Date
June 2, 2025, 2:11 p.m.
Failure - log-parser-boot - internal-error-oops-oops-smp
[ 159.824505] Internal error: Oops: 0000000096000005 [#1] SMP [ 159.830116] Modules linked in: [ 159.833158] CPU: 4 UID: 0 PID: 579 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 159.843054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 159.847208] Hardware name: WinLink E850-96 board (DT) [ 159.852247] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 159.859187] pc : kunit_test_null_dereference+0x70/0x170 [ 159.864394] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 159.870212] sp : ffff80008a437d30 [ 159.873508] x29: ffff80008a437d90 x28: 0000000000000000 x27: 0000000000000000 [ 159.880627] x26: 1fffe001003aab41 x25: 0000000000000000 x24: 0000000000000004 [ 159.887745] x23: ffff000801d55a0c x22: ffff8000811fd6f8 x21: ffff000806bb7c08 [ 159.894862] x20: 1ffff00011486fa6 x19: ffff800087ba7990 x18: ffff800087ba7b00 [ 159.901980] x17: ffff800081d90744 x16: ffff800083904be4 x15: ffff8000811f04a0 [ 159.909098] x14: ffff8000811fb5b8 x13: 1fffe0010b5fa9d0 x12: ffff60010097711c [ 159.916216] x11: 1fffe0010097711b x10: ffff60010097711b x9 : ffff8000811f4b60 [ 159.923334] x8 : ffff80008a437c38 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 159.930452] x5 : ffff700011486fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 159.937570] x2 : dfff800000000000 x1 : ffff000804bb8000 x0 : ffff800087ba7990 [ 159.944690] Call trace: [ 159.947123] kunit_test_null_dereference+0x70/0x170 (P) [ 159.952330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 159.957796] kthread+0x328/0x630 [ 159.961008] ret_from_fork+0x10/0x20 [ 159.964579] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 159.970649] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[ 226.228849] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) [ 226.237086] SMP: stopping secondary CPUs [ 226.241009] Kernel Offset: disabled [ 226.244459] CPU features: 0x0400,00000000,01002650,0200721b [ 226.250015] Memory Limit: none [ 226.253088] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 97.526827] ================================================================== [ 97.526965] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 97.526965] [ 97.527103] Use-after-free read at 0x(____ptrval____) (in kfence-#187): [ 97.527212] test_krealloc+0x51c/0x830 [ 97.530362] kunit_try_run_case+0x170/0x3f0 [ 97.534528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 97.539997] kthread+0x328/0x630 [ 97.543209] ret_from_fork+0x10/0x20 [ 97.546768] [ 97.548248] kfence-#187: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 97.548248] [ 97.557881] allocated by task 384 on cpu 5 at 97.526737s (0.031142s ago): [ 97.564664] test_alloc+0x29c/0x628 [ 97.568122] test_krealloc+0xc0/0x830 [ 97.571768] kunit_try_run_case+0x170/0x3f0 [ 97.575934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 97.581403] kthread+0x328/0x630 [ 97.584615] ret_from_fork+0x10/0x20 [ 97.588175] [ 97.589653] freed by task 384 on cpu 5 at 97.526766s (0.062884s ago): [ 97.596087] krealloc_noprof+0x148/0x360 [ 97.599979] test_krealloc+0x1dc/0x830 [ 97.603712] kunit_try_run_case+0x170/0x3f0 [ 97.607878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 97.613347] kthread+0x328/0x630 [ 97.616559] ret_from_fork+0x10/0x20 [ 97.620119] [ 97.621604] CPU: 5 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 97.631497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 97.635657] Hardware name: WinLink E850-96 board (DT) [ 97.640695] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 97.300235] ================================================================== [ 97.300379] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 97.300379] [ 97.300541] Use-after-free read at 0x(____ptrval____) (in kfence-#185): [ 97.301436] test_memcache_typesafe_by_rcu+0x280/0x560 [ 97.306556] kunit_try_run_case+0x170/0x3f0 [ 97.310723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 97.316191] kthread+0x328/0x630 [ 97.319403] ret_from_fork+0x10/0x20 [ 97.322962] [ 97.324441] kfence-#185: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 97.324441] [ 97.333554] allocated by task 382 on cpu 4 at 97.250753s (0.082799s ago): [ 97.340337] test_alloc+0x230/0x628 [ 97.343795] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 97.348917] kunit_try_run_case+0x170/0x3f0 [ 97.353083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 97.358552] kthread+0x328/0x630 [ 97.361763] ret_from_fork+0x10/0x20 [ 97.365324] [ 97.366800] freed by task 382 on cpu 4 at 97.250770s (0.116028s ago): [ 97.373232] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 97.378343] kunit_try_run_case+0x170/0x3f0 [ 97.382510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 97.387978] kthread+0x328/0x630 [ 97.391190] ret_from_fork+0x10/0x20 [ 97.394751] [ 97.396237] CPU: 4 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 97.406129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 97.410288] Hardware name: WinLink E850-96 board (DT) [ 97.415326] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 73.768399] ================================================================== [ 73.768602] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 73.768602] [ 73.768757] Invalid read at 0x(____ptrval____): [ 73.769864] test_invalid_access+0xdc/0x1f0 [ 73.774084] kunit_try_run_case+0x170/0x3f0 [ 73.778224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.783696] kthread+0x328/0x630 [ 73.786907] ret_from_fork+0x10/0x20 [ 73.790436] [ 73.791947] CPU: 4 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 73.801847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.806032] Hardware name: WinLink E850-96 board (DT) [ 73.811113] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 73.414822] ================================================================== [ 73.414962] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 73.414962] [ 73.415104] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#180): [ 73.418794] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 73.424001] kunit_try_run_case+0x170/0x3f0 [ 73.428168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.433636] kthread+0x328/0x630 [ 73.436848] ret_from_fork+0x10/0x20 [ 73.440407] [ 73.441887] kfence-#180: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 73.441887] [ 73.451520] allocated by task 372 on cpu 4 at 73.414753s (0.036764s ago): [ 73.458299] test_alloc+0x29c/0x628 [ 73.461761] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 73.466882] kunit_try_run_case+0x170/0x3f0 [ 73.471049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.476518] kthread+0x328/0x630 [ 73.479729] ret_from_fork+0x10/0x20 [ 73.483290] [ 73.484767] freed by task 372 on cpu 4 at 73.414770s (0.069992s ago): [ 73.491204] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 73.496396] kunit_try_run_case+0x170/0x3f0 [ 73.500562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.506031] kthread+0x328/0x630 [ 73.509243] ret_from_fork+0x10/0x20 [ 73.512803] [ 73.514289] CPU: 4 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 73.524181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.528341] Hardware name: WinLink E850-96 board (DT) [ 73.533378] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 72.995306] ================================================================== [ 72.995443] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 72.995443] [ 72.995600] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#176): [ 72.997282] test_kmalloc_aligned_oob_read+0x238/0x468 [ 73.002402] kunit_try_run_case+0x170/0x3f0 [ 73.006568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.012037] kthread+0x328/0x630 [ 73.015249] ret_from_fork+0x10/0x20 [ 73.018808] [ 73.020288] kfence-#176: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 73.020288] [ 73.029921] allocated by task 370 on cpu 1 at 72.995269s (0.034650s ago): [ 73.036704] test_alloc+0x29c/0x628 [ 73.040162] test_kmalloc_aligned_oob_read+0x100/0x468 [ 73.045283] kunit_try_run_case+0x170/0x3f0 [ 73.049450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.054919] kthread+0x328/0x630 [ 73.058130] ret_from_fork+0x10/0x20 [ 73.061691] [ 73.063178] CPU: 1 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 73.073069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.077229] Hardware name: WinLink E850-96 board (DT) [ 73.082266] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 68.478830] ================================================================== [ 68.478969] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 68.478969] [ 68.479096] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#133): [ 68.479258] test_corruption+0x284/0x378 [ 68.482803] kunit_try_run_case+0x170/0x3f0 [ 68.486969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.492438] kthread+0x328/0x630 [ 68.495650] ret_from_fork+0x10/0x20 [ 68.499209] [ 68.500688] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 68.500688] [ 68.510322] allocated by task 358 on cpu 4 at 68.478761s (0.031559s ago): [ 68.517102] test_alloc+0x29c/0x628 [ 68.520563] test_corruption+0x198/0x378 [ 68.524469] kunit_try_run_case+0x170/0x3f0 [ 68.528636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.534104] kthread+0x328/0x630 [ 68.537316] ret_from_fork+0x10/0x20 [ 68.540876] [ 68.542353] freed by task 358 on cpu 4 at 68.478776s (0.063574s ago): [ 68.548792] test_corruption+0x284/0x378 [ 68.552682] kunit_try_run_case+0x170/0x3f0 [ 68.556847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.562316] kthread+0x328/0x630 [ 68.565527] ret_from_fork+0x10/0x20 [ 68.569088] [ 68.570573] CPU: 4 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 68.580468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.584626] Hardware name: WinLink E850-96 board (DT) [ 68.589663] ================================================================== [ 69.130847] ================================================================== [ 69.130977] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 69.130977] [ 69.131104] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#139): [ 