Date
June 8, 2025, 11:09 p.m.
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 38.175154] ================================================================== [ 38.185784] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 38.192900] Free of addr ffff000800e14000 by task kunit_try_catch/286 [ 38.199322] [ 38.200809] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 38.200867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.200883] Hardware name: WinLink E850-96 board (DT) [ 38.200904] Call trace: [ 38.200919] show_stack+0x20/0x38 (C) [ 38.200956] dump_stack_lvl+0x8c/0xd0 [ 38.200993] print_report+0x118/0x608 [ 38.201030] kasan_report_invalid_free+0xc0/0xe8 [ 38.201068] __kasan_mempool_poison_pages+0xe0/0xe8 [ 38.201107] mempool_free+0x24c/0x328 [ 38.201139] mempool_double_free_helper+0x150/0x2e8 [ 38.201172] mempool_page_alloc_double_free+0xbc/0x118 [ 38.201209] kunit_try_run_case+0x170/0x3f0 [ 38.201250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.201287] kthread+0x328/0x630 [ 38.201316] ret_from_fork+0x10/0x20 [ 38.201353] [ 38.274235] The buggy address belongs to the physical page: [ 38.279794] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e14 [ 38.287777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.294298] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.302017] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.309739] page dumped because: kasan: bad access detected [ 38.315291] [ 38.316767] Memory state around the buggy address: [ 38.321549] ffff000800e13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.328750] ffff000800e13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.335956] >ffff000800e14000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.343156] ^ [ 38.346371] ffff000800e14080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.353576] ffff000800e14100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.360778] ================================================================== [ 37.937870] ================================================================== [ 37.947941] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 37.955057] Free of addr ffff000806390000 by task kunit_try_catch/284 [ 37.961479] [ 37.962965] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 37.963021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.963038] Hardware name: WinLink E850-96 board (DT) [ 37.963062] Call trace: [ 37.963075] show_stack+0x20/0x38 (C) [ 37.963111] dump_stack_lvl+0x8c/0xd0 [ 37.963146] print_report+0x118/0x608 [ 37.963185] kasan_report_invalid_free+0xc0/0xe8 [ 37.963222] __kasan_mempool_poison_object+0x14c/0x150 [ 37.963259] mempool_free+0x28c/0x328 [ 37.963291] mempool_double_free_helper+0x150/0x2e8 [ 37.963324] mempool_kmalloc_large_double_free+0xc0/0x118 [ 37.963359] kunit_try_run_case+0x170/0x3f0 [ 37.963394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.963432] kthread+0x328/0x630 [ 37.963460] ret_from_fork+0x10/0x20 [ 37.963492] [ 38.036913] The buggy address belongs to the physical page: [ 38.042470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886390 [ 38.050455] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.058093] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.065035] page_type: f8(unknown) [ 38.068434] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.076153] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.083880] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.091690] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.099504] head: 0bfffe0000000002 fffffdffe018e401 00000000ffffffff 00000000ffffffff [ 38.107315] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.115121] page dumped because: kasan: bad access detected [ 38.120676] [ 38.122152] Memory state around the buggy address: [ 38.126937] ffff00080638ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.134135] ffff00080638ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.141341] >ffff000806390000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.148540] ^ [ 38.151756] ffff000806390080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.158961] ffff000806390100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.166163] ================================================================== [ 37.564296] ================================================================== [ 37.573900] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 37.581016] Free of addr ffff000802ca6800 by task kunit_try_catch/282 [ 37.587439] [ 37.588925] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 37.588983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.589002] Hardware name: WinLink E850-96 board (DT) [ 37.589023] Call trace: [ 37.589039] show_stack+0x20/0x38 (C) [ 37.589079] dump_stack_lvl+0x8c/0xd0 [ 37.589116] print_report+0x118/0x608 [ 37.589154] kasan_report_invalid_free+0xc0/0xe8 [ 37.589193] check_slab_allocation+0xd4/0x108 [ 37.589229] __kasan_mempool_poison_object+0x78/0x150 [ 37.589266] mempool_free+0x28c/0x328 [ 37.589297] mempool_double_free_helper+0x150/0x2e8 [ 37.589333] mempool_kmalloc_double_free+0xc0/0x118 [ 37.589367] kunit_try_run_case+0x170/0x3f0 [ 37.589406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.589444] kthread+0x328/0x630 [ 37.589473] ret_from_fork+0x10/0x20 [ 37.589506] [ 37.666605] Allocated by task 282: [ 37.669992] kasan_save_stack+0x3c/0x68 [ 37.673808] kasan_save_track+0x20/0x40 [ 37.677628] kasan_save_alloc_info+0x40/0x58 [ 37.681881] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.687177] remove_element+0x130/0x1f8 [ 37.690995] mempool_alloc_preallocated+0x58/0xc0 [ 37.695682] mempool_double_free_helper+0x94/0x2e8 [ 37.700457] mempool_kmalloc_double_free+0xc0/0x118 [ 37.705318] kunit_try_run_case+0x170/0x3f0 [ 37.709485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.714953] kthread+0x328/0x630 [ 37.718165] ret_from_fork+0x10/0x20 [ 37.721724] [ 37.723201] Freed by task 282: [ 37.726237] kasan_save_stack+0x3c/0x68 [ 37.730057] kasan_save_track+0x20/0x40 [ 37.733876] kasan_save_free_info+0x4c/0x78 [ 37.738043] __kasan_mempool_poison_object+0xc0/0x150 [ 37.743079] mempool_free+0x28c/0x328 [ 37.746724] mempool_double_free_helper+0x100/0x2e8 [ 37.751585] mempool_kmalloc_double_free+0xc0/0x118 [ 37.756445] kunit_try_run_case+0x170/0x3f0 [ 37.760612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.766081] kthread+0x328/0x630 [ 37.769293] ret_from_fork+0x10/0x20 [ 37.772852] [ 37.774329] The buggy address belongs to the object at ffff000802ca6800 [ 37.774329] which belongs to the cache kmalloc-128 of size 128 [ 37.786830] The buggy address is located 0 bytes inside of [ 37.786830] 128-byte region [ffff000802ca6800, ffff000802ca6880) [ 37.798372] [ 37.799852] The buggy address belongs to the physical page: [ 37.805408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882ca6 [ 37.813392] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.821031] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.827974] page_type: f5(slab) [ 37.831112] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.838830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.846558] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.854367] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.862181] head: 0bfffe0000000001 fffffdffe00b2981 00000000ffffffff 00000000ffffffff [ 37.869992] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.877798] page dumped because: kasan: bad access detected [ 37.883353] [ 37.884829] Memory state around the buggy address: [ 37.889611] ffff000802ca6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.896813] ffff000802ca6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.904018] >ffff000802ca6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.911218] ^ [ 37.914433] ffff000802ca6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.921638] ffff000802ca6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.928840] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-smp
[ 163.861987] Internal error: Oops: 0000000096000005 [#1] SMP [ 163.867593] Modules linked in: [ 163.870638] CPU: 4 UID: 0 PID: 627 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 163.880529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 163.884690] Hardware name: WinLink E850-96 board (DT) [ 163.889726] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 163.896667] pc : kunit_test_null_dereference+0x70/0x170 [ 163.901874] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 163.907690] sp : ffff80008a8d7d30 [ 163.910988] x29: ffff80008a8d7d90 x28: 0000000000000000 x27: 0000000000000000 [ 163.918106] x26: 1fffe001002ee8a1 x25: 0000000000000000 x24: 0000000000000004 [ 163.925224] x23: ffff00080177450c x22: ffff8000812578b8 x21: ffff000808427588 [ 163.932342] x20: 1ffff0001151afa6 x19: ffff800087d67990 x18: ffff800087d67b00 [ 163.939459] x17: 0000000000000001 x16: ffff00085af9cd28 x15: ffff80008124b61c [ 163.946578] x14: ffff8000808ed1d4 x13: 1fffe0010b5f3989 x12: ffff6001002c7b3c [ 163.953696] x11: 1fffe001002c7b3b x10: ffff6001002c7b3b x9 : ffff80008124ed20 [ 163.960814] x8 : ffff80008a8d7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 163.967932] x5 : ffff70001151afa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 163.975050] x2 : dfff800000000000 x1 : ffff00080163d100 x0 : ffff800087d67990 [ 163.982171] Call trace: [ 163.984602] kunit_test_null_dereference+0x70/0x170 (P) [ 163.989808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 163.995275] kthread+0x328/0x630 [ 163.998487] ret_from_fork+0x10/0x20 [ 164.002061] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 164.008127] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 101.043712] ================================================================== [ 101.043851] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 101.043851] [ 101.043993] Use-after-free read at 0x(____ptrval____) (in kfence-#203): [ 101.044104] test_krealloc+0x51c/0x830 [ 101.047250] kunit_try_run_case+0x170/0x3f0 [ 101.051417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 101.056885] kthread+0x328/0x630 [ 101.060097] ret_from_fork+0x10/0x20 [ 101.063656] [ 101.065134] kfence-#203: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 101.065134] [ 101.074773] allocated by task 384 on cpu 0 at 101.043620s (0.031149s ago): [ 101.081644] test_alloc+0x29c/0x628 [ 101.085098] test_krealloc+0xc0/0x830 [ 101.088743] kunit_try_run_case+0x170/0x3f0 [ 101.092909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 101.098378] kthread+0x328/0x630 [ 101.101590] ret_from_fork+0x10/0x20 [ 101.105150] [ 101.106626] freed by task 384 on cpu 0 at 101.043649s (0.062975s ago): [ 101.113150] krealloc_noprof+0x148/0x360 [ 101.117041] test_krealloc+0x1dc/0x830 [ 101.120773] kunit_try_run_case+0x170/0x3f0 [ 101.124940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 101.130409] kthread+0x328/0x630 [ 101.133620] ret_from_fork+0x10/0x20 [ 101.137181] [ 101.138666] CPU: 0 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 101.148565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 101.152720] Hardware name: WinLink E850-96 board (DT) [ 101.157755] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 100.819506] ================================================================== [ 100.819654] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 100.819654] [ 100.819821] Use-after-free read at 0x(____ptrval____) (in kfence-#201): [ 100.820707] test_memcache_typesafe_by_rcu+0x280/0x560 [ 100.825829] kunit_try_run_case+0x170/0x3f0 [ 100.829995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 100.835464] kthread+0x328/0x630 [ 100.838676] ret_from_fork+0x10/0x20 [ 100.842235] [ 100.843714] kfence-#201: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 100.843714] [ 100.852831] allocated by task 382 on cpu 1 at 100.783688s (0.069139s ago): [ 100.859702] test_alloc+0x230/0x628 [ 100.863156] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 100.868276] kunit_try_run_case+0x170/0x3f0 [ 100.872443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 100.877911] kthread+0x328/0x630 [ 100.881123] ret_from_fork+0x10/0x20 [ 100.884684] [ 100.886162] freed by task 382 on cpu 1 at 100.783702s (0.102455s ago): [ 100.892681] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 100.897789] kunit_try_run_case+0x170/0x3f0 [ 100.901956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 100.907425] kthread+0x328/0x630 [ 100.910637] ret_from_fork+0x10/0x20 [ 100.914197] [ 100.915683] CPU: 1 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 100.925580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 100.929735] Hardware name: WinLink E850-96 board (DT) [ 100.934773] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 77.291050] ================================================================== [ 77.291245] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 77.291245] [ 77.291405] Invalid read at 0x(____ptrval____): [ 77.292563] test_invalid_access+0xdc/0x1f0 [ 77.296704] kunit_try_run_case+0x170/0x3f0 [ 77.300885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.306338] kthread+0x328/0x630 [ 77.309551] ret_from_fork+0x10/0x20 [ 77.313107] [ 77.314568] CPU: 7 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 77.324495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.328649] Hardware name: WinLink E850-96 board (DT) [ 77.333690] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 76.943680] ================================================================== [ 76.943822] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 76.943822] [ 76.943969] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#196): [ 76.947655] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 76.952862] kunit_try_run_case+0x170/0x3f0 [ 76.957028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.962497] kthread+0x328/0x630 [ 76.965709] ret_from_fork+0x10/0x20 [ 76.969267] [ 76.970746] kfence-#196: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 76.970746] [ 76.980382] allocated by task 372 on cpu 0 at 76.943604s (0.036776s ago): [ 76.987166] test_alloc+0x29c/0x628 [ 76.990621] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 76.995743] kunit_try_run_case+0x170/0x3f0 [ 76.999909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.005378] kthread+0x328/0x630 [ 77.008590] ret_from_fork+0x10/0x20 [ 77.012149] [ 77.013627] freed by task 372 on cpu 0 at 76.943621s (0.070002s ago): [ 77.020065] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 77.025256] kunit_try_run_case+0x170/0x3f0 [ 77.029423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.034891] kthread+0x328/0x630 [ 77.038103] ret_from_fork+0x10/0x20 [ 77.041664] [ 77.043149] CPU: 0 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 77.053046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.057203] Hardware name: WinLink E850-96 board (DT) [ 77.062238] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 76.319666] ================================================================== [ 76.319806] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 76.319806] [ 76.319970] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#190): [ 76.321642] test_kmalloc_aligned_oob_read+0x238/0x468 [ 76.326762] kunit_try_run_case+0x170/0x3f0 [ 76.330929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.336397] kthread+0x328/0x630 [ 76.339609] ret_from_fork+0x10/0x20 [ 76.343168] [ 76.344646] kfence-#190: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 76.344646] [ 76.354282] allocated by task 370 on cpu 4 at 76.319628s (0.034652s ago): [ 76.361068] test_alloc+0x29c/0x628 [ 76.364522] test_kmalloc_aligned_oob_read+0x100/0x468 [ 76.369644] kunit_try_run_case+0x170/0x3f0 [ 76.373810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.379279] kthread+0x328/0x630 [ 76.382490] ret_from_fork+0x10/0x20 [ 76.386051] [ 76.387536] CPU: 4 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 76.397429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.401590] Hardware name: WinLink E850-96 board (DT) [ 76.406626] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 71.091675] ================================================================== [ 71.091817] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 71.091817] [ 71.091950] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#140): [ 71.094347] test_corruption+0x120/0x378 [ 71.098253] kunit_try_run_case+0x170/0x3f0 [ 71.102419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.107888] kthread+0x328/0x630 [ 71.111100] ret_from_fork+0x10/0x20 [ 71.114659] [ 71.116138] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 71.116138] [ 71.125252] allocated by task 360 on cpu 0 at 71.091600s (0.033650s ago): [ 71.132034] test_alloc+0x230/0x628 [ 71.135492] test_corruption+0xdc/0x378 [ 71.139311] kunit_try_run_case+0x170/0x3f0 [ 71.143478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.148947] kthread+0x328/0x630 [ 71.152158] ret_from_fork+0x10/0x20 [ 71.155718] [ 71.157194] freed by task 360 on cpu 0 at 71.091616s (0.065575s ago): [ 71.163632] test_corruption+0x120/0x378 [ 71.167522] kunit_try_run_case+0x170/0x3f0 [ 71.171689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.177158] kthread+0x328/0x630 [ 71.180369] ret_from_fork+0x10/0x20 [ 71.183930] [ 71.185416] CPU: 0 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 71.195312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.199468] Hardware name: WinLink E850-96 board (DT) [ 71.204504] ================================================================== [ 70.543666] ================================================================== [ 70.543800] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 70.543800] [ 70.543935] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#135): [ 70.546331] test_corruption+0x278/0x378 [ 70.550236] kunit_try_run_case+0x170/0x3f0 [ 70.554403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.559872] kthread+0x328/0x630 [ 70.563083] ret_from_fork+0x10/0x20 [ 70.566642] [ 70.568121] kfence-#135: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 70.568121] [ 70.577755] allocated by task 358 on cpu 7 at 70.543596s (0.034157s ago): [ 70.584538] test_alloc+0x29c/0x628 [ 70.587996] test_corruption+0xdc/0x378 [ 70.591816] kunit_try_run_case+0x170/0x3f0 [ 70.595983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.601451] kthread+0x328/0x630 [ 70.604662] ret_from_fork+0x10/0x20 [ 70.608223] [ 70.609699] freed by task 358 on cpu 7 at 70.543611s (0.066087s ago): [ 70.616138] test_corruption+0x278/0x378 [ 70.620027] kunit_try_run_case+0x170/0x3f0 [ 70.624193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.629662] kthread+0x328/0x630 [ 70.632874] ret_from_fork+0x10/0x20 [ 70.636434] [ 70.637921] CPU: 7 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 70.647816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.651974] Hardware name: WinLink E850-96 board (DT) [ 70.657009] ================================================================== [ 71.315705] ================================================================== [ 71.315842] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 71.315842] [ 71.315974] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#142): [ 71.316133] test_corruption+0x1d8/0x378 [ 71.319674] kunit_try_run_case+0x170/0x3f0 [ 71.323840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.329309] kthread+0x328/0x630 [ 71.332521] ret_from_fork+0x10/0x20 [ 71.336080] [ 71.337558] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 71.337558] [ 71.346674] allocated by task 360 on cpu 0 at 71.315631s (0.031040s ago): [ 71.353454] test_alloc+0x230/0x628 [ 71.356913] test_corruption+0x198/0x378 [ 71.360819] kunit_try_run_case+0x170/0x3f0 [ 71.364986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.370455] kthread+0x328/0x630 [ 71.373667] ret_from_fork+0x10/0x20 [ 71.377227] [ 71.378703] freed by task 360 on cpu 0 at 71.315646s (0.063054s ago): [ 71.385140] test_corruption+0x1d8/0x378 [ 71.389031] kunit_try_run_case+0x170/0x3f0 [ 71.393197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.398666] kthread+0x328/0x630 [ 71.401878] ret_from_fork+0x10/0x20 [ 71.405438] [ 71.406924] CPU: 0 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 71.416818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.420976] Hardware name: WinLink E850-96 board (DT) [ 71.426013] ================================================================== [ 70.767665] ================================================================== [ 70.767787] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 70.767787] [ 70.767917] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#137): [ 70.768073] test_corruption+0x284/0x378 [ 70.771620] kunit_try_run_case+0x170/0x3f0 [ 70.775787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.781256] kthread+0x328/0x630 [ 70.784467] ret_from_fork+0x10/0x20 [ 70.788026] [ 70.789505] kfence-#137: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 70.789505] [ 70.799139] allocated by task 358 on cpu 7 at 70.767603s (0.031534s ago): [ 70.805923] test_alloc+0x29c/0x628 [ 70.809382] test_corruption+0x198/0x378 [ 70.813286] kunit_try_run_case+0x170/0x3f0 [ 70.817453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.822922] kthread+0x328/0x630 [ 70.826133] ret_from_fork+0x10/0x20 [ 70.829694] [ 70.831172] freed by task 358 on cpu 7 at 70.767619s (0.063549s ago): [ 70.837605] test_corruption+0x284/0x378 [ 70.841498] kunit_try_run_case+0x170/0x3f0 [ 70.845664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.851133] kthread+0x328/0x630 [ 70.854345] ret_from_fork+0x10/0x20 [ 70.857904] [ 70.859390] CPU: 7 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 70.869283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.873443] Hardware name: WinLink E850-96 board (DT) [ 70.878479] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 69.919687] ================================================================== [ 69.919830] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 69.919830] [ 69.919962] Invalid free of 0x(____ptrval____) (in kfence-#129): [ 69.920066] test_invalid_addr_free+0x1ac/0x238 [ 69.923573] kunit_try_run_case+0x170/0x3f0 [ 69.927740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.933208] kthread+0x328/0x630 [ 69.936420] ret_from_fork+0x10/0x20 [ 69.939979] [ 69.941458] kfence-#129: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 69.941458] [ 69.951096] allocated by task 354 on cpu 0 at 69.919631s (0.031460s ago): [ 69.957876] test_alloc+0x29c/0x628 [ 69.961333] test_invalid_addr_free+0xd4/0x238 [ 69.965760] kunit_try_run_case+0x170/0x3f0 [ 69.969926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.975395] kthread+0x328/0x630 [ 69.978607] ret_from_fork+0x10/0x20 [ 69.982168] [ 69.983652] CPU: 0 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 69.993550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.997705] Hardware name: WinLink E850-96 board (DT) [ 70.002742] ================================================================== [ 70.127662] ================================================================== [ 70.127796] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 70.127796] [ 70.127936] Invalid free of 0x(____ptrval____) (in kfence-#131): [ 70.128036] test_invalid_addr_free+0xec/0x238 [ 70.131367] kunit_try_run_case+0x170/0x3f0 [ 70.135534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.141002] kthread+0x328/0x630 [ 70.144214] ret_from_fork+0x10/0x20 [ 70.147774] [ 70.149252] kfence-#131: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 70.149252] [ 70.158365] allocated by task 356 on cpu 1 at 70.127606s (0.030757s ago): [ 70.165150] test_alloc+0x230/0x628 [ 70.168606] test_invalid_addr_free+0xd4/0x238 [ 70.173033] kunit_try_run_case+0x170/0x3f0 [ 70.177200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.182668] kthread+0x328/0x630 [ 70.185880] ret_from_fork+0x10/0x20 [ 70.189441] [ 70.190926] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 70.200824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.204978] Hardware name: WinLink E850-96 board (DT) [ 70.210016] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 69.479698] ================================================================== [ 69.479827] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 69.479827] [ 69.479957] Invalid free of 0x(____ptrval____) (in kfence-#125): [ 69.480057] test_double_free+0x1bc/0x238 [ 69.482531] kunit_try_run_case+0x170/0x3f0 [ 69.486697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.492166] kthread+0x328/0x630 [ 69.495378] ret_from_fork+0x10/0x20 [ 69.498937] [ 69.500417] kfence-#125: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 69.500417] [ 69.510051] allocated by task 350 on cpu 7 at 69.479620s (0.030429s ago): [ 69.516837] test_alloc+0x29c/0x628 [ 69.520290] test_double_free+0xd4/0x238 [ 69.524197] kunit_try_run_case+0x170/0x3f0 [ 69.528364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.533832] kthread+0x328/0x630 [ 69.537046] ret_from_fork+0x10/0x20 [ 69.540605] [ 69.542081] freed by task 350 on cpu 7 at 69.479637s (0.062442s ago): [ 69.548519] test_double_free+0x1ac/0x238 [ 69.552496] kunit_try_run_case+0x170/0x3f0 [ 69.556662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.562131] kthread+0x328/0x630 [ 69.565342] ret_from_fork+0x10/0x20 [ 69.568903] [ 69.570388] CPU: 7 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 69.580285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.584442] Hardware name: WinLink E850-96 board (DT) [ 69.589478] ================================================================== [ 69.699697] ================================================================== [ 69.699835] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 69.699835] [ 69.699962] Invalid free of 0x(____ptrval____) (in kfence-#127): [ 69.700065] test_double_free+0x100/0x238 [ 69.702538] kunit_try_run_case+0x170/0x3f0 [ 69.706705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.712174] kthread+0x328/0x630 [ 69.715386] ret_from_fork+0x10/0x20 [ 69.718944] [ 69.720424] kfence-#127: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 69.720424] [ 69.729538] allocated by task 352 on cpu 0 at 69.699616s (0.029920s ago): [ 69.736319] test_alloc+0x230/0x628 [ 69.739777] test_double_free+0xd4/0x238 [ 69.743684] kunit_try_run_case+0x170/0x3f0 [ 69.747852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.753319] kthread+0x328/0x630 [ 69.756531] ret_from_fork+0x10/0x20 [ 69.760091] [ 69.761568] freed by task 352 on cpu 0 at 69.699632s (0.061931s ago): [ 69.768006] test_double_free+0xf0/0x238 [ 69.771895] kunit_try_run_case+0x170/0x3f0 [ 69.776062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.781530] kthread+0x328/0x630 [ 69.784742] ret_from_fork+0x10/0x20 [ 69.788303] [ 69.789788] CPU: 0 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 69.799685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.803840] Hardware name: WinLink E850-96 board (DT) [ 69.808878] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 68.823656] ================================================================== [ 68.823793] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 68.823793] [ 68.823953] Use-after-free read at 0x(____ptrval____) (in kfence-#119): [ 68.824415] test_use_after_free_read+0x114/0x248 [ 68.829103] kunit_try_run_case+0x170/0x3f0 [ 68.833269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.838738] kthread+0x328/0x630 [ 68.841950] ret_from_fork+0x10/0x20 [ 68.845509] [ 68.846986] kfence-#119: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 68.846986] [ 68.856626] allocated by task 342 on cpu 1 at 68.823603s (0.033018s ago): [ 68.863408] test_alloc+0x29c/0x628 [ 68.866863] test_use_after_free_read+0xd0/0x248 [ 68.871463] kunit_try_run_case+0x170/0x3f0 [ 68.875631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.881098] kthread+0x328/0x630 [ 68.884310] ret_from_fork+0x10/0x20 [ 68.887871] [ 68.889351] freed by task 342 on cpu 1 at 68.823618s (0.065728s ago): [ 68.895788] test_use_after_free_read+0x1c0/0x248 [ 68.900456] kunit_try_run_case+0x170/0x3f0 [ 68.904623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.910091] kthread+0x328/0x630 [ 68.913303] ret_from_fork+0x10/0x20 [ 68.916863] [ 68.918348] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 68.928247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.932401] Hardware name: WinLink E850-96 board (DT) [ 68.937438] ================================================================== [ 69.047663] ================================================================== [ 69.047785] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 69.047785] [ 69.047942] Use-after-free read at 0x(____ptrval____) (in kfence-#121): [ 69.048409] test_use_after_free_read+0x114/0x248 [ 69.053097] kunit_try_run_case+0x170/0x3f0 [ 69.057263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.062732] kthread+0x328/0x630 [ 69.065944] ret_from_fork+0x10/0x20 [ 69.069503] [ 69.070982] kfence-#121: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 69.070982] [ 69.080095] allocated by task 344 on cpu 7 at 69.047609s (0.032484s ago): [ 69.086882] test_alloc+0x230/0x628 [ 69.090337] test_use_after_free_read+0xd0/0x248 [ 69.094936] kunit_try_run_case+0x170/0x3f0 [ 69.099103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.104572] kthread+0x328/0x630 [ 69.107784] ret_from_fork+0x10/0x20 [ 69.111344] [ 69.112822] freed by task 344 on cpu 7 at 69.047624s (0.065194s ago): [ 69.119262] test_use_after_free_read+0xf0/0x248 [ 69.123842] kunit_try_run_case+0x170/0x3f0 [ 69.128009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.133477] kthread+0x328/0x630 [ 69.136689] ret_from_fork+0x10/0x20 [ 69.140250] [ 69.141734] CPU: 7 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 69.151633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.155787] Hardware name: WinLink E850-96 board (DT) [ 69.160824] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 68.407632] ================================================================== [ 68.407764] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 68.407764] [ 68.407920] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#115): [ 68.409081] test_out_of_bounds_write+0x100/0x240 [ 68.413768] kunit_try_run_case+0x170/0x3f0 [ 68.417934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.423403] kthread+0x328/0x630 [ 68.426615] ret_from_fork+0x10/0x20 [ 68.430173] [ 68.431653] kfence-#115: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 68.431653] [ 68.441288] allocated by task 338 on cpu 7 at 68.407597s (0.033689s ago): [ 68.448074] test_alloc+0x29c/0x628 [ 68.451527] test_out_of_bounds_write+0xc8/0x240 [ 68.456128] kunit_try_run_case+0x170/0x3f0 [ 68.460295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.465764] kthread+0x328/0x630 [ 68.468975] ret_from_fork+0x10/0x20 [ 68.472536] [ 68.474021] CPU: 7 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 68.483919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.488074] Hardware name: WinLink E850-96 board (DT) [ 68.493111] ================================================================== [ 68.615629] ================================================================== [ 68.615762] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 68.615762] [ 68.615916] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#117): [ 68.617078] test_out_of_bounds_write+0x100/0x240 [ 68.621764] kunit_try_run_case+0x170/0x3f0 [ 68.625931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.631399] kthread+0x328/0x630 [ 68.634611] ret_from_fork+0x10/0x20 [ 68.638170] [ 68.639649] kfence-#117: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 68.639649] [ 68.648763] allocated by task 340 on cpu 1 at 68.615595s (0.033166s ago): [ 68.655549] test_alloc+0x230/0x628 [ 68.659003] test_out_of_bounds_write+0xc8/0x240 [ 68.663603] kunit_try_run_case+0x170/0x3f0 [ 68.667770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.673239] kthread+0x328/0x630 [ 68.676452] ret_from_fork+0x10/0x20 [ 68.680011] [ 68.681495] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 68.691392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.695549] Hardware name: WinLink E850-96 board (DT) [ 68.700586] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 67.887650] ================================================================== [ 67.887794] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 67.887794] [ 67.887953] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#110): [ 67.888851] test_out_of_bounds_read+0x114/0x3e0 [ 67.893450] kunit_try_run_case+0x170/0x3f0 [ 67.897617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.903085] kthread+0x328/0x630 [ 67.906297] ret_from_fork+0x10/0x20 [ 67.909856] [ 67.911335] kfence-#110: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 67.911335] [ 67.920450] allocated by task 336 on cpu 0 at 67.887614s (0.032833s ago): [ 67.927237] test_alloc+0x230/0x628 [ 67.930689] test_out_of_bounds_read+0xdc/0x3e0 [ 67.935203] kunit_try_run_case+0x170/0x3f0 [ 67.939370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.944838] kthread+0x328/0x630 [ 67.948050] ret_from_fork+0x10/0x20 [ 67.951610] [ 67.953096] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 67.962993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.967148] Hardware name: WinLink E850-96 board (DT) [ 67.972185] ================================================================== [ 67.575681] ================================================================== [ 67.575804] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 67.575804] [ 67.575962] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#107): [ 67.577036] test_out_of_bounds_read+0x1c8/0x3e0 [ 67.581634] kunit_try_run_case+0x170/0x3f0 [ 67.585801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.591269] kthread+0x328/0x630 [ 67.594482] ret_from_fork+0x10/0x20 [ 67.598041] [ 67.599520] kfence-#107: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.599520] [ 67.609155] allocated by task 334 on cpu 7 at 67.575648s (0.033505s ago): [ 67.615940] test_alloc+0x29c/0x628 [ 67.619394] test_out_of_bounds_read+0x198/0x3e0 [ 67.623995] kunit_try_run_case+0x170/0x3f0 [ 67.628162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.633630] kthread+0x328/0x630 [ 67.636842] ret_from_fork+0x10/0x20 [ 67.640401] [ 67.641888] CPU: 7 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 67.651786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.655940] Hardware name: WinLink E850-96 board (DT) [ 67.660978] ================================================================== [ 67.263642] ================================================================== [ 67.263768] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 67.263768] [ 67.263922] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#104): [ 67.264827] test_out_of_bounds_read+0x114/0x3e0 [ 67.269426] kunit_try_run_case+0x170/0x3f0 [ 67.273593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.279061] kthread+0x328/0x630 [ 67.282273] ret_from_fork+0x10/0x20 [ 67.285832] [ 67.287311] kfence-#104: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.287311] [ 67.296949] allocated by task 334 on cpu 7 at 67.263604s (0.033340s ago): [ 67.303733] test_alloc+0x29c/0x628 [ 67.307186] test_out_of_bounds_read+0xdc/0x3e0 [ 67.311700] kunit_try_run_case+0x170/0x3f0 [ 67.315866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.321335] kthread+0x328/0x630 [ 67.324547] ret_from_fork+0x10/0x20 [ 67.328107] [ 67.329592] CPU: 7 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 67.339490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.343646] Hardware name: WinLink E850-96 board (DT) [ 67.348682] ================================================================== [ 68.095636] ================================================================== [ 68.095758] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 68.095758] [ 68.095909] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#112): [ 68.096990] test_out_of_bounds_read+0x1c8/0x3e0 [ 68.101589] kunit_try_run_case+0x170/0x3f0 [ 68.105756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.111225] kthread+0x328/0x630 [ 68.114436] ret_from_fork+0x10/0x20 [ 68.117995] [ 68.119474] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 68.119474] [ 68.128591] allocated by task 336 on cpu 0 at 68.095604s (0.032983s ago): [ 68.135374] test_alloc+0x230/0x628 [ 68.138828] test_out_of_bounds_read+0x198/0x3e0 [ 68.143431] kunit_try_run_case+0x170/0x3f0 [ 68.147596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.153064] kthread+0x328/0x630 [ 68.156276] ret_from_fork+0x10/0x20 [ 68.159835] [ 68.161321] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 68.171214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.175374] Hardware name: WinLink E850-96 board (DT) [ 68.180411] ==================================================================
Failure - lava - job
(no logs available)
Failure - lava - fastboot-boot
(no logs available)
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 20.700290] ================================================================== [ 20.723231] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 20.723231] [ 20.732777] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#38): [ 20.742153] kmalloc_track_caller_oob_right+0x224/0x488 [ 20.747360] kunit_try_run_case+0x170/0x3f0 [ 20.751527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.756996] kthread+0x328/0x630 [ 20.760207] ret_from_fork+0x10/0x20 [ 20.763766] [ 20.765245] kfence-#38: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 20.765245] [ 20.774970] allocated by task 189 on cpu 5 at 20.699953s (0.075012s ago): [ 20.781752] kmalloc_track_caller_oob_right+0x184/0x488 [ 20.786943] kunit_try_run_case+0x170/0x3f0 [ 20.791109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.796578] kthread+0x328/0x630 [ 20.799792] ret_from_fork+0x10/0x20 [ 20.803351] [ 20.804827] freed by task 189 on cpu 5 at 20.700253s (0.104571s ago): [ 20.811267] kmalloc_track_caller_oob_right+0x224/0x488 [ 20.816457] kunit_try_run_case+0x170/0x3f0 [ 20.820623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.826092] kthread+0x328/0x630 [ 20.829303] ret_from_fork+0x10/0x20 [ 20.832864] [ 20.834347] CPU: 5 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.844243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.848402] Hardware name: WinLink E850-96 board (DT) [ 20.853438] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 66.442063] ================================================================== [ 66.449163] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 66.456015] Write of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332 [ 66.463567] [ 66.465051] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 66.465107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.465123] Hardware name: WinLink E850-96 board (DT) [ 66.465145] Call trace: [ 66.465159] show_stack+0x20/0x38 (C) [ 66.465195] dump_stack_lvl+0x8c/0xd0 [ 66.465230] print_report+0x118/0x608 [ 66.465267] kasan_report+0xdc/0x128 [ 66.465299] kasan_check_range+0x100/0x1a8 [ 66.465337] __kasan_check_write+0x20/0x30 [ 66.465368] strncpy_from_user+0x3c/0x2a0 [ 66.465405] copy_user_test_oob+0x5c0/0xec8 [ 66.465438] kunit_try_run_case+0x170/0x3f0 [ 66.465473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.465511] kthread+0x328/0x630 [ 66.465539] ret_from_fork+0x10/0x20 [ 66.465575] [ 66.535267] Allocated by task 332: [ 66.538653] kasan_save_stack+0x3c/0x68 [ 66.542472] kasan_save_track+0x20/0x40 [ 66.546291] kasan_save_alloc_info+0x40/0x58 [ 66.550545] __kasan_kmalloc+0xd4/0xd8 [ 66.554277] __kmalloc_noprof+0x198/0x4c8 [ 66.558270] kunit_kmalloc_array+0x34/0x88 [ 66.562350] copy_user_test_oob+0xac/0xec8 [ 66.566430] kunit_try_run_case+0x170/0x3f0 [ 66.570596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.576065] kthread+0x328/0x630 [ 66.579277] ret_from_fork+0x10/0x20 [ 66.582836] [ 66.584312] The buggy address belongs to the object at ffff000800db1a00 [ 66.584312] which belongs to the cache kmalloc-128 of size 128 [ 66.596812] The buggy address is located 0 bytes inside of [ 66.596812] allocated 120-byte region [ffff000800db1a00, ffff000800db1a78) [ 66.609224] [ 66.610700] The buggy address belongs to the physical page: [ 66.616257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0 [ 66.624243] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.631882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.638825] page_type: f5(slab) [ 66.641961] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.649682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.657408] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.665220] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.673033] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff [ 66.680845] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.688650] page dumped because: kasan: bad access detected [ 66.694206] [ 66.695681] Memory state around the buggy address: [ 66.700461] ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.707665] ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.714869] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.722070] ^ [ 66.729192] ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.736396] ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.743598] ================================================================== [ 66.750997] ================================================================== [ 66.758013] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 66.764952] Write of size 1 at addr ffff000800db1a78 by task kunit_try_catch/332 [ 66.772330] [ 66.773812] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 66.773865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.773883] Hardware name: WinLink E850-96 board (DT) [ 66.773906] Call trace: [ 66.773923] show_stack+0x20/0x38 (C) [ 66.773962] dump_stack_lvl+0x8c/0xd0 [ 66.774000] print_report+0x118/0x608 [ 66.774035] kasan_report+0xdc/0x128 [ 66.774069] __asan_report_store1_noabort+0x20/0x30 [ 66.774102] strncpy_from_user+0x270/0x2a0 [ 66.774139] copy_user_test_oob+0x5c0/0xec8 [ 66.774174] kunit_try_run_case+0x170/0x3f0 [ 66.774211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.774250] kthread+0x328/0x630 [ 66.774276] ret_from_fork+0x10/0x20 [ 66.774313] [ 66.840818] Allocated by task 332: [ 66.844204] kasan_save_stack+0x3c/0x68 [ 66.848023] kasan_save_track+0x20/0x40 [ 66.851842] kasan_save_alloc_info+0x40/0x58 [ 66.856096] __kasan_kmalloc+0xd4/0xd8 [ 66.859828] __kmalloc_noprof+0x198/0x4c8 [ 66.863821] kunit_kmalloc_array+0x34/0x88 [ 66.867901] copy_user_test_oob+0xac/0xec8 [ 66.871981] kunit_try_run_case+0x170/0x3f0 [ 66.876147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.881616] kthread+0x328/0x630 [ 66.884828] ret_from_fork+0x10/0x20 [ 66.888387] [ 66.889862] The buggy address belongs to the object at ffff000800db1a00 [ 66.889862] which belongs to the cache kmalloc-128 of size 128 [ 66.902363] The buggy address is located 0 bytes to the right of [ 66.902363] allocated 120-byte region [ffff000800db1a00, ffff000800db1a78) [ 66.915296] [ 66.916774] The buggy address belongs to the physical page: [ 66.922328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0 [ 66.930313] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.937954] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.944898] page_type: f5(slab) [ 66.948030] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.955754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.963480] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.971291] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.979105] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff [ 66.986917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.994722] page dumped because: kasan: bad access detected [ 67.000277] [ 67.001753] Memory state around the buggy address: [ 67.006533] ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.013736] ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.020941] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 67.028142] ^ [ 67.035263] ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.042468] ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.049669] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 64.917628] ================================================================== [ 64.924535] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 64.931559] Read of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332 [ 64.939024] [ 64.940510] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 64.940571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.940590] Hardware name: WinLink E850-96 board (DT) [ 64.940612] Call trace: [ 64.940626] show_stack+0x20/0x38 (C) [ 64.940665] dump_stack_lvl+0x8c/0xd0 [ 64.940703] print_report+0x118/0x608 [ 64.940739] kasan_report+0xdc/0x128 [ 64.940775] kasan_check_range+0x100/0x1a8 [ 64.940813] __kasan_check_read+0x20/0x30 [ 64.940843] copy_user_test_oob+0x728/0xec8 [ 64.940877] kunit_try_run_case+0x170/0x3f0 [ 64.940913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.940954] kthread+0x328/0x630 [ 64.940986] ret_from_fork+0x10/0x20 [ 64.941024] [ 65.006646] Allocated by task 332: [ 65.010031] kasan_save_stack+0x3c/0x68 [ 65.013849] kasan_save_track+0x20/0x40 [ 65.017668] kasan_save_alloc_info+0x40/0x58 [ 65.021922] __kasan_kmalloc+0xd4/0xd8 [ 65.025656] __kmalloc_noprof+0x198/0x4c8 [ 65.029648] kunit_kmalloc_array+0x34/0x88 [ 65.033727] copy_user_test_oob+0xac/0xec8 [ 65.037807] kunit_try_run_case+0x170/0x3f0 [ 65.041974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.047442] kthread+0x328/0x630 [ 65.050654] ret_from_fork+0x10/0x20 [ 65.054213] [ 65.055690] The buggy address belongs to the object at ffff000800db1a00 [ 65.055690] which belongs to the cache kmalloc-128 of size 128 [ 65.068190] The buggy address is located 0 bytes inside of [ 65.068190] allocated 120-byte region [ffff000800db1a00, ffff000800db1a78) [ 65.080602] [ 65.082080] The buggy address belongs to the physical page: [ 65.087638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0 [ 65.095622] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.103260] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.110202] page_type: f5(slab) [ 65.113338] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.121061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.128786] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.136597] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.144410] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff [ 65.152222] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.160027] page dumped because: kasan: bad access detected [ 65.165583] [ 65.167058] Memory state around the buggy address: [ 65.171839] ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.179042] ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.186247] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.193447] ^ [ 65.200569] ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.207774] ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.214974] ================================================================== [ 65.527348] ================================================================== [ 65.534418] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 65.541445] Read of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332 [ 65.548911] [ 65.550396] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 65.550452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.550472] Hardware name: WinLink E850-96 board (DT) [ 65.550493] Call trace: [ 65.550508] show_stack+0x20/0x38 (C) [ 65.550542] dump_stack_lvl+0x8c/0xd0 [ 65.550581] print_report+0x118/0x608 [ 65.550616] kasan_report+0xdc/0x128 [ 65.550652] kasan_check_range+0x100/0x1a8 [ 65.550688] __kasan_check_read+0x20/0x30 [ 65.550717] copy_user_test_oob+0x3c8/0xec8 [ 65.550750] kunit_try_run_case+0x170/0x3f0 [ 65.550785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.550824] kthread+0x328/0x630 [ 65.550854] ret_from_fork+0x10/0x20 [ 65.550890] [ 65.616531] Allocated by task 332: [ 65.619916] kasan_save_stack+0x3c/0x68 [ 65.623736] kasan_save_track+0x20/0x40 [ 65.627555] kasan_save_alloc_info+0x40/0x58 [ 65.631809] __kasan_kmalloc+0xd4/0xd8 [ 65.635542] __kmalloc_noprof+0x198/0x4c8 [ 65.639536] kunit_kmalloc_array+0x34/0x88 [ 65.643614] copy_user_test_oob+0xac/0xec8 [ 65.647694] kunit_try_run_case+0x170/0x3f0 [ 65.651860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.657329] kthread+0x328/0x630 [ 65.660541] ret_from_fork+0x10/0x20 [ 65.664100] [ 65.665577] The buggy address belongs to the object at ffff000800db1a00 [ 65.665577] which belongs to the cache kmalloc-128 of size 128 [ 65.678077] The buggy address is located 0 bytes inside of [ 65.678077] allocated 120-byte region [ffff000800db1a00, ffff000800db1a78) [ 65.690488] [ 65.691965] The buggy address belongs to the physical page: [ 65.697523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0 [ 65.705507] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.713145] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.720090] page_type: f5(slab) [ 65.723226] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.730946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.738673] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.746484] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.754297] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff [ 65.762109] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.769914] page dumped because: kasan: bad access detected [ 65.775469] [ 65.776946] Memory state around the buggy address: [ 65.781727] ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.788928] ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.796135] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.803334] ^ [ 65.810456] ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.817660] ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.824861] ================================================================== [ 65.832180] ================================================================== [ 65.839274] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 65.846302] Write of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332 [ 65.853854] [ 65.855339] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 65.855391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.855407] Hardware name: WinLink E850-96 board (DT) [ 65.855431] Call trace: [ 65.855447] show_stack+0x20/0x38 (C) [ 65.855483] dump_stack_lvl+0x8c/0xd0 [ 65.855517] print_report+0x118/0x608 [ 65.855554] kasan_report+0xdc/0x128 [ 65.855588] kasan_check_range+0x100/0x1a8 [ 65.855625] __kasan_check_write+0x20/0x30 [ 65.855654] copy_user_test_oob+0x434/0xec8 [ 65.855689] kunit_try_run_case+0x170/0x3f0 [ 65.855727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.855764] kthread+0x328/0x630 [ 65.855791] ret_from_fork+0x10/0x20 [ 65.855828] [ 65.921561] Allocated by task 332: [ 65.924946] kasan_save_stack+0x3c/0x68 [ 65.928766] kasan_save_track+0x20/0x40 [ 65.932585] kasan_save_alloc_info+0x40/0x58 [ 65.936840] __kasan_kmalloc+0xd4/0xd8 [ 65.940573] __kmalloc_noprof+0x198/0x4c8 [ 65.944564] kunit_kmalloc_array+0x34/0x88 [ 65.948644] copy_user_test_oob+0xac/0xec8 [ 65.952724] kunit_try_run_case+0x170/0x3f0 [ 65.956891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.962359] kthread+0x328/0x630 [ 65.965571] ret_from_fork+0x10/0x20 [ 65.969130] [ 65.970605] The buggy address belongs to the object at ffff000800db1a00 [ 65.970605] which belongs to the cache kmalloc-128 of size 128 [ 65.983107] The buggy address is located 0 bytes inside of [ 65.983107] allocated 120-byte region [ffff000800db1a00, ffff000800db1a78) [ 65.995518] [ 65.996996] The buggy address belongs to the physical page: [ 66.002553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0 [ 66.010536] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.018175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.025119] page_type: f5(slab) [ 66.028256] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.035976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.043702] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.051514] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.059327] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff [ 66.067139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.074944] page dumped because: kasan: bad access detected [ 66.080499] [ 66.081977] Memory state around the buggy address: [ 66.086758] ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.093958] ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.101164] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.108364] ^ [ 66.115486] ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.122691] ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.129891] ================================================================== [ 66.137286] ================================================================== [ 66.144306] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 66.151333] Read of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332 [ 66.158797] [ 66.160279] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 66.160333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.160353] Hardware name: WinLink E850-96 board (DT) [ 66.160374] Call trace: [ 66.160390] show_stack+0x20/0x38 (C) [ 66.160426] dump_stack_lvl+0x8c/0xd0 [ 66.160463] print_report+0x118/0x608 [ 66.160497] kasan_report+0xdc/0x128 [ 66.160532] kasan_check_range+0x100/0x1a8 [ 66.160567] __kasan_check_read+0x20/0x30 [ 66.160597] copy_user_test_oob+0x4a0/0xec8 [ 66.160632] kunit_try_run_case+0x170/0x3f0 [ 66.160666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.160703] kthread+0x328/0x630 [ 66.160732] ret_from_fork+0x10/0x20 [ 66.160767] [ 66.226418] Allocated by task 332: [ 66.229804] kasan_save_stack+0x3c/0x68 [ 66.233622] kasan_save_track+0x20/0x40 [ 66.237442] kasan_save_alloc_info+0x40/0x58 [ 66.241695] __kasan_kmalloc+0xd4/0xd8 [ 66.245428] __kmalloc_noprof+0x198/0x4c8 [ 66.249421] kunit_kmalloc_array+0x34/0x88 [ 66.253501] copy_user_test_oob+0xac/0xec8 [ 66.257581] kunit_try_run_case+0x170/0x3f0 [ 66.261747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.267216] kthread+0x328/0x630 [ 66.270428] ret_from_fork+0x10/0x20 [ 66.273987] [ 66.275461] The buggy address belongs to the object at ffff000800db1a00 [ 66.275461] which belongs to the cache kmalloc-128 of size 128 [ 66.287962] The buggy address is located 0 bytes inside of [ 66.287962] allocated 120-byte region [ffff000800db1a00, ffff000800db1a78) [ 66.300375] [ 66.301852] The buggy address belongs to the physical page: [ 66.307409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0 [ 66.315392] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.323033] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.329975] page_type: f5(slab) [ 66.333112] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.340833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.348559] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.356370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.364183] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff [ 66.371995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.379801] page dumped because: kasan: bad access detected [ 66.385356] [ 66.386832] Memory state around the buggy address: [ 66.391612] ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.398815] ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.406020] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.413220] ^ [ 66.420342] ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.427547] ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.434748] ================================================================== [ 64.607043] ================================================================== [ 64.619503] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 64.626531] Write of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332 [ 64.634080] [ 64.635568] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 64.635622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.635641] Hardware name: WinLink E850-96 board (DT) [ 64.635662] Call trace: [ 64.635679] show_stack+0x20/0x38 (C) [ 64.635721] dump_stack_lvl+0x8c/0xd0 [ 64.635761] print_report+0x118/0x608 [ 64.635800] kasan_report+0xdc/0x128 [ 64.635836] kasan_check_range+0x100/0x1a8 [ 64.635874] __kasan_check_write+0x20/0x30 [ 64.635904] copy_user_test_oob+0x234/0xec8 [ 64.635939] kunit_try_run_case+0x170/0x3f0 [ 64.635979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.636017] kthread+0x328/0x630 [ 64.636047] ret_from_fork+0x10/0x20 [ 64.636083] [ 64.701790] Allocated by task 332: [ 64.705176] kasan_save_stack+0x3c/0x68 [ 64.708992] kasan_save_track+0x20/0x40 [ 64.712812] kasan_save_alloc_info+0x40/0x58 [ 64.717065] __kasan_kmalloc+0xd4/0xd8 [ 64.720799] __kmalloc_noprof+0x198/0x4c8 [ 64.724791] kunit_kmalloc_array+0x34/0x88 [ 64.728871] copy_user_test_oob+0xac/0xec8 [ 64.732952] kunit_try_run_case+0x170/0x3f0 [ 64.737117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.742586] kthread+0x328/0x630 [ 64.745798] ret_from_fork+0x10/0x20 [ 64.749356] [ 64.750833] The buggy address belongs to the object at ffff000800db1a00 [ 64.750833] which belongs to the cache kmalloc-128 of size 128 [ 64.763334] The buggy address is located 0 bytes inside of [ 64.763334] allocated 120-byte region [ffff000800db1a00, ffff000800db1a78) [ 64.775745] [ 64.777225] The buggy address belongs to the physical page: [ 64.782781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0 [ 64.790764] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.798403] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.805348] page_type: f5(slab) [ 64.808484] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.816203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.823931] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.831741] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.839554] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff [ 64.847365] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.855171] page dumped because: kasan: bad access detected [ 64.860726] [ 64.862202] Memory state around the buggy address: [ 64.866983] ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.874185] ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.881391] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.888590] ^ [ 64.895712] ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.902917] ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.910121] ================================================================== [ 65.222469] ================================================================== [ 65.229394] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 65.236416] Write of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332 [ 65.243967] [ 65.245454] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 65.245518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.245538] Hardware name: WinLink E850-96 board (DT) [ 65.245562] Call trace: [ 65.245577] show_stack+0x20/0x38 (C) [ 65.245613] dump_stack_lvl+0x8c/0xd0 [ 65.245650] print_report+0x118/0x608 [ 65.245687] kasan_report+0xdc/0x128 [ 65.245725] kasan_check_range+0x100/0x1a8 [ 65.245764] __kasan_check_write+0x20/0x30 [ 65.245797] copy_user_test_oob+0x35c/0xec8 [ 65.245831] kunit_try_run_case+0x170/0x3f0 [ 65.245867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.245908] kthread+0x328/0x630 [ 65.245937] ret_from_fork+0x10/0x20 [ 65.245974] [ 65.311676] Allocated by task 332: [ 65.315061] kasan_save_stack+0x3c/0x68 [ 65.318879] kasan_save_track+0x20/0x40 [ 65.322698] kasan_save_alloc_info+0x40/0x58 [ 65.326952] __kasan_kmalloc+0xd4/0xd8 [ 65.330686] __kmalloc_noprof+0x198/0x4c8 [ 65.334678] kunit_kmalloc_array+0x34/0x88 [ 65.338757] copy_user_test_oob+0xac/0xec8 [ 65.342837] kunit_try_run_case+0x170/0x3f0 [ 65.347004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.352472] kthread+0x328/0x630 [ 65.355684] ret_from_fork+0x10/0x20 [ 65.359243] [ 65.360720] The buggy address belongs to the object at ffff000800db1a00 [ 65.360720] which belongs to the cache kmalloc-128 of size 128 [ 65.373221] The buggy address is located 0 bytes inside of [ 65.373221] allocated 120-byte region [ffff000800db1a00, ffff000800db1a78) [ 65.385632] [ 65.387110] The buggy address belongs to the physical page: [ 65.392668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0 [ 65.400651] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.408288] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.415232] page_type: f5(slab) [ 65.418369] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.426090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.433817] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.441627] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.449440] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff [ 65.457252] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.465057] page dumped because: kasan: bad access detected [ 65.470613] [ 65.472088] Memory state around the buggy address: [ 65.476870] ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.484072] ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.491277] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.498477] ^ [ 65.505599] ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.512804] ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.520007] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 63.982111] ================================================================== [ 63.996336] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 64.003709] Read of size 8 at addr ffff000801ad8e78 by task kunit_try_catch/328 [ 64.011000] [ 64.012488] CPU: 4 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 64.012548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.012567] Hardware name: WinLink E850-96 board (DT) [ 64.012588] Call trace: [ 64.012606] show_stack+0x20/0x38 (C) [ 64.012644] dump_stack_lvl+0x8c/0xd0 [ 64.012683] print_report+0x118/0x608 [ 64.012724] kasan_report+0xdc/0x128 [ 64.012757] __asan_report_load8_noabort+0x20/0x30 [ 64.012796] copy_to_kernel_nofault+0x204/0x250 [ 64.012836] copy_to_kernel_nofault_oob+0x158/0x418 [ 64.012873] kunit_try_run_case+0x170/0x3f0 [ 64.012911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.012951] kthread+0x328/0x630 [ 64.012981] ret_from_fork+0x10/0x20 [ 64.013022] [ 64.080531] Allocated by task 328: [ 64.083918] kasan_save_stack+0x3c/0x68 [ 64.087736] kasan_save_track+0x20/0x40 [ 64.091554] kasan_save_alloc_info+0x40/0x58 [ 64.095807] __kasan_kmalloc+0xd4/0xd8 [ 64.099540] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.104054] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.108829] kunit_try_run_case+0x170/0x3f0 [ 64.112995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.118463] kthread+0x328/0x630 [ 64.121675] ret_from_fork+0x10/0x20 [ 64.125234] [ 64.126712] The buggy address belongs to the object at ffff000801ad8e00 [ 64.126712] which belongs to the cache kmalloc-128 of size 128 [ 64.139212] The buggy address is located 0 bytes to the right of [ 64.139212] allocated 120-byte region [ffff000801ad8e00, ffff000801ad8e78) [ 64.152143] [ 64.153623] The buggy address belongs to the physical page: [ 64.159179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8 [ 64.167162] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.174800] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.181746] page_type: f5(slab) [ 64.184883] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.192601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.200331] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.208139] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.215952] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff [ 64.223764] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.231571] page dumped because: kasan: bad access detected [ 64.237124] [ 64.238600] Memory state around the buggy address: [ 64.243380] ffff000801ad8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.250583] ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.257788] >ffff000801ad8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.264989] ^ [ 64.272112] ffff000801ad8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.279315] ffff000801ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.286518] ================================================================== [ 64.293956] ================================================================== [ 64.300931] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 64.308218] Write of size 8 at addr ffff000801ad8e78 by task kunit_try_catch/328 [ 64.315596] [ 64.317081] CPU: 4 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 64.317134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.317150] Hardware name: WinLink E850-96 board (DT) [ 64.317173] Call trace: [ 64.317190] show_stack+0x20/0x38 (C) [ 64.317226] dump_stack_lvl+0x8c/0xd0 [ 64.317266] print_report+0x118/0x608 [ 64.317305] kasan_report+0xdc/0x128 [ 64.317340] kasan_check_range+0x100/0x1a8 [ 64.317377] __kasan_check_write+0x20/0x30 [ 64.317409] copy_to_kernel_nofault+0x8c/0x250 [ 64.317445] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 64.317479] kunit_try_run_case+0x170/0x3f0 [ 64.317516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.317555] kthread+0x328/0x630 [ 64.317583] ret_from_fork+0x10/0x20 [ 64.317620] [ 64.388426] Allocated by task 328: [ 64.391810] kasan_save_stack+0x3c/0x68 [ 64.395629] kasan_save_track+0x20/0x40 [ 64.399449] kasan_save_alloc_info+0x40/0x58 [ 64.403702] __kasan_kmalloc+0xd4/0xd8 [ 64.407435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.411948] copy_to_kernel_nofault_oob+0xc8/0x418 [ 64.416723] kunit_try_run_case+0x170/0x3f0 [ 64.420889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.426358] kthread+0x328/0x630 [ 64.429570] ret_from_fork+0x10/0x20 [ 64.433128] [ 64.434606] The buggy address belongs to the object at ffff000801ad8e00 [ 64.434606] which belongs to the cache kmalloc-128 of size 128 [ 64.447106] The buggy address is located 0 bytes to the right of [ 64.447106] allocated 120-byte region [ffff000801ad8e00, ffff000801ad8e78) [ 64.460038] [ 64.461515] The buggy address belongs to the physical page: [ 64.467073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8 [ 64.475058] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.482696] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.489638] page_type: f5(slab) [ 64.492778] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.500496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.508222] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.516033] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.523847] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff [ 64.531658] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.539463] page dumped because: kasan: bad access detected [ 64.545019] [ 64.546495] Memory state around the buggy address: [ 64.551274] ffff000801ad8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.558478] ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.565684] >ffff000801ad8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.572883] ^ [ 64.580005] ffff000801ad8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.587210] ffff000801ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.594411] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 63.542893] ================================================================== [ 63.557278] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 63.563959] Read of size 1 at addr ffff800087cdd7f3 by task kunit_try_catch/316 [ 63.571249] [ 63.572736] CPU: 2 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 63.572794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.572811] Hardware name: WinLink E850-96 board (DT) [ 63.572835] Call trace: [ 63.572853] show_stack+0x20/0x38 (C) [ 63.572893] dump_stack_lvl+0x8c/0xd0 [ 63.572930] print_report+0x310/0x608 [ 63.572967] kasan_report+0xdc/0x128 [ 63.573005] __asan_report_load1_noabort+0x20/0x30 [ 63.573051] vmalloc_oob+0x578/0x5d0 [ 63.573083] kunit_try_run_case+0x170/0x3f0 [ 63.573122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.573162] kthread+0x328/0x630 [ 63.573192] ret_from_fork+0x10/0x20 [ 63.573229] [ 63.634970] The buggy address belongs to the virtual mapping at [ 63.634970] [ffff800087cdd000, ffff800087cdf000) created by: [ 63.634970] vmalloc_oob+0x98/0x5d0 [ 63.650069] [ 63.651547] The buggy address belongs to the physical page: [ 63.657103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646d [ 63.665088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.671610] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 63.679327] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 63.687049] page dumped because: kasan: bad access detected [ 63.692602] [ 63.694077] Memory state around the buggy address: [ 63.698859] ffff800087cdd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.706060] ffff800087cdd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.713266] >ffff800087cdd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 63.720465] ^ [ 63.727329] ffff800087cdd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.734532] ffff800087cdd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.741736] ================================================================== [ 63.749077] ================================================================== [ 63.756147] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 63.762827] Read of size 1 at addr ffff800087cdd7f8 by task kunit_try_catch/316 [ 63.770118] [ 63.771601] CPU: 2 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 63.771656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.771673] Hardware name: WinLink E850-96 board (DT) [ 63.771695] Call trace: [ 63.771711] show_stack+0x20/0x38 (C) [ 63.771748] dump_stack_lvl+0x8c/0xd0 [ 63.771786] print_report+0x310/0x608 [ 63.771821] kasan_report+0xdc/0x128 [ 63.771860] __asan_report_load1_noabort+0x20/0x30 [ 63.771900] vmalloc_oob+0x51c/0x5d0 [ 63.771930] kunit_try_run_case+0x170/0x3f0 [ 63.771968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.772007] kthread+0x328/0x630 [ 63.772037] ret_from_fork+0x10/0x20 [ 63.772071] [ 63.833836] The buggy address belongs to the virtual mapping at [ 63.833836] [ffff800087cdd000, ffff800087cdf000) created by: [ 63.833836] vmalloc_oob+0x98/0x5d0 [ 63.848936] [ 63.850414] The buggy address belongs to the physical page: [ 63.855972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646d [ 63.863955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.870478] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 63.878196] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 63.885917] page dumped because: kasan: bad access detected [ 63.891470] [ 63.892946] Memory state around the buggy address: [ 63.897724] ffff800087cdd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.904928] ffff800087cdd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.912135] >ffff800087cdd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 63.919334] ^ [ 63.926458] ffff800087cdd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.933661] ffff800087cdd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.940861] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 56.955544] ================================================================== [ 56.962501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 56.969786] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 56.977164] [ 56.978648] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 56.978696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.978713] Hardware name: WinLink E850-96 board (DT) [ 56.978733] Call trace: [ 56.978747] show_stack+0x20/0x38 (C) [ 56.978780] dump_stack_lvl+0x8c/0xd0 [ 56.978816] print_report+0x118/0x608 [ 56.978851] kasan_report+0xdc/0x128 [ 56.978885] kasan_check_range+0x100/0x1a8 [ 56.978923] __kasan_check_write+0x20/0x30 [ 56.978954] kasan_atomics_helper+0xf20/0x4858 [ 56.978989] kasan_atomics+0x198/0x2e0 [ 56.979019] kunit_try_run_case+0x170/0x3f0 [ 56.979055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.979095] kthread+0x328/0x630 [ 56.979123] ret_from_fork+0x10/0x20 [ 56.979158] [ 57.048864] Allocated by task 312: [ 57.052250] kasan_save_stack+0x3c/0x68 [ 57.056069] kasan_save_track+0x20/0x40 [ 57.059889] kasan_save_alloc_info+0x40/0x58 [ 57.064142] __kasan_kmalloc+0xd4/0xd8 [ 57.067876] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.072388] kasan_atomics+0xb8/0x2e0 [ 57.076034] kunit_try_run_case+0x170/0x3f0 [ 57.080201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.085669] kthread+0x328/0x630 [ 57.088881] ret_from_fork+0x10/0x20 [ 57.092440] [ 57.093916] The buggy address belongs to the object at ffff000805f49a00 [ 57.093916] which belongs to the cache kmalloc-64 of size 64 [ 57.106242] The buggy address is located 0 bytes to the right of [ 57.106242] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 57.119089] [ 57.120565] The buggy address belongs to the physical page: [ 57.126122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 57.134110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.140616] page_type: f5(slab) [ 57.143753] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.151475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.159193] page dumped because: kasan: bad access detected [ 57.164748] [ 57.166224] Memory state around the buggy address: [ 57.171002] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.178207] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.185411] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.192612] ^ [ 57.197390] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.204595] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.211796] ================================================================== [ 54.595236] ================================================================== [ 54.602288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 54.609578] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 54.616957] [ 54.618438] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 54.618483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.618498] Hardware name: WinLink E850-96 board (DT) [ 54.618516] Call trace: [ 54.618527] show_stack+0x20/0x38 (C) [ 54.618561] dump_stack_lvl+0x8c/0xd0 [ 54.618596] print_report+0x118/0x608 [ 54.618629] kasan_report+0xdc/0x128 [ 54.618663] kasan_check_range+0x100/0x1a8 [ 54.618699] __kasan_check_write+0x20/0x30 [ 54.618731] kasan_atomics_helper+0xca0/0x4858 [ 54.618767] kasan_atomics+0x198/0x2e0 [ 54.618797] kunit_try_run_case+0x170/0x3f0 [ 54.618832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.618870] kthread+0x328/0x630 [ 54.618897] ret_from_fork+0x10/0x20 [ 54.618929] [ 54.688657] Allocated by task 312: [ 54.692042] kasan_save_stack+0x3c/0x68 [ 54.695862] kasan_save_track+0x20/0x40 [ 54.699681] kasan_save_alloc_info+0x40/0x58 [ 54.703934] __kasan_kmalloc+0xd4/0xd8 [ 54.707667] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.712181] kasan_atomics+0xb8/0x2e0 [ 54.715827] kunit_try_run_case+0x170/0x3f0 [ 54.719993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.725462] kthread+0x328/0x630 [ 54.728674] ret_from_fork+0x10/0x20 [ 54.732233] [ 54.733708] The buggy address belongs to the object at ffff000805f49a00 [ 54.733708] which belongs to the cache kmalloc-64 of size 64 [ 54.746035] The buggy address is located 0 bytes to the right of [ 54.746035] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 54.758881] [ 54.760357] The buggy address belongs to the physical page: [ 54.765913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 54.773899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.780409] page_type: f5(slab) [ 54.783542] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.791266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.798985] page dumped because: kasan: bad access detected [ 54.804540] [ 54.806016] Memory state around the buggy address: [ 54.810795] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.817999] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.825204] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.832405] ^ [ 54.837183] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.844388] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.851589] ================================================================== [ 56.691730] ================================================================== [ 56.698785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 56.706075] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 56.713453] [ 56.714933] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 56.714980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.714995] Hardware name: WinLink E850-96 board (DT) [ 56.715012] Call trace: [ 56.715025] show_stack+0x20/0x38 (C) [ 56.715056] dump_stack_lvl+0x8c/0xd0 [ 56.715093] print_report+0x118/0x608 [ 56.715127] kasan_report+0xdc/0x128 [ 56.715161] kasan_check_range+0x100/0x1a8 [ 56.715195] __kasan_check_write+0x20/0x30 [ 56.715224] kasan_atomics_helper+0xeb8/0x4858 [ 56.715259] kasan_atomics+0x198/0x2e0 [ 56.715290] kunit_try_run_case+0x170/0x3f0 [ 56.715323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.715361] kthread+0x328/0x630 [ 56.715391] ret_from_fork+0x10/0x20 [ 56.715422] [ 56.785153] Allocated by task 312: [ 56.788539] kasan_save_stack+0x3c/0x68 [ 56.792358] kasan_save_track+0x20/0x40 [ 56.796177] kasan_save_alloc_info+0x40/0x58 [ 56.800430] __kasan_kmalloc+0xd4/0xd8 [ 56.804163] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.808677] kasan_atomics+0xb8/0x2e0 [ 56.812323] kunit_try_run_case+0x170/0x3f0 [ 56.816490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.821958] kthread+0x328/0x630 [ 56.825170] ret_from_fork+0x10/0x20 [ 56.828729] [ 56.830205] The buggy address belongs to the object at ffff000805f49a00 [ 56.830205] which belongs to the cache kmalloc-64 of size 64 [ 56.842531] The buggy address is located 0 bytes to the right of [ 56.842531] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 56.855378] [ 56.856854] The buggy address belongs to the physical page: [ 56.862410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 56.870395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.876905] page_type: f5(slab) [ 56.880039] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.887763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.895482] page dumped because: kasan: bad access detected [ 56.901037] [ 56.902512] Memory state around the buggy address: [ 56.907291] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.914496] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.921700] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.928901] ^ [ 56.933679] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.940884] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.948085] ================================================================== [ 52.759152] ================================================================== [ 52.766205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 52.773495] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 52.780873] [ 52.782354] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 52.782401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.782417] Hardware name: WinLink E850-96 board (DT) [ 52.782435] Call trace: [ 52.782448] show_stack+0x20/0x38 (C) [ 52.782480] dump_stack_lvl+0x8c/0xd0 [ 52.782515] print_report+0x118/0x608 [ 52.782549] kasan_report+0xdc/0x128 [ 52.782582] kasan_check_range+0x100/0x1a8 [ 52.782616] __kasan_check_write+0x20/0x30 [ 52.782647] kasan_atomics_helper+0xa6c/0x4858 [ 52.782682] kasan_atomics+0x198/0x2e0 [ 52.782712] kunit_try_run_case+0x170/0x3f0 [ 52.782746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.782782] kthread+0x328/0x630 [ 52.782810] ret_from_fork+0x10/0x20 [ 52.782840] [ 52.852573] Allocated by task 312: [ 52.855959] kasan_save_stack+0x3c/0x68 [ 52.859778] kasan_save_track+0x20/0x40 [ 52.863597] kasan_save_alloc_info+0x40/0x58 [ 52.867851] __kasan_kmalloc+0xd4/0xd8 [ 52.871583] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.876097] kasan_atomics+0xb8/0x2e0 [ 52.879743] kunit_try_run_case+0x170/0x3f0 [ 52.883910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.889378] kthread+0x328/0x630 [ 52.892590] ret_from_fork+0x10/0x20 [ 52.896149] [ 52.897624] The buggy address belongs to the object at ffff000805f49a00 [ 52.897624] which belongs to the cache kmalloc-64 of size 64 [ 52.909951] The buggy address is located 0 bytes to the right of [ 52.909951] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 52.922798] [ 52.924274] The buggy address belongs to the physical page: [ 52.929830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 52.937815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.944325] page_type: f5(slab) [ 52.947459] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.955183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.962902] page dumped because: kasan: bad access detected [ 52.968457] [ 52.969933] Memory state around the buggy address: [ 52.974711] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.981916] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.989120] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.996321] ^ [ 53.001099] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.008304] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.015505] ================================================================== [ 47.231269] ================================================================== [ 47.238165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 47.245453] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 47.252831] [ 47.254315] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 47.254363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.254379] Hardware name: WinLink E850-96 board (DT) [ 47.254399] Call trace: [ 47.254415] show_stack+0x20/0x38 (C) [ 47.254452] dump_stack_lvl+0x8c/0xd0 [ 47.254489] print_report+0x118/0x608 [ 47.254525] kasan_report+0xdc/0x128 [ 47.254559] kasan_check_range+0x100/0x1a8 [ 47.254598] __kasan_check_write+0x20/0x30 [ 47.254629] kasan_atomics_helper+0x24c/0x4858 [ 47.254663] kasan_atomics+0x198/0x2e0 [ 47.254694] kunit_try_run_case+0x170/0x3f0 [ 47.254730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.254768] kthread+0x328/0x630 [ 47.254793] ret_from_fork+0x10/0x20 [ 47.254827] [ 47.324531] Allocated by task 312: [ 47.327918] kasan_save_stack+0x3c/0x68 [ 47.331736] kasan_save_track+0x20/0x40 [ 47.335555] kasan_save_alloc_info+0x40/0x58 [ 47.339809] __kasan_kmalloc+0xd4/0xd8 [ 47.343541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.348055] kasan_atomics+0xb8/0x2e0 [ 47.351701] kunit_try_run_case+0x170/0x3f0 [ 47.355868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.361336] kthread+0x328/0x630 [ 47.364548] ret_from_fork+0x10/0x20 [ 47.368107] [ 47.369583] The buggy address belongs to the object at ffff000805f49a00 [ 47.369583] which belongs to the cache kmalloc-64 of size 64 [ 47.381909] The buggy address is located 0 bytes to the right of [ 47.381909] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 47.394756] [ 47.396233] The buggy address belongs to the physical page: [ 47.401789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 47.409776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.416284] page_type: f5(slab) [ 47.419418] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.427141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.434860] page dumped because: kasan: bad access detected [ 47.440415] [ 47.441890] Memory state around the buggy address: [ 47.446670] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.453874] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.461078] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.468279] ^ [ 47.473057] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.480262] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.487462] ================================================================== [ 48.806785] ================================================================== [ 48.813836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 48.821124] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 48.828502] [ 48.829985] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 48.830037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.830054] Hardware name: WinLink E850-96 board (DT) [ 48.830073] Call trace: [ 48.830087] show_stack+0x20/0x38 (C) [ 48.830120] dump_stack_lvl+0x8c/0xd0 [ 48.830156] print_report+0x118/0x608 [ 48.830189] kasan_report+0xdc/0x128 [ 48.830222] kasan_check_range+0x100/0x1a8 [ 48.830256] __kasan_check_write+0x20/0x30 [ 48.830286] kasan_atomics_helper+0x414/0x4858 [ 48.830320] kasan_atomics+0x198/0x2e0 [ 48.830351] kunit_try_run_case+0x170/0x3f0 [ 48.830385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.830423] kthread+0x328/0x630 [ 48.830451] ret_from_fork+0x10/0x20 [ 48.830482] [ 48.900202] Allocated by task 312: [ 48.903587] kasan_save_stack+0x3c/0x68 [ 48.907407] kasan_save_track+0x20/0x40 [ 48.911226] kasan_save_alloc_info+0x40/0x58 [ 48.915480] __kasan_kmalloc+0xd4/0xd8 [ 48.919212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.923726] kasan_atomics+0xb8/0x2e0 [ 48.927372] kunit_try_run_case+0x170/0x3f0 [ 48.931538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.937007] kthread+0x328/0x630 [ 48.940219] ret_from_fork+0x10/0x20 [ 48.943778] [ 48.945255] The buggy address belongs to the object at ffff000805f49a00 [ 48.945255] which belongs to the cache kmalloc-64 of size 64 [ 48.957580] The buggy address is located 0 bytes to the right of [ 48.957580] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 48.970427] [ 48.971904] The buggy address belongs to the physical page: [ 48.977460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 48.985447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.991955] page_type: f5(slab) [ 48.995091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.002812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.010530] page dumped because: kasan: bad access detected [ 49.016086] [ 49.017561] Memory state around the buggy address: [ 49.022340] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.029544] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.036749] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.043950] ^ [ 49.048728] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.055933] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.063134] ================================================================== [ 50.389071] ================================================================== [ 50.396105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 50.403392] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 50.410770] [ 50.412254] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 50.412306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.412322] Hardware name: WinLink E850-96 board (DT) [ 50.412343] Call trace: [ 50.412361] show_stack+0x20/0x38 (C) [ 50.412394] dump_stack_lvl+0x8c/0xd0 [ 50.412432] print_report+0x118/0x608 [ 50.412467] kasan_report+0xdc/0x128 [ 50.412498] kasan_check_range+0x100/0x1a8 [ 50.412535] __kasan_check_write+0x20/0x30 [ 50.412565] kasan_atomics_helper+0x684/0x4858 [ 50.412598] kasan_atomics+0x198/0x2e0 [ 50.412631] kunit_try_run_case+0x170/0x3f0 [ 50.412667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.412704] kthread+0x328/0x630 [ 50.412733] ret_from_fork+0x10/0x20 [ 50.412764] [ 50.482470] Allocated by task 312: [ 50.485856] kasan_save_stack+0x3c/0x68 [ 50.489675] kasan_save_track+0x20/0x40 [ 50.493494] kasan_save_alloc_info+0x40/0x58 [ 50.497748] __kasan_kmalloc+0xd4/0xd8 [ 50.501480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.505994] kasan_atomics+0xb8/0x2e0 [ 50.509640] kunit_try_run_case+0x170/0x3f0 [ 50.513806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.519275] kthread+0x328/0x630 [ 50.522487] ret_from_fork+0x10/0x20 [ 50.526046] [ 50.527521] The buggy address belongs to the object at ffff000805f49a00 [ 50.527521] which belongs to the cache kmalloc-64 of size 64 [ 50.539848] The buggy address is located 0 bytes to the right of [ 50.539848] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 50.552695] [ 50.554171] The buggy address belongs to the physical page: [ 50.559727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 50.567714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.574222] page_type: f5(slab) [ 50.577356] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.585079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.592798] page dumped because: kasan: bad access detected [ 50.598354] [ 50.599829] Memory state around the buggy address: [ 50.604607] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.611812] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.619017] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.626218] ^ [ 50.630996] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.638201] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.645402] ================================================================== [ 51.968124] ================================================================== [ 51.975072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 51.982361] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 51.989739] [ 51.991223] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 51.991270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.991285] Hardware name: WinLink E850-96 board (DT) [ 51.991306] Call trace: [ 51.991323] show_stack+0x20/0x38 (C) [ 51.991356] dump_stack_lvl+0x8c/0xd0 [ 51.991392] print_report+0x118/0x608 [ 51.991426] kasan_report+0xdc/0x128 [ 51.991462] kasan_check_range+0x100/0x1a8 [ 51.991498] __kasan_check_write+0x20/0x30 [ 51.991529] kasan_atomics_helper+0x934/0x4858 [ 51.991563] kasan_atomics+0x198/0x2e0 [ 51.991594] kunit_try_run_case+0x170/0x3f0 [ 51.991628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.991666] kthread+0x328/0x630 [ 51.991693] ret_from_fork+0x10/0x20 [ 51.991730] [ 52.061439] Allocated by task 312: [ 52.064825] kasan_save_stack+0x3c/0x68 [ 52.068644] kasan_save_track+0x20/0x40 [ 52.072463] kasan_save_alloc_info+0x40/0x58 [ 52.076717] __kasan_kmalloc+0xd4/0xd8 [ 52.080449] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.084963] kasan_atomics+0xb8/0x2e0 [ 52.088609] kunit_try_run_case+0x170/0x3f0 [ 52.092776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.098244] kthread+0x328/0x630 [ 52.101456] ret_from_fork+0x10/0x20 [ 52.105015] [ 52.106490] The buggy address belongs to the object at ffff000805f49a00 [ 52.106490] which belongs to the cache kmalloc-64 of size 64 [ 52.118817] The buggy address is located 0 bytes to the right of [ 52.118817] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 52.131664] [ 52.133142] The buggy address belongs to the physical page: [ 52.138698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 52.146683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.153191] page_type: f5(slab) [ 52.156326] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.164049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.171768] page dumped because: kasan: bad access detected [ 52.177323] [ 52.178798] Memory state around the buggy address: [ 52.183577] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.190782] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.197986] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.205187] ^ [ 52.209965] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.217170] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.224371] ================================================================== [ 58.538208] ================================================================== [ 58.545286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 58.552662] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 58.560040] [ 58.561523] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 58.561569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.561586] Hardware name: WinLink E850-96 board (DT) [ 58.561606] Call trace: [ 58.561620] show_stack+0x20/0x38 (C) [ 58.561655] dump_stack_lvl+0x8c/0xd0 [ 58.561689] print_report+0x118/0x608 [ 58.561722] kasan_report+0xdc/0x128 [ 58.561757] kasan_check_range+0x100/0x1a8 [ 58.561793] __kasan_check_write+0x20/0x30 [ 58.561824] kasan_atomics_helper+0x1190/0x4858 [ 58.561857] kasan_atomics+0x198/0x2e0 [ 58.561887] kunit_try_run_case+0x170/0x3f0 [ 58.561918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.561956] kthread+0x328/0x630 [ 58.561984] ret_from_fork+0x10/0x20 [ 58.562017] [ 58.631827] Allocated by task 312: [ 58.635213] kasan_save_stack+0x3c/0x68 [ 58.639032] kasan_save_track+0x20/0x40 [ 58.642851] kasan_save_alloc_info+0x40/0x58 [ 58.647104] __kasan_kmalloc+0xd4/0xd8 [ 58.650837] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.655351] kasan_atomics+0xb8/0x2e0 [ 58.658997] kunit_try_run_case+0x170/0x3f0 [ 58.663163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.668632] kthread+0x328/0x630 [ 58.671844] ret_from_fork+0x10/0x20 [ 58.675402] [ 58.676878] The buggy address belongs to the object at ffff000805f49a00 [ 58.676878] which belongs to the cache kmalloc-64 of size 64 [ 58.689205] The buggy address is located 0 bytes to the right of [ 58.689205] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 58.702052] [ 58.703527] The buggy address belongs to the physical page: [ 58.709085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 58.717072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.723579] page_type: f5(slab) [ 58.726712] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.734436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.742155] page dumped because: kasan: bad access detected [ 58.747711] [ 58.749186] Memory state around the buggy address: [ 58.753964] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.761169] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.768374] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.775575] ^ [ 58.780353] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.787558] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.794759] ================================================================== [ 55.119488] ================================================================== [ 55.126413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 55.133703] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 55.141080] [ 55.142564] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 55.142614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.142629] Hardware name: WinLink E850-96 board (DT) [ 55.142649] Call trace: [ 55.142666] show_stack+0x20/0x38 (C) [ 55.142698] dump_stack_lvl+0x8c/0xd0 [ 55.142734] print_report+0x118/0x608 [ 55.142767] kasan_report+0xdc/0x128 [ 55.142801] kasan_check_range+0x100/0x1a8 [ 55.142838] __kasan_check_write+0x20/0x30 [ 55.142869] kasan_atomics_helper+0xd3c/0x4858 [ 55.142904] kasan_atomics+0x198/0x2e0 [ 55.142935] kunit_try_run_case+0x170/0x3f0 [ 55.142971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.143009] kthread+0x328/0x630 [ 55.143037] ret_from_fork+0x10/0x20 [ 55.143072] [ 55.212781] Allocated by task 312: [ 55.216166] kasan_save_stack+0x3c/0x68 [ 55.219986] kasan_save_track+0x20/0x40 [ 55.223805] kasan_save_alloc_info+0x40/0x58 [ 55.228059] __kasan_kmalloc+0xd4/0xd8 [ 55.231791] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.236305] kasan_atomics+0xb8/0x2e0 [ 55.239950] kunit_try_run_case+0x170/0x3f0 [ 55.244117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.249586] kthread+0x328/0x630 [ 55.252798] ret_from_fork+0x10/0x20 [ 55.256357] [ 55.257832] The buggy address belongs to the object at ffff000805f49a00 [ 55.257832] which belongs to the cache kmalloc-64 of size 64 [ 55.270159] The buggy address is located 0 bytes to the right of [ 55.270159] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 55.283006] [ 55.284481] The buggy address belongs to the physical page: [ 55.290039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 55.298026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.304533] page_type: f5(slab) [ 55.307668] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.315391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.323109] page dumped because: kasan: bad access detected [ 55.328664] [ 55.330140] Memory state around the buggy address: [ 55.334919] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.342123] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.349328] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.356529] ^ [ 55.361307] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.368511] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.375713] ================================================================== [ 60.645842] ================================================================== [ 60.652892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 60.660269] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 60.667647] [ 60.669129] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 60.669176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.669192] Hardware name: WinLink E850-96 board (DT) [ 60.669211] Call trace: [ 60.669227] show_stack+0x20/0x38 (C) [ 60.669260] dump_stack_lvl+0x8c/0xd0 [ 60.669295] print_report+0x118/0x608 [ 60.669328] kasan_report+0xdc/0x128 [ 60.669361] kasan_check_range+0x100/0x1a8 [ 60.669395] __kasan_check_write+0x20/0x30 [ 60.669427] kasan_atomics_helper+0x14e4/0x4858 [ 60.669461] kasan_atomics+0x198/0x2e0 [ 60.669491] kunit_try_run_case+0x170/0x3f0 [ 60.669524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.669562] kthread+0x328/0x630 [ 60.669590] ret_from_fork+0x10/0x20 [ 60.669623] [ 60.739434] Allocated by task 312: [ 60.742819] kasan_save_stack+0x3c/0x68 [ 60.746639] kasan_save_track+0x20/0x40 [ 60.750458] kasan_save_alloc_info+0x40/0x58 [ 60.754712] __kasan_kmalloc+0xd4/0xd8 [ 60.758444] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.762958] kasan_atomics+0xb8/0x2e0 [ 60.766604] kunit_try_run_case+0x170/0x3f0 [ 60.770771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.776239] kthread+0x328/0x630 [ 60.779450] ret_from_fork+0x10/0x20 [ 60.783010] [ 60.784485] The buggy address belongs to the object at ffff000805f49a00 [ 60.784485] which belongs to the cache kmalloc-64 of size 64 [ 60.796812] The buggy address is located 0 bytes to the right of [ 60.796812] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 60.809659] [ 60.811135] The buggy address belongs to the physical page: [ 60.816690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 60.824678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.831186] page_type: f5(slab) [ 60.834321] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.842044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.849762] page dumped because: kasan: bad access detected [ 60.855318] [ 60.856793] Memory state around the buggy address: [ 60.861572] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.868776] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.875981] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.883182] ^ [ 60.887960] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.895165] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.902366] ================================================================== [ 47.494868] ================================================================== [ 47.501879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 47.509164] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 47.516456] [ 47.517941] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 47.517993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.518009] Hardware name: WinLink E850-96 board (DT) [ 47.518030] Call trace: [ 47.518046] show_stack+0x20/0x38 (C) [ 47.518082] dump_stack_lvl+0x8c/0xd0 [ 47.518123] print_report+0x118/0x608 [ 47.518158] kasan_report+0xdc/0x128 [ 47.518192] kasan_check_range+0x100/0x1a8 [ 47.518231] __kasan_check_read+0x20/0x30 [ 47.518260] kasan_atomics_helper+0x2b0/0x4858 [ 47.518295] kasan_atomics+0x198/0x2e0 [ 47.518328] kunit_try_run_case+0x170/0x3f0 [ 47.518367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.518407] kthread+0x328/0x630 [ 47.518435] ret_from_fork+0x10/0x20 [ 47.518470] [ 47.588069] Allocated by task 312: [ 47.591456] kasan_save_stack+0x3c/0x68 [ 47.595274] kasan_save_track+0x20/0x40 [ 47.599093] kasan_save_alloc_info+0x40/0x58 [ 47.603346] __kasan_kmalloc+0xd4/0xd8 [ 47.607079] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.611593] kasan_atomics+0xb8/0x2e0 [ 47.615239] kunit_try_run_case+0x170/0x3f0 [ 47.619405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.624874] kthread+0x328/0x630 [ 47.628086] ret_from_fork+0x10/0x20 [ 47.631645] [ 47.633121] The buggy address belongs to the object at ffff000805f49a00 [ 47.633121] which belongs to the cache kmalloc-64 of size 64 [ 47.645447] The buggy address is located 0 bytes to the right of [ 47.645447] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 47.658294] [ 47.659771] The buggy address belongs to the physical page: [ 47.665330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 47.673311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.679821] page_type: f5(slab) [ 47.682957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.690680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.698397] page dumped because: kasan: bad access detected [ 47.703953] [ 47.705428] Memory state around the buggy address: [ 47.710208] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.717411] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.724616] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.731817] ^ [ 47.736595] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.743800] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.751002] ================================================================== [ 51.180189] ================================================================== [ 51.187237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 51.194526] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 51.201904] [ 51.203386] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 51.203435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.203452] Hardware name: WinLink E850-96 board (DT) [ 51.203473] Call trace: [ 51.203488] show_stack+0x20/0x38 (C) [ 51.203521] dump_stack_lvl+0x8c/0xd0 [ 51.203557] print_report+0x118/0x608 [ 51.203590] kasan_report+0xdc/0x128 [ 51.203625] kasan_check_range+0x100/0x1a8 [ 51.203662] __kasan_check_write+0x20/0x30 [ 51.203692] kasan_atomics_helper+0x7cc/0x4858 [ 51.203726] kasan_atomics+0x198/0x2e0 [ 51.203756] kunit_try_run_case+0x170/0x3f0 [ 51.203790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.203828] kthread+0x328/0x630 [ 51.203856] ret_from_fork+0x10/0x20 [ 51.203887] [ 51.273604] Allocated by task 312: [ 51.276989] kasan_save_stack+0x3c/0x68 [ 51.280809] kasan_save_track+0x20/0x40 [ 51.284628] kasan_save_alloc_info+0x40/0x58 [ 51.288881] __kasan_kmalloc+0xd4/0xd8 [ 51.292614] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.297128] kasan_atomics+0xb8/0x2e0 [ 51.300774] kunit_try_run_case+0x170/0x3f0 [ 51.304940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.310409] kthread+0x328/0x630 [ 51.313621] ret_from_fork+0x10/0x20 [ 51.317180] [ 51.318655] The buggy address belongs to the object at ffff000805f49a00 [ 51.318655] which belongs to the cache kmalloc-64 of size 64 [ 51.330982] The buggy address is located 0 bytes to the right of [ 51.330982] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 51.343829] [ 51.345304] The buggy address belongs to the physical page: [ 51.350860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 51.358848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.365356] page_type: f5(slab) [ 51.368489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.376213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.383932] page dumped because: kasan: bad access detected [ 51.389488] [ 51.390963] Memory state around the buggy address: [ 51.395741] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.402946] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.410151] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.417351] ^ [ 51.422130] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.429335] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.436536] ================================================================== [ 47.758436] ================================================================== [ 47.765413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 47.772789] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 47.780080] [ 47.781565] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 47.781618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.781636] Hardware name: WinLink E850-96 board (DT) [ 47.781656] Call trace: [ 47.781670] show_stack+0x20/0x38 (C) [ 47.781706] dump_stack_lvl+0x8c/0xd0 [ 47.781741] print_report+0x118/0x608 [ 47.781776] kasan_report+0xdc/0x128 [ 47.781812] __asan_report_load4_noabort+0x20/0x30 [ 47.781852] kasan_atomics_helper+0x40fc/0x4858 [ 47.781886] kasan_atomics+0x198/0x2e0 [ 47.781917] kunit_try_run_case+0x170/0x3f0 [ 47.781954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.781993] kthread+0x328/0x630 [ 47.782019] ret_from_fork+0x10/0x20 [ 47.782053] [ 47.848482] Allocated by task 312: [ 47.851868] kasan_save_stack+0x3c/0x68 [ 47.855686] kasan_save_track+0x20/0x40 [ 47.859506] kasan_save_alloc_info+0x40/0x58 [ 47.863760] __kasan_kmalloc+0xd4/0xd8 [ 47.867491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.872006] kasan_atomics+0xb8/0x2e0 [ 47.875651] kunit_try_run_case+0x170/0x3f0 [ 47.879818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.885287] kthread+0x328/0x630 [ 47.888499] ret_from_fork+0x10/0x20 [ 47.892058] [ 47.893534] The buggy address belongs to the object at ffff000805f49a00 [ 47.893534] which belongs to the cache kmalloc-64 of size 64 [ 47.905862] The buggy address is located 0 bytes to the right of [ 47.905862] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 47.918707] [ 47.920184] The buggy address belongs to the physical page: [ 47.925741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 47.933726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.940234] page_type: f5(slab) [ 47.943369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.951091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.958810] page dumped because: kasan: bad access detected [ 47.964365] [ 47.965841] Memory state around the buggy address: [ 47.970621] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.977824] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.985029] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.992230] ^ [ 47.997008] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.004212] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.011413] ================================================================== [ 51.707616] ================================================================== [ 51.714659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 51.722035] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 51.729327] [ 51.730809] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 51.730854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.730872] Hardware name: WinLink E850-96 board (DT) [ 51.730893] Call trace: [ 51.730907] show_stack+0x20/0x38 (C) [ 51.730940] dump_stack_lvl+0x8c/0xd0 [ 51.730976] print_report+0x118/0x608 [ 51.731010] kasan_report+0xdc/0x128 [ 51.731044] __asan_report_load4_noabort+0x20/0x30 [ 51.731083] kasan_atomics_helper+0x42d8/0x4858 [ 51.731117] kasan_atomics+0x198/0x2e0 [ 51.731149] kunit_try_run_case+0x170/0x3f0 [ 51.731182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.731221] kthread+0x328/0x630 [ 51.731250] ret_from_fork+0x10/0x20 [ 51.731284] [ 51.797728] Allocated by task 312: [ 51.801114] kasan_save_stack+0x3c/0x68 [ 51.804932] kasan_save_track+0x20/0x40 [ 51.808752] kasan_save_alloc_info+0x40/0x58 [ 51.813006] __kasan_kmalloc+0xd4/0xd8 [ 51.816738] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.821252] kasan_atomics+0xb8/0x2e0 [ 51.824898] kunit_try_run_case+0x170/0x3f0 [ 51.829064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.834533] kthread+0x328/0x630 [ 51.837745] ret_from_fork+0x10/0x20 [ 51.841304] [ 51.842779] The buggy address belongs to the object at ffff000805f49a00 [ 51.842779] which belongs to the cache kmalloc-64 of size 64 [ 51.855106] The buggy address is located 0 bytes to the right of [ 51.855106] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 51.867953] [ 51.869429] The buggy address belongs to the physical page: [ 51.874984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 51.882972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.889480] page_type: f5(slab) [ 51.892614] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.900338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.908056] page dumped because: kasan: bad access detected [ 51.913612] [ 51.915087] Memory state around the buggy address: [ 51.919866] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.927070] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.934275] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.941476] ^ [ 51.946254] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.953459] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.960660] ================================================================== [ 51.443918] ================================================================== [ 51.450948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 51.458237] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 51.465615] [ 51.467098] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 51.467147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.467165] Hardware name: WinLink E850-96 board (DT) [ 51.467185] Call trace: [ 51.467202] show_stack+0x20/0x38 (C) [ 51.467234] dump_stack_lvl+0x8c/0xd0 [ 51.467272] print_report+0x118/0x608 [ 51.467305] kasan_report+0xdc/0x128 [ 51.467338] kasan_check_range+0x100/0x1a8 [ 51.467374] __kasan_check_write+0x20/0x30 [ 51.467405] kasan_atomics_helper+0x894/0x4858 [ 51.467437] kasan_atomics+0x198/0x2e0 [ 51.467469] kunit_try_run_case+0x170/0x3f0 [ 51.467504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.467544] kthread+0x328/0x630 [ 51.467571] ret_from_fork+0x10/0x20 [ 51.467604] [ 51.537315] Allocated by task 312: [ 51.540701] kasan_save_stack+0x3c/0x68 [ 51.544520] kasan_save_track+0x20/0x40 [ 51.548339] kasan_save_alloc_info+0x40/0x58 [ 51.552593] __kasan_kmalloc+0xd4/0xd8 [ 51.556325] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.560839] kasan_atomics+0xb8/0x2e0 [ 51.564485] kunit_try_run_case+0x170/0x3f0 [ 51.568652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.574120] kthread+0x328/0x630 [ 51.577332] ret_from_fork+0x10/0x20 [ 51.580891] [ 51.582367] The buggy address belongs to the object at ffff000805f49a00 [ 51.582367] which belongs to the cache kmalloc-64 of size 64 [ 51.594693] The buggy address is located 0 bytes to the right of [ 51.594693] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 51.607540] [ 51.609016] The buggy address belongs to the physical page: [ 51.614572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 51.622558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.629068] page_type: f5(slab) [ 51.632200] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.639925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.647644] page dumped because: kasan: bad access detected [ 51.653199] [ 51.654674] Memory state around the buggy address: [ 51.659453] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.666658] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.673862] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.681063] ^ [ 51.685841] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.693046] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.700247] ================================================================== [ 49.334217] ================================================================== [ 49.341258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 49.348546] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 49.355924] [ 49.357408] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 49.357457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.357475] Hardware name: WinLink E850-96 board (DT) [ 49.357497] Call trace: [ 49.357512] show_stack+0x20/0x38 (C) [ 49.357545] dump_stack_lvl+0x8c/0xd0 [ 49.357583] print_report+0x118/0x608 [ 49.357619] kasan_report+0xdc/0x128 [ 49.357652] kasan_check_range+0x100/0x1a8 [ 49.357686] __kasan_check_write+0x20/0x30 [ 49.357717] kasan_atomics_helper+0x4e4/0x4858 [ 49.357749] kasan_atomics+0x198/0x2e0 [ 49.357781] kunit_try_run_case+0x170/0x3f0 [ 49.357816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.357854] kthread+0x328/0x630 [ 49.357883] ret_from_fork+0x10/0x20 [ 49.357915] [ 49.427625] Allocated by task 312: [ 49.431010] kasan_save_stack+0x3c/0x68 [ 49.434829] kasan_save_track+0x20/0x40 [ 49.438649] kasan_save_alloc_info+0x40/0x58 [ 49.442903] __kasan_kmalloc+0xd4/0xd8 [ 49.446635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.451149] kasan_atomics+0xb8/0x2e0 [ 49.454794] kunit_try_run_case+0x170/0x3f0 [ 49.458961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.464430] kthread+0x328/0x630 [ 49.467642] ret_from_fork+0x10/0x20 [ 49.471201] [ 49.472676] The buggy address belongs to the object at ffff000805f49a00 [ 49.472676] which belongs to the cache kmalloc-64 of size 64 [ 49.485003] The buggy address is located 0 bytes to the right of [ 49.485003] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 49.497850] [ 49.499326] The buggy address belongs to the physical page: [ 49.504881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 49.512869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.519377] page_type: f5(slab) [ 49.522510] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.530235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.537953] page dumped because: kasan: bad access detected [ 49.543508] [ 49.544984] Memory state around the buggy address: [ 49.549762] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.556967] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.564172] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.571373] ^ [ 49.576151] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.583356] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.590556] ================================================================== [ 56.431167] ================================================================== [ 56.438200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 56.445575] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 56.452953] [ 56.454437] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 56.454484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.454501] Hardware name: WinLink E850-96 board (DT) [ 56.454521] Call trace: [ 56.454534] show_stack+0x20/0x38 (C) [ 56.454567] dump_stack_lvl+0x8c/0xd0 [ 56.454604] print_report+0x118/0x608 [ 56.454637] kasan_report+0xdc/0x128 [ 56.454671] __asan_report_store8_noabort+0x20/0x30 [ 56.454703] kasan_atomics_helper+0x3e5c/0x4858 [ 56.454736] kasan_atomics+0x198/0x2e0 [ 56.454768] kunit_try_run_case+0x170/0x3f0 [ 56.454804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.454842] kthread+0x328/0x630 [ 56.454868] ret_from_fork+0x10/0x20 [ 56.454900] [ 56.521442] Allocated by task 312: [ 56.524827] kasan_save_stack+0x3c/0x68 [ 56.528647] kasan_save_track+0x20/0x40 [ 56.532466] kasan_save_alloc_info+0x40/0x58 [ 56.536719] __kasan_kmalloc+0xd4/0xd8 [ 56.540452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.544966] kasan_atomics+0xb8/0x2e0 [ 56.548612] kunit_try_run_case+0x170/0x3f0 [ 56.552778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.558247] kthread+0x328/0x630 [ 56.561459] ret_from_fork+0x10/0x20 [ 56.565018] [ 56.566493] The buggy address belongs to the object at ffff000805f49a00 [ 56.566493] which belongs to the cache kmalloc-64 of size 64 [ 56.578820] The buggy address is located 0 bytes to the right of [ 56.578820] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 56.591667] [ 56.593142] The buggy address belongs to the physical page: [ 56.598698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 56.606683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.613194] page_type: f5(slab) [ 56.616327] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.624051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.631770] page dumped because: kasan: bad access detected [ 56.637326] [ 56.638801] Memory state around the buggy address: [ 56.643579] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.650784] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.657989] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.665190] ^ [ 56.669968] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.677172] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.684374] ================================================================== [ 54.071162] ================================================================== [ 54.078166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 54.085455] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 54.092833] [ 54.094315] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 54.094361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.094378] Hardware name: WinLink E850-96 board (DT) [ 54.094397] Call trace: [ 54.094411] show_stack+0x20/0x38 (C) [ 54.094443] dump_stack_lvl+0x8c/0xd0 [ 54.094480] print_report+0x118/0x608 [ 54.094513] kasan_report+0xdc/0x128 [ 54.094546] kasan_check_range+0x100/0x1a8 [ 54.094584] __kasan_check_write+0x20/0x30 [ 54.094615] kasan_atomics_helper+0xc08/0x4858 [ 54.094649] kasan_atomics+0x198/0x2e0 [ 54.094679] kunit_try_run_case+0x170/0x3f0 [ 54.094713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.094751] kthread+0x328/0x630 [ 54.094780] ret_from_fork+0x10/0x20 [ 54.094813] [ 54.164533] Allocated by task 312: [ 54.167918] kasan_save_stack+0x3c/0x68 [ 54.171737] kasan_save_track+0x20/0x40 [ 54.175557] kasan_save_alloc_info+0x40/0x58 [ 54.179810] __kasan_kmalloc+0xd4/0xd8 [ 54.183543] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.188057] kasan_atomics+0xb8/0x2e0 [ 54.191702] kunit_try_run_case+0x170/0x3f0 [ 54.195869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.201338] kthread+0x328/0x630 [ 54.204550] ret_from_fork+0x10/0x20 [ 54.208108] [ 54.209584] The buggy address belongs to the object at ffff000805f49a00 [ 54.209584] which belongs to the cache kmalloc-64 of size 64 [ 54.221911] The buggy address is located 0 bytes to the right of [ 54.221911] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 54.234758] [ 54.236233] The buggy address belongs to the physical page: [ 54.241789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 54.249778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.256285] page_type: f5(slab) [ 54.259418] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.267143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.274861] page dumped because: kasan: bad access detected [ 54.280416] [ 54.281892] Memory state around the buggy address: [ 54.286671] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.293875] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.301080] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.308281] ^ [ 54.313059] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.320264] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.327464] ================================================================== [ 56.167435] ================================================================== [ 56.174487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 56.181777] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 56.189155] [ 56.190636] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 56.190683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.190699] Hardware name: WinLink E850-96 board (DT) [ 56.190717] Call trace: [ 56.190733] show_stack+0x20/0x38 (C) [ 56.190766] dump_stack_lvl+0x8c/0xd0 [ 56.190801] print_report+0x118/0x608 [ 56.190832] kasan_report+0xdc/0x128 [ 56.190865] kasan_check_range+0x100/0x1a8 [ 56.190901] __kasan_check_write+0x20/0x30 [ 56.190932] kasan_atomics_helper+0xe44/0x4858 [ 56.190966] kasan_atomics+0x198/0x2e0 [ 56.190997] kunit_try_run_case+0x170/0x3f0 [ 56.191032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.191070] kthread+0x328/0x630 [ 56.191098] ret_from_fork+0x10/0x20 [ 56.191128] [ 56.260855] Allocated by task 312: [ 56.264241] kasan_save_stack+0x3c/0x68 [ 56.268060] kasan_save_track+0x20/0x40 [ 56.271879] kasan_save_alloc_info+0x40/0x58 [ 56.276133] __kasan_kmalloc+0xd4/0xd8 [ 56.279866] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.284380] kasan_atomics+0xb8/0x2e0 [ 56.288025] kunit_try_run_case+0x170/0x3f0 [ 56.292192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.297661] kthread+0x328/0x630 [ 56.300872] ret_from_fork+0x10/0x20 [ 56.304431] [ 56.305907] The buggy address belongs to the object at ffff000805f49a00 [ 56.305907] which belongs to the cache kmalloc-64 of size 64 [ 56.318234] The buggy address is located 0 bytes to the right of [ 56.318234] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 56.331080] [ 56.332556] The buggy address belongs to the physical page: [ 56.338112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 56.346098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.352608] page_type: f5(slab) [ 56.355741] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.363465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.371184] page dumped because: kasan: bad access detected [ 56.376739] [ 56.378214] Memory state around the buggy address: [ 56.382993] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.390198] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.397402] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.404603] ^ [ 56.409381] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.416586] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.423787] ================================================================== [ 49.861724] ================================================================== [ 49.868679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 49.875969] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 49.883347] [ 49.884831] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 49.884883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.884899] Hardware name: WinLink E850-96 board (DT) [ 49.884920] Call trace: [ 49.884934] show_stack+0x20/0x38 (C) [ 49.884967] dump_stack_lvl+0x8c/0xd0 [ 49.885005] print_report+0x118/0x608 [ 49.885038] kasan_report+0xdc/0x128 [ 49.885071] kasan_check_range+0x100/0x1a8 [ 49.885107] __kasan_check_write+0x20/0x30 [ 49.885137] kasan_atomics_helper+0x5b4/0x4858 [ 49.885170] kasan_atomics+0x198/0x2e0 [ 49.885201] kunit_try_run_case+0x170/0x3f0 [ 49.885235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.885274] kthread+0x328/0x630 [ 49.885302] ret_from_fork+0x10/0x20 [ 49.885331] [ 49.955047] Allocated by task 312: [ 49.958433] kasan_save_stack+0x3c/0x68 [ 49.962252] kasan_save_track+0x20/0x40 [ 49.966072] kasan_save_alloc_info+0x40/0x58 [ 49.970325] __kasan_kmalloc+0xd4/0xd8 [ 49.974058] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.978571] kasan_atomics+0xb8/0x2e0 [ 49.982217] kunit_try_run_case+0x170/0x3f0 [ 49.986384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.991853] kthread+0x328/0x630 [ 49.995064] ret_from_fork+0x10/0x20 [ 49.998623] [ 50.000099] The buggy address belongs to the object at ffff000805f49a00 [ 50.000099] which belongs to the cache kmalloc-64 of size 64 [ 50.012425] The buggy address is located 0 bytes to the right of [ 50.012425] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 50.025272] [ 50.026749] The buggy address belongs to the physical page: [ 50.032304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 50.040290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.046799] page_type: f5(slab) [ 50.049935] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.057657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.065376] page dumped because: kasan: bad access detected [ 50.070931] [ 50.072406] Memory state around the buggy address: [ 50.077185] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.084390] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.091594] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.098795] ^ [ 50.103574] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.110778] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.117979] ================================================================== [ 46.707046] ================================================================== [ 46.714042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 46.721415] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 46.728795] [ 46.730282] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 46.730339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.730357] Hardware name: WinLink E850-96 board (DT) [ 46.730378] Call trace: [ 46.730393] show_stack+0x20/0x38 (C) [ 46.730430] dump_stack_lvl+0x8c/0xd0 [ 46.730468] print_report+0x118/0x608 [ 46.730503] kasan_report+0xdc/0x128 [ 46.730539] __asan_report_store4_noabort+0x20/0x30 [ 46.730575] kasan_atomics_helper+0x3f7c/0x4858 [ 46.730610] kasan_atomics+0x198/0x2e0 [ 46.730645] kunit_try_run_case+0x170/0x3f0 [ 46.730681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.730721] kthread+0x328/0x630 [ 46.730753] ret_from_fork+0x10/0x20 [ 46.730790] [ 46.797283] Allocated by task 312: [ 46.800670] kasan_save_stack+0x3c/0x68 [ 46.804487] kasan_save_track+0x20/0x40 [ 46.808306] kasan_save_alloc_info+0x40/0x58 [ 46.812560] __kasan_kmalloc+0xd4/0xd8 [ 46.816293] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.820807] kasan_atomics+0xb8/0x2e0 [ 46.824452] kunit_try_run_case+0x170/0x3f0 [ 46.828619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.834087] kthread+0x328/0x630 [ 46.837299] ret_from_fork+0x10/0x20 [ 46.840860] [ 46.842336] The buggy address belongs to the object at ffff000805f49a00 [ 46.842336] which belongs to the cache kmalloc-64 of size 64 [ 46.854662] The buggy address is located 0 bytes to the right of [ 46.854662] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 46.867507] [ 46.868985] The buggy address belongs to the physical page: [ 46.874542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 46.882527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.889035] page_type: f5(slab) [ 46.892170] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.899892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.907611] page dumped because: kasan: bad access detected [ 46.913166] [ 46.914641] Memory state around the buggy address: [ 46.919421] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.926624] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.933831] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.941030] ^ [ 46.945808] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.953013] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.960214] ================================================================== [ 52.231709] ================================================================== [ 52.238783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 52.246072] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 52.253451] [ 52.254933] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 52.254984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.254998] Hardware name: WinLink E850-96 board (DT) [ 52.255018] Call trace: [ 52.255031] show_stack+0x20/0x38 (C) [ 52.255065] dump_stack_lvl+0x8c/0xd0 [ 52.255100] print_report+0x118/0x608 [ 52.255133] kasan_report+0xdc/0x128 [ 52.255166] kasan_check_range+0x100/0x1a8 [ 52.255201] __kasan_check_write+0x20/0x30 [ 52.255230] kasan_atomics_helper+0x99c/0x4858 [ 52.255265] kasan_atomics+0x198/0x2e0 [ 52.255296] kunit_try_run_case+0x170/0x3f0 [ 52.255329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.255367] kthread+0x328/0x630 [ 52.255396] ret_from_fork+0x10/0x20 [ 52.255428] [ 52.325151] Allocated by task 312: [ 52.328536] kasan_save_stack+0x3c/0x68 [ 52.332355] kasan_save_track+0x20/0x40 [ 52.336175] kasan_save_alloc_info+0x40/0x58 [ 52.340428] __kasan_kmalloc+0xd4/0xd8 [ 52.344161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.348675] kasan_atomics+0xb8/0x2e0 [ 52.352321] kunit_try_run_case+0x170/0x3f0 [ 52.356487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.361956] kthread+0x328/0x630 [ 52.365168] ret_from_fork+0x10/0x20 [ 52.368727] [ 52.370202] The buggy address belongs to the object at ffff000805f49a00 [ 52.370202] which belongs to the cache kmalloc-64 of size 64 [ 52.382529] The buggy address is located 0 bytes to the right of [ 52.382529] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 52.395375] [ 52.396851] The buggy address belongs to the physical page: [ 52.402407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 52.410393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.416903] page_type: f5(slab) [ 52.420036] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.427760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.435479] page dumped because: kasan: bad access detected [ 52.441034] [ 52.442510] Memory state around the buggy address: [ 52.447288] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.454493] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.461698] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.468898] ^ [ 52.473677] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.480881] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.488082] ================================================================== [ 48.543148] ================================================================== [ 48.550124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 48.557413] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 48.564791] [ 48.566276] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 48.566329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.566347] Hardware name: WinLink E850-96 board (DT) [ 48.566371] Call trace: [ 48.566387] show_stack+0x20/0x38 (C) [ 48.566426] dump_stack_lvl+0x8c/0xd0 [ 48.566464] print_report+0x118/0x608 [ 48.566502] kasan_report+0xdc/0x128 [ 48.566535] kasan_check_range+0x100/0x1a8 [ 48.566574] __kasan_check_write+0x20/0x30 [ 48.566605] kasan_atomics_helper+0x3ac/0x4858 [ 48.566639] kasan_atomics+0x198/0x2e0 [ 48.566669] kunit_try_run_case+0x170/0x3f0 [ 48.566705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.566743] kthread+0x328/0x630 [ 48.566771] ret_from_fork+0x10/0x20 [ 48.566805] [ 48.636491] Allocated by task 312: [ 48.639878] kasan_save_stack+0x3c/0x68 [ 48.643695] kasan_save_track+0x20/0x40 [ 48.647515] kasan_save_alloc_info+0x40/0x58 [ 48.651768] __kasan_kmalloc+0xd4/0xd8 [ 48.655501] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.660015] kasan_atomics+0xb8/0x2e0 [ 48.663661] kunit_try_run_case+0x170/0x3f0 [ 48.667827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.673296] kthread+0x328/0x630 [ 48.676508] ret_from_fork+0x10/0x20 [ 48.680067] [ 48.681544] The buggy address belongs to the object at ffff000805f49a00 [ 48.681544] which belongs to the cache kmalloc-64 of size 64 [ 48.693869] The buggy address is located 0 bytes to the right of [ 48.693869] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 48.706716] [ 48.708193] The buggy address belongs to the physical page: [ 48.713752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 48.721735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.728243] page_type: f5(slab) [ 48.731378] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.739100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.746819] page dumped because: kasan: bad access detected [ 48.752374] [ 48.753850] Memory state around the buggy address: [ 48.758630] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.765833] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.773038] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.780239] ^ [ 48.785017] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.792222] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.799422] ================================================================== [ 55.643509] ================================================================== [ 55.650537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 55.657827] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 55.665118] [ 55.666600] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 55.666652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.666669] Hardware name: WinLink E850-96 board (DT) [ 55.666689] Call trace: [ 55.666705] show_stack+0x20/0x38 (C) [ 55.666737] dump_stack_lvl+0x8c/0xd0 [ 55.666772] print_report+0x118/0x608 [ 55.666805] kasan_report+0xdc/0x128 [ 55.666840] kasan_check_range+0x100/0x1a8 [ 55.666878] __kasan_check_read+0x20/0x30 [ 55.666909] kasan_atomics_helper+0xdd4/0x4858 [ 55.666943] kasan_atomics+0x198/0x2e0 [ 55.666977] kunit_try_run_case+0x170/0x3f0 [ 55.667010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.667047] kthread+0x328/0x630 [ 55.667074] ret_from_fork+0x10/0x20 [ 55.667107] [ 55.736731] Allocated by task 312: [ 55.740117] kasan_save_stack+0x3c/0x68 [ 55.743936] kasan_save_track+0x20/0x40 [ 55.747756] kasan_save_alloc_info+0x40/0x58 [ 55.752009] __kasan_kmalloc+0xd4/0xd8 [ 55.755742] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.760255] kasan_atomics+0xb8/0x2e0 [ 55.763901] kunit_try_run_case+0x170/0x3f0 [ 55.768068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.773536] kthread+0x328/0x630 [ 55.776748] ret_from_fork+0x10/0x20 [ 55.780307] [ 55.781782] The buggy address belongs to the object at ffff000805f49a00 [ 55.781782] which belongs to the cache kmalloc-64 of size 64 [ 55.794109] The buggy address is located 0 bytes to the right of [ 55.794109] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 55.806956] [ 55.808432] The buggy address belongs to the physical page: [ 55.813988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 55.821975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.828484] page_type: f5(slab) [ 55.831619] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.839341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.847060] page dumped because: kasan: bad access detected [ 55.852615] [ 55.854091] Memory state around the buggy address: [ 55.858869] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.866074] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.873278] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.880479] ^ [ 55.885257] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.892462] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.899663] ================================================================== [ 57.482875] ================================================================== [ 57.489921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 57.497209] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 57.504587] [ 57.506068] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 57.506117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.506134] Hardware name: WinLink E850-96 board (DT) [ 57.506152] Call trace: [ 57.506166] show_stack+0x20/0x38 (C) [ 57.506199] dump_stack_lvl+0x8c/0xd0 [ 57.506234] print_report+0x118/0x608 [ 57.506268] kasan_report+0xdc/0x128 [ 57.506300] kasan_check_range+0x100/0x1a8 [ 57.506335] __kasan_check_write+0x20/0x30 [ 57.506365] kasan_atomics_helper+0xff0/0x4858 [ 57.506399] kasan_atomics+0x198/0x2e0 [ 57.506429] kunit_try_run_case+0x170/0x3f0 [ 57.506463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.506502] kthread+0x328/0x630 [ 57.506529] ret_from_fork+0x10/0x20 [ 57.506561] [ 57.576287] Allocated by task 312: [ 57.579673] kasan_save_stack+0x3c/0x68 [ 57.583492] kasan_save_track+0x20/0x40 [ 57.587311] kasan_save_alloc_info+0x40/0x58 [ 57.591565] __kasan_kmalloc+0xd4/0xd8 [ 57.595297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.599811] kasan_atomics+0xb8/0x2e0 [ 57.603457] kunit_try_run_case+0x170/0x3f0 [ 57.607624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.613092] kthread+0x328/0x630 [ 57.616304] ret_from_fork+0x10/0x20 [ 57.619863] [ 57.621338] The buggy address belongs to the object at ffff000805f49a00 [ 57.621338] which belongs to the cache kmalloc-64 of size 64 [ 57.633665] The buggy address is located 0 bytes to the right of [ 57.633665] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 57.646512] [ 57.647988] The buggy address belongs to the physical page: [ 57.653544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 57.661530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.668039] page_type: f5(slab) [ 57.671172] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.678897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.686615] page dumped because: kasan: bad access detected [ 57.692171] [ 57.693646] Memory state around the buggy address: [ 57.698425] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.705629] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.712834] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.720035] ^ [ 57.724813] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.732018] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.739219] ================================================================== [ 59.857748] ================================================================== [ 59.864713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 59.872087] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 59.879378] [ 59.880861] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 59.880910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.880928] Hardware name: WinLink E850-96 board (DT) [ 59.880948] Call trace: [ 59.880963] show_stack+0x20/0x38 (C) [ 59.880999] dump_stack_lvl+0x8c/0xd0 [ 59.881035] print_report+0x118/0x608 [ 59.881071] kasan_report+0xdc/0x128 [ 59.881102] __asan_report_load8_noabort+0x20/0x30 [ 59.881142] kasan_atomics_helper+0x3f04/0x4858 [ 59.881176] kasan_atomics+0x198/0x2e0 [ 59.881207] kunit_try_run_case+0x170/0x3f0 [ 59.881243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.881282] kthread+0x328/0x630 [ 59.881309] ret_from_fork+0x10/0x20 [ 59.881343] [ 59.947779] Allocated by task 312: [ 59.951165] kasan_save_stack+0x3c/0x68 [ 59.954984] kasan_save_track+0x20/0x40 [ 59.958804] kasan_save_alloc_info+0x40/0x58 [ 59.963057] __kasan_kmalloc+0xd4/0xd8 [ 59.966789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.971303] kasan_atomics+0xb8/0x2e0 [ 59.974949] kunit_try_run_case+0x170/0x3f0 [ 59.979116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.984584] kthread+0x328/0x630 [ 59.987796] ret_from_fork+0x10/0x20 [ 59.991355] [ 59.992831] The buggy address belongs to the object at ffff000805f49a00 [ 59.992831] which belongs to the cache kmalloc-64 of size 64 [ 60.005158] The buggy address is located 0 bytes to the right of [ 60.005158] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 60.018004] [ 60.019481] The buggy address belongs to the physical page: [ 60.025037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 60.033025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.039531] page_type: f5(slab) [ 60.042665] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.050389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.058108] page dumped because: kasan: bad access detected [ 60.063663] [ 60.065138] Memory state around the buggy address: [ 60.069918] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.077122] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.084326] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.091527] ^ [ 60.096305] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.103510] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.110711] ================================================================== [ 55.907054] ================================================================== [ 55.914075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 55.921451] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 55.928743] [ 55.930224] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 55.930269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.930284] Hardware name: WinLink E850-96 board (DT) [ 55.930303] Call trace: [ 55.930317] show_stack+0x20/0x38 (C) [ 55.930349] dump_stack_lvl+0x8c/0xd0 [ 55.930385] print_report+0x118/0x608 [ 55.930417] kasan_report+0xdc/0x128 [ 55.930451] __asan_report_load8_noabort+0x20/0x30 [ 55.930490] kasan_atomics_helper+0x3f58/0x4858 [ 55.930525] kasan_atomics+0x198/0x2e0 [ 55.930556] kunit_try_run_case+0x170/0x3f0 [ 55.930591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.930628] kthread+0x328/0x630 [ 55.930657] ret_from_fork+0x10/0x20 [ 55.930688] [ 55.997144] Allocated by task 312: [ 56.000530] kasan_save_stack+0x3c/0x68 [ 56.004349] kasan_save_track+0x20/0x40 [ 56.008168] kasan_save_alloc_info+0x40/0x58 [ 56.012422] __kasan_kmalloc+0xd4/0xd8 [ 56.016154] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.020668] kasan_atomics+0xb8/0x2e0 [ 56.024314] kunit_try_run_case+0x170/0x3f0 [ 56.028481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.033949] kthread+0x328/0x630 [ 56.037161] ret_from_fork+0x10/0x20 [ 56.040720] [ 56.042195] The buggy address belongs to the object at ffff000805f49a00 [ 56.042195] which belongs to the cache kmalloc-64 of size 64 [ 56.054522] The buggy address is located 0 bytes to the right of [ 56.054522] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 56.067369] [ 56.068845] The buggy address belongs to the physical page: [ 56.074401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 56.082388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.088896] page_type: f5(slab) [ 56.092029] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.099754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.107472] page dumped because: kasan: bad access detected [ 56.113028] [ 56.114504] Memory state around the buggy address: [ 56.119282] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.126486] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.133691] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.140892] ^ [ 56.145670] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.152875] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.160075] ================================================================== [ 57.746600] ================================================================== [ 57.753632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 57.761007] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 57.768385] [ 57.769867] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 57.769915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.769933] Hardware name: WinLink E850-96 board (DT) [ 57.769950] Call trace: [ 57.769967] show_stack+0x20/0x38 (C) [ 57.769998] dump_stack_lvl+0x8c/0xd0 [ 57.770031] print_report+0x118/0x608 [ 57.770064] kasan_report+0xdc/0x128 [ 57.770100] kasan_check_range+0x100/0x1a8 [ 57.770134] __kasan_check_write+0x20/0x30 [ 57.770165] kasan_atomics_helper+0x1058/0x4858 [ 57.770198] kasan_atomics+0x198/0x2e0 [ 57.770229] kunit_try_run_case+0x170/0x3f0 [ 57.770265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.770303] kthread+0x328/0x630 [ 57.770332] ret_from_fork+0x10/0x20 [ 57.770363] [ 57.840172] Allocated by task 312: [ 57.843558] kasan_save_stack+0x3c/0x68 [ 57.847377] kasan_save_track+0x20/0x40 [ 57.851196] kasan_save_alloc_info+0x40/0x58 [ 57.855450] __kasan_kmalloc+0xd4/0xd8 [ 57.859182] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.863696] kasan_atomics+0xb8/0x2e0 [ 57.867342] kunit_try_run_case+0x170/0x3f0 [ 57.871508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.876977] kthread+0x328/0x630 [ 57.880189] ret_from_fork+0x10/0x20 [ 57.883747] [ 57.885223] The buggy address belongs to the object at ffff000805f49a00 [ 57.885223] which belongs to the cache kmalloc-64 of size 64 [ 57.897550] The buggy address is located 0 bytes to the right of [ 57.897550] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 57.910396] [ 57.911873] The buggy address belongs to the physical page: [ 57.917429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 57.925415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.931924] page_type: f5(slab) [ 57.935057] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.942782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.950500] page dumped because: kasan: bad access detected [ 57.956055] [ 57.957531] Memory state around the buggy address: [ 57.962310] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.969515] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.976719] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.983920] ^ [ 57.988698] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.995903] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.003104] ================================================================== [ 50.125343] ================================================================== [ 50.132392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 50.139681] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 50.147058] [ 50.148542] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 50.148591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.148607] Hardware name: WinLink E850-96 board (DT) [ 50.148628] Call trace: [ 50.148641] show_stack+0x20/0x38 (C) [ 50.148676] dump_stack_lvl+0x8c/0xd0 [ 50.148714] print_report+0x118/0x608 [ 50.148748] kasan_report+0xdc/0x128 [ 50.148782] kasan_check_range+0x100/0x1a8 [ 50.148817] __kasan_check_write+0x20/0x30 [ 50.148846] kasan_atomics_helper+0x61c/0x4858 [ 50.148880] kasan_atomics+0x198/0x2e0 [ 50.148910] kunit_try_run_case+0x170/0x3f0 [ 50.148945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.148983] kthread+0x328/0x630 [ 50.149010] ret_from_fork+0x10/0x20 [ 50.149043] [ 50.218758] Allocated by task 312: [ 50.222144] kasan_save_stack+0x3c/0x68 [ 50.225963] kasan_save_track+0x20/0x40 [ 50.229783] kasan_save_alloc_info+0x40/0x58 [ 50.234036] __kasan_kmalloc+0xd4/0xd8 [ 50.237769] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.242283] kasan_atomics+0xb8/0x2e0 [ 50.245929] kunit_try_run_case+0x170/0x3f0 [ 50.250095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.255564] kthread+0x328/0x630 [ 50.258775] ret_from_fork+0x10/0x20 [ 50.262334] [ 50.263810] The buggy address belongs to the object at ffff000805f49a00 [ 50.263810] which belongs to the cache kmalloc-64 of size 64 [ 50.276137] The buggy address is located 0 bytes to the right of [ 50.276137] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 50.288983] [ 50.290459] The buggy address belongs to the physical page: [ 50.296015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 50.304001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.310511] page_type: f5(slab) [ 50.313644] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.321368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.329087] page dumped because: kasan: bad access detected [ 50.334642] [ 50.336118] Memory state around the buggy address: [ 50.340896] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.348101] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.355306] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.362506] ^ [ 50.367285] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.374489] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.381690] ================================================================== [ 54.334849] ================================================================== [ 54.341876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 54.349253] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 54.356544] [ 54.358026] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 54.358076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.358092] Hardware name: WinLink E850-96 board (DT) [ 54.358113] Call trace: [ 54.358130] show_stack+0x20/0x38 (C) [ 54.358164] dump_stack_lvl+0x8c/0xd0 [ 54.358200] print_report+0x118/0x608 [ 54.358233] kasan_report+0xdc/0x128 [ 54.358267] __asan_report_load4_noabort+0x20/0x30 [ 54.358307] kasan_atomics_helper+0x3de4/0x4858 [ 54.358340] kasan_atomics+0x198/0x2e0 [ 54.358370] kunit_try_run_case+0x170/0x3f0 [ 54.358407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.358447] kthread+0x328/0x630 [ 54.358475] ret_from_fork+0x10/0x20 [ 54.358507] [ 54.424945] Allocated by task 312: [ 54.428331] kasan_save_stack+0x3c/0x68 [ 54.432151] kasan_save_track+0x20/0x40 [ 54.435970] kasan_save_alloc_info+0x40/0x58 [ 54.440223] __kasan_kmalloc+0xd4/0xd8 [ 54.443956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.448469] kasan_atomics+0xb8/0x2e0 [ 54.452115] kunit_try_run_case+0x170/0x3f0 [ 54.456282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.461750] kthread+0x328/0x630 [ 54.464962] ret_from_fork+0x10/0x20 [ 54.468521] [ 54.469997] The buggy address belongs to the object at ffff000805f49a00 [ 54.469997] which belongs to the cache kmalloc-64 of size 64 [ 54.482324] The buggy address is located 0 bytes to the right of [ 54.482324] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 54.495170] [ 54.496647] The buggy address belongs to the physical page: [ 54.502203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 54.510189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.516697] page_type: f5(slab) [ 54.519831] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.527555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.535274] page dumped because: kasan: bad access detected [ 54.540829] [ 54.542305] Memory state around the buggy address: [ 54.547083] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.554288] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.561492] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.568693] ^ [ 54.573471] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.580676] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.587877] ================================================================== [ 62.486093] ================================================================== [ 62.493144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 62.500519] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 62.507810] [ 62.509294] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 62.509341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.509358] Hardware name: WinLink E850-96 board (DT) [ 62.509376] Call trace: [ 62.509390] show_stack+0x20/0x38 (C) [ 62.509425] dump_stack_lvl+0x8c/0xd0 [ 62.509460] print_report+0x118/0x608 [ 62.509494] kasan_report+0xdc/0x128 [ 62.509528] __asan_report_load8_noabort+0x20/0x30 [ 62.509566] kasan_atomics_helper+0x3e10/0x4858 [ 62.509602] kasan_atomics+0x198/0x2e0 [ 62.509631] kunit_try_run_case+0x170/0x3f0 [ 62.509665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.509703] kthread+0x328/0x630 [ 62.509728] ret_from_fork+0x10/0x20 [ 62.509760] [ 62.576212] Allocated by task 312: [ 62.579597] kasan_save_stack+0x3c/0x68 [ 62.583417] kasan_save_track+0x20/0x40 [ 62.587236] kasan_save_alloc_info+0x40/0x58 [ 62.591490] __kasan_kmalloc+0xd4/0xd8 [ 62.595222] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.599736] kasan_atomics+0xb8/0x2e0 [ 62.603382] kunit_try_run_case+0x170/0x3f0 [ 62.607548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.613017] kthread+0x328/0x630 [ 62.616229] ret_from_fork+0x10/0x20 [ 62.619788] [ 62.621263] The buggy address belongs to the object at ffff000805f49a00 [ 62.621263] which belongs to the cache kmalloc-64 of size 64 [ 62.633590] The buggy address is located 0 bytes to the right of [ 62.633590] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 62.646437] [ 62.647913] The buggy address belongs to the physical page: [ 62.653469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 62.661457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.667964] page_type: f5(slab) [ 62.671097] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.678822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.686540] page dumped because: kasan: bad access detected [ 62.692095] [ 62.693571] Memory state around the buggy address: [ 62.698351] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.705554] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.712759] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.719960] ^ [ 62.724738] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.731943] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.739144] ================================================================== [ 53.546987] ================================================================== [ 53.554042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 53.561330] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 53.568708] [ 53.570190] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 53.570236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.570252] Hardware name: WinLink E850-96 board (DT) [ 53.570271] Call trace: [ 53.570283] show_stack+0x20/0x38 (C) [ 53.570316] dump_stack_lvl+0x8c/0xd0 [ 53.570351] print_report+0x118/0x608 [ 53.570383] kasan_report+0xdc/0x128 [ 53.570419] kasan_check_range+0x100/0x1a8 [ 53.570456] __kasan_check_write+0x20/0x30 [ 53.570484] kasan_atomics_helper+0xb70/0x4858 [ 53.570518] kasan_atomics+0x198/0x2e0 [ 53.570549] kunit_try_run_case+0x170/0x3f0 [ 53.570583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.570622] kthread+0x328/0x630 [ 53.570648] ret_from_fork+0x10/0x20 [ 53.570680] [ 53.640409] Allocated by task 312: [ 53.643794] kasan_save_stack+0x3c/0x68 [ 53.647613] kasan_save_track+0x20/0x40 [ 53.651433] kasan_save_alloc_info+0x40/0x58 [ 53.655686] __kasan_kmalloc+0xd4/0xd8 [ 53.659419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.663933] kasan_atomics+0xb8/0x2e0 [ 53.667579] kunit_try_run_case+0x170/0x3f0 [ 53.671745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.677214] kthread+0x328/0x630 [ 53.680425] ret_from_fork+0x10/0x20 [ 53.683985] [ 53.685460] The buggy address belongs to the object at ffff000805f49a00 [ 53.685460] which belongs to the cache kmalloc-64 of size 64 [ 53.697787] The buggy address is located 0 bytes to the right of [ 53.697787] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 53.710634] [ 53.712109] The buggy address belongs to the physical page: [ 53.717665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 53.725650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.732161] page_type: f5(slab) [ 53.735294] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.743018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.750737] page dumped because: kasan: bad access detected [ 53.756292] [ 53.757768] Memory state around the buggy address: [ 53.762546] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.769751] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.776956] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.784157] ^ [ 53.788935] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.796139] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.803340] ================================================================== [ 49.070528] ================================================================== [ 49.077546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 49.084835] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 49.092213] [ 49.093697] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 49.093747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.093765] Hardware name: WinLink E850-96 board (DT) [ 49.093787] Call trace: [ 49.093803] show_stack+0x20/0x38 (C) [ 49.093836] dump_stack_lvl+0x8c/0xd0 [ 49.093875] print_report+0x118/0x608 [ 49.093908] kasan_report+0xdc/0x128 [ 49.093944] kasan_check_range+0x100/0x1a8 [ 49.093980] __kasan_check_write+0x20/0x30 [ 49.094011] kasan_atomics_helper+0x47c/0x4858 [ 49.094043] kasan_atomics+0x198/0x2e0 [ 49.094073] kunit_try_run_case+0x170/0x3f0 [ 49.094108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.094147] kthread+0x328/0x630 [ 49.094173] ret_from_fork+0x10/0x20 [ 49.094206] [ 49.163914] Allocated by task 312: [ 49.167299] kasan_save_stack+0x3c/0x68 [ 49.171118] kasan_save_track+0x20/0x40 [ 49.174938] kasan_save_alloc_info+0x40/0x58 [ 49.179191] __kasan_kmalloc+0xd4/0xd8 [ 49.182924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.187437] kasan_atomics+0xb8/0x2e0 [ 49.191083] kunit_try_run_case+0x170/0x3f0 [ 49.195250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.200718] kthread+0x328/0x630 [ 49.203930] ret_from_fork+0x10/0x20 [ 49.207489] [ 49.208965] The buggy address belongs to the object at ffff000805f49a00 [ 49.208965] which belongs to the cache kmalloc-64 of size 64 [ 49.221292] The buggy address is located 0 bytes to the right of [ 49.221292] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 49.234138] [ 49.235615] The buggy address belongs to the physical page: [ 49.241170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 49.249156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.255665] page_type: f5(slab) [ 49.258799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.266523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.274242] page dumped because: kasan: bad access detected [ 49.279797] [ 49.281273] Memory state around the buggy address: [ 49.286053] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.293256] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.300461] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.307661] ^ [ 49.312439] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.319644] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.326845] ================================================================== [ 63.270803] ================================================================== [ 63.277855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 63.285229] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 63.292607] [ 63.294091] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 63.294140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.294156] Hardware name: WinLink E850-96 board (DT) [ 63.294174] Call trace: [ 63.294189] show_stack+0x20/0x38 (C) [ 63.294222] dump_stack_lvl+0x8c/0xd0 [ 63.294255] print_report+0x118/0x608 [ 63.294290] kasan_report+0xdc/0x128 [ 63.294324] kasan_check_range+0x100/0x1a8 [ 63.294360] __kasan_check_write+0x20/0x30 [ 63.294391] kasan_atomics_helper+0x17ec/0x4858 [ 63.294424] kasan_atomics+0x198/0x2e0 [ 63.294454] kunit_try_run_case+0x170/0x3f0 [ 63.294489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.294526] kthread+0x328/0x630 [ 63.294555] ret_from_fork+0x10/0x20 [ 63.294589] [ 63.364394] Allocated by task 312: [ 63.367780] kasan_save_stack+0x3c/0x68 [ 63.371600] kasan_save_track+0x20/0x40 [ 63.375419] kasan_save_alloc_info+0x40/0x58 [ 63.379672] __kasan_kmalloc+0xd4/0xd8 [ 63.383405] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.387919] kasan_atomics+0xb8/0x2e0 [ 63.391564] kunit_try_run_case+0x170/0x3f0 [ 63.395731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.401200] kthread+0x328/0x630 [ 63.404411] ret_from_fork+0x10/0x20 [ 63.407970] [ 63.409446] The buggy address belongs to the object at ffff000805f49a00 [ 63.409446] which belongs to the cache kmalloc-64 of size 64 [ 63.421773] The buggy address is located 0 bytes to the right of [ 63.421773] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 63.434619] [ 63.436096] The buggy address belongs to the physical page: [ 63.441651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 63.449640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.456147] page_type: f5(slab) [ 63.459280] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.467004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.474723] page dumped because: kasan: bad access detected [ 63.480278] [ 63.481754] Memory state around the buggy address: [ 63.486536] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.493737] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.500942] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.508142] ^ [ 63.512920] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.520126] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.527326] ================================================================== [ 60.381951] ================================================================== [ 60.389009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 60.396384] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 60.403762] [ 60.405245] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 60.405294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.405309] Hardware name: WinLink E850-96 board (DT) [ 60.405330] Call trace: [ 60.405345] show_stack+0x20/0x38 (C) [ 60.405379] dump_stack_lvl+0x8c/0xd0 [ 60.405414] print_report+0x118/0x608 [ 60.405448] kasan_report+0xdc/0x128 [ 60.405482] kasan_check_range+0x100/0x1a8 [ 60.405518] __kasan_check_write+0x20/0x30 [ 60.405548] kasan_atomics_helper+0x147c/0x4858 [ 60.405581] kasan_atomics+0x198/0x2e0 [ 60.405611] kunit_try_run_case+0x170/0x3f0 [ 60.405647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.405686] kthread+0x328/0x630 [ 60.405713] ret_from_fork+0x10/0x20 [ 60.405744] [ 60.475549] Allocated by task 312: [ 60.478935] kasan_save_stack+0x3c/0x68 [ 60.482754] kasan_save_track+0x20/0x40 [ 60.486573] kasan_save_alloc_info+0x40/0x58 [ 60.490827] __kasan_kmalloc+0xd4/0xd8 [ 60.494559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.499073] kasan_atomics+0xb8/0x2e0 [ 60.502719] kunit_try_run_case+0x170/0x3f0 [ 60.506886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.512354] kthread+0x328/0x630 [ 60.515566] ret_from_fork+0x10/0x20 [ 60.519125] [ 60.520600] The buggy address belongs to the object at ffff000805f49a00 [ 60.520600] which belongs to the cache kmalloc-64 of size 64 [ 60.532927] The buggy address is located 0 bytes to the right of [ 60.532927] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 60.545774] [ 60.547250] The buggy address belongs to the physical page: [ 60.552806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 60.560793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.567301] page_type: f5(slab) [ 60.570435] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.578159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.585877] page dumped because: kasan: bad access detected [ 60.591433] [ 60.592908] Memory state around the buggy address: [ 60.597687] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.604891] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.612096] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.619297] ^ [ 60.624075] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.631280] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.638481] ================================================================== [ 48.282630] ================================================================== [ 48.289537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 48.296913] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 48.304291] [ 48.305776] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 48.305828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.305848] Hardware name: WinLink E850-96 board (DT) [ 48.305872] Call trace: [ 48.305886] show_stack+0x20/0x38 (C) [ 48.305925] dump_stack_lvl+0x8c/0xd0 [ 48.305963] print_report+0x118/0x608 [ 48.305997] kasan_report+0xdc/0x128 [ 48.306029] __asan_report_store4_noabort+0x20/0x30 [ 48.306065] kasan_atomics_helper+0x3f94/0x4858 [ 48.306098] kasan_atomics+0x198/0x2e0 [ 48.306129] kunit_try_run_case+0x170/0x3f0 [ 48.306164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.306202] kthread+0x328/0x630 [ 48.306232] ret_from_fork+0x10/0x20 [ 48.306266] [ 48.372779] Allocated by task 312: [ 48.376165] kasan_save_stack+0x3c/0x68 [ 48.379984] kasan_save_track+0x20/0x40 [ 48.383804] kasan_save_alloc_info+0x40/0x58 [ 48.388057] __kasan_kmalloc+0xd4/0xd8 [ 48.391789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.396304] kasan_atomics+0xb8/0x2e0 [ 48.399949] kunit_try_run_case+0x170/0x3f0 [ 48.404116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.409585] kthread+0x328/0x630 [ 48.412796] ret_from_fork+0x10/0x20 [ 48.416355] [ 48.417832] The buggy address belongs to the object at ffff000805f49a00 [ 48.417832] which belongs to the cache kmalloc-64 of size 64 [ 48.430157] The buggy address is located 0 bytes to the right of [ 48.430157] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 48.443004] [ 48.444480] The buggy address belongs to the physical page: [ 48.450037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 48.458023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.464532] page_type: f5(slab) [ 48.467665] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.475389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.483108] page dumped because: kasan: bad access detected [ 48.488663] [ 48.490139] Memory state around the buggy address: [ 48.494918] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.502122] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.509327] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.516528] ^ [ 48.521305] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.528510] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.535711] ================================================================== [ 61.437516] ================================================================== [ 61.444549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 61.451924] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 61.459215] [ 61.460698] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 61.460744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.460760] Hardware name: WinLink E850-96 board (DT) [ 61.460780] Call trace: [ 61.460794] show_stack+0x20/0x38 (C) [ 61.460828] dump_stack_lvl+0x8c/0xd0 [ 61.460864] print_report+0x118/0x608 [ 61.460898] kasan_report+0xdc/0x128 [ 61.460933] __asan_report_load8_noabort+0x20/0x30 [ 61.460970] kasan_atomics_helper+0x3db0/0x4858 [ 61.461003] kasan_atomics+0x198/0x2e0 [ 61.461033] kunit_try_run_case+0x170/0x3f0 [ 61.461070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.461109] kthread+0x328/0x630 [ 61.461137] ret_from_fork+0x10/0x20 [ 61.461169] [ 61.527617] Allocated by task 312: [ 61.531002] kasan_save_stack+0x3c/0x68 [ 61.534821] kasan_save_track+0x20/0x40 [ 61.538641] kasan_save_alloc_info+0x40/0x58 [ 61.542894] __kasan_kmalloc+0xd4/0xd8 [ 61.546628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.551141] kasan_atomics+0xb8/0x2e0 [ 61.554786] kunit_try_run_case+0x170/0x3f0 [ 61.558953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.564422] kthread+0x328/0x630 [ 61.567634] ret_from_fork+0x10/0x20 [ 61.571193] [ 61.572668] The buggy address belongs to the object at ffff000805f49a00 [ 61.572668] which belongs to the cache kmalloc-64 of size 64 [ 61.584995] The buggy address is located 0 bytes to the right of [ 61.584995] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 61.597841] [ 61.599317] The buggy address belongs to the physical page: [ 61.604873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 61.612860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.619369] page_type: f5(slab) [ 61.622502] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.630226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.637945] page dumped because: kasan: bad access detected [ 61.643500] [ 61.644976] Memory state around the buggy address: [ 61.649756] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.656959] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.664164] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.671365] ^ [ 61.676143] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.683347] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.690548] ================================================================== [ 55.383044] ================================================================== [ 55.390125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 55.397500] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 55.404792] [ 55.406275] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 55.406319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.406335] Hardware name: WinLink E850-96 board (DT) [ 55.406354] Call trace: [ 55.406366] show_stack+0x20/0x38 (C) [ 55.406399] dump_stack_lvl+0x8c/0xd0 [ 55.406436] print_report+0x118/0x608 [ 55.406468] kasan_report+0xdc/0x128 [ 55.406504] __asan_report_load4_noabort+0x20/0x30 [ 55.406540] kasan_atomics_helper+0x3e04/0x4858 [ 55.406573] kasan_atomics+0x198/0x2e0 [ 55.406604] kunit_try_run_case+0x170/0x3f0 [ 55.406637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.406676] kthread+0x328/0x630 [ 55.406704] ret_from_fork+0x10/0x20 [ 55.406737] [ 55.473194] Allocated by task 312: [ 55.476579] kasan_save_stack+0x3c/0x68 [ 55.480398] kasan_save_track+0x20/0x40 [ 55.484218] kasan_save_alloc_info+0x40/0x58 [ 55.488471] __kasan_kmalloc+0xd4/0xd8 [ 55.492204] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.496718] kasan_atomics+0xb8/0x2e0 [ 55.500364] kunit_try_run_case+0x170/0x3f0 [ 55.504530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.509999] kthread+0x328/0x630 [ 55.513210] ret_from_fork+0x10/0x20 [ 55.516770] [ 55.518245] The buggy address belongs to the object at ffff000805f49a00 [ 55.518245] which belongs to the cache kmalloc-64 of size 64 [ 55.530572] The buggy address is located 0 bytes to the right of [ 55.530572] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 55.543418] [ 55.544894] The buggy address belongs to the physical page: [ 55.550450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 55.558438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.564946] page_type: f5(slab) [ 55.568079] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.575803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.583522] page dumped because: kasan: bad access detected [ 55.589078] [ 55.590553] Memory state around the buggy address: [ 55.595331] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.602536] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.609741] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.616941] ^ [ 55.621720] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.628924] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.636125] ================================================================== [ 61.697886] ================================================================== [ 61.704960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 61.712336] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 61.719715] [ 61.721196] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 61.721244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.721262] Hardware name: WinLink E850-96 board (DT) [ 61.721282] Call trace: [ 61.721296] show_stack+0x20/0x38 (C) [ 61.721330] dump_stack_lvl+0x8c/0xd0 [ 61.721363] print_report+0x118/0x608 [ 61.721394] kasan_report+0xdc/0x128 [ 61.721432] kasan_check_range+0x100/0x1a8 [ 61.721466] __kasan_check_write+0x20/0x30 [ 61.721495] kasan_atomics_helper+0x1644/0x4858 [ 61.721529] kasan_atomics+0x198/0x2e0 [ 61.721561] kunit_try_run_case+0x170/0x3f0 [ 61.721595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.721633] kthread+0x328/0x630 [ 61.721662] ret_from_fork+0x10/0x20 [ 61.721692] [ 61.791501] Allocated by task 312: [ 61.794887] kasan_save_stack+0x3c/0x68 [ 61.798706] kasan_save_track+0x20/0x40 [ 61.802526] kasan_save_alloc_info+0x40/0x58 [ 61.806779] __kasan_kmalloc+0xd4/0xd8 [ 61.810512] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.815026] kasan_atomics+0xb8/0x2e0 [ 61.818671] kunit_try_run_case+0x170/0x3f0 [ 61.822838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.828307] kthread+0x328/0x630 [ 61.831518] ret_from_fork+0x10/0x20 [ 61.835077] [ 61.836553] The buggy address belongs to the object at ffff000805f49a00 [ 61.836553] which belongs to the cache kmalloc-64 of size 64 [ 61.848879] The buggy address is located 0 bytes to the right of [ 61.848879] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 61.861726] [ 61.863202] The buggy address belongs to the physical page: [ 61.868759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 61.876744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.883254] page_type: f5(slab) [ 61.886387] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.894111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.901830] page dumped because: kasan: bad access detected [ 61.907385] [ 61.908861] Memory state around the buggy address: [ 61.913641] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.920844] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.928049] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.935249] ^ [ 61.940027] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.947232] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.954433] ================================================================== [ 54.858940] ================================================================== [ 54.866000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 54.873377] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 54.880668] [ 54.882149] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 54.882196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.882212] Hardware name: WinLink E850-96 board (DT) [ 54.882231] Call trace: [ 54.882246] show_stack+0x20/0x38 (C) [ 54.882279] dump_stack_lvl+0x8c/0xd0 [ 54.882316] print_report+0x118/0x608 [ 54.882350] kasan_report+0xdc/0x128 [ 54.882382] __asan_report_load4_noabort+0x20/0x30 [ 54.882420] kasan_atomics_helper+0x3dd8/0x4858 [ 54.882453] kasan_atomics+0x198/0x2e0 [ 54.882483] kunit_try_run_case+0x170/0x3f0 [ 54.882519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.882557] kthread+0x328/0x630 [ 54.882585] ret_from_fork+0x10/0x20 [ 54.882617] [ 54.949070] Allocated by task 312: [ 54.952455] kasan_save_stack+0x3c/0x68 [ 54.956274] kasan_save_track+0x20/0x40 [ 54.960094] kasan_save_alloc_info+0x40/0x58 [ 54.964347] __kasan_kmalloc+0xd4/0xd8 [ 54.968080] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.972593] kasan_atomics+0xb8/0x2e0 [ 54.976240] kunit_try_run_case+0x170/0x3f0 [ 54.980406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.985875] kthread+0x328/0x630 [ 54.989087] ret_from_fork+0x10/0x20 [ 54.992646] [ 54.994121] The buggy address belongs to the object at ffff000805f49a00 [ 54.994121] which belongs to the cache kmalloc-64 of size 64 [ 55.006448] The buggy address is located 0 bytes to the right of [ 55.006448] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 55.019294] [ 55.020770] The buggy address belongs to the physical page: [ 55.026326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 55.034312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.040822] page_type: f5(slab) [ 55.043955] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.051679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.059398] page dumped because: kasan: bad access detected [ 55.064953] [ 55.066429] Memory state around the buggy address: [ 55.071207] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.078412] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.085616] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.092817] ^ [ 55.097595] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.104800] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.112001] ================================================================== [ 62.222225] ================================================================== [ 62.229259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 62.236634] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 62.244012] [ 62.245495] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 62.245543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.245559] Hardware name: WinLink E850-96 board (DT) [ 62.245579] Call trace: [ 62.245595] show_stack+0x20/0x38 (C) [ 62.245626] dump_stack_lvl+0x8c/0xd0 [ 62.245663] print_report+0x118/0x608 [ 62.245695] kasan_report+0xdc/0x128 [ 62.245727] kasan_check_range+0x100/0x1a8 [ 62.245763] __kasan_check_write+0x20/0x30 [ 62.245792] kasan_atomics_helper+0x16d0/0x4858 [ 62.245826] kasan_atomics+0x198/0x2e0 [ 62.245858] kunit_try_run_case+0x170/0x3f0 [ 62.245893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.245931] kthread+0x328/0x630 [ 62.245958] ret_from_fork+0x10/0x20 [ 62.245989] [ 62.315799] Allocated by task 312: [ 62.319185] kasan_save_stack+0x3c/0x68 [ 62.323004] kasan_save_track+0x20/0x40 [ 62.326823] kasan_save_alloc_info+0x40/0x58 [ 62.331077] __kasan_kmalloc+0xd4/0xd8 [ 62.334810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.339323] kasan_atomics+0xb8/0x2e0 [ 62.342969] kunit_try_run_case+0x170/0x3f0 [ 62.347136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.352604] kthread+0x328/0x630 [ 62.355816] ret_from_fork+0x10/0x20 [ 62.359375] [ 62.360851] The buggy address belongs to the object at ffff000805f49a00 [ 62.360851] which belongs to the cache kmalloc-64 of size 64 [ 62.373177] The buggy address is located 0 bytes to the right of [ 62.373177] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 62.386024] [ 62.387500] The buggy address belongs to the physical page: [ 62.393056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 62.401044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.407551] page_type: f5(slab) [ 62.410685] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.418409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.426128] page dumped because: kasan: bad access detected [ 62.431683] [ 62.433159] Memory state around the buggy address: [ 62.437938] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.445142] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.452346] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.459547] ^ [ 62.464325] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.471530] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.478731] ================================================================== [ 48.018806] ================================================================== [ 48.025827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 48.033116] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 48.040493] [ 48.041978] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 48.042033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.042052] Hardware name: WinLink E850-96 board (DT) [ 48.042074] Call trace: [ 48.042088] show_stack+0x20/0x38 (C) [ 48.042128] dump_stack_lvl+0x8c/0xd0 [ 48.042165] print_report+0x118/0x608 [ 48.042205] kasan_report+0xdc/0x128 [ 48.042237] kasan_check_range+0x100/0x1a8 [ 48.042278] __kasan_check_write+0x20/0x30 [ 48.042310] kasan_atomics_helper+0x32c/0x4858 [ 48.042342] kasan_atomics+0x198/0x2e0 [ 48.042374] kunit_try_run_case+0x170/0x3f0 [ 48.042411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.042448] kthread+0x328/0x630 [ 48.042479] ret_from_fork+0x10/0x20 [ 48.042514] [ 48.112193] Allocated by task 312: [ 48.115579] kasan_save_stack+0x3c/0x68 [ 48.119398] kasan_save_track+0x20/0x40 [ 48.123218] kasan_save_alloc_info+0x40/0x58 [ 48.127471] __kasan_kmalloc+0xd4/0xd8 [ 48.131204] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.135717] kasan_atomics+0xb8/0x2e0 [ 48.139363] kunit_try_run_case+0x170/0x3f0 [ 48.143530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.148998] kthread+0x328/0x630 [ 48.152210] ret_from_fork+0x10/0x20 [ 48.155769] [ 48.157246] The buggy address belongs to the object at ffff000805f49a00 [ 48.157246] which belongs to the cache kmalloc-64 of size 64 [ 48.169573] The buggy address is located 0 bytes to the right of [ 48.169573] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 48.182417] [ 48.183894] The buggy address belongs to the physical page: [ 48.189450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 48.197437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.203945] page_type: f5(slab) [ 48.207081] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.214803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.222521] page dumped because: kasan: bad access detected [ 48.228077] [ 48.229552] Memory state around the buggy address: [ 48.234332] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.241535] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.248740] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.255941] ^ [ 48.260719] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.267924] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.275125] ================================================================== [ 62.746523] ================================================================== [ 62.753558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 62.760932] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 62.768310] [ 62.769793] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 62.769842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.769858] Hardware name: WinLink E850-96 board (DT) [ 62.769878] Call trace: [ 62.769894] show_stack+0x20/0x38 (C) [ 62.769925] dump_stack_lvl+0x8c/0xd0 [ 62.769963] print_report+0x118/0x608 [ 62.769998] kasan_report+0xdc/0x128 [ 62.770032] kasan_check_range+0x100/0x1a8 [ 62.770068] __kasan_check_write+0x20/0x30 [ 62.770099] kasan_atomics_helper+0x175c/0x4858 [ 62.770132] kasan_atomics+0x198/0x2e0 [ 62.770164] kunit_try_run_case+0x170/0x3f0 [ 62.770201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.770242] kthread+0x328/0x630 [ 62.770269] ret_from_fork+0x10/0x20 [ 62.770301] [ 62.840097] Allocated by task 312: [ 62.843483] kasan_save_stack+0x3c/0x68 [ 62.847302] kasan_save_track+0x20/0x40 [ 62.851121] kasan_save_alloc_info+0x40/0x58 [ 62.855374] __kasan_kmalloc+0xd4/0xd8 [ 62.859107] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.863621] kasan_atomics+0xb8/0x2e0 [ 62.867267] kunit_try_run_case+0x170/0x3f0 [ 62.871433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.876902] kthread+0x328/0x630 [ 62.880114] ret_from_fork+0x10/0x20 [ 62.883673] [ 62.885148] The buggy address belongs to the object at ffff000805f49a00 [ 62.885148] which belongs to the cache kmalloc-64 of size 64 [ 62.897475] The buggy address is located 0 bytes to the right of [ 62.897475] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 62.910322] [ 62.911798] The buggy address belongs to the physical page: [ 62.917354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 62.925342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.931849] page_type: f5(slab) [ 62.934982] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.942707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.950425] page dumped because: kasan: bad access detected [ 62.955981] [ 62.957456] Memory state around the buggy address: [ 62.962235] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.969439] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.976644] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.983845] ^ [ 62.988623] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.995828] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.003029] ================================================================== [ 58.010554] ================================================================== [ 58.017516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 58.024892] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 58.032270] [ 58.033752] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 58.033803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.033820] Hardware name: WinLink E850-96 board (DT) [ 58.033841] Call trace: [ 58.033856] show_stack+0x20/0x38 (C) [ 58.033890] dump_stack_lvl+0x8c/0xd0 [ 58.033926] print_report+0x118/0x608 [ 58.033959] kasan_report+0xdc/0x128 [ 58.033994] kasan_check_range+0x100/0x1a8 [ 58.034029] __kasan_check_write+0x20/0x30 [ 58.034059] kasan_atomics_helper+0x10c0/0x4858 [ 58.034094] kasan_atomics+0x198/0x2e0 [ 58.034125] kunit_try_run_case+0x170/0x3f0 [ 58.034160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.034199] kthread+0x328/0x630 [ 58.034226] ret_from_fork+0x10/0x20 [ 58.034258] [ 58.104057] Allocated by task 312: [ 58.107443] kasan_save_stack+0x3c/0x68 [ 58.111262] kasan_save_track+0x20/0x40 [ 58.115081] kasan_save_alloc_info+0x40/0x58 [ 58.119335] __kasan_kmalloc+0xd4/0xd8 [ 58.123067] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.127581] kasan_atomics+0xb8/0x2e0 [ 58.131227] kunit_try_run_case+0x170/0x3f0 [ 58.135393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.140862] kthread+0x328/0x630 [ 58.144074] ret_from_fork+0x10/0x20 [ 58.147633] [ 58.149108] The buggy address belongs to the object at ffff000805f49a00 [ 58.149108] which belongs to the cache kmalloc-64 of size 64 [ 58.161435] The buggy address is located 0 bytes to the right of [ 58.161435] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 58.174282] [ 58.175759] The buggy address belongs to the physical page: [ 58.181314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 58.189302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.195809] page_type: f5(slab) [ 58.198944] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.206667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.214385] page dumped because: kasan: bad access detected [ 58.219940] [ 58.221416] Memory state around the buggy address: [ 58.226195] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.233399] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.240604] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.247804] ^ [ 58.252583] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.259788] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.266989] ================================================================== [ 59.329915] ================================================================== [ 59.336940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 59.344317] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 59.351695] [ 59.353177] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 59.353227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.353244] Hardware name: WinLink E850-96 board (DT) [ 59.353263] Call trace: [ 59.353281] show_stack+0x20/0x38 (C) [ 59.353313] dump_stack_lvl+0x8c/0xd0 [ 59.353350] print_report+0x118/0x608 [ 59.353384] kasan_report+0xdc/0x128 [ 59.353419] kasan_check_range+0x100/0x1a8 [ 59.353453] __kasan_check_write+0x20/0x30 [ 59.353484] kasan_atomics_helper+0x12d8/0x4858 [ 59.353518] kasan_atomics+0x198/0x2e0 [ 59.353549] kunit_try_run_case+0x170/0x3f0 [ 59.353582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.353621] kthread+0x328/0x630 [ 59.353649] ret_from_fork+0x10/0x20 [ 59.353683] [ 59.423481] Allocated by task 312: [ 59.426867] kasan_save_stack+0x3c/0x68 [ 59.430686] kasan_save_track+0x20/0x40 [ 59.434506] kasan_save_alloc_info+0x40/0x58 [ 59.438759] __kasan_kmalloc+0xd4/0xd8 [ 59.442492] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.447006] kasan_atomics+0xb8/0x2e0 [ 59.450652] kunit_try_run_case+0x170/0x3f0 [ 59.454818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.460286] kthread+0x328/0x630 [ 59.463499] ret_from_fork+0x10/0x20 [ 59.467057] [ 59.468533] The buggy address belongs to the object at ffff000805f49a00 [ 59.468533] which belongs to the cache kmalloc-64 of size 64 [ 59.480859] The buggy address is located 0 bytes to the right of [ 59.480859] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 59.493706] [ 59.495182] The buggy address belongs to the physical page: [ 59.500738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 59.508727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.515233] page_type: f5(slab) [ 59.518369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.526091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.533810] page dumped because: kasan: bad access detected [ 59.539365] [ 59.540841] Memory state around the buggy address: [ 59.545619] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.552824] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.560029] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.567229] ^ [ 59.572008] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.579212] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.586413] ================================================================== [ 53.810687] ================================================================== [ 53.817752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 53.825128] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 53.832420] [ 53.833903] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 53.833949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.833970] Hardware name: WinLink E850-96 board (DT) [ 53.833987] Call trace: [ 53.833999] show_stack+0x20/0x38 (C) [ 53.834034] dump_stack_lvl+0x8c/0xd0 [ 53.834069] print_report+0x118/0x608 [ 53.834102] kasan_report+0xdc/0x128 [ 53.834137] __asan_report_load4_noabort+0x20/0x30 [ 53.834176] kasan_atomics_helper+0x3dbc/0x4858 [ 53.834210] kasan_atomics+0x198/0x2e0 [ 53.834241] kunit_try_run_case+0x170/0x3f0 [ 53.834277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.834314] kthread+0x328/0x630 [ 53.834343] ret_from_fork+0x10/0x20 [ 53.834375] [ 53.900821] Allocated by task 312: [ 53.904207] kasan_save_stack+0x3c/0x68 [ 53.908026] kasan_save_track+0x20/0x40 [ 53.911846] kasan_save_alloc_info+0x40/0x58 [ 53.916099] __kasan_kmalloc+0xd4/0xd8 [ 53.919832] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.924346] kasan_atomics+0xb8/0x2e0 [ 53.927991] kunit_try_run_case+0x170/0x3f0 [ 53.932158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.937626] kthread+0x328/0x630 [ 53.940838] ret_from_fork+0x10/0x20 [ 53.944397] [ 53.945873] The buggy address belongs to the object at ffff000805f49a00 [ 53.945873] which belongs to the cache kmalloc-64 of size 64 [ 53.958200] The buggy address is located 0 bytes to the right of [ 53.958200] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 53.971046] [ 53.972522] The buggy address belongs to the physical page: [ 53.978078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 53.986065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.992573] page_type: f5(slab) [ 53.995707] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.003431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.011150] page dumped because: kasan: bad access detected [ 54.016705] [ 54.018181] Memory state around the buggy address: [ 54.022959] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.030164] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.037368] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.044569] ^ [ 54.049348] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.056552] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.063753] ================================================================== [ 60.909817] ================================================================== [ 60.916779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 60.924154] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 60.931532] [ 60.933015] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 60.933064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.933082] Hardware name: WinLink E850-96 board (DT) [ 60.933103] Call trace: [ 60.933118] show_stack+0x20/0x38 (C) [ 60.933151] dump_stack_lvl+0x8c/0xd0 [ 60.933190] print_report+0x118/0x608 [ 60.933225] kasan_report+0xdc/0x128 [ 60.933258] kasan_check_range+0x100/0x1a8 [ 60.933296] __kasan_check_write+0x20/0x30 [ 60.933325] kasan_atomics_helper+0x154c/0x4858 [ 60.933356] kasan_atomics+0x198/0x2e0 [ 60.933386] kunit_try_run_case+0x170/0x3f0 [ 60.933421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.933461] kthread+0x328/0x630 [ 60.933489] ret_from_fork+0x10/0x20 [ 60.933526] [ 61.003319] Allocated by task 312: [ 61.006704] kasan_save_stack+0x3c/0x68 [ 61.010524] kasan_save_track+0x20/0x40 [ 61.014343] kasan_save_alloc_info+0x40/0x58 [ 61.018596] __kasan_kmalloc+0xd4/0xd8 [ 61.022329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.026843] kasan_atomics+0xb8/0x2e0 [ 61.030489] kunit_try_run_case+0x170/0x3f0 [ 61.034655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.040124] kthread+0x328/0x630 [ 61.043336] ret_from_fork+0x10/0x20 [ 61.046895] [ 61.048371] The buggy address belongs to the object at ffff000805f49a00 [ 61.048371] which belongs to the cache kmalloc-64 of size 64 [ 61.060697] The buggy address is located 0 bytes to the right of [ 61.060697] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 61.073544] [ 61.075021] The buggy address belongs to the physical page: [ 61.080577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 61.088563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.095071] page_type: f5(slab) [ 61.098206] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.105929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.113647] page dumped because: kasan: bad access detected [ 61.119203] [ 61.120678] Memory state around the buggy address: [ 61.125458] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.132661] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.139866] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.147067] ^ [ 61.151845] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.159049] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.166251] ================================================================== [ 53.022955] ================================================================== [ 53.029919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 53.037207] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 53.044584] [ 53.046068] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 53.046114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.046129] Hardware name: WinLink E850-96 board (DT) [ 53.046151] Call trace: [ 53.046166] show_stack+0x20/0x38 (C) [ 53.046199] dump_stack_lvl+0x8c/0xd0 [ 53.046236] print_report+0x118/0x608 [ 53.046272] kasan_report+0xdc/0x128 [ 53.046306] kasan_check_range+0x100/0x1a8 [ 53.046340] __kasan_check_write+0x20/0x30 [ 53.046371] kasan_atomics_helper+0xad4/0x4858 [ 53.046405] kasan_atomics+0x198/0x2e0 [ 53.046437] kunit_try_run_case+0x170/0x3f0 [ 53.046473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.046511] kthread+0x328/0x630 [ 53.046540] ret_from_fork+0x10/0x20 [ 53.046572] [ 53.116285] Allocated by task 312: [ 53.119670] kasan_save_stack+0x3c/0x68 [ 53.123490] kasan_save_track+0x20/0x40 [ 53.127309] kasan_save_alloc_info+0x40/0x58 [ 53.131562] __kasan_kmalloc+0xd4/0xd8 [ 53.135295] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.139809] kasan_atomics+0xb8/0x2e0 [ 53.143455] kunit_try_run_case+0x170/0x3f0 [ 53.147621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.153090] kthread+0x328/0x630 [ 53.156301] ret_from_fork+0x10/0x20 [ 53.159860] [ 53.161336] The buggy address belongs to the object at ffff000805f49a00 [ 53.161336] which belongs to the cache kmalloc-64 of size 64 [ 53.173664] The buggy address is located 0 bytes to the right of [ 53.173664] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 53.186510] [ 53.187985] The buggy address belongs to the physical page: [ 53.193541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 53.201530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.208037] page_type: f5(slab) [ 53.211170] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.218894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.226613] page dumped because: kasan: bad access detected [ 53.232168] [ 53.233644] Memory state around the buggy address: [ 53.238422] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.245627] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.252831] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.260032] ^ [ 53.264811] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.272015] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.279216] ================================================================== [ 46.439520] ================================================================== [ 46.453630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 46.461004] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 46.468294] [ 46.469781] CPU: 2 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 46.469841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.469860] Hardware name: WinLink E850-96 board (DT) [ 46.469883] Call trace: [ 46.469901] show_stack+0x20/0x38 (C) [ 46.469943] dump_stack_lvl+0x8c/0xd0 [ 46.469981] print_report+0x118/0x608 [ 46.470019] kasan_report+0xdc/0x128 [ 46.470052] __asan_report_load4_noabort+0x20/0x30 [ 46.470093] kasan_atomics_helper+0x40a8/0x4858 [ 46.470130] kasan_atomics+0x198/0x2e0 [ 46.470162] kunit_try_run_case+0x170/0x3f0 [ 46.470201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.470240] kthread+0x328/0x630 [ 46.470272] ret_from_fork+0x10/0x20 [ 46.470311] [ 46.536698] Allocated by task 312: [ 46.540085] kasan_save_stack+0x3c/0x68 [ 46.543901] kasan_save_track+0x20/0x40 [ 46.547720] kasan_save_alloc_info+0x40/0x58 [ 46.551973] __kasan_kmalloc+0xd4/0xd8 [ 46.555707] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.560220] kasan_atomics+0xb8/0x2e0 [ 46.563866] kunit_try_run_case+0x170/0x3f0 [ 46.568032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.573501] kthread+0x328/0x630 [ 46.576712] ret_from_fork+0x10/0x20 [ 46.580272] [ 46.581749] The buggy address belongs to the object at ffff000805f49a00 [ 46.581749] which belongs to the cache kmalloc-64 of size 64 [ 46.594076] The buggy address is located 0 bytes to the right of [ 46.594076] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 46.606921] [ 46.608400] The buggy address belongs to the physical page: [ 46.613956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 46.621940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.628451] page_type: f5(slab) [ 46.631584] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.639306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.647025] page dumped because: kasan: bad access detected [ 46.652580] [ 46.654057] Memory state around the buggy address: [ 46.658834] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.666038] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.673244] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.680444] ^ [ 46.685221] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.692426] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.699630] ================================================================== [ 59.066091] ================================================================== [ 59.073057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 59.080432] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 59.087810] [ 59.089293] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 59.089343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.089359] Hardware name: WinLink E850-96 board (DT) [ 59.089379] Call trace: [ 59.089396] show_stack+0x20/0x38 (C) [ 59.089430] dump_stack_lvl+0x8c/0xd0 [ 59.089467] print_report+0x118/0x608 [ 59.089500] kasan_report+0xdc/0x128 [ 59.089535] kasan_check_range+0x100/0x1a8 [ 59.089569] __kasan_check_write+0x20/0x30 [ 59.089600] kasan_atomics_helper+0x126c/0x4858 [ 59.089634] kasan_atomics+0x198/0x2e0 [ 59.089663] kunit_try_run_case+0x170/0x3f0 [ 59.089700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.089739] kthread+0x328/0x630 [ 59.089767] ret_from_fork+0x10/0x20 [ 59.089802] [ 59.159596] Allocated by task 312: [ 59.162982] kasan_save_stack+0x3c/0x68 [ 59.166802] kasan_save_track+0x20/0x40 [ 59.170621] kasan_save_alloc_info+0x40/0x58 [ 59.174874] __kasan_kmalloc+0xd4/0xd8 [ 59.178607] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.183121] kasan_atomics+0xb8/0x2e0 [ 59.186766] kunit_try_run_case+0x170/0x3f0 [ 59.190933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.196402] kthread+0x328/0x630 [ 59.199614] ret_from_fork+0x10/0x20 [ 59.203173] [ 59.204648] The buggy address belongs to the object at ffff000805f49a00 [ 59.204648] which belongs to the cache kmalloc-64 of size 64 [ 59.216976] The buggy address is located 0 bytes to the right of [ 59.216976] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 59.229821] [ 59.231297] The buggy address belongs to the physical page: [ 59.236853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 59.244842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.251349] page_type: f5(slab) [ 59.254484] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.262206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.269925] page dumped because: kasan: bad access detected [ 59.275480] [ 59.276956] Memory state around the buggy address: [ 59.281734] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.288939] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.296144] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.303344] ^ [ 59.308123] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.315328] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.322528] ================================================================== [ 53.286580] ================================================================== [ 53.293628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 53.301005] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 53.308296] [ 53.309777] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 53.309826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.309841] Hardware name: WinLink E850-96 board (DT) [ 53.309860] Call trace: [ 53.309874] show_stack+0x20/0x38 (C) [ 53.309906] dump_stack_lvl+0x8c/0xd0 [ 53.309941] print_report+0x118/0x608 [ 53.309976] kasan_report+0xdc/0x128 [ 53.310011] __asan_report_load4_noabort+0x20/0x30 [ 53.310049] kasan_atomics_helper+0x3dcc/0x4858 [ 53.310082] kasan_atomics+0x198/0x2e0 [ 53.310114] kunit_try_run_case+0x170/0x3f0 [ 53.310148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.310184] kthread+0x328/0x630 [ 53.310212] ret_from_fork+0x10/0x20 [ 53.310245] [ 53.376697] Allocated by task 312: [ 53.380083] kasan_save_stack+0x3c/0x68 [ 53.383902] kasan_save_track+0x20/0x40 [ 53.387722] kasan_save_alloc_info+0x40/0x58 [ 53.391975] __kasan_kmalloc+0xd4/0xd8 [ 53.395708] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.400221] kasan_atomics+0xb8/0x2e0 [ 53.403867] kunit_try_run_case+0x170/0x3f0 [ 53.408034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.413502] kthread+0x328/0x630 [ 53.416714] ret_from_fork+0x10/0x20 [ 53.420273] [ 53.421748] The buggy address belongs to the object at ffff000805f49a00 [ 53.421748] which belongs to the cache kmalloc-64 of size 64 [ 53.434076] The buggy address is located 0 bytes to the right of [ 53.434076] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 53.446922] [ 53.448398] The buggy address belongs to the physical page: [ 53.453954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 53.461940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.468450] page_type: f5(slab) [ 53.471583] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.479307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.487026] page dumped because: kasan: bad access detected [ 53.492581] [ 53.494057] Memory state around the buggy address: [ 53.498835] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.506040] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.513244] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.520445] ^ [ 53.525223] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.532428] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.539629] ================================================================== [ 57.219129] ================================================================== [ 57.226209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 57.233497] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 57.240875] [ 57.242358] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 57.242410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.242427] Hardware name: WinLink E850-96 board (DT) [ 57.242450] Call trace: [ 57.242466] show_stack+0x20/0x38 (C) [ 57.242495] dump_stack_lvl+0x8c/0xd0 [ 57.242531] print_report+0x118/0x608 [ 57.242566] kasan_report+0xdc/0x128 [ 57.242600] kasan_check_range+0x100/0x1a8 [ 57.242634] __kasan_check_write+0x20/0x30 [ 57.242664] kasan_atomics_helper+0xf88/0x4858 [ 57.242698] kasan_atomics+0x198/0x2e0 [ 57.242730] kunit_try_run_case+0x170/0x3f0 [ 57.242763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.242803] kthread+0x328/0x630 [ 57.242831] ret_from_fork+0x10/0x20 [ 57.242863] [ 57.312576] Allocated by task 312: [ 57.315962] kasan_save_stack+0x3c/0x68 [ 57.319781] kasan_save_track+0x20/0x40 [ 57.323600] kasan_save_alloc_info+0x40/0x58 [ 57.327854] __kasan_kmalloc+0xd4/0xd8 [ 57.331586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.336100] kasan_atomics+0xb8/0x2e0 [ 57.339746] kunit_try_run_case+0x170/0x3f0 [ 57.343912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.349381] kthread+0x328/0x630 [ 57.352593] ret_from_fork+0x10/0x20 [ 57.356152] [ 57.357627] The buggy address belongs to the object at ffff000805f49a00 [ 57.357627] which belongs to the cache kmalloc-64 of size 64 [ 57.369954] The buggy address is located 0 bytes to the right of [ 57.369954] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 57.382800] [ 57.384276] The buggy address belongs to the physical page: [ 57.389832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 57.397821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.404328] page_type: f5(slab) [ 57.407461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.415185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.422904] page dumped because: kasan: bad access detected [ 57.428460] [ 57.429935] Memory state around the buggy address: [ 57.434713] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.441918] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.449123] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.456324] ^ [ 57.461101] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.468307] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.475508] ================================================================== [ 60.118048] ================================================================== [ 60.125123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 60.132499] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 60.139877] [ 60.141360] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 60.141409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.141424] Hardware name: WinLink E850-96 board (DT) [ 60.141440] Call trace: [ 60.141453] show_stack+0x20/0x38 (C) [ 60.141487] dump_stack_lvl+0x8c/0xd0 [ 60.141524] print_report+0x118/0x608 [ 60.141557] kasan_report+0xdc/0x128 [ 60.141589] kasan_check_range+0x100/0x1a8 [ 60.141625] __kasan_check_write+0x20/0x30 [ 60.141655] kasan_atomics_helper+0x1414/0x4858 [ 60.141689] kasan_atomics+0x198/0x2e0 [ 60.141719] kunit_try_run_case+0x170/0x3f0 [ 60.141753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.141793] kthread+0x328/0x630 [ 60.141821] ret_from_fork+0x10/0x20 [ 60.141854] [ 60.211664] Allocated by task 312: [ 60.215049] kasan_save_stack+0x3c/0x68 [ 60.218869] kasan_save_track+0x20/0x40 [ 60.222688] kasan_save_alloc_info+0x40/0x58 [ 60.226942] __kasan_kmalloc+0xd4/0xd8 [ 60.230674] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.235188] kasan_atomics+0xb8/0x2e0 [ 60.238834] kunit_try_run_case+0x170/0x3f0 [ 60.243001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.248469] kthread+0x328/0x630 [ 60.251681] ret_from_fork+0x10/0x20 [ 60.255240] [ 60.256716] The buggy address belongs to the object at ffff000805f49a00 [ 60.256716] which belongs to the cache kmalloc-64 of size 64 [ 60.269042] The buggy address is located 0 bytes to the right of [ 60.269042] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 60.281889] [ 60.283365] The buggy address belongs to the physical page: [ 60.288921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 60.296909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.303416] page_type: f5(slab) [ 60.306550] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.314274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.321992] page dumped because: kasan: bad access detected [ 60.327548] [ 60.329023] Memory state around the buggy address: [ 60.333802] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.341006] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.348211] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.355412] ^ [ 60.360190] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.367395] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.374596] ================================================================== [ 50.652736] ================================================================== [ 50.659814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 50.667103] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 50.674481] [ 50.675964] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 50.676013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.676029] Hardware name: WinLink E850-96 board (DT) [ 50.676049] Call trace: [ 50.676065] show_stack+0x20/0x38 (C) [ 50.676098] dump_stack_lvl+0x8c/0xd0 [ 50.676135] print_report+0x118/0x608 [ 50.676170] kasan_report+0xdc/0x128 [ 50.676203] kasan_check_range+0x100/0x1a8 [ 50.676238] __kasan_check_write+0x20/0x30 [ 50.676269] kasan_atomics_helper+0x6ec/0x4858 [ 50.676304] kasan_atomics+0x198/0x2e0 [ 50.676334] kunit_try_run_case+0x170/0x3f0 [ 50.676368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.676408] kthread+0x328/0x630 [ 50.676435] ret_from_fork+0x10/0x20 [ 50.676468] [ 50.746181] Allocated by task 312: [ 50.749567] kasan_save_stack+0x3c/0x68 [ 50.753386] kasan_save_track+0x20/0x40 [ 50.757205] kasan_save_alloc_info+0x40/0x58 [ 50.761459] __kasan_kmalloc+0xd4/0xd8 [ 50.765192] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.769705] kasan_atomics+0xb8/0x2e0 [ 50.773351] kunit_try_run_case+0x170/0x3f0 [ 50.777518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.782986] kthread+0x328/0x630 [ 50.786198] ret_from_fork+0x10/0x20 [ 50.789757] [ 50.791233] The buggy address belongs to the object at ffff000805f49a00 [ 50.791233] which belongs to the cache kmalloc-64 of size 64 [ 50.803559] The buggy address is located 0 bytes to the right of [ 50.803559] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 50.816406] [ 50.817882] The buggy address belongs to the physical page: [ 50.823438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 50.831425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.837933] page_type: f5(slab) [ 50.841067] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.848791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.856509] page dumped because: kasan: bad access detected [ 50.862065] [ 50.863540] Memory state around the buggy address: [ 50.868319] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.875524] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.882728] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.889929] ^ [ 50.894707] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.901912] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.909113] ================================================================== [ 58.274367] ================================================================== [ 58.281400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 58.288777] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 58.296155] [ 58.297639] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 58.297690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.297706] Hardware name: WinLink E850-96 board (DT) [ 58.297725] Call trace: [ 58.297742] show_stack+0x20/0x38 (C) [ 58.297777] dump_stack_lvl+0x8c/0xd0 [ 58.297815] print_report+0x118/0x608 [ 58.297846] kasan_report+0xdc/0x128 [ 58.297880] kasan_check_range+0x100/0x1a8 [ 58.297916] __kasan_check_write+0x20/0x30 [ 58.297946] kasan_atomics_helper+0x1128/0x4858 [ 58.297979] kasan_atomics+0x198/0x2e0 [ 58.298009] kunit_try_run_case+0x170/0x3f0 [ 58.298045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.298083] kthread+0x328/0x630 [ 58.298109] ret_from_fork+0x10/0x20 [ 58.298141] [ 58.367942] Allocated by task 312: [ 58.371327] kasan_save_stack+0x3c/0x68 [ 58.375147] kasan_save_track+0x20/0x40 [ 58.378966] kasan_save_alloc_info+0x40/0x58 [ 58.383220] __kasan_kmalloc+0xd4/0xd8 [ 58.386952] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.391466] kasan_atomics+0xb8/0x2e0 [ 58.395112] kunit_try_run_case+0x170/0x3f0 [ 58.399278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.404747] kthread+0x328/0x630 [ 58.407959] ret_from_fork+0x10/0x20 [ 58.411518] [ 58.412993] The buggy address belongs to the object at ffff000805f49a00 [ 58.412993] which belongs to the cache kmalloc-64 of size 64 [ 58.425320] The buggy address is located 0 bytes to the right of [ 58.425320] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 58.438166] [ 58.439642] The buggy address belongs to the physical page: [ 58.445200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 58.453187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.459694] page_type: f5(slab) [ 58.462829] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.470551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.478270] page dumped because: kasan: bad access detected [ 58.483825] [ 58.485301] Memory state around the buggy address: [ 58.490080] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.497284] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.504489] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.511690] ^ [ 58.516468] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.523673] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.530874] ================================================================== [ 61.173623] ================================================================== [ 61.180665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 61.188039] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 61.195417] [ 61.196900] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 61.196951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.196968] Hardware name: WinLink E850-96 board (DT) [ 61.196989] Call trace: [ 61.197005] show_stack+0x20/0x38 (C) [ 61.197036] dump_stack_lvl+0x8c/0xd0 [ 61.197070] print_report+0x118/0x608 [ 61.197106] kasan_report+0xdc/0x128 [ 61.197138] kasan_check_range+0x100/0x1a8 [ 61.197174] __kasan_check_write+0x20/0x30 [ 61.197205] kasan_atomics_helper+0x15b4/0x4858 [ 61.197239] kasan_atomics+0x198/0x2e0 [ 61.197272] kunit_try_run_case+0x170/0x3f0 [ 61.197305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.197345] kthread+0x328/0x630 [ 61.197371] ret_from_fork+0x10/0x20 [ 61.197406] [ 61.267204] Allocated by task 312: [ 61.270590] kasan_save_stack+0x3c/0x68 [ 61.274408] kasan_save_track+0x20/0x40 [ 61.278228] kasan_save_alloc_info+0x40/0x58 [ 61.282481] __kasan_kmalloc+0xd4/0xd8 [ 61.286214] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.290728] kasan_atomics+0xb8/0x2e0 [ 61.294374] kunit_try_run_case+0x170/0x3f0 [ 61.298540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.304009] kthread+0x328/0x630 [ 61.307221] ret_from_fork+0x10/0x20 [ 61.310780] [ 61.312255] The buggy address belongs to the object at ffff000805f49a00 [ 61.312255] which belongs to the cache kmalloc-64 of size 64 [ 61.324582] The buggy address is located 0 bytes to the right of [ 61.324582] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 61.337429] [ 61.338904] The buggy address belongs to the physical page: [ 61.344461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 61.352448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.358956] page_type: f5(slab) [ 61.362089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.369813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.377532] page dumped because: kasan: bad access detected [ 61.383088] [ 61.384563] Memory state around the buggy address: [ 61.389341] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.396546] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.403751] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.410952] ^ [ 61.415730] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.422935] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.430136] ================================================================== [ 63.010485] ================================================================== [ 63.017442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 63.024817] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 63.032108] [ 63.033591] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 63.033640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.033660] Hardware name: WinLink E850-96 board (DT) [ 63.033680] Call trace: [ 63.033694] show_stack+0x20/0x38 (C) [ 63.033726] dump_stack_lvl+0x8c/0xd0 [ 63.033763] print_report+0x118/0x608 [ 63.033797] kasan_report+0xdc/0x128 [ 63.033833] __asan_report_load8_noabort+0x20/0x30 [ 63.033870] kasan_atomics_helper+0x3e20/0x4858 [ 63.033903] kasan_atomics+0x198/0x2e0 [ 63.033936] kunit_try_run_case+0x170/0x3f0 [ 63.033970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.034007] kthread+0x328/0x630 [ 63.034033] ret_from_fork+0x10/0x20 [ 63.034066] [ 63.100509] Allocated by task 312: [ 63.103895] kasan_save_stack+0x3c/0x68 [ 63.107715] kasan_save_track+0x20/0x40 [ 63.111534] kasan_save_alloc_info+0x40/0x58 [ 63.115788] __kasan_kmalloc+0xd4/0xd8 [ 63.119520] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.124034] kasan_atomics+0xb8/0x2e0 [ 63.127679] kunit_try_run_case+0x170/0x3f0 [ 63.131846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.137315] kthread+0x328/0x630 [ 63.140527] ret_from_fork+0x10/0x20 [ 63.144086] [ 63.145561] The buggy address belongs to the object at ffff000805f49a00 [ 63.145561] which belongs to the cache kmalloc-64 of size 64 [ 63.157888] The buggy address is located 0 bytes to the right of [ 63.157888] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 63.170734] [ 63.172210] The buggy address belongs to the physical page: [ 63.177768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 63.185755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.192262] page_type: f5(slab) [ 63.195396] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.203119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.210838] page dumped because: kasan: bad access detected [ 63.216393] [ 63.217869] Memory state around the buggy address: [ 63.222649] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.229852] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.237057] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.244258] ^ [ 63.249036] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.256240] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.263441] ================================================================== [ 52.495405] ================================================================== [ 52.502493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 52.509783] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 52.517162] [ 52.518644] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 52.518691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.518705] Hardware name: WinLink E850-96 board (DT) [ 52.518724] Call trace: [ 52.518738] show_stack+0x20/0x38 (C) [ 52.518772] dump_stack_lvl+0x8c/0xd0 [ 52.518807] print_report+0x118/0x608 [ 52.518841] kasan_report+0xdc/0x128 [ 52.518876] kasan_check_range+0x100/0x1a8 [ 52.518910] __kasan_check_write+0x20/0x30 [ 52.518938] kasan_atomics_helper+0xa04/0x4858 [ 52.518972] kasan_atomics+0x198/0x2e0 [ 52.519002] kunit_try_run_case+0x170/0x3f0 [ 52.519038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.519075] kthread+0x328/0x630 [ 52.519103] ret_from_fork+0x10/0x20 [ 52.519134] [ 52.588862] Allocated by task 312: [ 52.592247] kasan_save_stack+0x3c/0x68 [ 52.596067] kasan_save_track+0x20/0x40 [ 52.599886] kasan_save_alloc_info+0x40/0x58 [ 52.604139] __kasan_kmalloc+0xd4/0xd8 [ 52.607872] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.612386] kasan_atomics+0xb8/0x2e0 [ 52.616032] kunit_try_run_case+0x170/0x3f0 [ 52.620198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.625667] kthread+0x328/0x630 [ 52.628879] ret_from_fork+0x10/0x20 [ 52.632438] [ 52.633913] The buggy address belongs to the object at ffff000805f49a00 [ 52.633913] which belongs to the cache kmalloc-64 of size 64 [ 52.646240] The buggy address is located 0 bytes to the right of [ 52.646240] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 52.659087] [ 52.660562] The buggy address belongs to the physical page: [ 52.666118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 52.674104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.680614] page_type: f5(slab) [ 52.683747] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.691471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.699190] page dumped because: kasan: bad access detected [ 52.704746] [ 52.706221] Memory state around the buggy address: [ 52.711000] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.718204] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.725409] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.732610] ^ [ 52.737388] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.744593] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.751794] ================================================================== [ 61.961852] ================================================================== [ 61.968845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 61.976221] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 61.983513] [ 61.984996] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 61.985048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.985063] Hardware name: WinLink E850-96 board (DT) [ 61.985081] Call trace: [ 61.985097] show_stack+0x20/0x38 (C) [ 61.985129] dump_stack_lvl+0x8c/0xd0 [ 61.985166] print_report+0x118/0x608 [ 61.985199] kasan_report+0xdc/0x128 [ 61.985234] __asan_report_load8_noabort+0x20/0x30 [ 61.985274] kasan_atomics_helper+0x3df4/0x4858 [ 61.985307] kasan_atomics+0x198/0x2e0 [ 61.985338] kunit_try_run_case+0x170/0x3f0 [ 61.985373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.985410] kthread+0x328/0x630 [ 61.985438] ret_from_fork+0x10/0x20 [ 61.985469] [ 62.051914] Allocated by task 312: [ 62.055300] kasan_save_stack+0x3c/0x68 [ 62.059119] kasan_save_track+0x20/0x40 [ 62.062939] kasan_save_alloc_info+0x40/0x58 [ 62.067192] __kasan_kmalloc+0xd4/0xd8 [ 62.070924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.075438] kasan_atomics+0xb8/0x2e0 [ 62.079084] kunit_try_run_case+0x170/0x3f0 [ 62.083251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.088719] kthread+0x328/0x630 [ 62.091931] ret_from_fork+0x10/0x20 [ 62.095490] [ 62.096967] The buggy address belongs to the object at ffff000805f49a00 [ 62.096967] which belongs to the cache kmalloc-64 of size 64 [ 62.109292] The buggy address is located 0 bytes to the right of [ 62.109292] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 62.122139] [ 62.123615] The buggy address belongs to the physical page: [ 62.129170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 62.137158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.143666] page_type: f5(slab) [ 62.146799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.154524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.162242] page dumped because: kasan: bad access detected [ 62.167798] [ 62.169273] Memory state around the buggy address: [ 62.174054] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.181257] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.188461] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.195662] ^ [ 62.200440] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.207645] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.214846] ================================================================== [ 46.967607] ================================================================== [ 46.974627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 46.981915] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 46.989207] [ 46.990691] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 46.990741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.990759] Hardware name: WinLink E850-96 board (DT) [ 46.990779] Call trace: [ 46.990791] show_stack+0x20/0x38 (C) [ 46.990826] dump_stack_lvl+0x8c/0xd0 [ 46.990866] print_report+0x118/0x608 [ 46.990903] kasan_report+0xdc/0x128 [ 46.990938] kasan_check_range+0x100/0x1a8 [ 46.990978] __kasan_check_read+0x20/0x30 [ 46.991007] kasan_atomics_helper+0x1ec/0x4858 [ 46.991039] kasan_atomics+0x198/0x2e0 [ 46.991072] kunit_try_run_case+0x170/0x3f0 [ 46.991107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.991146] kthread+0x328/0x630 [ 46.991175] ret_from_fork+0x10/0x20 [ 46.991212] [ 47.060820] Allocated by task 312: [ 47.064207] kasan_save_stack+0x3c/0x68 [ 47.068025] kasan_save_track+0x20/0x40 [ 47.071844] kasan_save_alloc_info+0x40/0x58 [ 47.076098] __kasan_kmalloc+0xd4/0xd8 [ 47.079830] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.084344] kasan_atomics+0xb8/0x2e0 [ 47.087990] kunit_try_run_case+0x170/0x3f0 [ 47.092156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.097625] kthread+0x328/0x630 [ 47.100837] ret_from_fork+0x10/0x20 [ 47.104396] [ 47.105873] The buggy address belongs to the object at ffff000805f49a00 [ 47.105873] which belongs to the cache kmalloc-64 of size 64 [ 47.118198] The buggy address is located 0 bytes to the right of [ 47.118198] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 47.131045] [ 47.132522] The buggy address belongs to the physical page: [ 47.138078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 47.146064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.152573] page_type: f5(slab) [ 47.155707] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.163429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.171148] page dumped because: kasan: bad access detected [ 47.176703] [ 47.178179] Memory state around the buggy address: [ 47.182959] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.190162] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.197367] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.204568] ^ [ 47.209346] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.216550] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.223751] ================================================================== [ 49.597924] ================================================================== [ 49.604968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 49.612258] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 49.619636] [ 49.621119] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 49.621167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.621185] Hardware name: WinLink E850-96 board (DT) [ 49.621208] Call trace: [ 49.621222] show_stack+0x20/0x38 (C) [ 49.621255] dump_stack_lvl+0x8c/0xd0 [ 49.621292] print_report+0x118/0x608 [ 49.621325] kasan_report+0xdc/0x128 [ 49.621359] kasan_check_range+0x100/0x1a8 [ 49.621394] __kasan_check_write+0x20/0x30 [ 49.621425] kasan_atomics_helper+0x54c/0x4858 [ 49.621460] kasan_atomics+0x198/0x2e0 [ 49.621491] kunit_try_run_case+0x170/0x3f0 [ 49.621525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.621562] kthread+0x328/0x630 [ 49.621590] ret_from_fork+0x10/0x20 [ 49.621621] [ 49.691336] Allocated by task 312: [ 49.694722] kasan_save_stack+0x3c/0x68 [ 49.698541] kasan_save_track+0x20/0x40 [ 49.702360] kasan_save_alloc_info+0x40/0x58 [ 49.706614] __kasan_kmalloc+0xd4/0xd8 [ 49.710346] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.714860] kasan_atomics+0xb8/0x2e0 [ 49.718505] kunit_try_run_case+0x170/0x3f0 [ 49.722673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.728141] kthread+0x328/0x630 [ 49.731353] ret_from_fork+0x10/0x20 [ 49.734912] [ 49.736387] The buggy address belongs to the object at ffff000805f49a00 [ 49.736387] which belongs to the cache kmalloc-64 of size 64 [ 49.748714] The buggy address is located 0 bytes to the right of [ 49.748714] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 49.761561] [ 49.763037] The buggy address belongs to the physical page: [ 49.768593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 49.776579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.783088] page_type: f5(slab) [ 49.786221] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.793945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.801664] page dumped because: kasan: bad access detected [ 49.807220] [ 49.808695] Memory state around the buggy address: [ 49.813474] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.820678] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.827883] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.835084] ^ [ 49.839862] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.847067] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.854268] ================================================================== [ 58.802111] ================================================================== [ 58.809171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 58.816547] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 58.823925] [ 58.825408] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 58.825457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.825473] Hardware name: WinLink E850-96 board (DT) [ 58.825490] Call trace: [ 58.825507] show_stack+0x20/0x38 (C) [ 58.825537] dump_stack_lvl+0x8c/0xd0 [ 58.825573] print_report+0x118/0x608 [ 58.825609] kasan_report+0xdc/0x128 [ 58.825641] kasan_check_range+0x100/0x1a8 [ 58.825676] __kasan_check_write+0x20/0x30 [ 58.825705] kasan_atomics_helper+0x11f8/0x4858 [ 58.825740] kasan_atomics+0x198/0x2e0 [ 58.825773] kunit_try_run_case+0x170/0x3f0 [ 58.825807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.825846] kthread+0x328/0x630 [ 58.825874] ret_from_fork+0x10/0x20 [ 58.825905] [ 58.895711] Allocated by task 312: [ 58.899097] kasan_save_stack+0x3c/0x68 [ 58.902916] kasan_save_track+0x20/0x40 [ 58.906736] kasan_save_alloc_info+0x40/0x58 [ 58.910989] __kasan_kmalloc+0xd4/0xd8 [ 58.914722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.919236] kasan_atomics+0xb8/0x2e0 [ 58.922882] kunit_try_run_case+0x170/0x3f0 [ 58.927048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.932517] kthread+0x328/0x630 [ 58.935729] ret_from_fork+0x10/0x20 [ 58.939288] [ 58.940763] The buggy address belongs to the object at ffff000805f49a00 [ 58.940763] which belongs to the cache kmalloc-64 of size 64 [ 58.953090] The buggy address is located 0 bytes to the right of [ 58.953090] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 58.965937] [ 58.967412] The buggy address belongs to the physical page: [ 58.972968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 58.980955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.987464] page_type: f5(slab) [ 58.990597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.998321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.006040] page dumped because: kasan: bad access detected [ 59.011595] [ 59.013071] Memory state around the buggy address: [ 59.017850] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.025054] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.032258] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.039460] ^ [ 59.044238] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.051443] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.058643] ================================================================== [ 50.916548] ================================================================== [ 50.923526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 50.930814] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 50.938193] [ 50.939676] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 50.939724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.939741] Hardware name: WinLink E850-96 board (DT) [ 50.939762] Call trace: [ 50.939777] show_stack+0x20/0x38 (C) [ 50.939810] dump_stack_lvl+0x8c/0xd0 [ 50.939845] print_report+0x118/0x608 [ 50.939880] kasan_report+0xdc/0x128 [ 50.939915] kasan_check_range+0x100/0x1a8 [ 50.939950] __kasan_check_write+0x20/0x30 [ 50.939980] kasan_atomics_helper+0x760/0x4858 [ 50.940013] kasan_atomics+0x198/0x2e0 [ 50.940044] kunit_try_run_case+0x170/0x3f0 [ 50.940079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.940117] kthread+0x328/0x630 [ 50.940144] ret_from_fork+0x10/0x20 [ 50.940176] [ 51.009892] Allocated by task 312: [ 51.013278] kasan_save_stack+0x3c/0x68 [ 51.017097] kasan_save_track+0x20/0x40 [ 51.020917] kasan_save_alloc_info+0x40/0x58 [ 51.025170] __kasan_kmalloc+0xd4/0xd8 [ 51.028903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.033416] kasan_atomics+0xb8/0x2e0 [ 51.037063] kunit_try_run_case+0x170/0x3f0 [ 51.041229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.046698] kthread+0x328/0x630 [ 51.049909] ret_from_fork+0x10/0x20 [ 51.053468] [ 51.054944] The buggy address belongs to the object at ffff000805f49a00 [ 51.054944] which belongs to the cache kmalloc-64 of size 64 [ 51.067271] The buggy address is located 0 bytes to the right of [ 51.067271] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 51.080117] [ 51.081593] The buggy address belongs to the physical page: [ 51.087149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 51.095135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.101645] page_type: f5(slab) [ 51.104779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.112502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.120221] page dumped because: kasan: bad access detected [ 51.125776] [ 51.127252] Memory state around the buggy address: [ 51.132030] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.139235] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.146440] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.153641] ^ [ 51.158418] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.165623] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.172824] ================================================================== [ 59.593777] ================================================================== [ 59.600825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 59.608201] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 59.615580] [ 59.617063] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 59.617110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.617125] Hardware name: WinLink E850-96 board (DT) [ 59.617145] Call trace: [ 59.617161] show_stack+0x20/0x38 (C) [ 59.617192] dump_stack_lvl+0x8c/0xd0 [ 59.617229] print_report+0x118/0x608 [ 59.617261] kasan_report+0xdc/0x128 [ 59.617296] kasan_check_range+0x100/0x1a8 [ 59.617329] __kasan_check_write+0x20/0x30 [ 59.617359] kasan_atomics_helper+0x1384/0x4858 [ 59.617392] kasan_atomics+0x198/0x2e0 [ 59.617422] kunit_try_run_case+0x170/0x3f0 [ 59.617455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.617493] kthread+0x328/0x630 [ 59.617520] ret_from_fork+0x10/0x20 [ 59.617553] [ 59.687367] Allocated by task 312: [ 59.690752] kasan_save_stack+0x3c/0x68 [ 59.694571] kasan_save_track+0x20/0x40 [ 59.698391] kasan_save_alloc_info+0x40/0x58 [ 59.702644] __kasan_kmalloc+0xd4/0xd8 [ 59.706377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.710891] kasan_atomics+0xb8/0x2e0 [ 59.714536] kunit_try_run_case+0x170/0x3f0 [ 59.718703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.724172] kthread+0x328/0x630 [ 59.727383] ret_from_fork+0x10/0x20 [ 59.730942] [ 59.732418] The buggy address belongs to the object at ffff000805f49a00 [ 59.732418] which belongs to the cache kmalloc-64 of size 64 [ 59.744745] The buggy address is located 0 bytes to the right of [ 59.744745] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 59.757591] [ 59.759067] The buggy address belongs to the physical page: [ 59.764623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 59.772612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.779119] page_type: f5(slab) [ 59.782252] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.789976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.797695] page dumped because: kasan: bad access detected [ 59.803250] [ 59.804726] Memory state around the buggy address: [ 59.809504] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.816709] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.823914] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.831114] ^ [ 59.835892] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.843097] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.850298] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 44.554430] ================================================================== [ 44.561467] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.570406] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 44.577785] [ 44.579265] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 44.579312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.579328] Hardware name: WinLink E850-96 board (DT) [ 44.579344] Call trace: [ 44.579358] show_stack+0x20/0x38 (C) [ 44.579393] dump_stack_lvl+0x8c/0xd0 [ 44.579427] print_report+0x118/0x608 [ 44.579461] kasan_report+0xdc/0x128 [ 44.579494] kasan_check_range+0x100/0x1a8 [ 44.579529] __kasan_check_write+0x20/0x30 [ 44.579558] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.579594] kasan_bitops_generic+0x11c/0x1c8 [ 44.579628] kunit_try_run_case+0x170/0x3f0 [ 44.579661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.579698] kthread+0x328/0x630 [ 44.579725] ret_from_fork+0x10/0x20 [ 44.579758] [ 44.651741] Allocated by task 308: [ 44.655127] kasan_save_stack+0x3c/0x68 [ 44.658946] kasan_save_track+0x20/0x40 [ 44.662766] kasan_save_alloc_info+0x40/0x58 [ 44.667019] __kasan_kmalloc+0xd4/0xd8 [ 44.670752] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.675265] kasan_bitops_generic+0xa0/0x1c8 [ 44.679519] kunit_try_run_case+0x170/0x3f0 [ 44.683686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.689154] kthread+0x328/0x630 [ 44.692366] ret_from_fork+0x10/0x20 [ 44.695925] [ 44.697400] The buggy address belongs to the object at ffff000800d63060 [ 44.697400] which belongs to the cache kmalloc-16 of size 16 [ 44.709727] The buggy address is located 8 bytes inside of [ 44.709727] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 44.721966] [ 44.723442] The buggy address belongs to the physical page: [ 44.728998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 44.736983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.743494] page_type: f5(slab) [ 44.746627] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.754351] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.762070] page dumped because: kasan: bad access detected [ 44.767625] [ 44.769101] Memory state around the buggy address: [ 44.773879] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.781084] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.788289] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 44.795489] ^ [ 44.802090] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.809296] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.816496] ================================================================== [ 45.625215] ================================================================== [ 45.632284] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.641224] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 45.648602] [ 45.650082] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 45.650127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.650143] Hardware name: WinLink E850-96 board (DT) [ 45.650160] Call trace: [ 45.650176] show_stack+0x20/0x38 (C) [ 45.650206] dump_stack_lvl+0x8c/0xd0 [ 45.650239] print_report+0x118/0x608 [ 45.650273] kasan_report+0xdc/0x128 [ 45.650303] kasan_check_range+0x100/0x1a8 [ 45.650339] __kasan_check_write+0x20/0x30 [ 45.650369] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.650407] kasan_bitops_generic+0x11c/0x1c8 [ 45.650440] kunit_try_run_case+0x170/0x3f0 [ 45.650472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.650509] kthread+0x328/0x630 [ 45.650537] ret_from_fork+0x10/0x20 [ 45.650566] [ 45.722559] Allocated by task 308: [ 45.725944] kasan_save_stack+0x3c/0x68 [ 45.729764] kasan_save_track+0x20/0x40 [ 45.733583] kasan_save_alloc_info+0x40/0x58 [ 45.737836] __kasan_kmalloc+0xd4/0xd8 [ 45.741569] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.746083] kasan_bitops_generic+0xa0/0x1c8 [ 45.750336] kunit_try_run_case+0x170/0x3f0 [ 45.754503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.759971] kthread+0x328/0x630 [ 45.763183] ret_from_fork+0x10/0x20 [ 45.766742] [ 45.768218] The buggy address belongs to the object at ffff000800d63060 [ 45.768218] which belongs to the cache kmalloc-16 of size 16 [ 45.780545] The buggy address is located 8 bytes inside of [ 45.780545] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 45.792784] [ 45.794260] The buggy address belongs to the physical page: [ 45.799815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 45.807802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.814311] page_type: f5(slab) [ 45.817444] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.825169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.832887] page dumped because: kasan: bad access detected [ 45.838442] [ 45.839918] Memory state around the buggy address: [ 45.844697] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.851901] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.859106] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 45.866307] ^ [ 45.872908] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.880112] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.887313] ================================================================== [ 46.160653] ================================================================== [ 46.167694] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.176632] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 46.183924] [ 46.185405] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 46.185450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.185466] Hardware name: WinLink E850-96 board (DT) [ 46.185485] Call trace: [ 46.185498] show_stack+0x20/0x38 (C) [ 46.185533] dump_stack_lvl+0x8c/0xd0 [ 46.185565] print_report+0x118/0x608 [ 46.185599] kasan_report+0xdc/0x128 [ 46.185631] __asan_report_load8_noabort+0x20/0x30 [ 46.185669] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.185707] kasan_bitops_generic+0x11c/0x1c8 [ 46.185741] kunit_try_run_case+0x170/0x3f0 [ 46.185777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.185816] kthread+0x328/0x630 [ 46.185841] ret_from_fork+0x10/0x20 [ 46.185872] [ 46.254495] Allocated by task 308: [ 46.257881] kasan_save_stack+0x3c/0x68 [ 46.261700] kasan_save_track+0x20/0x40 [ 46.265519] kasan_save_alloc_info+0x40/0x58 [ 46.269773] __kasan_kmalloc+0xd4/0xd8 [ 46.273505] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.278019] kasan_bitops_generic+0xa0/0x1c8 [ 46.282273] kunit_try_run_case+0x170/0x3f0 [ 46.286439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.291908] kthread+0x328/0x630 [ 46.295120] ret_from_fork+0x10/0x20 [ 46.298678] [ 46.300154] The buggy address belongs to the object at ffff000800d63060 [ 46.300154] which belongs to the cache kmalloc-16 of size 16 [ 46.312481] The buggy address is located 8 bytes inside of [ 46.312481] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 46.324720] [ 46.326196] The buggy address belongs to the physical page: [ 46.331752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 46.339739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.346247] page_type: f5(slab) [ 46.349381] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.357105] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.364823] page dumped because: kasan: bad access detected [ 46.370379] [ 46.371854] Memory state around the buggy address: [ 46.376633] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.383838] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.391042] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 46.398243] ^ [ 46.404844] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.412049] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.419250] ================================================================== [ 45.089838] ================================================================== [ 45.096875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.105815] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 45.113193] [ 45.114674] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 45.114720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.114738] Hardware name: WinLink E850-96 board (DT) [ 45.114756] Call trace: [ 45.114769] show_stack+0x20/0x38 (C) [ 45.114803] dump_stack_lvl+0x8c/0xd0 [ 45.114839] print_report+0x118/0x608 [ 45.114873] kasan_report+0xdc/0x128 [ 45.114906] kasan_check_range+0x100/0x1a8 [ 45.114941] __kasan_check_write+0x20/0x30 [ 45.114971] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.115009] kasan_bitops_generic+0x11c/0x1c8 [ 45.115041] kunit_try_run_case+0x170/0x3f0 [ 45.115076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.115114] kthread+0x328/0x630 [ 