ 23.748392] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.749029] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.749666] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.750302] ^ [ 23.750726] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.751363] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.752000] ================================================================== [ 22.502445] ================================================================== [ 22.503102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 22.503765] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.504428] [ 22.504577] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.504611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.504621] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.504631] Call trace: [ 22.504640] show_stack+0x20/0x38 (C) [ 22.504660] dump_stack_lvl+0x8c/0xd0 [ 22.504678] print_report+0x118/0x608 [ 22.504697] kasan_report+0xdc/0x128 [ 22.504716] kasan_check_range+0x100/0x1a8 [ 22.504737] __kasan_check_read+0x20/0x30 [ 22.504757] kasan_atomics_helper+0x2b0/0x4858 [ 22.504776] kasan_atomics+0x198/0x2e0 [ 22.504793] kunit_try_run_case+0x170/0x3f0 [ 22.504816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.504843] kthread+0x328/0x630 [ 22.504864] ret_from_fork+0x10/0x20 [ 22.504885] [ 22.511057] Allocated by task 323: [ 22.511373] kasan_save_stack+0x3c/0x68 [ 22.511733] kasan_save_track+0x20/0x40 [ 22.512091] kasan_save_alloc_info+0x40/0x58 [ 22.512490] __kasan_kmalloc+0xd4/0xd8 [ 22.512841] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.513268] kasan_atomics+0xb8/0x2e0 [ 22.513609] kunit_try_run_case+0x170/0x3f0 [ 22.514002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.514509] kthread+0x328/0x630 [ 22.514818] ret_from_fork+0x10/0x20 [ 22.515156] [ 22.515302] The buggy address belongs to the object at ffff00000ea09200 [ 22.515302] which belongs to the cache kmalloc-64 of size 64 [ 22.516403] The buggy address is located 0 bytes to the right of [ 22.516403] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.517551] [ 22.517697] The buggy address belongs to the physical page: [ 22.518201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.518909] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.519503] page_type: f5(slab) [ 22.519802] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.520502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.521196] page dumped because: kasan: bad access detected [ 22.521700] [ 22.521845] Memory state around the buggy address: [ 22.522282] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.522934] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.523587] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.524237] ^ [ 22.524675] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.525327] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.525976] ================================================================== [ 23.049795] ================================================================== [ 23.050434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 23.051079] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.051733] [ 23.051871] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.051886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.051890] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.051895] Call trace: [ 23.051898] show_stack+0x20/0x38 (C) [ 23.051909] dump_stack_lvl+0x8c/0xd0 [ 23.051917] print_report+0x118/0x608 [ 23.051926] kasan_report+0xdc/0x128 [ 23.051934] kasan_check_range+0x100/0x1a8 [ 23.051943] __kasan_check_write+0x20/0x30 [ 23.051953] kasan_atomics_helper+0xb70/0x4858 [ 23.051962] kasan_atomics+0x198/0x2e0 [ 23.051970] kunit_try_run_case+0x170/0x3f0 [ 23.051980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.051993] kthread+0x328/0x630 [ 23.052003] ret_from_fork+0x10/0x20 [ 23.052012] [ 23.058133] Allocated by task 323: [ 23.058437] kasan_save_stack+0x3c/0x68 [ 23.058783] kasan_save_track+0x20/0x40 [ 23.059127] kasan_save_alloc_info+0x40/0x58 [ 23.059510] __kasan_kmalloc+0xd4/0xd8 [ 23.059847] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.060255] kasan_atomics+0xb8/0x2e0 [ 23.060584] kunit_try_run_case+0x170/0x3f0 [ 23.060960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.061449] kthread+0x328/0x630 [ 23.061742] ret_from_fork+0x10/0x20 [ 23.062064] [ 23.062202] The buggy address belongs to the object at ffff00000ea09200 [ 23.062202] which belongs to the cache kmalloc-64 of size 64 [ 23.063285] The buggy address is located 0 bytes to the right of [ 23.063285] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.064414] [ 23.064553] The buggy address belongs to the physical page: [ 23.065044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.065735] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.066312] page_type: f5(slab) [ 23.066597] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.067281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.067963] page dumped because: kasan: bad access detected [ 23.068454] [ 23.068591] Memory state around the buggy address: [ 23.069017] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.069653] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.070290] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.070927] ^ [ 23.071353] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.071990] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.072627] ================================================================== [ 23.775847] ================================================================== [ 23.776484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 23.777137] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.777791] [ 23.777929] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.777943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.777947] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.777952] Call trace: [ 23.777955] show_stack+0x20/0x38 (C) [ 23.777965] dump_stack_lvl+0x8c/0xd0 [ 23.777973] print_report+0x118/0x608 [ 23.777982] kasan_report+0xdc/0x128 [ 23.777990] kasan_check_range+0x100/0x1a8 [ 23.777999] __kasan_check_write+0x20/0x30 [ 23.778010] kasan_atomics_helper+0x1644/0x4858 [ 23.778018] kasan_atomics+0x198/0x2e0 [ 23.778026] kunit_try_run_case+0x170/0x3f0 [ 23.778037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.778048] kthread+0x328/0x630 [ 23.778058] ret_from_fork+0x10/0x20 [ 23.778067] [ 23.784197] Allocated by task 323: [ 23.784502] kasan_save_stack+0x3c/0x68 [ 23.784847] kasan_save_track+0x20/0x40 [ 23.785191] kasan_save_alloc_info+0x40/0x58 [ 23.785574] __kasan_kmalloc+0xd4/0xd8 [ 23.785911] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.786318] kasan_atomics+0xb8/0x2e0 [ 23.786646] kunit_try_run_case+0x170/0x3f0 [ 23.787022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.787513] kthread+0x328/0x630 [ 23.787805] ret_from_fork+0x10/0x20 [ 23.788128] [ 23.788265] The buggy address belongs to the object at ffff00000ea09200 [ 23.788265] which belongs to the cache kmalloc-64 of size 64 [ 23.789347] The buggy address is located 0 bytes to the right of [ 23.789347] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.790477] [ 23.790613] The buggy address belongs to the physical page: [ 23.791105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.791796] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.792375] page_type: f5(slab) [ 23.792660] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.793344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.794026] page dumped because: kasan: bad access detected [ 23.794518] [ 23.794656] Memory state around the buggy address: [ 23.795081] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.795720] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.796357] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.796993] ^ [ 23.797419] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.798055] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.798690] ================================================================== [ 22.932516] ================================================================== [ 22.933154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 22.933800] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.934454] [ 22.934592] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.934607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.934611] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.934617] Call trace: [ 22.934620] show_stack+0x20/0x38 (C) [ 22.934629] dump_stack_lvl+0x8c/0xd0 [ 22.934638] print_report+0x118/0x608 [ 22.934647] kasan_report+0xdc/0x128 [ 22.934655] kasan_check_range+0x100/0x1a8 [ 22.934664] __kasan_check_write+0x20/0x30 [ 22.934674] kasan_atomics_helper+0x99c/0x4858 [ 22.934683] kasan_atomics+0x198/0x2e0 [ 22.934690] kunit_try_run_case+0x170/0x3f0 [ 22.934701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.934712] kthread+0x328/0x630 [ 22.934722] ret_from_fork+0x10/0x20 [ 22.934732] [ 22.940855] Allocated by task 323: [ 22.941159] kasan_save_stack+0x3c/0x68 [ 22.941503] kasan_save_track+0x20/0x40 [ 22.941847] kasan_save_alloc_info+0x40/0x58 [ 22.942229] __kasan_kmalloc+0xd4/0xd8 [ 22.942567] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.942973] kasan_atomics+0xb8/0x2e0 [ 22.943302] kunit_try_run_case+0x170/0x3f0 [ 22.943677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.944167] kthread+0x328/0x630 [ 22.944459] ret_from_fork+0x10/0x20 [ 22.944781] [ 22.944918] The buggy address belongs to the object at ffff00000ea09200 [ 22.944918] which belongs to the cache kmalloc-64 of size 64 [ 22.946000] The buggy address is located 0 bytes to the right of [ 22.946000] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.947130] [ 22.947266] The buggy address belongs to the physical page: [ 22.947758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.948449] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.949027] page_type: f5(slab) [ 22.949311] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.949995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.950677] page dumped because: kasan: bad access detected [ 22.951168] [ 22.951305] Memory state around the buggy address: [ 22.951730] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.952367] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.953004] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.953641] ^ [ 22.954065] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.954702] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.955337] ================================================================== [ 23.494474] ================================================================== [ 23.495112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 23.495765] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.496419] [ 23.496557] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.496572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.496577] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.496581] Call trace: [ 23.496585] show_stack+0x20/0x38 (C) [ 23.496594] dump_stack_lvl+0x8c/0xd0 [ 23.496603] print_report+0x118/0x608 [ 23.496611] kasan_report+0xdc/0x128 [ 23.496619] kasan_check_range+0x100/0x1a8 [ 23.496629] __kasan_check_write+0x20/0x30 [ 23.496638] kasan_atomics_helper+0x1190/0x4858 [ 23.496647] kasan_atomics+0x198/0x2e0 [ 23.496655] kunit_try_run_case+0x170/0x3f0 [ 23.496666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.496678] kthread+0x328/0x630 [ 23.496687] ret_from_fork+0x10/0x20 [ 23.496697] [ 23.502825] Allocated by task 323: [ 23.503129] kasan_save_stack+0x3c/0x68 [ 23.503475] kasan_save_track+0x20/0x40 [ 23.503820] kasan_save_alloc_info+0x40/0x58 [ 23.504203] __kasan_kmalloc+0xd4/0xd8 [ 23.504540] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.504947] kasan_atomics+0xb8/0x2e0 [ 23.505276] kunit_try_run_case+0x170/0x3f0 [ 23.505652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.506144] kthread+0x328/0x630 [ 23.506436] ret_from_fork+0x10/0x20 [ 23.506758] [ 23.506895] The buggy address belongs to the object at ffff00000ea09200 [ 23.506895] which belongs to the cache kmalloc-64 of size 64 [ 23.507978] The buggy address is located 0 bytes to the right of [ 23.507978] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.509107] [ 23.509245] The buggy address belongs to the physical page: [ 23.509737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.510428] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.511006] page_type: f5(slab) [ 23.511290] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.511974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.512656] page dumped because: kasan: bad access detected [ 23.513147] [ 23.513284] Memory state around the buggy address: [ 23.513709] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.514346] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.514983] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.515619] ^ [ 23.516044] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.516681] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.517318] ================================================================== [ 22.955995] ================================================================== [ 22.956632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 22.957277] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.957932] [ 22.958070] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.958084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.958088] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.958093] Call trace: [ 22.958097] show_stack+0x20/0x38 (C) [ 22.958106] dump_stack_lvl+0x8c/0xd0 [ 22.958114] print_report+0x118/0x608 [ 22.958123] kasan_report+0xdc/0x128 [ 22.958131] kasan_check_range+0x100/0x1a8 [ 22.958140] __kasan_check_write+0x20/0x30 [ 22.958150] kasan_atomics_helper+0xa04/0x4858 [ 22.958159] kasan_atomics+0x198/0x2e0 [ 22.958167] kunit_try_run_case+0x170/0x3f0 [ 22.958177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.958189] kthread+0x328/0x630 [ 22.958199] ret_from_fork+0x10/0x20 [ 22.958209] [ 22.964332] Allocated by task 323: [ 22.964636] kasan_save_stack+0x3c/0x68 [ 22.964980] kasan_save_track+0x20/0x40 [ 22.965324] kasan_save_alloc_info+0x40/0x58 [ 22.965707] __kasan_kmalloc+0xd4/0xd8 [ 22.966044] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.966451] kasan_atomics+0xb8/0x2e0 [ 22.966780] kunit_try_run_case+0x170/0x3f0 [ 22.967155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.967646] kthread+0x328/0x630 [ 22.967939] ret_from_fork+0x10/0x20 [ 22.968261] [ 22.968398] The buggy address belongs to the object at ffff00000ea09200 [ 22.968398] which belongs to the cache kmalloc-64 of size 64 [ 22.969480] The buggy address is located 0 bytes to the right of [ 22.969480] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.970609] [ 22.970746] The buggy address belongs to the physical page: [ 22.971237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.971927] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.972506] page_type: f5(slab) [ 22.972789] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.973472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.974154] page dumped because: kasan: bad access detected [ 22.974646] [ 22.974782] Memory state around the buggy address: [ 22.975208] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.975844] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.976483] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.977118] ^ [ 22.977544] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.978181] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.978817] ================================================================== [ 23.447434] ================================================================== [ 23.448071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 23.448724] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.449377] [ 23.449517] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.449531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.449536] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.449541] Call trace: [ 23.449544] show_stack+0x20/0x38 (C) [ 23.449554] dump_stack_lvl+0x8c/0xd0 [ 23.449562] print_report+0x118/0x608 [ 23.449571] kasan_report+0xdc/0x128 [ 23.449579] kasan_check_range+0x100/0x1a8 [ 23.449589] __kasan_check_write+0x20/0x30 [ 23.449599] kasan_atomics_helper+0x10c0/0x4858 [ 23.449607] kasan_atomics+0x198/0x2e0 [ 23.449615] kunit_try_run_case+0x170/0x3f0 [ 23.449626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.449638] kthread+0x328/0x630 [ 23.449648] ret_from_fork+0x10/0x20 [ 23.449657] [ 23.455784] Allocated by task 323: [ 23.456089] kasan_save_stack+0x3c/0x68 [ 23.456432] kasan_save_track+0x20/0x40 [ 23.456777] kasan_save_alloc_info+0x40/0x58 [ 23.457160] __kasan_kmalloc+0xd4/0xd8 [ 23.457497] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.457904] kasan_atomics+0xb8/0x2e0 [ 23.458233] kunit_try_run_case+0x170/0x3f0 [ 23.458608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.459099] kthread+0x328/0x630 [ 23.459392] ret_from_fork+0x10/0x20 [ 23.459714] [ 23.459851] The buggy address belongs to the object at ffff00000ea09200 [ 23.459851] which belongs to the cache kmalloc-64 of size 64 [ 23.460933] The buggy address is located 0 bytes to the right of [ 23.460933] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.462062] [ 23.462199] The buggy address belongs to the physical page: [ 23.462691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.463383] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.463960] page_type: f5(slab) [ 23.464245] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.464929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.465611] page dumped because: kasan: bad access detected [ 23.466103] [ 23.466239] Memory state around the buggy address: [ 23.466665] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.467302] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.467940] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.468578] ^ [ 23.469002] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.469639] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.470274] ================================================================== [ 23.236622] ================================================================== [ 23.237259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 23.237905] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.238550] [ 23.238688] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.238702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.238707] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.238712] Call trace: [ 23.238715] show_stack+0x20/0x38 (C) [ 23.238724] dump_stack_lvl+0x8c/0xd0 [ 23.238733] print_report+0x118/0x608 [ 23.238741] kasan_report+0xdc/0x128 [ 23.238750] kasan_check_range+0x100/0x1a8 [ 23.238759] __kasan_check_read+0x20/0x30 [ 23.238769] kasan_atomics_helper+0xdd4/0x4858 [ 23.238778] kasan_atomics+0x198/0x2e0 [ 23.238786] kunit_try_run_case+0x170/0x3f0 [ 23.238796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.238808] kthread+0x328/0x630 [ 23.238818] ret_from_fork+0x10/0x20 [ 23.238827] [ 23.244941] Allocated by task 323: [ 23.245245] kasan_save_stack+0x3c/0x68 [ 23.245589] kasan_save_track+0x20/0x40 [ 23.245933] kasan_save_alloc_info+0x40/0x58 [ 23.246316] __kasan_kmalloc+0xd4/0xd8 [ 23.246652] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.247059] kasan_atomics+0xb8/0x2e0 [ 23.247387] kunit_try_run_case+0x170/0x3f0 [ 23.247763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.248253] kthread+0x328/0x630 [ 23.248546] ret_from_fork+0x10/0x20 [ 23.248868] [ 23.249005] The buggy address belongs to the object at ffff00000ea09200 [ 23.249005] which belongs to the cache kmalloc-64 of size 64 [ 23.250087] The buggy address is located 0 bytes to the right of [ 23.250087] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.251217] [ 23.251353] The buggy address belongs to the physical page: [ 23.251845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.252537] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.253114] page_type: f5(slab) [ 23.253399] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.254082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.254764] page dumped because: kasan: bad access detected [ 23.255255] [ 23.255393] Memory state around the buggy address: [ 23.255819] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.256457] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.257096] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.257731] ^ [ 23.258157] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.258795] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.259431] ================================================================== [ 22.814929] ================================================================== [ 22.815574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 22.816228] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.816888] [ 22.817030] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.817052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.817059] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.817067] Call trace: [ 22.817072] show_stack+0x20/0x38 (C) [ 22.817085] dump_stack_lvl+0x8c/0xd0 [ 22.817098] print_report+0x118/0x608 [ 22.817111] kasan_report+0xdc/0x128 [ 22.817124] kasan_check_range+0x100/0x1a8 [ 22.817138] __kasan_check_write+0x20/0x30 [ 22.817153] kasan_atomics_helper+0x760/0x4858 [ 22.817166] kasan_atomics+0x198/0x2e0 [ 22.817178] kunit_try_run_case+0x170/0x3f0 [ 22.817193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.817210] kthread+0x328/0x630 [ 22.817225] ret_from_fork+0x10/0x20 [ 22.817240] [ 22.823384] Allocated by task 323: [ 22.823692] kasan_save_stack+0x3c/0x68 [ 22.824043] kasan_save_track+0x20/0x40 [ 22.824393] kasan_save_alloc_info+0x40/0x58 [ 22.824783] __kasan_kmalloc+0xd4/0xd8 [ 22.825125] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.825540] kasan_atomics+0xb8/0x2e0 [ 22.825874] kunit_try_run_case+0x170/0x3f0 [ 22.826257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.826754] kthread+0x328/0x630 [ 22.827054] ret_from_fork+0x10/0x20 [ 22.827383] [ 22.827523] The buggy address belongs to the object at ffff00000ea09200 [ 22.827523] which belongs to the cache kmalloc-64 of size 64 [ 22.828613] The buggy address is located 0 bytes to the right of [ 22.828613] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.829749] [ 22.829891] The buggy address belongs to the physical page: [ 22.830389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.831087] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.831672] page_type: f5(slab) [ 22.831960] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.832651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.833339] page dumped because: kasan: bad access detected [ 22.833836] [ 22.833976] Memory state around the buggy address: [ 22.834405] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.835049] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.835692] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.836334] ^ [ 22.836764] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.837408] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.838050] ================================================================== [ 23.213418] ================================================================== [ 23.214057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 23.214711] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.215356] [ 23.215495] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.215509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.215513] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.215518] Call trace: [ 23.215521] show_stack+0x20/0x38 (C) [ 23.215530] dump_stack_lvl+0x8c/0xd0 [ 23.215539] print_report+0x118/0x608 [ 23.215548] kasan_report+0xdc/0x128 [ 23.215556] __asan_report_load4_noabort+0x20/0x30 [ 23.215566] kasan_atomics_helper+0x3e04/0x4858 [ 23.215575] kasan_atomics+0x198/0x2e0 [ 23.215583] kunit_try_run_case+0x170/0x3f0 [ 23.215593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.215605] kthread+0x328/0x630 [ 23.215615] ret_from_fork+0x10/0x20 [ 23.215625] [ 23.221456] Allocated by task 323: [ 23.221760] kasan_save_stack+0x3c/0x68 [ 23.222104] kasan_save_track+0x20/0x40 [ 23.222449] kasan_save_alloc_info+0x40/0x58 [ 23.222832] __kasan_kmalloc+0xd4/0xd8 [ 23.223169] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.223577] kasan_atomics+0xb8/0x2e0 [ 23.223906] kunit_try_run_case+0x170/0x3f0 [ 23.224282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.224772] kthread+0x328/0x630 [ 23.225064] ret_from_fork+0x10/0x20 [ 23.225387] [ 23.225523] The buggy address belongs to the object at ffff00000ea09200 [ 23.225523] which belongs to the cache kmalloc-64 of size 64 [ 23.226606] The buggy address is located 0 bytes to the right of [ 23.226606] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.227735] [ 23.227873] The buggy address belongs to the physical page: [ 23.228364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.229056] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.229635] page_type: f5(slab) [ 23.229918] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.230602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.231283] page dumped because: kasan: bad access detected [ 23.231775] [ 23.231911] Memory state around the buggy address: [ 23.232336] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.232973] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.233610] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.234246] ^ [ 23.234671] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.235307] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.235943] ================================================================== [ 23.752658] ================================================================== [ 23.753295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 23.753948] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.754594] [ 23.754732] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.754746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.754751] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.754755] Call trace: [ 23.754759] show_stack+0x20/0x38 (C) [ 23.754768] dump_stack_lvl+0x8c/0xd0 [ 23.754776] print_report+0x118/0x608 [ 23.754784] kasan_report+0xdc/0x128 [ 23.754793] __asan_report_load8_noabort+0x20/0x30 [ 23.754803] kasan_atomics_helper+0x3db0/0x4858 [ 23.754812] kasan_atomics+0x198/0x2e0 [ 23.754820] kunit_try_run_case+0x170/0x3f0 [ 23.754830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.754842] kthread+0x328/0x630 [ 23.754852] ret_from_fork+0x10/0x20 [ 23.754861] [ 23.760691] Allocated by task 323: [ 23.760995] kasan_save_stack+0x3c/0x68 [ 23.761341] kasan_save_track+0x20/0x40 [ 23.761685] kasan_save_alloc_info+0x40/0x58 [ 23.762067] __kasan_kmalloc+0xd4/0xd8 [ 23.762405] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.762812] kasan_atomics+0xb8/0x2e0 [ 23.763140] kunit_try_run_case+0x170/0x3f0 [ 23.763516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.764007] kthread+0x328/0x630 [ 23.764299] ret_from_fork+0x10/0x20 [ 23.764622] [ 23.764760] The buggy address belongs to the object at ffff00000ea09200 [ 23.764760] which belongs to the cache kmalloc-64 of size 64 [ 23.765842] The buggy address is located 0 bytes to the right of [ 23.765842] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.766972] [ 23.767109] The buggy address belongs to the physical page: [ 23.767600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.768291] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.768869] page_type: f5(slab) [ 23.769154] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.769838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.770519] page dumped because: kasan: bad access detected [ 23.771011] [ 23.771148] Memory state around the buggy address: [ 23.771574] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.772210] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.772847] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.773483] ^ [ 23.773908] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.774546] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.775182] ================================================================== [ 23.353479] ================================================================== [ 23.354115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 23.354760] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.355414] [ 23.355552] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.355567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.355571] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.355576] Call trace: [ 23.355579] show_stack+0x20/0x38 (C) [ 23.355588] dump_stack_lvl+0x8c/0xd0 [ 23.355597] print_report+0x118/0x608 [ 23.355605] kasan_report+0xdc/0x128 [ 23.355614] kasan_check_range+0x100/0x1a8 [ 23.355622] __kasan_check_write+0x20/0x30 [ 23.355632] kasan_atomics_helper+0xf20/0x4858 [ 23.355641] kasan_atomics+0x198/0x2e0 [ 23.355648] kunit_try_run_case+0x170/0x3f0 [ 23.355659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.355671] kthread+0x328/0x630 [ 23.355681] ret_from_fork+0x10/0x20 [ 23.355690] [ 23.361813] Allocated by task 323: [ 23.362118] kasan_save_stack+0x3c/0x68 [ 23.362463] kasan_save_track+0x20/0x40 [ 23.362806] kasan_save_alloc_info+0x40/0x58 [ 23.363189] __kasan_kmalloc+0xd4/0xd8 [ 23.363526] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.363933] kasan_atomics+0xb8/0x2e0 [ 23.364262] kunit_try_run_case+0x170/0x3f0 [ 23.364637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.365128] kthread+0x328/0x630 [ 23.365421] ret_from_fork+0x10/0x20 [ 23.365743] [ 23.365881] The buggy address belongs to the object at ffff00000ea09200 [ 23.365881] which belongs to the cache kmalloc-64 of size 64 [ 23.366964] The buggy address is located 0 bytes to the right of [ 23.366964] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.368093] [ 23.368230] The buggy address belongs to the physical page: [ 23.368722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.369412] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.369990] page_type: f5(slab) [ 23.370274] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.370958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.371640] page dumped because: kasan: bad access detected [ 23.372132] [ 23.372269] Memory state around the buggy address: [ 23.372693] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.373330] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.373966] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.374603] ^ [ 23.375029] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.375666] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.376303] ================================================================== [ 22.427702] ================================================================== [ 22.428388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 22.429083] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.429768] [ 22.429936] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.429988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.430003] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.430021] Call trace: [ 22.430035] show_stack+0x20/0x38 (C) [ 22.430068] dump_stack_lvl+0x8c/0xd0 [ 22.430100] print_report+0x118/0x608 [ 22.430133] kasan_report+0xdc/0x128 [ 22.430163] __asan_report_store4_noabort+0x20/0x30 [ 22.430199] kasan_atomics_helper+0x3f7c/0x4858 [ 22.430230] kasan_atomics+0x198/0x2e0 [ 22.430257] kunit_try_run_case+0x170/0x3f0 [ 22.430294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.430335] kthread+0x328/0x630 [ 22.430370] ret_from_fork+0x10/0x20 [ 22.430404] [ 22.436361] Allocated by task 323: [ 22.436690] kasan_save_stack+0x3c/0x68 [ 22.437065] kasan_save_track+0x20/0x40 [ 22.437439] kasan_save_alloc_info+0x40/0x58 [ 22.437854] __kasan_kmalloc+0xd4/0xd8 [ 22.438218] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.438659] kasan_atomics+0xb8/0x2e0 [ 22.439016] kunit_try_run_case+0x170/0x3f0 [ 22.439424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.439951] kthread+0x328/0x630 [ 22.440275] ret_from_fork+0x10/0x20 [ 22.440626] [ 22.440781] The buggy address belongs to the object at ffff00000ea09200 [ 22.440781] which belongs to the cache kmalloc-64 of size 64 [ 22.441900] The buggy address is located 0 bytes to the right of [ 22.441900] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.443067] [ 22.443223] The buggy address belongs to the physical page: [ 22.443740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.444465] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.445078] page_type: f5(slab) [ 22.445393] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.446111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.446820] page dumped because: kasan: bad access detected [ 22.447336] [ 22.447490] Memory state around the buggy address: [ 22.447939] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.448608] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.449276] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.449939] ^ [ 22.450388] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.451056] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.451719] ================================================================== [ 22.719496] ================================================================== [ 22.720140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 22.720793] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.721452] [ 22.721595] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.721616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.721623] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.721630] Call trace: [ 22.721635] show_stack+0x20/0x38 (C) [ 22.721649] dump_stack_lvl+0x8c/0xd0 [ 22.721662] print_report+0x118/0x608 [ 22.721675] kasan_report+0xdc/0x128 [ 22.721687] kasan_check_range+0x100/0x1a8 [ 22.721701] __kasan_check_write+0x20/0x30 [ 22.721716] kasan_atomics_helper+0x5b4/0x4858 [ 22.721728] kasan_atomics+0x198/0x2e0 [ 22.721741] kunit_try_run_case+0x170/0x3f0 [ 22.721756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.721773] kthread+0x328/0x630 [ 22.721788] ret_from_fork+0x10/0x20 [ 22.721803] [ 22.727949] Allocated by task 323: [ 22.728258] kasan_save_stack+0x3c/0x68 [ 22.728609] kasan_save_track+0x20/0x40 [ 22.728959] kasan_save_alloc_info+0x40/0x58 [ 22.729349] __kasan_kmalloc+0xd4/0xd8 [ 22.729691] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.730106] kasan_atomics+0xb8/0x2e0 [ 22.730441] kunit_try_run_case+0x170/0x3f0 [ 22.730824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.731321] kthread+0x328/0x630 [ 22.731621] ret_from_fork+0x10/0x20 [ 22.731950] [ 22.732090] The buggy address belongs to the object at ffff00000ea09200 [ 22.732090] which belongs to the cache kmalloc-64 of size 64 [ 22.733180] The buggy address is located 0 bytes to the right of [ 22.733180] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.734317] [ 22.734457] The buggy address belongs to the physical page: [ 22.734954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.735652] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.736237] page_type: f5(slab) [ 22.736528] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.737218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.737904] page dumped because: kasan: bad access detected [ 22.738402] [ 22.738542] Memory state around the buggy address: [ 22.738972] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.739615] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.740259] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.740901] ^ [ 22.741331] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.741974] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.742616] ================================================================== [ 23.846081] ================================================================== [ 23.846719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 23.847372] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.848018] [ 23.848156] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.848170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.848175] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.848179] Call trace: [ 23.848183] show_stack+0x20/0x38 (C) [ 23.848192] dump_stack_lvl+0x8c/0xd0 [ 23.848201] print_report+0x118/0x608 [ 23.848210] kasan_report+0xdc/0x128 [ 23.848218] __asan_report_load8_noabort+0x20/0x30 [ 23.848229] kasan_atomics_helper+0x3e10/0x4858 [ 23.848237] kasan_atomics+0x198/0x2e0 [ 23.848245] kunit_try_run_case+0x170/0x3f0 [ 23.848255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.848267] kthread+0x328/0x630 [ 23.848277] ret_from_fork+0x10/0x20 [ 23.848287] [ 23.854112] Allocated by task 323: [ 23.854415] kasan_save_stack+0x3c/0x68 [ 23.854760] kasan_save_track+0x20/0x40 [ 23.855104] kasan_save_alloc_info+0x40/0x58 [ 23.855487] __kasan_kmalloc+0xd4/0xd8 [ 23.855824] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.856231] kasan_atomics+0xb8/0x2e0 [ 23.856560] kunit_try_run_case+0x170/0x3f0 [ 23.856937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.857427] kthread+0x328/0x630 [ 23.857721] ret_from_fork+0x10/0x20 [ 23.858043] [ 23.858181] The buggy address belongs to the object at ffff00000ea09200 [ 23.858181] which belongs to the cache kmalloc-64 of size 64 [ 23.859265] The buggy address is located 0 bytes to the right of [ 23.859265] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.860395] [ 23.860531] The buggy address belongs to the physical page: [ 23.861023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.861715] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.862294] page_type: f5(slab) [ 23.862578] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.863262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.863944] page dumped because: kasan: bad access detected [ 23.864436] [ 23.864573] Memory state around the buggy address: [ 23.864998] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.865635] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.866272] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.866909] ^ [ 23.867335] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.867972] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.868609] ================================================================== [ 23.799355] ================================================================== [ 23.799993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 23.800647] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.801293] [ 23.801432] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.801446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.801450] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.801455] Call trace: [ 23.801458] show_stack+0x20/0x38 (C) [ 23.801468] dump_stack_lvl+0x8c/0xd0 [ 23.801476] print_report+0x118/0x608 [ 23.801485] kasan_report+0xdc/0x128 [ 23.801493] __asan_report_load8_noabort+0x20/0x30 [ 23.801504] kasan_atomics_helper+0x3df4/0x4858 [ 23.801512] kasan_atomics+0x198/0x2e0 [ 23.801520] kunit_try_run_case+0x170/0x3f0 [ 23.801531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.801543] kthread+0x328/0x630 [ 23.801553] ret_from_fork+0x10/0x20 [ 23.801563] [ 23.807390] Allocated by task 323: [ 23.807694] kasan_save_stack+0x3c/0x68 [ 23.808039] kasan_save_track+0x20/0x40 [ 23.808382] kasan_save_alloc_info+0x40/0x58 [ 23.808765] __kasan_kmalloc+0xd4/0xd8 [ 23.809102] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.809509] kasan_atomics+0xb8/0x2e0 [ 23.809838] kunit_try_run_case+0x170/0x3f0 [ 23.810213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.810703] kthread+0x328/0x630 [ 23.810996] ret_from_fork+0x10/0x20 [ 23.811318] [ 23.811455] The buggy address belongs to the object at ffff00000ea09200 [ 23.811455] which belongs to the cache kmalloc-64 of size 64 [ 23.812538] The buggy address is located 0 bytes to the right of [ 23.812538] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.813667] [ 23.813804] The buggy address belongs to the physical page: [ 23.814296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.814988] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.815565] page_type: f5(slab) [ 23.815850] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.816532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.817214] page dumped because: kasan: bad access detected [ 23.817706] [ 23.817843] Memory state around the buggy address: [ 23.818268] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.818907] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.819546] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.820181] ^ [ 23.820607] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.821244] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.821880] ================================================================== [ 23.915986] ================================================================== [ 23.916623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 23.917277] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.917931] [ 23.918069] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.918084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.918088] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.918093] Call trace: [ 23.918096] show_stack+0x20/0x38 (C) [ 23.918105] dump_stack_lvl+0x8c/0xd0 [ 23.918114] print_report+0x118/0x608 [ 23.918123] kasan_report+0xdc/0x128 [ 23.918132] kasan_check_range+0x100/0x1a8 [ 23.918141] __kasan_check_write+0x20/0x30 [ 23.918150] kasan_atomics_helper+0x17ec/0x4858 [ 23.918159] kasan_atomics+0x198/0x2e0 [ 23.918166] kunit_try_run_case+0x170/0x3f0 [ 23.918178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.918190] kthread+0x328/0x630 [ 23.918200] ret_from_fork+0x10/0x20 [ 23.918209] [ 23.924336] Allocated by task 323: [ 23.924641] kasan_save_stack+0x3c/0x68 [ 23.924985] kasan_save_track+0x20/0x40 [ 23.925329] kasan_save_alloc_info+0x40/0x58 [ 23.925711] __kasan_kmalloc+0xd4/0xd8 [ 23.926048] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.926456] kasan_atomics+0xb8/0x2e0 [ 23.926785] kunit_try_run_case+0x170/0x3f0 [ 23.927160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.927651] kthread+0x328/0x630 [ 23.927944] ret_from_fork+0x10/0x20 [ 23.928266] [ 23.928403] The buggy address belongs to the object at ffff00000ea09200 [ 23.928403] which belongs to the cache kmalloc-64 of size 64 [ 23.929485] The buggy address is located 0 bytes to the right of [ 23.929485] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.930615] [ 23.930751] The buggy address belongs to the physical page: [ 23.931243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.931935] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.932514] page_type: f5(slab) [ 23.932799] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.933482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.934164] page dumped because: kasan: bad access detected [ 23.934657] [ 23.934793] Memory state around the buggy address: [ 23.935219] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.935856] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.936493] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.937129] ^ [ 23.937553] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.938190] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.938826] ================================================================== [ 22.623537] ================================================================== [ 22.624194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 22.624857] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.625526] [ 22.625675] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.625707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.625717] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.625727] Call trace: [ 22.625735] show_stack+0x20/0x38 (C) [ 22.625755] dump_stack_lvl+0x8c/0xd0 [ 22.625775] print_report+0x118/0x608 [ 22.625794] kasan_report+0xdc/0x128 [ 22.625812] kasan_check_range+0x100/0x1a8 [ 22.625832] __kasan_check_write+0x20/0x30 [ 22.625854] kasan_atomics_helper+0x414/0x4858 [ 22.625873] kasan_atomics+0x198/0x2e0 [ 22.625890] kunit_try_run_case+0x170/0x3f0 [ 22.625913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.625940] kthread+0x328/0x630 [ 22.625962] ret_from_fork+0x10/0x20 [ 22.625984] [ 22.632166] Allocated by task 323: [ 22.632482] kasan_save_stack+0x3c/0x68 [ 22.632842] kasan_save_track+0x20/0x40 [ 22.633200] kasan_save_alloc_info+0x40/0x58 [ 22.633598] __kasan_kmalloc+0xd4/0xd8 [ 22.633949] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.634376] kasan_atomics+0xb8/0x2e0 [ 22.634718] kunit_try_run_case+0x170/0x3f0 [ 22.635109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.635618] kthread+0x328/0x630 [ 22.635927] ret_from_fork+0x10/0x20 [ 22.636266] [ 22.636411] The buggy address belongs to the object at ffff00000ea09200 [ 22.636411] which belongs to the cache kmalloc-64 of size 64 [ 22.637512] The buggy address is located 0 bytes to the right of [ 