69.131262] test_corruption+0x1d8/0x378 [ 69.134810] kunit_try_run_case+0x170/0x3f0 [ 69.138977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.144446] kthread+0x328/0x630 [ 69.147657] ret_from_fork+0x10/0x20 [ 69.151216] [ 69.152696] kfence-#139: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 69.152696] [ 69.161809] allocated by task 360 on cpu 5 at 69.130783s (0.031023s ago): [ 69.168589] test_alloc+0x230/0x628 [ 69.172050] test_corruption+0x198/0x378 [ 69.175955] kunit_try_run_case+0x170/0x3f0 [ 69.180122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.185591] kthread+0x328/0x630 [ 69.188802] ret_from_fork+0x10/0x20 [ 69.192363] [ 69.193838] freed by task 360 on cpu 5 at 69.130800s (0.063036s ago): [ 69.200273] test_corruption+0x1d8/0x378 [ 69.204167] kunit_try_run_case+0x170/0x3f0 [ 69.208334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.213802] kthread+0x328/0x630 [ 69.217014] ret_from_fork+0x10/0x20 [ 69.220574] [ 69.222061] CPU: 5 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 69.231954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.236112] Hardware name: WinLink E850-96 board (DT) [ 69.241150] ================================================================== [ 68.698799] ================================================================== [ 68.698924] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 68.698924] [ 68.699052] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#135): [ 68.701459] test_corruption+0x120/0x378 [ 68.705363] kunit_try_run_case+0x170/0x3f0 [ 68.709530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.714999] kthread+0x328/0x630 [ 68.718210] ret_from_fork+0x10/0x20 [ 68.721769] [ 68.723248] kfence-#135: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 68.723248] [ 68.732362] allocated by task 360 on cpu 5 at 68.698741s (0.033619s ago): [ 68.739141] test_alloc+0x230/0x628 [ 68.742602] test_corruption+0xdc/0x378 [ 68.746422] kunit_try_run_case+0x170/0x3f0 [ 68.750588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.756057] kthread+0x328/0x630 [ 68.759269] ret_from_fork+0x10/0x20 [ 68.762829] [ 68.764304] freed by task 360 on cpu 5 at 68.698758s (0.065544s ago): [ 68.770737] test_corruption+0x120/0x378 [ 68.774633] kunit_try_run_case+0x170/0x3f0 [ 68.778799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.784268] kthread+0x328/0x630 [ 68.787480] ret_from_fork+0x10/0x20 [ 68.791040] [ 68.792525] CPU: 5 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 68.802423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.806578] Hardware name: WinLink E850-96 board (DT) [ 68.811616] ================================================================== [ 68.150810] ================================================================== [ 68.150950] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 68.150950] [ 68.151076] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#130): [ 68.153484] test_corruption+0x278/0x378 [ 68.157387] kunit_try_run_case+0x170/0x3f0 [ 68.161554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.167023] kthread+0x328/0x630 [ 68.170234] ret_from_fork+0x10/0x20 [ 68.173793] [ 68.175273] kfence-#130: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 68.175273] [ 68.184907] allocated by task 358 on cpu 4 at 68.150744s (0.034161s ago): [ 68.191685] test_alloc+0x29c/0x628 [ 68.195147] test_corruption+0xdc/0x378 [ 68.198967] kunit_try_run_case+0x170/0x3f0 [ 68.203133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.208602] kthread+0x328/0x630 [ 68.211814] ret_from_fork+0x10/0x20 [ 68.215372] [ 68.216852] freed by task 358 on cpu 4 at 68.150760s (0.066088s ago): [ 68.223287] test_corruption+0x278/0x378 [ 68.227178] kunit_try_run_case+0x170/0x3f0 [ 68.231345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.236813] kthread+0x328/0x630 [ 68.240027] ret_from_fork+0x10/0x20 [ 68.243586] [ 68.245070] CPU: 4 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 68.254964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.259123] Hardware name: WinLink E850-96 board (DT) [ 68.264161] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 67.734800] ================================================================== [ 67.734940] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 67.734940] [ 67.735068] Invalid free of 0x(____ptrval____) (in kfence-#126): [ 67.735172] test_invalid_addr_free+0xec/0x238 [ 67.738512] kunit_try_run_case+0x170/0x3f0 [ 67.742678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.748147] kthread+0x328/0x630 [ 67.751359] ret_from_fork+0x10/0x20 [ 67.754918] [ 67.756398] kfence-#126: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 67.756398] [ 67.765510] allocated by task 356 on cpu 4 at 67.734750s (0.030758s ago): [ 67.772290] test_alloc+0x230/0x628 [ 67.775751] test_invalid_addr_free+0xd4/0x238 [ 67.780178] kunit_try_run_case+0x170/0x3f0 [ 67.784344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.789813] kthread+0x328/0x630 [ 67.793025] ret_from_fork+0x10/0x20 [ 67.796586] [ 67.798069] CPU: 4 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 67.807965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.812123] Hardware name: WinLink E850-96 board (DT) [ 67.817161] ================================================================== [ 67.526804] ================================================================== [ 67.526930] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 67.526930] [ 67.527066] Invalid free of 0x(____ptrval____) (in kfence-#124): [ 67.527172] test_invalid_addr_free+0x1ac/0x238 [ 67.530677] kunit_try_run_case+0x170/0x3f0 [ 67.534843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.540312] kthread+0x328/0x630 [ 67.543523] ret_from_fork+0x10/0x20 [ 67.547082] [ 67.548562] kfence-#124: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.548562] [ 67.558195] allocated by task 354 on cpu 2 at 67.526751s (0.031442s ago): [ 67.564977] test_alloc+0x29c/0x628 [ 67.568436] test_invalid_addr_free+0xd4/0x238 [ 67.572863] kunit_try_run_case+0x170/0x3f0 [ 67.577030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.582498] kthread+0x328/0x630 [ 67.585710] ret_from_fork+0x10/0x20 [ 67.589271] [ 67.590757] CPU: 2 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 67.600649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.604808] Hardware name: WinLink E850-96 board (DT) [ 67.609846] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 67.306794] ================================================================== [ 67.306921] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 67.306921] [ 67.307045] Invalid free of 0x(____ptrval____) (in kfence-#122): [ 67.307148] test_double_free+0x100/0x238 [ 67.309625] kunit_try_run_case+0x170/0x3f0 [ 67.313792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.319260] kthread+0x328/0x630 [ 67.322472] ret_from_fork+0x10/0x20 [ 67.326031] [ 67.327511] kfence-#122: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 67.327511] [ 67.336624] allocated by task 352 on cpu 3 at 67.306730s (0.029892s ago): [ 67.343403] test_alloc+0x230/0x628 [ 67.346864] test_double_free+0xd4/0x238 [ 67.350770] kunit_try_run_case+0x170/0x3f0 [ 67.354937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.360406] kthread+0x328/0x630 [ 67.363617] ret_from_fork+0x10/0x20 [ 67.367178] [ 67.368654] freed by task 352 on cpu 3 at 67.306745s (0.061905s ago): [ 67.375086] test_double_free+0xf0/0x238 [ 67.378982] kunit_try_run_case+0x170/0x3f0 [ 67.383148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.388617] kthread+0x328/0x630 [ 67.391829] ret_from_fork+0x10/0x20 [ 67.395389] [ 67.396873] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 67.406767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.410927] Hardware name: WinLink E850-96 board (DT) [ 67.415964] ================================================================== [ 67.086825] ================================================================== [ 67.086964] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 67.086964] [ 67.087087] Invalid free of 0x(____ptrval____) (in kfence-#120): [ 67.087193] test_double_free+0x1bc/0x238 [ 67.089669] kunit_try_run_case+0x170/0x3f0 [ 67.093835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.099304] kthread+0x328/0x630 [ 67.102516] ret_from_fork+0x10/0x20 [ 67.106075] [ 67.107554] kfence-#120: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 67.107554] [ 67.117188] allocated by task 350 on cpu 4 at 67.086748s (0.030437s ago): [ 67.123967] test_alloc+0x29c/0x628 [ 67.127429] test_double_free+0xd4/0x238 [ 67.131335] kunit_try_run_case+0x170/0x3f0 [ 67.135502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.140970] kthread+0x328/0x630 [ 67.144182] ret_from_fork+0x10/0x20 [ 67.147741] [ 67.149221] freed by task 350 on cpu 4 at 67.086765s (0.062452s ago): [ 67.155654] test_double_free+0x1ac/0x238 [ 67.159633] kunit_try_run_case+0x170/0x3f0 [ 67.163800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.169268] kthread+0x328/0x630 [ 67.172480] ret_from_fork+0x10/0x20 [ 67.176041] [ 67.177527] CPU: 4 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 67.187420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.191578] Hardware name: WinLink E850-96 board (DT) [ 67.196616] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 66.430800] ================================================================== [ 66.430934] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 66.430934] [ 66.431083] Use-after-free read at 0x(____ptrval____) (in kfence-#114): [ 66.431557] test_use_after_free_read+0x114/0x248 [ 66.436243] kunit_try_run_case+0x170/0x3f0 [ 66.440410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.445878] kthread+0x328/0x630 [ 66.449090] ret_from_fork+0x10/0x20 [ 66.452649] [ 66.454129] kfence-#114: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 66.454129] [ 66.463763] allocated by task 342 on cpu 3 at 66.430744s (0.033017s ago): [ 66.470546] test_alloc+0x29c/0x628 [ 66.474003] test_use_after_free_read+0xd0/0x248 [ 66.478604] kunit_try_run_case+0x170/0x3f0 [ 