45.115141] ret_from_fork+0x10/0x20 [ 45.115171] [ 45.187150] Allocated by task 308: [ 45.190536] kasan_save_stack+0x3c/0x68 [ 45.194355] kasan_save_track+0x20/0x40 [ 45.198174] kasan_save_alloc_info+0x40/0x58 [ 45.202428] __kasan_kmalloc+0xd4/0xd8 [ 45.206160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.210674] kasan_bitops_generic+0xa0/0x1c8 [ 45.214928] kunit_try_run_case+0x170/0x3f0 [ 45.219094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.224563] kthread+0x328/0x630 [ 45.227774] ret_from_fork+0x10/0x20 [ 45.231334] [ 45.232809] The buggy address belongs to the object at ffff000800d63060 [ 45.232809] which belongs to the cache kmalloc-16 of size 16 [ 45.245137] The buggy address is located 8 bytes inside of [ 45.245137] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 45.257375] [ 45.258851] The buggy address belongs to the physical page: [ 45.264407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 45.272392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.278902] page_type: f5(slab) [ 45.282036] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.289760] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.297478] page dumped because: kasan: bad access detected [ 45.303034] [ 45.304509] Memory state around the buggy address: [ 45.309288] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.316492] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.323697] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 45.330898] ^ [ 45.337499] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.344704] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.351905] ================================================================== [ 45.359255] ================================================================== [ 45.366315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.375255] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 45.382547] [ 45.384028] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 45.384074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.384092] Hardware name: WinLink E850-96 board (DT) [ 45.384109] Call trace: [ 45.384123] show_stack+0x20/0x38 (C) [ 45.384155] dump_stack_lvl+0x8c/0xd0 [ 45.384190] print_report+0x118/0x608 [ 45.384223] kasan_report+0xdc/0x128 [ 45.384255] __asan_report_load8_noabort+0x20/0x30 [ 45.384293] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.384331] kasan_bitops_generic+0x11c/0x1c8 [ 45.384364] kunit_try_run_case+0x170/0x3f0 [ 45.384398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.384436] kthread+0x328/0x630 [ 45.384464] ret_from_fork+0x10/0x20 [ 45.384494] [ 45.453118] Allocated by task 308: [ 45.456504] kasan_save_stack+0x3c/0x68 [ 45.460323] kasan_save_track+0x20/0x40 [ 45.464143] kasan_save_alloc_info+0x40/0x58 [ 45.468396] __kasan_kmalloc+0xd4/0xd8 [ 45.472128] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.476642] kasan_bitops_generic+0xa0/0x1c8 [ 45.480896] kunit_try_run_case+0x170/0x3f0 [ 45.485063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.490531] kthread+0x328/0x630 [ 45.493743] ret_from_fork+0x10/0x20 [ 45.497302] [ 45.498777] The buggy address belongs to the object at ffff000800d63060 [ 45.498777] which belongs to the cache kmalloc-16 of size 16 [ 45.511104] The buggy address is located 8 bytes inside of [ 45.511104] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 45.523343] [ 45.524819] The buggy address belongs to the physical page: [ 45.530375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 45.538360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.544870] page_type: f5(slab) [ 45.548004] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.555728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.563446] page dumped because: kasan: bad access detected [ 45.569002] [ 45.570477] Memory state around the buggy address: [ 45.575256] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.582461] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.589665] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 45.596866] ^ [ 45.603467] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.610672] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.617873] ================================================================== [ 45.894629] ================================================================== [ 45.901724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 45.910664] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 45.917955] [ 45.919435] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 45.919483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.919501] Hardware name: WinLink E850-96 board (DT) [ 45.919520] Call trace: [ 45.919532] show_stack+0x20/0x38 (C) [ 45.919567] dump_stack_lvl+0x8c/0xd0 [ 45.919599] print_report+0x118/0x608 [ 45.919631] kasan_report+0xdc/0x128 [ 45.919664] __asan_report_load8_noabort+0x20/0x30 [ 45.919700] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 45.919738] kasan_bitops_generic+0x11c/0x1c8 [ 45.919771] kunit_try_run_case+0x170/0x3f0 [ 45.919804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.919842] kthread+0x328/0x630 [ 45.919867] ret_from_fork+0x10/0x20 [ 45.919899] [ 45.988527] Allocated by task 308: [ 45.991912] kasan_save_stack+0x3c/0x68 [ 45.995732] kasan_save_track+0x20/0x40 [ 45.999551] kasan_save_alloc_info+0x40/0x58 [ 46.003804] __kasan_kmalloc+0xd4/0xd8 [ 46.007537] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.012051] kasan_bitops_generic+0xa0/0x1c8 [ 46.016305] kunit_try_run_case+0x170/0x3f0 [ 46.020471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.025940] kthread+0x328/0x630 [ 46.029151] ret_from_fork+0x10/0x20 [ 46.032710] [ 46.034186] The buggy address belongs to the object at ffff000800d63060 [ 46.034186] which belongs to the cache kmalloc-16 of size 16 [ 46.046513] The buggy address is located 8 bytes inside of [ 46.046513] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 46.058752] [ 46.060228] The buggy address belongs to the physical page: [ 46.065784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 46.073769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.080279] page_type: f5(slab) [ 46.083412] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.091137] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.098855] page dumped because: kasan: bad access detected [ 46.104411] [ 46.105886] Memory state around the buggy address: [ 46.110665] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.117870] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.125074] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 46.132275] ^ [ 46.138876] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.146081] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.153282] ================================================================== [ 44.823844] ================================================================== [ 44.830909] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.839847] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 44.847138] [ 44.848619] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 44.848664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.848680] Hardware name: WinLink E850-96 board (DT) [ 44.848699] Call trace: [ 44.848711] show_stack+0x20/0x38 (C) [ 44.848746] dump_stack_lvl+0x8c/0xd0 [ 44.848781] print_report+0x118/0x608 [ 44.848813] kasan_report+0xdc/0x128 [ 44.848847] __asan_report_load8_noabort+0x20/0x30 [ 44.848885] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.848923] kasan_bitops_generic+0x11c/0x1c8 [ 44.848955] kunit_try_run_case+0x170/0x3f0 [ 44.848991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.849029] kthread+0x328/0x630 [ 44.849056] ret_from_fork+0x10/0x20 [ 44.849087] [ 44.917710] Allocated by task 308: [ 44.921095] kasan_save_stack+0x3c/0x68 [ 44.924915] kasan_save_track+0x20/0x40 [ 44.928734] kasan_save_alloc_info+0x40/0x58 [ 44.932987] __kasan_kmalloc+0xd4/0xd8 [ 44.936720] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.941234] kasan_bitops_generic+0xa0/0x1c8 [ 44.945487] kunit_try_run_case+0x170/0x3f0 [ 44.949654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.955122] kthread+0x328/0x630 [ 44.958334] ret_from_fork+0x10/0x20 [ 44.961893] [ 44.963369] The buggy address belongs to the object at ffff000800d63060 [ 44.963369] which belongs to the cache kmalloc-16 of size 16 [ 44.975696] The buggy address is located 8 bytes inside of [ 44.975696] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 44.987935] [ 44.989410] The buggy address belongs to the physical page: [ 44.994966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 45.002952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.009462] page_type: f5(slab) [ 45.012595] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.020320] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.028038] page dumped because: kasan: bad access detected [ 45.033593] [ 45.035069] Memory state around the buggy address: [ 45.039847] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.047052] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.054257] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 45.061457] ^ [ 45.068058] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.075263] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.082465] ================================================================== [ 44.288411] ================================================================== [ 44.295498] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.304438] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 44.311730] [ 44.313210] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 44.313255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.313276] Hardware name: WinLink E850-96 board (DT) [ 44.313293] Call trace: [ 44.313307] show_stack+0x20/0x38 (C) [ 44.313342] dump_stack_lvl+0x8c/0xd0 [ 44.313378] print_report+0x118/0x608 [ 44.313410] kasan_report+0xdc/0x128 [ 44.313443] __asan_report_load8_noabort+0x20/0x30 [ 44.313480] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.313518] kasan_bitops_generic+0x11c/0x1c8 [ 44.313549] kunit_try_run_case+0x170/0x3f0 [ 44.313584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.313623] kthread+0x328/0x630 [ 44.313649] ret_from_fork+0x10/0x20 [ 44.313681] [ 44.382301] Allocated by task 308: [ 44.385687] kasan_save_stack+0x3c/0x68 [ 44.389506] kasan_save_track+0x20/0x40 [ 44.393325] kasan_save_alloc_info+0x40/0x58 [ 44.397579] __kasan_kmalloc+0xd4/0xd8 [ 44.401311] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.405825] kasan_bitops_generic+0xa0/0x1c8 [ 44.410078] kunit_try_run_case+0x170/0x3f0 [ 44.414245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.419714] kthread+0x328/0x630 [ 44.422926] ret_from_fork+0x10/0x20 [ 44.426485] [ 44.427960] The buggy address belongs to the object at ffff000800d63060 [ 44.427960] which belongs to the cache kmalloc-16 of size 16 [ 44.440287] The buggy address is located 8 bytes inside of [ 44.440287] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 44.452526] [ 44.454002] The buggy address belongs to the physical page: [ 44.459559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 44.467543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.474054] page_type: f5(slab) [ 44.477187] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.484911] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.492630] page dumped because: kasan: bad access detected [ 44.498185] [ 44.499660] Memory state around the buggy address: [ 44.504438] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.511644] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.518848] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 44.526049] ^ [ 44.532650] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.539855] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.547056] ================================================================== [ 44.019166] ================================================================== [ 44.026233] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.035084] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 44.042463] [ 44.043942] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 44.043991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.044006] Hardware name: WinLink E850-96 board (DT) [ 44.044026] Call trace: [ 44.044040] show_stack+0x20/0x38 (C) [ 44.044075] dump_stack_lvl+0x8c/0xd0 [ 44.044112] print_report+0x118/0x608 [ 44.044144] kasan_report+0xdc/0x128 [ 44.044178] kasan_check_range+0x100/0x1a8 [ 44.044212] __kasan_check_write+0x20/0x30 [ 44.044241] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.044280] kasan_bitops_generic+0x11c/0x1c8 [ 44.044312] kunit_try_run_case+0x170/0x3f0 [ 44.044346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.044385] kthread+0x328/0x630 [ 44.044411] ret_from_fork+0x10/0x20 [ 44.044444] [ 44.116333] Allocated by task 308: [ 44.119718] kasan_save_stack+0x3c/0x68 [ 44.123538] kasan_save_track+0x20/0x40 [ 44.127357] kasan_save_alloc_info+0x40/0x58 [ 44.131611] __kasan_kmalloc+0xd4/0xd8 [ 44.135343] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.139857] kasan_bitops_generic+0xa0/0x1c8 [ 44.144110] kunit_try_run_case+0x170/0x3f0 [ 44.148277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.153746] kthread+0x328/0x630 [ 44.156957] ret_from_fork+0x10/0x20 [ 44.160516] [ 44.161992] The buggy address belongs to the object at ffff000800d63060 [ 44.161992] which belongs to the cache kmalloc-16 of size 16 [ 44.174319] The buggy address is located 8 bytes inside of [ 44.174319] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 44.186558] [ 44.188034] The buggy address belongs to the physical page: [ 44.193590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 44.201575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.208085] page_type: f5(slab) [ 44.211218] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.218943] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.226661] page dumped because: kasan: bad access detected [ 44.232217] [ 44.233692] Memory state around the buggy address: [ 44.238471] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.245675] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.252880] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 44.260081] ^ [ 44.266682] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.273887] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.281087] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 43.754770] ================================================================== [ 43.761826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.769984] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 43.777276] [ 43.778756] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 43.778806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.778822] Hardware name: WinLink E850-96 board (DT) [ 43.778843] Call trace: [ 43.778856] show_stack+0x20/0x38 (C) [ 43.778889] dump_stack_lvl+0x8c/0xd0 [ 43.778924] print_report+0x118/0x608 [ 43.778959] kasan_report+0xdc/0x128 [ 43.778993] __asan_report_load8_noabort+0x20/0x30 [ 43.779033] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.779069] kasan_bitops_generic+0x110/0x1c8 [ 43.779102] kunit_try_run_case+0x170/0x3f0 [ 43.779137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.779174] kthread+0x328/0x630 [ 43.779201] ret_from_fork+0x10/0x20 [ 43.779234] [ 43.847066] Allocated by task 308: [ 43.850452] kasan_save_stack+0x3c/0x68 [ 43.854271] kasan_save_track+0x20/0x40 [ 43.858090] kasan_save_alloc_info+0x40/0x58 [ 43.862344] __kasan_kmalloc+0xd4/0xd8 [ 43.866076] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.870590] kasan_bitops_generic+0xa0/0x1c8 [ 43.874843] kunit_try_run_case+0x170/0x3f0 [ 43.879010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.884479] kthread+0x328/0x630 [ 43.887690] ret_from_fork+0x10/0x20 [ 43.891249] [ 43.892725] The buggy address belongs to the object at ffff000800d63060 [ 43.892725] which belongs to the cache kmalloc-16 of size 16 [ 43.905052] The buggy address is located 8 bytes inside of [ 43.905052] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 43.917291] [ 43.918767] The buggy address belongs to the physical page: [ 43.924326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.932309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.938818] page_type: f5(slab) [ 43.941952] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.949676] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.957394] page dumped because: kasan: bad access detected [ 43.962950] [ 43.964425] Memory state around the buggy address: [ 43.969204] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.976408] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.983613] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 43.990814] ^ [ 43.997415] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.004620] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.011821] ================================================================== [ 41.622131] ================================================================== [ 41.629221] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.637377] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 41.644669] [ 41.646153] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 41.646206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.646225] Hardware name: WinLink E850-96 board (DT) [ 41.646247] Call trace: [ 41.646264] show_stack+0x20/0x38 (C) [ 41.646298] dump_stack_lvl+0x8c/0xd0 [ 41.646335] print_report+0x118/0x608 [ 41.646370] kasan_report+0xdc/0x128 [ 41.646405] __asan_report_load8_noabort+0x20/0x30 [ 41.646444] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.646478] kasan_bitops_generic+0x110/0x1c8 [ 41.646510] kunit_try_run_case+0x170/0x3f0 [ 41.646546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.646586] kthread+0x328/0x630 [ 41.646615] ret_from_fork+0x10/0x20 [ 41.646649] [ 41.714459] Allocated by task 308: [ 41.717848] kasan_save_stack+0x3c/0x68 [ 41.721664] kasan_save_track+0x20/0x40 [ 41.725483] kasan_save_alloc_info+0x40/0x58 [ 41.729737] __kasan_kmalloc+0xd4/0xd8 [ 41.733470] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.737983] kasan_bitops_generic+0xa0/0x1c8 [ 41.742237] kunit_try_run_case+0x170/0x3f0 [ 41.746403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.751872] kthread+0x328/0x630 [ 41.755084] ret_from_fork+0x10/0x20 [ 41.758642] [ 41.760120] The buggy address belongs to the object at ffff000800d63060 [ 41.760120] which belongs to the cache kmalloc-16 of size 16 [ 41.772445] The buggy address is located 8 bytes inside of [ 41.772445] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 41.784684] [ 41.786161] The buggy address belongs to the physical page: [ 41.791719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.799703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.806213] page_type: f5(slab) [ 41.809348] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.817069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.824788] page dumped because: kasan: bad access detected [ 41.830343] [ 41.831819] Memory state around the buggy address: [ 41.836600] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.843802] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.851006] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 41.858207] ^ [ 41.864808] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.872013] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.879214] ================================================================== [ 42.954736] ================================================================== [ 42.961666] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 42.969823] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 42.977114] [ 42.978597] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 42.978650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.978668] Hardware name: WinLink E850-96 board (DT) [ 42.978690] Call trace: [ 42.978706] show_stack+0x20/0x38 (C) [ 42.978740] dump_stack_lvl+0x8c/0xd0 [ 42.978778] print_report+0x118/0x608 [ 42.978812] kasan_report+0xdc/0x128 [ 42.978844] __asan_report_load8_noabort+0x20/0x30 [ 42.978883] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 42.978920] kasan_bitops_generic+0x110/0x1c8 [ 42.978952] kunit_try_run_case+0x170/0x3f0 [ 42.978990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.979030] kthread+0x328/0x630 [ 42.979057] ret_from_fork+0x10/0x20 [ 42.979090] [ 43.046904] Allocated by task 308: [ 43.050291] kasan_save_stack+0x3c/0x68 [ 43.054109] kasan_save_track+0x20/0x40 [ 43.057929] kasan_save_alloc_info+0x40/0x58 [ 43.062182] __kasan_kmalloc+0xd4/0xd8 [ 43.065915] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.070428] kasan_bitops_generic+0xa0/0x1c8 [ 43.074682] kunit_try_run_case+0x170/0x3f0 [ 43.078848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.084317] kthread+0x328/0x630 [ 43.087529] ret_from_fork+0x10/0x20 [ 43.091088] [ 43.092563] The buggy address belongs to the object at ffff000800d63060 [ 43.092563] which belongs to the cache kmalloc-16 of size 16 [ 43.104890] The buggy address is located 8 bytes inside of [ 43.104890] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 43.117129] [ 43.118605] The buggy address belongs to the physical page: [ 43.124162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.132149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.138658] page_type: f5(slab) [ 43.141791] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.149514] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.157233] page dumped because: kasan: bad access detected [ 43.162788] [ 43.164264] Memory state around the buggy address: [ 43.169043] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.176247] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.183451] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 43.190652] ^ [ 43.197253] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.204458] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.211659] ================================================================== [ 42.419014] ================================================================== [ 42.425910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.434067] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 42.441445] [ 42.442929] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 42.442980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.442998] Hardware name: WinLink E850-96 board (DT) [ 42.443018] Call trace: [ 42.443033] show_stack+0x20/0x38 (C) [ 42.443068] dump_stack_lvl+0x8c/0xd0 [ 42.443109] print_report+0x118/0x608 [ 42.443142] kasan_report+0xdc/0x128 [ 42.443174] kasan_check_range+0x100/0x1a8 [ 42.443211] __kasan_check_write+0x20/0x30 [ 42.443242] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.443276] kasan_bitops_generic+0x110/0x1c8 [ 42.443310] kunit_try_run_case+0x170/0x3f0 [ 42.443344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.443382] kthread+0x328/0x630 [ 42.443410] ret_from_fork+0x10/0x20 [ 42.443443] [ 42.514622] Allocated by task 308: [ 42.518006] kasan_save_stack+0x3c/0x68 [ 42.521825] kasan_save_track+0x20/0x40 [ 42.525645] kasan_save_alloc_info+0x40/0x58 [ 42.529898] __kasan_kmalloc+0xd4/0xd8 [ 42.533631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.538145] kasan_bitops_generic+0xa0/0x1c8 [ 42.542398] kunit_try_run_case+0x170/0x3f0 [ 42.546565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.552033] kthread+0x328/0x630 [ 42.555245] ret_from_fork+0x10/0x20 [ 42.558804] [ 42.560280] The buggy address belongs to the object at ffff000800d63060 [ 42.560280] which belongs to the cache kmalloc-16 of size 16 [ 42.572607] The buggy address is located 8 bytes inside of [ 42.572607] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 42.584845] [ 42.586322] The buggy address belongs to the physical page: [ 42.591881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.599863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.606375] page_type: f5(slab) [ 42.609508] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.617231] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.624949] page dumped because: kasan: bad access detected [ 42.630505] [ 42.631980] Memory state around the buggy address: [ 42.636761] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.643963] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.651168] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 42.658369] ^ [ 42.664970] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.672175] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.679376] ================================================================== [ 42.686685] ================================================================== [ 42.693788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.701945] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 42.709323] [ 42.710805] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 42.710853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.710871] Hardware name: WinLink E850-96 board (DT) [ 42.710892] Call trace: [ 42.710906] show_stack+0x20/0x38 (C) [ 42.710942] dump_stack_lvl+0x8c/0xd0 [ 42.710977] print_report+0x118/0x608 [ 42.711012] kasan_report+0xdc/0x128 [ 42.711046] kasan_check_range+0x100/0x1a8 [ 42.711080] __kasan_check_write+0x20/0x30 [ 42.711110] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.711146] kasan_bitops_generic+0x110/0x1c8 [ 42.711178] kunit_try_run_case+0x170/0x3f0 [ 42.711210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.711248] kthread+0x328/0x630 [ 42.711274] ret_from_fork+0x10/0x20 [ 42.711306] [ 42.782499] Allocated by task 308: [ 42.785886] kasan_save_stack+0x3c/0x68 [ 42.789704] kasan_save_track+0x20/0x40 [ 42.793523] kasan_save_alloc_info+0x40/0x58 [ 42.797776] __kasan_kmalloc+0xd4/0xd8 [ 42.801509] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.806023] kasan_bitops_generic+0xa0/0x1c8 [ 42.810276] kunit_try_run_case+0x170/0x3f0 [ 42.814443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.819912] kthread+0x328/0x630 [ 42.823123] ret_from_fork+0x10/0x20 [ 42.826682] [ 42.828158] The buggy address belongs to the object at ffff000800d63060 [ 42.828158] which belongs to the cache kmalloc-16 of size 16 [ 42.840485] The buggy address is located 8 bytes inside of [ 42.840485] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 42.852723] [ 42.854199] The buggy address belongs to the physical page: [ 42.859757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.867743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.874252] page_type: f5(slab) [ 42.877384] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.885109] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.892827] page dumped because: kasan: bad access detected [ 42.898382] [ 42.899858] Memory state around the buggy address: [ 42.904639] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.911841] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.919046] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 42.926247] ^ [ 42.932848] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.940053] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.947253] ================================================================== [ 42.154405] ================================================================== [ 42.161503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.169661] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 42.176952] [ 42.178436] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 42.178487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.178504] Hardware name: WinLink E850-96 board (DT) [ 42.178525] Call trace: [ 42.178541] show_stack+0x20/0x38 (C) [ 42.178576] dump_stack_lvl+0x8c/0xd0 [ 42.178611] print_report+0x118/0x608 [ 42.178644] kasan_report+0xdc/0x128 [ 42.178678] __asan_report_load8_noabort+0x20/0x30 [ 42.178717] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.178755] kasan_bitops_generic+0x110/0x1c8 [ 42.178786] kunit_try_run_case+0x170/0x3f0 [ 42.178822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.178861] kthread+0x328/0x630 [ 42.178888] ret_from_fork+0x10/0x20 [ 42.178922] [ 42.246743] Allocated by task 308: [ 42.250128] kasan_save_stack+0x3c/0x68 [ 42.253948] kasan_save_track+0x20/0x40 [ 42.257767] kasan_save_alloc_info+0x40/0x58 [ 42.262020] __kasan_kmalloc+0xd4/0xd8 [ 42.265753] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.270267] kasan_bitops_generic+0xa0/0x1c8 [ 42.274520] kunit_try_run_case+0x170/0x3f0 [ 42.278687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.284155] kthread+0x328/0x630 [ 42.287367] ret_from_fork+0x10/0x20 [ 42.290926] [ 42.292402] The buggy address belongs to the object at ffff000800d63060 [ 42.292402] which belongs to the cache kmalloc-16 of size 16 [ 42.304729] The buggy address is located 8 bytes inside of [ 42.304729] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 42.316968] [ 42.318445] The buggy address belongs to the physical page: [ 42.323999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.331985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.338496] page_type: f5(slab) [ 42.341628] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.349353] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.357071] page dumped because: kasan: bad access detected [ 42.362626] [ 42.364102] Memory state around the buggy address: [ 42.368882] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.376085] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.383292] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 42.390491] ^ [ 42.397092] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.404297] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.411497] ================================================================== [ 43.219061] ================================================================== [ 43.226070] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.234228] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 43.241607] [ 43.243090] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 43.243140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.243159] Hardware name: WinLink E850-96 board (DT) [ 43.243180] Call trace: [ 43.243194] show_stack+0x20/0x38 (C) [ 43.243228] dump_stack_lvl+0x8c/0xd0 [ 43.243263] print_report+0x118/0x608 [ 43.243297] kasan_report+0xdc/0x128 [ 43.243330] kasan_check_range+0x100/0x1a8 [ 43.243365] __kasan_check_write+0x20/0x30 [ 43.243394] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.243429] kasan_bitops_generic+0x110/0x1c8 [ 43.243462] kunit_try_run_case+0x170/0x3f0 [ 43.243497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.243535] kthread+0x328/0x630 [ 43.243563] ret_from_fork+0x10/0x20 [ 43.243596] [ 43.314782] Allocated by task 308: [ 43.318168] kasan_save_stack+0x3c/0x68 [ 43.321987] kasan_save_track+0x20/0x40 [ 43.325807] kasan_save_alloc_info+0x40/0x58 [ 43.330060] __kasan_kmalloc+0xd4/0xd8 [ 43.333793] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.338307] kasan_bitops_generic+0xa0/0x1c8 [ 43.342560] kunit_try_run_case+0x170/0x3f0 [ 43.346727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.352195] kthread+0x328/0x630 [ 43.355407] ret_from_fork+0x10/0x20 [ 43.358966] [ 43.360442] The buggy address belongs to the object at ffff000800d63060 [ 43.360442] which belongs to the cache kmalloc-16 of size 16 [ 43.372768] The buggy address is located 8 bytes inside of [ 43.372768] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 43.385007] [ 43.386483] The buggy address belongs to the physical page: [ 43.392039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.400028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.406536] page_type: f5(slab) [ 43.409668] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.417392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.425111] page dumped because: kasan: bad access detected [ 43.430666] [ 43.432142] Memory state around the buggy address: [ 43.436921] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.444125] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.451330] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 43.458531] ^ [ 43.465131] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.472336] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.479537] ================================================================== [ 43.486941] ================================================================== [ 43.493948] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.502106] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 43.509484] [ 43.510967] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 43.511017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.511035] Hardware name: WinLink E850-96 board (DT) [ 43.511057] Call trace: [ 43.511068] show_stack+0x20/0x38 (C) [ 43.511105] dump_stack_lvl+0x8c/0xd0 [ 43.511140] print_report+0x118/0x608 [ 43.511175] kasan_report+0xdc/0x128 [ 43.511209] kasan_check_range+0x100/0x1a8 [ 43.511244] __kasan_check_write+0x20/0x30 [ 43.511273] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.511309] kasan_bitops_generic+0x110/0x1c8 [ 43.511341] kunit_try_run_case+0x170/0x3f0 [ 43.511377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.511416] kthread+0x328/0x630 [ 43.511443] ret_from_fork+0x10/0x20 [ 43.511476] [ 43.582660] Allocated by task 308: [ 43.586047] kasan_save_stack+0x3c/0x68 [ 43.589865] kasan_save_track+0x20/0x40 [ 43.593685] kasan_save_alloc_info+0x40/0x58 [ 43.597938] __kasan_kmalloc+0xd4/0xd8 [ 43.601670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.606184] kasan_bitops_generic+0xa0/0x1c8 [ 43.610438] kunit_try_run_case+0x170/0x3f0 [ 43.614604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.620073] kthread+0x328/0x630 [ 43.623285] ret_from_fork+0x10/0x20 [ 43.626844] [ 43.628319] The buggy address belongs to the object at ffff000800d63060 [ 43.628319] which belongs to the cache kmalloc-16 of size 16 [ 43.640646] The buggy address is located 8 bytes inside of [ 43.640646] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 43.652885] [ 43.654362] The buggy address belongs to the physical page: [ 43.659917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.667904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.674412] page_type: f5(slab) [ 43.677546] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.685270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.692989] page dumped because: kasan: bad access detected [ 43.698544] [ 43.700019] Memory state around the buggy address: [ 43.704799] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.712003] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.719207] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 43.726408] ^ [ 43.733009] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.740214] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.747415] ================================================================== [ 41.352004] ================================================================== [ 41.361343] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.369500] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 41.376878] [ 41.378364] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 41.378423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.378442] Hardware name: WinLink E850-96 board (DT) [ 41.378465] Call trace: [ 41.378480] show_stack+0x20/0x38 (C) [ 41.378518] dump_stack_lvl+0x8c/0xd0 [ 41.378557] print_report+0x118/0x608 [ 41.378596] kasan_report+0xdc/0x128 [ 41.378633] kasan_check_range+0x100/0x1a8 [ 41.378670] __kasan_check_write+0x20/0x30 [ 41.378703] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.378738] kasan_bitops_generic+0x110/0x1c8 [ 41.378774] kunit_try_run_case+0x170/0x3f0 [ 41.378812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.378850] kthread+0x328/0x630 [ 41.378881] ret_from_fork+0x10/0x20 [ 41.378918] [ 41.450054] Allocated by task 308: [ 41.453442] kasan_save_stack+0x3c/0x68 [ 41.457258] kasan_save_track+0x20/0x40 [ 41.461079] kasan_save_alloc_info+0x40/0x58 [ 41.465331] __kasan_kmalloc+0xd4/0xd8 [ 41.469065] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.473577] kasan_bitops_generic+0xa0/0x1c8 [ 41.477831] kunit_try_run_case+0x170/0x3f0 [ 41.481997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.487467] kthread+0x328/0x630 [ 41.490678] ret_from_fork+0x10/0x20 [ 41.494237] [ 41.495714] The buggy address belongs to the object at ffff000800d63060 [ 41.495714] which belongs to the cache kmalloc-16 of size 16 [ 41.508041] The buggy address is located 8 bytes inside of [ 41.508041] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 41.520278] [ 41.521757] The buggy address belongs to the physical page: [ 41.527313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.535298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.541807] page_type: f5(slab) [ 41.544944] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.552663] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.560382] page dumped because: kasan: bad access detected [ 41.565937] [ 41.567413] Memory state around the buggy address: [ 41.572194] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.579396] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.586602] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 41.593801] ^ [ 41.600402] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.607607] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.614810] ================================================================== [ 41.886599] ================================================================== [ 41.893625] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 41.901783] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 41.909162] [ 41.910648] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 41.910701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.910718] Hardware name: WinLink E850-96 board (DT) [ 41.910739] Call trace: [ 41.910756] show_stack+0x20/0x38 (C) [ 41.910793] dump_stack_lvl+0x8c/0xd0 [ 41.910829] print_report+0x118/0x608 [ 41.910862] kasan_report+0xdc/0x128 [ 41.910897] kasan_check_range+0x100/0x1a8 [ 41.910932] __kasan_check_write+0x20/0x30 [ 41.910962] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 41.910999] kasan_bitops_generic+0x110/0x1c8 [ 41.911031] kunit_try_run_case+0x170/0x3f0 [ 41.911065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.911102] kthread+0x328/0x630 [ 41.911130] ret_from_fork+0x10/0x20 [ 41.911165] [ 41.982337] Allocated by task 308: [ 41.985724] kasan_save_stack+0x3c/0x68 [ 41.989544] kasan_save_track+0x20/0x40 [ 41.993363] kasan_save_alloc_info+0x40/0x58 [ 41.997615] __kasan_kmalloc+0xd4/0xd8 [ 42.001347] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.005861] kasan_bitops_generic+0xa0/0x1c8 [ 42.010115] kunit_try_run_case+0x170/0x3f0 [ 42.014281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.019750] kthread+0x328/0x630 [ 42.022962] ret_from_fork+0x10/0x20 [ 42.026521] [ 42.027998] The buggy address belongs to the object at ffff000800d63060 [ 42.027998] which belongs to the cache kmalloc-16 of size 16 [ 42.040323] The buggy address is located 8 bytes inside of [ 42.040323] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 42.052562] [ 42.054039] The buggy address belongs to the physical page: [ 42.059593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.067581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.074091] page_type: f5(slab) [ 42.077223] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.084947] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.092665] page dumped because: kasan: bad access detected [ 42.098221] [ 42.099696] Memory state around the buggy address: [ 42.104476] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.111680] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.118886] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 42.126085] ^ [ 42.132686] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.139891] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.147092] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 41.051386] ================================================================== [ 41.058396] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 41.064382] Read of size 1 at addr ffff00080499db10 by task kunit_try_catch/306 [ 41.071674] [ 41.073158] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 41.073211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.073231] Hardware name: WinLink E850-96 board (DT) [ 41.073252] Call trace: [ 41.073269] show_stack+0x20/0x38 (C) [ 41.073307] dump_stack_lvl+0x8c/0xd0 [ 41.073342] print_report+0x118/0x608 [ 41.073376] kasan_report+0xdc/0x128 [ 41.073411] __asan_report_load1_noabort+0x20/0x30 [ 41.073449] strnlen+0x80/0x88 [ 41.073477] kasan_strings+0x478/0xb00 [ 41.073509] kunit_try_run_case+0x170/0x3f0 [ 41.073545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.073583] kthread+0x328/0x630 [ 41.073610] ret_from_fork+0x10/0x20 [ 41.073644] [ 41.138600] Allocated by task 306: [ 41.141987] kasan_save_stack+0x3c/0x68 [ 41.145804] kasan_save_track+0x20/0x40 [ 41.149624] kasan_save_alloc_info+0x40/0x58 [ 41.153878] __kasan_kmalloc+0xd4/0xd8 [ 41.157610] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.162124] kasan_strings+0xc8/0xb00 [ 41.165769] kunit_try_run_case+0x170/0x3f0 [ 41.169936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.175406] kthread+0x328/0x630 [ 41.178617] ret_from_fork+0x10/0x20 [ 41.182176] [ 41.183651] Freed by task 306: [ 41.186689] kasan_save_stack+0x3c/0x68 [ 41.190509] kasan_save_track+0x20/0x40 [ 41.194328] kasan_save_free_info+0x4c/0x78 [ 41.198495] __kasan_slab_free+0x6c/0x98 [ 41.202401] kfree+0x214/0x3c8 [ 41.205439] kasan_strings+0x24c/0xb00 [ 41.209172] kunit_try_run_case+0x170/0x3f0 [ 41.213338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.218807] kthread+0x328/0x630 [ 41.222019] ret_from_fork+0x10/0x20 [ 41.225578] [ 41.227054] The buggy address belongs to the object at ffff00080499db00 [ 41.227054] which belongs to the cache kmalloc-32 of size 32 [ 41.239382] The buggy address is located 16 bytes inside of [ 41.239382] freed 32-byte region [ffff00080499db00, ffff00080499db20) [ 41.251446] [ 41.252923] The buggy address belongs to the physical page: [ 41.258479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88499d [ 41.266463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.272974] page_type: f5(slab) [ 41.276109] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 41.283831] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 41.291549] page dumped because: kasan: bad access detected [ 41.297104] [ 41.298580] Memory state around the buggy address: [ 41.303360] ffff00080499da00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.310563] ffff00080499da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.317768] >ffff00080499db00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.324969] ^ [ 41.328705] ffff00080499db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 41.335910] ffff00080499dc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.343111] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 40.752346] ================================================================== [ 40.759443] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 40.765342] Read of size 1 at addr ffff00080499db10 by task kunit_try_catch/306 [ 40.772633] [ 40.774118] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 40.774171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.774188] Hardware name: WinLink E850-96 board (DT) [ 40.774210] Call trace: [ 40.774225] show_stack+0x20/0x38 (C) [ 40.774260] dump_stack_lvl+0x8c/0xd0 [ 40.774296] print_report+0x118/0x608 [ 40.774332] kasan_report+0xdc/0x128 [ 40.774365] __asan_report_load1_noabort+0x20/0x30 [ 40.774402] strlen+0xa8/0xb0 [ 40.774429] kasan_strings+0x418/0xb00 [ 40.774461] kunit_try_run_case+0x170/0x3f0 [ 40.774497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.774535] kthread+0x328/0x630 [ 40.774564] ret_from_fork+0x10/0x20 [ 40.774603] [ 40.839472] Allocated by task 306: [ 40.842859] kasan_save_stack+0x3c/0x68 [ 40.846677] kasan_save_track+0x20/0x40 [ 40.850496] kasan_save_alloc_info+0x40/0x58 [ 40.854750] __kasan_kmalloc+0xd4/0xd8 [ 40.858482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.862996] kasan_strings+0xc8/0xb00 [ 40.866642] kunit_try_run_case+0x170/0x3f0 [ 40.870809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.876279] kthread+0x328/0x630 [ 40.879489] ret_from_fork+0x10/0x20 [ 40.883048] [ 40.884524] Freed by task 306: [ 40.887562] kasan_save_stack+0x3c/0x68 [ 40.891381] kasan_save_track+0x20/0x40 [ 40.895201] kasan_save_free_info+0x4c/0x78 [ 40.899367] __kasan_slab_free+0x6c/0x98 [ 40.903273] kfree+0x214/0x3c8 [ 40.906312] kasan_strings+0x24c/0xb00 [ 40.910044] kunit_try_run_case+0x170/0x3f0 [ 40.914211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.919679] kthread+0x328/0x630 [ 40.922891] ret_from_fork+0x10/0x20 [ 40.926451] [ 40.927926] The buggy address belongs to the object at ffff00080499db00 [ 40.927926] which belongs to the cache kmalloc-32 of size 32 [ 40.940254] The buggy address is located 16 bytes inside of [ 40.940254] freed 32-byte region [ffff00080499db00, ffff00080499db20) [ 40.952318] [ 40.953796] The buggy address belongs to the physical page: [ 40.959353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88499d [ 40.967337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.973847] page_type: f5(slab) [ 40.976983] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.984703] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.992422] page dumped because: kasan: bad access detected [ 40.997977] [ 40.999451] Memory state around the buggy address: [ 41.004233] ffff00080499da00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.011436] ffff00080499da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.018640] >ffff00080499db00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.025841] ^ [ 41.029577] ffff00080499db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 41.036782] ffff00080499dc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 41.043985] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 40.455571] ================================================================== [ 40.462660] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 40.469339] Read of size 1 at addr ffff00080499db10 by task kunit_try_catch/306 [ 40.476630] [ 40.478116] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 40.478167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.478186] Hardware name: WinLink E850-96 board (DT) [ 40.478207] Call trace: [ 40.478223] show_stack+0x20/0x38 (C) [ 40.478256] dump_stack_lvl+0x8c/0xd0 [ 40.478294] print_report+0x118/0x608 [ 40.478331] kasan_report+0xdc/0x128 [ 40.478364] __asan_report_load1_noabort+0x20/0x30 [ 40.478403] kasan_strings+0x95c/0xb00 [ 40.478432] kunit_try_run_case+0x170/0x3f0 [ 40.478468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.478509] kthread+0x328/0x630 [ 40.478540] ret_from_fork+0x10/0x20 [ 40.478576] [ 40.540520] Allocated by task 306: [ 40.543907] kasan_save_stack+0x3c/0x68 [ 40.547723] kasan_save_track+0x20/0x40 [ 40.551543] kasan_save_alloc_info+0x40/0x58 [ 40.555796] __kasan_kmalloc+0xd4/0xd8 [ 40.559529] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.564042] kasan_strings+0xc8/0xb00 [ 40.567688] kunit_try_run_case+0x170/0x3f0 [ 40.571855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.577325] kthread+0x328/0x630 [ 40.580535] ret_from_fork+0x10/0x20 [ 40.584094] [ 40.585570] Freed by task 306: [ 40.588608] kasan_save_stack+0x3c/0x68 [ 40.592428] kasan_save_track+0x20/0x40 [ 40.596247] kasan_save_free_info+0x4c/0x78 [ 40.600414] __kasan_slab_free+0x6c/0x98 [ 40.604320] kfree+0x214/0x3c8 [ 40.607358] kasan_strings+0x24c/0xb00 [ 40.611091] kunit_try_run_case+0x170/0x3f0 [ 40.615257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.620726] kthread+0x328/0x630 [ 40.623937] ret_from_fork+0x10/0x20 [ 40.627497] [ 40.628972] The buggy address belongs to the object at ffff00080499db00 [ 40.628972] which belongs to the cache kmalloc-32 of size 32 [ 40.641300] The buggy address is located 16 bytes inside of [ 40.641300] freed 32-byte region [ffff00080499db00, ffff00080499db20) [ 40.653364] [ 40.654842] The buggy address belongs to the physical page: [ 40.660397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88499d [ 40.668382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.674893] page_type: f5(slab) [ 40.678029] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.685749] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.693467] page dumped because: kasan: bad access detected [ 40.699023] [ 40.700499] Memory state around the buggy address: [ 40.705278] ffff00080499da00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.712482] ffff00080499da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.719686] >ffff00080499db00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.726887] ^ [ 40.730624] ffff00080499db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.737828] ffff00080499dc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.745031] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 40.139983] ================================================================== [ 40.163706] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 40.169606] Read of size 1 at addr ffff00080499db10 by task kunit_try_catch/306 [ 40.176896] [ 40.178384] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 40.178440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.178459] Hardware name: WinLink E850-96 board (DT) [ 40.178480] Call trace: [ 40.178496] show_stack+0x20/0x38 (C) [ 40.178532] dump_stack_lvl+0x8c/0xd0 [ 40.178568] print_report+0x118/0x608 [ 40.178607] kasan_report+0xdc/0x128 [ 40.178641] __asan_report_load1_noabort+0x20/0x30 [ 40.178683] strcmp+0xc0/0xc8 [ 40.178715] kasan_strings+0x340/0xb00 [ 40.178748] kunit_try_run_case+0x170/0x3f0 [ 40.178786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.178826] kthread+0x328/0x630 [ 40.178857] ret_from_fork+0x10/0x20 [ 40.178894] [ 40.243735] Allocated by task 306: [ 40.247124] kasan_save_stack+0x3c/0x68 [ 40.250940] kasan_save_track+0x20/0x40 [ 40.254759] kasan_save_alloc_info+0x40/0x58 [ 40.259012] __kasan_kmalloc+0xd4/0xd8 [ 40.262745] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.267259] kasan_strings+0xc8/0xb00 [ 40.270905] kunit_try_run_case+0x170/0x3f0 [ 40.275071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.280541] kthread+0x328/0x630 [ 40.283751] ret_from_fork+0x10/0x20 [ 40.287310] [ 40.288787] Freed by task 306: [ 40.291827] kasan_save_stack+0x3c/0x68 [ 40.295644] kasan_save_track+0x20/0x40 [ 40.299462] kasan_save_free_info+0x4c/0x78 [ 40.303630] __kasan_slab_free+0x6c/0x98 [ 40.307536] kfree+0x214/0x3c8 [ 40.310574] kasan_strings+0x24c/0xb00 [ 40.314306] kunit_try_run_case+0x170/0x3f0 [ 40.318473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.323942] kthread+0x328/0x630 [ 40.327154] ret_from_fork+0x10/0x20 [ 40.330712] [ 40.332190] The buggy address belongs to the object at ffff00080499db00 [ 40.332190] which belongs to the cache kmalloc-32 of size 32 [ 40.344517] The buggy address is located 16 bytes inside of [ 40.344517] freed 32-byte region [ffff00080499db00, ffff00080499db20) [ 40.356580] [ 40.358058] The buggy address belongs to the physical page: [ 40.363617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88499d [ 40.371600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.378111] page_type: f5(slab) [ 40.381247] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.388965] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.396686] page dumped because: kasan: bad access detected [ 40.402239] [ 40.403715] Memory state around the buggy address: [ 40.408498] ffff00080499da00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.415698] ffff00080499da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.422902] >ffff00080499db00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.430103] ^ [ 40.433840] ffff00080499db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.441045] ffff00080499dc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.448247] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 39.839509] ================================================================== [ 39.849735] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 39.855721] Read of size 1 at addr ffff000800d64fd8 by task kunit_try_catch/304 [ 39.863011] [ 39.864500] CPU: 7 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 39.864558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.864579] Hardware name: WinLink E850-96 board (DT) [ 39.864606] Call trace: [ 39.864624] show_stack+0x20/0x38 (C) [ 39.864664] dump_stack_lvl+0x8c/0xd0 [ 39.864703] print_report+0x118/0x608 [ 39.864744] kasan_report+0xdc/0x128 [ 39.864781] __asan_report_load1_noabort+0x20/0x30 [ 39.864824] memcmp+0x198/0x1d8 [ 39.864855] kasan_memcmp+0x16c/0x300 [ 39.864887] kunit_try_run_case+0x170/0x3f0 [ 39.864926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.864970] kthread+0x328/0x630 [ 39.865001] ret_from_fork+0x10/0x20 [ 39.865039] [ 39.929939] Allocated by task 304: [ 39.933326] kasan_save_stack+0x3c/0x68 [ 39.937142] kasan_save_track+0x20/0x40 [ 39.940961] kasan_save_alloc_info+0x40/0x58 [ 39.945215] __kasan_kmalloc+0xd4/0xd8 [ 39.948949] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.953461] kasan_memcmp+0xbc/0x300 [ 39.957020] kunit_try_run_case+0x170/0x3f0 [ 39.961187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.966656] kthread+0x328/0x630 [ 39.969867] ret_from_fork+0x10/0x20 [ 39.973426] [ 39.974905] The buggy address belongs to the object at ffff000800d64fc0 [ 39.974905] which belongs to the cache kmalloc-32 of size 32 [ 39.987231] The buggy address is located 0 bytes to the right of [ 39.987231] allocated 24-byte region [ffff000800d64fc0, ffff000800d64fd8) [ 40.000075] [ 40.001555] The buggy address belongs to the physical page: [ 40.007112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d64 [ 40.015095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.021606] page_type: f5(slab) [ 40.024743] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.032460] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.040181] page dumped because: kasan: bad access detected [ 40.045734] [ 40.047210] Memory state around the buggy address: [ 40.051993] ffff000800d64e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.059193] ffff000800d64f00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.066398] >ffff000800d64f80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.073598] ^ [ 40.079680] ffff000800d65000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 40.086883] ffff000800d65080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 40.094087] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 39.606911] ================================================================== [ 39.616490] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 39.624040] Read of size 1 at addr ffff800089547b4a by task kunit_try_catch/300 [ 39.631331] [ 39.632817] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 39.632884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.632900] Hardware name: WinLink E850-96 board (DT) [ 39.632923] Call trace: [ 39.632939] show_stack+0x20/0x38 (C) [ 39.632978] dump_stack_lvl+0x8c/0xd0 [ 39.633016] print_report+0x310/0x608 [ 39.633052] kasan_report+0xdc/0x128 [ 39.633089] __asan_report_load1_noabort+0x20/0x30 [ 39.633130] kasan_alloca_oob_right+0x2dc/0x340 [ 39.633163] kunit_try_run_case+0x170/0x3f0 [ 39.633204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.633245] kthread+0x328/0x630 [ 39.633275] ret_from_fork+0x10/0x20 [ 39.633312] [ 39.696003] The buggy address belongs to stack of task kunit_try_catch/300 [ 39.702878] [ 39.704338] The buggy address belongs to the virtual mapping at [ 39.704338] [ffff800089540000, ffff800089549000) created by: [ 39.704338] kernel_clone+0x150/0x7a8 [ 39.719611] [ 39.721089] The buggy address belongs to the physical page: [ 39.726647] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886496 [ 39.734630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.741151] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.748872] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.756591] page dumped because: kasan: bad access detected [ 39.762145] [ 39.763620] Memory state around the buggy address: [ 39.768404] ffff800089547a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.775604] ffff800089547a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.782808] >ffff800089547b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 39.790009] ^ [ 39.795569] ffff800089547b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 39.802773] ffff800089547c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.809977] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 39.394852] ================================================================== [ 39.404080] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 39.411544] Read of size 1 at addr ffff800089527b5f by task kunit_try_catch/298 [ 39.418836] [ 39.420321] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 39.420378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.420397] Hardware name: WinLink E850-96 board (DT) [ 39.420421] Call trace: [ 39.420438] show_stack+0x20/0x38 (C) [ 39.420477] dump_stack_lvl+0x8c/0xd0 [ 39.420514] print_report+0x310/0x608 [ 39.420551] kasan_report+0xdc/0x128 [ 39.420587] __asan_report_load1_noabort+0x20/0x30 [ 39.420628] kasan_alloca_oob_left+0x2b8/0x310 [ 39.420659] kunit_try_run_case+0x170/0x3f0 [ 39.420697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.420733] kthread+0x328/0x630 [ 39.420764] ret_from_fork+0x10/0x20 [ 39.420798] [ 39.483420] The buggy address belongs to stack of task kunit_try_catch/298 [ 39.490296] [ 39.491757] The buggy address belongs to the virtual mapping at [ 39.491757] [ffff800089520000, ffff800089529000) created by: [ 39.491757] kernel_clone+0x150/0x7a8 [ 39.507027] [ 39.508507] The buggy address belongs to the physical page: [ 39.514063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886482 [ 39.522046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.528567] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.536287] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.544007] page dumped because: kasan: bad access detected [ 39.549561] [ 39.551037] Memory state around the buggy address: [ 39.555817] ffff800089527a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.563020] ffff800089527a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.570226] >ffff800089527b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 39.577425] ^ [ 39.583505] ffff800089527b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 39.590710] ffff800089527c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.597913] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 39.153172] ================================================================== [ 39.167539] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 39.174395] Read of size 1 at addr ffff800089507c2a by task kunit_try_catch/296 [ 39.181685] [ 39.183173] CPU: 2 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 39.183229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.183248] Hardware name: WinLink E850-96 board (DT) [ 39.183272] Call trace: [ 39.183288] show_stack+0x20/0x38 (C) [ 39.183325] dump_stack_lvl+0x8c/0xd0 [ 39.183363] print_report+0x310/0x608 [ 39.183400] kasan_report+0xdc/0x128 [ 39.183436] __asan_report_load1_noabort+0x20/0x30 [ 39.183476] kasan_stack_oob+0x238/0x270 [ 39.183506] kunit_try_run_case+0x170/0x3f0 [ 39.183545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.183583] kthread+0x328/0x630 [ 39.183610] ret_from_fork+0x10/0x20 [ 39.183645] [ 39.245751] The buggy address belongs to stack of task kunit_try_catch/296 [ 39.252606] and is located at offset 138 in frame: [ 39.257465] kasan_stack_oob+0x0/0x270 [ 39.261204] [ 39.262673] This frame has 4 objects: [ 39.266323] [48, 49) '__assertion' [ 39.266348] [64, 72) 'array' [ 39.269794] [96, 112) '__assertion' [ 39.272744] [128, 138) 'stack_array' [ 39.276301] [ 39.281428] The buggy address belongs to the virtual mapping at [ 39.281428] [ffff800089500000, ffff800089509000) created by: [ 39.281428] kernel_clone+0x150/0x7a8 [ 39.296701] [ 39.298181] The buggy address belongs to the physical page: [ 39.303736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646e [ 39.311721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.318243] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.325960] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.333680] page dumped because: kasan: bad access detected [ 39.339235] [ 39.340710] Memory state around the buggy address: [ 39.345492] ffff800089507b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.352694] ffff800089507b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 39.359899] >ffff800089507c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 39.367099] ^ [ 39.371616] ffff800089507c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 39.378821] ffff800089507d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.386023] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 38.934662] ================================================================== [ 38.945321] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 