22.637512] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.638660] [ 22.638806] The buggy address belongs to the physical page: [ 22.639311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.640019] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.640612] page_type: f5(slab) [ 22.640910] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.641610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.642305] page dumped because: kasan: bad access detected [ 22.642809] [ 22.642955] Memory state around the buggy address: [ 22.643393] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.644046] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.644698] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.645348] ^ [ 22.645786] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.646438] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.647088] ================================================================== [ 22.526768] ================================================================== [ 22.527421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 22.528092] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.528754] [ 22.528904] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.528937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.528946] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.528958] Call trace: [ 22.528965] show_stack+0x20/0x38 (C) [ 22.528986] dump_stack_lvl+0x8c/0xd0 [ 22.529005] print_report+0x118/0x608 [ 22.529024] kasan_report+0xdc/0x128 [ 22.529042] __asan_report_load4_noabort+0x20/0x30 [ 22.529065] kasan_atomics_helper+0x40fc/0x4858 [ 22.529084] kasan_atomics+0x198/0x2e0 [ 22.529102] kunit_try_run_case+0x170/0x3f0 [ 22.529125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.529151] kthread+0x328/0x630 [ 22.529173] ret_from_fork+0x10/0x20 [ 22.529193] [ 22.535082] Allocated by task 323: [ 22.535398] kasan_save_stack+0x3c/0x68 [ 22.535757] kasan_save_track+0x20/0x40 [ 22.536116] kasan_save_alloc_info+0x40/0x58 [ 22.536514] __kasan_kmalloc+0xd4/0xd8 [ 22.536864] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.537290] kasan_atomics+0xb8/0x2e0 [ 22.537631] kunit_try_run_case+0x170/0x3f0 [ 22.538024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.538532] kthread+0x328/0x630 [ 22.538841] ret_from_fork+0x10/0x20 [ 22.539178] [ 22.539325] The buggy address belongs to the object at ffff00000ea09200 [ 22.539325] which belongs to the cache kmalloc-64 of size 64 [ 22.540426] The buggy address is located 0 bytes to the right of [ 22.540426] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.541575] [ 22.541721] The buggy address belongs to the physical page: [ 22.542224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.542931] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.543526] page_type: f5(slab) [ 22.543824] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.544524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.545220] page dumped because: kasan: bad access detected [ 22.545723] [ 22.545868] Memory state around the buggy address: [ 22.546305] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.546958] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.547611] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.548260] ^ [ 22.548698] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.549350] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.550000] ================================================================== [ 23.283297] ================================================================== [ 23.283934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 23.284579] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.285232] [ 23.285371] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.285385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.285389] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.285394] Call trace: [ 23.285397] show_stack+0x20/0x38 (C) [ 23.285406] dump_stack_lvl+0x8c/0xd0 [ 23.285415] print_report+0x118/0x608 [ 23.285424] kasan_report+0xdc/0x128 [ 23.285432] kasan_check_range+0x100/0x1a8 [ 23.285441] __kasan_check_write+0x20/0x30 [ 23.285451] kasan_atomics_helper+0xe44/0x4858 [ 23.285460] kasan_atomics+0x198/0x2e0 [ 23.285467] kunit_try_run_case+0x170/0x3f0 [ 23.285478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.285489] kthread+0x328/0x630 [ 23.285499] ret_from_fork+0x10/0x20 [ 23.285509] [ 23.291630] Allocated by task 323: [ 23.291934] kasan_save_stack+0x3c/0x68 [ 23.292278] kasan_save_track+0x20/0x40 [ 23.292622] kasan_save_alloc_info+0x40/0x58 [ 23.293004] __kasan_kmalloc+0xd4/0xd8 [ 23.293342] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.293748] kasan_atomics+0xb8/0x2e0 [ 23.294077] kunit_try_run_case+0x170/0x3f0 [ 23.294454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.294943] kthread+0x328/0x630 [ 23.295236] ret_from_fork+0x10/0x20 [ 23.295558] [ 23.295695] The buggy address belongs to the object at ffff00000ea09200 [ 23.295695] which belongs to the cache kmalloc-64 of size 64 [ 23.296778] The buggy address is located 0 bytes to the right of [ 23.296778] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.297907] [ 23.298044] The buggy address belongs to the physical page: [ 23.298537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.299228] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.299806] page_type: f5(slab) [ 23.300089] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.300773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.301455] page dumped because: kasan: bad access detected [ 23.301947] [ 23.302084] Memory state around the buggy address: [ 23.302509] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.303146] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.303783] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.304419] ^ [ 23.304845] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.305483] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.306119] ================================================================== [ 23.306770] ================================================================== [ 23.307407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 23.308060] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.308714] [ 23.308851] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.308866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.308870] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.308875] Call trace: [ 23.308878] show_stack+0x20/0x38 (C) [ 23.308887] dump_stack_lvl+0x8c/0xd0 [ 23.308896] print_report+0x118/0x608 [ 23.308905] kasan_report+0xdc/0x128 [ 23.308913] __asan_report_store8_noabort+0x20/0x30 [ 23.308923] kasan_atomics_helper+0x3e5c/0x4858 [ 23.308932] kasan_atomics+0x198/0x2e0 [ 23.308940] kunit_try_run_case+0x170/0x3f0 [ 23.308950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.308961] kthread+0x328/0x630 [ 23.308971] ret_from_fork+0x10/0x20 [ 23.308981] [ 23.314818] Allocated by task 323: [ 23.315123] kasan_save_stack+0x3c/0x68 [ 23.315467] kasan_save_track+0x20/0x40 [ 23.315811] kasan_save_alloc_info+0x40/0x58 [ 23.316194] __kasan_kmalloc+0xd4/0xd8 [ 23.316531] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.316939] kasan_atomics+0xb8/0x2e0 [ 23.317268] kunit_try_run_case+0x170/0x3f0 [ 23.317643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.318133] kthread+0x328/0x630 [ 23.318426] ret_from_fork+0x10/0x20 [ 23.318748] [ 23.318886] The buggy address belongs to the object at ffff00000ea09200 [ 23.318886] which belongs to the cache kmalloc-64 of size 64 [ 23.319969] The buggy address is located 0 bytes to the right of [ 23.319969] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.321098] [ 23.321235] The buggy address belongs to the physical page: [ 23.321727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.322419] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.322997] page_type: f5(slab) [ 23.323282] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.323966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.324648] page dumped because: kasan: bad access detected [ 23.325139] [ 23.325276] Memory state around the buggy address: [ 23.325701] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.326340] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.326978] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.327614] ^ [ 23.328039] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.328678] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.329313] ================================================================== [ 23.376955] ================================================================== [ 23.377591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 23.378237] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.378890] [ 23.379028] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.379042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.379046] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.379051] Call trace: [ 23.379054] show_stack+0x20/0x38 (C) [ 23.379063] dump_stack_lvl+0x8c/0xd0 [ 23.379072] print_report+0x118/0x608 [ 23.379081] kasan_report+0xdc/0x128 [ 23.379089] kasan_check_range+0x100/0x1a8 [ 23.379099] __kasan_check_write+0x20/0x30 [ 23.379108] kasan_atomics_helper+0xf88/0x4858 [ 23.379117] kasan_atomics+0x198/0x2e0 [ 23.379124] kunit_try_run_case+0x170/0x3f0 [ 23.379135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.379146] kthread+0x328/0x630 [ 23.379156] ret_from_fork+0x10/0x20 [ 23.379166] [ 23.385289] Allocated by task 323: [ 23.385594] kasan_save_stack+0x3c/0x68 [ 23.385938] kasan_save_track+0x20/0x40 [ 23.386282] kasan_save_alloc_info+0x40/0x58 [ 23.386665] __kasan_kmalloc+0xd4/0xd8 [ 23.387002] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.387409] kasan_atomics+0xb8/0x2e0 [ 23.387738] kunit_try_run_case+0x170/0x3f0 [ 23.388113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.388602] kthread+0x328/0x630 [ 23.388896] ret_from_fork+0x10/0x20 [ 23.389218] [ 23.389356] The buggy address belongs to the object at ffff00000ea09200 [ 23.389356] which belongs to the cache kmalloc-64 of size 64 [ 23.390438] The buggy address is located 0 bytes to the right of [ 23.390438] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.391568] [ 23.391705] The buggy address belongs to the physical page: [ 23.392196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.392887] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.393465] page_type: f5(slab) [ 23.393749] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.394433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.395115] page dumped because: kasan: bad access detected [ 23.395607] [ 23.395745] Memory state around the buggy address: [ 23.396170] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.396807] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.397446] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.398083] ^ [ 23.398508] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.399145] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.399781] ================================================================== [ 23.822556] ================================================================== [ 23.823194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 23.823847] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.824501] [ 23.824640] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.824655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.824659] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.824664] Call trace: [ 23.824667] show_stack+0x20/0x38 (C) [ 23.824676] dump_stack_lvl+0x8c/0xd0 [ 23.824685] print_report+0x118/0x608 [ 23.824694] kasan_report+0xdc/0x128 [ 23.824702] kasan_check_range+0x100/0x1a8 [ 23.824712] __kasan_check_write+0x20/0x30 [ 23.824721] kasan_atomics_helper+0x16d0/0x4858 [ 23.824730] kasan_atomics+0x198/0x2e0 [ 23.824738] kunit_try_run_case+0x170/0x3f0 [ 23.824748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.824760] kthread+0x328/0x630 [ 23.824770] ret_from_fork+0x10/0x20 [ 23.824779] [ 23.830906] Allocated by task 323: [ 23.831210] kasan_save_stack+0x3c/0x68 [ 23.831554] kasan_save_track+0x20/0x40 [ 23.831897] kasan_save_alloc_info+0x40/0x58 [ 23.832280] __kasan_kmalloc+0xd4/0xd8 [ 23.832617] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.833024] kasan_atomics+0xb8/0x2e0 [ 23.833353] kunit_try_run_case+0x170/0x3f0 [ 23.833729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.834220] kthread+0x328/0x630 [ 23.834513] ret_from_fork+0x10/0x20 [ 23.834835] [ 23.834971] The buggy address belongs to the object at ffff00000ea09200 [ 23.834971] which belongs to the cache kmalloc-64 of size 64 [ 23.836054] The buggy address is located 0 bytes to the right of [ 23.836054] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.837183] [ 23.837320] The buggy address belongs to the physical page: [ 23.837813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.838505] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.839084] page_type: f5(slab) [ 23.839368] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.840052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.840734] page dumped because: kasan: bad access detected [ 23.841226] [ 23.841362] Memory state around the buggy address: [ 23.841788] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.842424] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.843062] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.843699] ^ [ 23.844125] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.844763] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.845399] ================================================================== [ 22.767203] ================================================================== [ 22.767847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 22.768498] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.769158] [ 22.769301] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.769323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.769329] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.769336] Call trace: [ 22.769341] show_stack+0x20/0x38 (C) [ 22.769355] dump_stack_lvl+0x8c/0xd0 [ 22.769368] print_report+0x118/0x608 [ 22.769381] kasan_report+0xdc/0x128 [ 22.769394] kasan_check_range+0x100/0x1a8 [ 22.769408] __kasan_check_write+0x20/0x30 [ 22.769422] kasan_atomics_helper+0x684/0x4858 [ 22.769435] kasan_atomics+0x198/0x2e0 [ 22.769447] kunit_try_run_case+0x170/0x3f0 [ 22.769463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.769480] kthread+0x328/0x630 [ 22.769495] ret_from_fork+0x10/0x20 [ 22.769510] [ 22.775656] Allocated by task 323: [ 22.775965] kasan_save_stack+0x3c/0x68 [ 22.776316] kasan_save_track+0x20/0x40 [ 22.776667] kasan_save_alloc_info+0x40/0x58 [ 22.777057] __kasan_kmalloc+0xd4/0xd8 [ 22.777398] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.777815] kasan_atomics+0xb8/0x2e0 [ 22.778149] kunit_try_run_case+0x170/0x3f0 [ 22.778532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.779029] kthread+0x328/0x630 [ 22.779329] ret_from_fork+0x10/0x20 [ 22.779658] [ 22.779798] The buggy address belongs to the object at ffff00000ea09200 [ 22.779798] which belongs to the cache kmalloc-64 of size 64 [ 22.780888] The buggy address is located 0 bytes to the right of [ 22.780888] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.782024] [ 22.782165] The buggy address belongs to the physical page: [ 22.782661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.783359] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.783945] page_type: f5(slab) [ 22.784235] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.784925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.785611] page dumped because: kasan: bad access detected [ 22.786109] [ 22.786249] Memory state around the buggy address: [ 22.786679] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.787322] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.787966] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.788608] ^ [ 22.789038] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.789681] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.790323] ================================================================== [ 23.517978] ================================================================== [ 23.518616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 23.519269] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.519923] [ 23.520061] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.520075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.520079] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.520084] Call trace: [ 23.520088] show_stack+0x20/0x38 (C) [ 23.520097] dump_stack_lvl+0x8c/0xd0 [ 23.520105] print_report+0x118/0x608 [ 23.520114] kasan_report+0xdc/0x128 [ 23.520122] kasan_check_range+0x100/0x1a8 [ 23.520131] __kasan_check_write+0x20/0x30 [ 23.520141] kasan_atomics_helper+0x11f8/0x4858 [ 23.520150] kasan_atomics+0x198/0x2e0 [ 23.520158] kunit_try_run_case+0x170/0x3f0 [ 23.520168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.520179] kthread+0x328/0x630 [ 23.520189] ret_from_fork+0x10/0x20 [ 23.520198] [ 23.526326] Allocated by task 323: [ 23.526631] kasan_save_stack+0x3c/0x68 [ 23.526975] kasan_save_track+0x20/0x40 [ 23.527320] kasan_save_alloc_info+0x40/0x58 [ 23.527702] __kasan_kmalloc+0xd4/0xd8 [ 23.528039] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.528446] kasan_atomics+0xb8/0x2e0 [ 23.528775] kunit_try_run_case+0x170/0x3f0 [ 23.529151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.529641] kthread+0x328/0x630 [ 23.529934] ret_from_fork+0x10/0x20 [ 23.530257] [ 23.530393] The buggy address belongs to the object at ffff00000ea09200 [ 23.530393] which belongs to the cache kmalloc-64 of size 64 [ 23.531475] The buggy address is located 0 bytes to the right of [ 23.531475] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.532605] [ 23.532742] The buggy address belongs to the physical page: [ 23.533233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.533925] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.534503] page_type: f5(slab) [ 23.534788] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.535472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.536154] page dumped because: kasan: bad access detected [ 23.536646] [ 23.536782] Memory state around the buggy address: [ 23.537208] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.537844] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.538481] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.539117] ^ [ 23.539543] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.540181] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.540817] ================================================================== [ 22.885851] ================================================================== [ 22.886488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 22.887141] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.887787] [ 22.887925] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.887939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.887944] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.887948] Call trace: [ 22.887952] show_stack+0x20/0x38 (C) [ 22.887961] dump_stack_lvl+0x8c/0xd0 [ 22.887970] print_report+0x118/0x608 [ 22.887978] kasan_report+0xdc/0x128 [ 22.887987] __asan_report_load4_noabort+0x20/0x30 [ 22.887997] kasan_atomics_helper+0x42d8/0x4858 [ 22.888005] kasan_atomics+0x198/0x2e0 [ 22.888013] kunit_try_run_case+0x170/0x3f0 [ 22.888024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.888035] kthread+0x328/0x630 [ 22.888045] ret_from_fork+0x10/0x20 [ 22.888055] [ 22.893887] Allocated by task 323: [ 22.894192] kasan_save_stack+0x3c/0x68 [ 22.894536] kasan_save_track+0x20/0x40 [ 22.894880] kasan_save_alloc_info+0x40/0x58 [ 22.895262] __kasan_kmalloc+0xd4/0xd8 [ 22.895598] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.896005] kasan_atomics+0xb8/0x2e0 [ 22.896334] kunit_try_run_case+0x170/0x3f0 [ 22.896710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.897200] kthread+0x328/0x630 [ 22.897493] ret_from_fork+0x10/0x20 [ 22.897816] [ 22.897952] The buggy address belongs to the object at ffff00000ea09200 [ 22.897952] which belongs to the cache kmalloc-64 of size 64 [ 22.899035] The buggy address is located 0 bytes to the right of [ 22.899035] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.900163] [ 22.900300] The buggy address belongs to the physical page: [ 22.900792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.901484] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.902061] page_type: f5(slab) [ 22.902346] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.903030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.903711] page dumped because: kasan: bad access detected [ 22.904203] [ 22.904340] Memory state around the buggy address: [ 22.904764] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.905400] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.906038] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.906673] ^ [ 22.907099] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.907736] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.908372] ================================================================== [ 23.611997] ================================================================== [ 23.612635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 23.613289] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.613935] [ 23.614073] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.614087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.614091] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.614096] Call trace: [ 23.614100] show_stack+0x20/0x38 (C) [ 23.614108] dump_stack_lvl+0x8c/0xd0 [ 23.614117] print_report+0x118/0x608 [ 23.614126] kasan_report+0xdc/0x128 [ 23.614134] __asan_report_load8_noabort+0x20/0x30 [ 23.614145] kasan_atomics_helper+0x3f04/0x4858 [ 23.614153] kasan_atomics+0x198/0x2e0 [ 23.614161] kunit_try_run_case+0x170/0x3f0 [ 23.614172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.614183] kthread+0x328/0x630 [ 23.614193] ret_from_fork+0x10/0x20 [ 23.614202] [ 23.620032] Allocated by task 323: [ 23.620336] kasan_save_stack+0x3c/0x68 [ 23.620680] kasan_save_track+0x20/0x40 [ 23.621024] kasan_save_alloc_info+0x40/0x58 [ 23.621407] __kasan_kmalloc+0xd4/0xd8 [ 23.621744] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.622151] kasan_atomics+0xb8/0x2e0 [ 23.622480] kunit_try_run_case+0x170/0x3f0 [ 23.622857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.623346] kthread+0x328/0x630 [ 23.623639] ret_from_fork+0x10/0x20 [ 23.623961] [ 23.624098] The buggy address belongs to the object at ffff00000ea09200 [ 23.624098] which belongs to the cache kmalloc-64 of size 64 [ 23.625180] The buggy address is located 0 bytes to the right of [ 23.625180] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.626310] [ 23.626446] The buggy address belongs to the physical page: [ 23.626938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.627629] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.628208] page_type: f5(slab) [ 23.628491] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.629175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.629857] page dumped because: kasan: bad access detected [ 23.630349] [ 23.630487] Memory state around the buggy address: [ 23.630913] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.631549] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.632186] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.632822] ^ [ 23.633248] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.633886] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.634522] ================================================================== [ 23.260109] ================================================================== [ 23.260748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 23.261400] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.262045] [ 23.262184] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.262198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.262202] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.262207] Call trace: [ 23.262210] show_stack+0x20/0x38 (C) [ 23.262219] dump_stack_lvl+0x8c/0xd0 [ 23.262228] print_report+0x118/0x608 [ 23.262236] kasan_report+0xdc/0x128 [ 23.262245] __asan_report_load8_noabort+0x20/0x30 [ 23.262256] kasan_atomics_helper+0x3f58/0x4858 [ 23.262264] kasan_atomics+0x198/0x2e0 [ 23.262272] kunit_try_run_case+0x170/0x3f0 [ 23.262282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.262294] kthread+0x328/0x630 [ 23.262304] ret_from_fork+0x10/0x20 [ 23.262313] [ 23.268147] Allocated by task 323: [ 23.268452] kasan_save_stack+0x3c/0x68 [ 23.268796] kasan_save_track+0x20/0x40 [ 23.269140] kasan_save_alloc_info+0x40/0x58 [ 23.269523] __kasan_kmalloc+0xd4/0xd8 [ 23.269860] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.270268] kasan_atomics+0xb8/0x2e0 [ 23.270597] kunit_try_run_case+0x170/0x3f0 [ 23.270973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.271464] kthread+0x328/0x630 [ 23.271757] ret_from_fork+0x10/0x20 [ 23.272080] [ 23.272216] The buggy address belongs to the object at ffff00000ea09200 [ 23.272216] which belongs to the cache kmalloc-64 of size 64 [ 23.273299] The buggy address is located 0 bytes to the right of [ 23.273299] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.274428] [ 23.274565] The buggy address belongs to the physical page: [ 23.275058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.275749] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.276327] page_type: f5(slab) [ 23.276612] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.277295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.277978] page dumped because: kasan: bad access detected [ 23.278470] [ 23.278606] Memory state around the buggy address: [ 23.279032] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.279670] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.280307] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.280942] ^ [ 23.281367] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.282004] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.282641] ================================================================== [ 23.400442] ================================================================== [ 23.401079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 23.401724] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.402377] [ 23.402515] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.402530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.402534] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.402539] Call trace: [ 23.402542] show_stack+0x20/0x38 (C) [ 23.402551] dump_stack_lvl+0x8c/0xd0 [ 23.402560] print_report+0x118/0x608 [ 23.402568] kasan_report+0xdc/0x128 [ 23.402577] kasan_check_range+0x100/0x1a8 [ 23.402586] __kasan_check_write+0x20/0x30 [ 23.402596] kasan_atomics_helper+0xff0/0x4858 [ 23.402605] kasan_atomics+0x198/0x2e0 [ 23.402612] kunit_try_run_case+0x170/0x3f0 [ 23.402622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.402634] kthread+0x328/0x630 [ 23.402644] ret_from_fork+0x10/0x20 [ 23.402653] [ 23.408776] Allocated by task 323: [ 23.409079] kasan_save_stack+0x3c/0x68 [ 23.409423] kasan_save_track+0x20/0x40 [ 23.409768] kasan_save_alloc_info+0x40/0x58 [ 23.410151] __kasan_kmalloc+0xd4/0xd8 [ 23.410489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.410895] kasan_atomics+0xb8/0x2e0 [ 23.411224] kunit_try_run_case+0x170/0x3f0 [ 23.411600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.412090] kthread+0x328/0x630 [ 23.412384] ret_from_fork+0x10/0x20 [ 23.412706] [ 23.412843] The buggy address belongs to the object at ffff00000ea09200 [ 23.412843] which belongs to the cache kmalloc-64 of size 64 [ 23.413926] The buggy address is located 0 bytes to the right of [ 23.413926] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.415055] [ 23.415192] The buggy address belongs to the physical page: [ 23.415683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.416375] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.416952] page_type: f5(slab) [ 23.417237] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.417920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.418602] page dumped because: kasan: bad access detected [ 23.419095] [ 23.419232] Memory state around the buggy address: [ 23.419657] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.420294] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.420931] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.421568] ^ [ 23.421994] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.422631] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.423267] ================================================================== [ 23.026463] ================================================================== [ 23.027099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 23.027752] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.028398] [ 23.028537] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.028552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.028556] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.028561] Call trace: [ 23.028564] show_stack+0x20/0x38 (C) [ 23.028573] dump_stack_lvl+0x8c/0xd0 [ 23.028582] print_report+0x118/0x608 [ 23.028591] kasan_report+0xdc/0x128 [ 23.028599] __asan_report_load4_noabort+0x20/0x30 [ 23.028610] kasan_atomics_helper+0x3dcc/0x4858 [ 23.028618] kasan_atomics+0x198/0x2e0 [ 23.028626] kunit_try_run_case+0x170/0x3f0 [ 23.028637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.028649] kthread+0x328/0x630 [ 23.028659] ret_from_fork+0x10/0x20 [ 23.028668] [ 23.034499] Allocated by task 323: [ 23.034804] kasan_save_stack+0x3c/0x68 [ 23.035149] kasan_save_track+0x20/0x40 [ 23.035493] kasan_save_alloc_info+0x40/0x58 [ 23.035876] __kasan_kmalloc+0xd4/0xd8 [ 23.036213] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.036620] kasan_atomics+0xb8/0x2e0 [ 23.036948] kunit_try_run_case+0x170/0x3f0 [ 23.037324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.037815] kthread+0x328/0x630 [ 23.038108] ret_from_fork+0x10/0x20 [ 23.038431] [ 23.038567] The buggy address belongs to the object at ffff00000ea09200 [ 23.038567] which belongs to the cache kmalloc-64 of size 64 [ 23.039650] The buggy address is located 0 bytes to the right of [ 23.039650] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.040780] [ 23.040917] The buggy address belongs to the physical page: [ 23.041408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.042099] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.042676] page_type: f5(slab) [ 23.042959] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.043643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.044325] page dumped because: kasan: bad access detected [ 23.044817] [ 23.044955] Memory state around the buggy address: [ 23.045380] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.046017] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.046653] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.047289] ^ [ 23.047715] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.048353] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.048989] ================================================================== [ 23.423934] ================================================================== [ 23.424571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 23.425224] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.425878] [ 23.426016] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.426030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.426035] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.426040] Call trace: [ 23.426043] show_stack+0x20/0x38 (C) [ 23.426052] dump_stack_lvl+0x8c/0xd0 [ 23.426061] print_report+0x118/0x608 [ 23.426069] kasan_report+0xdc/0x128 [ 23.426078] kasan_check_range+0x100/0x1a8 [ 23.426087] __kasan_check_write+0x20/0x30 [ 23.426097] kasan_atomics_helper+0x1058/0x4858 [ 23.426105] kasan_atomics+0x198/0x2e0 [ 23.426113] kunit_try_run_case+0x170/0x3f0 [ 23.426123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.426135] kthread+0x328/0x630 [ 23.426145] ret_from_fork+0x10/0x20 [ 23.426155] [ 23.432281] Allocated by task 323: [ 23.432586] kasan_save_stack+0x3c/0x68 [ 23.432930] kasan_save_track+0x20/0x40 [ 23.433273] kasan_save_alloc_info+0x40/0x58 [ 23.433656] __kasan_kmalloc+0xd4/0xd8 [ 23.433993] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.434400] kasan_atomics+0xb8/0x2e0 [ 23.434729] kunit_try_run_case+0x170/0x3f0 [ 23.435104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.435594] kthread+0x328/0x630 [ 23.435887] ret_from_fork+0x10/0x20 [ 23.436209] [ 23.436346] The buggy address belongs to the object at ffff00000ea09200 [ 23.436346] which belongs to the cache kmalloc-64 of size 64 [ 23.437429] The buggy address is located 0 bytes to the right of [ 23.437429] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.438558] [ 23.438695] The buggy address belongs to the physical page: [ 23.439186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.439878] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.440457] page_type: f5(slab) [ 23.440740] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.441424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.442105] page dumped because: kasan: bad access detected [ 23.442597] [ 23.442734] Memory state around the buggy address: [ 23.443159] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.443796] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.444433] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.445069] ^ [ 23.445495] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.446132] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.446768] ================================================================== [ 23.564985] ================================================================== [ 23.565623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 23.566276] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.566930] [ 23.567068] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.567082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.567087] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.567092] Call trace: [ 23.567095] show_stack+0x20/0x38 (C) [ 23.567105] dump_stack_lvl+0x8c/0xd0 [ 23.567113] print_report+0x118/0x608 [ 23.567122] kasan_report+0xdc/0x128 [ 23.567130] kasan_check_range+0x100/0x1a8 [ 23.567140] __kasan_check_write+0x20/0x30 [ 23.567149] kasan_atomics_helper+0x12d8/0x4858 [ 23.567158] kasan_atomics+0x198/0x2e0 [ 23.567165] kunit_try_run_case+0x170/0x3f0 [ 23.567176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.567188] kthread+0x328/0x630 [ 23.567198] ret_from_fork+0x10/0x20 [ 23.567207] [ 23.573335] Allocated by task 323: [ 23.573640] kasan_save_stack+0x3c/0x68 [ 23.573983] kasan_save_track+0x20/0x40 [ 23.574327] kasan_save_alloc_info+0x40/0x58 [ 23.574710] __kasan_kmalloc+0xd4/0xd8 [ 23.575047] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.575454] kasan_atomics+0xb8/0x2e0 [ 23.575782] kunit_try_run_case+0x170/0x3f0 [ 23.576158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.576648] kthread+0x328/0x630 [ 23.576940] ret_from_fork+0x10/0x20 [ 23.577262] [ 23.577400] The buggy address belongs to the object at ffff00000ea09200 [ 23.577400] which belongs to the cache kmalloc-64 of size 64 [ 23.578483] The buggy address is located 0 bytes to the right of [ 23.578483] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.579612] [ 23.579749] The buggy address belongs to the physical page: [ 23.580241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.580932] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.581512] page_type: f5(slab) [ 23.581795] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.582479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.583161] page dumped because: kasan: bad access detected [ 23.583653] [ 23.583791] Memory state around the buggy address: [ 23.584216] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.584853] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.585491] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.586127] ^ [ 23.586553] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.587190] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.587828] ================================================================== [ 22.979490] ================================================================== [ 22.980127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 22.980773] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.981427] [ 22.981565] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.981580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.981584] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.981589] Call trace: [ 22.981592] show_stack+0x20/0x38 (C) [ 22.981601] dump_stack_lvl+0x8c/0xd0 [ 22.981610] print_report+0x118/0x608 [ 22.981619] kasan_report+0xdc/0x128 [ 22.981628] kasan_check_range+0x100/0x1a8 [ 22.981637] __kasan_check_write+0x20/0x30 [ 22.981647] kasan_atomics_helper+0xa6c/0x4858 [ 22.981655] kasan_atomics+0x198/0x2e0 [ 22.981663] kunit_try_run_case+0x170/0x3f0 [ 22.981674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.981686] kthread+0x328/0x630 [ 22.981696] ret_from_fork+0x10/0x20 [ 22.981706] [ 22.987831] Allocated by task 323: [ 22.988135] kasan_save_stack+0x3c/0x68 [ 22.988480] kasan_save_track+0x20/0x40 [ 22.988823] kasan_save_alloc_info+0x40/0x58 [ 22.989206] __kasan_kmalloc+0xd4/0xd8 [ 22.989542] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.989949] kasan_atomics+0xb8/0x2e0 [ 22.990279] kunit_try_run_case+0x170/0x3f0 [ 22.990654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.991145] kthread+0x328/0x630 [ 22.991438] ret_from_fork+0x10/0x20 [ 22.991760] [ 22.991897] The buggy address belongs to the object at ffff00000ea09200 [ 22.991897] which belongs to the cache kmalloc-64 of size 64 [ 22.992979] The buggy address is located 0 bytes to the right of [ 22.992979] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.994109] [ 22.994246] The buggy address belongs to the physical page: [ 22.994738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.995429] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.996008] page_type: f5(slab) [ 22.996292] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.996976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.997658] page dumped because: kasan: bad access detected [ 22.998150] [ 22.998287] Memory state around the buggy address: [ 22.998712] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.999350] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.999987] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.000623] ^ [ 23.001049] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.001686] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.002322] ================================================================== [ 23.470955] ================================================================== [ 23.471593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 23.472248] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.472902] [ 23.473040] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.473055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.473059] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.473064] Call trace: [ 23.473067] show_stack+0x20/0x38 (C) [ 23.473077] dump_stack_lvl+0x8c/0xd0 [ 23.473085] print_report+0x118/0x608 [ 23.473094] kasan_report+0xdc/0x128 [ 23.473102] kasan_check_range+0x100/0x1a8 [ 23.473112] __kasan_check_write+0x20/0x30 [ 23.473122] kasan_atomics_helper+0x1128/0x4858 [ 23.473130] kasan_atomics+0x198/0x2e0 [ 23.473138] kunit_try_run_case+0x170/0x3f0 [ 23.473148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.473160] kthread+0x328/0x630 [ 23.473170] ret_from_fork+0x10/0x20 [ 23.473179] [ 23.479312] Allocated by task 323: [ 23.479617] kasan_save_stack+0x3c/0x68 [ 23.479961] kasan_save_track+0x20/0x40 [ 23.480304] kasan_save_alloc_info+0x40/0x58 [ 23.480687] __kasan_kmalloc+0xd4/0xd8 [ 23.481024] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.481432] kasan_atomics+0xb8/0x2e0 [ 23.481760] kunit_try_run_case+0x170/0x3f0 [ 23.482136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.482625] kthread+0x328/0x630 [ 23.482918] ret_from_fork+0x10/0x20 [ 23.483240] [ 23.483377] The buggy address belongs to the object at ffff00000ea09200 [ 23.483377] which belongs to the cache kmalloc-64 of size 64 [ 23.484459] The buggy address is located 0 bytes to the right of [ 23.484459] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.485589] [ 23.485726] The buggy address belongs to the physical page: [ 23.486218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.486910] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.487489] page_type: f5(slab) [ 23.487774] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.488457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.489139] page dumped because: kasan: bad access detected [ 23.489632] [ 23.489769] Memory state around the buggy address: [ 23.490195] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.490832] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.491469] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.492105] ^ [ 23.492530] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.493168] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.493804] ================================================================== [ 22.575161] ================================================================== [ 22.575816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 22.576487] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.577156] [ 22.577306] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.577338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.577347] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.577358] Call trace: [ 22.577366] show_stack+0x20/0x38 (C) [ 22.577386] dump_stack_lvl+0x8c/0xd0 [ 22.577405] print_report+0x118/0x608 [ 22.577424] kasan_report+0xdc/0x128 [ 22.577442] __asan_report_store4_noabort+0x20/0x30 [ 22.577466] kasan_atomics_helper+0x3f94/0x4858 [ 22.577484] kasan_atomics+0x198/0x2e0 [ 22.577502] kunit_try_run_case+0x170/0x3f0 [ 22.577525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.577551] kthread+0x328/0x630 [ 22.577572] ret_from_fork+0x10/0x20 [ 22.577593] [ 22.583486] Allocated by task 323: [ 22.583801] kasan_save_stack+0x3c/0x68 [ 22.584160] kasan_save_track+0x20/0x40 [ 22.584519] kasan_save_alloc_info+0x40/0x58 [ 22.584917] __kasan_kmalloc+0xd4/0xd8 [ 22.585267] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.585693] kasan_atomics+0xb8/0x2e0 [ 22.586035] kunit_try_run_case+0x170/0x3f0 [ 22.586428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.586936] kthread+0x328/0x630 [ 22.587245] ret_from_fork+0x10/0x20 [ 22.587583] [ 22.587728] The buggy address belongs to the object at ffff00000ea09200 [ 22.587728] which belongs to the cache kmalloc-64 of size 64 [ 22.588828] The buggy address is located 0 bytes to the right of [ 22.588828] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.589976] [ 22.590122] The buggy address belongs to the physical page: [ 22.590627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.591335] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.591927] page_type: f5(slab) [ 22.592225] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.592925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.593621] page dumped because: kasan: bad access detected [ 22.594125] [ 22.594270] Memory state around the buggy address: [ 22.594707] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.595360] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.596012] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.596661] ^ [ 22.597098] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.597751] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.598402] ================================================================== [ 23.635174] ================================================================== [ 23.635812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 23.636465] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.637119] [ 23.637256] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.637271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.637275] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.637280] Call trace: [ 23.637283] show_stack+0x20/0x38 (C) [ 23.637292] dump_stack_lvl+0x8c/0xd0 [ 23.637301] print_report+0x118/0x608 [ 23.637310] kasan_report+0xdc/0x128 [ 23.637318] kasan_check_range+0x100/0x1a8 [ 23.637327] __kasan_check_write+0x20/0x30 [ 23.637337] kasan_atomics_helper+0x1414/0x4858 [ 23.637345] kasan_atomics+0x198/0x2e0 [ 23.637353] kunit_try_run_case+0x170/0x3f0 [ 23.637364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.637375] kthread+0x328/0x630 [ 23.637385] ret_from_fork+0x10/0x20 [ 23.637394] [ 23.643524] Allocated by task 323: [ 23.643828] kasan_save_stack+0x3c/0x68 [ 23.644172] kasan_save_track+0x20/0x40 [ 23.644516] kasan_save_alloc_info+0x40/0x58 [ 23.644899] __kasan_kmalloc+0xd4/0xd8 [ 23.645236] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.645644] kasan_atomics+0xb8/0x2e0 [ 23.645973] kunit_try_run_case+0x170/0x3f0 [ 23.646349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.646839] kthread+0x328/0x630 [ 23.647132] ret_from_fork+0x10/0x20 [ 23.647454] [ 23.647592] The buggy address belongs to the object at ffff00000ea09200 [ 23.647592] which belongs to the cache kmalloc-64 of size 64 [ 23.648675] The buggy address is located 0 bytes to the right of [ 23.648675] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.649804] [ 23.649941] The buggy address belongs to the physical page: [ 23.650434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.651125] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.651703] page_type: f5(slab) [ 23.651986] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.652670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.653352] page dumped because: kasan: bad access detected [ 23.653843] [ 23.653980] Memory state around the buggy address: [ 23.654405] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.655042] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.655679] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.656315] ^ [ 23.656741] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.657377] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.658013] ================================================================== [ 23.073335] ================================================================== [ 23.073974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 23.074628] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.075273] [ 23.075412] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.075426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.075431] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.075435] Call trace: [ 23.075439] show_stack+0x20/0x38 (C) [ 23.075448] dump_stack_lvl+0x8c/0xd0 [ 23.075457] print_report+0x118/0x608 [ 23.075466] kasan_report+0xdc/0x128 [ 23.075474] __asan_report_load4_noabort+0x20/0x30 [ 23.075485] kasan_atomics_helper+0x3dbc/0x4858 [ 23.075494] kasan_atomics+0x198/0x2e0 [ 23.075502] kunit_try_run_case+0x170/0x3f0 [ 23.075512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.075524] kthread+0x328/0x630 [ 23.075534] ret_from_fork+0x10/0x20 [ 23.075544] [ 23.081376] Allocated by task 323: [ 23.081680] kasan_save_stack+0x3c/0x68 [ 23.082025] kasan_save_track+0x20/0x40 [ 23.082369] kasan_save_alloc_info+0x40/0x58 [ 23.082752] __kasan_kmalloc+0xd4/0xd8 [ 23.083090] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.083498] kasan_atomics+0xb8/0x2e0 [ 23.083827] kunit_try_run_case+0x170/0x3f0 [ 23.084204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.084694] kthread+0x328/0x630 [ 23.084987] ret_from_fork+0x10/0x20 [ 23.085309] [ 23.085446] The buggy address belongs to the object at ffff00000ea09200 [ 23.085446] which belongs to the cache kmalloc-64 of size 64 [ 23.086529] The buggy address is located 0 bytes to the right of [ 23.086529] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.087658] [ 23.087796] The buggy address belongs to the physical page: [ 23.088288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.088979] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.089558] page_type: f5(slab) [ 23.089842] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.090526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.091207] page dumped because: kasan: bad access detected [ 23.091699] [ 23.091836] Memory state around the buggy address: [ 23.092261] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.092900] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.093536] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.094172] ^ [ 23.094598] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.095235] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.095872] ================================================================== [ 22.671795] ================================================================== [ 22.672439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 22.673092] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.673752] [ 22.673894] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.673916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.673922] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.673930] Call trace: [ 22.673935] show_stack+0x20/0x38 (C) [ 22.673948] dump_stack_lvl+0x8c/0xd0 [ 22.673961] print_report+0x118/0x608 [ 22.673974] kasan_report+0xdc/0x128 [ 22.673986] kasan_check_range+0x100/0x1a8 [ 22.674000] __kasan_check_write+0x20/0x30 [ 22.674015] kasan_atomics_helper+0x4e4/0x4858 [ 22.674028] kasan_atomics+0x198/0x2e0 [ 22.674039] kunit_try_run_case+0x170/0x3f0 [ 22.674054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.674072] kthread+0x328/0x630 [ 22.674087] ret_from_fork+0x10/0x20 [ 22.674101] [ 22.680249] Allocated by task 323: [ 22.680557] kasan_save_stack+0x3c/0x68 [ 22.680907] kasan_save_track+0x20/0x40 [ 22.681258] kasan_save_alloc_info+0x40/0x58 [ 22.681648] __kasan_kmalloc+0xd4/0xd8 [ 22.681990] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.682405] kasan_atomics+0xb8/0x2e0 [ 22.682740] kunit_try_run_case+0x170/0x3f0 [ 22.683123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.683621] kthread+0x328/0x630 [ 22.683920] ret_from_fork+0x10/0x20 [ 22.684249] [ 22.684391] The buggy address belongs to the object at ffff00000ea09200 [ 22.684391] which belongs to the cache kmalloc-64 of size 64 [ 22.685481] The buggy address is located 0 bytes to the right of [ 22.685481] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.686618] [ 22.686758] The buggy address belongs to the physical page: [ 22.687255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.687952] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.688538] page_type: f5(slab) [ 22.688826] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.689518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.690204] page dumped because: kasan: bad access detected [ 22.690702] [ 22.690842] Memory state around the buggy address: [ 22.691272] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.691915] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.692558] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.693200] ^ [ 22.693631] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.694274] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.694915] ================================================================== [ 23.166716] ================================================================== [ 23.167353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 23.168006] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.168652] [ 23.168791] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.168804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.168809] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.168814] Call trace: [ 23.168817] show_stack+0x20/0x38 (C) [ 23.168826] dump_stack_lvl+0x8c/0xd0 [ 23.168834] print_report+0x118/0x608 [ 23.168842] kasan_report+0xdc/0x128 [ 23.168851] __asan_report_load4_noabort+0x20/0x30 [ 23.168861] kasan_atomics_helper+0x3dd8/0x4858 [ 23.168870] kasan_atomics+0x198/0x2e0 [ 23.168877] kunit_try_run_case+0x170/0x3f0 [ 23.168888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.168900] kthread+0x328/0x630 [ 23.168910] ret_from_fork+0x10/0x20 [ 23.168919] [ 23.174751] Allocated by task 323: [ 23.175055] kasan_save_stack+0x3c/0x68 [ 23.175400] kasan_save_track+0x20/0x40 [ 23.175743] kasan_save_alloc_info+0x40/0x58 [ 23.176126] __kasan_kmalloc+0xd4/0xd8 [ 23.176462] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.176869] kasan_atomics+0xb8/0x2e0 [ 23.177196] kunit_try_run_case+0x170/0x3f0 [ 23.177572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.178063] kthread+0x328/0x630 [ 23.178356] ret_from_fork+0x10/0x20 [ 23.178678] [ 23.178815] The buggy address belongs to the object at ffff00000ea09200 [ 23.178815] which belongs to the cache kmalloc-64 of size 64 [ 23.179897] The buggy address is located 0 bytes to the right of [ 23.179897] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.181027] [ 23.181165] The buggy address belongs to the physical page: [ 23.181656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.182347] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.182924] page_type: f5(slab) [ 23.183207] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.183891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.184572] page dumped because: kasan: bad access detected [ 23.185064] [ 23.185202] Memory state around the buggy address: [ 23.185627] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.186264] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.186902] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.187538] ^ [ 23.187964] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.188601] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.189238] ================================================================== [ 23.869275] ================================================================== [ 23.869912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 23.870565] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.871219] [ 23.871357] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.871371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.871375] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.871380] Call trace: [ 23.871383] show_stack+0x20/0x38 (C) [ 23.871393] dump_stack_lvl+0x8c/0xd0 [ 23.871401] print_report+0x118/0x608 [ 23.871410] kasan_report+0xdc/0x128 [ 23.871418] kasan_check_range+0x100/0x1a8 [ 23.871427] __kasan_check_write+0x20/0x30 [ 23.871437] kasan_atomics_helper+0x175c/0x4858 [ 23.871445] kasan_atomics+0x198/0x2e0 [ 23.871453] kunit_try_run_case+0x170/0x3f0 [ 23.871463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.871475] kthread+0x328/0x630 [ 23.871485] ret_from_fork+0x10/0x20 [ 23.871494] [ 23.877622] Allocated by task 323: [ 23.877926] kasan_save_stack+0x3c/0x68 [ 23.878271] kasan_save_track+0x20/0x40 [ 23.878615] kasan_save_alloc_info+0x40/0x58 [ 23.878998] __kasan_kmalloc+0xd4/0xd8 [ 23.879335] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.879742] kasan_atomics+0xb8/0x2e0 [ 23.880071] kunit_try_run_case+0x170/0x3f0 [ 23.880448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.880939] kthread+0x328/0x630 [ 23.881232] ret_from_fork+0x10/0x20 [ 23.881554] [ 23.881691] The buggy address belongs to the object at ffff00000ea09200 [ 23.881691] which belongs to the cache kmalloc-64 of size 64 [ 23.882773] The buggy address is located 0 bytes to the right of [ 23.882773] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.883903] [ 23.884039] The buggy address belongs to the physical page: [ 23.884531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.885223] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.885800] page_type: f5(slab) [ 23.886084] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.886767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.887449] page dumped because: kasan: bad access detected [ 23.887941] [ 23.888078] Memory state around the buggy address: [ 23.888504] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.889140] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.889779] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.890416] ^ [ 23.890842] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.891479] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.892116] ================================================================== [ 22.647949] ================================================================== [ 22.648596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 22.649250] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.649910] [ 22.650053] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.650075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.650082] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.650089] Call trace: [ 22.650094] show_stack+0x20/0x38 (C) [ 22.650108] dump_stack_lvl+0x8c/0xd0 [ 22.650121] print_report+0x118/0x608 [ 22.650135] kasan_report+0xdc/0x128 [ 22.650147] kasan_check_range+0x100/0x1a8 [ 22.650161] __kasan_check_write+0x20/0x30 [ 22.650176] kasan_atomics_helper+0x47c/0x4858 [ 22.650189] kasan_atomics+0x198/0x2e0 [ 22.650201] kunit_try_run_case+0x170/0x3f0 [ 22.650216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.650234] kthread+0x328/0x630 [ 22.650249] ret_from_fork+0x10/0x20 [ 22.650264] [ 22.656407] Allocated by task 323: [ 22.656716] kasan_save_stack+0x3c/0x68 [ 22.657067] kasan_save_track+0x20/0x40 [ 22.657417] kasan_save_alloc_info+0x40/0x58 [ 22.657807] __kasan_kmalloc+0xd4/0xd8 [ 22.658149] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.658564] kasan_atomics+0xb8/0x2e0 [ 22.658899] kunit_try_run_case+0x170/0x3f0 [ 22.659282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.659779] kthread+0x328/0x630 [ 22.660079] ret_from_fork+0x10/0x20 [ 22.660407] [ 22.660548] The buggy address belongs to the object at ffff00000ea09200 [ 22.660548] which belongs to the cache kmalloc-64 of size 64 [ 22.661638] The buggy address is located 0 bytes to the right of [ 22.661638] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.662777] [ 22.662917] The buggy address belongs to the physical page: [ 22.663415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.664112] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.664698] page_type: f5(slab) [ 22.664987] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.665677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.666364] page dumped because: kasan: bad access detected [ 22.666861] [ 22.667002] Memory state around the buggy address: [ 22.667431] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.668074] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.668718] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.669360] ^ [ 22.669790] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.670433] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.671075] ================================================================== [ 22.838831] ================================================================== [ 22.839471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 22.840117] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.840771] [ 22.840909] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.840924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.840928] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.840934] Call trace: [ 22.840937] show_stack+0x20/0x38 (C) [ 22.840946] dump_stack_lvl+0x8c/0xd0 [ 22.840955] print_report+0x118/0x608 [ 22.840964] kasan_report+0xdc/0x128 [ 22.840972] kasan_check_range+0x100/0x1a8 [ 22.840981] __kasan_check_write+0x20/0x30 [ 22.840991] kasan_atomics_helper+0x7cc/0x4858 [ 22.840999] kasan_atomics+0x198/0x2e0 [ 22.841008] kunit_try_run_case+0x170/0x3f0 [ 22.841018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.841030] kthread+0x328/0x630 [ 22.841040] ret_from_fork+0x10/0x20 [ 22.841049] [ 22.847172] Allocated by task 323: [ 22.847477] kasan_save_stack+0x3c/0x68 [ 22.847821] kasan_save_track+0x20/0x40 [ 22.848165] kasan_save_alloc_info+0x40/0x58 [ 22.848547] __kasan_kmalloc+0xd4/0xd8 [ 22.848884] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.849293] kasan_atomics+0xb8/0x2e0 [ 22.849622] kunit_try_run_case+0x170/0x3f0 [ 22.849998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.850489] kthread+0x328/0x630 [ 22.850782] ret_from_fork+0x10/0x20 [ 22.851104] [ 22.851240] The buggy address belongs to the object at ffff00000ea09200 [ 22.851240] which belongs to the cache kmalloc-64 of size 64 [ 22.852323] The buggy address is located 0 bytes to the right of [ 22.852323] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.853452] [ 22.853589] The buggy address belongs to the physical page: [ 22.854080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.854773] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.855351] page_type: f5(slab) [ 22.855636] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.856319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.857001] page dumped because: kasan: bad access detected [ 22.857493] [ 22.857631] Memory state around the buggy address: [ 22.858057] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.858693] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.859332] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.859968] ^ [ 22.860394] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.861031] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.861667] ================================================================== [ 23.002978] ================================================================== [ 23.003616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 23.004262] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.004916] [ 23.005054] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.005069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.005073] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.005078] Call trace: [ 23.005082] show_stack+0x20/0x38 (C) [ 23.005091] dump_stack_lvl+0x8c/0xd0 [ 23.005099] print_report+0x118/0x608 [ 23.005108] kasan_report+0xdc/0x128 [ 23.005117] kasan_check_range+0x100/0x1a8 [ 23.005126] __kasan_check_write+0x20/0x30 [ 23.005136] kasan_atomics_helper+0xad4/0x4858 [ 23.005144] kasan_atomics+0x198/0x2e0 [ 23.005152] kunit_try_run_case+0x170/0x3f0 [ 23.005162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.005174] kthread+0x328/0x630 [ 23.005184] ret_from_fork+0x10/0x20 [ 23.005194] [ 23.011317] Allocated by task 323: [ 23.011622] kasan_save_stack+0x3c/0x68 [ 23.011967] kasan_save_track+0x20/0x40 [ 23.012311] kasan_save_alloc_info+0x40/0x58 [ 23.012694] __kasan_kmalloc+0xd4/0xd8 [ 23.013030] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.013437] kasan_atomics+0xb8/0x2e0 [ 23.013766] kunit_try_run_case+0x170/0x3f0 [ 23.014142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.014633] kthread+0x328/0x630 [ 23.014926] ret_from_fork+0x10/0x20 [ 23.015248] [ 23.015385] The buggy address belongs to the object at ffff00000ea09200 [ 23.015385] which belongs to the cache kmalloc-64 of size 64 [ 23.016468] The buggy address is located 0 bytes to the right of [ 23.016468] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.017597] [ 23.017735] The buggy address belongs to the physical page: [ 23.018227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.018918] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.019496] page_type: f5(slab) [ 23.019780] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.020464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.021146] page dumped because: kasan: bad access detected [ 23.021638] [ 23.021774] Memory state around the buggy address: [ 23.022200] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.022838] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.023475] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.024112] ^ [ 23.024537] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.025174] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.025810] ================================================================== [ 23.189913] ================================================================== [ 23.190551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 23.191197] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.191850] [ 23.191989] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.192003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.192007] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.192012] Call trace: [ 23.192015] show_stack+0x20/0x38 (C) [ 23.192024] dump_stack_lvl+0x8c/0xd0 [ 23.192033] print_report+0x118/0x608 [ 23.192041] kasan_report+0xdc/0x128 [ 23.192049] kasan_check_range+0x100/0x1a8 [ 23.192059] __kasan_check_write+0x20/0x30 [ 23.192068] kasan_atomics_helper+0xd3c/0x4858 [ 23.192077] kasan_atomics+0x198/0x2e0 [ 23.192085] kunit_try_run_case+0x170/0x3f0 [ 23.192095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.192107] kthread+0x328/0x630 [ 23.192117] ret_from_fork+0x10/0x20 [ 23.192126] [ 23.198249] Allocated by task 323: [ 23.198553] kasan_save_stack+0x3c/0x68 [ 23.198897] kasan_save_track+0x20/0x40 [ 23.199242] kasan_save_alloc_info+0x40/0x58 [ 23.199625] __kasan_kmalloc+0xd4/0xd8 [ 23.199962] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.200369] kasan_atomics+0xb8/0x2e0 [ 23.200698] kunit_try_run_case+0x170/0x3f0 [ 23.201073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.201562] kthread+0x328/0x630 [ 23.201855] ret_from_fork+0x10/0x20 [ 23.202178] [ 23.202316] The buggy address belongs to the object at ffff00000ea09200 [ 23.202316] which belongs to the cache kmalloc-64 of size 64 [ 23.203399] The buggy address is located 0 bytes to the right of [ 23.203399] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.204527] [ 23.204664] The buggy address belongs to the physical page: [ 23.205155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.205847] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.206426] page_type: f5(slab) [ 23.206709] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.207393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.208074] page dumped because: kasan: bad access detected [ 23.208566] [ 23.208702] Memory state around the buggy address: [ 23.209128] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.209766] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.210403] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.211039] ^ [ 23.211465] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.212103] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.212739] ================================================================== [ 22.550825] ================================================================== [ 22.551479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 22.552141] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.552812] [ 22.552961] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.552993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.553003] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.553013] Call trace: [ 22.553021] show_stack+0x20/0x38 (C) [ 22.553041] dump_stack_lvl+0x8c/0xd0 [ 22.553060] print_report+0x118/0x608 [ 22.553079] kasan_report+0xdc/0x128 [ 22.553097] kasan_check_range+0x100/0x1a8 [ 22.553117] __kasan_check_write+0x20/0x30 [ 22.553139] kasan_atomics_helper+0x32c/0x4858 [ 22.553158] kasan_atomics+0x198/0x2e0 [ 22.553175] kunit_try_run_case+0x170/0x3f0 [ 22.553198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.553224] kthread+0x328/0x630 [ 22.553246] ret_from_fork+0x10/0x20 [ 22.553267] [ 22.559446] Allocated by task 323: [ 22.559762] kasan_save_stack+0x3c/0x68 [ 22.560121] kasan_save_track+0x20/0x40 [ 22.560480] kasan_save_alloc_info+0x40/0x58 [ 22.560879] __kasan_kmalloc+0xd4/0xd8 [ 22.561230] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.561656] kasan_atomics+0xb8/0x2e0 [ 22.561999] kunit_try_run_case+0x170/0x3f0 [ 22.562390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.562899] kthread+0x328/0x630 [ 22.563207] ret_from_fork+0x10/0x20 [ 22.563545] [ 22.563691] The buggy address belongs to the object at ffff00000ea09200 [ 22.563691] which belongs to the cache kmalloc-64 of size 64 [ 22.564791] The buggy address is located 0 bytes to the right of [ 22.564791] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.565941] [ 22.566086] The buggy address belongs to the physical page: [ 22.566590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.567299] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.567892] page_type: f5(slab) [ 22.568189] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.568889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.569583] page dumped because: kasan: bad access detected [ 22.570088] [ 22.570233] Memory state around the buggy address: [ 22.570670] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.571322] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.571974] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.572623] ^ [ 22.573060] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.573712] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.574362] ================================================================== [ 22.791057] ================================================================== [ 22.791701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 22.792354] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.793014] [ 22.793156] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.793178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.793184] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.793191] Call trace: [ 22.793196] show_stack+0x20/0x38 (C) [ 22.793210] dump_stack_lvl+0x8c/0xd0 [ 22.793223] print_report+0x118/0x608 [ 22.793236] kasan_report+0xdc/0x128 [ 22.793249] kasan_check_range+0x100/0x1a8 [ 22.793262] __kasan_check_write+0x20/0x30 [ 22.793277] kasan_atomics_helper+0x6ec/0x4858 [ 22.793290] kasan_atomics+0x198/0x2e0 [ 22.793301] kunit_try_run_case+0x170/0x3f0 [ 22.793317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.793335] kthread+0x328/0x630 [ 22.793350] ret_from_fork+0x10/0x20 [ 22.793364] [ 22.799511] Allocated by task 323: [ 22.799820] kasan_save_stack+0x3c/0x68 [ 22.800171] kasan_save_track+0x20/0x40 [ 22.800521] kasan_save_alloc_info+0x40/0x58 [ 22.800911] __kasan_kmalloc+0xd4/0xd8 [ 22.801254] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.801668] kasan_atomics+0xb8/0x2e0 [ 22.802003] kunit_try_run_case+0x170/0x3f0 [ 22.802386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.802883] kthread+0x328/0x630 [ 22.803183] ret_from_fork+0x10/0x20 [ 22.803511] [ 22.803652] The buggy address belongs to the object at ffff00000ea09200 [ 22.803652] which belongs to the cache kmalloc-64 of size 64 [ 22.804741] The buggy address is located 0 bytes to the right of [ 22.804741] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.805877] [ 22.806018] The buggy address belongs to the physical page: [ 22.806515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.807213] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.807798] page_type: f5(slab) [ 22.808088] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.808778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.809464] page dumped because: kasan: bad access detected [ 22.809961] [ 22.810101] Memory state around the buggy address: [ 22.810531] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.811175] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.811818] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.812460] ^ [ 22.812890] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.813534] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.814175] ================================================================== [ 23.329990] ================================================================== [ 23.330628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 23.331274] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.331927] [ 23.332067] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.332081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.332086] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.332091] Call trace: [ 23.332094] show_stack+0x20/0x38 (C) [ 23.332103] dump_stack_lvl+0x8c/0xd0 [ 23.332112] print_report+0x118/0x608 [ 23.332122] kasan_report+0xdc/0x128 [ 23.332130] kasan_check_range+0x100/0x1a8 [ 23.332139] __kasan_check_write+0x20/0x30 [ 23.332150] kasan_atomics_helper+0xeb8/0x4858 [ 23.332158] kasan_atomics+0x198/0x2e0 [ 23.332166] kunit_try_run_case+0x170/0x3f0 [ 23.332177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.332189] kthread+0x328/0x630 [ 23.332199] ret_from_fork+0x10/0x20 [ 23.332209] [ 23.338330] Allocated by task 323: [ 23.338634] kasan_save_stack+0x3c/0x68 [ 23.338978] kasan_save_track+0x20/0x40 [ 23.339323] kasan_save_alloc_info+0x40/0x58 [ 23.339706] __kasan_kmalloc+0xd4/0xd8 [ 23.340043] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.340451] kasan_atomics+0xb8/0x2e0 [ 23.340779] kunit_try_run_case+0x170/0x3f0 [ 23.341155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.341646] kthread+0x328/0x630 [ 23.341939] ret_from_fork+0x10/0x20 [ 23.342261] [ 23.342398] The buggy address belongs to the object at ffff00000ea09200 [ 23.342398] which belongs to the cache kmalloc-64 of size 64 [ 23.343481] The buggy address is located 0 bytes to the right of [ 23.343481] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.344610] [ 23.344747] The buggy address belongs to the physical page: [ 23.345239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.345931] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.346509] page_type: f5(slab) [ 23.346793] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.347477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.348158] page dumped because: kasan: bad access detected [ 23.348651] [ 23.348787] Memory state around the buggy address: [ 23.349213] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.349851] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.350488] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.351123] ^ [ 23.351549] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.352186] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.352822] ================================================================== [ 22.743350] ================================================================== [ 22.743995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 22.744650] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.745310] [ 22.745453] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.745474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.745481] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.745488] Call trace: [ 22.745493] show_stack+0x20/0x38 (C) [ 22.745507] dump_stack_lvl+0x8c/0xd0 [ 22.745521] print_report+0x118/0x608 [ 22.745534] kasan_report+0xdc/0x128 [ 22.745546] kasan_check_range+0x100/0x1a8 [ 22.745560] __kasan_check_write+0x20/0x30 [ 22.745575] kasan_atomics_helper+0x61c/0x4858 [ 22.745588] kasan_atomics+0x198/0x2e0 [ 22.745600] kunit_try_run_case+0x170/0x3f0 [ 22.745615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.745633] kthread+0x328/0x630 [ 22.745649] ret_from_fork+0x10/0x20 [ 22.745664] [ 22.751808] Allocated by task 323: [ 22.752116] kasan_save_stack+0x3c/0x68 [ 22.752468] kasan_save_track+0x20/0x40 [ 22.752818] kasan_save_alloc_info+0x40/0x58 [ 22.753208] __kasan_kmalloc+0xd4/0xd8 [ 22.753549] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.753964] kasan_atomics+0xb8/0x2e0 [ 22.754299] kunit_try_run_case+0x170/0x3f0 [ 22.754681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.755179] kthread+0x328/0x630 [ 22.755479] ret_from_fork+0x10/0x20 [ 22.755807] [ 22.755947] The buggy address belongs to the object at ffff00000ea09200 [ 22.755947] which belongs to the cache kmalloc-64 of size 64 [ 22.757037] The buggy address is located 0 bytes to the right of [ 22.757037] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.758173] [ 22.758314] The buggy address belongs to the physical page: [ 22.758810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.759508] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.760093] page_type: f5(slab) [ 22.760383] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.761073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.761760] page dumped because: kasan: bad access detected [ 22.762257] [ 22.762397] Memory state around the buggy address: [ 22.762828] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.763471] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.764115] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.764756] ^ [ 22.765187] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.765831] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.766472] ================================================================== [ 23.658664] ================================================================== [ 23.659302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 23.659955] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.660609] [ 23.660747] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.660761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.660765] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.660770] Call trace: [ 23.660773] show_stack+0x20/0x38 (C) [ 23.660783] dump_stack_lvl+0x8c/0xd0 [ 23.660791] print_report+0x118/0x608 [ 23.660800] kasan_report+0xdc/0x128 [ 23.660808] kasan_check_range+0x100/0x1a8 [ 23.660817] __kasan_check_write+0x20/0x30 [ 23.660827] kasan_atomics_helper+0x147c/0x4858 [ 23.660836] kasan_atomics+0x198/0x2e0 [ 23.660844] kunit_try_run_case+0x170/0x3f0 [ 23.660854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.660865] kthread+0x328/0x630 [ 23.660875] ret_from_fork+0x10/0x20 [ 23.660885] [ 23.667016] Allocated by task 323: [ 23.667320] kasan_save_stack+0x3c/0x68 [ 23.667664] kasan_save_track+0x20/0x40 [ 23.668007] kasan_save_alloc_info+0x40/0x58 [ 23.668390] __kasan_kmalloc+0xd4/0xd8 [ 23.668728] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.669135] kasan_atomics+0xb8/0x2e0 [ 23.669463] kunit_try_run_case+0x170/0x3f0 [ 23.669840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.670329] kthread+0x328/0x630 [ 23.670623] ret_from_fork+0x10/0x20 [ 23.670945] [ 23.671083] The buggy address belongs to the object at ffff00000ea09200 [ 23.671083] which belongs to the cache kmalloc-64 of size 64 [ 23.672165] The buggy address is located 0 bytes to the right of [ 23.672165] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.673295] [ 23.673433] The buggy address belongs to the physical page: [ 23.673926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.674617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.675194] page_type: f5(slab) [ 23.675477] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.676162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.676843] page dumped because: kasan: bad access detected [ 23.677335] [ 23.677472] Memory state around the buggy address: [ 23.677898] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.678534] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.679171] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.679807] ^ [ 23.680233] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.680870] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.681505] ================================================================== [ 23.892776] ================================================================== [ 23.893413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 23.894066] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.894712] [ 23.894851] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.894866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.894870] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.894875] Call trace: [ 23.894878] show_stack+0x20/0x38 (C) [ 23.894887] dump_stack_lvl+0x8c/0xd0 [ 23.894896] print_report+0x118/0x608 [ 23.894905] kasan_report+0xdc/0x128 [ 23.894913] __asan_report_load8_noabort+0x20/0x30 [ 23.894923] kasan_atomics_helper+0x3e20/0x4858 [ 23.894932] kasan_atomics+0x198/0x2e0 [ 23.894940] kunit_try_run_case+0x170/0x3f0 [ 23.894951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.894963] kthread+0x328/0x630 [ 23.894973] ret_from_fork+0x10/0x20 [ 23.894982] [ 23.900816] Allocated by task 323: [ 23.901121] kasan_save_stack+0x3c/0x68 [ 23.901464] kasan_save_track+0x20/0x40 [ 23.901809] kasan_save_alloc_info+0x40/0x58 [ 23.902192] __kasan_kmalloc+0xd4/0xd8 [ 23.902529] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.902937] kasan_atomics+0xb8/0x2e0 [ 23.903266] kunit_try_run_case+0x170/0x3f0 [ 23.903641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.904132] kthread+0x328/0x630 [ 23.904425] ret_from_fork+0x10/0x20 [ 23.904748] [ 23.904884] The buggy address belongs to the object at ffff00000ea09200 [ 23.904884] which belongs to the cache kmalloc-64 of size 64 [ 23.905966] The buggy address is located 0 bytes to the right of [ 23.905966] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.907096] [ 23.907233] The buggy address belongs to the physical page: [ 23.907725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.908417] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.908995] page_type: f5(slab) [ 23.909278] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.909962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.910644] page dumped because: kasan: bad access detected [ 23.911136] [ 23.911273] Memory state around the buggy address: [ 23.911697] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.912334] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.912973] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.913610] ^ [ 23.914036] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.914674] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.915311] ================================================================== [ 23.682175] ================================================================== [ 23.682812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 23.683466] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.684120] [ 23.684258] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.684273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.684277] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.684282] Call trace: [ 23.684285] show_stack+0x20/0x38 (C) [ 23.684295] dump_stack_lvl+0x8c/0xd0 [ 23.684303] print_report+0x118/0x608 [ 23.684312] kasan_report+0xdc/0x128 [ 23.684320] kasan_check_range+0x100/0x1a8 [ 23.684330] __kasan_check_write+0x20/0x30 [ 23.684339] kasan_atomics_helper+0x14e4/0x4858 [ 23.684348] kasan_atomics+0x198/0x2e0 [ 23.684356] kunit_try_run_case+0x170/0x3f0 [ 23.684367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.684379] kthread+0x328/0x630 [ 23.684389] ret_from_fork+0x10/0x20 [ 23.684398] [ 23.690526] Allocated by task 323: [ 23.690831] kasan_save_stack+0x3c/0x68 [ 23.691176] kasan_save_track+0x20/0x40 [ 23.691520] kasan_save_alloc_info+0x40/0x58 [ 23.691903] __kasan_kmalloc+0xd4/0xd8 [ 23.692240] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.692647] kasan_atomics+0xb8/0x2e0 [ 23.692975] kunit_try_run_case+0x170/0x3f0 [ 23.693351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.693842] kthread+0x328/0x630 [ 23.694135] ret_from_fork+0x10/0x20 [ 23.694457] [ 23.694595] The buggy address belongs to the object at ffff00000ea09200 [ 23.694595] which belongs to the cache kmalloc-64 of size 64 [ 23.695677] The buggy address is located 0 bytes to the right of [ 23.695677] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.696807] [ 23.696943] The buggy address belongs to the physical page: [ 23.697435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.698127] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.698705] page_type: f5(slab) [ 23.698988] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.699672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.700354] page dumped because: kasan: bad access detected [ 23.700846] [ 23.700983] Memory state around the buggy address: [ 23.701407] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.702045] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.702682] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.703318] ^ [ 23.703743] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.704381] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.705016] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 22.227511] ================================================================== [ 22.228156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 22.228953] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.229613] [ 22.229755] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.229777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.229784] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.229791] Call trace: [ 22.229796] show_stack+0x20/0x38 (C) [ 22.229809] dump_stack_lvl+0x8c/0xd0 [ 22.229822] print_report+0x118/0x608 [ 22.229835] kasan_report+0xdc/0x128 [ 22.229848] kasan_check_range+0x100/0x1a8 [ 22.229862] __kasan_check_write+0x20/0x30 [ 22.229876] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 22.229891] kasan_bitops_generic+0x11c/0x1c8 [ 22.229904] kunit_try_run_case+0x170/0x3f0 [ 22.229919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.229937] kthread+0x328/0x630 [ 22.229952] ret_from_fork+0x10/0x20 [ 22.229965] [ 22.236308] Allocated by task 319: [ 22.236616] kasan_save_stack+0x3c/0x68 [ 22.236967] kasan_save_track+0x20/0x40 [ 22.237317] kasan_save_alloc_info+0x40/0x58 [ 22.237705] __kasan_kmalloc+0xd4/0xd8 [ 22.238048] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.238462] kasan_bitops_generic+0xa0/0x1c8 [ 22.238850] kunit_try_run_case+0x170/0x3f0 [ 22.239233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.239730] kthread+0x328/0x630 [ 22.240030] ret_from_fork+0x10/0x20 [ 22.240358] [ 22.240498] The buggy address belongs to the object at ffff00000a7446c0 [ 22.240498] which belongs to the cache kmalloc-16 of size 16 [ 22.241588] The buggy address is located 8 bytes inside of [ 22.241588] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.242673] [ 22.242814] The buggy address belongs to the physical page: [ 22.243311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.244009] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.244594] page_type: f5(slab) [ 22.244884] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.245574] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.246261] page dumped because: kasan: bad access detected [ 22.246759] [ 22.246899] Memory state around the buggy address: [ 22.247329] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.247972] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.248616] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.249258] ^ [ 22.249757] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.250400] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.251042] ================================================================== [ 22.323907] ================================================================== [ 22.324551] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 22.325347] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.326006] [ 22.326148] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.326170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.326177] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.326185] Call trace: [ 22.326189] show_stack+0x20/0x38 (C) [ 22.326203] dump_stack_lvl+0x8c/0xd0 [ 22.326216] print_report+0x118/0x608 [ 22.326228] kasan_report+0xdc/0x128 [ 22.326241] kasan_check_range+0x100/0x1a8 [ 22.326255] __kasan_check_write+0x20/0x30 [ 22.326269] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 22.326285] kasan_bitops_generic+0x11c/0x1c8 [ 22.326297] kunit_try_run_case+0x170/0x3f0 [ 22.326313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.326330] kthread+0x328/0x630 [ 22.326345] ret_from_fork+0x10/0x20 [ 22.326359] [ 22.332699] Allocated by task 319: [ 22.333007] kasan_save_stack+0x3c/0x68 [ 22.333358] kasan_save_track+0x20/0x40 [ 22.333708] kasan_save_alloc_info+0x40/0x58 [ 22.334098] __kasan_kmalloc+0xd4/0xd8 [ 22.334442] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.334856] kasan_bitops_generic+0xa0/0x1c8 [ 22.335245] kunit_try_run_case+0x170/0x3f0 [ 22.335628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.336125] kthread+0x328/0x630 [ 22.336425] ret_from_fork+0x10/0x20 [ 22.336754] [ 22.336894] The buggy address belongs to the object at ffff00000a7446c0 [ 22.336894] which belongs to the cache kmalloc-16 of size 16 [ 22.337984] The buggy address is located 8 bytes inside of [ 22.337984] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.339069] [ 22.339209] The buggy address belongs to the physical page: [ 22.339706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.340404] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.340989] page_type: f5(slab) [ 22.341280] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.341971] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.342658] page dumped because: kasan: bad access detected [ 22.343156] [ 22.343296] Memory state around the buggy address: [ 22.343726] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.344369] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.345013] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.345655] ^ [ 22.346154] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.346797] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.347439] ================================================================== [ 22.372155] ================================================================== [ 22.372794] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 22.373583] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.374229] [ 22.374366] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.374381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.374385] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.374390] Call trace: [ 22.374394] show_stack+0x20/0x38 (C) [ 22.374403] dump_stack_lvl+0x8c/0xd0 [ 22.374411] print_report+0x118/0x608 [ 22.374420] kasan_report+0xdc/0x128 [ 