66.482770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.488239] kthread+0x328/0x630 [ 66.491451] ret_from_fork+0x10/0x20 [ 66.495010] [ 66.496490] freed by task 342 on cpu 3 at 66.430759s (0.065725s ago): [ 66.502925] test_use_after_free_read+0x1c0/0x248 [ 66.507597] kunit_try_run_case+0x170/0x3f0 [ 66.511763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.517232] kthread+0x328/0x630 [ 66.520443] ret_from_fork+0x10/0x20 [ 66.524004] [ 66.525489] CPU: 3 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 66.535383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.539542] Hardware name: WinLink E850-96 board (DT) [ 66.544579] ================================================================== [ 66.654786] ================================================================== [ 66.654928] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 66.654928] [ 66.655077] Use-after-free read at 0x(____ptrval____) (in kfence-#116): [ 66.655549] test_use_after_free_read+0x114/0x248 [ 66.660234] kunit_try_run_case+0x170/0x3f0 [ 66.664401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.669869] kthread+0x328/0x630 [ 66.673081] ret_from_fork+0x10/0x20 [ 66.676640] [ 66.678120] kfence-#116: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 66.678120] [ 66.687233] allocated by task 344 on cpu 4 at 66.654730s (0.032501s ago): [ 66.694016] test_alloc+0x230/0x628 [ 66.697474] test_use_after_free_read+0xd0/0x248 [ 66.702074] kunit_try_run_case+0x170/0x3f0 [ 66.706240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.711709] kthread+0x328/0x630 [ 66.714921] ret_from_fork+0x10/0x20 [ 66.718481] [ 66.719957] freed by task 344 on cpu 4 at 66.654746s (0.065210s ago): [ 66.726390] test_use_after_free_read+0xf0/0x248 [ 66.730980] kunit_try_run_case+0x170/0x3f0 [ 66.735146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.740615] kthread+0x328/0x630 [ 66.743827] ret_from_fork+0x10/0x20 [ 66.747387] [ 66.748873] CPU: 4 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 66.758765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.762925] Hardware name: WinLink E850-96 board (DT) [ 66.767963] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 66.222760] ================================================================== [ 66.222889] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 66.222889] [ 66.223039] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#112): [ 66.224207] test_out_of_bounds_write+0x100/0x240 [ 66.228893] kunit_try_run_case+0x170/0x3f0 [ 66.233059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.238528] kthread+0x328/0x630 [ 66.241740] ret_from_fork+0x10/0x20 [ 66.245298] [ 66.246777] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 66.246777] [ 66.255891] allocated by task 340 on cpu 6 at 66.222727s (0.033162s ago): [ 66.262674] test_alloc+0x230/0x628 [ 66.266132] test_out_of_bounds_write+0xc8/0x240 [ 66.270734] kunit_try_run_case+0x170/0x3f0 [ 66.274899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.280368] kthread+0x328/0x630 [ 66.283579] ret_from_fork+0x10/0x20 [ 66.287140] [ 66.288623] CPU: 6 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 66.298521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.302677] Hardware name: WinLink E850-96 board (DT) [ 66.307715] ================================================================== [ 66.014780] ================================================================== [ 66.014916] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 66.014916] [ 66.015068] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#110): [ 66.016234] test_out_of_bounds_write+0x100/0x240 [ 66.020920] kunit_try_run_case+0x170/0x3f0 [ 66.025086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.030555] kthread+0x328/0x630 [ 66.033767] ret_from_fork+0x10/0x20 [ 66.037326] [ 66.038805] kfence-#110: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 66.038805] [ 66.048439] allocated by task 338 on cpu 3 at 66.014746s (0.033691s ago): [ 66.055222] test_alloc+0x29c/0x628 [ 66.058680] test_out_of_bounds_write+0xc8/0x240 [ 66.063281] kunit_try_run_case+0x170/0x3f0 [ 66.067447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.072916] kthread+0x328/0x630 [ 66.076127] ret_from_fork+0x10/0x20 [ 66.079689] [ 66.081174] CPU: 3 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 66.091067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.095226] Hardware name: WinLink E850-96 board (DT) [ 66.100263] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 65.806810] ================================================================== [ 65.806958] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 65.806958] [ 65.807105] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#108): [ 65.808184] test_out_of_bounds_read+0x1c8/0x3e0 [ 65.812783] kunit_try_run_case+0x170/0x3f0 [ 65.816949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.822418] kthread+0x328/0x630 [ 65.825630] ret_from_fork+0x10/0x20 [ 65.829189] [ 65.830668] kfence-#108: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 65.830668] [ 65.839781] allocated by task 336 on cpu 4 at 65.806774s (0.033005s ago): [ 65.846565] test_alloc+0x230/0x628 [ 65.850022] test_out_of_bounds_read+0x198/0x3e0 [ 65.854623] kunit_try_run_case+0x170/0x3f0 [ 65.858789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.864258] kthread+0x328/0x630 [ 65.867469] ret_from_fork+0x10/0x20 [ 65.871030] [ 65.872515] CPU: 4 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 65.882409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.886568] Hardware name: WinLink E850-96 board (DT) [ 65.891605] ================================================================== [ 65.178777] ================================================================== [ 65.178902] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 65.178902] [ 65.179051] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#102): [ 65.179962] test_out_of_bounds_read+0x114/0x3e0 [ 65.184561] kunit_try_run_case+0x170/0x3f0 [ 65.188727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.194196] kthread+0x328/0x630 [ 65.197408] ret_from_fork+0x10/0x20 [ 65.200966] [ 65.202446] kfence-#102: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 65.202446] [ 65.212080] allocated by task 334 on cpu 3 at 65.178744s (0.033334s ago): [ 65.218863] test_alloc+0x29c/0x628 [ 65.222320] test_out_of_bounds_read+0xdc/0x3e0 [ 65.226835] kunit_try_run_case+0x170/0x3f0 [ 65.231001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.236470] kthread+0x328/0x630 [ 65.239681] ret_from_fork+0x10/0x20 [ 65.243242] [ 65.244727] CPU: 3 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 65.254621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.258780] Hardware name: WinLink E850-96 board (DT) [ 65.263817] ================================================================== [ 65.494765] ================================================================== [ 65.494907] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 65.494907] [ 65.495056] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#105): [ 65.495964] test_out_of_bounds_read+0x114/0x3e0 [ 65.500563] kunit_try_run_case+0x170/0x3f0 [ 65.504729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.510198] kthread+0x328/0x630 [ 65.513409] ret_from_fork+0x10/0x20 [ 65.516969] [ 65.518447] kfence-#105: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 65.518447] [ 65.527561] allocated by task 336 on cpu 4 at 65.494730s (0.032829s ago): [ 65.534344] test_alloc+0x230/0x628 [ 65.537801] test_out_of_bounds_read+0xdc/0x3e0 [ 65.542315] kunit_try_run_case+0x170/0x3f0 [ 65.546482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.551951] kthread+0x328/0x630 [ 65.555162] ret_from_fork+0x10/0x20 [ 65.558723] [ 65.560207] CPU: 4 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 65.570102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.574261] Hardware name: WinLink E850-96 board (DT) [ 65.579297] ================================================================== [ 65.282751] ================================================================== [ 65.286819] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 65.286819] [ 65.295846] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#103): [ 65.303224] test_out_of_bounds_read+0x1c8/0x3e0 [ 65.307823] kunit_try_run_case+0x170/0x3f0 [ 65.311990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.317458] kthread+0x328/0x630 [ 65.320670] ret_from_fork+0x10/0x20 [ 65.324229] [ 65.325708] kfence-#103: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 65.325708] [ 65.335342] allocated by task 334 on cpu 3 at 65.282725s (0.052615s ago): [ 65.342123] test_alloc+0x29c/0x628 [ 65.345583] test_out_of_bounds_read+0x198/0x3e0 [ 65.350183] kunit_try_run_case+0x170/0x3f0 [ 65.354350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.359819] kthread+0x328/0x630 [ 65.363031] ret_from_fork+0x10/0x20 [ 65.366589] [ 65.368075] CPU: 3 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 65.377968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.382129] Hardware name: WinLink E850-96 board (DT) [ 65.387163] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 18.628836] ================================================================== [ 18.651582] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 18.651582] [ 18.661129] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#36): [ 18.669118] kmalloc_track_caller_oob_right+0x224/0x488 [ 18.674324] kunit_try_run_case+0x170/0x3f0 [ 18.678490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.683959] kthread+0x328/0x630 [ 18.687170] ret_from_fork+0x10/0x20 [ 18.690730] [ 18.692209] kfence-#36: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 18.692209] [ 18.701930] allocated by task 189 on cpu 5 at 18.628488s (0.073440s ago): [ 18.708714] kmalloc_track_caller_oob_right+0x184/0x488 [ 18.713906] kunit_try_run_case+0x170/0x3f0 [ 18.718073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.723542] kthread+0x328/0x630 [ 18.726753] ret_from_fork+0x10/0x20 [ 18.730312] [ 18.731792] freed by task 189 on cpu 5 at 18.628796s (0.102992s ago): [ 