38.952870] Read of size 1 at addr ffff800087baf5cd by task kunit_try_catch/292 [ 38.960161] [ 38.961647] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 38.961702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.961721] Hardware name: WinLink E850-96 board (DT) [ 38.961745] Call trace: [ 38.961764] show_stack+0x20/0x38 (C) [ 38.961802] dump_stack_lvl+0x8c/0xd0 [ 38.961841] print_report+0x310/0x608 [ 38.961880] kasan_report+0xdc/0x128 [ 38.961914] __asan_report_load1_noabort+0x20/0x30 [ 38.961954] kasan_global_oob_right+0x230/0x270 [ 38.961984] kunit_try_run_case+0x170/0x3f0 [ 38.962022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.962062] kthread+0x328/0x630 [ 38.962091] ret_from_fork+0x10/0x20 [ 38.962129] [ 39.024831] The buggy address belongs to the variable: [ 39.029951] global_array+0xd/0x40 [ 39.033336] [ 39.034826] The buggy address belongs to the virtual mapping at [ 39.034826] [ffff800085d50000, ffff800087c61000) created by: [ 39.034826] paging_init+0x66c/0x7d0 [ 39.050003] [ 39.051483] The buggy address belongs to the physical page: [ 39.057039] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87baf [ 39.064936] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 39.072237] raw: 03fffe0000002000 fffffdffc01eebc8 fffffdffc01eebc8 0000000000000000 [ 39.079957] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.087677] page dumped because: kasan: bad access detected [ 39.093231] [ 39.094707] Memory state around the buggy address: [ 39.099488] ffff800087baf480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.106690] ffff800087baf500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.113896] >ffff800087baf580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 39.121096] ^ [ 39.126655] ffff800087baf600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 39.133859] ffff800087baf680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 39.141063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 38.369742] ================================================================== [ 38.380138] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.388122] Free of addr ffff000802ca6c01 by task kunit_try_catch/288 [ 38.394544] [ 38.396030] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 38.396086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.396103] Hardware name: WinLink E850-96 board (DT) [ 38.396126] Call trace: [ 38.396140] show_stack+0x20/0x38 (C) [ 38.396176] dump_stack_lvl+0x8c/0xd0 [ 38.396215] print_report+0x118/0x608 [ 38.396250] kasan_report_invalid_free+0xc0/0xe8 [ 38.396286] check_slab_allocation+0xfc/0x108 [ 38.396322] __kasan_mempool_poison_object+0x78/0x150 [ 38.396359] mempool_free+0x28c/0x328 [ 38.396393] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.396428] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.396459] kunit_try_run_case+0x170/0x3f0 [ 38.396496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.396536] kthread+0x328/0x630 [ 38.396565] ret_from_fork+0x10/0x20 [ 38.396603] [ 38.474579] Allocated by task 288: [ 38.477964] kasan_save_stack+0x3c/0x68 [ 38.481782] kasan_save_track+0x20/0x40 [ 38.485601] kasan_save_alloc_info+0x40/0x58 [ 38.489855] __kasan_mempool_unpoison_object+0x11c/0x180 [ 38.495150] remove_element+0x130/0x1f8 [ 38.498969] mempool_alloc_preallocated+0x58/0xc0 [ 38.503658] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 38.509212] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.514160] kunit_try_run_case+0x170/0x3f0 [ 38.518327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.523795] kthread+0x328/0x630 [ 38.527007] ret_from_fork+0x10/0x20 [ 38.530567] [ 38.532043] The buggy address belongs to the object at ffff000802ca6c00 [ 38.532043] which belongs to the cache kmalloc-128 of size 128 [ 38.544545] The buggy address is located 1 bytes inside of [ 38.544545] 128-byte region [ffff000802ca6c00, ffff000802ca6c80) [ 38.556086] [ 38.557566] The buggy address belongs to the physical page: [ 38.563123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882ca6 [ 38.571107] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.578744] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.585688] page_type: f5(slab) [ 38.588823] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.596544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.604272] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.612082] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.619895] head: 0bfffe0000000001 fffffdffe00b2981 00000000ffffffff 00000000ffffffff [ 38.627707] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 38.635512] page dumped because: kasan: bad access detected [ 38.641068] [ 38.642544] Memory state around the buggy address: [ 38.647325] ffff000802ca6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.654526] ffff000802ca6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.661731] >ffff000802ca6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.668932] ^ [ 38.672148] ffff000802ca6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.679352] ffff000802ca6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.686555] ================================================================== [ 38.695692] ================================================================== [ 38.705740] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.713723] Free of addr ffff000800e14001 by task kunit_try_catch/290 [ 38.720146] [ 38.721634] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 38.721691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.721707] Hardware name: WinLink E850-96 board (DT) [ 38.721730] Call trace: [ 38.721745] show_stack+0x20/0x38 (C) [ 38.721782] dump_stack_lvl+0x8c/0xd0 [ 38.721821] print_report+0x118/0x608 [ 38.721860] kasan_report_invalid_free+0xc0/0xe8 [ 38.721897] __kasan_mempool_poison_object+0xfc/0x150 [ 38.721936] mempool_free+0x28c/0x328 [ 38.721967] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.722005] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 38.722042] kunit_try_run_case+0x170/0x3f0 [ 38.722080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.722120] kthread+0x328/0x630 [ 38.722147] ret_from_fork+0x10/0x20 [ 38.722185] [ 38.796364] The buggy address belongs to the physical page: [ 38.801920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e14 [ 38.809905] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.817543] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.824486] page_type: f8(unknown) [ 38.827884] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.835603] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.843331] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.851140] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.858954] head: 0bfffe0000000002 fffffdffe0038501 00000000ffffffff 00000000ffffffff [ 38.866766] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.874571] page dumped because: kasan: bad access detected [ 38.880126] [ 38.881602] Memory state around the buggy address: [ 38.886383] ffff000800e13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.893585] ffff000800e13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.900791] >ffff000800e14000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.907991] ^ [ 38.911207] ffff000800e14080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.918411] ffff000800e14100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.925613] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 36.822667] ================================================================== [ 36.831986] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 36.838666] Read of size 1 at addr ffff000806390000 by task kunit_try_catch/276 [ 36.845956] [ 36.847443] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 36.847495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.847513] Hardware name: WinLink E850-96 board (DT) [ 36.847538] Call trace: [ 36.847554] show_stack+0x20/0x38 (C) [ 36.847589] dump_stack_lvl+0x8c/0xd0 [ 36.847627] print_report+0x118/0x608 [ 36.847663] kasan_report+0xdc/0x128 [ 36.847698] __asan_report_load1_noabort+0x20/0x30 [ 36.847737] mempool_uaf_helper+0x314/0x340 [ 36.847771] mempool_kmalloc_large_uaf+0xc4/0x120 [ 36.847806] kunit_try_run_case+0x170/0x3f0 [ 36.847843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.847882] kthread+0x328/0x630 [ 36.847911] ret_from_fork+0x10/0x20 [ 36.847945] [ 36.914967] The buggy address belongs to the physical page: [ 36.920526] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886390 [ 36.928510] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.936147] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.943090] page_type: f8(unknown) [ 36.946489] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.954208] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.961937] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.969745] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.977559] head: 0bfffe0000000002 fffffdffe018e401 00000000ffffffff 00000000ffffffff [ 36.985371] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.993175] page dumped because: kasan: bad access detected [ 36.998731] [ 37.000207] Memory state around the buggy address: [ 37.004986] ffff00080638ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.012190] ffff00080638ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.019396] >ffff000806390000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.026595] ^ [ 37.029810] ffff000806390080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.037016] ffff000806390100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.044216] ================================================================== [ 37.382222] ================================================================== [ 37.385970] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.392651] Read of size 1 at addr ffff0008051c0000 by task kunit_try_catch/280 [ 37.399941] [ 37.401429] CPU: 4 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 37.401483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.401502] Hardware name: WinLink E850-96 board (DT) [ 37.401527] Call trace: [ 37.401543] show_stack+0x20/0x38 (C) [ 37.401579] dump_stack_lvl+0x8c/0xd0 [ 37.401618] print_report+0x118/0x608 [ 37.401656] kasan_report+0xdc/0x128 [ 37.401692] __asan_report_load1_noabort+0x20/0x30 [ 37.401735] mempool_uaf_helper+0x314/0x340 [ 37.401767] mempool_page_alloc_uaf+0xc0/0x118 [ 37.401801] kunit_try_run_case+0x170/0x3f0 [ 37.401841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.401879] kthread+0x328/0x630 [ 37.401911] ret_from_fork+0x10/0x20 [ 37.401949] [ 37.468693] The buggy address belongs to the physical page: [ 37.474248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8851c0 [ 37.482234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.488757] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.496474] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.504195] page dumped because: kasan: bad access detected [ 37.509748] [ 37.511223] Memory state around the buggy address: [ 37.516008] ffff0008051bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.523206] ffff0008051bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.530413] >ffff0008051c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.537612] ^ [ 37.540828] ffff0008051c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.548033] ffff0008051c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.555235] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 37.053742] ================================================================== [ 37.063145] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.070261] Read of size 1 at addr ffff000806060240 by task kunit_try_catch/278 [ 37.077550] [ 37.079037] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 37.079094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.079111] Hardware name: WinLink E850-96 board (DT) [ 37.079132] Call trace: [ 37.079149] show_stack+0x20/0x38 (C) [ 37.079185] dump_stack_lvl+0x8c/0xd0 [ 37.079224] print_report+0x118/0x608 [ 37.079259] kasan_report+0xdc/0x128 [ 37.079294] __asan_report_load1_noabort+0x20/0x30 [ 37.079335] mempool_uaf_helper+0x314/0x340 [ 37.079366] mempool_slab_uaf+0xc0/0x118 [ 37.079399] kunit_try_run_case+0x170/0x3f0 [ 37.079436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.079472] kthread+0x328/0x630 [ 37.079500] ret_from_fork+0x10/0x20 [ 37.079536] [ 37.145779] Allocated by task 278: [ 37.149165] kasan_save_stack+0x3c/0x68 [ 37.152983] kasan_save_track+0x20/0x40 [ 37.156803] kasan_save_alloc_info+0x40/0x58 [ 37.161055] __kasan_mempool_unpoison_object+0xbc/0x180 [ 37.166263] remove_element+0x16c/0x1f8 [ 37.170083] mempool_alloc_preallocated+0x58/0xc0 [ 37.174771] mempool_uaf_helper+0xa4/0x340 [ 37.178850] mempool_slab_uaf+0xc0/0x118 [ 37.182756] kunit_try_run_case+0x170/0x3f0 [ 37.186923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.192393] kthread+0x328/0x630 [ 37.195604] ret_from_fork+0x10/0x20 [ 37.199164] [ 37.200639] Freed by task 278: [ 37.203676] kasan_save_stack+0x3c/0x68 [ 37.207495] kasan_save_track+0x20/0x40 [ 37.211316] kasan_save_free_info+0x4c/0x78 [ 37.215481] __kasan_mempool_poison_object+0xc0/0x150 [ 37.220516] mempool_free+0x28c/0x328 [ 37.224162] mempool_uaf_helper+0x104/0x340 [ 37.228328] mempool_slab_uaf+0xc0/0x118 [ 37.232235] kunit_try_run_case+0x170/0x3f0 [ 37.236401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.241870] kthread+0x328/0x630 [ 37.245083] ret_from_fork+0x10/0x20 [ 37.248641] [ 37.250118] The buggy address belongs to the object at ffff000806060240 [ 37.250118] which belongs to the cache test_cache of size 123 [ 37.262531] The buggy address is located 0 bytes inside of [ 37.262531] freed 123-byte region [ffff000806060240, ffff0008060602bb) [ 37.274595] [ 37.276075] The buggy address belongs to the physical page: [ 37.281630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886060 [ 37.289615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.296124] page_type: f5(slab) [ 37.299262] raw: 0bfffe0000000000 ffff000800dba280 dead000000000122 0000000000000000 [ 37.306980] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 37.314700] page dumped because: kasan: bad access detected [ 37.320254] [ 37.321730] Memory state around the buggy address: [ 37.326513] ffff000806060100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.333713] ffff000806060180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.340917] >ffff000806060200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 37.348118] ^ [ 37.353417] ffff000806060280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.360622] ffff000806060300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.367824] ================================================================== [ 36.466273] ================================================================== [ 36.470704] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 36.477821] Read of size 1 at addr ffff000801da3800 by task kunit_try_catch/274 [ 36.485112] [ 36.486599] CPU: 2 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 36.486657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.486672] Hardware name: WinLink E850-96 board (DT) [ 36.486700] Call trace: [ 36.486716] show_stack+0x20/0x38 (C) [ 36.486757] dump_stack_lvl+0x8c/0xd0 [ 36.486794] print_report+0x118/0x608 [ 36.486829] kasan_report+0xdc/0x128 [ 36.486864] __asan_report_load1_noabort+0x20/0x30 [ 36.486906] mempool_uaf_helper+0x314/0x340 [ 36.486940] mempool_kmalloc_uaf+0xc4/0x120 [ 36.486972] kunit_try_run_case+0x170/0x3f0 [ 36.487010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.487049] kthread+0x328/0x630 [ 36.487078] ret_from_fork+0x10/0x20 [ 36.487116] [ 36.553601] Allocated by task 274: [ 36.556988] kasan_save_stack+0x3c/0x68 [ 36.560804] kasan_save_track+0x20/0x40 [ 36.564623] kasan_save_alloc_info+0x40/0x58 [ 36.568876] __kasan_mempool_unpoison_object+0x11c/0x180 [ 36.574171] remove_element+0x130/0x1f8 [ 36.577991] mempool_alloc_preallocated+0x58/0xc0 [ 36.582679] mempool_uaf_helper+0xa4/0x340 [ 36.586758] mempool_kmalloc_uaf+0xc4/0x120 [ 36.590926] kunit_try_run_case+0x170/0x3f0 [ 36.595092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.600560] kthread+0x328/0x630 [ 36.603772] ret_from_fork+0x10/0x20 [ 36.607331] [ 36.608808] Freed by task 274: [ 36.611846] kasan_save_stack+0x3c/0x68 [ 36.615666] kasan_save_track+0x20/0x40 [ 36.619484] kasan_save_free_info+0x4c/0x78 [ 36.623650] __kasan_mempool_poison_object+0xc0/0x150 [ 36.628685] mempool_free+0x28c/0x328 [ 36.632330] mempool_uaf_helper+0x104/0x340 [ 36.636497] mempool_kmalloc_uaf+0xc4/0x120 [ 36.640664] kunit_try_run_case+0x170/0x3f0 [ 36.644832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.650299] kthread+0x328/0x630 [ 36.653511] ret_from_fork+0x10/0x20 [ 36.657070] [ 36.658547] The buggy address belongs to the object at ffff000801da3800 [ 36.658547] which belongs to the cache kmalloc-128 of size 128 [ 36.671048] The buggy address is located 0 bytes inside of [ 36.671048] freed 128-byte region [ffff000801da3800, ffff000801da3880) [ 36.683111] [ 36.684591] The buggy address belongs to the physical page: [ 36.690147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881da2 [ 36.698130] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.705770] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.712713] page_type: f5(slab) [ 36.715851] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.723569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.731297] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.739107] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.746919] head: 0bfffe0000000001 fffffdffe0076881 00000000ffffffff 00000000ffffffff [ 36.754732] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.762537] page dumped because: kasan: bad access detected [ 36.768092] [ 36.769568] Memory state around the buggy address: [ 36.774349] ffff000801da3700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.781551] ffff000801da3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.788757] >ffff000801da3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.795956] ^ [ 36.799172] ffff000801da3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.806377] ffff000801da3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.813579] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 35.950272] ================================================================== [ 35.960126] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.967670] Read of size 1 at addr ffff000800e16001 by task kunit_try_catch/270 [ 35.974962] [ 35.976450] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 35.976503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.976519] Hardware name: WinLink E850-96 board (DT) [ 35.976540] Call trace: [ 35.976556] show_stack+0x20/0x38 (C) [ 35.976594] dump_stack_lvl+0x8c/0xd0 [ 35.976635] print_report+0x118/0x608 [ 35.976672] kasan_report+0xdc/0x128 [ 35.976706] __asan_report_load1_noabort+0x20/0x30 [ 35.976747] mempool_oob_right_helper+0x2ac/0x2f0 [ 35.976780] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 35.976814] kunit_try_run_case+0x170/0x3f0 [ 35.976853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.976892] kthread+0x328/0x630 [ 35.976923] ret_from_fork+0x10/0x20 [ 35.976961] [ 36.045015] The buggy address belongs to the physical page: [ 36.050573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e14 [ 36.058558] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.066196] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.073139] page_type: f8(unknown) [ 36.076538] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.084256] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.091983] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.099793] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.107607] head: 0bfffe0000000002 fffffdffe0038501 00000000ffffffff 00000000ffffffff [ 36.115418] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.123223] page dumped because: kasan: bad access detected [ 36.128779] [ 36.130255] Memory state around the buggy address: [ 36.135036] ffff000800e15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.142237] ffff000800e15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.149442] >ffff000800e16000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.156644] ^ [ 36.159859] ffff000800e16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.167063] ffff000800e16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.174266] ================================================================== [ 35.649105] ================================================================== [ 35.649284] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.649421] Read of size 1 at addr ffff000801e28873 by task kunit_try_catch/268 [ 35.655870] [ 35.657357] CPU: 7 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 35.657421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.657437] Hardware name: WinLink E850-96 board (DT) [ 35.657458] Call trace: [ 35.657471] show_stack+0x20/0x38 (C) [ 35.657508] dump_stack_lvl+0x8c/0xd0 [ 35.657547] print_report+0x118/0x608 [ 35.657581] kasan_report+0xdc/0x128 [ 35.657617] __asan_report_load1_noabort+0x20/0x30 [ 35.657659] mempool_oob_right_helper+0x2ac/0x2f0 [ 35.657693] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.657724] kunit_try_run_case+0x170/0x3f0 [ 35.657764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.657800] kthread+0x328/0x630 [ 35.657831] ret_from_fork+0x10/0x20 [ 35.657867] [ 35.725402] Allocated by task 268: [ 35.728788] kasan_save_stack+0x3c/0x68 [ 35.732605] kasan_save_track+0x20/0x40 [ 35.736424] kasan_save_alloc_info+0x40/0x58 [ 35.740677] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.745974] remove_element+0x130/0x1f8 [ 35.749792] mempool_alloc_preallocated+0x58/0xc0 [ 35.754479] mempool_oob_right_helper+0x98/0x2f0 [ 35.759080] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.763767] kunit_try_run_case+0x170/0x3f0 [ 35.767934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.773403] kthread+0x328/0x630 [ 35.776614] ret_from_fork+0x10/0x20 [ 35.780174] [ 35.781650] The buggy address belongs to the object at ffff000801e28800 [ 35.781650] which belongs to the cache kmalloc-128 of size 128 [ 35.794151] The buggy address is located 0 bytes to the right of [ 35.794151] allocated 115-byte region [ffff000801e28800, ffff000801e28873) [ 35.807082] [ 35.808562] The buggy address belongs to the physical page: [ 35.814119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 35.822102] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.829742] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.836684] page_type: f5(slab) [ 35.839822] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.847541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.855268] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.863079] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.870892] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 35.878703] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.886510] page dumped because: kasan: bad access detected [ 35.892064] [ 35.893539] Memory state around the buggy address: [ 35.898322] ffff000801e28700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.905522] ffff000801e28780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.912729] >ffff000801e28800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.919928] ^ [ 35.926789] ffff000801e28880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.933994] ffff000801e28900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.941197] ================================================================== [ 36.183778] ================================================================== [ 36.193713] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.201263] Read of size 1 at addr ffff00080631c2bb by task kunit_try_catch/272 [ 36.208554] [ 36.210040] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 36.210100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.210116] Hardware name: WinLink E850-96 board (DT) [ 36.210140] Call trace: [ 36.210157] show_stack+0x20/0x38 (C) [ 36.210197] dump_stack_lvl+0x8c/0xd0 [ 36.210234] print_report+0x118/0x608 [ 36.210270] kasan_report+0xdc/0x128 [ 36.210303] __asan_report_load1_noabort+0x20/0x30 [ 36.210343] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.210377] mempool_slab_oob_right+0xc0/0x118 [ 36.210413] kunit_try_run_case+0x170/0x3f0 [ 36.210450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.210488] kthread+0x328/0x630 [ 36.210517] ret_from_fork+0x10/0x20 [ 36.210553] [ 36.277824] Allocated by task 272: [ 36.281211] kasan_save_stack+0x3c/0x68 [ 36.285027] kasan_save_track+0x20/0x40 [ 36.288847] kasan_save_alloc_info+0x40/0x58 [ 36.293099] __kasan_mempool_unpoison_object+0xbc/0x180 [ 36.298308] remove_element+0x16c/0x1f8 [ 36.302127] mempool_alloc_preallocated+0x58/0xc0 [ 36.306815] mempool_oob_right_helper+0x98/0x2f0 [ 36.311415] mempool_slab_oob_right+0xc0/0x118 [ 36.315842] kunit_try_run_case+0x170/0x3f0 [ 36.320009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.325479] kthread+0x328/0x630 [ 36.328689] ret_from_fork+0x10/0x20 [ 36.332248] [ 36.333725] The buggy address belongs to the object at ffff00080631c240 [ 36.333725] which belongs to the cache test_cache of size 123 [ 36.346139] The buggy address is located 0 bytes to the right of [ 36.346139] allocated 123-byte region [ffff00080631c240, ffff00080631c2bb) [ 36.359071] [ 36.360550] The buggy address belongs to the physical page: [ 36.366107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88631c [ 36.374091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.380600] page_type: f5(slab) [ 36.383736] raw: 0bfffe0000000000 ffff00080179fcc0 dead000000000122 0000000000000000 [ 36.391456] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 36.399176] page dumped because: kasan: bad access detected [ 36.404729] [ 36.406205] Memory state around the buggy address: [ 36.410986] ffff00080631c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.418190] ffff00080631c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 36.425394] >ffff00080631c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 36.432594] ^ [ 36.437633] ffff00080631c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.444837] ffff00080631c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.452040] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 34.762685] ================================================================== [ 34.762871] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 34.763007] Read of size 1 at addr ffff000800dba140 by task kunit_try_catch/262 [ 34.766568] [ 34.768054] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 34.768116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.768133] Hardware name: WinLink E850-96 board (DT) [ 34.768153] Call trace: [ 34.768167] show_stack+0x20/0x38 (C) [ 34.768204] dump_stack_lvl+0x8c/0xd0 [ 34.768240] print_report+0x118/0x608 [ 34.768276] kasan_report+0xdc/0x128 [ 34.768311] __kasan_check_byte+0x54/0x70 [ 34.768344] kmem_cache_destroy+0x34/0x218 [ 34.768377] kmem_cache_double_destroy+0x174/0x300 [ 34.768412] kunit_try_run_case+0x170/0x3f0 [ 34.768451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.768488] kthread+0x328/0x630 [ 34.768521] ret_from_fork+0x10/0x20 [ 34.768559] [ 34.834794] Allocated by task 262: [ 34.838183] kasan_save_stack+0x3c/0x68 [ 34.841999] kasan_save_track+0x20/0x40 [ 34.845818] kasan_save_alloc_info+0x40/0x58 [ 34.850072] __kasan_slab_alloc+0xa8/0xb0 [ 34.854065] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.858666] __kmem_cache_create_args+0x178/0x280 [ 34.863352] kmem_cache_double_destroy+0xc0/0x300 [ 34.868040] kunit_try_run_case+0x170/0x3f0 [ 34.872208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.877675] kthread+0x328/0x630 [ 34.880887] ret_from_fork+0x10/0x20 [ 34.884446] [ 34.885923] Freed by task 262: [ 34.888963] kasan_save_stack+0x3c/0x68 [ 34.892779] kasan_save_track+0x20/0x40 [ 34.896599] kasan_save_free_info+0x4c/0x78 [ 34.900765] __kasan_slab_free+0x6c/0x98 [ 34.904671] kmem_cache_free+0x260/0x468 [ 34.908577] slab_kmem_cache_release+0x38/0x50 [ 34.913006] kmem_cache_release+0x1c/0x30 [ 34.916998] kobject_put+0x17c/0x420 [ 34.920558] sysfs_slab_release+0x1c/0x30 [ 34.924549] kmem_cache_destroy+0x118/0x218 [ 34.928716] kmem_cache_double_destroy+0x128/0x300 [ 34.933490] kunit_try_run_case+0x170/0x3f0 [ 34.937657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.943127] kthread+0x328/0x630 [ 34.946339] ret_from_fork+0x10/0x20 [ 34.949896] [ 34.951374] The buggy address belongs to the object at ffff000800dba140 [ 34.951374] which belongs to the cache kmem_cache of size 208 [ 34.963787] The buggy address is located 0 bytes inside of [ 34.963787] freed 208-byte region [ffff000800dba140, ffff000800dba210) [ 34.975851] [ 34.977331] The buggy address belongs to the physical page: [ 34.982887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dba [ 34.990870] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.998510] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.005453] page_type: f5(slab) [ 35.008591] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 35.016309] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.024037] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 35.031847] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.039660] head: 0bfffe0000000001 fffffdffe0036e81 00000000ffffffff 00000000ffffffff [ 35.047472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.055277] page dumped because: kasan: bad access detected [ 35.060832] [ 35.062308] Memory state around the buggy address: [ 35.067088] ffff000800dba000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.074291] ffff000800dba080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 35.081496] >ffff000800dba100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 35.088696] ^ [ 35.093995] ffff000800dba180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.101201] ffff000800dba200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.108404] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 34.351644] ================================================================== [ 34.351833] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 34.351966] Read of size 1 at addr ffff000802cca000 by task kunit_try_catch/260 [ 34.355351] [ 34.356838] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 34.356896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.356913] Hardware name: WinLink E850-96 board (DT) [ 34.356936] Call trace: [ 34.356951] show_stack+0x20/0x38 (C) [ 34.356989] dump_stack_lvl+0x8c/0xd0 [ 34.357026] print_report+0x118/0x608 [ 34.357061] kasan_report+0xdc/0x128 [ 34.357096] __asan_report_load1_noabort+0x20/0x30 [ 34.357135] kmem_cache_rcu_uaf+0x388/0x468 [ 34.357169] kunit_try_run_case+0x170/0x3f0 [ 34.357209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.357249] kthread+0x328/0x630 [ 34.357278] ret_from_fork+0x10/0x20 [ 34.357315] [ 34.419675] Allocated by task 260: [ 34.423062] kasan_save_stack+0x3c/0x68 [ 34.426878] kasan_save_track+0x20/0x40 [ 34.430697] kasan_save_alloc_info+0x40/0x58 [ 34.434950] __kasan_slab_alloc+0xa8/0xb0 [ 34.438943] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.443544] kmem_cache_rcu_uaf+0x12c/0x468 [ 34.447710] kunit_try_run_case+0x170/0x3f0 [ 34.451877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.457346] kthread+0x328/0x630 [ 34.460558] ret_from_fork+0x10/0x20 [ 34.464118] [ 34.465594] Freed by task 0: [ 34.468460] kasan_save_stack+0x3c/0x68 [ 34.472276] kasan_save_track+0x20/0x40 [ 34.476096] kasan_save_free_info+0x4c/0x78 [ 34.480262] __kasan_slab_free+0x6c/0x98 [ 34.484170] slab_free_after_rcu_debug+0xd4/0x2f8 [ 34.488856] rcu_core+0x9f4/0x1e20 [ 34.492241] rcu_core_si+0x18/0x30 [ 34.495627] handle_softirqs+0x374/0xb28 [ 34.499533] __do_softirq+0x1c/0x28 [ 34.503005] [ 34.504482] Last potentially related work creation: [ 34.509343] kasan_save_stack+0x3c/0x68 [ 34.513161] kasan_record_aux_stack+0xb4/0xc8 [ 34.517501] kmem_cache_free+0x120/0x468 [ 34.521407] kmem_cache_rcu_uaf+0x16c/0x468 [ 34.525574] kunit_try_run_case+0x170/0x3f0 [ 34.529740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.535209] kthread+0x328/0x630 [ 34.538421] ret_from_fork+0x10/0x20 [ 34.541980] [ 34.543455] The buggy address belongs to the object at ffff000802cca000 [ 34.543455] which belongs to the cache test_cache of size 200 [ 34.555872] The buggy address is located 0 bytes inside of [ 34.555872] freed 200-byte region [ffff000802cca000, ffff000802cca0c8) [ 34.567934] [ 34.569414] The buggy address belongs to the physical page: [ 34.574970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882cca [ 34.582954] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.590593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.597538] page_type: f5(slab) [ 34.600675] raw: 0bfffe0000000040 ffff00080179fa40 dead000000000122 0000000000000000 [ 34.608392] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.616120] head: 0bfffe0000000040 ffff00080179fa40 dead000000000122 0000000000000000 [ 34.623930] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.631743] head: 0bfffe0000000001 fffffdffe00b3281 00000000ffffffff 00000000ffffffff [ 34.639555] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.647360] page dumped because: kasan: bad access detected [ 34.652915] [ 34.654391] Memory state around the buggy address: [ 34.659173] ffff000802cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.666374] ffff000802cc9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.673580] >ffff000802cca000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.680780] ^ [ 34.683995] ffff000802cca080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 34.691200] ffff000802cca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.698402] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 33.954495] ================================================================== [ 33.958010] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 33.964949] Free of addr ffff0008048e0001 by task kunit_try_catch/258 [ 33.971374] [ 33.972860] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 33.972921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.972938] Hardware name: WinLink E850-96 board (DT) [ 33.972962] Call trace: [ 33.972977] show_stack+0x20/0x38 (C) [ 33.973014] dump_stack_lvl+0x8c/0xd0 [ 33.973052] print_report+0x118/0x608 [ 33.973087] kasan_report_invalid_free+0xc0/0xe8 [ 33.973125] check_slab_allocation+0xfc/0x108 [ 33.973161] __kasan_slab_pre_free+0x2c/0x48 [ 33.973194] kmem_cache_free+0xf0/0x468 [ 33.973228] kmem_cache_invalid_free+0x184/0x3c8 [ 33.973260] kunit_try_run_case+0x170/0x3f0 [ 33.973298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.973336] kthread+0x328/0x630 [ 33.973364] ret_from_fork+0x10/0x20 [ 33.973404] [ 34.044808] Allocated by task 258: [ 34.048195] kasan_save_stack+0x3c/0x68 [ 34.052012] kasan_save_track+0x20/0x40 [ 34.055833] kasan_save_alloc_info+0x40/0x58 [ 34.060084] __kasan_slab_alloc+0xa8/0xb0 [ 34.064077] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.068678] kmem_cache_invalid_free+0x12c/0x3c8 [ 34.073279] kunit_try_run_case+0x170/0x3f0 [ 34.077445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.082914] kthread+0x328/0x630 [ 34.086126] ret_from_fork+0x10/0x20 [ 34.089685] [ 34.091163] The buggy address belongs to the object at ffff0008048e0000 [ 34.091163] which belongs to the cache test_cache of size 200 [ 34.103577] The buggy address is located 1 bytes inside of [ 34.103577] 200-byte region [ffff0008048e0000, ffff0008048e00c8) [ 34.115118] [ 34.116598] The buggy address belongs to the physical page: [ 34.122154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848e0 [ 34.130137] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.137777] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.144721] page_type: f5(slab) [ 34.147859] raw: 0bfffe0000000040 ffff000801d92a00 dead000000000122 0000000000000000 [ 34.155576] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.163304] head: 0bfffe0000000040 ffff000801d92a00 dead000000000122 0000000000000000 [ 34.171114] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.178927] head: 0bfffe0000000001 fffffdffe0123801 00000000ffffffff 00000000ffffffff [ 34.186739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.194544] page dumped because: kasan: bad access detected [ 34.200100] [ 34.201575] Memory state around the buggy address: [ 34.206358] ffff0008048dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.213558] ffff0008048dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.220763] >ffff0008048e0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.227964] ^ [ 34.231180] ffff0008048e0080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 34.238384] ffff0008048e0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.245587] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 33.618540] ================================================================== [ 33.618722] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 33.618848] Free of addr ffff000800dbc000 by task kunit_try_catch/256 [ 33.620249] [ 33.621736] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 33.621791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.621808] Hardware name: WinLink E850-96 board (DT) [ 33.621832] Call trace: [ 33.621846] show_stack+0x20/0x38 (C) [ 33.621885] dump_stack_lvl+0x8c/0xd0 [ 33.621922] print_report+0x118/0x608 [ 33.621957] kasan_report_invalid_free+0xc0/0xe8 [ 33.621994] check_slab_allocation+0xd4/0x108 [ 33.622027] __kasan_slab_pre_free+0x2c/0x48 [ 33.622061] kmem_cache_free+0xf0/0x468 [ 33.622094] kmem_cache_double_free+0x190/0x3c8 [ 33.622128] kunit_try_run_case+0x170/0x3f0 [ 33.622167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.622203] kthread+0x328/0x630 [ 33.622232] ret_from_fork+0x10/0x20 [ 33.622271] [ 33.693600] Allocated by task 256: [ 33.696986] kasan_save_stack+0x3c/0x68 [ 33.700802] kasan_save_track+0x20/0x40 [ 33.704621] kasan_save_alloc_info+0x40/0x58 [ 33.708875] __kasan_slab_alloc+0xa8/0xb0 [ 33.712869] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.717468] kmem_cache_double_free+0x12c/0x3c8 [ 33.721982] kunit_try_run_case+0x170/0x3f0 [ 33.726149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.731617] kthread+0x328/0x630 [ 33.734829] ret_from_fork+0x10/0x20 [ 33.738388] [ 33.739865] Freed by task 256: [ 33.742903] kasan_save_stack+0x3c/0x68 [ 33.746721] kasan_save_track+0x20/0x40 [ 33.750540] kasan_save_free_info+0x4c/0x78 [ 33.754707] __kasan_slab_free+0x6c/0x98 [ 33.758614] kmem_cache_free+0x260/0x468 [ 33.762520] kmem_cache_double_free+0x140/0x3c8 [ 33.767035] kunit_try_run_case+0x170/0x3f0 [ 33.771200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.776669] kthread+0x328/0x630 [ 33.779880] ret_from_fork+0x10/0x20 [ 33.783439] [ 33.784916] The buggy address belongs to the object at ffff000800dbc000 [ 33.784916] which belongs to the cache test_cache of size 200 [ 33.797331] The buggy address is located 0 bytes inside of [ 33.797331] 200-byte region [ffff000800dbc000, ffff000800dbc0c8) [ 33.808873] [ 33.810353] The buggy address belongs to the physical page: [ 33.815909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dbc [ 33.823892] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.831533] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.838475] page_type: f5(slab) [ 33.841613] raw: 0bfffe0000000040 ffff000800dba000 dead000000000122 0000000000000000 [ 33.849331] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.857060] head: 0bfffe0000000040 ffff000800dba000 dead000000000122 0000000000000000 [ 33.864868] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.872682] head: 0bfffe0000000001 fffffdffe0036f01 00000000ffffffff 00000000ffffffff [ 33.880494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.888301] page dumped because: kasan: bad access detected [ 33.893854] [ 33.895329] Memory state around the buggy address: [ 33.900109] ffff000800dbbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.907313] ffff000800dbbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.914517] >ffff000800dbc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.921719] ^ [ 33.924934] ffff000800dbc080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.932139] ffff000800dbc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.939341] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 33.282229] ================================================================== [ 33.291710] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 33.298389] Read of size 1 at addr ffff000802cca0c8 by task kunit_try_catch/254 [ 33.305681] [ 33.307167] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 33.307223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.307241] Hardware name: WinLink E850-96 board (DT) [ 33.307265] Call trace: [ 33.307280] show_stack+0x20/0x38 (C) [ 33.307316] dump_stack_lvl+0x8c/0xd0 [ 33.307355] print_report+0x118/0x608 [ 33.307390] kasan_report+0xdc/0x128 [ 33.307426] __asan_report_load1_noabort+0x20/0x30 [ 33.307462] kmem_cache_oob+0x344/0x430 [ 33.307495] kunit_try_run_case+0x170/0x3f0 [ 33.307534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.307573] kthread+0x328/0x630 [ 33.307602] ret_from_fork+0x10/0x20 [ 33.307638] [ 33.369657] Allocated by task 254: [ 33.373044] kasan_save_stack+0x3c/0x68 [ 33.376859] kasan_save_track+0x20/0x40 [ 33.380680] kasan_save_alloc_info+0x40/0x58 [ 33.384932] __kasan_slab_alloc+0xa8/0xb0 [ 33.388926] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.393526] kmem_cache_oob+0x12c/0x430 [ 33.397345] kunit_try_run_case+0x170/0x3f0 [ 33.401512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.406981] kthread+0x328/0x630 [ 33.410193] ret_from_fork+0x10/0x20 [ 33.413753] [ 33.415229] The buggy address belongs to the object at ffff000802cca000 [ 33.415229] which belongs to the cache test_cache of size 200 [ 33.427642] The buggy address is located 0 bytes to the right of [ 33.427642] allocated 200-byte region [ffff000802cca000, ffff000802cca0c8) [ 33.440574] [ 33.442054] The buggy address belongs to the physical page: [ 33.447609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882cca [ 33.455594] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.463233] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.470176] page_type: f5(slab) [ 33.473314] raw: 0bfffe0000000040 ffff00080179f900 dead000000000122 0000000000000000 [ 33.481032] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.488761] head: 0bfffe0000000040 ffff00080179f900 dead000000000122 0000000000000000 [ 33.496569] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.504383] head: 0bfffe0000000001 fffffdffe00b3281 00000000ffffffff 00000000ffffffff [ 33.512195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.520001] page dumped because: kasan: bad access detected [ 33.525555] [ 33.527031] Memory state around the buggy address: [ 33.531813] ffff000802cc9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.539014] ffff000802cca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.546218] >ffff000802cca080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.553420] ^ [ 33.558979] ffff000802cca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.566184] ffff000802cca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.573386] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 32.937319] ================================================================== [ 32.944668] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 32.951351] Read of size 8 at addr ffff000800d64980 by task kunit_try_catch/247 [ 32.958637] [ 32.960125] CPU: 7 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 32.960187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.960204] Hardware name: WinLink E850-96 board (DT) [ 32.960226] Call trace: [ 32.960240] show_stack+0x20/0x38 (C) [ 32.960276] dump_stack_lvl+0x8c/0xd0 [ 32.960314] print_report+0x118/0x608 [ 32.960351] kasan_report+0xdc/0x128 [ 32.960388] __asan_report_load8_noabort+0x20/0x30 [ 32.960429] workqueue_uaf+0x480/0x4a8 [ 32.960461] kunit_try_run_case+0x170/0x3f0 [ 32.960496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.960535] kthread+0x328/0x630 [ 32.960564] ret_from_fork+0x10/0x20 [ 32.960602] [ 33.022528] Allocated by task 247: [ 33.025914] kasan_save_stack+0x3c/0x68 [ 33.029730] kasan_save_track+0x20/0x40 [ 33.033550] kasan_save_alloc_info+0x40/0x58 [ 33.037802] __kasan_kmalloc+0xd4/0xd8 [ 33.041535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.046049] workqueue_uaf+0x13c/0x4a8 [ 33.049781] kunit_try_run_case+0x170/0x3f0 [ 33.053948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.059418] kthread+0x328/0x630 [ 33.062628] ret_from_fork+0x10/0x20 [ 33.066187] [ 33.067664] Freed by task 83: [ 33.070617] kasan_save_stack+0x3c/0x68 [ 33.074434] kasan_save_track+0x20/0x40 [ 33.078253] kasan_save_free_info+0x4c/0x78 [ 33.082419] __kasan_slab_free+0x6c/0x98 [ 33.086327] kfree+0x214/0x3c8 [ 33.089365] workqueue_uaf_work+0x18/0x30 [ 33.093357] process_one_work+0x530/0xf98 [ 33.097350] worker_thread+0x618/0xf38 [ 33.101082] kthread+0x328/0x630 [ 33.104296] ret_from_fork+0x10/0x20 [ 33.107853] [ 33.109330] Last potentially related work creation: [ 33.114190] kasan_save_stack+0x3c/0x68 [ 33.118011] kasan_record_aux_stack+0xb4/0xc8 [ 33.122351] __queue_work+0x65c/0x1008 [ 33.126082] queue_work_on+0xbc/0xf8 [ 33.129641] workqueue_uaf+0x210/0x4a8 [ 33.133374] kunit_try_run_case+0x170/0x3f0 [ 33.137540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.143009] kthread+0x328/0x630 [ 33.146222] ret_from_fork+0x10/0x20 [ 33.149780] [ 33.151257] The buggy address belongs to the object at ffff000800d64980 [ 33.151257] which belongs to the cache kmalloc-32 of size 32 [ 33.163585] The buggy address is located 0 bytes inside of [ 33.163585] freed 32-byte region [ffff000800d64980, ffff000800d649a0) [ 33.175560] [ 33.177040] The buggy address belongs to the physical page: [ 33.182596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d64 [ 33.190581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.197090] page_type: f5(slab) [ 33.200230] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 33.207947] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.215666] page dumped because: kasan: bad access detected [ 33.221220] [ 33.222696] Memory state around the buggy address: [ 33.227475] ffff000800d64880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.234680] ffff000800d64900: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc [ 33.241883] >ffff000800d64980: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.249084] ^ [ 33.252299] ffff000800d64a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.259504] ffff000800d64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.266708] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 32.571518] ================================================================== [ 32.571693] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 32.571818] Read of size 4 at addr ffff000800c30c00 by task swapper/5/0 [ 32.572879] [ 32.574369] CPU: 5 UID: 0 PID: 0 Comm: swapper/5 Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 32.574425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.574441] Hardware name: WinLink E850-96 board (DT) [ 32.574464] Call trace: [ 32.574479] show_stack+0x20/0x38 (C) [ 32.574515] dump_stack_lvl+0x8c/0xd0 [ 32.574553] print_report+0x118/0x608 [ 32.574589] kasan_report+0xdc/0x128 [ 32.574625] __asan_report_load4_noabort+0x20/0x30 [ 32.574662] rcu_uaf_reclaim+0x64/0x70 [ 32.574691] rcu_core+0x9f4/0x1e20 [ 32.574724] rcu_core_si+0x18/0x30 [ 32.574754] handle_softirqs+0x374/0xb28 [ 32.574789] __do_softirq+0x1c/0x28 [ 32.574821] ____do_softirq+0x18/0x30 [ 32.574857] call_on_irq_stack+0x24/0x30 [ 32.574886] do_softirq_own_stack+0x24/0x38 [ 32.574916] __irq_exit_rcu+0x1fc/0x318 [ 32.574946] irq_exit_rcu+0x1c/0x80 [ 32.574975] el1_interrupt+0x38/0x58 [ 32.575013] el1h_64_irq_handler+0x18/0x28 [ 32.575041] el1h_64_irq+0x6c/0x70 [ 32.575068] arch_local_irq_enable+0x4/0x8 (P) [ 32.575103] do_idle+0x384/0x4e8 [ 32.575134] cpu_startup_entry+0x64/0x80 [ 32.575167] secondary_start_kernel+0x288/0x340 [ 32.575200] __secondary_switched+0xc0/0xc8 [ 32.575243] [ 32.684076] Allocated by task 245: [ 32.687463] kasan_save_stack+0x3c/0x68 [ 32.691281] kasan_save_track+0x20/0x40 [ 32.695100] kasan_save_alloc_info+0x40/0x58 [ 32.699352] __kasan_kmalloc+0xd4/0xd8 [ 32.703085] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.707599] rcu_uaf+0xb0/0x2d8 [ 32.710724] kunit_try_run_case+0x170/0x3f0 [ 32.714890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.720359] kthread+0x328/0x630 [ 32.723571] ret_from_fork+0x10/0x20 [ 32.727130] [ 32.728605] Freed by task 0: [ 32.731472] kasan_save_stack+0x3c/0x68 [ 32.735289] kasan_save_track+0x20/0x40 [ 32.739109] kasan_save_free_info+0x4c/0x78 [ 32.743275] __kasan_slab_free+0x6c/0x98 [ 32.747181] kfree+0x214/0x3c8 [ 32.750220] rcu_uaf_reclaim+0x28/0x70 [ 32.753954] rcu_core+0x9f4/0x1e20 [ 32.757338] rcu_core_si+0x18/0x30 [ 32.760725] handle_softirqs+0x374/0xb28 [ 32.764630] __do_softirq+0x1c/0x28 [ 32.768102] [ 32.769579] Last potentially related work creation: [ 32.774440] kasan_save_stack+0x3c/0x68 [ 32.778257] kasan_record_aux_stack+0xb4/0xc8 [ 32.782598] __call_rcu_common.constprop.0+0x70/0x8b0 [ 32.787632] call_rcu+0x18/0x30 [ 32.790759] rcu_uaf+0x14c/0x2d8 [ 32.793969] kunit_try_run_case+0x170/0x3f0 [ 32.798136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.803604] kthread+0x328/0x630 [ 32.806816] ret_from_fork+0x10/0x20 [ 32.810375] [ 32.811852] The buggy address belongs to the object at ffff000800c30c00 [ 32.811852] which belongs to the cache kmalloc-32 of size 32 [ 32.824180] The buggy address is located 0 bytes inside of [ 32.824180] freed 32-byte region [ffff000800c30c00, ffff000800c30c20) [ 32.836156] [ 32.837635] The buggy address belongs to the physical page: [ 32.843191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c30 [ 32.851177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.857685] page_type: f5(slab) [ 32.860823] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 32.868541] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.876261] page dumped because: kasan: bad access detected [ 32.881815] [ 32.883290] Memory state around the buggy address: [ 32.888071] ffff000800c30b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.895274] ffff000800c30b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.902480] >ffff000800c30c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 32.909679] ^ [ 32.912895] ffff000800c30c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.920100] ffff000800c30d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.927302] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 31.517821] ================================================================== [ 31.527671] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 31.534007] Read of size 1 at addr ffff000801e28500 by task kunit_try_catch/243 [ 31.541295] [ 31.542782] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 31.542840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.542857] Hardware name: WinLink E850-96 board (DT) [ 31.542877] Call trace: [ 31.542894] show_stack+0x20/0x38 (C) [ 31.542930] dump_stack_lvl+0x8c/0xd0 [ 31.542965] print_report+0x118/0x608 [ 31.543003] kasan_report+0xdc/0x128 [ 31.543035] __kasan_check_byte+0x54/0x70 [ 31.543069] ksize+0x30/0x88 [ 31.543101] ksize_uaf+0x168/0x5f8 [ 31.543132] kunit_try_run_case+0x170/0x3f0 [ 31.543169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.543208] kthread+0x328/0x630 [ 31.543236] ret_from_fork+0x10/0x20 [ 31.543273] [ 31.606919] Allocated by task 243: [ 31.610308] kasan_save_stack+0x3c/0x68 [ 31.614125] kasan_save_track+0x20/0x40 [ 31.617945] kasan_save_alloc_info+0x40/0x58 [ 31.622197] __kasan_kmalloc+0xd4/0xd8 [ 31.625929] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.630443] ksize_uaf+0xb8/0x5f8 [ 31.633743] kunit_try_run_case+0x170/0x3f0 [ 31.637910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.643377] kthread+0x328/0x630 [ 31.646589] ret_from_fork+0x10/0x20 [ 31.650149] [ 31.651623] Freed by task 243: [ 31.654663] kasan_save_stack+0x3c/0x68 [ 31.658481] kasan_save_track+0x20/0x40 [ 31.662300] kasan_save_free_info+0x4c/0x78 [ 31.666467] __kasan_slab_free+0x6c/0x98 [ 31.670373] kfree+0x214/0x3c8 [ 31.673411] ksize_uaf+0x11c/0x5f8 [ 31.676797] kunit_try_run_case+0x170/0x3f0 [ 31.680963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.686435] kthread+0x328/0x630 [ 31.689644] ret_from_fork+0x10/0x20 [ 31.693203] [ 31.694682] The buggy address belongs to the object at ffff000801e28500 [ 31.694682] which belongs to the cache kmalloc-128 of size 128 [ 31.707181] The buggy address is located 0 bytes inside of [ 31.707181] freed 128-byte region [ffff000801e28500, ffff000801e28580) [ 31.719245] [ 31.720722] The buggy address belongs to the physical page: [ 31.726279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 31.734263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.741904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.748847] page_type: f5(slab) [ 31.751984] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.759702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.767430] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.775239] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.783053] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 31.790864] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.798671] page dumped because: kasan: bad access detected [ 31.804225] [ 31.805700] Memory state around the buggy address: [ 31.810483] ffff000801e28400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.817686] ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.824889] >ffff000801e28500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.832090] ^ [ 31.835305] ffff000801e28580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.842511] ffff000801e28600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.849714] ================================================================== [ 31.857047] ================================================================== [ 31.864128] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 31.870457] Read of size 1 at addr ffff000801e28500 by task kunit_try_catch/243 [ 31.877749] [ 31.879235] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 31.879286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.879303] Hardware name: WinLink E850-96 board (DT) [ 31.879323] Call trace: [ 31.879338] show_stack+0x20/0x38 (C) [ 31.879373] dump_stack_lvl+0x8c/0xd0 [ 31.879411] print_report+0x118/0x608 [ 31.879444] kasan_report+0xdc/0x128 [ 31.879478] __asan_report_load1_noabort+0x20/0x30 [ 31.879515] ksize_uaf+0x598/0x5f8 [ 31.879543] kunit_try_run_case+0x170/0x3f0 [ 31.879578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.879615] kthread+0x328/0x630 [ 31.879645] ret_from_fork+0x10/0x20 [ 31.879682] [ 31.941289] Allocated by task 243: [ 31.944675] kasan_save_stack+0x3c/0x68 [ 31.948494] kasan_save_track+0x20/0x40 [ 31.952313] kasan_save_alloc_info+0x40/0x58 [ 31.956567] __kasan_kmalloc+0xd4/0xd8 [ 31.960300] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.964813] ksize_uaf+0xb8/0x5f8 [ 31.968112] kunit_try_run_case+0x170/0x3f0 [ 31.972279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.977747] kthread+0x328/0x630 [ 31.980960] ret_from_fork+0x10/0x20 [ 31.984518] [ 31.985994] Freed by task 243: [ 31.989033] kasan_save_stack+0x3c/0x68 [ 31.992851] kasan_save_track+0x20/0x40 [ 31.996670] kasan_save_free_info+0x4c/0x78 [ 32.000837] __kasan_slab_free+0x6c/0x98 [ 32.004743] kfree+0x214/0x3c8 [ 32.007781] ksize_uaf+0x11c/0x5f8 [ 32.011167] kunit_try_run_case+0x170/0x3f0 [ 32.015333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.020803] kthread+0x328/0x630 [ 32.024014] ret_from_fork+0x10/0x20 [ 32.027574] [ 32.029050] The buggy address belongs to the object at ffff000801e28500 [ 32.029050] which belongs to the cache kmalloc-128 of size 128 [ 32.041550] The buggy address is located 0 bytes inside of [ 32.041550] freed 128-byte region [ffff000801e28500, ffff000801e28580) [ 32.053615] [ 32.055092] The buggy address belongs to the physical page: [ 32.060650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 32.068634] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.076273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.083216] page_type: f5(slab) [ 32.086351] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.094071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.101798] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.109610] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.117423] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 32.125235] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.133040] page dumped because: kasan: bad access detected [ 32.138595] [ 32.140071] Memory state around the buggy address: [ 32.144849] ffff000801e28400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.152054] ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.159259] >ffff000801e28500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.166459] ^ [ 32.169675] ffff000801e28580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.176881] ffff000801e28600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.184081] ================================================================== [ 32.191400] ================================================================== [ 32.198497] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 32.204827] Read of size 1 at addr ffff000801e28578 by task kunit_try_catch/243 [ 32.212119] [ 32.213604] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 32.213656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.213674] Hardware name: WinLink E850-96 board (DT) [ 32.213693] Call trace: [ 32.213706] show_stack+0x20/0x38 (C) [ 32.213741] dump_stack_lvl+0x8c/0xd0 [ 32.213779] print_report+0x118/0x608 [ 32.213813] kasan_report+0xdc/0x128 [ 32.213845] __asan_report_load1_noabort+0x20/0x30 [ 32.213881] ksize_uaf+0x544/0x5f8 [ 32.213911] kunit_try_run_case+0x170/0x3f0 [ 32.213947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.213985] kthread+0x328/0x630 [ 32.214011] ret_from_fork+0x10/0x20 [ 32.214044] [ 32.275659] Allocated by task 243: [ 32.279046] kasan_save_stack+0x3c/0x68 [ 32.282867] kasan_save_track+0x20/0x40 [ 32.286684] kasan_save_alloc_info+0x40/0x58 [ 32.290937] __kasan_kmalloc+0xd4/0xd8 [ 32.294669] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.299183] ksize_uaf+0xb8/0x5f8 [ 32.302483] kunit_try_run_case+0x170/0x3f0 [ 32.306650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.312117] kthread+0x328/0x630 [ 32.315329] ret_from_fork+0x10/0x20 [ 32.318888] [ 32.320364] Freed by task 243: [ 32.323403] kasan_save_stack+0x3c/0x68 [ 32.327221] kasan_save_track+0x20/0x40 [ 32.331040] kasan_save_free_info+0x4c/0x78 [ 32.335207] __kasan_slab_free+0x6c/0x98 [ 32.339114] kfree+0x214/0x3c8 [ 32.342151] ksize_uaf+0x11c/0x5f8 [ 32.345536] kunit_try_run_case+0x170/0x3f0 [ 32.349703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.355174] kthread+0x328/0x630 [ 32.358384] ret_from_fork+0x10/0x20 [ 32.361943] [ 32.363419] The buggy address belongs to the object at ffff000801e28500 [ 32.363419] which belongs to the cache kmalloc-128 of size 128 [ 32.375920] The buggy address is located 120 bytes inside of [ 32.375920] freed 128-byte region [ffff000801e28500, ffff000801e28580) [ 32.388158] [ 32.389637] The buggy address belongs to the physical page: [ 32.395193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 32.403178] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.410817] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.417759] page_type: f5(slab) [ 32.420895] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.428615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.436342] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 32.444153] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.451966] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 32.459778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.467584] page dumped because: kasan: bad access detected [ 32.473139] [ 32.474614] Memory state around the buggy address: [ 32.479393] ffff000801e28400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.486598] ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.493802] >ffff000801e28500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.501003] ^ [ 32.508125] ffff000801e28580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.515331] ffff000801e28600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.522532] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 30.615747] ================================================================== [ 30.625431] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.632804] Read of size 1 at addr ffff000801e28473 by task kunit_try_catch/241 [ 30.640094] [ 30.641582] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.641636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.641654] Hardware name: WinLink E850-96 board (DT) [ 30.641677] Call trace: [ 30.641694] show_stack+0x20/0x38 (C) [ 30.641731] dump_stack_lvl+0x8c/0xd0 [ 30.641772] print_report+0x118/0x608 [ 30.641808] kasan_report+0xdc/0x128 [ 30.641845] __asan_report_load1_noabort+0x20/0x30 [ 30.641883] ksize_unpoisons_memory+0x628/0x740 [ 30.641916] kunit_try_run_case+0x170/0x3f0 [ 30.641953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.641993] kthread+0x328/0x630 [ 30.642023] ret_from_fork+0x10/0x20 [ 30.642057] [ 30.704764] Allocated by task 241: [ 30.708151] kasan_save_stack+0x3c/0x68 [ 30.711969] kasan_save_track+0x20/0x40 [ 30.715788] kasan_save_alloc_info+0x40/0x58 [ 30.720040] __kasan_kmalloc+0xd4/0xd8 [ 30.723773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.728286] ksize_unpoisons_memory+0xc0/0x740 [ 30.732714] kunit_try_run_case+0x170/0x3f0 [ 30.736880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.742349] kthread+0x328/0x630 [ 30.745561] ret_from_fork+0x10/0x20 [ 30.749120] [ 30.750598] The buggy address belongs to the object at ffff000801e28400 [ 30.750598] which belongs to the cache kmalloc-128 of size 128 [ 30.763098] The buggy address is located 0 bytes to the right of [ 30.763098] allocated 115-byte region [ffff000801e28400, ffff000801e28473) [ 30.776029] [ 30.777508] The buggy address belongs to the physical page: [ 30.783064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 30.791049] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.798687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.805632] page_type: f5(slab) [ 30.808769] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.816489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.824216] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.832025] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.839837] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 30.847650] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.855455] page dumped because: kasan: bad access detected [ 30.861010] [ 30.862486] Memory state around the buggy address: [ 30.867268] ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.874469] ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.881675] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.888875] ^ [ 30.895736] ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.902941] ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.910144] ================================================================== [ 30.917551] ================================================================== [ 30.924562] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 30.931930] Read of size 1 at addr ffff000801e28478 by task kunit_try_catch/241 [ 30.939221] [ 30.940709] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.940767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.940785] Hardware name: WinLink E850-96 board (DT) [ 30.940806] Call trace: [ 30.940820] show_stack+0x20/0x38 (C) [ 30.940859] dump_stack_lvl+0x8c/0xd0 [ 30.940897] print_report+0x118/0x608 [ 30.940933] kasan_report+0xdc/0x128 [ 30.940970] __asan_report_load1_noabort+0x20/0x30 [ 30.941009] ksize_unpoisons_memory+0x618/0x740 [ 30.941041] kunit_try_run_case+0x170/0x3f0 [ 30.941080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.941120] kthread+0x328/0x630 [ 30.941150] ret_from_fork+0x10/0x20 [ 30.941185] [ 31.003890] Allocated by task 241: [ 31.007278] kasan_save_stack+0x3c/0x68 [ 31.011095] kasan_save_track+0x20/0x40 [ 31.014916] kasan_save_alloc_info+0x40/0x58 [ 31.019168] __kasan_kmalloc+0xd4/0xd8 [ 31.022901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.027414] ksize_unpoisons_memory+0xc0/0x740 [ 31.031841] kunit_try_run_case+0x170/0x3f0 [ 31.036007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.041476] kthread+0x328/0x630 [ 31.044688] ret_from_fork+0x10/0x20 [ 31.048247] [ 31.049724] The buggy address belongs to the object at ffff000801e28400 [ 31.049724] which belongs to the cache kmalloc-128 of size 128 [ 31.062225] The buggy address is located 5 bytes to the right of [ 31.062225] allocated 115-byte region [ffff000801e28400, ffff000801e28473) [ 31.075157] [ 31.076636] The buggy address belongs to the physical page: [ 31.082192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 31.090176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.097816] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.104758] page_type: f5(slab) [ 31.107895] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.115614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.123341] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.131152] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.138965] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 31.146777] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.154582] page dumped because: kasan: bad access detected [ 31.160138] [ 31.161613] Memory state around the buggy address: [ 31.166395] ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.173596] ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.180803] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.188002] ^ [ 31.195124] ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.202329] ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.209531] ================================================================== [ 31.216864] ================================================================== [ 31.223942] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.231318] Read of size 1 at addr ffff000801e2847f by task kunit_try_catch/241 [ 31.238609] [ 31.240094] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 31.240149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.240166] Hardware name: WinLink E850-96 board (DT) [ 31.240186] Call trace: [ 31.240200] show_stack+0x20/0x38 (C) [ 31.240232] dump_stack_lvl+0x8c/0xd0 [ 31.240271] print_report+0x118/0x608 [ 31.240303] kasan_report+0xdc/0x128 [ 31.240336] __asan_report_load1_noabort+0x20/0x30 [ 31.240374] ksize_unpoisons_memory+0x690/0x740 [ 31.240405] kunit_try_run_case+0x170/0x3f0 [ 31.240440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.240478] kthread+0x328/0x630 [ 31.240505] ret_from_fork+0x10/0x20 [ 31.240540] [ 31.303278] Allocated by task 241: [ 31.306666] kasan_save_stack+0x3c/0x68 [ 31.310484] kasan_save_track+0x20/0x40 [ 31.314302] kasan_save_alloc_info+0x40/0x58 [ 31.318556] __kasan_kmalloc+0xd4/0xd8 [ 31.322288] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.326802] ksize_unpoisons_memory+0xc0/0x740 [ 31.331230] kunit_try_run_case+0x170/0x3f0 [ 31.335396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.340864] kthread+0x328/0x630 [ 31.344076] ret_from_fork+0x10/0x20 [ 31.347635] [ 31.349113] The buggy address belongs to the object at ffff000801e28400 [ 31.349113] which belongs to the cache kmalloc-128 of size 128 [ 31.361612] The buggy address is located 12 bytes to the right of [ 31.361612] allocated 115-byte region [ffff000801e28400, ffff000801e28473) [ 31.374631] [ 31.376108] The buggy address belongs to the physical page: [ 31.381667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 31.389650] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.397289] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.404231] page_type: f5(slab) [ 31.407369] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.415089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.422815] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.430627] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.438440] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 31.446252] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.454057] page dumped because: kasan: bad access detected [ 31.459613] [ 31.461088] Memory state around the buggy address: [ 31.465868] ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.473071] ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.480277] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.487477] ^ [ 31.494598] ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.501803] ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.509004] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 30.301843] ================================================================== [ 30.308767] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 30.314751] Free of addr ffff000800c2f0a0 by task kunit_try_catch/239 [ 30.321175] [ 30.322660] CPU: 5 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.322717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.322737] Hardware name: WinLink E850-96 board (DT) [ 30.322758] Call trace: [ 30.322772] show_stack+0x20/0x38 (C) [ 30.322806] dump_stack_lvl+0x8c/0xd0 [ 30.322841] print_report+0x118/0x608 [ 30.322875] kasan_report_invalid_free+0xc0/0xe8 [ 30.322911] check_slab_allocation+0xd4/0x108 [ 30.322948] __kasan_slab_pre_free+0x2c/0x48 [ 30.322983] kfree+0xe8/0x3c8 [ 30.323013] kfree_sensitive+0x3c/0xb0 [ 30.323044] kmalloc_double_kzfree+0x168/0x308 [ 30.323079] kunit_try_run_case+0x170/0x3f0 [ 30.323116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.323152] kthread+0x328/0x630 [ 30.323180] ret_from_fork+0x10/0x20 [ 30.323214] [ 30.397302] Allocated by task 239: [ 30.400689] kasan_save_stack+0x3c/0x68 [ 30.404509] kasan_save_track+0x20/0x40 [ 30.408326] kasan_save_alloc_info+0x40/0x58 [ 30.412580] __kasan_kmalloc+0xd4/0xd8 [ 30.416312] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.420826] kmalloc_double_kzfree+0xb8/0x308 [ 30.425166] kunit_try_run_case+0x170/0x3f0 [ 30.429333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.434803] kthread+0x328/0x630 [ 30.438013] ret_from_fork+0x10/0x20 [ 30.441572] [ 30.443048] Freed by task 239: [ 30.446086] kasan_save_stack+0x3c/0x68 [ 30.449905] kasan_save_track+0x20/0x40 [ 30.453725] kasan_save_free_info+0x4c/0x78 [ 30.457891] __kasan_slab_free+0x6c/0x98 [ 30.461798] kfree+0x214/0x3c8 [ 30.464836] kfree_sensitive+0x80/0xb0 [ 30.468568] kmalloc_double_kzfree+0x11c/0x308 [ 30.472996] kunit_try_run_case+0x170/0x3f0 [ 30.477162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.482631] kthread+0x328/0x630 [ 30.485844] ret_from_fork+0x10/0x20 [ 30.489401] [ 30.490878] The buggy address belongs to the object at ffff000800c2f0a0 [ 30.490878] which belongs to the cache kmalloc-16 of size 16 [ 30.503206] The buggy address is located 0 bytes inside of [ 30.503206] 16-byte region [ffff000800c2f0a0, ffff000800c2f0b0) [ 30.514661] [ 30.516139] The buggy address belongs to the physical page: [ 30.521696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2f [ 30.529680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.536191] page_type: f5(slab) [ 30.539325] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 30.547046] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.554765] page dumped because: kasan: bad access detected [ 30.560320] [ 30.561796] Memory state around the buggy address: [ 30.566577] ffff000800c2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.573779] ffff000800c2f000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.580984] >ffff000800c2f080: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 30.588184] ^ [ 30.592442] ffff000800c2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.599647] ffff000800c2f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.606848] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 29.988428] ================================================================== [ 30.002087] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.009462] Read of size 1 at addr ffff000800c2f0a0 by task kunit_try_catch/239 [ 30.016752] [ 30.018238] CPU: 5 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.018300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.018319] Hardware name: WinLink E850-96 board (DT) [ 30.018341] Call trace: [ 30.018357] show_stack+0x20/0x38 (C) [ 30.018393] dump_stack_lvl+0x8c/0xd0 [ 30.018433] print_report+0x118/0x608 [ 30.018468] kasan_report+0xdc/0x128 [ 30.018505] __kasan_check_byte+0x54/0x70 [ 30.018537] kfree_sensitive+0x30/0xb0 [ 30.018573] kmalloc_double_kzfree+0x168/0x308 [ 30.018605] kunit_try_run_case+0x170/0x3f0 [ 30.018642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.018681] kthread+0x328/0x630 [ 30.018709] ret_from_fork+0x10/0x20 [ 30.018743] [ 30.084287] Allocated by task 239: [ 30.087675] kasan_save_stack+0x3c/0x68 [ 30.091492] kasan_save_track+0x20/0x40 [ 30.095310] kasan_save_alloc_info+0x40/0x58 [ 30.099564] __kasan_kmalloc+0xd4/0xd8 [ 30.103296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.107810] kmalloc_double_kzfree+0xb8/0x308 [ 30.112150] kunit_try_run_case+0x170/0x3f0 [ 30.116317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.121787] kthread+0x328/0x630 [ 30.124997] ret_from_fork+0x10/0x20 [ 30.128556] [ 30.130032] Freed by task 239: [ 30.133070] kasan_save_stack+0x3c/0x68 [ 30.136889] kasan_save_track+0x20/0x40 [ 30.140710] kasan_save_free_info+0x4c/0x78 [ 30.144875] __kasan_slab_free+0x6c/0x98 [ 30.148781] kfree+0x214/0x3c8 [ 30.151820] kfree_sensitive+0x80/0xb0 [ 30.155552] kmalloc_double_kzfree+0x11c/0x308 [ 30.159979] kunit_try_run_case+0x170/0x3f0 [ 30.164146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.169614] kthread+0x328/0x630 [ 30.172828] ret_from_fork+0x10/0x20 [ 30.176385] [ 30.177863] The buggy address belongs to the object at ffff000800c2f0a0 [ 30.177863] which belongs to the cache kmalloc-16 of size 16 [ 30.190190] The buggy address is located 0 bytes inside of [ 30.190190] freed 16-byte region [ffff000800c2f0a0, ffff000800c2f0b0) [ 30.202166] [ 30.203644] The buggy address belongs to the physical page: [ 30.209201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2f [ 30.217185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.223696] page_type: f5(slab) [ 30.226833] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 30.234551] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.242269] page dumped because: kasan: bad access detected [ 30.247825] [ 30.249300] Memory state around the buggy address: [ 30.254082] ffff000800c2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.261285] ffff000800c2f000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.268488] >ffff000800c2f080: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 30.275689] ^ [ 30.279947] ffff000800c2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.287151] ffff000800c2f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.294355] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 29.684963] ================================================================== [ 29.694280] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 29.700874] Read of size 1 at addr ffff000800c2e9a8 by task kunit_try_catch/235 [ 29.708163] [ 29.709649] CPU: 5 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.709706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.709724] Hardware name: WinLink E850-96 board (DT) [ 29.709747] Call trace: [ 29.709760] show_stack+0x20/0x38 (C) [ 29.709797] dump_stack_lvl+0x8c/0xd0 [ 29.709835] print_report+0x118/0x608 [ 29.709870] kasan_report+0xdc/0x128 [ 29.709906] __asan_report_load1_noabort+0x20/0x30 [ 29.709946] kmalloc_uaf2+0x3f4/0x468 [ 29.709976] kunit_try_run_case+0x170/0x3f0 [ 29.710014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.710052] kthread+0x328/0x630 [ 29.710085] ret_from_fork+0x10/0x20 [ 29.710122] [ 29.771966] Allocated by task 235: [ 29.775354] kasan_save_stack+0x3c/0x68 [ 29.779169] kasan_save_track+0x20/0x40 [ 29.782989] kasan_save_alloc_info+0x40/0x58 [ 29.787242] __kasan_kmalloc+0xd4/0xd8 [ 29.790974] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.795488] kmalloc_uaf2+0xc4/0x468 [ 29.799047] kunit_try_run_case+0x170/0x3f0 [ 29.803214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.808684] kthread+0x328/0x630 [ 29.811894] ret_from_fork+0x10/0x20 [ 29.815452] [ 29.816928] Freed by task 235: [ 29.819967] kasan_save_stack+0x3c/0x68 [ 29.823786] kasan_save_track+0x20/0x40 [ 29.827607] kasan_save_free_info+0x4c/0x78 [ 29.831773] __kasan_slab_free+0x6c/0x98 [ 29.835679] kfree+0x214/0x3c8 [ 29.838717] kmalloc_uaf2+0x134/0x468 [ 29.842363] kunit_try_run_case+0x170/0x3f0 [ 29.846529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.851998] kthread+0x328/0x630 [ 29.855210] ret_from_fork+0x10/0x20 [ 29.858769] [ 29.860247] The buggy address belongs to the object at ffff000800c2e980 [ 29.860247] which belongs to the cache kmalloc-64 of size 64 [ 29.872574] The buggy address is located 40 bytes inside of [ 29.872574] freed 64-byte region [ffff000800c2e980, ffff000800c2e9c0) [ 29.884636] [ 29.886114] The buggy address belongs to the physical page: [ 29.891674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 29.899655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.906166] page_type: f5(slab) [ 29.909301] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.917021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.924741] page dumped because: kasan: bad access detected [ 29.930295] [ 29.931770] Memory state around the buggy address: [ 29.936552] ffff000800c2e880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.943754] ffff000800c2e900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.950958] >ffff000800c2e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.958159] ^ [ 29.962678] ffff000800c2ea00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 29.969882] ffff000800c2ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.977086] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 29.380671] ================================================================== [ 29.389426] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 29.396538] Write of size 33 at addr ffff000800d62280 by task kunit_try_catch/233 [ 29.404001] [ 29.405489] CPU: 7 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.405548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.405567] Hardware name: WinLink E850-96 board (DT) [ 29.405588] Call trace: [ 29.405602] show_stack+0x20/0x38 (C) [ 29.405639] dump_stack_lvl+0x8c/0xd0 [ 29.405677] print_report+0x118/0x608 [ 29.405715] kasan_report+0xdc/0x128 [ 29.405751] kasan_check_range+0x100/0x1a8 [ 29.405791] __asan_memset+0x34/0x78 [ 29.405820] kmalloc_uaf_memset+0x170/0x310 [ 29.405853] kunit_try_run_case+0x170/0x3f0 [ 29.405890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.405929] kthread+0x328/0x630 [ 29.405958] ret_from_fork+0x10/0x20 [ 29.405994] [ 29.471189] Allocated by task 233: [ 29.474576] kasan_save_stack+0x3c/0x68 [ 29.478392] kasan_save_track+0x20/0x40 [ 29.482212] kasan_save_alloc_info+0x40/0x58 [ 29.486465] __kasan_kmalloc+0xd4/0xd8 [ 29.490199] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.494712] kmalloc_uaf_memset+0xb8/0x310 [ 29.498791] kunit_try_run_case+0x170/0x3f0 [ 29.502959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.508426] kthread+0x328/0x630 [ 29.511638] ret_from_fork+0x10/0x20 [ 29.515197] [ 29.516673] Freed by task 233: [ 29.519714] kasan_save_stack+0x3c/0x68 [ 29.523530] kasan_save_track+0x20/0x40 [ 29.527350] kasan_save_free_info+0x4c/0x78 [ 29.531516] __kasan_slab_free+0x6c/0x98 [ 29.535423] kfree+0x214/0x3c8 [ 29.538461] kmalloc_uaf_memset+0x11c/0x310 [ 29.542629] kunit_try_run_case+0x170/0x3f0 [ 29.546794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.552263] kthread+0x328/0x630 [ 29.555474] ret_from_fork+0x10/0x20 [ 29.559033] [ 29.560509] The buggy address belongs to the object at ffff000800d62280 [ 29.560509] which belongs to the cache kmalloc-64 of size 64 [ 29.572839] The buggy address is located 0 bytes inside of [ 29.572839] freed 64-byte region [ffff000800d62280, ffff000800d622c0) [ 29.584815] [ 29.586294] The buggy address belongs to the physical page: [ 29.591849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d62 [ 29.599835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.606343] page_type: f5(slab) [ 29.609480] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.617200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.624919] page dumped because: kasan: bad access detected [ 29.630473] [ 29.631949] Memory state around the buggy address: [ 29.636730] ffff000800d62180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.643932] ffff000800d62200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.651136] >ffff000800d62280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.658337] ^ [ 29.661553] ffff000800d62300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.668758] ffff000800d62380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.675960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 29.080260] ================================================================== [ 29.090381] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 29.096889] Read of size 1 at addr ffff000800c2f088 by task kunit_try_catch/231 [ 29.104179] [ 29.105666] CPU: 5 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.105728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.105746] Hardware name: WinLink E850-96 board (DT) [ 29.105769] Call trace: [ 29.105782] show_stack+0x20/0x38 (C) [ 29.105817] dump_stack_lvl+0x8c/0xd0 [ 29.105854] print_report+0x118/0x608 [ 29.105892] kasan_report+0xdc/0x128 [ 29.105924] __asan_report_load1_noabort+0x20/0x30 [ 29.105966] kmalloc_uaf+0x300/0x338 [ 29.105992] kunit_try_run_case+0x170/0x3f0 [ 29.106028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.106067] kthread+0x328/0x630 [ 29.106098] ret_from_fork+0x10/0x20 [ 29.106135] [ 29.167895] Allocated by task 231: [ 29.171282] kasan_save_stack+0x3c/0x68 [ 29.175099] kasan_save_track+0x20/0x40 [ 29.178918] kasan_save_alloc_info+0x40/0x58 [ 29.183171] __kasan_kmalloc+0xd4/0xd8 [ 29.186904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.191417] kmalloc_uaf+0xb8/0x338 [ 29.194890] kunit_try_run_case+0x170/0x3f0 [ 29.199056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.204525] kthread+0x328/0x630 [ 29.207737] ret_from_fork+0x10/0x20 [ 29.211296] [ 29.212771] Freed by task 231: [ 29.215809] kasan_save_stack+0x3c/0x68 [ 29.219629] kasan_save_track+0x20/0x40 [ 29.223450] kasan_save_free_info+0x4c/0x78 [ 29.227615] __kasan_slab_free+0x6c/0x98 [ 29.231521] kfree+0x214/0x3c8 [ 29.234559] kmalloc_uaf+0x11c/0x338 [ 29.238118] kunit_try_run_case+0x170/0x3f0 [ 29.242286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.247753] kthread+0x328/0x630 [ 29.250965] ret_from_fork+0x10/0x20 [ 29.254524] [ 29.256001] The buggy address belongs to the object at ffff000800c2f080 [ 29.256001] which belongs to the cache kmalloc-16 of size 16 [ 29.268328] The buggy address is located 8 bytes inside of [ 29.268328] freed 16-byte region [ffff000800c2f080, ffff000800c2f090) [ 29.280305] [ 29.281783] The buggy address belongs to the physical page: [ 29.287340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2f [ 29.295325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.301835] page_type: f5(slab) [ 29.304971] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 29.312690] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.320410] page dumped because: kasan: bad access detected [ 29.325964] [ 29.327440] Memory state around the buggy address: [ 29.332222] ffff000800c2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.339424] ffff000800c2f000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.346627] >ffff000800c2f080: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.353828] ^ [ 29.357305] ffff000800c2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.364509] ffff000800c2f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.371713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 28.813228] ================================================================== [ 28.823545] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 28.831442] Read of size 64 at addr ffff000800d62204 by task kunit_try_catch/229 [ 28.838819] [ 28.840306] CPU: 7 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.840368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.840386] Hardware name: WinLink E850-96 board (DT) [ 28.840406] Call trace: [ 28.840422] show_stack+0x20/0x38 (C) [ 28.840459] dump_stack_lvl+0x8c/0xd0 [ 28.840497] print_report+0x118/0x608 [ 28.840533] kasan_report+0xdc/0x128 [ 28.840566] kasan_check_range+0x100/0x1a8 [ 28.840603] __asan_memmove+0x3c/0x98 [ 28.840632] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 28.840668] kunit_try_run_case+0x170/0x3f0 [ 28.840706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.840746] kthread+0x328/0x630 [ 28.840775] ret_from_fork+0x10/0x20 [ 28.840810] [ 28.906961] Allocated by task 229: [ 28.910348] kasan_save_stack+0x3c/0x68 [ 28.914164] kasan_save_track+0x20/0x40 [ 28.917984] kasan_save_alloc_info+0x40/0x58 [ 28.922237] __kasan_kmalloc+0xd4/0xd8 [ 28.925971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.930484] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 28.935432] kunit_try_run_case+0x170/0x3f0 [ 28.939598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.945067] kthread+0x328/0x630 [ 28.948279] ret_from_fork+0x10/0x20 [ 28.951838] [ 28.953316] The buggy address belongs to the object at ffff000800d62200 [ 28.953316] which belongs to the cache kmalloc-64 of size 64 [ 28.965642] The buggy address is located 4 bytes inside of [ 28.965642] allocated 64-byte region [ffff000800d62200, ffff000800d62240) [ 28.977966] [ 28.979445] The buggy address belongs to the physical page: [ 28.985002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d62 [ 28.992985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.999495] page_type: f5(slab) [ 29.002631] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.010351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.018071] page dumped because: kasan: bad access detected [ 29.023625] [ 29.025100] Memory state around the buggy address: [ 29.029881] ffff000800d62100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.037083] ffff000800d62180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.044289] >ffff000800d62200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.051488] ^ [ 29.056788] ffff000800d62280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.063993] ffff000800d62300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.071195] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 28.548604] ================================================================== [ 28.558185] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 28.565734] Read of size 18446744073709551614 at addr ffff000800c2e904 by task kunit_try_catch/227 [ 28.574674] [ 28.576161] CPU: 5 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.576214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.576229] Hardware name: WinLink E850-96 board (DT) [ 28.576249] Call trace: [ 28.576264] show_stack+0x20/0x38 (C) [ 28.576301] dump_stack_lvl+0x8c/0xd0 [ 28.576339] print_report+0x118/0x608 [ 28.576372] kasan_report+0xdc/0x128 [ 28.576403] kasan_check_range+0x100/0x1a8 [ 28.576439] __asan_memmove+0x3c/0x98 [ 28.576465] kmalloc_memmove_negative_size+0x154/0x2e0 [ 28.576499] kunit_try_run_case+0x170/0x3f0 [ 28.576535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.576571] kthread+0x328/0x630 [ 28.576601] ret_from_fork+0x10/0x20 [ 28.576636] [ 28.642901] Allocated by task 227: [ 28.646290] kasan_save_stack+0x3c/0x68 [ 28.650109] kasan_save_track+0x20/0x40 [ 28.653927] kasan_save_alloc_info+0x40/0x58 [ 28.658179] __kasan_kmalloc+0xd4/0xd8 [ 28.661913] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.666426] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 28.671459] kunit_try_run_case+0x170/0x3f0 [ 28.675627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.681097] kthread+0x328/0x630 [ 28.684307] ret_from_fork+0x10/0x20 [ 28.687866] [ 28.689344] The buggy address belongs to the object at ffff000800c2e900 [ 28.689344] which belongs to the cache kmalloc-64 of size 64 [ 28.701671] The buggy address is located 4 bytes inside of [ 28.701671] 64-byte region [ffff000800c2e900, ffff000800c2e940) [ 28.713126] [ 28.714606] The buggy address belongs to the physical page: [ 28.720162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 28.728145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.734656] page_type: f5(slab) [ 28.737793] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 28.745511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.753231] page dumped because: kasan: bad access detected [ 28.758785] [ 28.760260] Memory state around the buggy address: [ 28.765042] ffff000800c2e800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.772244] ffff000800c2e880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.779448] >ffff000800c2e900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 28.786649] ^ [ 28.789865] ffff000800c2e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.797071] ffff000800c2ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.804273] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 28.242649] ================================================================== [ 28.252201] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 28.259489] Write of size 16 at addr ffff000801e28369 by task kunit_try_catch/225 [ 28.266954] [ 28.268440] CPU: 7 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.268498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.268515] Hardware name: WinLink E850-96 board (DT) [ 28.268535] Call trace: [ 28.268550] show_stack+0x20/0x38 (C) [ 28.268584] dump_stack_lvl+0x8c/0xd0 [ 28.268623] print_report+0x118/0x608 [ 28.268658] kasan_report+0xdc/0x128 [ 28.268690] kasan_check_range+0x100/0x1a8 [ 28.268729] __asan_memset+0x34/0x78 [ 28.268759] kmalloc_oob_memset_16+0x150/0x2f8 [ 28.268792] kunit_try_run_case+0x170/0x3f0 [ 28.268827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.268864] kthread+0x328/0x630 [ 28.268892] ret_from_fork+0x10/0x20 [ 28.268927] [ 28.334399] Allocated by task 225: [ 28.337788] kasan_save_stack+0x3c/0x68 [ 28.341605] kasan_save_track+0x20/0x40 [ 28.345423] kasan_save_alloc_info+0x40/0x58 [ 28.349678] __kasan_kmalloc+0xd4/0xd8 [ 28.353410] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.357923] kmalloc_oob_memset_16+0xb0/0x2f8 [ 28.362263] kunit_try_run_case+0x170/0x3f0 [ 28.366430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.371900] kthread+0x328/0x630 [ 28.375112] ret_from_fork+0x10/0x20 [ 28.378669] [ 28.380146] The buggy address belongs to the object at ffff000801e28300 [ 28.380146] which belongs to the cache kmalloc-128 of size 128 [ 28.392647] The buggy address is located 105 bytes inside of [ 28.392647] allocated 120-byte region [ffff000801e28300, ffff000801e28378) [ 28.405231] [ 28.406711] The buggy address belongs to the physical page: [ 28.412266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 28.420250] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.427889] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.434836] page_type: f5(slab) [ 28.437970] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.445689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.453417] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.461227] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.469040] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 28.476852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.484657] page dumped because: kasan: bad access detected [ 28.490213] [ 28.491688] Memory state around the buggy address: [ 28.496470] ffff000801e28200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.503671] ffff000801e28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.510876] >ffff000801e28300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.518077] ^ [ 28.525199] ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.532405] ffff000801e28400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.539607] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 27.937127] ================================================================== [ 27.946649] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 27.953855] Write of size 8 at addr ffff000801dea571 by task kunit_try_catch/223 [ 27.961228] [ 27.962714] CPU: 5 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 27.962769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.962787] Hardware name: WinLink E850-96 board (DT) [ 27.962808] Call trace: [ 27.962822] show_stack+0x20/0x38 (C) [ 27.962860] dump_stack_lvl+0x8c/0xd0 [ 27.962896] print_report+0x118/0x608 [ 27.962929] kasan_report+0xdc/0x128 [ 27.962963] kasan_check_range+0x100/0x1a8 [ 27.962999] __asan_memset+0x34/0x78 [ 27.963026] kmalloc_oob_memset_8+0x150/0x2f8 [ 27.963061] kunit_try_run_case+0x170/0x3f0 [ 27.963095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.963130] kthread+0x328/0x630 [ 27.963159] ret_from_fork+0x10/0x20 [ 27.963194] [ 28.028587] Allocated by task 223: [ 28.031978] kasan_save_stack+0x3c/0x68 [ 28.035794] kasan_save_track+0x20/0x40 [ 28.039612] kasan_save_alloc_info+0x40/0x58 [ 28.043865] __kasan_kmalloc+0xd4/0xd8 [ 28.047598] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.052112] kmalloc_oob_memset_8+0xb0/0x2f8 [ 28.056365] kunit_try_run_case+0x170/0x3f0 [ 28.060533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.066000] kthread+0x328/0x630 [ 28.069212] ret_from_fork+0x10/0x20 [ 28.072771] [ 28.074248] The buggy address belongs to the object at ffff000801dea500 [ 28.074248] which belongs to the cache kmalloc-128 of size 128 [ 28.086748] The buggy address is located 113 bytes inside of [ 28.086748] allocated 120-byte region [ffff000801dea500, ffff000801dea578) [ 28.099333] [ 28.100813] The buggy address belongs to the physical page: [ 28.106369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dea [ 28.114352] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.121991] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.128935] page_type: f5(slab) [ 28.132072] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.139791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.147519] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.155329] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.163142] head: 0bfffe0000000001 fffffdffe0077a81 00000000ffffffff 00000000ffffffff [ 28.170954] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.178759] page dumped because: kasan: bad access detected [ 28.184314] [ 28.185790] Memory state around the buggy address: [ 28.190570] ffff000801dea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.197773] ffff000801dea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.204978] >ffff000801dea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.212179] ^ [ 28.219300] ffff000801dea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.226506] ffff000801dea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.233707] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 27.631526] ================================================================== [ 27.641098] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 27.648299] Write of size 4 at addr ffff000801e28275 by task kunit_try_catch/221 [ 27.655677] [ 27.657164] CPU: 7 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 27.657222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.657238] Hardware name: WinLink E850-96 board (DT) [ 27.657261] Call trace: [ 27.657276] show_stack+0x20/0x38 (C) [ 27.657313] dump_stack_lvl+0x8c/0xd0 [ 27.657352] print_report+0x118/0x608 [ 27.657387] kasan_report+0xdc/0x128 [ 27.657421] kasan_check_range+0x100/0x1a8 [ 27.657457] __asan_memset+0x34/0x78 [ 27.657483] kmalloc_oob_memset_4+0x150/0x300 [ 27.657515] kunit_try_run_case+0x170/0x3f0 [ 27.657552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.657588] kthread+0x328/0x630 [ 27.657620] ret_from_fork+0x10/0x20 [ 27.657655] [ 27.723037] Allocated by task 221: [ 27.726427] kasan_save_stack+0x3c/0x68 [ 27.730243] kasan_save_track+0x20/0x40 [ 27.734063] kasan_save_alloc_info+0x40/0x58 [ 27.738316] __kasan_kmalloc+0xd4/0xd8 [ 27.742047] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.746560] kmalloc_oob_memset_4+0xb0/0x300 [ 27.750814] kunit_try_run_case+0x170/0x3f0 [ 27.754981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.760450] kthread+0x328/0x630 [ 27.763661] ret_from_fork+0x10/0x20 [ 27.767220] [ 27.768697] The buggy address belongs to the object at ffff000801e28200 [ 27.768697] which belongs to the cache kmalloc-128 of size 128 [ 27.781197] The buggy address is located 117 bytes inside of [ 27.781197] allocated 120-byte region [ffff000801e28200, ffff000801e28278) [ 27.793782] [ 27.795261] The buggy address belongs to the physical page: [ 27.800817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 27.808801] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.816440] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.823384] page_type: f5(slab) [ 27.826522] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.834240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.841966] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.849778] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.857591] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 27.865403] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.873208] page dumped because: kasan: bad access detected [ 27.878763] [ 27.880239] Memory state around the buggy address: [ 27.885018] ffff000801e28100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.892222] ffff000801e28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.899428] >ffff000801e28200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.906628] ^ [ 27.913749] ffff000801e28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.920954] ffff000801e28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.928158] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 27.325930] ================================================================== [ 27.335548] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 27.342749] Write of size 2 at addr ffff000801dea477 by task kunit_try_catch/219 [ 27.350126] [ 27.351611] CPU: 5 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 27.351668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.351684] Hardware name: WinLink E850-96 board (DT) [ 27.351704] Call trace: [ 27.351719] show_stack+0x20/0x38 (C) [ 27.351755] dump_stack_lvl+0x8c/0xd0 [ 27.351793] print_report+0x118/0x608 [ 27.351829] kasan_report+0xdc/0x128 [ 27.351863] kasan_check_range+0x100/0x1a8 [ 27.351899] __asan_memset+0x34/0x78 [ 27.351928] kmalloc_oob_memset_2+0x150/0x2f8 [ 27.351958] kunit_try_run_case+0x170/0x3f0 [ 27.351994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.352035] kthread+0x328/0x630 [ 27.352063] ret_from_fork+0x10/0x20 [ 27.352097] [ 27.417485] Allocated by task 219: [ 27.420875] kasan_save_stack+0x3c/0x68 [ 27.424690] kasan_save_track+0x20/0x40 [ 27.428510] kasan_save_alloc_info+0x40/0x58 [ 27.432763] __kasan_kmalloc+0xd4/0xd8 [ 27.436496] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.441010] kmalloc_oob_memset_2+0xb0/0x2f8 [ 27.445263] kunit_try_run_case+0x170/0x3f0 [ 27.449430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.454900] kthread+0x328/0x630 [ 27.458110] ret_from_fork+0x10/0x20 [ 27.461669] [ 27.463146] The buggy address belongs to the object at ffff000801dea400 [ 27.463146] which belongs to the cache kmalloc-128 of size 128 [ 27.475647] The buggy address is located 119 bytes inside of [ 27.475647] allocated 120-byte region [ffff000801dea400, ffff000801dea478) [ 27.488231] [ 27.489709] The buggy address belongs to the physical page: [ 27.495267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dea [ 27.503252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.510890] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.517833] page_type: f5(slab) [ 27.520970] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.528689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.536417] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.544227] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.552040] head: 0bfffe0000000001 fffffdffe0077a81 00000000ffffffff 00000000ffffffff [ 27.559852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.567657] page dumped because: kasan: bad access detected [ 27.573212] [ 27.574688] Memory state around the buggy address: [ 27.579470] ffff000801dea300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.586671] ffff000801dea380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.593876] >ffff000801dea400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.601077] ^ [ 27.608198] ffff000801dea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.615403] ffff000801dea500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.622607] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 27.020407] ================================================================== [ 27.029650] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 27.036937] Write of size 128 at addr ffff000801e28100 by task kunit_try_catch/217 [ 27.044488] [ 27.045973] CPU: 7 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 27.046025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.046041] Hardware name: WinLink E850-96 board (DT) [ 27.046062] Call trace: [ 27.046077] show_stack+0x20/0x38 (C) [ 27.046118] dump_stack_lvl+0x8c/0xd0 [ 27.046156] print_report+0x118/0x608 [ 27.046192] kasan_report+0xdc/0x128 [ 27.046226] kasan_check_range+0x100/0x1a8 [ 27.046264] __asan_memset+0x34/0x78 [ 27.046291] kmalloc_oob_in_memset+0x144/0x2d0 [ 27.046322] kunit_try_run_case+0x170/0x3f0 [ 27.046359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.046395] kthread+0x328/0x630 [ 27.046426] ret_from_fork+0x10/0x20 [ 27.046462] [ 27.111935] Allocated by task 217: [ 27.115323] kasan_save_stack+0x3c/0x68 [ 27.119139] kasan_save_track+0x20/0x40 [ 27.122959] kasan_save_alloc_info+0x40/0x58 [ 27.127212] __kasan_kmalloc+0xd4/0xd8 [ 27.130946] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.135458] kmalloc_oob_in_memset+0xb0/0x2d0 [ 27.139799] kunit_try_run_case+0x170/0x3f0 [ 27.143965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.149434] kthread+0x328/0x630 [ 27.152646] ret_from_fork+0x10/0x20 [ 27.156207] [ 27.157682] The buggy address belongs to the object at ffff000801e28100 [ 27.157682] which belongs to the cache kmalloc-128 of size 128 [ 27.170182] The buggy address is located 0 bytes inside of [ 27.170182] allocated 120-byte region [ffff000801e28100, ffff000801e28178) [ 27.182593] [ 27.184072] The buggy address belongs to the physical page: [ 27.189628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 27.197613] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.205251] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.212196] page_type: f5(slab) [ 27.215333] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.223051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.230781] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 27.238589] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.246402] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 27.254214] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 27.262020] page dumped because: kasan: bad access detected [ 27.267575] [ 27.269050] Memory state around the buggy address: [ 27.273832] ffff000801e28000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.281033] ffff000801e28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.288238] >ffff000801e28100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.295439] ^ [ 27.302561] ffff000801e28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.309767] ffff000801e28200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.316968] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 26.716993] ================================================================== [ 26.726179] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 26.732953] Read of size 16 at addr ffff000800c2f060 by task kunit_try_catch/215 [ 26.740326] [ 26.741813] CPU: 5 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.741873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.741891] Hardware name: WinLink E850-96 board (DT) [ 26.741911] Call trace: [ 26.741925] show_stack+0x20/0x38 (C) [ 26.741959] dump_stack_lvl+0x8c/0xd0 [ 26.741996] print_report+0x118/0x608 [ 26.742031] kasan_report+0xdc/0x128 [ 26.742064] __asan_report_load16_noabort+0x20/0x30 [ 26.742104] kmalloc_uaf_16+0x3bc/0x438 [ 26.742134] kunit_try_run_case+0x170/0x3f0 [ 26.742169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.742206] kthread+0x328/0x630 [ 26.742236] ret_from_fork+0x10/0x20 [ 26.742270] [ 26.804389] Allocated by task 215: [ 26.807776] kasan_save_stack+0x3c/0x68 [ 26.811595] kasan_save_track+0x20/0x40 [ 26.815411] kasan_save_alloc_info+0x40/0x58 [ 26.819665] __kasan_kmalloc+0xd4/0xd8 [ 26.823397] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.827911] kmalloc_uaf_16+0x140/0x438 [ 26.831731] kunit_try_run_case+0x170/0x3f0 [ 26.835897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.841366] kthread+0x328/0x630 [ 26.844578] ret_from_fork+0x10/0x20 [ 26.848137] [ 26.849614] Freed by task 215: [ 26.852652] kasan_save_stack+0x3c/0x68 [ 26.856470] kasan_save_track+0x20/0x40 [ 26.860289] kasan_save_free_info+0x4c/0x78 [ 26.864456] __kasan_slab_free+0x6c/0x98 [ 26.868362] kfree+0x214/0x3c8 [ 26.871400] kmalloc_uaf_16+0x190/0x438 [ 26.875220] kunit_try_run_case+0x170/0x3f0 [ 26.879386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.884855] kthread+0x328/0x630 [ 26.888067] ret_from_fork+0x10/0x20 [ 26.891626] [ 26.893103] The buggy address belongs to the object at ffff000800c2f060 [ 26.893103] which belongs to the cache kmalloc-16 of size 16 [ 26.905429] The buggy address is located 0 bytes inside of [ 26.905429] freed 16-byte region [ffff000800c2f060, ffff000800c2f070) [ 26.917406] [ 26.918886] The buggy address belongs to the physical page: [ 26.924441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2f [ 26.932426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.938935] page_type: f5(slab) [ 26.942071] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 26.949792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.957512] page dumped because: kasan: bad access detected [ 26.963065] [ 26.964541] Memory state around the buggy address: [ 26.969322] ffff000800c2ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.976524] ffff000800c2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.983729] >ffff000800c2f000: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 26.990930] ^ [ 26.997270] ffff000800c2f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.004475] ffff000800c2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.011679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 26.458632] ================================================================== [ 26.467680] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 26.474358] Write of size 16 at addr ffff000800d63020 by task kunit_try_catch/213 [ 26.481823] [ 26.483310] CPU: 7 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.483364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.483380] Hardware name: WinLink E850-96 board (DT) [ 26.483401] Call trace: [ 26.483416] show_stack+0x20/0x38 (C) [ 26.483455] dump_stack_lvl+0x8c/0xd0 [ 26.483491] print_report+0x118/0x608 [ 26.483527] kasan_report+0xdc/0x128 [ 26.483564] __asan_report_store16_noabort+0x20/0x30 [ 26.483598] kmalloc_oob_16+0x3a0/0x3f8 [ 26.483627] kunit_try_run_case+0x170/0x3f0 [ 26.483664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.483702] kthread+0x328/0x630 [ 26.483732] ret_from_fork+0x10/0x20 [ 26.483766] [ 26.545971] Allocated by task 213: [ 26.549358] kasan_save_stack+0x3c/0x68 [ 26.553177] kasan_save_track+0x20/0x40 [ 26.556995] kasan_save_alloc_info+0x40/0x58 [ 26.561250] __kasan_kmalloc+0xd4/0xd8 [ 26.564982] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.569495] kmalloc_oob_16+0xb4/0x3f8 [ 26.573227] kunit_try_run_case+0x170/0x3f0 [ 26.577394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.582863] kthread+0x328/0x630 [ 26.586075] ret_from_fork+0x10/0x20 [ 26.589633] [ 26.591111] The buggy address belongs to the object at ffff000800d63020 [ 26.591111] which belongs to the cache kmalloc-16 of size 16 [ 26.603438] The buggy address is located 0 bytes inside of [ 26.603438] allocated 13-byte region [ffff000800d63020, ffff000800d6302d) [ 26.615762] [ 26.617240] The buggy address belongs to the physical page: [ 26.622797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 26.630781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.637291] page_type: f5(slab) [ 26.640427] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 26.648147] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.655867] page dumped because: kasan: bad access detected [ 26.661421] [ 26.662896] Memory state around the buggy address: [ 26.667675] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.674879] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.682086] >ffff000800d63000: 00 04 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 26.689285] ^ [ 26.693803] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.701007] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.708211] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 25.780418] ================================================================== [ 25.790430] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 25.797025] Read of size 1 at addr ffff0008032a0a00 by task kunit_try_catch/211 [ 25.804316] [ 25.805802] CPU: 5 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.805856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.805870] Hardware name: WinLink E850-96 board (DT) [ 25.805891] Call trace: [ 25.805905] show_stack+0x20/0x38 (C) [ 25.805940] dump_stack_lvl+0x8c/0xd0 [ 25.805979] print_report+0x118/0x608 [ 25.806013] kasan_report+0xdc/0x128 [ 25.806046] __kasan_check_byte+0x54/0x70 [ 25.806076] krealloc_noprof+0x44/0x360 [ 25.806110] krealloc_uaf+0x180/0x520 [ 25.806138] kunit_try_run_case+0x170/0x3f0 [ 25.806175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.806213] kthread+0x328/0x630 [ 25.806241] ret_from_fork+0x10/0x20 [ 25.806274] [ 25.871155] Allocated by task 211: [ 25.874544] kasan_save_stack+0x3c/0x68 [ 25.878361] kasan_save_track+0x20/0x40 [ 25.882179] kasan_save_alloc_info+0x40/0x58 [ 25.886433] __kasan_kmalloc+0xd4/0xd8 [ 25.890165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.894679] krealloc_uaf+0xc8/0x520 [ 25.898238] kunit_try_run_case+0x170/0x3f0 [ 25.902404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.907874] kthread+0x328/0x630 [ 25.911085] ret_from_fork+0x10/0x20 [ 25.914644] [ 25.916121] Freed by task 211: [ 25.919158] kasan_save_stack+0x3c/0x68 [ 25.922977] kasan_save_track+0x20/0x40 [ 25.926798] kasan_save_free_info+0x4c/0x78 [ 25.930963] __kasan_slab_free+0x6c/0x98 [ 25.934869] kfree+0x214/0x3c8 [ 25.937907] krealloc_uaf+0x12c/0x520 [ 25.941553] kunit_try_run_case+0x170/0x3f0 [ 25.945719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.951188] kthread+0x328/0x630 [ 25.954400] ret_from_fork+0x10/0x20 [ 25.957959] [ 25.959436] The buggy address belongs to the object at ffff0008032a0a00 [ 25.959436] which belongs to the cache kmalloc-256 of size 256 [ 25.971938] The buggy address is located 0 bytes inside of [ 25.971938] freed 256-byte region [ffff0008032a0a00, ffff0008032a0b00) [ 25.984000] [ 25.985478] The buggy address belongs to the physical page: [ 25.991035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0 [ 25.999021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.006658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.013602] page_type: f5(slab) [ 26.016738] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.024458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.032186] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.039996] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.047809] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff [ 26.055621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.063426] page dumped because: kasan: bad access detected [ 26.068982] [ 26.070457] Memory state around the buggy address: [ 26.075240] ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.082440] ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.089645] >ffff0008032a0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.096846] ^ [ 26.100061] ffff0008032a0a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.107266] ffff0008032a0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.114470] ================================================================== [ 26.121781] ================================================================== [ 26.128884] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 26.135476] Read of size 1 at addr ffff0008032a0a00 by task kunit_try_catch/211 [ 26.142765] [ 26.144250] CPU: 5 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.144300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.144315] Hardware name: WinLink E850-96 board (DT) [ 26.144336] Call trace: [ 26.144351] show_stack+0x20/0x38 (C) [ 26.144381] dump_stack_lvl+0x8c/0xd0 [ 26.144417] print_report+0x118/0x608 [ 26.144449] kasan_report+0xdc/0x128 [ 26.144482] __asan_report_load1_noabort+0x20/0x30 [ 26.144518] krealloc_uaf+0x4c8/0x520 [ 26.144546] kunit_try_run_case+0x170/0x3f0 [ 26.144581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.144618] kthread+0x328/0x630 [ 26.144646] ret_from_fork+0x10/0x20 [ 26.144679] [ 26.206568] Allocated by task 211: [ 26.209952] kasan_save_stack+0x3c/0x68 [ 26.213773] kasan_save_track+0x20/0x40 [ 26.217591] kasan_save_alloc_info+0x40/0x58 [ 26.221844] __kasan_kmalloc+0xd4/0xd8 [ 26.225577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.230090] krealloc_uaf+0xc8/0x520 [ 26.233649] kunit_try_run_case+0x170/0x3f0 [ 26.237816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.243285] kthread+0x328/0x630 [ 26.246496] ret_from_fork+0x10/0x20 [ 26.250055] [ 26.251531] Freed by task 211: [ 26.254569] kasan_save_stack+0x3c/0x68 [ 26.258389] kasan_save_track+0x20/0x40 [ 26.262208] kasan_save_free_info+0x4c/0x78 [ 26.266374] __kasan_slab_free+0x6c/0x98 [ 26.270281] kfree+0x214/0x3c8 [ 26.273319] krealloc_uaf+0x12c/0x520 [ 26.276965] kunit_try_run_case+0x170/0x3f0 [ 26.281131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.286600] kthread+0x328/0x630 [ 26.289812] ret_from_fork+0x10/0x20 [ 26.293371] [ 26.294848] The buggy address belongs to the object at ffff0008032a0a00 [ 26.294848] which belongs to the cache kmalloc-256 of size 256 [ 26.307346] The buggy address is located 0 bytes inside of [ 26.307346] freed 256-byte region [ffff0008032a0a00, ffff0008032a0b00) [ 26.319412] [ 26.320891] The buggy address belongs to the physical page: [ 26.326446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0 [ 26.334431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.342068] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.349012] page_type: f5(slab) [ 26.352147] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.359870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.367596] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.375408] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.383221] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff [ 26.391032] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.398838] page dumped because: kasan: bad access detected [ 26.404393] [ 26.405869] Memory state around the buggy address: [ 26.410650] ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.417851] ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.425056] >ffff0008032a0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.432258] ^ [ 26.435473] ffff0008032a0a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.442678] ffff0008032a0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.449879] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 22.926445] ================================================================== [ 22.933271] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 22.940817] Write of size 1 at addr ffff0008032a08d0 by task kunit_try_catch/205 [ 22.948195] [ 22.949681] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.949733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.949750] Hardware name: WinLink E850-96 board (DT) [ 22.949770] Call trace: [ 22.949786] show_stack+0x20/0x38 (C) [ 22.949820] dump_stack_lvl+0x8c/0xd0 [ 22.949858] print_report+0x118/0x608 [ 22.949892] kasan_report+0xdc/0x128 [ 22.949928] __asan_report_store1_noabort+0x20/0x30 [ 22.949960] krealloc_less_oob_helper+0xb9c/0xc50 [ 22.949991] krealloc_less_oob+0x20/0x38 [ 22.950020] kunit_try_run_case+0x170/0x3f0 [ 22.950055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.950092] kthread+0x328/0x630 [ 22.950121] ret_from_fork+0x10/0x20 [ 22.950156] [ 23.017033] Allocated by task 205: [ 23.020418] kasan_save_stack+0x3c/0x68 [ 23.024235] kasan_save_track+0x20/0x40 [ 23.028055] kasan_save_alloc_info+0x40/0x58 [ 23.032309] __kasan_krealloc+0x118/0x178 [ 23.036302] krealloc_noprof+0x128/0x360 [ 23.040207] krealloc_less_oob_helper+0x168/0xc50 [ 23.044895] krealloc_less_oob+0x20/0x38 [ 23.048801] kunit_try_run_case+0x170/0x3f0 [ 23.052969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.058438] kthread+0x328/0x630 [ 23.061649] ret_from_fork+0x10/0x20 [ 23.065207] [ 23.066684] The buggy address belongs to the object at ffff0008032a0800 [ 23.066684] which belongs to the cache kmalloc-256 of size 256 [ 23.079185] The buggy address is located 7 bytes to the right of [ 23.079185] allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9) [ 23.092117] [ 23.093596] The buggy address belongs to the physical page: [ 23.099152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0 [ 23.107137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.114774] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.121720] page_type: f5(slab) [ 23.124854] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.132574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.140301] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.148112] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.155925] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff [ 23.163737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.171543] page dumped because: kasan: bad access detected [ 23.177098] [ 23.178573] Memory state around the buggy address: [ 23.183353] ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.190556] ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.197761] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.204962] ^ [ 23.210782] ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.217987] ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.225187] ================================================================== [ 25.085531] ================================================================== [ 25.092612] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 25.100161] Write of size 1 at addr ffff0008032a60da by task kunit_try_catch/209 [ 25.107537] [ 25.109021] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.109074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.109089] Hardware name: WinLink E850-96 board (DT) [ 25.109109] Call trace: [ 25.109123] show_stack+0x20/0x38 (C) [ 25.109157] dump_stack_lvl+0x8c/0xd0 [ 25.109194] print_report+0x118/0x608 [ 25.109228] kasan_report+0xdc/0x128 [ 25.109261] __asan_report_store1_noabort+0x20/0x30 [ 25.109295] krealloc_less_oob_helper+0xa80/0xc50 [ 25.109327] krealloc_large_less_oob+0x20/0x38 [ 25.109359] kunit_try_run_case+0x170/0x3f0 [ 25.109396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.109433] kthread+0x328/0x630 [ 25.109463] ret_from_fork+0x10/0x20 [ 25.109497] [ 25.176896] The buggy address belongs to the physical page: [ 25.182454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4 [ 25.190439] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.198077] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.205019] page_type: f8(unknown) [ 25.208418] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.216137] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.223864] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.231674] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.239488] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff [ 25.247300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.255105] page dumped because: kasan: bad access detected [ 25.260661] [ 25.262136] Memory state around the buggy address: [ 25.266917] ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.274119] ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.281324] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.288525] ^ [ 25.294606] ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.301810] ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.309010] ================================================================== [ 23.846457] ================================================================== [ 23.853485] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.861029] Write of size 1 at addr ffff0008032a08eb by task kunit_try_catch/205 [ 23.868408] [ 23.869892] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.869945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.869961] Hardware name: WinLink E850-96 board (DT) [ 23.869983] Call trace: [ 23.869996] show_stack+0x20/0x38 (C) [ 23.870028] dump_stack_lvl+0x8c/0xd0 [ 23.870063] print_report+0x118/0x608 [ 23.870097] kasan_report+0xdc/0x128 [ 23.870129] __asan_report_store1_noabort+0x20/0x30 [ 23.870161] krealloc_less_oob_helper+0xa58/0xc50 [ 23.870194] krealloc_less_oob+0x20/0x38 [ 23.870224] kunit_try_run_case+0x170/0x3f0 [ 23.870259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.870295] kthread+0x328/0x630 [ 23.870324] ret_from_fork+0x10/0x20 [ 23.870359] [ 23.937243] Allocated by task 