22.374428] __asan_report_load8_noabort+0x20/0x30 [ 22.374439] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 22.374449] kasan_bitops_generic+0x11c/0x1c8 [ 22.374457] kunit_try_run_case+0x170/0x3f0 [ 22.374467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.374479] kthread+0x328/0x630 [ 22.374489] ret_from_fork+0x10/0x20 [ 22.374499] [ 22.380517] Allocated by task 319: [ 22.380822] kasan_save_stack+0x3c/0x68 [ 22.381166] kasan_save_track+0x20/0x40 [ 22.381509] kasan_save_alloc_info+0x40/0x58 [ 22.381892] __kasan_kmalloc+0xd4/0xd8 [ 22.382229] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.382636] kasan_bitops_generic+0xa0/0x1c8 [ 22.383018] kunit_try_run_case+0x170/0x3f0 [ 22.383394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.383883] kthread+0x328/0x630 [ 22.384176] ret_from_fork+0x10/0x20 [ 22.384498] [ 22.384635] The buggy address belongs to the object at ffff00000a7446c0 [ 22.384635] which belongs to the cache kmalloc-16 of size 16 [ 22.385717] The buggy address is located 8 bytes inside of [ 22.385717] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.386794] [ 22.386932] The buggy address belongs to the physical page: [ 22.387424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.388116] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.388693] page_type: f5(slab) [ 22.388978] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.389662] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.390343] page dumped because: kasan: bad access detected [ 22.390835] [ 22.390973] Memory state around the buggy address: [ 22.391399] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.392036] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.392672] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.393310] ^ [ 22.393804] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.394442] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.395077] ================================================================== [ 22.299984] ================================================================== [ 22.300629] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 22.301426] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.302079] [ 22.302221] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.302243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.302250] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.302258] Call trace: [ 22.302262] show_stack+0x20/0x38 (C) [ 22.302276] dump_stack_lvl+0x8c/0xd0 [ 22.302290] print_report+0x118/0x608 [ 22.302302] kasan_report+0xdc/0x128 [ 22.302315] __asan_report_load8_noabort+0x20/0x30 [ 22.302331] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 22.302346] kasan_bitops_generic+0x11c/0x1c8 [ 22.302358] kunit_try_run_case+0x170/0x3f0 [ 22.302374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.302392] kthread+0x328/0x630 [ 22.302407] ret_from_fork+0x10/0x20 [ 22.302421] [ 22.308463] Allocated by task 319: [ 22.308772] kasan_save_stack+0x3c/0x68 [ 22.309123] kasan_save_track+0x20/0x40 [ 22.309473] kasan_save_alloc_info+0x40/0x58 [ 22.309864] __kasan_kmalloc+0xd4/0xd8 [ 22.310206] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.310620] kasan_bitops_generic+0xa0/0x1c8 [ 22.311007] kunit_try_run_case+0x170/0x3f0 [ 22.311390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.311887] kthread+0x328/0x630 [ 22.312187] ret_from_fork+0x10/0x20 [ 22.312515] [ 22.312656] The buggy address belongs to the object at ffff00000a7446c0 [ 22.312656] which belongs to the cache kmalloc-16 of size 16 [ 22.313746] The buggy address is located 8 bytes inside of [ 22.313746] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.314830] [ 22.314970] The buggy address belongs to the physical page: [ 22.315467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.316165] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.316750] page_type: f5(slab) [ 22.317039] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.317728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.318417] page dumped because: kasan: bad access detected [ 22.318915] [ 22.319055] Memory state around the buggy address: [ 22.319484] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.320128] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.320771] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.321412] ^ [ 22.321911] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.322555] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.323196] ================================================================== [ 22.275717] ================================================================== [ 22.276363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 22.277162] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.277822] [ 22.277965] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.277988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.277994] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.278001] Call trace: [ 22.278007] show_stack+0x20/0x38 (C) [ 22.278021] dump_stack_lvl+0x8c/0xd0 [ 22.278034] print_report+0x118/0x608 [ 22.278048] kasan_report+0xdc/0x128 [ 22.278060] kasan_check_range+0x100/0x1a8 [ 22.278074] __kasan_check_write+0x20/0x30 [ 22.278088] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 22.278103] kasan_bitops_generic+0x11c/0x1c8 [ 22.278115] kunit_try_run_case+0x170/0x3f0 [ 22.278131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.278149] kthread+0x328/0x630 [ 22.278164] ret_from_fork+0x10/0x20 [ 22.278178] [ 22.284518] Allocated by task 319: [ 22.284827] kasan_save_stack+0x3c/0x68 [ 22.285177] kasan_save_track+0x20/0x40 [ 22.285525] kasan_save_alloc_info+0x40/0x58 [ 22.285916] __kasan_kmalloc+0xd4/0xd8 [ 22.286257] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.286674] kasan_bitops_generic+0xa0/0x1c8 [ 22.287062] kunit_try_run_case+0x170/0x3f0 [ 22.287445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.287942] kthread+0x328/0x630 [ 22.288241] ret_from_fork+0x10/0x20 [ 22.288570] [ 22.288710] The buggy address belongs to the object at ffff00000a7446c0 [ 22.288710] which belongs to the cache kmalloc-16 of size 16 [ 22.289800] The buggy address is located 8 bytes inside of [ 22.289800] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.290883] [ 22.291023] The buggy address belongs to the physical page: [ 22.291521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.292219] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.292803] page_type: f5(slab) [ 22.293093] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.293783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.294469] page dumped because: kasan: bad access detected [ 22.294967] [ 22.295107] Memory state around the buggy address: [ 22.295537] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.296181] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.296824] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.297466] ^ [ 22.297965] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.298608] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.299250] ================================================================== [ 22.348145] ================================================================== [ 22.348790] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 22.349586] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.350239] [ 22.350381] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.350403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.350410] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.350417] Call trace: [ 22.350422] show_stack+0x20/0x38 (C) [ 22.350435] dump_stack_lvl+0x8c/0xd0 [ 22.350448] print_report+0x118/0x608 [ 22.350461] kasan_report+0xdc/0x128 [ 22.350474] __asan_report_load8_noabort+0x20/0x30 [ 22.350489] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 22.350504] kasan_bitops_generic+0x11c/0x1c8 [ 22.350516] kunit_try_run_case+0x170/0x3f0 [ 22.350531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.350549] kthread+0x328/0x630 [ 22.350564] ret_from_fork+0x10/0x20 [ 22.350578] [ 22.356620] Allocated by task 319: [ 22.356928] kasan_save_stack+0x3c/0x68 [ 22.357279] kasan_save_track+0x20/0x40 [ 22.357629] kasan_save_alloc_info+0x40/0x58 [ 22.358020] __kasan_kmalloc+0xd4/0xd8 [ 22.358362] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.358776] kasan_bitops_generic+0xa0/0x1c8 [ 22.359164] kunit_try_run_case+0x170/0x3f0 [ 22.359547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.360044] kthread+0x328/0x630 [ 22.360344] ret_from_fork+0x10/0x20 [ 22.360672] [ 22.360814] The buggy address belongs to the object at ffff00000a7446c0 [ 22.360814] which belongs to the cache kmalloc-16 of size 16 [ 22.361904] The buggy address is located 8 bytes inside of [ 22.361904] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.362989] [ 22.363129] The buggy address belongs to the physical page: [ 22.363626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.364325] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.364908] page_type: f5(slab) [ 22.365198] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.365888] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.366576] page dumped because: kasan: bad access detected [ 22.367074] [ 22.367215] Memory state around the buggy address: [ 22.367644] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.368288] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.368932] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.369573] ^ [ 22.370073] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.370716] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.371357] ================================================================== [ 22.251755] ================================================================== [ 22.252400] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 22.253196] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.253849] [ 22.253991] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.254013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.254019] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.254027] Call trace: [ 22.254032] show_stack+0x20/0x38 (C) [ 22.254045] dump_stack_lvl+0x8c/0xd0 [ 22.254058] print_report+0x118/0x608 [ 22.254071] kasan_report+0xdc/0x128 [ 22.254083] __asan_report_load8_noabort+0x20/0x30 [ 22.254099] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 22.254114] kasan_bitops_generic+0x11c/0x1c8 [ 22.254126] kunit_try_run_case+0x170/0x3f0 [ 22.254141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.254159] kthread+0x328/0x630 [ 22.254174] ret_from_fork+0x10/0x20 [ 22.254188] [ 22.260229] Allocated by task 319: [ 22.260537] kasan_save_stack+0x3c/0x68 [ 22.260889] kasan_save_track+0x20/0x40 [ 22.261239] kasan_save_alloc_info+0x40/0x58 [ 22.261629] __kasan_kmalloc+0xd4/0xd8 [ 22.261971] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.262385] kasan_bitops_generic+0xa0/0x1c8 [ 22.262772] kunit_try_run_case+0x170/0x3f0 [ 22.263154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.263652] kthread+0x328/0x630 [ 22.263951] ret_from_fork+0x10/0x20 [ 22.264279] [ 22.264420] The buggy address belongs to the object at ffff00000a7446c0 [ 22.264420] which belongs to the cache kmalloc-16 of size 16 [ 22.265510] The buggy address is located 8 bytes inside of [ 22.265510] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.266593] [ 22.266733] The buggy address belongs to the physical page: [ 22.267230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.267928] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.268512] page_type: f5(slab) [ 22.268803] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.269493] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.270180] page dumped because: kasan: bad access detected [ 22.270678] [ 22.270818] Memory state around the buggy address: [ 22.271247] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.271891] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.272534] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.273176] ^ [ 22.273676] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.274320] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.274962] ================================================================== [ 22.178781] ================================================================== [ 22.179434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 22.180232] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.180902] [ 22.181052] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.181084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.181093] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.181103] Call trace: [ 22.181110] show_stack+0x20/0x38 (C) [ 22.181131] dump_stack_lvl+0x8c/0xd0 [ 22.181150] print_report+0x118/0x608 [ 22.181169] kasan_report+0xdc/0x128 [ 22.181187] kasan_check_range+0x100/0x1a8 [ 22.181207] __kasan_check_write+0x20/0x30 [ 22.181229] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 22.181250] kasan_bitops_generic+0x11c/0x1c8 [ 22.181269] kunit_try_run_case+0x170/0x3f0 [ 22.181291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.181316] kthread+0x328/0x630 [ 22.181338] ret_from_fork+0x10/0x20 [ 22.181359] [ 22.187727] Allocated by task 319: [ 22.188043] kasan_save_stack+0x3c/0x68 [ 22.188402] kasan_save_track+0x20/0x40 [ 22.188761] kasan_save_alloc_info+0x40/0x58 [ 22.189160] __kasan_kmalloc+0xd4/0xd8 [ 22.189510] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.189936] kasan_bitops_generic+0xa0/0x1c8 [ 22.190332] kunit_try_run_case+0x170/0x3f0 [ 22.190726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.191235] kthread+0x328/0x630 [ 22.191544] ret_from_fork+0x10/0x20 [ 22.191882] [ 22.192028] The buggy address belongs to the object at ffff00000a7446c0 [ 22.192028] which belongs to the cache kmalloc-16 of size 16 [ 22.193129] The buggy address is located 8 bytes inside of [ 22.193129] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.194226] [ 22.194372] The buggy address belongs to the physical page: [ 22.194875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.195583] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.196178] page_type: f5(slab) [ 22.196475] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.197176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.197872] page dumped because: kasan: bad access detected [ 22.198376] [ 22.198520] Memory state around the buggy address: [ 22.198957] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.199610] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.200263] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.200913] ^ [ 22.201419] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.202071] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.202720] ================================================================== [ 22.203570] ================================================================== [ 22.204216] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 22.205013] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.205665] [ 22.205808] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.205830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.205837] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.205844] Call trace: [ 22.205850] show_stack+0x20/0x38 (C) [ 22.205863] dump_stack_lvl+0x8c/0xd0 [ 22.205876] print_report+0x118/0x608 [ 22.205889] kasan_report+0xdc/0x128 [ 22.205902] __asan_report_load8_noabort+0x20/0x30 [ 22.205917] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 22.205932] kasan_bitops_generic+0x11c/0x1c8 [ 22.205945] kunit_try_run_case+0x170/0x3f0 [ 22.205960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.205978] kthread+0x328/0x630 [ 22.205993] ret_from_fork+0x10/0x20 [ 22.206007] [ 22.212049] Allocated by task 319: [ 22.212358] kasan_save_stack+0x3c/0x68 [ 22.212709] kasan_save_track+0x20/0x40 [ 22.213059] kasan_save_alloc_info+0x40/0x58 [ 22.213450] __kasan_kmalloc+0xd4/0xd8 [ 22.213791] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.214206] kasan_bitops_generic+0xa0/0x1c8 [ 22.214593] kunit_try_run_case+0x170/0x3f0 [ 22.214976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.215473] kthread+0x328/0x630 [ 22.215773] ret_from_fork+0x10/0x20 [ 22.216101] [ 22.216242] The buggy address belongs to the object at ffff00000a7446c0 [ 22.216242] which belongs to the cache kmalloc-16 of size 16 [ 22.217332] The buggy address is located 8 bytes inside of [ 22.217332] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.218417] [ 22.218558] The buggy address belongs to the physical page: [ 22.219055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.219753] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.220338] page_type: f5(slab) [ 22.220629] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.221319] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.222006] page dumped because: kasan: bad access detected [ 22.222503] [ 22.222644] Memory state around the buggy address: [ 22.223074] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.223717] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.224361] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.225003] ^ [ 22.225502] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.226144] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.226786] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 21.899707] ================================================================== [ 21.900362] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 21.900917] Read of size 1 at addr ffff000010ac0b10 by task kunit_try_catch/317 [ 21.901579] [ 21.901729] CPU: 4 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.901762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.901772] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.901783] Call trace: [ 21.901791] show_stack+0x20/0x38 (C) [ 21.901812] dump_stack_lvl+0x8c/0xd0 [ 21.901830] print_report+0x118/0x608 [ 21.901850] kasan_report+0xdc/0x128 [ 21.901868] __asan_report_load1_noabort+0x20/0x30 [ 21.901891] strnlen+0x80/0x88 [ 21.901912] kasan_strings+0x478/0xb00 [ 21.901934] kunit_try_run_case+0x170/0x3f0 [ 21.901956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.901983] kthread+0x328/0x630 [ 21.902004] ret_from_fork+0x10/0x20 [ 21.902025] [ 21.907782] Allocated by task 317: [ 21.908098] kasan_save_stack+0x3c/0x68 [ 21.908458] kasan_save_track+0x20/0x40 [ 21.908817] kasan_save_alloc_info+0x40/0x58 [ 21.909215] __kasan_kmalloc+0xd4/0xd8 [ 21.909565] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.909992] kasan_strings+0xc8/0xb00 [ 21.910339] kunit_try_run_case+0x170/0x3f0 [ 21.910732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.911241] kthread+0x328/0x630 [ 21.911549] ret_from_fork+0x10/0x20 [ 21.911888] [ 21.912033] Freed by task 317: [ 21.912318] kasan_save_stack+0x3c/0x68 [ 21.912677] kasan_save_track+0x20/0x40 [ 21.913035] kasan_save_free_info+0x4c/0x78 [ 21.913425] __kasan_slab_free+0x6c/0x98 [ 21.913791] kfree+0x214/0x3c8 [ 21.914086] kasan_strings+0x24c/0xb00 [ 21.914441] kunit_try_run_case+0x170/0x3f0 [ 21.914834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.915342] kthread+0x328/0x630 [ 21.915652] ret_from_fork+0x10/0x20 [ 21.915990] [ 21.916135] The buggy address belongs to the object at ffff000010ac0b00 [ 21.916135] which belongs to the cache kmalloc-32 of size 32 [ 21.917237] The buggy address is located 16 bytes inside of [ 21.917237] freed 32-byte region [ffff000010ac0b00, ffff000010ac0b20) [ 21.918317] [ 21.918464] The buggy address belongs to the physical page: [ 21.918967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ac0 [ 21.919683] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.920278] page_type: f5(slab) [ 21.920576] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 21.921278] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.921972] page dumped because: kasan: bad access detected [ 21.922477] [ 21.922622] Memory state around the buggy address: [ 21.923059] ffff000010ac0a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.923712] ffff000010ac0a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.924365] >ffff000010ac0b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.925014] ^ [ 21.925361] ffff000010ac0b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.926012] ffff000010ac0c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.926662] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 21.871818] ================================================================== [ 21.872494] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 21.873053] Read of size 1 at addr ffff000010ac0b10 by task kunit_try_catch/317 [ 21.873720] [ 21.873876] CPU: 4 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.873914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.873925] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.873937] Call trace: [ 21.873946] show_stack+0x20/0x38 (C) [ 21.873971] dump_stack_lvl+0x8c/0xd0 [ 21.873992] print_report+0x118/0x608 [ 21.874013] kasan_report+0xdc/0x128 [ 21.874032] __asan_report_load1_noabort+0x20/0x30 [ 21.874055] strlen+0xa8/0xb0 [ 21.874075] kasan_strings+0x418/0xb00 [ 21.874098] kunit_try_run_case+0x170/0x3f0 [ 21.874122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.874149] kthread+0x328/0x630 [ 21.874174] ret_from_fork+0x10/0x20 [ 21.874196] [ 21.879953] Allocated by task 317: [ 21.880271] kasan_save_stack+0x3c/0x68 [ 21.880633] kasan_save_track+0x20/0x40 [ 21.880994] kasan_save_alloc_info+0x40/0x58 [ 21.881393] __kasan_kmalloc+0xd4/0xd8 [ 21.881744] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.882171] kasan_strings+0xc8/0xb00 [ 21.882518] kunit_try_run_case+0x170/0x3f0 [ 21.882911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.883420] kthread+0x328/0x630 [ 21.883731] ret_from_fork+0x10/0x20 [ 21.884068] [ 21.884215] Freed by task 317: [ 21.884500] kasan_save_stack+0x3c/0x68 [ 21.884860] kasan_save_track+0x20/0x40 [ 21.885218] kasan_save_free_info+0x4c/0x78 [ 21.885608] __kasan_slab_free+0x6c/0x98 [ 21.885975] kfree+0x214/0x3c8 [ 21.886269] kasan_strings+0x24c/0xb00 [ 21.886623] kunit_try_run_case+0x170/0x3f0 [ 21.887015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.887524] kthread+0x328/0x630 [ 21.887834] ret_from_fork+0x10/0x20 [ 21.888171] [ 21.888318] The buggy address belongs to the object at ffff000010ac0b00 [ 21.888318] which belongs to the cache kmalloc-32 of size 32 [ 21.889421] The buggy address is located 16 bytes inside of [ 21.889421] freed 32-byte region [ffff000010ac0b00, ffff000010ac0b20) [ 21.890503] [ 21.890650] The buggy address belongs to the physical page: [ 21.891155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ac0 [ 21.891873] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.892470] page_type: f5(slab) [ 21.892771] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 21.893473] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.894169] page dumped because: kasan: bad access detected [ 21.894674] [ 21.894820] Memory state around the buggy address: [ 21.895258] ffff000010ac0a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.895911] ffff000010ac0a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.896563] >ffff000010ac0b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.897214] ^ [ 21.897560] ffff000010ac0b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.898213] ffff000010ac0c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.898862] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 21.843317] ================================================================== [ 21.843994] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 21.844625] Read of size 1 at addr ffff000010ac0b10 by task kunit_try_catch/317 [ 21.845296] [ 21.845458] CPU: 2 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.845502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.845514] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.845530] Call trace: [ 21.845541] show_stack+0x20/0x38 (C) [ 21.845570] dump_stack_lvl+0x8c/0xd0 [ 21.845598] print_report+0x118/0x608 [ 21.845624] kasan_report+0xdc/0x128 [ 21.845649] __asan_report_load1_noabort+0x20/0x30 [ 21.845679] kasan_strings+0x95c/0xb00 [ 21.845708] kunit_try_run_case+0x170/0x3f0 [ 21.845739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.845773] kthread+0x328/0x630 [ 21.845803] ret_from_fork+0x10/0x20 [ 21.845832] [ 21.851353] Allocated by task 317: [ 21.851682] kasan_save_stack+0x3c/0x68 [ 21.852052] kasan_save_track+0x20/0x40 [ 21.852420] kasan_save_alloc_info+0x40/0x58 [ 21.852827] __kasan_kmalloc+0xd4/0xd8 [ 21.853185] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.853620] kasan_strings+0xc8/0xb00 [ 21.853976] kunit_try_run_case+0x170/0x3f0 [ 21.854377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.854895] kthread+0x328/0x630 [ 21.855214] ret_from_fork+0x10/0x20 [ 21.855558] [ 21.855708] Freed by task 317: [ 21.855999] kasan_save_stack+0x3c/0x68 [ 21.856366] kasan_save_track+0x20/0x40 [ 21.856733] kasan_save_free_info+0x4c/0x78 [ 21.857132] __kasan_slab_free+0x6c/0x98 [ 21.857506] kfree+0x214/0x3c8 [ 21.857807] kasan_strings+0x24c/0xb00 [ 21.858169] kunit_try_run_case+0x170/0x3f0 [ 21.858569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.859085] kthread+0x328/0x630 [ 21.859402] ret_from_fork+0x10/0x20 [ 21.859747] [ 21.859897] The buggy address belongs to the object at ffff000010ac0b00 [ 21.859897] which belongs to the cache kmalloc-32 of size 32 [ 21.861009] The buggy address is located 16 bytes inside of [ 21.861009] freed 32-byte region [ffff000010ac0b00, ffff000010ac0b20) [ 21.862098] [ 21.862249] The buggy address belongs to the physical page: [ 21.862762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ac0 [ 21.863487] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.864094] page_type: f5(slab) [ 21.864402] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 21.865112] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.865816] page dumped because: kasan: bad access detected [ 21.866327] [ 21.866477] Memory state around the buggy address: [ 21.866922] ffff000010ac0a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.867583] ffff000010ac0a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.868243] >ffff000010ac0b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.868900] ^ [ 21.869252] ffff000010ac0b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.869913] ffff000010ac0c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.870570] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 21.813391] ================================================================== [ 21.815507] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 21.816074] Read of size 1 at addr ffff000010ac0b10 by task kunit_try_catch/317 [ 21.816746] [ 21.816910] CPU: 2 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.816954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.816968] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.816984] Call trace: [ 21.816995] show_stack+0x20/0x38 (C) [ 21.817025] dump_stack_lvl+0x8c/0xd0 [ 21.817051] print_report+0x118/0x608 [ 21.817079] kasan_report+0xdc/0x128 [ 21.817103] __asan_report_load1_noabort+0x20/0x30 [ 21.817135] strcmp+0xc0/0xc8 [ 21.817160] kasan_strings+0x340/0xb00 [ 21.817189] kunit_try_run_case+0x170/0x3f0 [ 21.817220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.817255] kthread+0x328/0x630 [ 21.817285] ret_from_fork+0x10/0x20 [ 21.817315] [ 21.823100] Allocated by task 317: [ 21.823422] kasan_save_stack+0x3c/0x68 [ 21.823791] kasan_save_track+0x20/0x40 [ 21.824157] kasan_save_alloc_info+0x40/0x58 [ 21.824565] __kasan_kmalloc+0xd4/0xd8 [ 21.824924] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.825358] kasan_strings+0xc8/0xb00 [ 21.825713] kunit_try_run_case+0x170/0x3f0 [ 21.826114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.826632] kthread+0x328/0x630 [ 21.826949] ret_from_fork+0x10/0x20 [ 21.827293] [ 21.827444] Freed by task 317: [ 21.827735] kasan_save_stack+0x3c/0x68 [ 21.828102] kasan_save_track+0x20/0x40 [ 21.828467] kasan_save_free_info+0x4c/0x78 [ 21.828867] __kasan_slab_free+0x6c/0x98 [ 21.829240] kfree+0x214/0x3c8 [ 21.829541] kasan_strings+0x24c/0xb00 [ 21.829904] kunit_try_run_case+0x170/0x3f0 [ 21.830304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.830822] kthread+0x328/0x630 [ 21.831138] ret_from_fork+0x10/0x20 [ 21.831484] [ 21.831634] The buggy address belongs to the object at ffff000010ac0b00 [ 21.831634] which belongs to the cache kmalloc-32 of size 32 [ 21.832745] The buggy address is located 16 bytes inside of [ 21.832745] freed 32-byte region [ffff000010ac0b00, ffff000010ac0b20) [ 21.833835] [ 21.833988] The buggy address belongs to the physical page: [ 21.834501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ac0 [ 21.835229] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.835836] page_type: f5(slab) [ 21.836144] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 21.836855] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.837557] page dumped because: kasan: bad access detected [ 21.838068] [ 21.838218] Memory state around the buggy address: [ 21.838663] ffff000010ac0a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.839323] ffff000010ac0a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.839984] >ffff000010ac0b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.840640] ^ [ 21.840994] ffff000010ac0b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.841654] ffff000010ac0c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.842312] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 21.781367] ================================================================== [ 21.782405] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 21.782981] Read of size 1 at addr ffff00000257b298 by task kunit_try_catch/315 [ 21.783648] [ 21.783805] CPU: 3 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.783843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.783854] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.783868] Call trace: [ 21.783878] show_stack+0x20/0x38 (C) [ 21.783904] dump_stack_lvl+0x8c/0xd0 [ 21.783928] print_report+0x118/0x608 [ 21.783952] kasan_report+0xdc/0x128 [ 21.783973] __asan_report_load1_noabort+0x20/0x30 [ 21.783999] memcmp+0x198/0x1d8 [ 21.784022] kasan_memcmp+0x16c/0x300 [ 21.784046] kunit_try_run_case+0x170/0x3f0 [ 21.784073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.784102] kthread+0x328/0x630 [ 21.784128] ret_from_fork+0x10/0x20 [ 21.784153] [ 21.789926] Allocated by task 315: [ 21.790244] kasan_save_stack+0x3c/0x68 [ 21.790608] kasan_save_track+0x20/0x40 [ 21.790969] kasan_save_alloc_info+0x40/0x58 [ 21.791372] __kasan_kmalloc+0xd4/0xd8 [ 21.791725] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.792153] kasan_memcmp+0xbc/0x300 [ 21.792497] kunit_try_run_case+0x170/0x3f0 [ 21.792892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.793403] kthread+0x328/0x630 [ 21.793715] ret_from_fork+0x10/0x20 [ 21.794055] [ 21.794202] The buggy address belongs to the object at ffff00000257b280 [ 21.794202] which belongs to the cache kmalloc-32 of size 32 [ 21.795308] The buggy address is located 0 bytes to the right of [ 21.795308] allocated 24-byte region [ffff00000257b280, ffff00000257b298) [ 21.796459] [ 21.796607] The buggy address belongs to the physical page: [ 21.797115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x257b [ 21.797829] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.798430] page_type: f5(slab) [ 21.798735] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 21.799438] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.800136] page dumped because: kasan: bad access detected [ 21.800643] [ 21.800790] Memory state around the buggy address: [ 21.801231] ffff00000257b180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.801885] ffff00000257b200: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 21.802541] >ffff00000257b280: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.803192] ^ [ 21.803564] ffff00000257b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.804218] ffff00000257b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.804871] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 21.754623] ================================================================== [ 21.755711] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 21.756433] Read of size 1 at addr ffff8000896d7b4a by task kunit_try_catch/311 [ 21.757112] [ 21.757278] CPU: 2 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.757328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.757344] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.757363] Call trace: [ 21.757375] show_stack+0x20/0x38 (C) [ 21.757409] dump_stack_lvl+0x8c/0xd0 [ 21.757441] print_report+0x310/0x608 [ 21.757475] kasan_report+0xdc/0x128 [ 21.757506] __asan_report_load1_noabort+0x20/0x30 [ 21.757541] kasan_alloca_oob_right+0x2dc/0x340 [ 21.757578] kunit_try_run_case+0x170/0x3f0 [ 21.757616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.757657] kthread+0x328/0x630 [ 21.757692] ret_from_fork+0x10/0x20 [ 21.757727] [ 21.763344] The buggy address belongs to stack of task kunit_try_catch/311 [ 21.764004] [ 21.764166] The buggy address belongs to the virtual mapping at [ 21.764166] [ffff8000896d0000, ffff8000896d9000) created by: [ 21.764166] kernel_clone+0x150/0x7a8 [ 21.765562] [ 21.765721] The buggy address belongs to the physical page: [ 21.766239] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea46 [ 21.766966] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.767591] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.768308] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.769018] page dumped because: kasan: bad access detected [ 21.769535] [ 21.769689] Memory state around the buggy address: [ 21.770138] ffff8000896d7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.770805] ffff8000896d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.771473] >ffff8000896d7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 21.772136] ^ [ 21.772656] ffff8000896d7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 21.773323] ffff8000896d7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 21.773987] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 21.731641] ================================================================== [ 21.732656] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 21.733357] Read of size 1 at addr ffff8000896b7b5f by task kunit_try_catch/309 [ 21.734029] [ 21.734209] CPU: 3 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.734268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.734285] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.734304] Call trace: [ 21.734318] show_stack+0x20/0x38 (C) [ 21.734357] dump_stack_lvl+0x8c/0xd0 [ 21.734390] print_report+0x310/0x608 [ 21.734421] kasan_report+0xdc/0x128 [ 21.734450] __asan_report_load1_noabort+0x20/0x30 [ 21.734485] kasan_alloca_oob_left+0x2b8/0x310 [ 21.734521] kunit_try_run_case+0x170/0x3f0 [ 21.734559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.734598] kthread+0x328/0x630 [ 21.734633] ret_from_fork+0x10/0x20 [ 21.734667] [ 21.740282] The buggy address belongs to stack of task kunit_try_catch/309 [ 21.740937] [ 21.741098] The buggy address belongs to the virtual mapping at [ 21.741098] [ffff8000896b0000, ffff8000896b9000) created by: [ 21.741098] kernel_clone+0x150/0x7a8 [ 21.742491] [ 21.742648] The buggy address belongs to the physical page: [ 21.743166] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea32 [ 21.743895] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.744520] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.745237] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.745948] page dumped because: kasan: bad access detected [ 21.746464] [ 21.746618] Memory state around the buggy address: [ 21.747068] ffff8000896b7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.747735] ffff8000896b7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.748402] >ffff8000896b7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 21.749066] ^ [ 21.749632] ffff8000896b7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 21.750300] ffff8000896b7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 21.750964] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 21.706168] ================================================================== [ 21.707570] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 21.708230] Read of size 1 at addr ffff800089697c2a by task kunit_try_catch/307 [ 21.708909] [ 21.709075] CPU: 2 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.709126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.709141] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.709159] Call trace: [ 21.709171] show_stack+0x20/0x38 (C) [ 21.709205] dump_stack_lvl+0x8c/0xd0 [ 21.709237] print_report+0x310/0x608 [ 21.709268] kasan_report+0xdc/0x128 [ 21.709296] __asan_report_load1_noabort+0x20/0x30 [ 21.709332] kasan_stack_oob+0x238/0x270 [ 21.709364] kunit_try_run_case+0x170/0x3f0 [ 21.709401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.709441] kthread+0x328/0x630 [ 21.709478] ret_from_fork+0x10/0x20 [ 21.709514] [ 21.715078] The buggy address belongs to stack of task kunit_try_catch/307 [ 21.715714] and is located at offset 138 in frame: [ 21.716169] kasan_stack_oob+0x0/0x270 [ 21.716543] [ 21.716698] This frame has 4 objects: [ 21.717050] [48, 49) '__assertion' [ 21.717072] [64, 72) 'array' [ 21.717409] [96, 112) '__assertion' [ 21.717702] [128, 138) 'stack_array' [ 21.718044] [ 21.718532] The buggy address belongs to the virtual mapping at [ 21.718532] [ffff800089690000, ffff800089699000) created by: [ 21.718532] kernel_clone+0x150/0x7a8 [ 21.719924] [ 21.720081] The buggy address belongs to the physical page: [ 21.720597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea1e [ 21.721324] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.721947] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.722664] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.723373] page dumped because: kasan: bad access detected [ 21.723890] [ 21.724044] Memory state around the buggy address: [ 21.724493] ffff800089697b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.725161] ffff800089697b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 21.725829] >ffff800089697c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 21.726493] ^ [ 21.726921] ffff800089697c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 21.727588] ffff800089697d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 21.728253] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 21.681071] ================================================================== [ 21.682227] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 21.682936] Read of size 1 at addr ffff800087b3e48d by task kunit_try_catch/303 [ 21.683600] [ 21.683758] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.683795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.683806] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.683820] Call trace: [ 21.683830] show_stack+0x20/0x38 (C) [ 21.683855] dump_stack_lvl+0x8c/0xd0 [ 21.683880] print_report+0x310/0x608 [ 21.683902] kasan_report+0xdc/0x128 [ 21.683924] __asan_report_load1_noabort+0x20/0x30 [ 21.683949] kasan_global_oob_right+0x230/0x270 [ 21.683974] kunit_try_run_case+0x170/0x3f0 [ 21.684002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.684032] kthread+0x328/0x630 [ 21.684058] ret_from_fork+0x10/0x20 [ 21.684083] [ 21.689654] The buggy address belongs to the variable: [ 21.690120] global_array+0xd/0x40 [ 21.690446] [ 21.690605] The buggy address belongs to the virtual mapping at [ 21.690605] [ffff800085d10000, ffff800087bf1000) created by: [ 21.690605] paging_init+0x670/0x7d0 [ 21.691973] [ 21.692123] The buggy address belongs to the physical page: [ 21.692631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa33e [ 21.693345] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 21.694025] raw: 03fffe0000002000 fffffdffc028cf88 fffffdffc028cf88 0000000000000000 [ 21.694730] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.695427] page dumped because: kasan: bad access detected [ 21.695934] [ 21.696081] Memory state around the buggy address: [ 21.696520] ffff800087b3e380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.697176] ffff800087b3e400: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 21.697831] >ffff800087b3e480: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 21.698483] ^ [ 21.698808] ffff800087b3e500: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 21.699464] ffff800087b3e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.700115] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 21.625176] ================================================================== [ 21.626328] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.627093] Free of addr ffff00000e73aa01 by task kunit_try_catch/299 [ 21.627694] [ 21.627861] CPU: 2 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.627911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.627926] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.627944] Call trace: [ 21.627958] show_stack+0x20/0x38 (C) [ 21.627991] dump_stack_lvl+0x8c/0xd0 [ 21.628023] print_report+0x118/0x608 [ 21.628053] kasan_report_invalid_free+0xc0/0xe8 [ 21.628086] check_slab_allocation+0xfc/0x108 [ 21.628116] __kasan_mempool_poison_object+0x78/0x150 [ 21.628150] mempool_free+0x28c/0x328 [ 21.628186] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.628225] mempool_kmalloc_invalid_free+0xc0/0x118 [ 21.628262] kunit_try_run_case+0x170/0x3f0 [ 21.628299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.628339] kthread+0x328/0x630 [ 21.628375] ret_from_fork+0x10/0x20 [ 21.628409] [ 21.635386] Allocated by task 299: [ 21.635713] kasan_save_stack+0x3c/0x68 [ 21.636087] kasan_save_track+0x20/0x40 [ 21.636460] kasan_save_alloc_info+0x40/0x58 [ 21.636875] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.637381] remove_element+0x130/0x1f8 [ 21.637760] mempool_alloc_preallocated+0x58/0xc0 [ 21.638215] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 21.638750] mempool_kmalloc_invalid_free+0xc0/0x118 [ 21.639228] kunit_try_run_case+0x170/0x3f0 [ 21.639637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.640162] kthread+0x328/0x630 [ 21.640486] ret_from_fork+0x10/0x20 [ 21.640838] [ 21.640992] The buggy address belongs to the object at ffff00000e73aa00 [ 21.640992] which belongs to the cache kmalloc-128 of size 128 [ 21.642128] The buggy address is located 1 bytes inside of [ 21.642128] 128-byte region [ffff00000e73aa00, ffff00000e73aa80) [ 21.643180] [ 21.643335] The buggy address belongs to the physical page: [ 21.643854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73a [ 21.644579] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.645193] page_type: f5(slab) [ 21.645508] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.646226] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.646934] page dumped because: kasan: bad access detected [ 21.647451] [ 21.647604] Memory state around the buggy address: [ 21.648055] ffff00000e73a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.648723] ffff00000e73a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.649390] >ffff00000e73aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.650053] ^ [ 21.650365] ffff00000e73aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.651032] ffff00000e73ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.651696] ================================================================== [ 21.656442] ================================================================== [ 21.657584] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.658350] Free of addr ffff00000eb18001 by task kunit_try_catch/301 [ 21.658950] [ 21.659117] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.659168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.659183] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.659202] Call trace: [ 21.659214] show_stack+0x20/0x38 (C) [ 21.659249] dump_stack_lvl+0x8c/0xd0 [ 21.659281] print_report+0x118/0x608 [ 21.659312] kasan_report_invalid_free+0xc0/0xe8 [ 21.659344] __kasan_mempool_poison_object+0xfc/0x150 [ 21.659378] mempool_free+0x28c/0x328 [ 21.659415] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.659454] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 21.659494] kunit_try_run_case+0x170/0x3f0 [ 21.659532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.659572] kthread+0x328/0x630 [ 21.659608] ret_from_fork+0x10/0x20 [ 21.659641] [ 21.666277] The buggy address belongs to the physical page: [ 21.666797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xeb18 [ 21.667521] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.668228] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.668882] page_type: f8(unknown) [ 21.669218] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.669937] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.670655] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.671380] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.672104] head: 03fffe0000000002 fffffdffc03ac601 00000000ffffffff 00000000ffffffff [ 21.672828] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.673545] page dumped because: kasan: bad access detected [ 21.674061] [ 