18.738227] kmalloc_track_caller_oob_right+0x224/0x488 [ 18.743420] kunit_try_run_case+0x170/0x3f0 [ 18.747588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.753055] kthread+0x328/0x630 [ 18.756266] ret_from_fork+0x10/0x20 [ 18.759827] [ 18.761312] CPU: 5 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 18.771211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.775365] Hardware name: WinLink E850-96 board (DT) [ 18.780403] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 64.664735] ================================================================== [ 64.671730] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 64.678670] Write of size 1 at addr ffff000801c16178 by task kunit_try_catch/332 [ 64.686049] [ 64.687533] CPU: 6 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 64.687579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.687596] Hardware name: WinLink E850-96 board (DT) [ 64.687616] Call trace: [ 64.687631] show_stack+0x20/0x38 (C) [ 64.687665] dump_stack_lvl+0x8c/0xd0 [ 64.687700] print_report+0x118/0x608 [ 64.687731] kasan_report+0xdc/0x128 [ 64.687758] __asan_report_store1_noabort+0x20/0x30 [ 64.687792] strncpy_from_user+0x270/0x2a0 [ 64.687821] copy_user_test_oob+0x5c0/0xec8 [ 64.687849] kunit_try_run_case+0x170/0x3f0 [ 64.687883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.687920] kthread+0x328/0x630 [ 64.687953] ret_from_fork+0x10/0x20 [ 64.687988] [ 64.754538] Allocated by task 332: [ 64.757924] kasan_save_stack+0x3c/0x68 [ 64.761742] kasan_save_track+0x20/0x40 [ 64.765561] kasan_save_alloc_info+0x40/0x58 [ 64.769815] __kasan_kmalloc+0xd4/0xd8 [ 64.773547] __kmalloc_noprof+0x198/0x4c8 [ 64.777540] kunit_kmalloc_array+0x34/0x88 [ 64.781620] copy_user_test_oob+0xac/0xec8 [ 64.785700] kunit_try_run_case+0x170/0x3f0 [ 64.789866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.795335] kthread+0x328/0x630 [ 64.798547] ret_from_fork+0x10/0x20 [ 64.802106] [ 64.803583] The buggy address belongs to the object at ffff000801c16100 [ 64.803583] which belongs to the cache kmalloc-128 of size 128 [ 64.816083] The buggy address is located 0 bytes to the right of [ 64.816083] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 64.829015] [ 64.830492] The buggy address belongs to the physical page: [ 64.836050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 64.844032] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.851671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.858617] page_type: f5(slab) [ 64.861748] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.869473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.877199] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.885010] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.892823] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 64.900635] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.908441] page dumped because: kasan: bad access detected [ 64.913996] [ 64.915472] Memory state around the buggy address: [ 64.920250] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.927455] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.934660] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.941861] ^ [ 64.948982] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.956187] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.963388] ================================================================== [ 64.355858] ================================================================== [ 64.362881] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 64.369734] Write of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 64.377286] [ 64.378770] CPU: 6 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 64.378822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.378838] Hardware name: WinLink E850-96 board (DT) [ 64.378860] Call trace: [ 64.378874] show_stack+0x20/0x38 (C) [ 64.378910] dump_stack_lvl+0x8c/0xd0 [ 64.378944] print_report+0x118/0x608 [ 64.378977] kasan_report+0xdc/0x128 [ 64.379005] kasan_check_range+0x100/0x1a8 [ 64.379037] __kasan_check_write+0x20/0x30 [ 64.379070] strncpy_from_user+0x3c/0x2a0 [ 64.379101] copy_user_test_oob+0x5c0/0xec8 [ 64.379133] kunit_try_run_case+0x170/0x3f0 [ 64.379168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.379207] kthread+0x328/0x630 [ 64.379240] ret_from_fork+0x10/0x20 [ 64.379276] [ 64.448986] Allocated by task 332: [ 64.452373] kasan_save_stack+0x3c/0x68 [ 64.456191] kasan_save_track+0x20/0x40 [ 64.460010] kasan_save_alloc_info+0x40/0x58 [ 64.464264] __kasan_kmalloc+0xd4/0xd8 [ 64.467998] __kmalloc_noprof+0x198/0x4c8 [ 64.471989] kunit_kmalloc_array+0x34/0x88 [ 64.476069] copy_user_test_oob+0xac/0xec8 [ 64.480149] kunit_try_run_case+0x170/0x3f0 [ 64.484315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.489784] kthread+0x328/0x630 [ 64.492996] ret_from_fork+0x10/0x20 [ 64.496555] [ 64.498033] The buggy address belongs to the object at ffff000801c16100 [ 64.498033] which belongs to the cache kmalloc-128 of size 128 [ 64.510531] The buggy address is located 0 bytes inside of [ 64.510531] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 64.522943] [ 64.524419] The buggy address belongs to the physical page: [ 64.529979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 64.537962] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.545600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.552545] page_type: f5(slab) [ 64.555676] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.563401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.571127] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.578938] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.586751] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 64.594563] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.602369] page dumped because: kasan: bad access detected [ 64.607925] [ 64.609400] Memory state around the buggy address: [ 64.614181] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.621383] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.628588] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.635789] ^ [ 64.642910] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.650117] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.657316] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 62.520854] ================================================================== [ 62.533221] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 62.540251] Write of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 62.547799] [ 62.549285] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 62.549339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.549359] Hardware name: WinLink E850-96 board (DT) [ 62.549381] Call trace: [ 62.549397] show_stack+0x20/0x38 (C) [ 62.549433] dump_stack_lvl+0x8c/0xd0 [ 62.549470] print_report+0x118/0x608 [ 62.549500] kasan_report+0xdc/0x128 [ 62.549529] kasan_check_range+0x100/0x1a8 [ 62.549565] __kasan_check_write+0x20/0x30 [ 62.549598] copy_user_test_oob+0x234/0xec8 [ 62.549626] kunit_try_run_case+0x170/0x3f0 [ 62.549662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.549702] kthread+0x328/0x630 [ 62.549735] ret_from_fork+0x10/0x20 [ 62.549770] [ 62.615508] Allocated by task 332: [ 62.618896] kasan_save_stack+0x3c/0x68 [ 62.622712] kasan_save_track+0x20/0x40 [ 62.626531] kasan_save_alloc_info+0x40/0x58 [ 62.630784] __kasan_kmalloc+0xd4/0xd8 [ 62.634518] __kmalloc_noprof+0x198/0x4c8 [ 62.638511] kunit_kmalloc_array+0x34/0x88 [ 62.642589] copy_user_test_oob+0xac/0xec8 [ 62.646669] kunit_try_run_case+0x170/0x3f0 [ 62.650836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.656304] kthread+0x328/0x630 [ 62.659516] ret_from_fork+0x10/0x20 [ 62.663075] [ 62.664553] The buggy address belongs to the object at ffff000801c16100 [ 62.664553] which belongs to the cache kmalloc-128 of size 128 [ 62.677053] The buggy address is located 0 bytes inside of [ 62.677053] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 62.689464] [ 62.690943] The buggy address belongs to the physical page: [ 62.696500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 62.704485] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.712121] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 62.719066] page_type: f5(slab) [ 62.722203] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.729923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.737647] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.745459] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.753272] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 62.761084] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 62.768889] page dumped because: kasan: bad access detected [ 62.774446] [ 62.775921] Memory state around the buggy address: [ 62.780702] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.787903] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.795109] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 62.802309] ^ [ 62.809431] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.816637] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.823838] ================================================================== [ 63.746113] ================================================================== [ 63.752993] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 63.760021] Write of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 63.767573] [ 63.769058] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 63.769109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.769128] Hardware name: WinLink E850-96 board (DT) [ 63.769149] Call trace: [ 63.769162] show_stack+0x20/0x38 (C) [ 63.769195] dump_stack_lvl+0x8c/0xd0 [ 63.769229] print_report+0x118/0x608 [ 63.769259] kasan_report+0xdc/0x128 [ 63.769288] kasan_check_range+0x100/0x1a8 [ 63.769321] __kasan_check_write+0x20/0x30 [ 63.769355] copy_user_test_oob+0x434/0xec8 [ 63.769383] kunit_try_run_case+0x170/0x3f0 [ 63.769417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.769455] kthread+0x328/0x630 [ 63.769489] ret_from_fork+0x10/0x20 [ 63.769523] [ 63.835281] Allocated