205: [ 23.940631] kasan_save_stack+0x3c/0x68 [ 23.944448] kasan_save_track+0x20/0x40 [ 23.948268] kasan_save_alloc_info+0x40/0x58 [ 23.952522] __kasan_krealloc+0x118/0x178 [ 23.956514] krealloc_noprof+0x128/0x360 [ 23.960419] krealloc_less_oob_helper+0x168/0xc50 [ 23.965107] krealloc_less_oob+0x20/0x38 [ 23.969013] kunit_try_run_case+0x170/0x3f0 [ 23.973181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.978649] kthread+0x328/0x630 [ 23.981860] ret_from_fork+0x10/0x20 [ 23.985419] [ 23.986896] The buggy address belongs to the object at ffff0008032a0800 [ 23.986896] which belongs to the cache kmalloc-256 of size 256 [ 23.999396] The buggy address is located 34 bytes to the right of [ 23.999396] allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9) [ 24.012415] [ 24.013893] The buggy address belongs to the physical page: [ 24.019451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0 [ 24.027434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.035074] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.042017] page_type: f5(slab) [ 24.045154] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.052874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.060599] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.068411] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.076224] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff [ 24.084036] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.091841] page dumped because: kasan: bad access detected [ 24.097397] [ 24.098872] Memory state around the buggy address: [ 24.103654] ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.110855] ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.118060] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 24.125261] ^ [ 24.131862] ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.139066] ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.146269] ================================================================== [ 25.316294] ================================================================== [ 25.323425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 25.330972] Write of size 1 at addr ffff0008032a60ea by task kunit_try_catch/209 [ 25.338350] [ 25.339834] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.339882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.339895] Hardware name: WinLink E850-96 board (DT) [ 25.339915] Call trace: [ 25.339926] show_stack+0x20/0x38 (C) [ 25.339958] dump_stack_lvl+0x8c/0xd0 [ 25.339992] print_report+0x118/0x608 [ 25.340024] kasan_report+0xdc/0x128 [ 25.340059] __asan_report_store1_noabort+0x20/0x30 [ 25.340089] krealloc_less_oob_helper+0xae4/0xc50 [ 25.340122] krealloc_large_less_oob+0x20/0x38 [ 25.340155] kunit_try_run_case+0x170/0x3f0 [ 25.340191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.340229] kthread+0x328/0x630 [ 25.340258] ret_from_fork+0x10/0x20 [ 25.340292] [ 25.407707] The buggy address belongs to the physical page: [ 25.413264] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4 [ 25.421250] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.428889] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.435832] page_type: f8(unknown) [ 25.439226] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.446949] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.454675] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.462487] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.470300] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff [ 25.478112] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.485917] page dumped because: kasan: bad access detected [ 25.491473] [ 25.492949] Memory state around the buggy address: [ 25.497729] ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.504931] ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.512136] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.519337] ^ [ 25.525938] ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.533143] ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.540344] ================================================================== [ 25.547658] ================================================================== [ 25.554759] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 25.562307] Write of size 1 at addr ffff0008032a60eb by task kunit_try_catch/209 [ 25.569684] [ 25.571169] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.571219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.571235] Hardware name: WinLink E850-96 board (DT) [ 25.571255] Call trace: [ 25.571268] show_stack+0x20/0x38 (C) [ 25.571301] dump_stack_lvl+0x8c/0xd0 [ 25.571335] print_report+0x118/0x608 [ 25.571371] kasan_report+0xdc/0x128 [ 25.571404] __asan_report_store1_noabort+0x20/0x30 [ 25.571435] krealloc_less_oob_helper+0xa58/0xc50 [ 25.571464] krealloc_large_less_oob+0x20/0x38 [ 25.571493] kunit_try_run_case+0x170/0x3f0 [ 25.571525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.571559] kthread+0x328/0x630 [ 25.571587] ret_from_fork+0x10/0x20 [ 25.571620] [ 25.639042] The buggy address belongs to the physical page: [ 25.644598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4 [ 25.652584] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.660221] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.667165] page_type: f8(unknown) [ 25.670562] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.678283] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.686009] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.693820] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.701634] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff [ 25.709445] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.717251] page dumped because: kasan: bad access detected [ 25.722807] [ 25.724282] Memory state around the buggy address: [ 25.729061] ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.736265] ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.743470] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.750670] ^ [ 25.757271] ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.764476] ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.771677] ================================================================== [ 22.617770] ================================================================== [ 22.627200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 22.634748] Write of size 1 at addr ffff0008032a08c9 by task kunit_try_catch/205 [ 22.642125] [ 22.643611] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.643662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.643678] Hardware name: WinLink E850-96 board (DT) [ 22.643699] Call trace: [ 22.643713] show_stack+0x20/0x38 (C) [ 22.643750] dump_stack_lvl+0x8c/0xd0 [ 22.643786] print_report+0x118/0x608 [ 22.643824] kasan_report+0xdc/0x128 [ 22.643857] __asan_report_store1_noabort+0x20/0x30 [ 22.643889] krealloc_less_oob_helper+0xa48/0xc50 [ 22.643922] krealloc_less_oob+0x20/0x38 [ 22.643950] kunit_try_run_case+0x170/0x3f0 [ 22.643988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.644026] kthread+0x328/0x630 [ 22.644058] ret_from_fork+0x10/0x20 [ 22.644096] [ 22.710960] Allocated by task 205: [ 22.714347] kasan_save_stack+0x3c/0x68 [ 22.718164] kasan_save_track+0x20/0x40 [ 22.721985] kasan_save_alloc_info+0x40/0x58 [ 22.726237] __kasan_krealloc+0x118/0x178 [ 22.730230] krealloc_noprof+0x128/0x360 [ 22.734136] krealloc_less_oob_helper+0x168/0xc50 [ 22.738824] krealloc_less_oob+0x20/0x38 [ 22.742730] kunit_try_run_case+0x170/0x3f0 [ 22.746896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.752365] kthread+0x328/0x630 [ 22.755578] ret_from_fork+0x10/0x20 [ 22.759135] [ 22.760614] The buggy address belongs to the object at ffff0008032a0800 [ 22.760614] which belongs to the cache kmalloc-256 of size 256 [ 22.773113] The buggy address is located 0 bytes to the right of [ 22.773113] allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9) [ 22.786046] [ 22.787523] The buggy address belongs to the physical page: [ 22.793081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0 [ 22.801065] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.808702] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.815648] page_type: f5(slab) [ 22.818784] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.826503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.834232] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.842042] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.849853] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff [ 22.857665] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.865471] page dumped because: kasan: bad access detected [ 22.871026] [ 22.872502] Memory state around the buggy address: [ 22.877285] ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.884485] ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.891689] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.898890] ^ [ 22.904449] ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.911654] ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.918858] ================================================================== [ 24.855166] ================================================================== [ 24.862060] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 24.869608] Write of size 1 at addr ffff0008032a60d0 by task kunit_try_catch/209 [ 24.876986] [ 24.878470] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.878526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.878543] Hardware name: WinLink E850-96 board (DT) [ 24.878565] Call trace: [ 24.878578] show_stack+0x20/0x38 (C) [ 24.878612] dump_stack_lvl+0x8c/0xd0 [ 24.878649] print_report+0x118/0x608 [ 24.878682] kasan_report+0xdc/0x128 [ 24.878715] __asan_report_store1_noabort+0x20/0x30 [ 24.878750] krealloc_less_oob_helper+0xb9c/0xc50 [ 24.878783] krealloc_large_less_oob+0x20/0x38 [ 24.878813] kunit_try_run_case+0x170/0x3f0 [ 24.878848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.878888] kthread+0x328/0x630 [ 24.878918] ret_from_fork+0x10/0x20 [ 24.878952] [ 24.946344] The buggy address belongs to the physical page: [ 24.951900] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4 [ 24.959887] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.967524] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.974467] page_type: f8(unknown) [ 24.977865] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.985585] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.993311] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.001122] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 25.008936] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff [ 25.016747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.024553] page dumped because: kasan: bad access detected [ 25.030108] [ 25.031584] Memory state around the buggy address: [ 25.036365] ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.043567] ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.050772] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 25.057972] ^ [ 25.063792] ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.070997] ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.078198] ================================================================== [ 23.232510] ================================================================== [ 23.239599] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.247149] Write of size 1 at addr ffff0008032a08da by task kunit_try_catch/205 [ 23.254529] [ 23.256013] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.256067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.256083] Hardware name: WinLink E850-96 board (DT) [ 23.256102] Call trace: [ 23.256115] show_stack+0x20/0x38 (C) [ 23.256150] dump_stack_lvl+0x8c/0xd0 [ 23.256185] print_report+0x118/0x608 [ 23.256219] kasan_report+0xdc/0x128 [ 23.256251] __asan_report_store1_noabort+0x20/0x30 [ 23.256283] krealloc_less_oob_helper+0xa80/0xc50 [ 23.256315] krealloc_less_oob+0x20/0x38 [ 23.256344] kunit_try_run_case+0x170/0x3f0 [ 23.256380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.256419] kthread+0x328/0x630 [ 23.256448] ret_from_fork+0x10/0x20 [ 23.256480] [ 23.323363] Allocated by task 205: [ 23.326750] kasan_save_stack+0x3c/0x68 [ 23.330569] kasan_save_track+0x20/0x40 [ 23.334387] kasan_save_alloc_info+0x40/0x58 [ 23.338641] __kasan_krealloc+0x118/0x178 [ 23.342634] krealloc_noprof+0x128/0x360 [ 23.346540] krealloc_less_oob_helper+0x168/0xc50 [ 23.351227] krealloc_less_oob+0x20/0x38 [ 23.355133] kunit_try_run_case+0x170/0x3f0 [ 23.359302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.364769] kthread+0x328/0x630 [ 23.367981] ret_from_fork+0x10/0x20 [ 23.371539] [ 23.373017] The buggy address belongs to the object at ffff0008032a0800 [ 23.373017] which belongs to the cache kmalloc-256 of size 256 [ 23.385517] The buggy address is located 17 bytes to the right of [ 23.385517] allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9) [ 23.398535] [ 23.400013] The buggy address belongs to the physical page: [ 23.405573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0 [ 23.413556] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.421193] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.428137] page_type: f5(slab) [ 23.431272] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.438995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.446720] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.454531] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.462344] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff [ 23.470156] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.477962] page dumped because: kasan: bad access detected [ 23.483517] [ 23.484992] Memory state around the buggy address: [ 23.489772] ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.496976] ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.504180] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.511381] ^ [ 23.517461] ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.524666] ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.531867] ================================================================== [ 23.539190] ================================================================== [ 23.546280] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.553829] Write of size 1 at addr ffff0008032a08ea by task kunit_try_catch/205 [ 23.561207] [ 23.562691] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.562742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.562756] Hardware name: WinLink E850-96 board (DT) [ 23.562774] Call trace: [ 23.562787] show_stack+0x20/0x38 (C) [ 23.562821] dump_stack_lvl+0x8c/0xd0 [ 23.562856] print_report+0x118/0x608 [ 23.562891] kasan_report+0xdc/0x128 [ 23.562923] __asan_report_store1_noabort+0x20/0x30 [ 23.562952] krealloc_less_oob_helper+0xae4/0xc50 [ 23.562984] krealloc_less_oob+0x20/0x38 [ 23.563013] kunit_try_run_case+0x170/0x3f0 [ 23.563046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.563081] kthread+0x328/0x630 [ 23.563109] ret_from_fork+0x10/0x20 [ 23.563142] [ 23.630043] Allocated by task 205: [ 23.633428] kasan_save_stack+0x3c/0x68 [ 23.637249] kasan_save_track+0x20/0x40 [ 23.641068] kasan_save_alloc_info+0x40/0x58 [ 23.645320] __kasan_krealloc+0x118/0x178 [ 23.649313] krealloc_noprof+0x128/0x360 [ 23.653219] krealloc_less_oob_helper+0x168/0xc50 [ 23.657907] krealloc_less_oob+0x20/0x38 [ 23.661815] kunit_try_run_case+0x170/0x3f0 [ 23.665981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.671448] kthread+0x328/0x630 [ 23.674660] ret_from_fork+0x10/0x20 [ 23.678219] [ 23.679696] The buggy address belongs to the object at ffff0008032a0800 [ 23.679696] which belongs to the cache kmalloc-256 of size 256 [ 23.692195] The buggy address is located 33 bytes to the right of [ 23.692195] allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9) [ 23.705215] [ 23.706693] The buggy address belongs to the physical page: [ 23.712248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0 [ 23.720234] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.727874] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.734817] page_type: f5(slab) [ 23.737951] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.745673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.753399] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.761211] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.769024] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff [ 23.776835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.784641] page dumped because: kasan: bad access detected [ 23.790196] [ 23.791672] Memory state around the buggy address: [ 23.796451] ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.803655] ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.810860] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.818061] ^ [ 23.824661] ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.831866] ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.839067] ================================================================== [ 24.621849] ================================================================== [ 24.631768] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 24.639317] Write of size 1 at addr ffff0008032a60c9 by task kunit_try_catch/209 [ 24.646696] [ 24.648179] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.648234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.648250] Hardware name: WinLink E850-96 board (DT) [ 24.648269] Call trace: [ 24.648283] show_stack+0x20/0x38 (C) [ 24.648320] dump_stack_lvl+0x8c/0xd0 [ 24.648356] print_report+0x118/0x608 [ 24.648393] kasan_report+0xdc/0x128 [ 24.648428] __asan_report_store1_noabort+0x20/0x30 [ 24.648459] krealloc_less_oob_helper+0xa48/0xc50 [ 24.648495] krealloc_large_less_oob+0x20/0x38 [ 24.648527] kunit_try_run_case+0x170/0x3f0 [ 24.648563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.648600] kthread+0x328/0x630 [ 24.648631] ret_from_fork+0x10/0x20 [ 24.648665] [ 24.716054] The buggy address belongs to the physical page: [ 24.721609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4 [ 24.729595] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.737234] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.744176] page_type: f8(unknown) [ 24.747572] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.755294] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.763019] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.770831] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.778644] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff [ 24.786456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.794261] page dumped because: kasan: bad access detected [ 24.799817] [ 24.801292] Memory state around the buggy address: [ 24.806077] ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.813275] ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.820480] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 24.827680] ^ [ 24.833240] ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.840445] ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.847647] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 24.388718] ================================================================== [ 24.395834] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 24.403382] Write of size 1 at addr ffff0008033820f0 by task kunit_try_catch/207 [ 24.410760] [ 24.412245] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.412301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.412316] Hardware name: WinLink E850-96 board (DT) [ 24.412337] Call trace: [ 24.412352] show_stack+0x20/0x38 (C) [ 24.412389] dump_stack_lvl+0x8c/0xd0 [ 24.412423] print_report+0x118/0x608 [ 24.412457] kasan_report+0xdc/0x128 [ 24.412492] __asan_report_store1_noabort+0x20/0x30 [ 24.412524] krealloc_more_oob_helper+0x5c0/0x678 [ 24.412556] krealloc_large_more_oob+0x20/0x38 [ 24.412588] kunit_try_run_case+0x170/0x3f0 [ 24.412624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.412658] kthread+0x328/0x630 [ 24.412686] ret_from_fork+0x10/0x20 [ 24.412720] [ 24.480118] The buggy address belongs to the physical page: [ 24.485676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883380 [ 24.493658] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.501299] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.508242] page_type: f8(unknown) [ 24.511636] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.519359] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.527085] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.534897] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.542710] head: 0bfffe0000000002 fffffdffe00ce001 00000000ffffffff 00000000ffffffff [ 24.550522] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.558327] page dumped because: kasan: bad access detected [ 24.563883] [ 24.565358] Memory state around the buggy address: [ 24.570139] ffff000803381f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.577341] ffff000803382000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.584546] >ffff000803382080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.591747] ^ [ 24.598608] ffff000803382100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.605813] ffff000803382180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.613014] ================================================================== [ 21.999689] ================================================================== [ 22.008891] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 22.016440] Write of size 1 at addr ffff0008033508eb by task kunit_try_catch/203 [ 22.023818] [ 22.025304] CPU: 7 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.025362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.025381] Hardware name: WinLink E850-96 board (DT) [ 22.025400] Call trace: [ 22.025415] show_stack+0x20/0x38 (C) [ 22.025452] dump_stack_lvl+0x8c/0xd0 [ 22.025487] print_report+0x118/0x608 [ 22.025525] kasan_report+0xdc/0x128 [ 22.025560] __asan_report_store1_noabort+0x20/0x30 [ 22.025594] krealloc_more_oob_helper+0x60c/0x678 [ 22.025628] krealloc_more_oob+0x20/0x38 [ 22.025657] kunit_try_run_case+0x170/0x3f0 [ 22.025695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.025733] kthread+0x328/0x630 [ 22.025761] ret_from_fork+0x10/0x20 [ 22.025798] [ 22.092654] Allocated by task 203: [ 22.096041] kasan_save_stack+0x3c/0x68 [ 22.099857] kasan_save_track+0x20/0x40 [ 22.103677] kasan_save_alloc_info+0x40/0x58 [ 22.107930] __kasan_krealloc+0x118/0x178 [ 22.111923] krealloc_noprof+0x128/0x360 [ 22.115829] krealloc_more_oob_helper+0x168/0x678 [ 22.120517] krealloc_more_oob+0x20/0x38 [ 22.124423] kunit_try_run_case+0x170/0x3f0 [ 22.128591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.134058] kthread+0x328/0x630 [ 22.137270] ret_from_fork+0x10/0x20 [ 22.140829] [ 22.142306] The buggy address belongs to the object at ffff000803350800 [ 22.142306] which belongs to the cache kmalloc-256 of size 256 [ 22.154807] The buggy address is located 0 bytes to the right of [ 22.154807] allocated 235-byte region [ffff000803350800, ffff0008033508eb) [ 22.167738] [ 22.169218] The buggy address belongs to the physical page: [ 22.174774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883350 [ 22.182757] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.190396] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.197341] page_type: f5(slab) [ 22.200477] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.208196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.215924] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.223734] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.231546] head: 0bfffe0000000002 fffffdffe00cd401 00000000ffffffff 00000000ffffffff [ 22.239359] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.247165] page dumped because: kasan: bad access detected [ 22.252721] [ 22.254195] Memory state around the buggy address: [ 22.258976] ffff000803350780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.266180] ffff000803350800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.273382] >ffff000803350880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.280584] ^ [ 22.287184] ffff000803350900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.294389] ffff000803350980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.301593] ================================================================== [ 24.155102] ================================================================== [ 24.164500] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 24.172050] Write of size 1 at addr ffff0008033820eb by task kunit_try_catch/207 [ 24.179427] [ 24.180911] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.180972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.180989] Hardware name: WinLink E850-96 board (DT) [ 24.181007] Call trace: [ 24.181021] show_stack+0x20/0x38 (C) [ 24.181055] dump_stack_lvl+0x8c/0xd0 [ 24.181091] print_report+0x118/0x608 [ 24.181128] kasan_report+0xdc/0x128 [ 24.181160] __asan_report_store1_noabort+0x20/0x30 [ 24.181194] krealloc_more_oob_helper+0x60c/0x678 [ 24.181232] krealloc_large_more_oob+0x20/0x38 [ 24.181264] kunit_try_run_case+0x170/0x3f0 [ 24.181299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.181336] kthread+0x328/0x630 [ 24.181366] ret_from_fork+0x10/0x20 [ 24.181401] [ 24.248787] The buggy address belongs to the physical page: [ 24.254342] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883380 [ 24.262328] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.269965] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.276909] page_type: f8(unknown) [ 24.280304] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.288026] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.295753] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.303564] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.311377] head: 0bfffe0000000002 fffffdffe00ce001 00000000ffffffff 00000000ffffffff [ 24.319189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.326994] page dumped because: kasan: bad access detected [ 24.332549] [ 24.334025] Memory state around the buggy address: [ 24.338809] ffff000803381f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.346008] ffff000803382000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.353213] >ffff000803382080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 24.360414] ^ [ 24.367014] ffff000803382100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.374219] ffff000803382180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.381422] ================================================================== [ 22.308913] ================================================================== [ 22.316004] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 22.323552] Write of size 1 at addr ffff0008033508f0 by task kunit_try_catch/203 [ 22.330930] [ 22.332415] CPU: 7 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.332470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.332484] Hardware name: WinLink E850-96 board (DT) [ 22.332504] Call trace: [ 22.332518] show_stack+0x20/0x38 (C) [ 22.332552] dump_stack_lvl+0x8c/0xd0 [ 22.332587] print_report+0x118/0x608 [ 22.332623] kasan_report+0xdc/0x128 [ 22.332655] __asan_report_store1_noabort+0x20/0x30 [ 22.332689] krealloc_more_oob_helper+0x5c0/0x678 [ 22.332720] krealloc_more_oob+0x20/0x38 [ 22.332752] kunit_try_run_case+0x170/0x3f0 [ 22.332786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.332822] kthread+0x328/0x630 [ 22.332850] ret_from_fork+0x10/0x20 [ 22.332884] [ 22.399766] Allocated by task 203: [ 22.403153] kasan_save_stack+0x3c/0x68 [ 22.406971] kasan_save_track+0x20/0x40 [ 22.410790] kasan_save_alloc_info+0x40/0x58 [ 22.415043] __kasan_krealloc+0x118/0x178 [ 22.419036] krealloc_noprof+0x128/0x360 [ 22.422943] krealloc_more_oob_helper+0x168/0x678 [ 22.427630] krealloc_more_oob+0x20/0x38 [ 22.431536] kunit_try_run_case+0x170/0x3f0 [ 22.435704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.441172] kthread+0x328/0x630 [ 22.444383] ret_from_fork+0x10/0x20 [ 22.447942] [ 22.449419] The buggy address belongs to the object at ffff000803350800 [ 22.449419] which belongs to the cache kmalloc-256 of size 256 [ 22.461918] The buggy address is located 5 bytes to the right of [ 22.461918] allocated 235-byte region [ffff000803350800, ffff0008033508eb) [ 22.474852] [ 22.476329] The buggy address belongs to the physical page: [ 22.481888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883350 [ 22.489870] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.497509] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.504452] page_type: f5(slab) [ 22.507588] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.515309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.523036] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 22.530847] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.538660] head: 0bfffe0000000002 fffffdffe00cd401 00000000ffffffff 00000000ffffffff [ 22.546472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.554278] page dumped because: kasan: bad access detected [ 22.559833] [ 22.561308] Memory state around the buggy address: [ 22.566087] ffff000803350780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.573294] ffff000803350800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.580496] >ffff000803350880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 22.587697] ^ [ 22.594558] ffff000803350900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.601763] ffff000803350980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.608965] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 21.809320] ================================================================== [ 21.823564] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 21.829897] Read of size 1 at addr ffff000806080000 by task kunit_try_catch/201 [ 21.837188] [ 21.838674] CPU: 5 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 21.838731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.838748] Hardware name: WinLink E850-96 board (DT) [ 21.838769] Call trace: [ 21.838783] show_stack+0x20/0x38 (C) [ 21.838820] dump_stack_lvl+0x8c/0xd0 [ 21.838857] print_report+0x118/0x608 [ 21.838894] kasan_report+0xdc/0x128 [ 21.838927] __asan_report_load1_noabort+0x20/0x30 [ 21.838969] page_alloc_uaf+0x328/0x350 [ 21.838999] kunit_try_run_case+0x170/0x3f0 [ 21.839035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.839072] kthread+0x328/0x630 [ 21.839104] ret_from_fork+0x10/0x20 [ 21.839141] [ 21.901165] The buggy address belongs to the physical page: [ 21.906723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886080 [ 21.914706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.921216] page_type: f0(buddy) [ 21.924439] raw: 0bfffe0000000000 ffff00087f61bd98 ffff00087f61bd98 0000000000000000 [ 21.932158] raw: 0000000000000000 0000000000000007 00000000f0000000 0000000000000000 [ 21.939879] page dumped because: kasan: bad access detected [ 21.945432] [ 21.946908] Memory state around the buggy address: [ 21.951689] ffff00080607ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.958891] ffff00080607ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.966096] >ffff000806080000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.973297] ^ [ 21.976512] ffff000806080080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.983717] ffff000806080100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.990921] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 21.574028] ================================================================== [ 21.583291] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 21.588669] Free of addr ffff0008032a4001 by task kunit_try_catch/197 [ 21.595091] [ 21.596578] CPU: 5 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 21.596638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.596656] Hardware name: WinLink E850-96 board (DT) [ 21.596675] Call trace: [ 21.596688] show_stack+0x20/0x38 (C) [ 21.596724] dump_stack_lvl+0x8c/0xd0 [ 21.596760] print_report+0x118/0x608 [ 21.596795] kasan_report_invalid_free+0xc0/0xe8 [ 21.596831] __kasan_kfree_large+0x5c/0xa8 [ 21.596866] free_large_kmalloc+0x64/0x190 [ 21.596899] kfree+0x270/0x3c8 [ 21.596927] kmalloc_large_invalid_free+0x108/0x270 [ 21.596959] kunit_try_run_case+0x170/0x3f0 [ 21.596995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.597033] kthread+0x328/0x630 [ 21.597062] ret_from_fork+0x10/0x20 [ 21.597095] [ 21.667575] The buggy address belongs to the physical page: [ 21.673132] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4 [ 21.681116] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.688755] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.695696] page_type: f8(unknown) [ 21.699097] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.706814] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.714543] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.722352] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.730165] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff [ 21.737977] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.745783] page dumped because: kasan: bad access detected [ 21.751338] [ 21.752813] Memory state around the buggy address: [ 21.757597] ffff0008032a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.764797] ffff0008032a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.772003] >ffff0008032a4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.779202] ^ [ 21.782418] ffff0008032a4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.789623] ffff0008032a4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.796825] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 21.390510] ================================================================== [ 21.400478] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 21.407074] Read of size 1 at addr ffff00080337c000 by task kunit_try_catch/195 [ 21.414364] [ 21.415852] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 21.415907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.415928] Hardware name: WinLink E850-96 board (DT) [ 21.415947] Call trace: [ 21.415962] show_stack+0x20/0x38 (C) [ 21.415998] dump_stack_lvl+0x8c/0xd0 [ 21.416035] print_report+0x118/0x608 [ 21.416074] kasan_report+0xdc/0x128 [ 21.416108] __asan_report_load1_noabort+0x20/0x30 [ 21.416146] kmalloc_large_uaf+0x2cc/0x2f8 [ 21.416179] kunit_try_run_case+0x170/0x3f0 [ 21.416216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.416255] kthread+0x328/0x630 [ 21.416286] ret_from_fork+0x10/0x20 [ 21.416321] [ 21.478601] The buggy address belongs to the physical page: [ 21.484158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88337c [ 21.492142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.498666] raw: 0bfffe0000000000 fffffdffe00ce008 ffff00085b006f40 0000000000000000 [ 21.506383] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 21.514105] page dumped because: kasan: bad access detected [ 21.519658] [ 21.521133] Memory state around the buggy address: [ 21.525914] ffff00080337bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.533118] ffff00080337bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.540321] >ffff00080337c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.547522] ^ [ 21.550738] ffff00080337c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.557942] ffff00080337c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.565145] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 21.163014] ================================================================== [ 21.172618] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 21.180080] Write of size 1 at addr ffff0008032a600a by task kunit_try_catch/193 [ 21.187458] [ 21.188945] CPU: 5 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 21.189005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.189022] Hardware name: WinLink E850-96 board (DT) [ 21.189044] Call trace: [ 21.189060] show_stack+0x20/0x38 (C) [ 21.189096] dump_stack_lvl+0x8c/0xd0 [ 21.189134] print_report+0x118/0x608 [ 21.189170] kasan_report+0xdc/0x128 [ 21.189206] __asan_report_store1_noabort+0x20/0x30 [ 21.189237] kmalloc_large_oob_right+0x278/0x2b8 [ 21.189270] kunit_try_run_case+0x170/0x3f0 [ 21.189307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.189345] kthread+0x328/0x630 [ 21.189375] ret_from_fork+0x10/0x20 [ 21.189413] [ 21.252304] The buggy address belongs to the physical page: [ 21.257861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4 [ 21.265844] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.273484] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.280425] page_type: f8(unknown) [ 21.283823] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.291543] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.299272] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.307080] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.314894] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff [ 21.322705] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.330511] page dumped because: kasan: bad access detected [ 21.336067] [ 21.337542] Memory state around the buggy address: [ 21.342324] ffff0008032a5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.349526] ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.356730] >ffff0008032a6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.363931] ^ [ 21.367407] ffff0008032a6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.374612] ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.381815] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 20.862235] ================================================================== [ 20.873065] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 20.880348] Write of size 1 at addr ffff000805d69f00 by task kunit_try_catch/191 [ 20.887723] [ 20.889211] CPU: 7 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.889268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.889285] Hardware name: WinLink E850-96 board (DT) [ 20.889306] Call trace: [ 20.889321] show_stack+0x20/0x38 (C) [ 20.889360] dump_stack_lvl+0x8c/0xd0 [ 20.889398] print_report+0x118/0x608 [ 20.889433] kasan_report+0xdc/0x128 [ 20.889466] __asan_report_store1_noabort+0x20/0x30 [ 20.889497] kmalloc_big_oob_right+0x2a4/0x2f0 [ 20.889528] kunit_try_run_case+0x170/0x3f0 [ 20.889564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.889601] kthread+0x328/0x630 [ 20.889632] ret_from_fork+0x10/0x20 [ 20.889667] [ 20.952393] Allocated by task 191: [ 20.955781] kasan_save_stack+0x3c/0x68 [ 20.959598] kasan_save_track+0x20/0x40 [ 20.963416] kasan_save_alloc_info+0x40/0x58 [ 20.967669] __kasan_kmalloc+0xd4/0xd8 [ 20.971403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.975916] kmalloc_big_oob_right+0xb8/0x2f0 [ 20.980257] kunit_try_run_case+0x170/0x3f0 [ 20.984423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.989891] kthread+0x328/0x630 [ 20.993103] ret_from_fork+0x10/0x20 [ 20.996662] [ 20.998139] The buggy address belongs to the object at ffff000805d68000 [ 20.998139] which belongs to the cache kmalloc-8k of size 8192 [ 21.010640] The buggy address is located 0 bytes to the right of [ 21.010640] allocated 7936-byte region [ffff000805d68000, ffff000805d69f00) [ 21.023658] [ 21.025138] The buggy address belongs to the physical page: [ 21.030693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d68 [ 21.038677] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.046317] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.053261] page_type: f5(slab) [ 21.056397] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.064116] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.071845] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 21.079653] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 21.087466] head: 0bfffe0000000003 fffffdffe0175a01 00000000ffffffff 00000000ffffffff [ 21.095278] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 21.103084] page dumped because: kasan: bad access detected [ 21.108641] [ 21.110115] Memory state around the buggy address: [ 21.114896] ffff000805d69e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.122098] ffff000805d69e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.129302] >ffff000805d69f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.136504] ^ [ 21.139720] ffff000805d69f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.146925] ffff000805d6a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.154128] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 20.394489] ================================================================== [ 20.404316] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.412385] Write of size 1 at addr ffff000801dea278 by task kunit_try_catch/189 [ 20.419761] [ 20.421247] CPU: 5 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.421306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.421324] Hardware name: WinLink E850-96 board (DT) [ 20.421346] Call trace: [ 20.421360] show_stack+0x20/0x38 (C) [ 20.421398] dump_stack_lvl+0x8c/0xd0 [ 20.421436] print_report+0x118/0x608 [ 20.421473] kasan_report+0xdc/0x128 [ 20.421507] __asan_report_store1_noabort+0x20/0x30 [ 20.421540] kmalloc_track_caller_oob_right+0x40c/0x488 [ 20.421576] kunit_try_run_case+0x170/0x3f0 [ 20.421616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.421653] kthread+0x328/0x630 [ 20.421681] ret_from_fork+0x10/0x20 [ 20.421715] [ 20.485213] Allocated by task 189: [ 20.488600] kasan_save_stack+0x3c/0x68 [ 20.492417] kasan_save_track+0x20/0x40 [ 20.496238] kasan_save_alloc_info+0x40/0x58 [ 20.500489] __kasan_kmalloc+0xd4/0xd8 [ 20.504221] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 20.509777] kmalloc_track_caller_oob_right+0xa8/0x488 [ 20.514899] kunit_try_run_case+0x170/0x3f0 [ 20.519066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.524534] kthread+0x328/0x630 [ 20.527745] ret_from_fork+0x10/0x20 [ 20.531304] [ 20.532781] The buggy address belongs to the object at ffff000801dea200 [ 20.532781] which belongs to the cache kmalloc-128 of size 128 [ 20.545282] The buggy address is located 0 bytes to the right of [ 20.545282] allocated 120-byte region [ffff000801dea200, ffff000801dea278) [ 20.558213] [ 20.559692] The buggy address belongs to the physical page: [ 20.565249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dea [ 20.573233] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.580871] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.587814] page_type: f5(slab) [ 20.590952] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 20.598672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.606398] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 20.614209] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.622022] head: 0bfffe0000000001 fffffdffe0077a81 00000000ffffffff 00000000ffffffff [ 20.629834] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.637640] page dumped because: kasan: bad access detected [ 20.643195] [ 20.644670] Memory state around the buggy address: [ 20.649452] ffff000801dea100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.656654] ffff000801dea180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.663860] >ffff000801dea200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.671059] ^ [ 20.678181] ffff000801dea280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.685386] ffff000801dea300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.692590] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 20.094886] ================================================================== [ 20.104145] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 20.111521] Read of size 1 at addr ffff000805d61000 by task kunit_try_catch/187 [ 20.118811] [ 20.120297] CPU: 7 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.120353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.120370] Hardware name: WinLink E850-96 board (DT) [ 20.120392] Call trace: [ 20.120408] show_stack+0x20/0x38 (C) [ 20.120442] dump_stack_lvl+0x8c/0xd0 [ 20.120481] print_report+0x118/0x608 [ 20.120514] kasan_report+0xdc/0x128 [ 20.120546] __asan_report_load1_noabort+0x20/0x30 [ 20.120584] kmalloc_node_oob_right+0x2f4/0x330 [ 20.120619] kunit_try_run_case+0x170/0x3f0 [ 20.120654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.120691] kthread+0x328/0x630 [ 20.120721] ret_from_fork+0x10/0x20 [ 20.120756] [ 20.183480] Allocated by task 187: [ 20.186867] kasan_save_stack+0x3c/0x68 [ 20.190686] kasan_save_track+0x20/0x40 [ 20.194504] kasan_save_alloc_info+0x40/0x58 [ 20.198757] __kasan_kmalloc+0xd4/0xd8 [ 20.202490] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 20.207438] kmalloc_node_oob_right+0xbc/0x330 [ 20.211866] kunit_try_run_case+0x170/0x3f0 [ 20.216031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.221500] kthread+0x328/0x630 [ 20.224712] ret_from_fork+0x10/0x20 [ 20.228272] [ 20.229748] The buggy address belongs to the object at ffff000805d60000 [ 20.229748] which belongs to the cache kmalloc-4k of size 4096 [ 20.242248] The buggy address is located 0 bytes to the right of [ 20.242248] allocated 4096-byte region [ffff000805d60000, ffff000805d61000) [ 20.255267] [ 20.256745] The buggy address belongs to the physical page: [ 20.262303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d60 [ 20.270287] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.277923] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.284867] page_type: f5(slab) [ 20.288008] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 20.295725] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.303452] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 20.311264] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 20.319075] head: 0bfffe0000000003 fffffdffe0175801 00000000ffffffff 00000000ffffffff [ 20.326887] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 20.334693] page dumped because: kasan: bad access detected [ 20.340248] [ 20.341723] Memory state around the buggy address: [ 20.346504] ffff000805d60f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.353707] ffff000805d60f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.360911] >ffff000805d61000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.368112] ^ [ 20.371328] ffff000805d61080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.378533] ffff000805d61100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.385735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 19.828841] ================================================================== [ 19.837914] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 19.844771] Read of size 1 at addr ffff000800c2f01f by task kunit_try_catch/185 [ 19.852062] [ 19.853549] CPU: 5 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 19.853605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.853622] Hardware name: WinLink E850-96 board (DT) [ 19.853645] Call trace: [ 19.853659] show_stack+0x20/0x38 (C) [ 19.853700] dump_stack_lvl+0x8c/0xd0 [ 19.853737] print_report+0x118/0x608 [ 19.853776] kasan_report+0xdc/0x128 [ 19.853812] __asan_report_load1_noabort+0x20/0x30 [ 19.853851] kmalloc_oob_left+0x2ec/0x320 [ 19.853881] kunit_try_run_case+0x170/0x3f0 [ 19.853917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.853955] kthread+0x328/0x630 [ 19.853984] ret_from_fork+0x10/0x20 [ 19.854021] [ 19.916209] Allocated by task 44: [ 19.919512] kasan_save_stack+0x3c/0x68 [ 19.923327] kasan_save_track+0x20/0x40 [ 19.927148] kasan_save_alloc_info+0x40/0x58 [ 19.931400] __kasan_kmalloc+0xd4/0xd8 [ 19.935133] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 19.940688] kvasprintf+0xe0/0x180 [ 19.944075] __kthread_create_on_node+0x16c/0x350 [ 19.948761] kthread_create_on_node+0xe4/0x130 [ 19.953188] create_worker+0x380/0x6b8 [ 19.956921] worker_thread+0x808/0xf38 [ 19.960653] kthread+0x328/0x630 [ 19.963865] ret_from_fork+0x10/0x20 [ 19.967424] [ 19.968901] The buggy address belongs to the object at ffff000800c2f000 [ 19.968901] which belongs to the cache kmalloc-16 of size 16 [ 19.981228] The buggy address is located 19 bytes to the right of [ 19.981228] allocated 12-byte region [ffff000800c2f000, ffff000800c2f00c) [ 19.994160] [ 19.995638] The buggy address belongs to the physical page: [ 20.001195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2f [ 20.009179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.015689] page_type: f5(slab) [ 20.018826] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 20.026545] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.034265] page dumped because: kasan: bad access detected [ 20.039818] [ 20.041294] Memory state around the buggy address: [ 20.046076] ffff000800c2ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.053277] ffff000800c2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.060483] >ffff000800c2f000: 00 04 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 20.067683] ^ [ 20.071680] ffff000800c2f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.078885] ffff000800c2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.086087] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 18.933077] ================================================================== [ 18.939578] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 18.946521] Write of size 1 at addr ffff000801ad8d73 by task kunit_try_catch/183 [ 18.953898] [ 18.955385] CPU: 4 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G N 6.16.0-rc1 #1 PREEMPT [ 18.955443] Tainted: [N]=TEST [ 18.955455] Hardware name: WinLink E850-96 board (DT) [ 18.955475] Call trace: [ 18.955486] show_stack+0x20/0x38 (C) [ 18.955526] dump_stack_lvl+0x8c/0xd0 [ 18.955562] print_report+0x118/0x608 [ 18.955598] kasan_report+0xdc/0x128 [ 18.955633] __asan_report_store1_noabort+0x20/0x30 [ 18.955666] kmalloc_oob_right+0x5a4/0x660 [ 18.955695] kunit_try_run_case+0x170/0x3f0 [ 18.955732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.955774] kthread+0x328/0x630 [ 18.955802] ret_from_fork+0x10/0x20 [ 18.955838] [ 19.017006] Allocated by task 183: [ 19.020393] kasan_save_stack+0x3c/0x68 [ 19.024209] kasan_save_track+0x20/0x40 [ 19.028028] kasan_save_alloc_info+0x40/0x58 [ 19.032281] __kasan_kmalloc+0xd4/0xd8 [ 19.036014] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.040529] kmalloc_oob_right+0xb0/0x660 [ 19.044523] kunit_try_run_case+0x170/0x3f0 [ 19.048688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.054156] kthread+0x328/0x630 [ 19.057368] ret_from_fork+0x10/0x20 [ 19.060927] [ 19.062404] The buggy address belongs to the object at ffff000801ad8d00 [ 19.062404] which belongs to the cache kmalloc-128 of size 128 [ 19.074905] The buggy address is located 0 bytes to the right of [ 19.074905] allocated 115-byte region [ffff000801ad8d00, ffff000801ad8d73) [ 19.087836] [ 19.089316] The buggy address belongs to the physical page: [ 19.094872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8 [ 19.102856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.110494] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.117438] page_type: f5(slab) [ 19.120575] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.128294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.136022] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.143832] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.151645] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff [ 19.159456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.167262] page dumped because: kasan: bad access detected [ 19.172818] [ 19.174293] Memory state around the buggy address: [ 19.179074] ffff000801ad8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.186277] ffff000801ad8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.193481] >ffff000801ad8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.200682] ^ [ 19.207543] ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.214750] ffff000801ad8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.221951] ================================================================== [ 19.234510] ================================================================== [ 19.241659] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 19.248598] Write of size 1 at addr ffff000801ad8d78 by task kunit_try_catch/183 [ 19.255977] [ 19.257461] CPU: 4 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 19.257514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.257528] Hardware name: WinLink E850-96 board (DT) [ 19.257549] Call trace: [ 19.257561] show_stack+0x20/0x38 (C) [ 19.257593] dump_stack_lvl+0x8c/0xd0 [ 19.257628] print_report+0x118/0x608 [ 19.257663] kasan_report+0xdc/0x128 [ 19.257695] __asan_report_store1_noabort+0x20/0x30 [ 19.257726] kmalloc_oob_right+0x538/0x660 [ 19.257756] kunit_try_run_case+0x170/0x3f0 [ 19.257791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.257829] kthread+0x328/0x630 [ 19.257856] ret_from_fork+0x10/0x20 [ 19.257891] [ 19.320300] Allocated by task 183: [ 19.323685] kasan_save_stack+0x3c/0x68 [ 19.327503] kasan_save_track+0x20/0x40 [ 19.331322] kasan_save_alloc_info+0x40/0x58 [ 19.335576] __kasan_kmalloc+0xd4/0xd8 [ 19.339309] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.343822] kmalloc_oob_right+0xb0/0x660 [ 19.347817] kunit_try_run_case+0x170/0x3f0 [ 19.351982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.357451] kthread+0x328/0x630 [ 19.360662] ret_from_fork+0x10/0x20 [ 19.364221] [ 19.365698] The buggy address belongs to the object at ffff000801ad8d00 [ 19.365698] which belongs to the cache kmalloc-128 of size 128 [ 19.378199] The buggy address is located 5 bytes to the right of [ 19.378199] allocated 115-byte region [ffff000801ad8d00, ffff000801ad8d73) [ 19.391130] [ 19.392606] The buggy address belongs to the physical page: [ 19.398166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8 [ 19.406149] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.413788] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.420732] page_type: f5(slab) [ 19.423869] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.431588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.439315] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.447126] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.454939] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff [ 19.462751] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.470557] page dumped because: kasan: bad access detected [ 19.476112] [ 19.477588] Memory state around the buggy address: [ 19.482367] ffff000801ad8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.489571] ffff000801ad8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.496776] >ffff000801ad8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.503976] ^ [ 19.511098] ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.518302] ffff000801ad8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.525504] ================================================================== [ 19.532936] ================================================================== [ 19.539916] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 19.546858] Read of size 1 at addr ffff000801ad8d80 by task kunit_try_catch/183 [ 19.554149] [ 19.555633] CPU: 4 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 19.555687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.555702] Hardware name: WinLink E850-96 board (DT) [ 19.555721] Call trace: [ 19.555732] show_stack+0x20/0x38 (C) [ 19.555764] dump_stack_lvl+0x8c/0xd0 [ 19.555799] print_report+0x118/0x608 [ 19.555831] kasan_report+0xdc/0x128 [ 19.555865] __asan_report_load1_noabort+0x20/0x30 [ 19.555900] kmalloc_oob_right+0x5d0/0x660 [ 19.555929] kunit_try_run_case+0x170/0x3f0 [ 19.555961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.555998] kthread+0x328/0x630 [ 19.556025] ret_from_fork+0x10/0x20 [ 19.556055] [ 19.618384] Allocated by task 183: [ 19.621770] kasan_save_stack+0x3c/0x68 [ 19.625589] kasan_save_track+0x20/0x40 [ 19.629408] kasan_save_alloc_info+0x40/0x58 [ 19.633662] __kasan_kmalloc+0xd4/0xd8 [ 19.637394] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.641908] kmalloc_oob_right+0xb0/0x660 [ 19.645902] kunit_try_run_case+0x170/0x3f0 [ 19.650068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.655536] kthread+0x328/0x630 [ 19.658748] ret_from_fork+0x10/0x20 [ 19.662307] [ 19.663784] The buggy address belongs to the object at ffff000801ad8d00 [ 19.663784] which belongs to the cache kmalloc-128 of size 128 [ 19.676283] The buggy address is located 13 bytes to the right of [ 19.676283] allocated 115-byte region [ffff000801ad8d00, ffff000801ad8d73) [ 19.689303] [ 19.690781] The buggy address belongs to the physical page: [ 19.696337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8 [ 19.704322] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.711959] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.718903] page_type: f5(slab) [ 19.722038] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.729761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.737487] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 19.745299] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.753112] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff [ 19.760924] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.768729] page dumped because: kasan: bad access detected [ 19.774284] [ 19.775760] Memory state around the buggy address: [ 19.780538] ffff000801ad8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.787743] ffff000801ad8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.794947] >ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.802149] ^ [ 19.805364] ffff000801ad8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.812569] ffff000801ad8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.819770] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 165.175785] WARNING: CPU: 2 PID: 751 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 165.183248] Modules linked in: [ 165.186297] CPU: 2 UID: 0 PID: 751 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc1 #1 PREEMPT [ 165.196196] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 165.201997] Hardware name: WinLink E850-96 board (DT) [ 165.207035] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 165.213976] pc : intlog10+0x38/0x48 [ 165.217447] lr : intlog10_test+0xe4/0x200 [ 165.221439] sp : ffff80008b097c10 [ 165.224738] x29: ffff80008b097c90 x28: 0000000000000000 x27: 0000000000000000 [ 165.231856] x26: 1fffe001003bca01 x25: 0000000000000000 x24: ffff80008b097ce0 [ 165.238976] x23: ffff80008b097d00 x22: 0000000000000000 x21: 1ffff00011612f82 [ 165.246092] x20: ffff800083cd2fc0 x19: ffff800087d67990 x18: 000000001f59ab94 [ 165.253211] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 165.260328] x14: 0000000000000000 x13: 1fffe0010b5eb189 x12: ffff700010f6f381 [ 165.267446] x11: 1ffff00010f6f380 x10: ffff700010f6f380 x9 : ffff80008126a2dc [ 165.274564] x8 : ffff800087b79c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 165.281682] x5 : ffff700011612f82 x4 : 1ffff00010facf3a x3 : 1ffff0001079a5f8 [ 165.288800] x2 : 1ffff0001079a5f8 x1 : 0000000000000003 x0 : 0000000000000000 [ 165.295921] Call trace: [ 165.298353] intlog10+0x38/0x48 (P) [ 165.301824] kunit_try_run_case+0x170/0x3f0 [ 165.305987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 165.311455] kthread+0x328/0x630 [ 165.314669] ret_from_fork+0x10/0x20 [ 165.318229] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 164.973359] WARNING: CPU: 7 PID: 733 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 164.980649] Modules linked in: [ 164.983695] CPU: 7 UID: 0 PID: 733 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc1 #1 PREEMPT [ 164.993591] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 164.998528] Hardware name: WinLink E850-96 board (DT) [ 165.003564] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 165.010507] pc : intlog2+0xd8/0xf8 [ 165.013891] lr : intlog2_test+0xe4/0x200 [ 165.017796] sp : ffff80008af77c10 [ 165.021097] x29: ffff80008af77c90 x28: 0000000000000000 x27: 0000000000000000 [ 165.028213] x26: 1fffe001003bca61 x25: 0000000000000000 x24: ffff80008af77ce0 [ 165.035331] x23: ffff80008af77d00 x22: 0000000000000000 x21: 1ffff000115eef82 [ 165.042451] x20: ffff800083cd2ec0 x19: ffff800087d67990 x18: 000000007c333b66 [ 165.049567] x17: 0000000000000000 x16: ffff00085b002d28 x15: 0000000000000000 [ 165.056685] x14: 00000000f1f1f1f1 x13: 1fffe0010b600589 x12: ffff700010f6f381 [ 165.063803] x11: 1ffff00010f6f380 x10: ffff700010f6f380 x9 : ffff80008126a4dc [ 165.070921] x8 : ffff800087b79c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 165.078039] x5 : ffff7000115eef82 x4 : 1ffff00010facf3a x3 : 1ffff0001079a5d8 [ 165.085157] x2 : 1ffff0001079a5d8 x1 : 0000000000000003 x0 : 0000000000000000 [ 165.092278] Call trace: [ 165.094710] intlog2+0xd8/0xf8 (P) [ 165.098092] kunit_try_run_case+0x170/0x3f0 [ 165.102259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 165.107726] kthread+0x328/0x630 [ 165.110940] ret_from_fork+0x10/0x20 [ 165.114500] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
KNOWN ISSUE - e850-96: board rootfs mount failed intermittently - /dev/root: Can't open blockdev
[ 232.437665] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) [ 232.445906] SMP: stopping secondary CPUs [ 232.449830] Kernel Offset: disabled [ 232.453279] CPU features: 0x1000,00000000,02004ca0,0400721b [ 232.458834] Memory Limit: none [ 232.461905] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---