21.674214] Memory state around the buggy address: [ 21.674663] ffff00000eb17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.675330] ffff00000eb17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.675998] >ffff00000eb18000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.676661] ^ [ 21.676973] ffff00000eb18080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.677640] ffff00000eb18100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.678303] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 21.579152] ================================================================== [ 21.580310] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 21.580996] Free of addr ffff00000eb18000 by task kunit_try_catch/295 [ 21.581594] [ 21.581760] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.581811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.581825] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.581843] Call trace: [ 21.581855] show_stack+0x20/0x38 (C) [ 21.581889] dump_stack_lvl+0x8c/0xd0 [ 21.581920] print_report+0x118/0x608 [ 21.581949] kasan_report_invalid_free+0xc0/0xe8 [ 21.581981] __kasan_mempool_poison_object+0x14c/0x150 [ 21.582015] mempool_free+0x28c/0x328 [ 21.582050] mempool_double_free_helper+0x150/0x2e8 [ 21.582086] mempool_kmalloc_large_double_free+0xc0/0x118 [ 21.582125] kunit_try_run_case+0x170/0x3f0 [ 21.582162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.582202] kthread+0x328/0x630 [ 21.582236] ret_from_fork+0x10/0x20 [ 21.582270] [ 21.588840] The buggy address belongs to the physical page: [ 21.589358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xeb18 [ 21.590083] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.590789] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.591441] page_type: f8(unknown) [ 21.591778] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.592494] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.593210] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.593933] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.594657] head: 03fffe0000000002 fffffdffc03ac601 00000000ffffffff 00000000ffffffff [ 21.595380] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.596095] page dumped because: kasan: bad access detected [ 21.596611] [ 21.596763] Memory state around the buggy address: [ 21.597212] ffff00000eb17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.597878] ffff00000eb17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.598543] >ffff00000eb18000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.599205] ^ [ 21.599516] ffff00000eb18080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.600182] ffff00000eb18100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.600844] ================================================================== [ 21.543815] ================================================================== [ 21.544897] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 21.545577] Free of addr ffff00000e73a600 by task kunit_try_catch/293 [ 21.546175] [ 21.546339] CPU: 2 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.546388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.546402] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.546419] Call trace: [ 21.546430] show_stack+0x20/0x38 (C) [ 21.546463] dump_stack_lvl+0x8c/0xd0 [ 21.546493] print_report+0x118/0x608 [ 21.546523] kasan_report_invalid_free+0xc0/0xe8 [ 21.546554] check_slab_allocation+0xd4/0x108 [ 21.546584] __kasan_mempool_poison_object+0x78/0x150 [ 21.546616] mempool_free+0x28c/0x328 [ 21.546651] mempool_double_free_helper+0x150/0x2e8 [ 21.546689] mempool_kmalloc_double_free+0xc0/0x118 [ 21.546725] kunit_try_run_case+0x170/0x3f0 [ 21.546760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.546799] kthread+0x328/0x630 [ 21.546832] ret_from_fork+0x10/0x20 [ 21.546864] [ 21.553764] Allocated by task 293: [ 21.554090] kasan_save_stack+0x3c/0x68 [ 21.554463] kasan_save_track+0x20/0x40 [ 21.554835] kasan_save_alloc_info+0x40/0x58 [ 21.555248] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.555752] remove_element+0x130/0x1f8 [ 21.556129] mempool_alloc_preallocated+0x58/0xc0 [ 21.556582] mempool_double_free_helper+0x94/0x2e8 [ 21.557045] mempool_kmalloc_double_free+0xc0/0x118 [ 21.557514] kunit_try_run_case+0x170/0x3f0 [ 21.557919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.558444] kthread+0x328/0x630 [ 21.558766] ret_from_fork+0x10/0x20 [ 21.559117] [ 21.559270] Freed by task 293: [ 21.559564] kasan_save_stack+0x3c/0x68 [ 21.559937] kasan_save_track+0x20/0x40 [ 21.560308] kasan_save_free_info+0x4c/0x78 [ 21.560712] __kasan_mempool_poison_object+0xc0/0x150 [ 21.561193] mempool_free+0x28c/0x328 [ 21.561554] mempool_double_free_helper+0x100/0x2e8 [ 21.562025] mempool_kmalloc_double_free+0xc0/0x118 [ 21.562495] kunit_try_run_case+0x170/0x3f0 [ 21.562901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.563426] kthread+0x328/0x630 [ 21.563748] ret_from_fork+0x10/0x20 [ 21.564098] [ 21.564250] The buggy address belongs to the object at ffff00000e73a600 [ 21.564250] which belongs to the cache kmalloc-128 of size 128 [ 21.565384] The buggy address is located 0 bytes inside of [ 21.565384] 128-byte region [ffff00000e73a600, ffff00000e73a680) [ 21.566435] [ 21.566590] The buggy address belongs to the physical page: [ 21.567108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73a [ 21.567834] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.568446] page_type: f5(slab) [ 21.568761] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.569478] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.570185] page dumped because: kasan: bad access detected [ 21.570700] [ 21.570852] Memory state around the buggy address: [ 21.571301] ffff00000e73a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.571968] ffff00000e73a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.572634] >ffff00000e73a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.573296] ^ [ 21.573606] ffff00000e73a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.574272] ffff00000e73a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.574935] ================================================================== [ 21.603877] ================================================================== [ 21.605032] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 21.605702] Free of addr ffff000002598000 by task kunit_try_catch/297 [ 21.606289] [ 21.606445] CPU: 2 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.606482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.606493] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.606506] Call trace: [ 21.606515] show_stack+0x20/0x38 (C) [ 21.606539] dump_stack_lvl+0x8c/0xd0 [ 21.606562] print_report+0x118/0x608 [ 21.606583] kasan_report_invalid_free+0xc0/0xe8 [ 21.606606] __kasan_mempool_poison_pages+0xe0/0xe8 [ 21.606628] mempool_free+0x24c/0x328 [ 21.606655] mempool_double_free_helper+0x150/0x2e8 [ 21.606681] mempool_page_alloc_double_free+0xbc/0x118 [ 21.606704] kunit_try_run_case+0x170/0x3f0 [ 21.606731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.606759] kthread+0x328/0x630 [ 21.606785] ret_from_fork+0x10/0x20 [ 21.606809] [ 21.613281] The buggy address belongs to the physical page: [ 21.613788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2598 [ 21.614501] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.615109] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.615813] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.616509] page dumped because: kasan: bad access detected [ 21.617015] [ 21.617161] Memory state around the buggy address: [ 21.617600] ffff000002597f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.618254] ffff000002597f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.618909] >ffff000002598000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.619560] ^ [ 21.619861] ffff000002598080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.620515] ffff000002598100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.621165] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 21.452408] ================================================================== [ 21.453479] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.454129] Read of size 1 at addr ffff000002598000 by task kunit_try_catch/287 [ 21.454808] [ 21.454973] CPU: 2 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.455024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.455038] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.455056] Call trace: [ 21.455068] show_stack+0x20/0x38 (C) [ 21.455101] dump_stack_lvl+0x8c/0xd0 [ 21.455132] print_report+0x118/0x608 [ 21.455162] kasan_report+0xdc/0x128 [ 21.455190] __asan_report_load1_noabort+0x20/0x30 [ 21.455224] mempool_uaf_helper+0x314/0x340 [ 21.455259] mempool_kmalloc_large_uaf+0xc4/0x120 [ 21.455295] kunit_try_run_case+0x170/0x3f0 [ 21.455331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.455370] kthread+0x328/0x630 [ 21.455404] ret_from_fork+0x10/0x20 [ 21.455437] [ 21.461436] The buggy address belongs to the physical page: [ 21.461953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2598 [ 21.462677] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.463384] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.464035] page_type: f8(unknown) [ 21.464371] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.465087] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.465803] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.466527] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.467251] head: 03fffe0000000002 fffffdffc0096601 00000000ffffffff 00000000ffffffff [ 21.467975] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.468692] page dumped because: kasan: bad access detected [ 21.469207] [ 21.469360] Memory state around the buggy address: [ 21.469809] ffff000002597f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.470476] ffff000002597f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.471142] >ffff000002598000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.471805] ^ [ 21.472116] ffff000002598080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.472782] ffff000002598100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.473444] ================================================================== [ 21.522232] ================================================================== [ 21.523243] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.523873] Read of size 1 at addr ffff0000103c4000 by task kunit_try_catch/291 [ 21.524538] [ 21.524693] CPU: 4 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.524729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.524739] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.524751] Call trace: [ 21.524760] show_stack+0x20/0x38 (C) [ 21.524783] dump_stack_lvl+0x8c/0xd0 [ 21.524804] print_report+0x118/0x608 [ 21.524823] kasan_report+0xdc/0x128 [ 21.524842] __asan_report_load1_noabort+0x20/0x30 [ 21.524863] mempool_uaf_helper+0x314/0x340 [ 21.524886] mempool_page_alloc_uaf+0xc0/0x118 [ 21.524912] kunit_try_run_case+0x170/0x3f0 [ 21.524934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.524960] kthread+0x328/0x630 [ 21.524982] ret_from_fork+0x10/0x20 [ 21.525003] [ 21.530926] The buggy address belongs to the physical page: [ 21.531431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c4 [ 21.532148] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.532754] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.533454] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.534150] page dumped because: kasan: bad access detected [ 21.534655] [ 21.534800] Memory state around the buggy address: [ 21.535238] ffff0000103c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.535891] ffff0000103c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.536543] >ffff0000103c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.537191] ^ [ 21.537493] ffff0000103c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.538146] ffff0000103c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.538795] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 21.477063] ================================================================== [ 21.478161] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.478861] Read of size 1 at addr ffff000010b98240 by task kunit_try_catch/289 [ 21.479532] [ 21.479694] CPU: 3 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.479738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.479750] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.479766] Call trace: [ 21.479776] show_stack+0x20/0x38 (C) [ 21.479804] dump_stack_lvl+0x8c/0xd0 [ 21.479830] print_report+0x118/0x608 [ 21.479855] kasan_report+0xdc/0x128 [ 21.479880] __asan_report_load1_noabort+0x20/0x30 [ 21.479908] mempool_uaf_helper+0x314/0x340 [ 21.479937] mempool_slab_uaf+0xc0/0x118 [ 21.479960] kunit_try_run_case+0x170/0x3f0 [ 21.479991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.480024] kthread+0x328/0x630 [ 21.480053] ret_from_fork+0x10/0x20 [ 21.480082] [ 21.485989] Allocated by task 289: [ 21.486312] kasan_save_stack+0x3c/0x68 [ 21.486682] kasan_save_track+0x20/0x40 [ 21.487046] kasan_save_alloc_info+0x40/0x58 [ 21.487453] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.487943] remove_element+0x16c/0x1f8 [ 21.488316] mempool_alloc_preallocated+0x58/0xc0 [ 21.488762] mempool_uaf_helper+0xa4/0x340 [ 21.489156] mempool_slab_uaf+0xc0/0x118 [ 21.489530] kunit_try_run_case+0x170/0x3f0 [ 21.489930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.490447] kthread+0x328/0x630 [ 21.490763] ret_from_fork+0x10/0x20 [ 21.491106] [ 21.491255] Freed by task 289: [ 21.491545] kasan_save_stack+0x3c/0x68 [ 21.491910] kasan_save_track+0x20/0x40 [ 21.492276] kasan_save_free_info+0x4c/0x78 [ 21.492673] __kasan_mempool_poison_object+0xc0/0x150 [ 21.493147] mempool_free+0x28c/0x328 [ 21.493501] mempool_uaf_helper+0x104/0x340 [ 21.493902] mempool_slab_uaf+0xc0/0x118 [ 21.494274] kunit_try_run_case+0x170/0x3f0 [ 21.494674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.495190] kthread+0x328/0x630 [ 21.495506] ret_from_fork+0x10/0x20 [ 21.495849] [ 21.495998] The buggy address belongs to the object at ffff000010b98240 [ 21.495998] which belongs to the cache test_cache of size 123 [ 21.497117] The buggy address is located 0 bytes inside of [ 21.497117] freed 123-byte region [ffff000010b98240, ffff000010b982bb) [ 21.498208] [ 21.498358] The buggy address belongs to the physical page: [ 21.498870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10b98 [ 21.499595] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.500201] page_type: f5(slab) [ 21.500509] raw: 03fffe0000000000 ffff00000ca9e640 dead000000000122 0000000000000000 [ 21.501219] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 21.501920] page dumped because: kasan: bad access detected [ 21.502430] [ 21.502579] Memory state around the buggy address: [ 21.503023] ffff000010b98100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.503683] ffff000010b98180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.504342] >ffff000010b98200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 21.504998] ^ [ 21.505487] ffff000010b98280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.506147] ffff000010b98300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.506804] ================================================================== [ 21.418212] ================================================================== [ 21.419310] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 21.419995] Read of size 1 at addr ffff00000c98eb00 by task kunit_try_catch/285 [ 21.420673] [ 21.420838] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.420888] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.420903] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.420920] Call trace: [ 21.420932] show_stack+0x20/0x38 (C) [ 21.420965] dump_stack_lvl+0x8c/0xd0 [ 21.420997] print_report+0x118/0x608 [ 21.421027] kasan_report+0xdc/0x128 [ 21.421055] __asan_report_load1_noabort+0x20/0x30 [ 21.421089] mempool_uaf_helper+0x314/0x340 [ 21.421123] mempool_kmalloc_uaf+0xc4/0x120 [ 21.421157] kunit_try_run_case+0x170/0x3f0 [ 21.421193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.421232] kthread+0x328/0x630 [ 21.421267] ret_from_fork+0x10/0x20 [ 21.421299] [ 21.427255] Allocated by task 285: [ 21.427582] kasan_save_stack+0x3c/0x68 [ 21.427955] kasan_save_track+0x20/0x40 [ 21.428328] kasan_save_alloc_info+0x40/0x58 [ 21.428741] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.429245] remove_element+0x130/0x1f8 [ 21.429625] mempool_alloc_preallocated+0x58/0xc0 [ 21.430078] mempool_uaf_helper+0xa4/0x340 [ 21.430479] mempool_kmalloc_uaf+0xc4/0x120 [ 21.430887] kunit_try_run_case+0x170/0x3f0 [ 21.431295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.431819] kthread+0x328/0x630 [ 21.432143] ret_from_fork+0x10/0x20 [ 21.432493] [ 21.432646] Freed by task 285: [ 21.432940] kasan_save_stack+0x3c/0x68 [ 21.433313] kasan_save_track+0x20/0x40 [ 21.433685] kasan_save_free_info+0x4c/0x78 [ 21.434090] __kasan_mempool_poison_object+0xc0/0x150 [ 21.434572] mempool_free+0x28c/0x328 [ 21.434933] mempool_uaf_helper+0x104/0x340 [ 21.435340] mempool_kmalloc_uaf+0xc4/0x120 [ 21.435748] kunit_try_run_case+0x170/0x3f0 [ 21.436156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.436680] kthread+0x328/0x630 [ 21.437002] ret_from_fork+0x10/0x20 [ 21.437352] [ 21.437507] The buggy address belongs to the object at ffff00000c98eb00 [ 21.437507] which belongs to the cache kmalloc-128 of size 128 [ 21.438641] The buggy address is located 0 bytes inside of [ 21.438641] freed 128-byte region [ffff00000c98eb00, ffff00000c98eb80) [ 21.439739] [ 21.439893] The buggy address belongs to the physical page: [ 21.440410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 21.441137] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.441749] page_type: f5(slab) [ 21.442064] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.442781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.443487] page dumped because: kasan: bad access detected [ 21.444001] [ 21.444153] Memory state around the buggy address: [ 21.444600] ffff00000c98ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.445267] ffff00000c98ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.445933] >ffff00000c98eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.446595] ^ [ 21.446907] ffff00000c98eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.447573] ffff00000c98ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.448235] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 21.366781] ================================================================== [ 21.367945] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.368668] Read of size 1 at addr ffff000010b842bb by task kunit_try_catch/283 [ 21.369347] [ 21.369513] CPU: 3 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.369565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.369579] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.369597] Call trace: [ 21.369609] show_stack+0x20/0x38 (C) [ 21.369643] dump_stack_lvl+0x8c/0xd0 [ 21.369675] print_report+0x118/0x608 [ 21.369705] kasan_report+0xdc/0x128 [ 21.369734] __asan_report_load1_noabort+0x20/0x30 [ 21.369768] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.369805] mempool_slab_oob_right+0xc0/0x118 [ 21.369834] kunit_try_run_case+0x170/0x3f0 [ 21.369872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.369911] kthread+0x328/0x630 [ 21.369945] ret_from_fork+0x10/0x20 [ 21.369978] [ 21.375998] Allocated by task 283: [ 21.376324] kasan_save_stack+0x3c/0x68 [ 21.376698] kasan_save_track+0x20/0x40 [ 21.377069] kasan_save_alloc_info+0x40/0x58 [ 21.377481] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.377977] remove_element+0x16c/0x1f8 [ 21.378357] mempool_alloc_preallocated+0x58/0xc0 [ 21.378811] mempool_oob_right_helper+0x98/0x2f0 [ 21.379259] mempool_slab_oob_right+0xc0/0x118 [ 21.379684] kunit_try_run_case+0x170/0x3f0 [ 21.380091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.380615] kthread+0x328/0x630 [ 21.380938] ret_from_fork+0x10/0x20 [ 21.381288] [ 21.381441] The buggy address belongs to the object at ffff000010b84240 [ 21.381441] which belongs to the cache test_cache of size 123 [ 21.382568] The buggy address is located 0 bytes to the right of [ 21.382568] allocated 123-byte region [ffff000010b84240, ffff000010b842bb) [ 21.383745] [ 21.383900] The buggy address belongs to the physical page: [ 21.384417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10b84 [ 21.385151] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.385765] page_type: f5(slab) [ 21.386080] raw: 03fffe0000000000 ffff00000ca9e500 dead000000000122 0000000000000000 [ 21.386797] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 21.387505] page dumped because: kasan: bad access detected [ 21.388020] [ 21.388173] Memory state around the buggy address: [ 21.388621] ffff000010b84180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.389288] ffff000010b84200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 21.389954] >ffff000010b84280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 21.390617] ^ [ 21.391089] ffff000010b84300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.391755] ffff000010b84380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.392417] ================================================================== [ 21.341424] ================================================================== [ 21.342519] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.343229] Read of size 1 at addr ffff0000103b2001 by task kunit_try_catch/281 [ 21.343894] [ 21.344052] CPU: 2 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.344089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.344099] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.344112] Call trace: [ 21.344121] show_stack+0x20/0x38 (C) [ 21.344145] dump_stack_lvl+0x8c/0xd0 [ 21.344169] print_report+0x118/0x608 [ 21.344191] kasan_report+0xdc/0x128 [ 21.344211] __asan_report_load1_noabort+0x20/0x30 [ 21.344236] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.344262] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 21.344289] kunit_try_run_case+0x170/0x3f0 [ 21.344315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.344344] kthread+0x328/0x630 [ 21.344369] ret_from_fork+0x10/0x20 [ 21.344393] [ 21.350435] The buggy address belongs to the physical page: [ 21.350943] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b0 [ 21.351664] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.352358] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.352998] page_type: f8(unknown) [ 21.353323] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.354027] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.354730] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.355440] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.356150] head: 03fffe0000000002 fffffdffc040ec01 00000000ffffffff 00000000ffffffff [ 21.356860] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.357565] page dumped because: kasan: bad access detected [ 21.358071] [ 21.358216] Memory state around the buggy address: [ 21.358656] ffff0000103b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.359311] ffff0000103b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.359965] >ffff0000103b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.360615] ^ [ 21.360917] ffff0000103b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.361571] ffff0000103b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.362223] ================================================================== [ 21.312441] ================================================================== [ 21.313482] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.314209] Read of size 1 at addr ffff00000c992a73 by task kunit_try_catch/279 [ 21.314887] [ 21.315052] CPU: 3 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.315104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.315118] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.315137] Call trace: [ 21.315149] show_stack+0x20/0x38 (C) [ 21.315181] dump_stack_lvl+0x8c/0xd0 [ 21.315213] print_report+0x118/0x608 [ 21.315243] kasan_report+0xdc/0x128 [ 21.315272] __asan_report_load1_noabort+0x20/0x30 [ 21.315306] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.315342] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.315379] kunit_try_run_case+0x170/0x3f0 [ 21.315416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.315455] kthread+0x328/0x630 [ 21.315489] ret_from_fork+0x10/0x20 [ 21.315523] [ 21.321566] Allocated by task 279: [ 21.321893] kasan_save_stack+0x3c/0x68 [ 21.322265] kasan_save_track+0x20/0x40 [ 21.322637] kasan_save_alloc_info+0x40/0x58 [ 21.323049] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.323554] remove_element+0x130/0x1f8 [ 21.323933] mempool_alloc_preallocated+0x58/0xc0 [ 21.324387] mempool_oob_right_helper+0x98/0x2f0 [ 21.324834] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.325288] kunit_try_run_case+0x170/0x3f0 [ 21.325694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.326218] kthread+0x328/0x630 [ 21.326540] ret_from_fork+0x10/0x20 [ 21.326890] [ 21.327043] The buggy address belongs to the object at ffff00000c992a00 [ 21.327043] which belongs to the cache kmalloc-128 of size 128 [ 21.328175] The buggy address is located 0 bytes to the right of [ 21.328175] allocated 115-byte region [ffff00000c992a00, ffff00000c992a73) [ 21.329350] [ 21.329503] The buggy address belongs to the physical page: [ 21.330020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 21.330746] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.331358] page_type: f5(slab) [ 21.331672] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 21.332388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.333096] page dumped because: kasan: bad access detected [ 21.333611] [ 21.333763] Memory state around the buggy address: [ 21.334211] ffff00000c992900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.334877] ffff00000c992980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.335544] >ffff00000c992a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.336206] ^ [ 21.336839] ffff00000c992a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.337505] ffff00000c992b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.338166] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 20.724052] ================================================================== [ 20.725120] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 20.725857] Read of size 1 at addr ffff000010ae2140 by task kunit_try_catch/273 [ 20.726534] [ 20.726700] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.726750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.726765] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.726783] Call trace: [ 20.726795] show_stack+0x20/0x38 (C) [ 20.726828] dump_stack_lvl+0x8c/0xd0 [ 20.726860] print_report+0x118/0x608 [ 20.726889] kasan_report+0xdc/0x128 [ 20.726918] __kasan_check_byte+0x54/0x70 [ 20.726947] kmem_cache_destroy+0x34/0x218 [ 20.726976] kmem_cache_double_destroy+0x174/0x300 [ 20.727013] kunit_try_run_case+0x170/0x3f0 [ 20.727050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.727089] kthread+0x328/0x630 [ 20.727124] ret_from_fork+0x10/0x20 [ 20.727157] [ 20.733088] Allocated by task 273: [ 20.733415] kasan_save_stack+0x3c/0x68 [ 20.733788] kasan_save_track+0x20/0x40 [ 20.734160] kasan_save_alloc_info+0x40/0x58 [ 20.734575] __kasan_slab_alloc+0xa8/0xb0 [ 20.734962] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 20.735405] __kmem_cache_create_args+0x178/0x280 [ 20.735863] kmem_cache_double_destroy+0xc0/0x300 [ 20.736318] kunit_try_run_case+0x170/0x3f0 [ 20.736727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.737253] kthread+0x328/0x630 [ 20.737576] ret_from_fork+0x10/0x20 [ 20.737930] [ 20.738083] Freed by task 273: [ 20.738380] kasan_save_stack+0x3c/0x68 [ 20.738752] kasan_save_track+0x20/0x40 [ 20.739124] kasan_save_free_info+0x4c/0x78 [ 20.739529] __kasan_slab_free+0x6c/0x98 [ 20.739908] kmem_cache_free+0x260/0x470 [ 20.740287] slab_kmem_cache_release+0x38/0x50 [ 20.740714] kmem_cache_release+0x1c/0x30 [ 20.741108] kobject_put+0x17c/0x430 [ 20.741467] sysfs_slab_release+0x1c/0x30 [ 20.741855] kmem_cache_destroy+0x118/0x218 [ 20.742257] kmem_cache_double_destroy+0x128/0x300 [ 20.742720] kunit_try_run_case+0x170/0x3f0 [ 20.743127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.743651] kthread+0x328/0x630 [ 20.743973] ret_from_fork+0x10/0x20 [ 20.744323] [ 20.744477] The buggy address belongs to the object at ffff000010ae2140 [ 20.744477] which belongs to the cache kmem_cache of size 208 [ 20.745602] The buggy address is located 0 bytes inside of [ 20.745602] freed 208-byte region [ffff000010ae2140, ffff000010ae2210) [ 20.746700] [ 20.746854] The buggy address belongs to the physical page: [ 20.747370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ae2 [ 20.748102] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.748807] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.749460] page_type: f5(slab) [ 20.749775] raw: 03fffe0000000040 ffff000000402000 dead000000000122 0000000000000000 [ 20.750491] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 20.751208] head: 03fffe0000000040 ffff000000402000 dead000000000122 0000000000000000 [ 20.751932] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 20.752656] head: 03fffe0000000001 fffffdffc042b881 00000000ffffffff 00000000ffffffff [ 20.753379] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.754096] page dumped because: kasan: bad access detected [ 20.754611] [ 20.754764] Memory state around the buggy address: [ 20.755213] ffff000010ae2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.755879] ffff000010ae2080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 20.756545] >ffff000010ae2100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 20.757207] ^ [ 20.757702] ffff000010ae2180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.758367] ffff000010ae2200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.759030] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 20.634095] ================================================================== [ 20.635244] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 20.635965] Read of size 1 at addr ffff00000c884000 by task kunit_try_catch/271 [ 20.636674] [ 20.636858] CPU: 3 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.636938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.636963] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.636991] Call trace: [ 20.637009] show_stack+0x20/0x38 (C) [ 20.637062] dump_stack_lvl+0x8c/0xd0 [ 20.637113] print_report+0x118/0x608 [ 20.637163] kasan_report+0xdc/0x128 [ 20.637209] __asan_report_load1_noabort+0x20/0x30 [ 20.637266] kmem_cache_rcu_uaf+0x388/0x468 [ 20.637325] kunit_try_run_case+0x170/0x3f0 [ 20.637382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.637447] kthread+0x328/0x630 [ 20.637503] ret_from_fork+0x10/0x20 [ 20.637558] [ 20.643169] Allocated by task 271: [ 20.643506] kasan_save_stack+0x3c/0x68 [ 20.643888] kasan_save_track+0x20/0x40 [ 20.644260] kasan_save_alloc_info+0x40/0x58 [ 20.644675] __kasan_slab_alloc+0xa8/0xb0 [ 20.645061] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 20.645505] kmem_cache_rcu_uaf+0x12c/0x468 [ 20.645914] kunit_try_run_case+0x170/0x3f0 [ 20.646324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.646848] kthread+0x328/0x630 [ 20.647171] ret_from_fork+0x10/0x20 [ 20.647521] [ 20.647674] Freed by task 0: [ 20.647954] kasan_save_stack+0x3c/0x68 [ 20.648324] kasan_save_track+0x20/0x40 [ 20.648696] kasan_save_free_info+0x4c/0x78 [ 20.649101] __kasan_slab_free+0x6c/0x98 [ 20.649479] slab_free_after_rcu_debug+0xd4/0x2f8 [ 20.649928] rcu_core+0x9f4/0x1e20 [ 20.650263] rcu_core_si+0x18/0x30 [ 20.650595] handle_softirqs+0x374/0xb28 [ 20.650978] __do_softirq+0x1c/0x28 [ 20.651318] [ 20.651471] Last potentially related work creation: [ 20.651923] kasan_save_stack+0x3c/0x68 [ 20.652295] kasan_record_aux_stack+0xb4/0xc8 [ 20.652713] kmem_cache_free+0x120/0x470 [ 20.653092] kmem_cache_rcu_uaf+0x16c/0x468 [ 20.653501] kunit_try_run_case+0x170/0x3f0 [ 20.653908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.654434] kthread+0x328/0x630 [ 20.654758] ret_from_fork+0x10/0x20 [ 20.655108] [ 20.655261] The buggy address belongs to the object at ffff00000c884000 [ 20.655261] which belongs to the cache test_cache of size 200 [ 20.656389] The buggy address is located 0 bytes inside of [ 20.656389] freed 200-byte region [ffff00000c884000, ffff00000c8840c8) [ 20.657486] [ 20.657641] The buggy address belongs to the physical page: [ 20.658157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc884 [ 20.658882] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.659589] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.660241] page_type: f5(slab) [ 20.660555] raw: 03fffe0000000040 ffff00000ca9e280 dead000000000122 0000000000000000 [ 20.661271] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 20.661986] head: 03fffe0000000040 ffff00000ca9e280 dead000000000122 0000000000000000 [ 20.662711] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 20.663435] head: 03fffe0000000001 fffffdffc0322101 00000000ffffffff 00000000ffffffff [ 20.664158] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.664873] page dumped because: kasan: bad access detected [ 20.665388] [ 20.665541] Memory state around the buggy address: [ 20.665990] ffff00000c883f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.666658] ffff00000c883f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.667325] >ffff00000c884000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.667986] ^ [ 20.668297] ffff00000c884080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 20.668963] ffff00000c884100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.669625] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 20.511270] ================================================================== [ 20.512366] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 20.513036] Free of addr ffff00000c882001 by task kunit_try_catch/269 [ 20.513633] [ 20.513799] CPU: 3 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.513849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.513864] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.513882] Call trace: [ 20.513894] show_stack+0x20/0x38 (C) [ 20.513927] dump_stack_lvl+0x8c/0xd0 [ 20.513958] print_report+0x118/0x608 [ 20.513988] kasan_report_invalid_free+0xc0/0xe8 [ 20.514020] check_slab_allocation+0xfc/0x108 [ 20.514049] __kasan_slab_pre_free+0x2c/0x48 [ 20.514079] kmem_cache_free+0xf0/0x470 [ 20.514108] kmem_cache_invalid_free+0x184/0x3c8 [ 20.514144] kunit_try_run_case+0x170/0x3f0 [ 20.514181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.514220] kthread+0x328/0x630 [ 20.514254] ret_from_fork+0x10/0x20 [ 20.514287] [ 20.520683] Allocated by task 269: [ 20.521008] kasan_save_stack+0x3c/0x68 [ 20.521381] kasan_save_track+0x20/0x40 [ 20.521752] kasan_save_alloc_info+0x40/0x58 [ 20.522165] __kasan_slab_alloc+0xa8/0xb0 [ 20.522551] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 20.522994] kmem_cache_invalid_free+0x12c/0x3c8 [ 20.523440] kunit_try_run_case+0x170/0x3f0 [ 20.523847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.524371] kthread+0x328/0x630 [ 20.524694] ret_from_fork+0x10/0x20 [ 20.525044] [ 20.525197] The buggy address belongs to the object at ffff00000c882000 [ 20.525197] which belongs to the cache test_cache of size 200 [ 20.526322] The buggy address is located 1 bytes inside of [ 20.526322] 200-byte region [ffff00000c882000, ffff00000c8820c8) [ 20.527373] [ 20.527526] The buggy address belongs to the physical page: [ 20.528043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc882 [ 20.528768] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.529474] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.530128] page_type: f5(slab) [ 20.530442] raw: 03fffe0000000040 ffff00000ca9e140 dead000000000122 0000000000000000 [ 20.531158] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 20.531874] head: 03fffe0000000040 ffff00000ca9e140 dead000000000122 0000000000000000 [ 20.532598] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 20.533322] head: 03fffe0000000001 fffffdffc0322081 00000000ffffffff 00000000ffffffff [ 20.534045] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.534760] page dumped because: kasan: bad access detected [ 20.535275] [ 20.535428] Memory state around the buggy address: [ 20.535877] ffff00000c881f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.536544] ffff00000c881f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.537210] >ffff00000c882000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.537872] ^ [ 20.538182] ffff00000c882080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 20.538849] ffff00000c882100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.539510] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 20.463539] ================================================================== [ 20.464580] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 20.465234] Free of addr ffff00000c880000 by task kunit_try_catch/267 [ 20.465830] [ 20.465995] CPU: 3 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.466045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.466059] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.466077] Call trace: [ 20.466089] show_stack+0x20/0x38 (C) [ 20.466121] dump_stack_lvl+0x8c/0xd0 [ 20.466152] print_report+0x118/0x608 [ 20.466181] kasan_report_invalid_free+0xc0/0xe8 [ 20.466212] check_slab_allocation+0xd4/0x108 [ 20.466242] __kasan_slab_pre_free+0x2c/0x48 [ 20.466271] kmem_cache_free+0xf0/0x470 [ 20.466300] kmem_cache_double_free+0x190/0x3c8 [ 20.466335] kunit_try_run_case+0x170/0x3f0 [ 20.466371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.466410] kthread+0x328/0x630 [ 20.466444] ret_from_fork+0x10/0x20 [ 20.466477] [ 20.472863] Allocated by task 267: [ 20.473189] kasan_save_stack+0x3c/0x68 [ 20.473562] kasan_save_track+0x20/0x40 [ 20.473934] kasan_save_alloc_info+0x40/0x58 [ 20.474347] __kasan_slab_alloc+0xa8/0xb0 [ 20.474735] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 20.475175] kmem_cache_double_free+0x12c/0x3c8 [ 20.475614] kunit_try_run_case+0x170/0x3f0 [ 20.476020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.476544] kthread+0x328/0x630 [ 20.476867] ret_from_fork+0x10/0x20 [ 20.477217] [ 20.477370] Freed by task 267: [ 20.477664] kasan_save_stack+0x3c/0x68 [ 20.478036] kasan_save_track+0x20/0x40 [ 20.478407] kasan_save_free_info+0x4c/0x78 [ 20.478813] __kasan_slab_free+0x6c/0x98 [ 20.479193] kmem_cache_free+0x260/0x470 [ 20.479572] kmem_cache_double_free+0x140/0x3c8 [ 20.480011] kunit_try_run_case+0x170/0x3f0 [ 20.480415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.480939] kthread+0x328/0x630 [ 20.481262] ret_from_fork+0x10/0x20 [ 20.481612] [ 20.481765] The buggy address belongs to the object at ffff00000c880000 [ 20.481765] which belongs to the cache test_cache of size 200 [ 20.482890] The buggy address is located 0 bytes inside of [ 20.482890] 200-byte region [ffff00000c880000, ffff00000c8800c8) [ 20.483942] [ 20.484095] The buggy address belongs to the physical page: [ 20.484611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc880 [ 20.485336] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.486042] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.486695] page_type: f5(slab) [ 20.487008] raw: 03fffe0000000040 ffff00000ca9e000 dead000000000122 0000000000000000 [ 20.487724] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 20.488440] head: 03fffe0000000040 ffff00000ca9e000 dead000000000122 0000000000000000 [ 20.489164] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 20.489887] head: 03fffe0000000001 fffffdffc0322001 00000000ffffffff 00000000ffffffff [ 20.490611] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.491327] page dumped because: kasan: bad access detected [ 20.491842] [ 20.491994] Memory state around the buggy address: [ 20.492444] ffff00000c87ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.493110] ffff00000c87ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.493776] >ffff00000c880000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.494438] ^ [ 20.494749] ffff00000c880080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 20.495414] ffff00000c880100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.496076] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 20.389844] ================================================================== [ 20.390898] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 20.391559] Read of size 1 at addr ffff000010ae40c8 by task kunit_try_catch/265 [ 20.392247] [ 20.392420] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.392481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.392499] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.392520] Call trace: [ 20.392535] show_stack+0x20/0x38 (C) [ 20.392575] dump_stack_lvl+0x8c/0xd0 [ 20.392614] print_report+0x118/0x608 [ 20.392650] kasan_report+0xdc/0x128 [ 20.392685] __asan_report_load1_noabort+0x20/0x30 [ 20.392726] kmem_cache_oob+0x344/0x430 [ 20.392768] kunit_try_run_case+0x170/0x3f0 [ 20.392810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.392858] kthread+0x328/0x630 [ 20.392901] ret_from_fork+0x10/0x20 [ 20.392941] [ 20.398529] Allocated by task 265: [ 20.398866] kasan_save_stack+0x3c/0x68 [ 20.399249] kasan_save_track+0x20/0x40 [ 20.399631] kasan_save_alloc_info+0x40/0x58 [ 20.400054] __kasan_slab_alloc+0xa8/0xb0 [ 20.400451] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 20.400904] kmem_cache_oob+0x12c/0x430 [ 20.401292] kunit_try_run_case+0x170/0x3f0 [ 20.401712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.402250] kthread+0x328/0x630 [ 20.402586] ret_from_fork+0x10/0x20 [ 20.402947] [ 20.403107] The buggy address belongs to the object at ffff000010ae4000 [ 20.403107] which belongs to the cache test_cache of size 200 [ 20.404245] The buggy address is located 0 bytes to the right of [ 20.404245] allocated 200-byte region [ffff000010ae4000, ffff000010ae40c8) [ 20.405432] [ 20.405593] The buggy address belongs to the physical page: [ 20.406117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ae4 [ 20.406859] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.407574] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.408237] page_type: f5(slab) [ 20.408560] raw: 03fffe0000000040 ffff000010ae2000 dead000000000122 0000000000000000 [ 20.409288] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 20.410016] head: 03fffe0000000040 ffff000010ae2000 dead000000000122 0000000000000000 [ 20.410749] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 20.411484] head: 03fffe0000000001 fffffdffc042b901 00000000ffffffff 00000000ffffffff [ 20.412218] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.412942] page dumped because: kasan: bad access detected [ 20.413464] [ 20.413623] Memory state around the buggy address: [ 20.414080] ffff000010ae3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.414756] ffff000010ae4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.415431] >ffff000010ae4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 20.416102] ^ [ 20.416629] ffff000010ae4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.417306] ffff000010ae4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.417976] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 20.346602] ================================================================== [ 20.347591] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 20.348237] Read of size 8 at addr ffff00000e73bac0 by task kunit_try_catch/258 [ 20.348916] [ 20.349081] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.349129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.349144] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.349161] Call trace: [ 20.349173] show_stack+0x20/0x38 (C) [ 20.349206] dump_stack_lvl+0x8c/0xd0 [ 20.349238] print_report+0x118/0x608 [ 20.349268] kasan_report+0xdc/0x128 [ 20.349297] __asan_report_load8_noabort+0x20/0x30 [ 20.349330] workqueue_uaf+0x480/0x4a8 [ 20.349365] kunit_try_run_case+0x170/0x3f0 [ 20.349400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.349440] kthread+0x328/0x630 [ 20.349475] ret_from_fork+0x10/0x20 [ 20.349508] [ 20.355054] Allocated by task 258: [ 20.355383] kasan_save_stack+0x3c/0x68 [ 20.355757] kasan_save_track+0x20/0x40 [ 20.356129] kasan_save_alloc_info+0x40/0x58 [ 20.356543] __kasan_kmalloc+0xd4/0xd8 [ 20.356906] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.357348] workqueue_uaf+0x13c/0x4a8 [ 20.357716] kunit_try_run_case+0x170/0x3f0 [ 20.358124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.358647] kthread+0x328/0x630 [ 20.358973] ret_from_fork+0x10/0x20 [ 20.359323] [ 20.359476] Freed by task 72: [ 20.359764] kasan_save_stack+0x3c/0x68 [ 20.360136] kasan_save_track+0x20/0x40 [ 20.360507] kasan_save_free_info+0x4c/0x78 [ 20.360911] __kasan_slab_free+0x6c/0x98 [ 20.361289] kfree+0x214/0x3c8 [ 20.361596] workqueue_uaf_work+0x18/0x30 [ 20.361988] process_one_work+0x530/0xf98 [ 20.362375] worker_thread+0x8ac/0xf28 [ 20.362738] kthread+0x328/0x630 [ 20.363061] ret_from_fork+0x10/0x20 [ 20.363411] [ 20.363564] Last potentially related work creation: [ 20.364015] kasan_save_stack+0x3c/0x68 [ 20.364387] kasan_record_aux_stack+0xb4/0xc8 [ 20.364807] __queue_work+0x65c/0x1010 [ 20.365170] queue_work_on+0xbc/0xf8 [ 20.365518] workqueue_uaf+0x210/0x4a8 [ 20.365888] kunit_try_run_case+0x170/0x3f0 [ 20.366295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.366821] kthread+0x328/0x630 [ 20.367143] ret_from_fork+0x10/0x20 [ 20.367494] [ 20.367647] The buggy address belongs to the object at ffff00000e73bac0 [ 20.367647] which belongs to the cache kmalloc-32 of size 32 [ 20.368766] The buggy address is located 0 bytes inside of [ 20.368766] freed 32-byte region [ffff00000e73bac0, ffff00000e73bae0) [ 20.369857] [ 20.370011] The buggy address belongs to the physical page: [ 20.370529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73b [ 20.371254] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.371867] page_type: f5(slab) [ 20.372180] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 20.372897] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.373605] page dumped because: kasan: bad access detected [ 20.374120] [ 20.374273] Memory state around the buggy address: [ 20.374721] ffff00000e73b980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.375388] ffff00000e73ba00: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.376053] >ffff00000e73ba80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 20.376715] ^ [ 20.377210] ffff00000e73bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.377877] ffff00000e73bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.378540] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 20.301985] ================================================================== [ 20.303028] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 20.303704] Read of size 4 at addr ffff00000a7c1fc0 by task swapper/3/0 [ 20.304351] [ 20.304536] CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.304615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.304640] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.304668] Call trace: [ 20.304688] show_stack+0x20/0x38 (C) [ 20.304741] dump_stack_lvl+0x8c/0xd0 [ 20.304792] print_report+0x118/0x608 [ 20.304841] kasan_report+0xdc/0x128 [ 20.304889] __asan_report_load4_noabort+0x20/0x30 [ 20.304946] rcu_uaf_reclaim+0x64/0x70 [ 20.305000] rcu_core+0x9f4/0x1e20 [ 20.305048] rcu_core_si+0x18/0x30 [ 20.305093] handle_softirqs+0x374/0xb28 [ 20.305145] __do_softirq+0x1c/0x28 [ 20.305189] ____do_softirq+0x18/0x30 [ 20.305239] call_on_irq_stack+0x24/0x58 [ 20.305289] do_softirq_own_stack+0x24/0x38 [ 20.305342] __irq_exit_rcu+0x1fc/0x318 [ 20.305392] irq_exit_rcu+0x1c/0x80 [ 20.305438] el1_interrupt+0x38/0x58 [ 20.305489] el1h_64_irq_handler+0x18/0x28 [ 20.305543] el1h_64_irq+0x6c/0x70 [ 20.305587] arch_local_irq_enable+0x4/0x8 (P) [ 20.305653] cpuidle_enter+0x60/0xb8 [ 20.305699] do_idle+0x36c/0x4e8 [ 20.305748] cpu_startup_entry+0x64/0x80 [ 20.305797] secondary_start_kernel+0x288/0x340 [ 20.305860] __secondary_switched+0xc0/0xc8 [ 20.305921] [ 20.316222] Allocated by task 256: [ 20.316571] kasan_save_stack+0x3c/0x68 [ 20.316973] kasan_save_track+0x20/0x40 [ 20.317371] kasan_save_alloc_info+0x40/0x58 [ 20.317813] __kasan_kmalloc+0xd4/0xd8 [ 20.318204] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.318677] rcu_uaf+0xb0/0x2d8 [ 20.319023] kunit_try_run_case+0x170/0x3f0 [ 20.319462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.320024] kthread+0x328/0x630 [ 20.320377] ret_from_fork+0x10/0x20 [ 20.320756] [ 20.320925] Freed by task 0: [ 20.321225] kasan_save_stack+0x3c/0x68 [ 20.321622] kasan_save_track+0x20/0x40 [ 20.322023] kasan_save_free_info+0x4c/0x78 [ 20.322455] __kasan_slab_free+0x6c/0x98 [ 20.322861] kfree+0x214/0x3c8 [ 20.323197] rcu_uaf_reclaim+0x28/0x70 [ 20.323595] rcu_core+0x9f4/0x1e20 [ 20.323957] rcu_core_si+0x18/0x30 [ 20.324316] handle_softirqs+0x374/0xb28 [ 20.324723] __do_softirq+0x1c/0x28 [ 20.325088] [ 20.325257] Last potentially related work creation: [ 20.325728] kasan_save_stack+0x3c/0x68 [ 20.326127] kasan_record_aux_stack+0xb4/0xc8 [ 20.326577] __call_rcu_common.constprop.0+0x70/0x8b0 [ 20.327086] call_rcu+0x18/0x30 [ 20.327419] rcu_uaf+0x14c/0x2d8 [ 20.327771] kunit_try_run_case+0x170/0x3f0 [ 20.328208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.328765] kthread+0x328/0x630 [ 20.329117] ret_from_fork+0x10/0x20 [ 20.329496] [ 20.329664] The buggy address belongs to the object at ffff00000a7c1fc0 [ 20.329664] which belongs to the cache kmalloc-32 of size 32 [ 20.330816] The buggy address is located 0 bytes inside of [ 20.330816] freed 32-byte region [ffff00000a7c1fc0, ffff00000a7c1fe0) [ 20.331942] [ 20.332112] The buggy address belongs to the physical page: [ 20.332649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa7c1 [ 20.333405] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.334047] page_type: f5(slab) [ 20.334388] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 20.335135] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.335871] page dumped because: kasan: bad access detected [ 20.336409] [ 20.336576] Memory state around the buggy address: [ 20.337047] ffff00000a7c1e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.337743] ffff00000a7c1f00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.338437] >ffff00000a7c1f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.339125] ^ [ 20.339645] ffff00000a7c2000: fa fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 20.340340] ffff00000a7c2080: fa fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 20.341026] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 20.213891] ================================================================== [ 20.214591] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 20.215203] Read of size 1 at addr ffff00000c992700 by task kunit_try_catch/254 [ 20.215870] [ 20.216027] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.216065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.216075] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.216088] Call trace: [ 20.216096] show_stack+0x20/0x38 (C) [ 20.216121] dump_stack_lvl+0x8c/0xd0 [ 20.216144] print_report+0x118/0x608 [ 20.216166] kasan_report+0xdc/0x128 [ 20.216186] __asan_report_load1_noabort+0x20/0x30 [ 20.216210] ksize_uaf+0x598/0x5f8 [ 20.216233] kunit_try_run_case+0x170/0x3f0 [ 20.216259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.216288] kthread+0x328/0x630 [ 20.216313] ret_from_fork+0x10/0x20 [ 20.216337] [ 20.221807] Allocated by task 254: [ 20.222127] kasan_save_stack+0x3c/0x68 [ 20.222495] kasan_save_track+0x20/0x40 [ 20.222855] kasan_save_alloc_info+0x40/0x58 [ 20.223257] __kasan_kmalloc+0xd4/0xd8 [ 20.223610] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.224038] ksize_uaf+0xb8/0x5f8 [ 20.224357] kunit_try_run_case+0x170/0x3f0 [ 20.224752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.225263] kthread+0x328/0x630 [ 20.225573] ret_from_fork+0x10/0x20 [ 20.225913] [ 20.226061] Freed by task 254: [ 20.226347] kasan_save_stack+0x3c/0x68 [ 20.226708] kasan_save_track+0x20/0x40 [ 20.227069] kasan_save_free_info+0x4c/0x78 [ 20.227461] __kasan_slab_free+0x6c/0x98 [ 20.227829] kfree+0x214/0x3c8 [ 20.228124] ksize_uaf+0x11c/0x5f8 [ 20.228450] kunit_try_run_case+0x170/0x3f0 [ 20.228845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.229356] kthread+0x328/0x630 [ 20.229666] ret_from_fork+0x10/0x20 [ 20.230005] [ 20.230152] The buggy address belongs to the object at ffff00000c992700 [ 20.230152] which belongs to the cache kmalloc-128 of size 128 [ 20.231272] The buggy address is located 0 bytes inside of [ 20.231272] freed 128-byte region [ffff00000c992700, ffff00000c992780) [ 20.232356] [ 20.232503] The buggy address belongs to the physical page: [ 20.233012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 20.233723] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.234323] page_type: f5(slab) [ 20.234626] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.235331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.236028] page dumped because: kasan: bad access detected [ 20.236534] [ 20.236681] Memory state around the buggy address: [ 20.237121] ffff00000c992600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.237775] ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.238430] >ffff00000c992700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.239082] ^ [ 20.239384] ffff00000c992780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.240039] ffff00000c992800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.240690] ================================================================== [ 20.241882] ================================================================== [ 20.242561] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 20.243160] Read of size 1 at addr ffff00000c992778 by task kunit_try_catch/254 [ 20.243826] [ 20.243981] CPU: 4 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.244018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.244028] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.244039] Call trace: [ 20.244048] show_stack+0x20/0x38 (C) [ 20.244071] dump_stack_lvl+0x8c/0xd0 [ 20.244092] print_report+0x118/0x608 [ 20.244111] kasan_report+0xdc/0x128 [ 20.244130] __asan_report_load1_noabort+0x20/0x30 [ 20.244152] ksize_uaf+0x544/0x5f8 [ 20.244174] kunit_try_run_case+0x170/0x3f0 [ 20.244198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.244224] kthread+0x328/0x630 [ 20.244247] ret_from_fork+0x10/0x20 [ 20.244268] [ 20.249733] Allocated by task 254: [ 20.250050] kasan_save_stack+0x3c/0x68 [ 20.250411] kasan_save_track+0x20/0x40 [ 20.250770] kasan_save_alloc_info+0x40/0x58 [ 20.251168] __kasan_kmalloc+0xd4/0xd8 [ 20.251519] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.251945] ksize_uaf+0xb8/0x5f8 [ 20.252262] kunit_try_run_case+0x170/0x3f0 [ 20.252654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.253163] kthread+0x328/0x630 [ 20.253471] ret_from_fork+0x10/0x20 [ 20.253809] [ 20.253955] Freed by task 254: [ 20.254240] kasan_save_stack+0x3c/0x68 [ 20.254598] kasan_save_track+0x20/0x40 [ 20.254956] kasan_save_free_info+0x4c/0x78 [ 20.255347] __kasan_slab_free+0x6c/0x98 [ 20.255713] kfree+0x214/0x3c8 [ 20.256008] ksize_uaf+0x11c/0x5f8 [ 20.256332] kunit_try_run_case+0x170/0x3f0 [ 20.256723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.257232] kthread+0x328/0x630 [ 20.257540] ret_from_fork+0x10/0x20 [ 20.257877] [ 20.258024] The buggy address belongs to the object at ffff00000c992700 [ 20.258024] which belongs to the cache kmalloc-128 of size 128 [ 20.259142] The buggy address is located 120 bytes inside of [ 20.259142] freed 128-byte region [ffff00000c992700, ffff00000c992780) [ 20.260239] [ 20.260384] The buggy address belongs to the physical page: [ 20.260888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 20.261599] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.262197] page_type: f5(slab) [ 20.262497] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.263196] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.263891] page dumped because: kasan: bad access detected [ 20.264396] [ 20.264540] Memory state around the buggy address: [ 20.264978] ffff00000c992600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.265630] ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.266283] >ffff00000c992700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.266932] ^ [ 20.267576] ffff00000c992780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.268228] ffff00000c992800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.268877] ================================================================== [ 20.184728] ================================================================== [ 20.185839] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 20.186466] Read of size 1 at addr ffff00000c992700 by task kunit_try_catch/254 [ 20.187144] [ 20.187309] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.187358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.187373] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.187390] Call trace: [ 20.187402] show_stack+0x20/0x38 (C) [ 20.187435] dump_stack_lvl+0x8c/0xd0 [ 20.187467] print_report+0x118/0x608 [ 20.187497] kasan_report+0xdc/0x128 [ 20.187525] __kasan_check_byte+0x54/0x70 [ 20.187554] ksize+0x30/0x88 [ 20.187580] ksize_uaf+0x168/0x5f8 [ 20.187613] kunit_try_run_case+0x170/0x3f0 [ 20.187648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.187687] kthread+0x328/0x630 [ 20.187722] ret_from_fork+0x10/0x20 [ 20.187755] [ 20.193462] Allocated by task 254: [ 20.193789] kasan_save_stack+0x3c/0x68 [ 20.194163] kasan_save_track+0x20/0x40 [ 20.194535] kasan_save_alloc_info+0x40/0x58 [ 20.194949] __kasan_kmalloc+0xd4/0xd8 [ 20.195312] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.195755] ksize_uaf+0xb8/0x5f8 [ 20.196084] kunit_try_run_case+0x170/0x3f0 [ 20.196492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.197016] kthread+0x328/0x630 [ 20.197340] ret_from_fork+0x10/0x20 [ 20.197690] [ 20.197843] Freed by task 254: [ 20.198138] kasan_save_stack+0x3c/0x68 [ 20.198510] kasan_save_track+0x20/0x40 [ 20.198880] kasan_save_free_info+0x4c/0x78 [ 20.199284] __kasan_slab_free+0x6c/0x98 [ 20.199665] kfree+0x214/0x3c8 [ 20.199972] ksize_uaf+0x11c/0x5f8 [ 20.200310] kunit_try_run_case+0x170/0x3f0 [ 20.200716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.201242] kthread+0x328/0x630 [ 20.201564] ret_from_fork+0x10/0x20 [ 20.201914] [ 20.202068] The buggy address belongs to the object at ffff00000c992700 [ 20.202068] which belongs to the cache kmalloc-128 of size 128 [ 20.203203] The buggy address is located 0 bytes inside of [ 20.203203] freed 128-byte region [ffff00000c992700, ffff00000c992780) [ 20.204300] [ 20.204454] The buggy address belongs to the physical page: [ 20.204971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 20.205696] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.206309] page_type: f5(slab) [ 20.206624] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.207341] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.208050] page dumped because: kasan: bad access detected [ 20.208566] [ 20.208718] Memory state around the buggy address: [ 20.209167] ffff00000c992600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.209834] ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.210501] >ffff00000c992700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.211164] ^ [ 20.211475] ffff00000c992780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.212140] ffff00000c992800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.212802] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 20.156249] ================================================================== [ 20.156909] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 20.157590] Read of size 1 at addr ffff00000c99267f by task kunit_try_catch/252 [ 20.158254] [ 20.158408] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.158442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.158453] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.158464] Call trace: [ 20.158473] show_stack+0x20/0x38 (C) [ 20.158495] dump_stack_lvl+0x8c/0xd0 [ 20.158518] print_report+0x118/0x608 [ 20.158539] kasan_report+0xdc/0x128 [ 20.158559] __asan_report_load1_noabort+0x20/0x30 [ 20.158583] ksize_unpoisons_memory+0x690/0x740 [ 20.158608] kunit_try_run_case+0x170/0x3f0 [ 20.158634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.158662] kthread+0x328/0x630 [ 20.158685] ret_from_fork+0x10/0x20 [ 20.158708] [ 20.164275] Allocated by task 252: [ 20.164592] kasan_save_stack+0x3c/0x68 [ 20.164952] kasan_save_track+0x20/0x40 [ 20.165313] kasan_save_alloc_info+0x40/0x58 [ 20.165713] __kasan_kmalloc+0xd4/0xd8 [ 20.166066] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.166493] ksize_unpoisons_memory+0xc0/0x740 [ 20.166912] kunit_try_run_case+0x170/0x3f0 [ 20.167307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.167816] kthread+0x328/0x630 [ 20.168128] ret_from_fork+0x10/0x20 [ 20.168466] [ 20.168612] The buggy address belongs to the object at ffff00000c992600 [ 20.168612] which belongs to the cache kmalloc-128 of size 128 [ 20.169731] The buggy address is located 12 bytes to the right of [ 20.169731] allocated 115-byte region [ffff00000c992600, ffff00000c992673) [ 20.170899] [ 20.171046] The buggy address belongs to the physical page: [ 20.171553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 20.172263] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.172860] page_type: f5(slab) [ 20.173162] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.173864] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.174561] page dumped because: kasan: bad access detected [ 20.175068] [ 20.175213] Memory state around the buggy address: [ 20.175651] ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.176305] ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.176960] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.177612] ^ [ 20.178258] ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.178912] ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.179564] ================================================================== [ 20.132071] ================================================================== [ 20.132743] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 20.133434] Read of size 1 at addr ffff00000c992678 by task kunit_try_catch/252 [ 20.134104] [ 20.134267] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.134308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.134319] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.134333] Call trace: [ 20.134342] show_stack+0x20/0x38 (C) [ 20.134368] dump_stack_lvl+0x8c/0xd0 [ 20.134391] print_report+0x118/0x608 [ 20.134413] kasan_report+0xdc/0x128 [ 20.134433] __asan_report_load1_noabort+0x20/0x30 [ 20.134457] ksize_unpoisons_memory+0x618/0x740 [ 20.134483] kunit_try_run_case+0x170/0x3f0 [ 20.134509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.134538] kthread+0x328/0x630 [ 20.134562] ret_from_fork+0x10/0x20 [ 20.134586] [ 20.140155] Allocated by task 252: [ 20.140473] kasan_save_stack+0x3c/0x68 [ 20.140836] kasan_save_track+0x20/0x40 [ 20.141195] kasan_save_alloc_info+0x40/0x58 [ 20.141595] __kasan_kmalloc+0xd4/0xd8 [ 20.141947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.142374] ksize_unpoisons_memory+0xc0/0x740 [ 20.142794] kunit_try_run_case+0x170/0x3f0 [ 20.143188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.143699] kthread+0x328/0x630 [ 20.144009] ret_from_fork+0x10/0x20 [ 20.144348] [ 20.144495] The buggy address belongs to the object at ffff00000c992600 [ 20.144495] which belongs to the cache kmalloc-128 of size 128 [ 20.145616] The buggy address is located 5 bytes to the right of [ 20.145616] allocated 115-byte region [ffff00000c992600, ffff00000c992673) [ 20.146775] [ 20.146922] The buggy address belongs to the physical page: [ 20.147429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 20.148142] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.148743] page_type: f5(slab) [ 20.149044] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.149747] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.150444] page dumped because: kasan: bad access detected [ 20.150950] [ 20.151095] Memory state around the buggy address: [ 20.151534] ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.152189] ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.152844] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.153495] ^ [ 20.154141] ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.154796] ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.155448] ================================================================== [ 20.106980] ================================================================== [ 20.108064] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 20.108770] Read of size 1 at addr ffff00000c992673 by task kunit_try_catch/252 [ 20.109449] [ 20.109615] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.109667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.109683] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.109702] Call trace: [ 20.109714] show_stack+0x20/0x38 (C) [ 20.109749] dump_stack_lvl+0x8c/0xd0 [ 20.109780] print_report+0x118/0x608 [ 20.109810] kasan_report+0xdc/0x128 [ 20.109839] __asan_report_load1_noabort+0x20/0x30 [ 20.109873] ksize_unpoisons_memory+0x628/0x740 [ 20.109909] kunit_try_run_case+0x170/0x3f0 [ 20.109946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.109986] kthread+0x328/0x630 [ 20.110020] ret_from_fork+0x10/0x20 [ 20.110054] [ 20.115666] Allocated by task 252: [ 20.115993] kasan_save_stack+0x3c/0x68 [ 20.116368] kasan_save_track+0x20/0x40 [ 20.116740] kasan_save_alloc_info+0x40/0x58 [ 20.117153] __kasan_kmalloc+0xd4/0xd8 [ 20.117516] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.117958] ksize_unpoisons_memory+0xc0/0x740 [ 20.118391] kunit_try_run_case+0x170/0x3f0 [ 20.118797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.119322] kthread+0x328/0x630 [ 20.119646] ret_from_fork+0x10/0x20 [ 20.119997] [ 20.120151] The buggy address belongs to the object at ffff00000c992600 [ 20.120151] which belongs to the cache kmalloc-128 of size 128 [ 20.121284] The buggy address is located 0 bytes to the right of [ 20.121284] allocated 115-byte region [ffff00000c992600, ffff00000c992673) [ 20.122458] [ 20.122613] The buggy address belongs to the physical page: [ 20.123129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992 [ 20.123853] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.124465] page_type: f5(slab) [ 20.124780] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.125495] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.126202] page dumped because: kasan: bad access detected [ 20.126717] [ 20.126870] Memory state around the buggy address: [ 20.127318] ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.127984] ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.128650] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.129313] ^ [ 20.129945] ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.130613] ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.131275] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 20.075441] ================================================================== [ 20.076125] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 20.076704] Free of addr ffff00000a7446a0 by task kunit_try_catch/250 [ 20.077290] [ 20.077448] CPU: 3 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.077486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.077497] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.077510] Call trace: [ 20.077519] show_stack+0x20/0x38 (C) [ 20.077546] dump_stack_lvl+0x8c/0xd0 [ 20.077568] print_report+0x118/0x608 [ 20.077591] kasan_report_invalid_free+0xc0/0xe8 [ 20.077614] check_slab_allocation+0xd4/0x108 [ 20.077634] __kasan_slab_pre_free+0x2c/0x48 [ 20.077656] kfree+0xe8/0x3c8 [ 20.077680] kfree_sensitive+0x3c/0xb0 [ 20.077701] kmalloc_double_kzfree+0x168/0x308 [ 20.077728] kunit_try_run_case+0x170/0x3f0 [ 20.077754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.077782] kthread+0x328/0x630 [ 20.077807] ret_from_fork+0x10/0x20 [ 20.077831] [ 20.084416] Allocated by task 250: [ 20.084735] kasan_save_stack+0x3c/0x68 [ 20.085097] kasan_save_track+0x20/0x40 [ 20.085457] kasan_save_alloc_info+0x40/0x58 [ 20.085858] __kasan_kmalloc+0xd4/0xd8 [ 20.086212] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.086639] kmalloc_double_kzfree+0xb8/0x308 [ 20.087049] kunit_try_run_case+0x170/0x3f0 [ 20.087444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.087953] kthread+0x328/0x630 [ 20.088263] ret_from_fork+0x10/0x20 [ 20.088602] [ 20.088749] Freed by task 250: [ 20.089034] kasan_save_stack+0x3c/0x68 [ 20.089395] kasan_save_track+0x20/0x40 [ 20.089755] kasan_save_free_info+0x4c/0x78 [ 20.090148] __kasan_slab_free+0x6c/0x98 [ 20.090517] kfree+0x214/0x3c8 [ 20.090812] kfree_sensitive+0x80/0xb0 [ 20.091164] kmalloc_double_kzfree+0x11c/0x308 [ 20.091583] kunit_try_run_case+0x170/0x3f0 [ 20.091976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.092486] kthread+0x328/0x630 [ 20.092795] ret_from_fork+0x10/0x20 [ 20.093133] [ 20.093280] The buggy address belongs to the object at ffff00000a7446a0 [ 20.093280] which belongs to the cache kmalloc-16 of size 16 [ 20.094384] The buggy address is located 0 bytes inside of [ 20.094384] 16-byte region [ffff00000a7446a0, ffff00000a7446b0) [ 20.095412] [ 20.095560] The buggy address belongs to the physical page: [ 20.096067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 20.096778] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.097378] page_type: f5(slab) [ 20.097680] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 20.098384] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.099083] page dumped because: kasan: bad access detected [ 20.099589] [ 20.099735] Memory state around the buggy address: [ 20.100174] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.100829] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 20.101484] >ffff00000a744680: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 20.102136] ^ [ 20.102529] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.103184] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.103834] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 20.044817] ================================================================== [ 20.046145] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 20.046881] Read of size 1 at addr ffff00000a7446a0 by task kunit_try_catch/250 [ 20.047570] [ 20.047743] CPU: 3 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.047806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.047823] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.047845] Call trace: [ 20.047859] show_stack+0x20/0x38 (C) [ 20.047897] dump_stack_lvl+0x8c/0xd0 [ 20.047936] print_report+0x118/0x608 [ 20.047972] kasan_report+0xdc/0x128 [ 20.048007] __kasan_check_byte+0x54/0x70 [ 20.048042] kfree_sensitive+0x30/0xb0 [ 20.048078] kmalloc_double_kzfree+0x168/0x308 [ 20.048122] kunit_try_run_case+0x170/0x3f0 [ 20.048166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.048214] kthread+0x328/0x630 [ 20.048256] ret_from_fork+0x10/0x20 [ 20.048296] [ 20.054210] Allocated by task 250: [ 20.054547] kasan_save_stack+0x3c/0x68 [ 20.054931] kasan_save_track+0x20/0x40 [ 20.055314] kasan_save_alloc_info+0x40/0x58 [ 20.055739] __kasan_kmalloc+0xd4/0xd8 [ 20.056110] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.056564] kmalloc_double_kzfree+0xb8/0x308 [ 20.056998] kunit_try_run_case+0x170/0x3f0 [ 20.057416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.057953] kthread+0x328/0x630 [ 20.058286] ret_from_fork+0x10/0x20 [ 20.058647] [ 20.058805] Freed by task 250: [ 20.059106] kasan_save_stack+0x3c/0x68 [ 20.059487] kasan_save_track+0x20/0x40 [ 20.059868] kasan_save_free_info+0x4c/0x78 [ 20.060284] __kasan_slab_free+0x6c/0x98 [ 20.060674] kfree+0x214/0x3c8 [ 20.060991] kfree_sensitive+0x80/0xb0 [ 20.061365] kmalloc_double_kzfree+0x11c/0x308 [ 20.061807] kunit_try_run_case+0x170/0x3f0 [ 20.062225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.062762] kthread+0x328/0x630 [ 20.063094] ret_from_fork+0x10/0x20 [ 20.063455] [ 20.063614] The buggy address belongs to the object at ffff00000a7446a0 [ 20.063614] which belongs to the cache kmalloc-16 of size 16 [ 20.064744] The buggy address is located 0 bytes inside of [ 20.064744] freed 16-byte region [ffff00000a7446a0, ffff00000a7446b0) [ 20.065847] [ 20.066007] The buggy address belongs to the physical page: [ 20.066530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 20.067266] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.067888] page_type: f5(slab) [ 20.068211] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 20.068939] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.069655] page dumped because: kasan: bad access detected [ 20.070178] [ 20.070337] Memory state around the buggy address: [ 20.070794] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.071470] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 20.072146] >ffff00000a744680: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 20.072816] ^ [ 20.073226] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.073901] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.074572] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 20.011921] ================================================================== [ 20.012980] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 20.013617] Read of size 1 at addr ffff00000c8fe228 by task kunit_try_catch/246 [ 20.014296] [ 20.014460] CPU: 3 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.014512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.014527] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.014544] Call trace: [ 20.014556] show_stack+0x20/0x38 (C) [ 20.014590] dump_stack_lvl+0x8c/0xd0 [ 20.014621] print_report+0x118/0x608 [ 20.014651] kasan_report+0xdc/0x128 [ 20.014680] __asan_report_load1_noabort+0x20/0x30 [ 20.014714] kmalloc_uaf2+0x3f4/0x468 [ 20.014746] kunit_try_run_case+0x170/0x3f0 [ 20.014782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.014821] kthread+0x328/0x630 [ 20.014855] ret_from_fork+0x10/0x20 [ 20.014887] [ 20.020426] Allocated by task 246: [ 20.020751] kasan_save_stack+0x3c/0x68 [ 20.021125] kasan_save_track+0x20/0x40 [ 20.021497] kasan_save_alloc_info+0x40/0x58 [ 20.021909] __kasan_kmalloc+0xd4/0xd8 [ 20.022272] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.022713] kmalloc_uaf2+0xc4/0x468 [ 20.023065] kunit_try_run_case+0x170/0x3f0 [ 20.023471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.023996] kthread+0x328/0x630 [ 20.024318] ret_from_fork+0x10/0x20 [ 20.024668] [ 20.024821] Freed by task 246: [ 20.025114] kasan_save_stack+0x3c/0x68 [ 20.025486] kasan_save_track+0x20/0x40 [ 20.025859] kasan_save_free_info+0x4c/0x78 [ 20.026263] __kasan_slab_free+0x6c/0x98 [ 20.026643] kfree+0x214/0x3c8 [ 20.026950] kmalloc_uaf2+0x134/0x468 [ 20.027311] kunit_try_run_case+0x170/0x3f0 [ 20.027717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.028242] kthread+0x328/0x630 [ 20.028563] ret_from_fork+0x10/0x20 [ 20.028913] [ 20.029067] The buggy address belongs to the object at ffff00000c8fe200 [ 20.029067] which belongs to the cache kmalloc-64 of size 64 [ 20.030185] The buggy address is located 40 bytes inside of [ 20.030185] freed 64-byte region [ffff00000c8fe200, ffff00000c8fe240) [ 20.031284] [ 20.031438] The buggy address belongs to the physical page: [ 20.031953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc8fe [ 20.032679] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.033291] page_type: f5(slab) [ 20.033605] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 20.034320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.035028] page dumped because: kasan: bad access detected [ 20.035542] [ 20.035695] Memory state around the buggy address: [ 20.036143] ffff00000c8fe100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.036810] ffff00000c8fe180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.037475] >ffff00000c8fe200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.038138] ^ [ 20.038563] ffff00000c8fe280: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 20.039229] ffff00000c8fe300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.039891] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 19.980248] ================================================================== [ 19.981259] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 19.981941] Write of size 33 at addr ffff000010957800 by task kunit_try_catch/244 [ 19.982635] [ 19.982800] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.982851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.982864] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.982882] Call trace: [ 19.982894] show_stack+0x20/0x38 (C) [ 19.982928] dump_stack_lvl+0x8c/0xd0 [ 19.982959] print_report+0x118/0x608 [ 19.982988] kasan_report+0xdc/0x128 [ 19.983016] kasan_check_range+0x100/0x1a8 [ 19.983047] __asan_memset+0x34/0x78 [ 19.983077] kmalloc_uaf_memset+0x170/0x310 [ 19.983112] kunit_try_run_case+0x170/0x3f0 [ 19.983147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.983187] kthread+0x328/0x630 [ 19.983220] ret_from_fork+0x10/0x20 [ 19.983254] [ 19.989094] Allocated by task 244: [ 19.989420] kasan_save_stack+0x3c/0x68 [ 19.989794] kasan_save_track+0x20/0x40 [ 19.990166] kasan_save_alloc_info+0x40/0x58 [ 19.990578] __kasan_kmalloc+0xd4/0xd8 [ 19.990941] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.991382] kmalloc_uaf_memset+0xb8/0x310 [ 19.991783] kunit_try_run_case+0x170/0x3f0 [ 19.992189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.992714] kthread+0x328/0x630 [ 19.993036] ret_from_fork+0x10/0x20 [ 19.993386] [ 19.993539] Freed by task 244: [ 19.993833] kasan_save_stack+0x3c/0x68 [ 19.994205] kasan_save_track+0x20/0x40 [ 19.994577] kasan_save_free_info+0x4c/0x78 [ 19.994982] __kasan_slab_free+0x6c/0x98 [ 19.995361] kfree+0x214/0x3c8 [ 19.995669] kmalloc_uaf_memset+0x11c/0x310 [ 19.996076] kunit_try_run_case+0x170/0x3f0 [ 19.996483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.997007] kthread+0x328/0x630 [ 19.997329] ret_from_fork+0x10/0x20 [ 19.997679] [ 19.997833] The buggy address belongs to the object at ffff000010957800 [ 19.997833] which belongs to the cache kmalloc-64 of size 64 [ 19.998950] The buggy address is located 0 bytes inside of [ 19.998950] freed 64-byte region [ffff000010957800, ffff000010957840) [ 20.000039] [ 20.000194] The buggy address belongs to the physical page: [ 20.000710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10957 [ 20.001442] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.002054] page_type: f5(slab) [ 20.002368] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 20.003084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.003793] page dumped because: kasan: bad access detected [ 20.004308] [ 20.004461] Memory state around the buggy address: [ 20.004908] ffff000010957700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.005575] ffff000010957780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.006240] >ffff000010957800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.006903] ^ [ 20.007213] ffff000010957880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.007878] ffff000010957900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.008540] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 19.948286] ================================================================== [ 19.949424] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 19.950060] Read of size 1 at addr ffff00000107ef48 by task kunit_try_catch/242 [ 19.950739] [ 19.950905] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.950955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.950970] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.950988] Call trace: [ 19.951000] show_stack+0x20/0x38 (C) [ 19.951034] dump_stack_lvl+0x8c/0xd0 [ 19.951066] print_report+0x118/0x608 [ 19.951096] kasan_report+0xdc/0x128 [ 19.951124] __asan_report_load1_noabort+0x20/0x30 [ 19.951159] kmalloc_uaf+0x300/0x338 [ 19.951191] kunit_try_run_case+0x170/0x3f0 [ 19.951227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.951266] kthread+0x328/0x630 [ 19.951301] ret_from_fork+0x10/0x20 [ 19.951334] [ 19.956863] Allocated by task 242: [ 19.957188] kasan_save_stack+0x3c/0x68 [ 19.957562] kasan_save_track+0x20/0x40 [ 19.957934] kasan_save_alloc_info+0x40/0x58 [ 19.958346] __kasan_kmalloc+0xd4/0xd8 [ 19.958709] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.959151] kmalloc_uaf+0xb8/0x338 [ 19.959495] kunit_try_run_case+0x170/0x3f0 [ 19.959901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.960425] kthread+0x328/0x630 [ 19.960748] ret_from_fork+0x10/0x20 [ 19.961099] [ 19.961251] Freed by task 242: [ 19.961545] kasan_save_stack+0x3c/0x68 [ 19.961916] kasan_save_track+0x20/0x40 [ 19.962287] kasan_save_free_info+0x4c/0x78 [ 19.962693] __kasan_slab_free+0x6c/0x98 [ 19.963072] kfree+0x214/0x3c8 [ 19.963380] kmalloc_uaf+0x11c/0x338 [ 19.963731] kunit_try_run_case+0x170/0x3f0 [ 19.964137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.964661] kthread+0x328/0x630 [ 19.964983] ret_from_fork+0x10/0x20 [ 19.965333] [ 19.965486] The buggy address belongs to the object at ffff00000107ef40 [ 19.965486] which belongs to the cache kmalloc-16 of size 16 [ 19.966604] The buggy address is located 8 bytes inside of [ 19.966604] freed 16-byte region [ffff00000107ef40, ffff00000107ef50) [ 19.967693] [ 19.967847] The buggy address belongs to the physical page: [ 19.968363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107e [ 19.969085] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.969698] page_type: f5(slab) [ 19.970010] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 19.970727] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.971434] page dumped because: kasan: bad access detected [ 19.971950] [ 19.972102] Memory state around the buggy address: [ 19.972551] ffff00000107ee00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.973217] ffff00000107ee80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.973883] >ffff00000107ef00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 19.974545] ^ [ 19.975062] ffff00000107ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.975729] ffff00000107f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.976391] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 19.920661] ================================================================== [ 19.921778] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 19.922526] Read of size 64 at addr ffff00000e72f904 by task kunit_try_catch/240 [ 19.923199] [ 19.923358] CPU: 2 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.923395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.923406] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.923419] Call trace: [ 19.923428] show_stack+0x20/0x38 (C) [ 19.923452] dump_stack_lvl+0x8c/0xd0 [ 19.923474] print_report+0x118/0x608 [ 19.923496] kasan_report+0xdc/0x128 [ 19.923516] kasan_check_range+0x100/0x1a8 [ 19.923539] __asan_memmove+0x3c/0x98 [ 19.923561] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 19.923588] kunit_try_run_case+0x170/0x3f0 [ 19.923614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.923642] kthread+0x328/0x630 [ 19.923668] ret_from_fork+0x10/0x20 [ 19.923691] [ 19.929569] Allocated by task 240: [ 19.929886] kasan_save_stack+0x3c/0x68 [ 19.930248] kasan_save_track+0x20/0x40 [ 19.930609] kasan_save_alloc_info+0x40/0x58 [ 19.931010] __kasan_kmalloc+0xd4/0xd8 [ 19.931362] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.931790] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 19.932254] kunit_try_run_case+0x170/0x3f0 [ 19.932648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.933158] kthread+0x328/0x630 [ 19.933467] ret_from_fork+0x10/0x20 [ 19.933805] [ 19.933954] The buggy address belongs to the object at ffff00000e72f900 [ 19.933954] which belongs to the cache kmalloc-64 of size 64 [ 19.935056] The buggy address is located 4 bytes inside of [ 19.935056] allocated 64-byte region [ffff00000e72f900, ffff00000e72f940) [ 19.936161] [ 19.936308] The buggy address belongs to the physical page: [ 19.936815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe72f [ 19.937526] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.938126] page_type: f5(slab) [ 19.938428] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 19.939131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.939828] page dumped because: kasan: bad access detected [ 19.940333] [ 19.940479] Memory state around the buggy address: [ 19.940918] ffff00000e72f800: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 19.941572] ffff00000e72f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.942226] >ffff00000e72f900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.942878] ^ [ 19.943363] ffff00000e72f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.944017] ffff00000e72fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.944668] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 19.893182] ================================================================== [ 19.894272] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.894999] Read of size 18446744073709551614 at addr ffff000010864484 by task kunit_try_catch/238 [ 19.895824] [ 19.895990] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.896040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.896055] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.896073] Call trace: [ 19.896084] show_stack+0x20/0x38 (C) [ 19.896116] dump_stack_lvl+0x8c/0xd0 [ 19.896148] print_report+0x118/0x608 [ 19.896178] kasan_report+0xdc/0x128 [ 19.896207] kasan_check_range+0x100/0x1a8 [ 19.896238] __asan_memmove+0x3c/0x98 [ 19.896269] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.896305] kunit_try_run_case+0x170/0x3f0 [ 19.896342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.896381] kthread+0x328/0x630 [ 19.896415] ret_from_fork+0x10/0x20 [ 19.896448] [ 19.902377] Allocated by task 238: [ 19.902704] kasan_save_stack+0x3c/0x68 [ 19.903077] kasan_save_track+0x20/0x40 [ 19.903449] kasan_save_alloc_info+0x40/0x58 [ 19.903864] __kasan_kmalloc+0xd4/0xd8 [ 19.904226] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.904668] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 19.905153] kunit_try_run_case+0x170/0x3f0 [ 19.905560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.906086] kthread+0x328/0x630 [ 19.906410] ret_from_fork+0x10/0x20 [ 19.906760] [ 19.906913] The buggy address belongs to the object at ffff000010864480 [ 19.906913] which belongs to the cache kmalloc-64 of size 64 [ 19.908032] The buggy address is located 4 bytes inside of [ 19.908032] 64-byte region [ffff000010864480, ffff0000108644c0) [ 19.909076] [ 19.909230] The buggy address belongs to the physical page: [ 19.909747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10864 [ 19.910478] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.911091] page_type: f5(slab) [ 19.911404] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 19.912119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.912827] page dumped because: kasan: bad access detected [ 19.913341] [ 19.913494] Memory state around the buggy address: [ 19.913943] ffff000010864380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.914609] ffff000010864400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.915276] >ffff000010864480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.915938] ^ [ 19.916248] ffff000010864500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.916914] ffff000010864580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.917576] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 19.865412] ================================================================== [ 19.866462] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 19.867146] Write of size 16 at addr ffff00000e73a369 by task kunit_try_catch/236 [ 19.867826] [ 19.867982] CPU: 2 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.868018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.868030] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.868043] Call trace: [ 19.868052] show_stack+0x20/0x38 (C) [ 19.868076] dump_stack_lvl+0x8c/0xd0 [ 19.868100] print_report+0x118/0x608 [ 19.868121] kasan_report+0xdc/0x128 [ 19.868141] kasan_check_range+0x100/0x1a8 [ 19.868163] __asan_memset+0x34/0x78 [ 19.868184] kmalloc_oob_memset_16+0x150/0x2f8 [ 19.868209] kunit_try_run_case+0x170/0x3f0 [ 19.868235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.868264] kthread+0x328/0x630 [ 19.868288] ret_from_fork+0x10/0x20 [ 19.868312] [ 19.874129] Allocated by task 236: [ 19.874448] kasan_save_stack+0x3c/0x68 [ 19.874810] kasan_save_track+0x20/0x40 [ 19.875170] kasan_save_alloc_info+0x40/0x58 [ 19.875571] __kasan_kmalloc+0xd4/0xd8 [ 19.875922] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.876349] kmalloc_oob_memset_16+0xb0/0x2f8 [ 19.876759] kunit_try_run_case+0x170/0x3f0 [ 19.877153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.877665] kthread+0x328/0x630 [ 19.877976] ret_from_fork+0x10/0x20 [ 19.878314] [ 19.878461] The buggy address belongs to the object at ffff00000e73a300 [ 19.878461] which belongs to the cache kmalloc-128 of size 128 [ 19.879580] The buggy address is located 105 bytes inside of [ 19.879580] allocated 120-byte region [ffff00000e73a300, ffff00000e73a378) [ 19.880709] [ 19.880856] The buggy address belongs to the physical page: [ 19.881363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73a [ 19.882074] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.882674] page_type: f5(slab) [ 19.882978] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 19.883682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.884378] page dumped because: kasan: bad access detected [ 19.884884] [ 19.885031] Memory state around the buggy address: [ 19.885469] ffff00000e73a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.886123] ffff00000e73a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.886778] >ffff00000e73a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.887429] ^ [ 19.888075] ffff00000e73a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.888729] ffff00000e73a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.889380] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 19.838417] ================================================================== [ 19.839501] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 19.840192] Write of size 8 at addr ffff00000c98e871 by task kunit_try_catch/234 [ 19.840876] [ 19.841041] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.841091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.841105] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.841123] Call trace: [ 19.841135] show_stack+0x20/0x38 (C) [ 19.841168] dump_stack_lvl+0x8c/0xd0 [ 19.841201] print_report+0x118/0x608 [ 19.841230] kasan_report+0xdc/0x128 [ 19.841259] kasan_check_range+0x100/0x1a8 [ 19.841289] __asan_memset+0x34/0x78 [ 19.841319] kmalloc_oob_memset_8+0x150/0x2f8 [ 19.841354] kunit_try_run_case+0x170/0x3f0 [ 19.841390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.841429] kthread+0x328/0x630 [ 19.841463] ret_from_fork+0x10/0x20 [ 19.841497] [ 19.847354] Allocated by task 234: [ 19.847681] kasan_save_stack+0x3c/0x68 [ 19.848055] kasan_save_track+0x20/0x40 [ 19.848426] kasan_save_alloc_info+0x40/0x58 [ 19.848839] __kasan_kmalloc+0xd4/0xd8 [ 19.849202] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.849643] kmalloc_oob_memset_8+0xb0/0x2f8 [ 19.850060] kunit_try_run_case+0x170/0x3f0 [ 19.850467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.850992] kthread+0x328/0x630 [ 19.851315] ret_from_fork+0x10/0x20 [ 19.851665] [ 19.851817] The buggy address belongs to the object at ffff00000c98e800 [ 19.851817] which belongs to the cache kmalloc-128 of size 128 [ 19.852952] The buggy address is located 113 bytes inside of [ 19.852952] allocated 120-byte region [ffff00000c98e800, ffff00000c98e878) [ 19.854096] [ 19.854250] The buggy address belongs to the physical page: [ 19.854766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 19.855493] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.856104] page_type: f5(slab) [ 19.856417] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 19.857133] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.857841] page dumped because: kasan: bad access detected [ 19.858357] [ 19.858509] Memory state around the buggy address: [ 19.858958] ffff00000c98e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.859625] ffff00000c98e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.860292] >ffff00000c98e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.860954] ^ [ 19.861612] ffff00000c98e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.862277] ffff00000c98e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.862940] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 19.807788] ================================================================== [ 19.808866] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 19.809556] Write of size 4 at addr ffff00000c98e775 by task kunit_try_catch/232 [ 19.810241] [ 19.810405] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.810455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.810468] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.810485] Call trace: [ 19.810497] show_stack+0x20/0x38 (C) [ 19.810530] dump_stack_lvl+0x8c/0xd0 [ 19.810561] print_report+0x118/0x608 [ 19.810591] kasan_report+0xdc/0x128 [ 19.810619] kasan_check_range+0x100/0x1a8 [ 19.810649] __asan_memset+0x34/0x78 [ 19.810680] kmalloc_oob_memset_4+0x150/0x300 [ 19.810713] kunit_try_run_case+0x170/0x3f0 [ 19.810748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.810786] kthread+0x328/0x630 [ 19.810821] ret_from_fork+0x10/0x20 [ 19.810853] [ 19.816770] Allocated by task 232: [ 19.817118] kasan_save_stack+0x3c/0x68 [ 19.817520] kasan_save_track+0x20/0x40 [ 19.817920] kasan_save_alloc_info+0x40/0x58 [ 19.818364] __kasan_kmalloc+0xd4/0xd8 [ 19.818753] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.819227] kmalloc_oob_memset_4+0xb0/0x300 [ 19.819671] kunit_try_run_case+0x170/0x3f0 [ 19.820109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.820666] kthread+0x328/0x630 [ 19.821018] ret_from_fork+0x10/0x20 [ 19.821395] [ 19.821565] The buggy address belongs to the object at ffff00000c98e700 [ 19.821565] which belongs to the cache kmalloc-128 of size 128 [ 19.822731] The buggy address is located 117 bytes inside of [ 19.822731] allocated 120-byte region [ffff00000c98e700, ffff00000c98e778) [ 19.823910] [ 19.824080] The buggy address belongs to the physical page: [ 19.824616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 19.825372] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.826015] page_type: f5(slab) [ 19.826355] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 19.827102] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.827836] page dumped because: kasan: bad access detected [ 19.828373] [ 19.828542] Memory state around the buggy address: [ 19.829014] ffff00000c98e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.829709] ffff00000c98e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.830404] >ffff00000c98e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.831091] ^ [ 19.831773] ffff00000c98e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.832468] ffff00000c98e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.833157] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 19.779582] ================================================================== [ 19.780668] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 19.781357] Write of size 2 at addr ffff00000e73a277 by task kunit_try_catch/230 [ 19.782042] [ 19.782207] CPU: 2 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.782257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.782271] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.782288] Call trace: [ 19.782300] show_stack+0x20/0x38 (C) [ 19.782333] dump_stack_lvl+0x8c/0xd0 [ 19.782364] print_report+0x118/0x608 [ 19.782394] kasan_report+0xdc/0x128 [ 19.782422] kasan_check_range+0x100/0x1a8 [ 19.782452] __asan_memset+0x34/0x78 [ 19.782482] kmalloc_oob_memset_2+0x150/0x2f8 [ 19.782515] kunit_try_run_case+0x170/0x3f0 [ 19.782551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.782590] kthread+0x328/0x630 [ 19.782623] ret_from_fork+0x10/0x20 [ 19.782655] [ 19.788513] Allocated by task 230: [ 19.788840] kasan_save_stack+0x3c/0x68 [ 19.789214] kasan_save_track+0x20/0x40 [ 19.789585] kasan_save_alloc_info+0x40/0x58 [ 19.789998] __kasan_kmalloc+0xd4/0xd8 [ 19.790360] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.790800] kmalloc_oob_memset_2+0xb0/0x2f8 [ 19.791215] kunit_try_run_case+0x170/0x3f0 [ 19.791622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.792146] kthread+0x328/0x630 [ 19.792469] ret_from_fork+0x10/0x20 [ 19.792819] [ 19.792972] The buggy address belongs to the object at ffff00000e73a200 [ 19.792972] which belongs to the cache kmalloc-128 of size 128 [ 19.794105] The buggy address is located 119 bytes inside of [ 19.794105] allocated 120-byte region [ffff00000e73a200, ffff00000e73a278) [ 19.795248] [ 19.795402] The buggy address belongs to the physical page: [ 19.795918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73a [ 19.796641] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.797253] page_type: f5(slab) [ 19.797568] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 19.798284] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.798991] page dumped because: kasan: bad access detected [ 19.799505] [ 19.799657] Memory state around the buggy address: [ 19.800105] ffff00000e73a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.800770] ffff00000e73a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.801435] >ffff00000e73a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.802097] ^ [ 19.802752] ffff00000e73a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.803417] ffff00000e73a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.804078] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 19.750798] ================================================================== [ 19.751835] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 19.752533] Write of size 128 at addr ffff00000c98e600 by task kunit_try_catch/228 [ 19.753232] [ 19.753396] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.753444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.753461] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.753479] Call trace: [ 19.753492] show_stack+0x20/0x38 (C) [ 19.753524] dump_stack_lvl+0x8c/0xd0 [ 19.753556] print_report+0x118/0x608 [ 19.753586] kasan_report+0xdc/0x128 [ 19.753614] kasan_check_range+0x100/0x1a8 [ 19.753645] __asan_memset+0x34/0x78 [ 19.753675] kmalloc_oob_in_memset+0x144/0x2d0 [ 19.753709] kunit_try_run_case+0x170/0x3f0 [ 19.753745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.753792] kthread+0x328/0x630 [ 19.753839] ret_from_fork+0x10/0x20 [ 19.753880] [ 19.759786] Allocated by task 228: [ 19.760122] kasan_save_stack+0x3c/0x68 [ 19.760508] kasan_save_track+0x20/0x40 [ 19.760889] kasan_save_alloc_info+0x40/0x58 [ 19.761311] __kasan_kmalloc+0xd4/0xd8 [ 19.761683] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.762136] kmalloc_oob_in_memset+0xb0/0x2d0 [ 19.762569] kunit_try_run_case+0x170/0x3f0 [ 19.762985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.763522] kthread+0x328/0x630 [ 19.763853] ret_from_fork+0x10/0x20 [ 19.764214] [ 19.764372] The buggy address belongs to the object at ffff00000c98e600 [ 19.764372] which belongs to the cache kmalloc-128 of size 128 [ 19.765516] The buggy address is located 0 bytes inside of [ 19.765516] allocated 120-byte region [ffff00000c98e600, ffff00000c98e678) [ 19.766655] [ 19.766815] The buggy address belongs to the physical page: [ 19.767339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e [ 19.768075] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.768695] page_type: f5(slab) [ 19.769017] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 19.769743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.770458] page dumped because: kasan: bad access detected [ 19.770980] [ 19.771137] Memory state around the buggy address: [ 19.771592] ffff00000c98e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.772267] ffff00000c98e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.772942] >ffff00000c98e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.773611] ^ [ 19.774275] ffff00000c98e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.774951] ffff00000c98e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.775621] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 19.719335] ================================================================== [ 19.720345] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 19.720983] Read of size 16 at addr ffff00000a744680 by task kunit_try_catch/226 [ 19.721655] [ 19.721817] CPU: 3 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.721868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.721882] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.721900] Call trace: [ 19.721912] show_stack+0x20/0x38 (C) [ 19.721947] dump_stack_lvl+0x8c/0xd0 [ 19.721979] print_report+0x118/0x608 [ 19.722008] kasan_report+0xdc/0x128 [ 19.722037] __asan_report_load16_noabort+0x20/0x30 [ 19.722071] kmalloc_uaf_16+0x3bc/0x438 [ 19.722104] kunit_try_run_case+0x170/0x3f0 [ 19.722140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.722179] kthread+0x328/0x630 [ 19.722213] ret_from_fork+0x10/0x20 [ 19.722247] [ 19.727814] Allocated by task 226: [ 19.728140] kasan_save_stack+0x3c/0x68 [ 19.728514] kasan_save_track+0x20/0x40 [ 19.728886] kasan_save_alloc_info+0x40/0x58 [ 19.729299] __kasan_kmalloc+0xd4/0xd8 [ 19.729661] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.730102] kmalloc_uaf_16+0x140/0x438 [ 19.730477] kunit_try_run_case+0x170/0x3f0 [ 19.730884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.731407] kthread+0x328/0x630 [ 19.731728] ret_from_fork+0x10/0x20 [ 19.732078] [ 19.732231] Freed by task 226: [ 19.732525] kasan_save_stack+0x3c/0x68 [ 19.732897] kasan_save_track+0x20/0x40 [ 19.733266] kasan_save_free_info+0x4c/0x78 [ 19.733670] __kasan_slab_free+0x6c/0x98 [ 19.734048] kfree+0x214/0x3c8 [ 19.734355] kmalloc_uaf_16+0x190/0x438 [ 19.734731] kunit_try_run_case+0x170/0x3f0 [ 19.735137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.735660] kthread+0x328/0x630 [ 19.735982] ret_from_fork+0x10/0x20 [ 19.736331] [ 19.736484] The buggy address belongs to the object at ffff00000a744680 [ 19.736484] which belongs to the cache kmalloc-16 of size 16 [ 19.737601] The buggy address is located 0 bytes inside of [ 19.737601] freed 16-byte region [ffff00000a744680, ffff00000a744690) [ 19.738689] [ 19.738843] The buggy address belongs to the physical page: [ 19.739360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 19.740084] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.740695] page_type: f5(slab) [ 19.741008] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 19.741723] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.742429] page dumped because: kasan: bad access detected [ 19.742944] [ 19.743096] Memory state around the buggy address: [ 19.743542] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.744208] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 19.744874] >ffff00000a744680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.745534] ^ [ 19.745845] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.746510] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.747171] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 19.692516] ================================================================== [ 19.693509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 19.694150] Write of size 16 at addr ffff00000107ef00 by task kunit_try_catch/224 [ 19.694849] [ 19.695015] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.695065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.695080] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.695097] Call trace: [ 19.695109] show_stack+0x20/0x38 (C) [ 19.695143] dump_stack_lvl+0x8c/0xd0 [ 19.695174] print_report+0x118/0x608 [ 19.695203] kasan_report+0xdc/0x128 [ 19.695231] __asan_report_store16_noabort+0x20/0x30 [ 19.695266] kmalloc_oob_16+0x3a0/0x3f8 [ 19.695298] kunit_try_run_case+0x170/0x3f0 [ 19.695333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.695371] kthread+0x328/0x630 [ 19.695405] ret_from_fork+0x10/0x20 [ 19.695438] [ 19.701010] Allocated by task 224: [ 19.701337] kasan_save_stack+0x3c/0x68 [ 19.701711] kasan_save_track+0x20/0x40 [ 19.702082] kasan_save_alloc_info+0x40/0x58 [ 19.702494] __kasan_kmalloc+0xd4/0xd8 [ 19.702857] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.703298] kmalloc_oob_16+0xb4/0x3f8 [ 19.703665] kunit_try_run_case+0x170/0x3f0 [ 19.704072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.704596] kthread+0x328/0x630 [ 19.704919] ret_from_fork+0x10/0x20 [ 19.705268] [ 19.705422] The buggy address belongs to the object at ffff00000107ef00 [ 19.705422] which belongs to the cache kmalloc-16 of size 16 [ 19.706539] The buggy address is located 0 bytes inside of [ 19.706539] allocated 13-byte region [ffff00000107ef00, ffff00000107ef0d) [ 19.707658] [ 19.707812] The buggy address belongs to the physical page: [ 19.708328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107e [ 19.709052] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.709663] page_type: f5(slab) [ 19.709976] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 19.710692] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.711398] page dumped because: kasan: bad access detected [ 19.711912] [ 19.712065] Memory state around the buggy address: [ 19.712513] ffff00000107ee00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.713178] ffff00000107ee80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.713844] >ffff00000107ef00: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.714505] ^ [ 19.714838] ffff00000107ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.715504] ffff00000107f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.716165] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 19.656324] ================================================================== [ 19.657027] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 19.657690] Read of size 1 at addr ffff00000219ce00 by task kunit_try_catch/222 [ 19.658396] [ 19.658579] CPU: 2 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.658657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.658680] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.658707] Call trace: [ 19.658725] show_stack+0x20/0x38 (C) [ 19.658776] dump_stack_lvl+0x8c/0xd0 [ 19.658826] print_report+0x118/0x608 [ 19.658874] kasan_report+0xdc/0x128 [ 19.658920] __asan_report_load1_noabort+0x20/0x30 [ 19.658975] krealloc_uaf+0x4c8/0x520 [ 19.659030] kunit_try_run_case+0x170/0x3f0 [ 19.659086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.659149] kthread+0x328/0x630 [ 19.659203] ret_from_fork+0x10/0x20 [ 19.659255] [ 19.664897] Allocated by task 222: [ 19.665241] kasan_save_stack+0x3c/0x68 [ 19.665639] kasan_save_track+0x20/0x40 [ 19.666036] kasan_save_alloc_info+0x40/0x58 [ 19.666477] __kasan_kmalloc+0xd4/0xd8 [ 19.666867] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.667338] krealloc_uaf+0xc8/0x520 [ 19.667722] kunit_try_run_case+0x170/0x3f0 [ 19.668157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.668714] kthread+0x328/0x630 [ 19.669066] ret_from_fork+0x10/0x20 [ 19.669442] [ 19.669610] Freed by task 222: [ 19.669925] kasan_save_stack+0x3c/0x68 [ 19.670324] kasan_save_track+0x20/0x40 [ 19.670721] kasan_save_free_info+0x4c/0x78 [ 19.671154] __kasan_slab_free+0x6c/0x98 [ 19.671558] kfree+0x214/0x3c8 [ 19.671892] krealloc_uaf+0x12c/0x520 [ 19.672283] kunit_try_run_case+0x170/0x3f0 [ 19.672719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.673275] kthread+0x328/0x630 [ 19.673626] ret_from_fork+0x10/0x20 [ 19.674003] [ 19.674172] The buggy address belongs to the object at ffff00000219ce00 [ 19.674172] which belongs to the cache kmalloc-256 of size 256 [ 19.675337] The buggy address is located 0 bytes inside of [ 19.675337] freed 256-byte region [ffff00000219ce00, ffff00000219cf00) [ 19.676467] [ 19.676637] The buggy address belongs to the physical page: [ 19.677172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x219c [ 19.677925] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.678657] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.679339] page_type: f5(slab) [ 19.679675] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.680421] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.681168] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.681922] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.682677] head: 03fffe0000000001 fffffdffc0086701 00000000ffffffff 00000000ffffffff [ 19.683430] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.684168] page dumped because: kasan: bad access detected [ 19.684704] [ 19.684871] Memory state around the buggy address: [ 19.685340] ffff00000219cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.686034] ffff00000219cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.686726] >ffff00000219ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.687411] ^ [ 19.687742] ffff00000219ce80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.688435] ffff00000219cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.689120] ================================================================== [ 19.621634] ================================================================== [ 19.622774] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 19.623446] Read of size 1 at addr ffff00000219ce00 by task kunit_try_catch/222 [ 19.624152] [ 19.624336] CPU: 2 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.624415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.624438] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.624465] Call trace: [ 19.624483] show_stack+0x20/0x38 (C) [ 19.624535] dump_stack_lvl+0x8c/0xd0 [ 19.624585] print_report+0x118/0x608 [ 19.624633] kasan_report+0xdc/0x128 [ 19.624680] __kasan_check_byte+0x54/0x70 [ 19.624728] krealloc_noprof+0x44/0x360 [ 19.624776] krealloc_uaf+0x180/0x520 [ 19.624831] kunit_try_run_case+0x170/0x3f0 [ 19.624888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.624952] kthread+0x328/0x630 [ 19.625007] ret_from_fork+0x10/0x20 [ 19.625060] [ 19.630985] Allocated by task 222: [ 19.631332] kasan_save_stack+0x3c/0x68 [ 19.631733] kasan_save_track+0x20/0x40 [ 19.632130] kasan_save_alloc_info+0x40/0x58 [ 19.632571] __kasan_kmalloc+0xd4/0xd8 [ 19.632960] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.633432] krealloc_uaf+0xc8/0x520 [ 19.633816] kunit_try_run_case+0x170/0x3f0 [ 19.634254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.634811] kthread+0x328/0x630 [ 19.635162] ret_from_fork+0x10/0x20 [ 19.635540] [ 19.635708] Freed by task 222: [ 19.636021] kasan_save_stack+0x3c/0x68 [ 19.636418] kasan_save_track+0x20/0x40 [ 19.636813] kasan_save_free_info+0x4c/0x78 [ 19.637247] __kasan_slab_free+0x6c/0x98 [ 19.637652] kfree+0x214/0x3c8 [ 19.637989] krealloc_uaf+0x12c/0x520 [ 19.638379] kunit_try_run_case+0x170/0x3f0 [ 19.638815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.639372] kthread+0x328/0x630 [ 19.639723] ret_from_fork+0x10/0x20 [ 19.640100] [ 19.640268] The buggy address belongs to the object at ffff00000219ce00 [ 19.640268] which belongs to the cache kmalloc-256 of size 256 [ 19.641433] The buggy address is located 0 bytes inside of [ 19.641433] freed 256-byte region [ffff00000219ce00, ffff00000219cf00) [ 19.642564] [ 19.642734] The buggy address belongs to the physical page: [ 19.643271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x219c [ 19.644025] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.644758] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.645441] page_type: f5(slab) [ 19.645781] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.646527] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.647275] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.648028] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.648783] head: 03fffe0000000001 fffffdffc0086701 00000000ffffffff 00000000ffffffff [ 19.649536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.650276] page dumped because: kasan: bad access detected [ 19.650811] [ 19.650979] Memory state around the buggy address: [ 19.651449] ffff00000219cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.652142] ffff00000219cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.652835] >ffff00000219ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.653520] ^ [ 19.653852] ffff00000219ce80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.654545] ffff00000219cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.655231] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 19.575343] ================================================================== [ 19.576018] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 19.576723] Write of size 1 at addr ffff00001039a0ea by task kunit_try_catch/220 [ 19.577395] [ 19.577551] CPU: 4 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.577587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.577596] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.577608] Call trace: [ 19.577616] show_stack+0x20/0x38 (C) [ 19.577639] dump_stack_lvl+0x8c/0xd0 [ 19.577660] print_report+0x118/0x608 [ 19.577678] kasan_report+0xdc/0x128 [ 19.577697] __asan_report_store1_noabort+0x20/0x30 [ 19.577719] krealloc_less_oob_helper+0xae4/0xc50 [ 19.577743] krealloc_large_less_oob+0x20/0x38 [ 19.577766] kunit_try_run_case+0x170/0x3f0 [ 19.577790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.577815] kthread+0x328/0x630 [ 19.577838] ret_from_fork+0x10/0x20 [ 19.577859] [ 19.583835] The buggy address belongs to the physical page: [ 19.584341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398 [ 19.585058] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.585751] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.586387] page_type: f8(unknown) [ 19.586709] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.587408] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.588109] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.588814] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.589520] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff [ 19.590225] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.590926] page dumped because: kasan: bad access detected [ 19.591429] [ 19.591574] Memory state around the buggy address: [ 19.592010] ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.592662] ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.593313] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.593961] ^ [ 19.594559] ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.595212] ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.595861] ================================================================== [ 19.508879] ================================================================== [ 19.509969] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 19.510699] Write of size 1 at addr ffff00001039a0c9 by task kunit_try_catch/220 [ 19.511384] [ 19.511550] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.511599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.511613] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.511630] Call trace: [ 19.511641] show_stack+0x20/0x38 (C) [ 19.511673] dump_stack_lvl+0x8c/0xd0 [ 19.511704] print_report+0x118/0x608 [ 19.511733] kasan_report+0xdc/0x128 [ 19.511761] __asan_report_store1_noabort+0x20/0x30 [ 19.511795] krealloc_less_oob_helper+0xa48/0xc50 [ 19.511831] krealloc_large_less_oob+0x20/0x38 [ 19.511865] kunit_try_run_case+0x170/0x3f0 [ 19.511901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.511940] kthread+0x328/0x630 [ 19.511974] ret_from_fork+0x10/0x20 [ 19.512006] [ 19.518036] The buggy address belongs to the physical page: [ 19.518553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398 [ 19.519283] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.519988] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.520640] page_type: f8(unknown) [ 19.520976] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.521690] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.522405] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.523127] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.523850] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff [ 19.524572] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.525287] page dumped because: kasan: bad access detected [ 19.525801] [ 19.525953] Memory state around the buggy address: [ 19.526401] ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.527067] ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.527732] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.528393] ^ [ 19.528910] ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.529576] ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.530237] ================================================================== [ 19.553119] ================================================================== [ 19.553790] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 19.554507] Write of size 1 at addr ffff00001039a0da by task kunit_try_catch/220 [ 19.555192] [ 19.555356] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.555405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.555419] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.555436] Call trace: [ 19.555447] show_stack+0x20/0x38 (C) [ 19.555479] dump_stack_lvl+0x8c/0xd0 [ 19.555509] print_report+0x118/0x608 [ 19.555538] kasan_report+0xdc/0x128 [ 19.555566] __asan_report_store1_noabort+0x20/0x30 [ 19.555601] krealloc_less_oob_helper+0xa80/0xc50 [ 19.555636] krealloc_large_less_oob+0x20/0x38 [ 19.555671] kunit_try_run_case+0x170/0x3f0 [ 19.555706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.555744] kthread+0x328/0x630 [ 19.555778] ret_from_fork+0x10/0x20 [ 19.555810] [ 19.561839] The buggy address belongs to the physical page: [ 19.562354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398 [ 19.563085] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.563788] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.564439] page_type: f8(unknown) [ 19.564773] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.565487] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.566201] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.566921] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.567644] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff [ 19.568366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.569081] page dumped because: kasan: bad access detected [ 19.569595] [ 19.569747] Memory state around the buggy address: [ 19.570194] ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.570860] ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.571525] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.572186] ^ [ 19.572749] ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.573414] ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.574075] ================================================================== [ 19.375361] ================================================================== [ 19.376015] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 19.376704] Write of size 1 at addr ffff00000d6fccda by task kunit_try_catch/216 [ 19.377373] [ 19.377522] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.377554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.377563] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.377573] Call trace: [ 19.377580] show_stack+0x20/0x38 (C) [ 19.377600] dump_stack_lvl+0x8c/0xd0 [ 19.377619] print_report+0x118/0x608 [ 19.377638] kasan_report+0xdc/0x128 [ 19.377656] __asan_report_store1_noabort+0x20/0x30 [ 19.377678] krealloc_less_oob_helper+0xa80/0xc50 [ 19.377702] krealloc_less_oob+0x20/0x38 [ 19.377725] kunit_try_run_case+0x170/0x3f0 [ 19.377747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.377772] kthread+0x328/0x630 [ 19.377793] ret_from_fork+0x10/0x20 [ 19.377812] [ 19.383740] Allocated by task 216: [ 19.384055] kasan_save_stack+0x3c/0x68 [ 19.384415] kasan_save_track+0x20/0x40 [ 19.384773] kasan_save_alloc_info+0x40/0x58 [ 19.385172] __kasan_krealloc+0x118/0x178 [ 19.385546] krealloc_noprof+0x128/0x360 [ 19.385912] krealloc_less_oob_helper+0x168/0xc50 [ 19.386352] krealloc_less_oob+0x20/0x38 [ 19.386724] kunit_try_run_case+0x170/0x3f0 [ 19.387115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.387624] kthread+0x328/0x630 [ 19.387932] ret_from_fork+0x10/0x20 [ 19.388269] [ 19.388413] The buggy address belongs to the object at ffff00000d6fcc00 [ 19.388413] which belongs to the cache kmalloc-256 of size 256 [ 19.389528] The buggy address is located 17 bytes to the right of [ 19.389528] allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9) [ 19.390693] [ 19.390838] The buggy address belongs to the physical page: [ 19.391341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc [ 19.392049] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.392737] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.393370] page_type: f5(slab) [ 19.393667] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.394365] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.395065] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.395770] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.396476] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff [ 19.397182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.397883] page dumped because: kasan: bad access detected [ 19.398387] [ 19.398533] Memory state around the buggy address: [ 19.398969] ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.399621] ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.400273] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.400921] ^ [ 19.401473] ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.402125] ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.402774] ================================================================== [ 19.596686] ================================================================== [ 19.597340] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 19.598029] Write of size 1 at addr ffff00001039a0eb by task kunit_try_catch/220 [ 19.598699] [ 19.598848] CPU: 4 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.598880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.598889] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.598899] Call trace: [ 19.598905] show_stack+0x20/0x38 (C) [ 19.598925] dump_stack_lvl+0x8c/0xd0 [ 19.598943] print_report+0x118/0x608 [ 19.598961] kasan_report+0xdc/0x128 [ 19.598979] __asan_report_store1_noabort+0x20/0x30 [ 19.599000] krealloc_less_oob_helper+0xa58/0xc50 [ 19.599024] krealloc_large_less_oob+0x20/0x38 [ 19.599047] kunit_try_run_case+0x170/0x3f0 [ 19.599069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.599094] kthread+0x328/0x630 [ 19.599116] ret_from_fork+0x10/0x20 [ 19.599136] [ 19.605108] The buggy address belongs to the physical page: [ 19.605610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398 [ 19.606325] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.607014] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.607646] page_type: f8(unknown) [ 19.607966] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.608664] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.609363] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.610068] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.610774] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff [ 19.611480] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.612181] page dumped because: kasan: bad access detected [ 19.612683] [ 19.612828] Memory state around the buggy address: [ 19.613263] ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.613916] ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.614566] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.615214] ^ [ 19.615810] ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.616461] ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.617109] ================================================================== [ 19.403560] ================================================================== [ 19.404214] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 19.404903] Write of size 1 at addr ffff00000d6fccea by task kunit_try_catch/216 [ 19.405572] [ 19.405722] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.405754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.405763] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.405773] Call trace: [ 19.405780] show_stack+0x20/0x38 (C) [ 19.405800] dump_stack_lvl+0x8c/0xd0 [ 19.405820] print_report+0x118/0x608 [ 19.405838] kasan_report+0xdc/0x128 [ 19.405856] __asan_report_store1_noabort+0x20/0x30 [ 19.405879] krealloc_less_oob_helper+0xae4/0xc50 [ 19.405903] krealloc_less_oob+0x20/0x38 [ 19.405926] kunit_try_run_case+0x170/0x3f0 [ 19.405947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.405972] kthread+0x328/0x630 [ 19.405993] ret_from_fork+0x10/0x20 [ 19.406013] [ 19.411939] Allocated by task 216: [ 19.412255] kasan_save_stack+0x3c/0x68 [ 19.412614] kasan_save_track+0x20/0x40 [ 19.412972] kasan_save_alloc_info+0x40/0x58 [ 19.413372] __kasan_krealloc+0x118/0x178 [ 19.413745] krealloc_noprof+0x128/0x360 [ 19.414111] krealloc_less_oob_helper+0x168/0xc50 [ 19.414552] krealloc_less_oob+0x20/0x38 [ 19.414923] kunit_try_run_case+0x170/0x3f0 [ 19.415315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.415823] kthread+0x328/0x630 [ 19.416131] ret_from_fork+0x10/0x20 [ 19.416468] [ 19.416614] The buggy address belongs to the object at ffff00000d6fcc00 [ 19.416614] which belongs to the cache kmalloc-256 of size 256 [ 19.417728] The buggy address is located 33 bytes to the right of [ 19.417728] allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9) [ 19.418892] [ 19.419037] The buggy address belongs to the physical page: [ 19.419541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc [ 19.420247] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.420936] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.421567] page_type: f5(slab) [ 19.421864] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.422563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.423261] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.423967] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.424674] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff [ 19.425378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.426079] page dumped because: kasan: bad access detected [ 19.426581] [ 19.426726] Memory state around the buggy address: [ 19.427162] ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.427813] ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.428463] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.429112] ^ [ 19.429708] ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.430359] ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.431008] ================================================================== [ 19.347103] ================================================================== [ 19.347777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 19.348480] Write of size 1 at addr ffff00000d6fccd0 by task kunit_try_catch/216 [ 19.349151] [ 19.349306] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.349342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.349351] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.349363] Call trace: [ 19.349371] show_stack+0x20/0x38 (C) [ 19.349394] dump_stack_lvl+0x8c/0xd0 [ 19.349415] print_report+0x118/0x608 [ 19.349434] kasan_report+0xdc/0x128 [ 19.349452] __asan_report_store1_noabort+0x20/0x30 [ 19.349475] krealloc_less_oob_helper+0xb9c/0xc50 [ 19.349499] krealloc_less_oob+0x20/0x38 [ 19.349523] kunit_try_run_case+0x170/0x3f0 [ 19.349546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.349571] kthread+0x328/0x630 [ 19.349593] ret_from_fork+0x10/0x20 [ 19.349614] [ 19.355545] Allocated by task 216: [ 19.355862] kasan_save_stack+0x3c/0x68 [ 19.356223] kasan_save_track+0x20/0x40 [ 19.356582] kasan_save_alloc_info+0x40/0x58 [ 19.356981] __kasan_krealloc+0x118/0x178 [ 19.357355] krealloc_noprof+0x128/0x360 [ 19.357722] krealloc_less_oob_helper+0x168/0xc50 [ 19.358162] krealloc_less_oob+0x20/0x38 [ 19.358532] kunit_try_run_case+0x170/0x3f0 [ 19.358925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.359433] kthread+0x328/0x630 [ 19.359743] ret_from_fork+0x10/0x20 [ 19.360079] [ 19.360226] The buggy address belongs to the object at ffff00000d6fcc00 [ 19.360226] which belongs to the cache kmalloc-256 of size 256 [ 19.361342] The buggy address is located 7 bytes to the right of [ 19.361342] allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9) [ 19.362499] [ 19.362645] The buggy address belongs to the physical page: [ 19.363149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc [ 19.363858] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.364550] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.365185] page_type: f5(slab) [ 19.365485] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.366185] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.366884] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.367590] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.368297] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff [ 19.369003] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.369704] page dumped because: kasan: bad access detected [ 19.370208] [ 19.370353] Memory state around the buggy address: [ 19.370790] ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.371442] ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.372093] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.372741] ^ [ 19.373269] ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.373921] ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.374568] ================================================================== [ 19.531305] ================================================================== [ 19.531989] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 19.532704] Write of size 1 at addr ffff00001039a0d0 by task kunit_try_catch/220 [ 19.533388] [ 19.533552] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.533601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.533615] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.533632] Call trace: [ 19.533643] show_stack+0x20/0x38 (C) [ 19.533674] dump_stack_lvl+0x8c/0xd0 [ 19.533705] print_report+0x118/0x608 [ 19.533734] kasan_report+0xdc/0x128 [ 19.533761] __asan_report_store1_noabort+0x20/0x30 [ 19.533795] krealloc_less_oob_helper+0xb9c/0xc50 [ 19.533831] krealloc_large_less_oob+0x20/0x38 [ 19.533866] kunit_try_run_case+0x170/0x3f0 [ 19.533901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.533939] kthread+0x328/0x630 [ 19.533973] ret_from_fork+0x10/0x20 [ 19.534005] [ 19.540033] The buggy address belongs to the physical page: [ 19.540549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398 [ 19.541280] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.541984] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.542634] page_type: f8(unknown) [ 19.542969] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.543684] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.544398] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.545120] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.545843] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff [ 19.546566] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.547280] page dumped because: kasan: bad access detected [ 19.547794] [ 19.547946] Memory state around the buggy address: [ 19.548393] ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.549059] ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.549724] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.550385] ^ [ 19.550927] ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.551591] ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.552252] ================================================================== [ 19.317399] ================================================================== [ 19.318458] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 19.319185] Write of size 1 at addr ffff00000d6fccc9 by task kunit_try_catch/216 [ 19.319869] [ 19.320034] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.320083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.320097] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.320113] Call trace: [ 19.320125] show_stack+0x20/0x38 (C) [ 19.320157] dump_stack_lvl+0x8c/0xd0 [ 19.320188] print_report+0x118/0x608 [ 19.320217] kasan_report+0xdc/0x128 [ 19.320244] __asan_report_store1_noabort+0x20/0x30 [ 19.320278] krealloc_less_oob_helper+0xa48/0xc50 [ 19.320314] krealloc_less_oob+0x20/0x38 [ 19.320348] kunit_try_run_case+0x170/0x3f0 [ 19.320382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.320421] kthread+0x328/0x630 [ 19.320454] ret_from_fork+0x10/0x20 [ 19.320487] [ 19.326473] Allocated by task 216: [ 19.326801] kasan_save_stack+0x3c/0x68 [ 19.327176] kasan_save_track+0x20/0x40 [ 19.327547] kasan_save_alloc_info+0x40/0x58 [ 19.327961] __kasan_krealloc+0x118/0x178 [ 19.328348] krealloc_noprof+0x128/0x360 [ 19.328728] krealloc_less_oob_helper+0x168/0xc50 [ 19.329183] krealloc_less_oob+0x20/0x38 [ 19.329567] kunit_try_run_case+0x170/0x3f0 [ 19.329974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.330499] kthread+0x328/0x630 [ 19.330821] ret_from_fork+0x10/0x20 [ 19.331171] [ 19.331324] The buggy address belongs to the object at ffff00000d6fcc00 [ 19.331324] which belongs to the cache kmalloc-256 of size 256 [ 19.332455] The buggy address is located 0 bytes to the right of [ 19.332455] allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9) [ 19.333627] [ 19.333781] The buggy address belongs to the physical page: [ 19.334298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc [ 19.335021] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.335727] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.336378] page_type: f5(slab) [ 19.336692] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.337408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.338123] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.338846] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.339569] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff [ 19.340292] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.341006] page dumped because: kasan: bad access detected [ 19.341519] [ 19.341671] Memory state around the buggy address: [ 19.342119] ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.342785] ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.343450] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.344112] ^ [ 19.344629] ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.345294] ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.345955] ================================================================== [ 19.431786] ================================================================== [ 19.432440] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 19.433131] Write of size 1 at addr ffff00000d6fcceb by task kunit_try_catch/216 [ 19.433800] [ 19.433949] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.433980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.433989] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.433999] Call trace: [ 19.434006] show_stack+0x20/0x38 (C) [ 19.434025] dump_stack_lvl+0x8c/0xd0 [ 19.434043] print_report+0x118/0x608 [ 19.434062] kasan_report+0xdc/0x128 [ 19.434080] __asan_report_store1_noabort+0x20/0x30 [ 19.434101] krealloc_less_oob_helper+0xa58/0xc50 [ 19.434126] krealloc_less_oob+0x20/0x38 [ 19.434149] kunit_try_run_case+0x170/0x3f0 [ 19.434170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.434195] kthread+0x328/0x630 [ 19.434216] ret_from_fork+0x10/0x20 [ 19.434236] [ 19.440161] Allocated by task 216: [ 19.440476] kasan_save_stack+0x3c/0x68 [ 19.440834] kasan_save_track+0x20/0x40 [ 19.441192] kasan_save_alloc_info+0x40/0x58 [ 19.441591] __kasan_krealloc+0x118/0x178 [ 19.441964] krealloc_noprof+0x128/0x360 [ 19.442329] krealloc_less_oob_helper+0x168/0xc50 [ 19.442768] krealloc_less_oob+0x20/0x38 [ 19.443138] kunit_try_run_case+0x170/0x3f0 [ 19.443530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.444036] kthread+0x328/0x630 [ 19.444345] ret_from_fork+0x10/0x20 [ 19.444681] [ 19.444827] The buggy address belongs to the object at ffff00000d6fcc00 [ 19.444827] which belongs to the cache kmalloc-256 of size 256 [ 19.445941] The buggy address is located 34 bytes to the right of [ 19.445941] allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9) [ 19.447104] [ 19.447250] The buggy address belongs to the physical page: [ 19.447752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc [ 19.448459] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.449148] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.449779] page_type: f5(slab) [ 19.450075] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.450774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.451473] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.452179] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.452885] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff [ 19.453591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.454292] page dumped because: kasan: bad access detected [ 19.454795] [ 19.454940] Memory state around the buggy address: [ 19.455376] ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.456027] ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.456677] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.457326] ^ [ 19.457923] ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.458574] ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.459223] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 19.485032] ================================================================== [ 19.485706] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 19.486433] Write of size 1 at addr ffff000001a960f0 by task kunit_try_catch/218 [ 19.487105] [ 19.487261] CPU: 3 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.487297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.487307] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.487319] Call trace: [ 19.487328] show_stack+0x20/0x38 (C) [ 19.487351] dump_stack_lvl+0x8c/0xd0 [ 19.487373] print_report+0x118/0x608 [ 19.487394] kasan_report+0xdc/0x128 [ 19.487413] __asan_report_store1_noabort+0x20/0x30 [ 19.487438] krealloc_more_oob_helper+0x5c0/0x678 [ 19.487463] krealloc_large_more_oob+0x20/0x38 [ 19.487488] kunit_try_run_case+0x170/0x3f0 [ 19.487514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.487541] kthread+0x328/0x630 [ 19.487566] ret_from_fork+0x10/0x20 [ 19.487590] [ 19.493575] The buggy address belongs to the physical page: [ 19.494082] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a94 [ 19.494794] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.495487] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.496124] page_type: f8(unknown) [ 19.496448] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.497150] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.497851] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.498560] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.499270] head: 03fffe0000000002 fffffdffc006a501 00000000ffffffff 00000000ffffffff [ 19.499979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.500683] page dumped because: kasan: bad access detected [ 19.501189] [ 19.501334] Memory state around the buggy address: [ 19.501773] ffff000001a95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.502426] ffff000001a96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.503080] >ffff000001a96080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.503730] ^ [ 19.504351] ffff000001a96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.505005] ffff000001a96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.505656] ================================================================== [ 19.462778] ================================================================== [ 19.463867] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.464591] Write of size 1 at addr ffff000001a960eb by task kunit_try_catch/218 [ 19.465275] [ 19.465441] CPU: 3 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.465489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.465503] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.465521] Call trace: [ 19.465533] show_stack+0x20/0x38 (C) [ 19.465568] dump_stack_lvl+0x8c/0xd0 [ 19.465600] print_report+0x118/0x608 [ 19.465630] kasan_report+0xdc/0x128 [ 19.465658] __asan_report_store1_noabort+0x20/0x30 [ 19.465692] krealloc_more_oob_helper+0x60c/0x678 [ 19.465729] krealloc_large_more_oob+0x20/0x38 [ 19.465764] kunit_try_run_case+0x170/0x3f0 [ 19.465799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.465838] kthread+0x328/0x630 [ 19.465873] ret_from_fork+0x10/0x20 [ 19.465906] [ 19.471939] The buggy address belongs to the physical page: [ 19.472458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a94 [ 19.473181] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.473887] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.474538] page_type: f8(unknown) [ 19.474874] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.475590] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.476304] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.477026] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.477749] head: 03fffe0000000002 fffffdffc006a501 00000000ffffffff 00000000ffffffff [ 19.478471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.479186] page dumped because: kasan: bad access detected [ 19.479701] [ 19.479852] Memory state around the buggy address: [ 19.480299] ffff000001a95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.480964] ffff000001a96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.481629] >ffff000001a96080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.482290] ^ [ 19.482899] ffff000001a96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.483565] ffff000001a96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.484226] ================================================================== [ 19.258095] ================================================================== [ 19.259091] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.259797] Write of size 1 at addr ffff00000a9e8aeb by task kunit_try_catch/214 [ 19.260467] [ 19.260614] CPU: 5 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.260639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.260645] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.260653] Call trace: [ 19.260659] show_stack+0x20/0x38 (C) [ 19.260676] dump_stack_lvl+0x8c/0xd0 [ 19.260691] print_report+0x118/0x608 [ 19.260704] kasan_report+0xdc/0x128 [ 19.260717] __asan_report_store1_noabort+0x20/0x30 [ 19.260732] krealloc_more_oob_helper+0x60c/0x678 [ 19.260749] krealloc_more_oob+0x20/0x38 [ 19.260765] kunit_try_run_case+0x170/0x3f0 [ 19.260781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.260798] kthread+0x328/0x630 [ 19.260814] ret_from_fork+0x10/0x20 [ 19.260828] [ 19.266719] Allocated by task 214: [ 19.267028] kasan_save_stack+0x3c/0x68 [ 19.267381] kasan_save_track+0x20/0x40 [ 19.267731] kasan_save_alloc_info+0x40/0x58 [ 19.268121] __kasan_krealloc+0x118/0x178 [ 19.268486] krealloc_noprof+0x128/0x360 [ 19.268844] krealloc_more_oob_helper+0x168/0x678 [ 19.269273] krealloc_more_oob+0x20/0x38 [ 19.269635] kunit_try_run_case+0x170/0x3f0 [ 19.270017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.270514] kthread+0x328/0x630 [ 19.270813] ret_from_fork+0x10/0x20 [ 19.271140] [ 19.271281] The buggy address belongs to the object at ffff00000a9e8a00 [ 19.271281] which belongs to the cache kmalloc-256 of size 256 [ 19.272385] The buggy address is located 0 bytes to the right of [ 19.272385] allocated 235-byte region [ffff00000a9e8a00, ffff00000a9e8aeb) [ 19.273531] [ 19.273671] The buggy address belongs to the physical page: [ 19.274170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa9e8 [ 19.274869] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.275551] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.276176] page_type: f5(slab) [ 19.276467] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.277158] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.277847] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.278545] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.279242] head: 03fffe0000000001 fffffdffc02a7a01 00000000ffffffff 00000000ffffffff [ 19.279938] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.280632] page dumped because: kasan: bad access detected [ 19.281129] [ 19.281269] Memory state around the buggy address: [ 19.281699] ffff00000a9e8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.282342] ffff00000a9e8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.282985] >ffff00000a9e8a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.283626] ^ [ 19.284214] ffff00000a9e8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.284857] ffff00000a9e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.285498] ================================================================== [ 19.286224] ================================================================== [ 19.286869] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 19.287549] Write of size 1 at addr ffff00000a9e8af0 by task kunit_try_catch/214 [ 19.288208] [ 19.288350] CPU: 5 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.288367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.288371] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.288377] Call trace: [ 19.288380] show_stack+0x20/0x38 (C) [ 19.288392] dump_stack_lvl+0x8c/0xd0 [ 19.288401] print_report+0x118/0x608 [ 19.288411] kasan_report+0xdc/0x128 [ 19.288420] __asan_report_store1_noabort+0x20/0x30 [ 19.288431] krealloc_more_oob_helper+0x5c0/0x678 [ 19.288444] krealloc_more_oob+0x20/0x38 [ 19.288455] kunit_try_run_case+0x170/0x3f0 [ 19.288467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.288480] kthread+0x328/0x630 [ 19.288491] ret_from_fork+0x10/0x20 [ 19.288501] [ 19.294374] Allocated by task 214: [ 19.294679] kasan_save_stack+0x3c/0x68 [ 19.295024] kasan_save_track+0x20/0x40 [ 19.295370] kasan_save_alloc_info+0x40/0x58 [ 19.295755] __kasan_krealloc+0x118/0x178 [ 19.296116] krealloc_noprof+0x128/0x360 [ 19.296469] krealloc_more_oob_helper+0x168/0x678 [ 19.296893] krealloc_more_oob+0x20/0x38 [ 19.297249] kunit_try_run_case+0x170/0x3f0 [ 19.297625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.298117] kthread+0x328/0x630 [ 19.298411] ret_from_fork+0x10/0x20 [ 19.298734] [ 19.298872] The buggy address belongs to the object at ffff00000a9e8a00 [ 19.298872] which belongs to the cache kmalloc-256 of size 256 [ 19.299971] The buggy address is located 5 bytes to the right of [ 19.299971] allocated 235-byte region [ffff00000a9e8a00, ffff00000a9e8aeb) [ 19.301109] [ 19.301246] The buggy address belongs to the physical page: [ 19.301739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa9e8 [ 19.302433] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.303109] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.303726] page_type: f5(slab) [ 19.304011] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.304696] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.305379] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 19.306070] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.306763] head: 03fffe0000000001 fffffdffc02a7a01 00000000ffffffff 00000000ffffffff [ 19.307455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.308146] page dumped because: kasan: bad access detected [ 19.308638] [ 19.308775] Memory state around the buggy address: [ 19.309201] ffff00000a9e8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.309841] ffff00000a9e8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.310480] >ffff00000a9e8a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.311116] ^ [ 19.311723] ffff00000a9e8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.312361] ffff00000a9e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.312997] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 19.237279] ================================================================== [ 19.238660] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 19.239290] Read of size 1 at addr ffff000010940000 by task kunit_try_catch/212 [ 19.239976] [ 19.240149] CPU: 3 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.240209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.240226] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.240247] Call trace: [ 19.240261] show_stack+0x20/0x38 (C) [ 19.240300] dump_stack_lvl+0x8c/0xd0 [ 19.240337] print_report+0x118/0x608 [ 19.240372] kasan_report+0xdc/0x128 [ 19.240406] __asan_report_load1_noabort+0x20/0x30 [ 19.240448] page_alloc_uaf+0x328/0x350 [ 19.240489] kunit_try_run_case+0x170/0x3f0 [ 19.240532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.240580] kthread+0x328/0x630 [ 19.240621] ret_from_fork+0x10/0x20 [ 19.240661] [ 19.246259] The buggy address belongs to the physical page: [ 19.246783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10940 [ 19.247527] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.248149] page_type: f0(buddy) [ 19.248479] raw: 03fffe0000000000 ffff0000f75f26f0 ffff0000f75f26f0 0000000000000000 [ 19.249205] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 19.249921] page dumped because: kasan: bad access detected [ 19.250443] [ 19.250601] Memory state around the buggy address: [ 19.251056] ffff00001093ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.251731] ffff00001093ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.252406] >ffff000010940000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.253076] ^ [ 19.253394] ffff000010940080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.254068] ffff000010940100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.254738] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 19.209947] ================================================================== [ 19.210983] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 19.211511] Free of addr ffff000001a94001 by task kunit_try_catch/208 [ 19.212107] [ 19.212269] CPU: 3 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.212317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.212331] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.212347] Call trace: [ 19.212359] show_stack+0x20/0x38 (C) [ 19.212390] dump_stack_lvl+0x8c/0xd0 [ 19.212421] print_report+0x118/0x608 [ 19.212451] kasan_report_invalid_free+0xc0/0xe8 [ 19.212482] __kasan_kfree_large+0x5c/0xa8 [ 19.212511] free_large_kmalloc+0x64/0x190 [ 19.212546] kfree+0x270/0x3c8 [ 19.212576] kmalloc_large_invalid_free+0x108/0x270 [ 19.212613] kunit_try_run_case+0x170/0x3f0 [ 19.212647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.212686] kthread+0x328/0x630 [ 19.212719] ret_from_fork+0x10/0x20 [ 19.212751] [ 19.219068] The buggy address belongs to the physical page: [ 19.219588] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a94 [ 19.220312] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.221016] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.221666] page_type: f8(unknown) [ 19.222001] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.222716] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.223431] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.224153] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.224875] head: 03fffe0000000002 fffffdffc006a501 00000000ffffffff 00000000ffffffff [ 19.225598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.226314] page dumped because: kasan: bad access detected [ 19.226828] [ 19.226980] Memory state around the buggy address: [ 19.227429] ffff000001a93f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.228095] ffff000001a93f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.228760] >ffff000001a94000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.229421] ^ [ 19.229733] ffff000001a94080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.230398] ffff000001a94100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.231060] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 19.190147] ================================================================== [ 19.191202] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 19.191823] Read of size 1 at addr ffff0000108c4000 by task kunit_try_catch/206 [ 19.192487] [ 19.192634] CPU: 5 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.192659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.192666] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.192674] Call trace: [ 19.192680] show_stack+0x20/0x38 (C) [ 19.192697] dump_stack_lvl+0x8c/0xd0 [ 19.192712] print_report+0x118/0x608 [ 19.192725] kasan_report+0xdc/0x128 [ 19.192737] __asan_report_load1_noabort+0x20/0x30 [ 19.192752] kmalloc_large_uaf+0x2cc/0x2f8 [ 19.192767] kunit_try_run_case+0x170/0x3f0 [ 19.192783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.192800] kthread+0x328/0x630 [ 19.192816] ret_from_fork+0x10/0x20 [ 19.192830] [ 19.198320] The buggy address belongs to the physical page: [ 19.198818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108c4 [ 19.199525] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.200118] raw: 03fffe0000000000 fffffdffc0423208 ffff0000d1782740 0000000000000000 [ 19.200809] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 19.201495] page dumped because: kasan: bad access detected [ 19.201993] [ 19.202132] Memory state around the buggy address: [ 19.202563] ffff0000108c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.203206] ffff0000108c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.203849] >ffff0000108c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.204490] ^ [ 19.204784] ffff0000108c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.205427] ffff0000108c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.206068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 19.133811] ================================================================== [ 19.134994] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 19.135692] Write of size 1 at addr ffff00000eb85f00 by task kunit_try_catch/202 [ 19.136376] [ 19.136542] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.136591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.136604] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.136621] Call trace: [ 19.136633] show_stack+0x20/0x38 (C) [ 19.136666] dump_stack_lvl+0x8c/0xd0 [ 19.136697] print_report+0x118/0x608 [ 19.136726] kasan_report+0xdc/0x128 [ 19.136754] __asan_report_store1_noabort+0x20/0x30 [ 19.136788] kmalloc_big_oob_right+0x2a4/0x2f0 [ 19.136822] kunit_try_run_case+0x170/0x3f0 [ 19.136857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.136897] kthread+0x328/0x630 [ 19.136931] ret_from_fork+0x10/0x20 [ 19.136963] [ 19.142599] Allocated by task 202: [ 19.142950] kasan_save_stack+0x3c/0x68 [ 19.143354] kasan_save_track+0x20/0x40 [ 19.143751] kasan_save_alloc_info+0x40/0x58 [ 19.144191] __kasan_kmalloc+0xd4/0xd8 [ 19.144580] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.145054] kmalloc_big_oob_right+0xb8/0x2f0 [ 19.145507] kunit_try_run_case+0x170/0x3f0 [ 19.145948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.146505] kthread+0x328/0x630 [ 19.146858] ret_from_fork+0x10/0x20 [ 19.147235] [ 19.147404] The buggy address belongs to the object at ffff00000eb84000 [ 19.147404] which belongs to the cache kmalloc-8k of size 8192 [ 19.148569] The buggy address is located 0 bytes to the right of [ 19.148569] allocated 7936-byte region [ffff00000eb84000, ffff00000eb85f00) [ 19.149786] [ 19.149956] The buggy address belongs to the physical page: [ 19.150493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xeb80 [ 19.151245] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.151978] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.152661] page_type: f5(slab) [ 19.153000] raw: 03fffe0000000040 ffff000000403180 dead000000000122 0000000000000000 [ 19.153747] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 19.154494] head: 03fffe0000000040 ffff000000403180 dead000000000122 0000000000000000 [ 19.155247] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 19.156002] head: 03fffe0000000003 fffffdffc03ae001 00000000ffffffff 00000000ffffffff [ 19.156756] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 19.157494] page dumped because: kasan: bad access detected [ 19.158029] [ 19.158196] Memory state around the buggy address: [ 19.158665] ffff00000eb85e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.159358] ffff00000eb85e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.160051] >ffff00000eb85f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.160736] ^ [ 19.161067] ffff00000eb85f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.161760] ffff00000eb86000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.162445] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 19.088529] ================================================================== [ 19.089613] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 19.090387] Write of size 1 at addr ffff00000e73a078 by task kunit_try_catch/200 [ 19.091073] [ 19.091238] CPU: 2 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.091287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.091301] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.091318] Call trace: [ 19.091329] show_stack+0x20/0x38 (C) [ 19.091362] dump_stack_lvl+0x8c/0xd0 [ 19.091393] print_report+0x118/0x608 [ 19.091422] kasan_report+0xdc/0x128 [ 19.091450] __asan_report_store1_noabort+0x20/0x30 [ 19.091484] kmalloc_track_caller_oob_right+0x40c/0x488 [ 19.091523] kunit_try_run_case+0x170/0x3f0 [ 19.091558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.091597] kthread+0x328/0x630 [ 19.091631] ret_from_fork+0x10/0x20 [ 19.091664] [ 19.097345] Allocated by task 200: [ 19.097671] kasan_save_stack+0x3c/0x68 [ 19.098045] kasan_save_track+0x20/0x40 [ 19.098416] kasan_save_alloc_info+0x40/0x58 [ 19.098830] __kasan_kmalloc+0xd4/0xd8 [ 19.099192] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 19.099720] kmalloc_track_caller_oob_right+0xa8/0x488 [ 19.100214] kunit_try_run_case+0x170/0x3f0 [ 19.100621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.101145] kthread+0x328/0x630 [ 19.101467] ret_from_fork+0x10/0x20 [ 19.101817] [ 19.101971] The buggy address belongs to the object at ffff00000e73a000 [ 19.101971] which belongs to the cache kmalloc-128 of size 128 [ 19.103103] The buggy address is located 0 bytes to the right of [ 19.103103] allocated 120-byte region [ffff00000e73a000, ffff00000e73a078) [ 19.104276] [ 19.104430] The buggy address belongs to the physical page: [ 19.104946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73a [ 19.105670] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.106281] page_type: f5(slab) [ 19.106595] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 19.107310] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.108016] page dumped because: kasan: bad access detected [ 19.108530] [ 19.108682] Memory state around the buggy address: [ 19.109131] ffff00000e739f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.109796] ffff00000e739f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.110462] >ffff00000e73a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.111121] ^ [ 19.111776] ffff00000e73a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.112440] ffff00000e73a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.113102] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 19.056743] ================================================================== [ 19.057776] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 19.058478] Read of size 1 at addr ffff00000d213000 by task kunit_try_catch/198 [ 19.059148] [ 19.059309] CPU: 2 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.059349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.059361] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.059376] Call trace: [ 19.059386] show_stack+0x20/0x38 (C) [ 19.059414] dump_stack_lvl+0x8c/0xd0 [ 19.059441] print_report+0x118/0x608 [ 19.059465] kasan_report+0xdc/0x128 [ 19.059489] __asan_report_load1_noabort+0x20/0x30 [ 19.059517] kmalloc_node_oob_right+0x2f4/0x330 [ 19.059547] kunit_try_run_case+0x170/0x3f0 [ 19.059577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.059610] kthread+0x328/0x630 [ 19.059639] ret_from_fork+0x10/0x20 [ 19.059666] [ 19.065254] Allocated by task 198: [ 19.065575] kasan_save_stack+0x3c/0x68 [ 19.065942] kasan_save_track+0x20/0x40 [ 19.066306] kasan_save_alloc_info+0x40/0x58 [ 19.066713] __kasan_kmalloc+0xd4/0xd8 [ 19.067069] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 19.067535] kmalloc_node_oob_right+0xbc/0x330 [ 19.067960] kunit_try_run_case+0x170/0x3f0 [ 19.068360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.068875] kthread+0x328/0x630 [ 19.069191] ret_from_fork+0x10/0x20 [ 19.069534] [ 19.069684] The buggy address belongs to the object at ffff00000d212000 [ 19.069684] which belongs to the cache kmalloc-4k of size 4096 [ 19.070810] The buggy address is located 0 bytes to the right of [ 19.070810] allocated 4096-byte region [ffff00000d212000, ffff00000d213000) [ 19.071982] [ 19.072133] The buggy address belongs to the physical page: [ 19.072645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd210 [ 19.073362] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.074060] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 19.074705] page_type: f5(slab) [ 19.075012] raw: 03fffe0000000040 ffff000000403040 dead000000000122 0000000000000000 [ 19.075720] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 19.076428] head: 03fffe0000000040 ffff000000403040 dead000000000122 0000000000000000 [ 19.077143] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 19.077859] head: 03fffe0000000003 fffffdffc0348401 00000000ffffffff 00000000ffffffff [ 19.078575] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 19.079283] page dumped because: kasan: bad access detected [ 19.079793] [ 19.079941] Memory state around the buggy address: [ 19.080384] ffff00000d212f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.081044] ffff00000d212f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.081703] >ffff00000d213000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.082357] ^ [ 19.082662] ffff00000d213080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.083321] ffff00000d213100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.083976] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 19.010665] ================================================================== [ 19.011707] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 19.012366] Read of size 1 at addr ffff000002427adf by task kunit_try_catch/196 [ 19.013041] [ 19.013205] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 19.013253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.013267] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.013284] Call trace: [ 19.013295] show_stack+0x20/0x38 (C) [ 19.013327] dump_stack_lvl+0x8c/0xd0 [ 19.013358] print_report+0x118/0x608 [ 19.013387] kasan_report+0xdc/0x128 [ 19.013415] __asan_report_load1_noabort+0x20/0x30 [ 19.013448] kmalloc_oob_left+0x2ec/0x320 [ 19.013482] kunit_try_run_case+0x170/0x3f0 [ 19.013519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.013557] kthread+0x328/0x630 [ 19.013592] ret_from_fork+0x10/0x20 [ 19.013626] [ 19.019294] Allocated by task 11: [ 19.019635] kasan_save_stack+0x3c/0x68 [ 19.020035] kasan_save_track+0x20/0x40 [ 19.020432] kasan_save_alloc_info+0x40/0x58 [ 19.020873] __kasan_kmalloc+0xd4/0xd8 [ 19.021262] __kmalloc_noprof+0x190/0x4d0 [ 19.021676] usb_hcd_submit_urb+0x444/0x1a58 [ 19.022121] usb_submit_urb+0x564/0x1198 [ 19.022531] usb_start_wait_urb+0x120/0x3e8 [ 19.022965] usb_control_msg+0x2b4/0x3e0 [ 19.023375] hub_ext_port_status+0x114/0x580 [ 19.023823] hub_activate+0x2a4/0x1340 [ 19.024211] hub_resume+0xa8/0x380 [ 19.024566] usb_resume_interface.isra.0+0x1f8/0x348 [ 19.025076] usb_suspend_both+0x250/0x6f0 [ 19.025496] usb_runtime_suspend+0x3c/0xf8 [ 19.025926] __rpm_callback+0xa0/0x470 [ 19.026321] rpm_callback+0x168/0x1b0 [ 19.026705] rpm_suspend+0x1bc/0xcd8 [ 19.027080] __pm_runtime_suspend+0x5c/0x1e8 [ 19.027519] usb_runtime_idle+0x48/0x68 [ 19.027926] rpm_idle+0x13c/0x708 [ 19.028277] pm_runtime_work+0x110/0x170 [ 19.028684] process_one_work+0x530/0xf98 [ 19.029099] worker_thread+0x8ac/0xf28 [ 19.029489] kthread+0x328/0x630 [ 19.029843] ret_from_fork+0x10/0x20 [ 19.030220] [ 19.030388] Freed by task 11: [ 19.030694] kasan_save_stack+0x3c/0x68 [ 19.031094] kasan_save_track+0x20/0x40 [ 19.031490] kasan_save_free_info+0x4c/0x78 [ 19.031923] __kasan_slab_free+0x6c/0x98 [ 19.032328] kfree+0x214/0x3c8 [ 19.032664] usb_hcd_submit_urb+0x518/0x1a58 [ 19.033104] usb_submit_urb+0x564/0x1198 [ 19.033513] usb_start_wait_urb+0x120/0x3e8 [ 19.033948] usb_control_msg+0x2b4/0x3e0 [ 19.034356] hub_ext_port_status+0x114/0x580 [ 19.034802] hub_activate+0x2a4/0x1340 [ 19.035190] hub_resume+0xa8/0x380 [ 19.035547] usb_resume_interface.isra.0+0x1f8/0x348 [ 19.036054] usb_suspend_both+0x250/0x6f0 [ 19.036474] usb_runtime_suspend+0x3c/0xf8 [ 19.036903] __rpm_callback+0xa0/0x470 [ 19.037294] rpm_callback+0x168/0x1b0 [ 19.037677] rpm_suspend+0x1bc/0xcd8 [ 19.038053] __pm_runtime_suspend+0x5c/0x1e8 [ 19.038491] usb_runtime_idle+0x48/0x68 [ 19.038896] rpm_idle+0x13c/0x708 [ 19.039247] pm_runtime_work+0x110/0x170 [ 19.039653] process_one_work+0x530/0xf98 [ 19.040065] worker_thread+0x8ac/0xf28 [ 19.040453] kthread+0x328/0x630 [ 19.040804] ret_from_fork+0x10/0x20 [ 19.041180] [ 19.041348] The buggy address belongs to the object at ffff000002427ac0 [ 19.041348] which belongs to the cache kmalloc-16 of size 16 [ 19.042498] The buggy address is located 15 bytes to the right of [ 19.042498] allocated 16-byte region [ffff000002427ac0, ffff000002427ad0) [ 19.043707] [ 19.043876] The buggy address belongs to the physical page: [ 19.044412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2427 [ 19.045166] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.045806] page_type: f5(slab) [ 19.046144] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 19.046890] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.047623] page dumped because: kasan: bad access detected [ 19.048158] [ 19.048326] Memory state around the buggy address: [ 19.048796] ffff000002427980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.049488] ffff000002427a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.050181] >ffff000002427a80: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 19.050866] ^ [ 19.051454] ffff000002427b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.052146] ffff000002427b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.052832] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 18.933917] ================================================================== [ 18.934632] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.935300] Write of size 1 at addr ffff00000d788473 by task kunit_try_catch/194 [ 18.935985] [ 18.936151] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G N 6.15.0-rc3 #1 PREEMPT [ 18.936196] Tainted: [N]=TEST [ 18.936208] Hardware name: Radxa ROCK Pi 4B (DT) [ 18.936225] Call trace: [ 18.936236] show_stack+0x20/0x38 (C) [ 18.936269] dump_stack_lvl+0x8c/0xd0 [ 18.936300] print_report+0x118/0x608 [ 18.936329] kasan_report+0xdc/0x128 [ 18.936357] __asan_report_store1_noabort+0x20/0x30 [ 18.936391] kmalloc_oob_right+0x5a4/0x660 [ 18.936424] kunit_try_run_case+0x170/0x3f0 [ 18.936459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.936498] kthread+0x328/0x630 [ 18.936531] ret_from_fork+0x10/0x20 [ 18.936564] [ 18.942047] Allocated by task 194: [ 18.942378] kasan_save_stack+0x3c/0x68 [ 18.942755] kasan_save_track+0x20/0x40 [ 18.943127] kasan_save_alloc_info+0x40/0x58 [ 18.943539] __kasan_kmalloc+0xd4/0xd8 [ 18.943903] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.944344] kmalloc_oob_right+0xb0/0x660 [ 18.944735] kunit_try_run_case+0x170/0x3f0 [ 18.945143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.945667] kthread+0x328/0x630 [ 18.945991] ret_from_fork+0x10/0x20 [ 18.946341] [ 18.946494] The buggy address belongs to the object at ffff00000d788400 [ 18.946494] which belongs to the cache kmalloc-128 of size 128 [ 18.947627] The buggy address is located 0 bytes to the right of [ 18.947627] allocated 115-byte region [ffff00000d788400, ffff00000d788473) [ 18.948800] [ 18.948954] The buggy address belongs to the physical page: [ 18.949469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd788 [ 18.950193] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 18.950804] page_type: f5(slab) [ 18.951118] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 18.951834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.952540] page dumped because: kasan: bad access detected [ 18.953054] [ 18.953206] Memory state around the buggy address: [ 18.953655] ffff00000d788300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.954320] ffff00000d788380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.954985] >ffff00000d788400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.955646] ^ [ 18.956278] ffff00000d788480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.956943] ffff00000d788500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.957604] ================================================================== [ 18.959082] ================================================================== [ 18.959740] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 18.960393] Write of size 1 at addr ffff00000d788478 by task kunit_try_catch/194 [ 18.961070] [ 18.961230] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 18.961271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.961282] Hardware name: Radxa ROCK Pi 4B (DT) [ 18.961297] Call trace: [ 18.961307] show_stack+0x20/0x38 (C) [ 18.961333] dump_stack_lvl+0x8c/0xd0 [ 18.961359] print_report+0x118/0x608 [ 18.961383] kasan_report+0xdc/0x128 [ 18.961407] __asan_report_store1_noabort+0x20/0x30 [ 18.961435] kmalloc_oob_right+0x538/0x660 [ 18.961463] kunit_try_run_case+0x170/0x3f0 [ 18.961493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.961526] kthread+0x328/0x630 [ 18.961554] ret_from_fork+0x10/0x20 [ 18.961582] [ 18.967140] Allocated by task 194: [ 18.967460] kasan_save_stack+0x3c/0x68 [ 18.967826] kasan_save_track+0x20/0x40 [ 18.968191] kasan_save_alloc_info+0x40/0x58 [ 18.968596] __kasan_kmalloc+0xd4/0xd8 [ 18.968951] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.969384] kmalloc_oob_right+0xb0/0x660 [ 18.969768] kunit_try_run_case+0x170/0x3f0 [ 18.970168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.970684] kthread+0x328/0x630 [ 18.970999] ret_from_fork+0x10/0x20 [ 18.971342] [ 18.971491] The buggy address belongs to the object at ffff00000d788400 [ 18.971491] which belongs to the cache kmalloc-128 of size 128 [ 18.972615] The buggy address is located 5 bytes to the right of [ 18.972615] allocated 115-byte region [ffff00000d788400, ffff00000d788473) [ 18.973780] [ 18.973930] The buggy address belongs to the physical page: [ 18.974440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd788 [ 18.975156] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 18.975759] page_type: f5(slab) [ 18.976063] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 18.976771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.977471] page dumped because: kasan: bad access detected [ 18.977980] [ 18.978129] Memory state around the buggy address: [ 18.978572] ffff00000d788300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.979230] ffff00000d788380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.979889] >ffff00000d788400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.980544] ^ [ 18.981192] ffff00000d788480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.981851] ffff00000d788500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.982506] ================================================================== [ 18.983417] ================================================================== [ 18.984085] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 18.984733] Read of size 1 at addr ffff00000d788480 by task kunit_try_catch/194 [ 18.985401] [ 18.985560] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 18.985600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.985612] Hardware name: Radxa ROCK Pi 4B (DT) [ 18.985626] Call trace: [ 18.985636] show_stack+0x20/0x38 (C) [ 18.985662] dump_stack_lvl+0x8c/0xd0 [ 18.985688] print_report+0x118/0x608 [ 18.985713] kasan_report+0xdc/0x128 [ 18.985736] __asan_report_load1_noabort+0x20/0x30 [ 18.985764] kmalloc_oob_right+0x5d0/0x660 [ 18.985792] kunit_try_run_case+0x170/0x3f0 [ 18.985821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.985853] kthread+0x328/0x630 [ 18.985880] ret_from_fork+0x10/0x20 [ 18.985907] [ 18.991455] Allocated by task 194: [ 18.991776] kasan_save_stack+0x3c/0x68 [ 18.992141] kasan_save_track+0x20/0x40 [ 18.992506] kasan_save_alloc_info+0x40/0x58 [ 18.992912] __kasan_kmalloc+0xd4/0xd8 [ 18.993270] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.993703] kmalloc_oob_right+0xb0/0x660 [ 18.994087] kunit_try_run_case+0x170/0x3f0 [ 18.994486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.995001] kthread+0x328/0x630 [ 18.995316] ret_from_fork+0x10/0x20 [ 18.995659] [ 18.995808] The buggy address belongs to the object at ffff00000d788400 [ 18.995808] which belongs to the cache kmalloc-128 of size 128 [ 18.996931] The buggy address is located 13 bytes to the right of [ 18.996931] allocated 115-byte region [ffff00000d788400, ffff00000d788473) [ 18.998103] [ 18.998252] The buggy address belongs to the physical page: [ 18.998763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd788 [ 18.999478] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.000081] page_type: f5(slab) [ 19.000387] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 19.001093] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.001794] page dumped because: kasan: bad access detected [ 19.002303] [ 19.002451] Memory state around the buggy address: [ 19.002894] ffff00000d788380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.003552] ffff00000d788400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.004211] >ffff00000d788480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.004866] ^ [ 19.005171] ffff00000d788500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.005829] ffff00000d788580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.006484] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 65.886531] WARNING: CPU: 3 PID: 714 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 65.887232] Modules linked in: [ 65.887536] CPU: 3 UID: 0 PID: 714 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT [ 65.888436] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 65.888962] Hardware name: Radxa ROCK Pi 4B (DT) [ 65.889384] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 65.890016] pc : intlog10+0x38/0x48 [ 65.890348] lr : intlog10_test+0xe4/0x200 [ 65.890725] sp : ffff80008a1c7c10 [ 65.891031] x29: ffff80008a1c7c90 x28: 0000000000000000 x27: 0000000000000000 [ 65.891700] x26: 1fffe00001d30ee1 x25: 0000000000000000 x24: ffff80008a1c7ce0 [ 65.892368] x23: ffff80008a1c7d00 x22: 0000000000000000 x21: 1ffff00011438f82 [ 65.893035] x20: ffff800083cc3840 x19: ffff800087cd7990 x18: 00000000ff39b097 [ 65.893701] x17: 0000000000000001 x16: ffff0000d1738f60 x15: 000000000acdfed5 [ 65.894369] x14: 0000000089535c53 x13: ffff00000bed0008 x12: ffff700010f61161 [ 65.895037] x11: 1ffff00010f61160 x10: ffff700010f61160 x9 : ffff80008120d60c [ 65.895704] x8 : ffff800087b08b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 65.896372] x5 : ffff700011438f82 x4 : 1ffff00010f9af3a x3 : 1ffff00010798708 [ 65.897039] x2 : 1ffff00010798708 x1 : 0000000000000003 x0 : 0000000000000000 [ 65.897705] Call trace: [ 65.897938] intlog10+0x38/0x48 (P) [ 65.898272] kunit_try_run_case+0x170/0x3f0 [ 65.898671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.899183] kthread+0x328/0x630 [ 65.899499] ret_from_fork+0x10/0x20 [ 65.899844] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 65.847863] WARNING: CPU: 0 PID: 696 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 65.848562] Modules linked in: [ 65.848879] CPU: 0 UID: 0 PID: 696 Comm: kunit_try_catch Tainted: G B D N 6.15.0-rc3 #1 PREEMPT [ 65.849793] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.850252] Hardware name: Radxa ROCK Pi 4B (DT) [ 65.850683] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 65.851328] pc : intlog2+0xd8/0xf8 [ 65.851665] lr : intlog2_test+0xe4/0x200 [ 65.852047] sp : ffff80008a1c7c10 [ 65.852362] x29: ffff80008a1c7c90 x28: 0000000000000000 x27: 0000000000000000 [ 65.853051] x26: 1fffe00001932141 x25: 0000000000000000 x24: ffff80008a1c7ce0 [ 65.853736] x23: ffff80008a1c7d00 x22: 0000000000000000 x21: 1ffff00011438f82 [ 65.854423] x20: ffff800083cc3740 x19: ffff800087cd7990 x18: 0000000031be129e [ 65.855113] x17: 0000000000000001 x16: ffff0000d16d2f60 x15: ffff000000d98420 [ 65.855800] x14: 00000000000c8000 x13: ffff800085ba7700 x12: ffff700010f61161 [ 65.856488] x11: 1ffff00010f61160 x10: ffff700010f61160 x9 : ffff80008120d80c [ 65.857175] x8 : ffff800087b08b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 65.857862] x5 : ffff700011438f82 x4 : 1ffff00010f9af3a x3 : 1ffff000107986e8 [ 65.858549] x2 : 1ffff000107986e8 x1 : 0000000000000003 x0 : 0000000000000000 [ 65.859235] Call trace: [ 65.859475] intlog2+0xd8/0xf8 (P) [ 65.859817] kunit_try_run_case+0x170/0x3f0 [ 65.860229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.860756] kthread+0x328/0x630 [ 65.861087] ret_from_fork+0x10/0x20 [ 65.861445] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/uboot-action
(no logs available)
Failure - lava/uboot-commands
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot/internal-error-oops-oops-smp
KNOWN ISSUE - qemu-arm64: Internal error: Oops at kunit_test_null_dereference - kunit_generic_run_threadfn_adapter
[ 65.390735] Internal error: Oops: 0000000096000005 [#1] SMP [ 65.391250] Modules linked in: [ 65.391551] CPU: 4 UID: 0 PID: 590 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 65.392450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.392833] Hardware name: Radxa ROCK Pi 4B (DT) [ 65.393253] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 65.393884] pc : kunit_test_null_dereference+0x70/0x170 [ 65.394373] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.394913] sp : ffff80008a287d30 [ 65.395219] x29: ffff80008a287d90 x28: 0000000000000000 x27: 0000000000000000 [ 65.395886] x26: 1fffe000003645c1 x25: 0000000000000000 x24: 0000000000000004 [ 65.396550] x23: ffff000001b22e0c x22: ffff8000811fabe8 x21: ffff0000022e2588 [ 65.397215] x20: 1ffff00011450fa6 x19: ffff800087cd7990 x18: 0000000014195029 [ 65.397878] x17: 000000040044ffff x16: 00500074b5503510 x15: 0000000000000000 [ 65.398541] x14: ffff000000f0d100 x13: ffff80004bbb1000 x12: ffff60000175c8b4 [ 65.399204] x11: 1fffe0000175c8b3 x10: ffff60000175c8b3 x9 : ffff8000811f2050 [ 65.399865] x8 : ffff80008a287c38 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 65.400528] x5 : ffff700011450fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 65.401190] x2 : dfff800000000000 x1 : ffff00000bae3cc0 x0 : ffff800087cd7990 [ 65.401853] Call trace: [ 65.402085] kunit_test_null_dereference+0x70/0x170 (P) [ 65.402571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.403081] kthread+0x328/0x630 [ 65.403396] ret_from_fork+0x10/0x20 [ 65.403745] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 65.404293] ---[ end trace 0000000000000000 ]---