by task 332: [ 63.838667] kasan_save_stack+0x3c/0x68 [ 63.842485] kasan_save_track+0x20/0x40 [ 63.846304] kasan_save_alloc_info+0x40/0x58 [ 63.850557] __kasan_kmalloc+0xd4/0xd8 [ 63.854290] __kmalloc_noprof+0x198/0x4c8 [ 63.858283] kunit_kmalloc_array+0x34/0x88 [ 63.862363] copy_user_test_oob+0xac/0xec8 [ 63.866443] kunit_try_run_case+0x170/0x3f0 [ 63.870609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.876078] kthread+0x328/0x630 [ 63.879290] ret_from_fork+0x10/0x20 [ 63.882849] [ 63.884326] The buggy address belongs to the object at ffff000801c16100 [ 63.884326] which belongs to the cache kmalloc-128 of size 128 [ 63.896826] The buggy address is located 0 bytes inside of [ 63.896826] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 63.909237] [ 63.910714] The buggy address belongs to the physical page: [ 63.916272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 63.924257] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.931895] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.938839] page_type: f5(slab) [ 63.941974] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.949695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.957421] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.965233] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.973045] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 63.980857] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 63.988663] page dumped because: kasan: bad access detected [ 63.994218] [ 63.995694] Memory state around the buggy address: [ 64.000473] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.007677] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.014881] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.022082] ^ [ 64.029204] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.036410] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.043610] ================================================================== [ 62.831312] ================================================================== [ 62.838254] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 62.845278] Read of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 62.852742] [ 62.854229] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 62.854282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.854299] Hardware name: WinLink E850-96 board (DT) [ 62.854321] Call trace: [ 62.854334] show_stack+0x20/0x38 (C) [ 62.854371] dump_stack_lvl+0x8c/0xd0 [ 62.854408] print_report+0x118/0x608 [ 62.854439] kasan_report+0xdc/0x128 [ 62.854467] kasan_check_range+0x100/0x1a8 [ 62.854500] __kasan_check_read+0x20/0x30 [ 62.854533] copy_user_test_oob+0x728/0xec8 [ 62.854562] kunit_try_run_case+0x170/0x3f0 [ 62.854599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.854639] kthread+0x328/0x630 [ 62.854674] ret_from_fork+0x10/0x20 [ 62.854708] [ 62.920363] Allocated by task 332: [ 62.923751] kasan_save_stack+0x3c/0x68 [ 62.927568] kasan_save_track+0x20/0x40 [ 62.931387] kasan_save_alloc_info+0x40/0x58 [ 62.935641] __kasan_kmalloc+0xd4/0xd8 [ 62.939375] __kmalloc_noprof+0x198/0x4c8 [ 62.943366] kunit_kmalloc_array+0x34/0x88 [ 62.947446] copy_user_test_oob+0xac/0xec8 [ 62.951526] kunit_try_run_case+0x170/0x3f0 [ 62.955692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.961161] kthread+0x328/0x630 [ 62.964373] ret_from_fork+0x10/0x20 [ 62.967932] [ 62.969409] The buggy address belongs to the object at ffff000801c16100 [ 62.969409] which belongs to the cache kmalloc-128 of size 128 [ 62.981909] The buggy address is located 0 bytes inside of [ 62.981909] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 62.994320] [ 62.995799] The buggy address belongs to the physical page: [ 63.001355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 63.009341] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.016979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.023923] page_type: f5(slab) [ 63.027057] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.034777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.042504] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.050316] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.058128] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 63.065940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 63.073746] page dumped because: kasan: bad access detected [ 63.079301] [ 63.080777] Memory state around the buggy address: [ 63.085558] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.092760] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.099965] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 63.107166] ^ [ 63.114287] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.121493] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.128693] ================================================================== [ 63.441045] ================================================================== [ 63.448140] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 63.455164] Read of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 63.462629] [ 63.464115] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 63.464172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.464189] Hardware name: WinLink E850-96 board (DT) [ 63.464211] Call trace: [ 63.464225] show_stack+0x20/0x38 (C) [ 63.464259] dump_stack_lvl+0x8c/0xd0 [ 63.464297] print_report+0x118/0x608 [ 63.464328] kasan_report+0xdc/0x128 [ 63.464358] kasan_check_range+0x100/0x1a8 [ 63.464390] __kasan_check_read+0x20/0x30 [ 63.464422] copy_user_test_oob+0x3c8/0xec8 [ 63.464450] kunit_try_run_case+0x170/0x3f0 [ 63.464487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.464525] kthread+0x328/0x630 [ 63.464558] ret_from_fork+0x10/0x20 [ 63.464593] [ 63.530250] Allocated by task 332: [ 63.533637] kasan_save_stack+0x3c/0x68 [ 63.537456] kasan_save_track+0x20/0x40 [ 63.541274] kasan_save_alloc_info+0x40/0x58 [ 63.545527] __kasan_kmalloc+0xd4/0xd8 [ 63.549260] __kmalloc_noprof+0x198/0x4c8 [ 63.553254] kunit_kmalloc_array+0x34/0x88 [ 63.557333] copy_user_test_oob+0xac/0xec8 [ 63.561413] kunit_try_run_case+0x170/0x3f0 [ 63.565579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.571048] kthread+0x328/0x630 [ 63.574260] ret_from_fork+0x10/0x20 [ 63.577819] [ 63.579296] The buggy address belongs to the object at ffff000801c16100 [ 63.579296] which belongs to the cache kmalloc-128 of size 128 [ 63.591796] The buggy address is located 0 bytes inside of [ 63.591796] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 63.604207] [ 63.605684] The buggy address belongs to the physical page: [ 63.611241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 63.619227] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.626866] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.633809] page_type: f5(slab) [ 63.636941] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.644664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.652391] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.660202] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.668015] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 63.675827] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 63.683633] page dumped because: kasan: bad access detected [ 63.689188] [ 63.690664] Memory state around the buggy address: [ 63.695444] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.702647] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.709851] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 63.717052] ^ [ 63.724174] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.731380] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.738579] ================================================================== [ 64.051033] ================================================================== [ 64.058023] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 64.065051] Read of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 64.072516] [ 64.073998] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 64.074048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.074065] Hardware name: WinLink E850-96 board (DT) [ 64.074085] Call trace: [ 64.074096] show_stack+0x20/0x38 (C) [ 64.074126] dump_stack_lvl+0x8c/0xd0 [ 64.074158] print_report+0x118/0x608 [ 64.074189] kasan_report+0xdc/0x128 [ 64.074217] kasan_check_range+0x100/0x1a8 [ 64.074250] __kasan_check_read+0x20/0x30 [ 64.074284] copy_user_test_oob+0x4a0/0xec8 [ 64.074311] kunit_try_run_case+0x170/0x3f0 [ 64.074346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.074385] kthread+0x328/0x630 [ 64.074417] ret_from_fork+0x10/0x20 [ 64.074451] [ 64.140136] Allocated by task 332: [ 64.143524] kasan_save_stack+0x3c/0x68 [ 64.147341] kasan_save_track+0x20/0x40 [ 64.151161] kasan_save_alloc_info+0x40/0x58 [ 64.155414] __kasan_kmalloc+0xd4/0xd8 [ 64.159146] __kmalloc_noprof+0x198/0x4c8 [ 64.163140] kunit_kmalloc_array+0x34/0x88 [ 64.167219] copy_user_test_oob+0xac/0xec8 [ 64.171299] kunit_try_run_case+0x170/0x3f0 [ 64.175465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.180934] kthread+0x328/0x630 [ 64.184146] ret_from_fork+0x10/0x20 [ 64.187705] [ 64.189182] The buggy address belongs to the object at ffff000801c16100 [ 64.189182] which belongs to the cache kmalloc-128 of size 128 [ 64.201683] The buggy address is located 0 bytes inside of [ 64.201683] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 64.214093] [ 64.215571] The buggy address belongs to the physical page: [ 64.221129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 64.229113] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.236752] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.243696] page_type: f5(slab) [ 64.246830] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.254551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.262278] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.270089] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.277902] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 64.285714] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 64.293519] page dumped because: kasan: bad access detected [ 64.299075] [ 64.300551] Memory state around the buggy address: [ 64.305330] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.312533] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.319738] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 64.326939] ^ [ 64.334061] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.341267] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.348467] ================================================================== [ 63.136241] ================================================================== [ 63.143108] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 63.150134] Write of size 121 at addr ffff000801c16100 by task kunit_try_catch/332 [ 63.157686] [ 63.159171] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 63.159226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.159243] Hardware name: WinLink E850-96 board (DT) [ 63.159265] Call trace: [ 63.159279] show_stack+0x20/0x38 (C) [ 63.159314] dump_stack_lvl+0x8c/0xd0 [ 63.159350] print_report+0x118/0x608 [ 63.159380] kasan_report+0xdc/0x128 [ 63.159409] kasan_check_range+0x100/0x1a8 [ 63.159442] __kasan_check_write+0x20/0x30 [ 63.159475] copy_user_test_oob+0x35c/0xec8 [ 63.159504] kunit_try_run_case+0x170/0x3f0 [ 63.159540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.159577] kthread+0x328/0x630 [ 63.159609] ret_from_fork+0x10/0x20 [ 63.159645] [ 63.225393] Allocated by task 332: [ 63.228780] kasan_save_stack+0x3c/0x68 [ 63.232598] kasan_save_track+0x20/0x40 [ 63.236417] kasan_save_alloc_info+0x40/0x58 [ 63.240671] __kasan_kmalloc+0xd4/0xd8 [ 63.244403] __kmalloc_noprof+0x198/0x4c8 [ 63.248396] kunit_kmalloc_array+0x34/0x88 [ 63.252477] copy_user_test_oob+0xac/0xec8 [ 63.256556] kunit_try_run_case+0x170/0x3f0 [ 63.260723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.266191] kthread+0x328/0x630 [ 63.269403] ret_from_fork+0x10/0x20 [ 63.272962] [ 63.274439] The buggy address belongs to the object at ffff000801c16100 [ 63.274439] which belongs to the cache kmalloc-128 of size 128 [ 63.286938] The buggy address is located 0 bytes inside of [ 63.286938] allocated 120-byte region [ffff000801c16100, ffff000801c16178) [ 63.299350] [ 63.300829] The buggy address belongs to the physical page: [ 63.306385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16 [ 63.314371] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.322008] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 63.328952] page_type: f5(slab) [ 63.332087] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.339808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.347534] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 63.355345] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.363158] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff [ 63.370970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 63.378776] page dumped because: kasan: bad access detected [ 63.384331] [ 63.385807] Memory state around the buggy address: [ 63.390587] ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.397790] ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.404995] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 63.412196] ^ [ 63.419317] ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.426523] ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.433724] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 61.895894] ================================================================== [ 61.910055] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 61.917429] Read of size 8 at addr ffff000802408b78 by task kunit_try_catch/328 [ 61.924720] [ 61.926205] CPU: 5 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 61.926261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.926277] Hardware name: WinLink E850-96 board (DT) [ 61.926298] Call trace: [ 61.926315] show_stack+0x20/0x38 (C) [ 61.926353] dump_stack_lvl+0x8c/0xd0 [ 61.926390] print_report+0x118/0x608 [ 61.926425] kasan_report+0xdc/0x128 [ 61.926454] __asan_report_load8_noabort+0x20/0x30 [ 61.926492] copy_to_kernel_nofault+0x204/0x250 [ 61.926524] copy_to_kernel_nofault_oob+0x158/0x418 [ 61.926563] kunit_try_run_case+0x170/0x3f0 [ 61.926601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.926639] kthread+0x328/0x630 [ 61.926675] ret_from_fork+0x10/0x20 [ 61.926708] [ 61.994248] Allocated by task 328: [ 61.997638] kasan_save_stack+0x3c/0x68 [ 62.001453] kasan_save_track+0x20/0x40 [ 62.005273] kasan_save_alloc_info+0x40/0x58 [ 62.009526] __kasan_kmalloc+0xd4/0xd8 [ 62.013259] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.017772] copy_to_kernel_nofault_oob+0xc8/0x418 [ 62.022548] kunit_try_run_case+0x170/0x3f0 [ 62.026713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.032182] kthread+0x328/0x630 [ 62.035394] ret_from_fork+0x10/0x20 [ 62.038953] [ 62.040430] The buggy address belongs to the object at ffff000802408b00 [ 62.040430] which belongs to the cache kmalloc-128 of size 128 [ 62.052930] The buggy address is located 0 bytes to the right of [ 62.052930] allocated 120-byte region [ffff000802408b00, ffff000802408b78) [ 62.065862] [ 62.067340] The buggy address belongs to the physical page: [ 62.072898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 62.080883] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.088522] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 62.095464] page_type: f5(slab) [ 62.098601] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.106320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.114046] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.121857] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.129670] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 62.137482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 62.145288] page dumped because: kasan: bad access detected [ 62.150843] [ 62.152319] Memory state around the buggy address: [ 62.157100] ffff000802408a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.164302] ffff000802408a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.171506] >ffff000802408b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 62.178707] ^ [ 62.185829] ffff000802408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.193035] ffff000802408c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.200237] ================================================================== [ 62.207663] ================================================================== [ 62.214648] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 62.221936] Write of size 8 at addr ffff000802408b78 by task kunit_try_catch/328 [ 62.229314] [ 62.230799] CPU: 5 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 62.230855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.230873] Hardware name: WinLink E850-96 board (DT) [ 62.230894] Call trace: [ 62.230910] show_stack+0x20/0x38 (C) [ 62.230942] dump_stack_lvl+0x8c/0xd0 [ 62.230978] print_report+0x118/0x608 [ 62.231011] kasan_report+0xdc/0x128 [ 62.231039] kasan_check_range+0x100/0x1a8 [ 62.231073] __kasan_check_write+0x20/0x30 [ 62.231105] copy_to_kernel_nofault+0x8c/0x250 [ 62.231137] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 62.231174] kunit_try_run_case+0x170/0x3f0 [ 62.231210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.231250] kthread+0x328/0x630 [ 62.231285] ret_from_fork+0x10/0x20 [ 62.231319] [ 62.302143] Allocated by task 328: [ 62.305530] kasan_save_stack+0x3c/0x68 [ 62.309348] kasan_save_track+0x20/0x40 [ 62.313167] kasan_save_alloc_info+0x40/0x58 [ 62.317421] __kasan_kmalloc+0xd4/0xd8 [ 62.321153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.325667] copy_to_kernel_nofault_oob+0xc8/0x418 [ 62.330441] kunit_try_run_case+0x170/0x3f0 [ 62.334608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.340077] kthread+0x328/0x630 [ 62.343288] ret_from_fork+0x10/0x20 [ 62.346848] [ 62.348324] The buggy address belongs to the object at ffff000802408b00 [ 62.348324] which belongs to the cache kmalloc-128 of size 128 [ 62.360825] The buggy address is located 0 bytes to the right of [ 62.360825] allocated 120-byte region [ffff000802408b00, ffff000802408b78) [ 62.373757] [ 62.375236] The buggy address belongs to the physical page: [ 62.380793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 62.388776] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.396415] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 62.403358] page_type: f5(slab) [ 62.406494] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.414214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.421941] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 62.429752] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.437565] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 62.445377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 62.453183] page dumped because: kasan: bad access detected [ 62.458738] [ 62.460213] Memory state around the buggy address: [ 62.464995] ffff000802408a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.472196] ffff000802408a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.479401] >ffff000802408b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 62.486602] ^ [ 62.493724] ffff000802408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.500930] ffff000802408c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.508130] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 61.456665] ================================================================== [ 61.470998] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 61.477679] Read of size 1 at addr ffff800087b1d7f3 by task kunit_try_catch/316 [ 61.484968] [ 61.486453] CPU: 4 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 61.486507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.486524] Hardware name: WinLink E850-96 board (DT) [ 61.486549] Call trace: [ 61.486563] show_stack+0x20/0x38 (C) [ 61.486601] dump_stack_lvl+0x8c/0xd0 [ 61.486635] print_report+0x310/0x608 [ 61.486664] kasan_report+0xdc/0x128 [ 61.486692] __asan_report_load1_noabort+0x20/0x30 [ 61.486724] vmalloc_oob+0x578/0x5d0 [ 61.486753] kunit_try_run_case+0x170/0x3f0 [ 61.486793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.486833] kthread+0x328/0x630 [ 61.486869] ret_from_fork+0x10/0x20 [ 61.486904] [ 61.548688] The buggy address belongs to the virtual mapping at [ 61.548688] [ffff800087b1d000, ffff800087b1f000) created by: [ 61.548688] vmalloc_oob+0x98/0x5d0 [ 61.563786] [ 61.565266] The buggy address belongs to the physical page: [ 61.570822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b19 [ 61.578807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.585327] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 61.593046] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 61.600766] page dumped because: kasan: bad access detected [ 61.606322] [ 61.607797] Memory state around the buggy address: [ 61.612578] ffff800087b1d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.619778] ffff800087b1d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.626983] >ffff800087b1d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 61.634185] ^ [ 61.641047] ffff800087b1d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 61.648250] ffff800087b1d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 61.655453] ================================================================== [ 61.662792] ================================================================== [ 61.669867] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 61.676545] Read of size 1 at addr ffff800087b1d7f8 by task kunit_try_catch/316 [ 61.683837] [ 61.685321] CPU: 4 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 61.685375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.685391] Hardware name: WinLink E850-96 board (DT) [ 61.685414] Call trace: [ 61.685430] show_stack+0x20/0x38 (C) [ 61.685463] dump_stack_lvl+0x8c/0xd0 [ 61.685496] print_report+0x310/0x608 [ 61.685530] kasan_report+0xdc/0x128 [ 61.685559] __asan_report_load1_noabort+0x20/0x30 [ 61.685595] vmalloc_oob+0x51c/0x5d0 [ 61.685626] kunit_try_run_case+0x170/0x3f0 [ 61.685664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.685705] kthread+0x328/0x630 [ 61.685740] ret_from_fork+0x10/0x20 [ 61.685776] [ 61.747555] The buggy address belongs to the virtual mapping at [ 61.747555] [ffff800087b1d000, ffff800087b1f000) created by: [ 61.747555] vmalloc_oob+0x98/0x5d0 [ 61.762655] [ 61.764134] The buggy address belongs to the physical page: [ 61.769690] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b19 [ 61.777675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.784193] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 61.791914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 61.799633] page dumped because: kasan: bad access detected [ 61.805189] [ 61.806664] Memory state around the buggy address: [ 61.811445] ffff800087b1d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.818647] ffff800087b1d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.825852] >ffff800087b1d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 61.833053] ^ [ 61.840176] ffff800087b1d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 61.847379] ffff800087b1d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 61.854580] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 60.660209] ================================================================== [ 60.667273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 60.674650] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 60.682029] [ 60.683510] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 60.683558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.683574] Hardware name: WinLink E850-96 board (DT) [ 60.683593] Call trace: [ 60.683606] show_stack+0x20/0x38 (C) [ 60.683638] dump_stack_lvl+0x8c/0xd0 [ 60.683668] print_report+0x118/0x608 [ 60.683697] kasan_report+0xdc/0x128 [ 60.683725] kasan_check_range+0x100/0x1a8 [ 60.683755] __kasan_check_write+0x20/0x30 [ 60.683785] kasan_atomics_helper+0x175c/0x4858 [ 60.683815] kasan_atomics+0x198/0x2e0 [ 60.683843] kunit_try_run_case+0x170/0x3f0 [ 60.683873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.683912] kthread+0x328/0x630 [ 60.683941] ret_from_fork+0x10/0x20 [ 60.683976] [ 60.753815] Allocated by task 312: [ 60.757203] kasan_save_stack+0x3c/0x68 [ 60.761020] kasan_save_track+0x20/0x40 [ 60.764840] kasan_save_alloc_info+0x40/0x58 [ 60.769094] __kasan_kmalloc+0xd4/0xd8 [ 60.772826] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.777339] kasan_atomics+0xb8/0x2e0 [ 60.780985] kunit_try_run_case+0x170/0x3f0 [ 60.785152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.790621] kthread+0x328/0x630 [ 60.793832] ret_from_fork+0x10/0x20 [ 60.797391] [ 60.798869] The buggy address belongs to the object at ffff000800c2d400 [ 60.798869] which belongs to the cache kmalloc-64 of size 64 [ 60.811194] The buggy address is located 0 bytes to the right of [ 60.811194] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 60.824040] [ 60.825516] The buggy address belongs to the physical page: [ 60.831072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 60.839059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.845568] page_type: f5(slab) [ 60.848700] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.856425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.864144] page dumped because: kasan: bad access detected [ 60.869699] [ 60.871175] Memory state around the buggy address: [ 60.875955] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.883158] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.890363] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.897564] ^ [ 60.902341] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.909546] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.916747] ================================================================== [ 49.357630] ================================================================== [ 49.364667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 49.371956] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 49.379333] [ 49.380816] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 49.380862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.380877] Hardware name: WinLink E850-96 board (DT) [ 49.380897] Call trace: [ 49.380908] show_stack+0x20/0x38 (C) [ 49.380941] dump_stack_lvl+0x8c/0xd0 [ 49.380975] print_report+0x118/0x608 [ 49.381003] kasan_report+0xdc/0x128 [ 49.381031] kasan_check_range+0x100/0x1a8 [ 49.381061] __kasan_check_write+0x20/0x30 [ 49.381094] kasan_atomics_helper+0x894/0x4858 [ 49.381123] kasan_atomics+0x198/0x2e0 [ 49.381149] kunit_try_run_case+0x170/0x3f0 [ 49.381184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.381221] kthread+0x328/0x630 [ 49.381251] ret_from_fork+0x10/0x20 [ 49.381283] [ 49.451034] Allocated by task 312: [ 49.454421] kasan_save_stack+0x3c/0x68 [ 49.458239] kasan_save_track+0x20/0x40 [ 49.462058] kasan_save_alloc_info+0x40/0x58 [ 49.466312] __kasan_kmalloc+0xd4/0xd8 [ 49.470044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.474558] kasan_atomics+0xb8/0x2e0 [ 49.478204] kunit_try_run_case+0x170/0x3f0 [ 49.482370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.487839] kthread+0x328/0x630 [ 49.491051] ret_from_fork+0x10/0x20 [ 49.494610] [ 49.496085] The buggy address belongs to the object at ffff000800c2d400 [ 49.496085] which belongs to the cache kmalloc-64 of size 64 [ 49.508412] The buggy address is located 0 bytes to the right of [ 49.508412] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 49.521259] [ 49.522735] The buggy address belongs to the physical page: [ 49.528291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 49.536279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.542786] page_type: f5(slab) [ 49.545919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.553643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.561362] page dumped because: kasan: bad access detected [ 49.566917] [ 49.568393] Memory state around the buggy address: [ 49.573173] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.580376] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.587581] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.594782] ^ [ 49.599560] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.606764] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.613966] ================================================================== [ 49.093862] ================================================================== [ 49.100956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 49.108245] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 49.115623] [ 49.117105] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 49.117149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.117166] Hardware name: WinLink E850-96 board (DT) [ 49.117183] Call trace: [ 49.117196] show_stack+0x20/0x38 (C) [ 49.117226] dump_stack_lvl+0x8c/0xd0 [ 49.117257] print_report+0x118/0x608 [ 49.117287] kasan_report+0xdc/0x128 [ 49.117314] kasan_check_range+0x100/0x1a8 [ 49.117347] __kasan_check_write+0x20/0x30 [ 49.117380] kasan_atomics_helper+0x7cc/0x4858 [ 49.117407] kasan_atomics+0x198/0x2e0 [ 49.117434] kunit_try_run_case+0x170/0x3f0 [ 49.117468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.117504] kthread+0x328/0x630 [ 49.117535] ret_from_fork+0x10/0x20 [ 49.117566] [ 49.187322] Allocated by task 312: [ 49.190709] kasan_save_stack+0x3c/0x68 [ 49.194528] kasan_save_track+0x20/0x40 [ 49.198347] kasan_save_alloc_info+0x40/0x58 [ 49.202600] __kasan_kmalloc+0xd4/0xd8 [ 49.206333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.210847] kasan_atomics+0xb8/0x2e0 [ 49.214493] kunit_try_run_case+0x170/0x3f0 [ 49.218659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.224127] kthread+0x328/0x630 [ 49.227339] ret_from_fork+0x10/0x20 [ 49.230899] [ 49.232374] The buggy address belongs to the object at ffff000800c2d400 [ 49.232374] which belongs to the cache kmalloc-64 of size 64 [ 49.244701] The buggy address is located 0 bytes to the right of [ 49.244701] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 49.257547] [ 49.259023] The buggy address belongs to the physical page: [ 49.264580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 49.272567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.279075] page_type: f5(slab) [ 49.282208] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.289932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.297651] page dumped because: kasan: bad access detected [ 49.303206] [ 49.304682] Memory state around the buggy address: [ 49.309461] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.316665] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.323869] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.331071] ^ [ 49.335849] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.343053] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.350255] ================================================================== [ 44.353258] ================================================================== [ 44.367351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 44.374722] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 44.382013] [ 44.383500] CPU: 5 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 44.383554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.383570] Hardware name: WinLink E850-96 board (DT) [ 44.383594] Call trace: [ 44.383607] show_stack+0x20/0x38 (C) [ 44.383640] dump_stack_lvl+0x8c/0xd0 [ 44.383678] print_report+0x118/0x608 [ 44.383712] kasan_report+0xdc/0x128 [ 44.383742] __asan_report_load4_noabort+0x20/0x30 [ 44.383779] kasan_atomics_helper+0x40a8/0x4858 [ 44.383810] kasan_atomics+0x198/0x2e0 [ 44.383840] kunit_try_run_case+0x170/0x3f0 [ 44.383878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.383918] kthread+0x328/0x630 [ 44.383956] ret_from_fork+0x10/0x20 [ 44.383993] [ 44.450416] Allocated by task 312: [ 44.453803] kasan_save_stack+0x3c/0x68 [ 44.457621] kasan_save_track+0x20/0x40 [ 44.461440] kasan_save_alloc_info+0x40/0x58 [ 44.465692] __kasan_kmalloc+0xd4/0xd8 [ 44.469425] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.473938] kasan_atomics+0xb8/0x2e0 [ 44.477584] kunit_try_run_case+0x170/0x3f0 [ 44.481751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.487221] kthread+0x328/0x630 [ 44.490431] ret_from_fork+0x10/0x20 [ 44.493990] [ 44.495469] The buggy address belongs to the object at ffff000800c2d400 [ 44.495469] which belongs to the cache kmalloc-64 of size 64 [ 44.507795] The buggy address is located 0 bytes to the right of [ 44.507795] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 44.520639] [ 44.522117] The buggy address belongs to the physical page: [ 44.527675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 44.535660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.542169] page_type: f5(slab) [ 44.545309] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 44.553024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.560745] page dumped because: kasan: bad access detected [ 44.566300] [ 44.567774] Memory state around the buggy address: [ 44.572556] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.579757] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.586963] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 44.594162] ^ [ 44.598941] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.606145] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.613348] ================================================================== [ 46.984209] ================================================================== [ 46.991263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 46.998554] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 47.005932] [ 47.007415] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 47.007459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.007476] Hardware name: WinLink E850-96 board (DT) [ 47.007497] Call trace: [ 47.007511] show_stack+0x20/0x38 (C) [ 47.007542] dump_stack_lvl+0x8c/0xd0 [ 47.007574] print_report+0x118/0x608 [ 47.007603] kasan_report+0xdc/0x128 [ 47.007631] kasan_check_range+0x100/0x1a8 [ 47.007664] __kasan_check_write+0x20/0x30 [ 47.007696] kasan_atomics_helper+0x47c/0x4858 [ 47.007724] kasan_atomics+0x198/0x2e0 [ 47.007752] kunit_try_run_case+0x170/0x3f0 [ 47.007784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.007822] kthread+0x328/0x630 [ 47.007855] ret_from_fork+0x10/0x20 [ 47.007889] [ 47.077632] Allocated by task 312: [ 47.081020] kasan_save_stack+0x3c/0x68 [ 47.084837] kasan_save_track+0x20/0x40 [ 47.088656] kasan_save_alloc_info+0x40/0x58 [ 47.092910] __kasan_kmalloc+0xd4/0xd8 [ 47.096642] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.101156] kasan_atomics+0xb8/0x2e0 [ 47.104802] kunit_try_run_case+0x170/0x3f0 [ 47.108969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.114437] kthread+0x328/0x630 [ 47.117649] ret_from_fork+0x10/0x20 [ 47.121208] [ 47.122686] The buggy address belongs to the object at ffff000800c2d400 [ 47.122686] which belongs to the cache kmalloc-64 of size 64 [ 47.135010] The buggy address is located 0 bytes to the right of [ 47.135010] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 47.147857] [ 47.149333] The buggy address belongs to the physical page: [ 47.154890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 47.162876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.169385] page_type: f5(slab) [ 47.172518] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.180241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.187960] page dumped because: kasan: bad access detected [ 47.193516] [ 47.194991] Memory state around the buggy address: [ 47.199771] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.206974] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.214179] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.221380] ^ [ 47.226158] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.233362] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.240564] ================================================================== [ 48.830174] ================================================================== [ 48.837243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 48.844533] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 48.851911] [ 48.853393] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 48.853441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.853458] Hardware name: WinLink E850-96 board (DT) [ 48.853477] Call trace: [ 48.853488] show_stack+0x20/0x38 (C) [ 48.853520] dump_stack_lvl+0x8c/0xd0 [ 48.853553] print_report+0x118/0x608 [ 48.853581] kasan_report+0xdc/0x128 [ 48.853609] kasan_check_range+0x100/0x1a8 [ 48.853639] __kasan_check_write+0x20/0x30 [ 48.853671] kasan_atomics_helper+0x760/0x4858 [ 48.853702] kasan_atomics+0x198/0x2e0 [ 48.853730] kunit_try_run_case+0x170/0x3f0 [ 48.853763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.853801] kthread+0x328/0x630 [ 48.853831] ret_from_fork+0x10/0x20 [ 48.853864] [ 48.923612] Allocated by task 312: [ 48.926997] kasan_save_stack+0x3c/0x68 [ 48.930816] kasan_save_track+0x20/0x40 [ 48.934635] kasan_save_alloc_info+0x40/0x58 [ 48.938889] __kasan_kmalloc+0xd4/0xd8 [ 48.942622] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.947135] kasan_atomics+0xb8/0x2e0 [ 48.950781] kunit_try_run_case+0x170/0x3f0 [ 48.954948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.960416] kthread+0x328/0x630 [ 48.963628] ret_from_fork+0x10/0x20 [ 48.967187] [ 48.968663] The buggy address belongs to the object at ffff000800c2d400 [ 48.968663] which belongs to the cache kmalloc-64 of size 64 [ 48.980989] The buggy address is located 0 bytes to the right of [ 48.980989] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 48.993836] [ 48.995314] The buggy address belongs to the physical page: [ 49.000871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 49.008855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.015363] page_type: f5(slab) [ 49.018496] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.026221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.033940] page dumped because: kasan: bad access detected [ 49.039495] [ 49.040971] Memory state around the buggy address: [ 49.045749] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.052954] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.060158] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.067359] ^ [ 49.072137] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.079342] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.086543] ================================================================== [ 55.396540] ================================================================== [ 55.403637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 55.410927] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 55.418306] [ 55.419788] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 55.419835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.419854] Hardware name: WinLink E850-96 board (DT) [ 55.419873] Call trace: [ 55.419886] show_stack+0x20/0x38 (C) [ 55.419916] dump_stack_lvl+0x8c/0xd0 [ 55.419948] print_report+0x118/0x608 [ 55.419976] kasan_report+0xdc/0x128 [ 55.420006] kasan_check_range+0x100/0x1a8 [ 55.420037] __kasan_check_write+0x20/0x30 [ 55.420072] kasan_atomics_helper+0xff0/0x4858 [ 55.420100] kasan_atomics+0x198/0x2e0 [ 55.420128] kunit_try_run_case+0x170/0x3f0 [ 55.420162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.420199] kthread+0x328/0x630 [ 55.420231] ret_from_fork+0x10/0x20 [ 55.420262] [ 55.490006] Allocated by task 312: [ 55.493393] kasan_save_stack+0x3c/0x68 [ 55.497211] kasan_save_track+0x20/0x40 [ 55.501030] kasan_save_alloc_info+0x40/0x58 [ 55.505283] __kasan_kmalloc+0xd4/0xd8 [ 55.509016] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.513530] kasan_atomics+0xb8/0x2e0 [ 55.517175] kunit_try_run_case+0x170/0x3f0 [ 55.521342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.526811] kthread+0x328/0x630 [ 55.530023] ret_from_fork+0x10/0x20 [ 55.533582] [ 55.535057] The buggy address belongs to the object at ffff000800c2d400 [ 55.535057] which belongs to the cache kmalloc-64 of size 64 [ 55.547384] The buggy address is located 0 bytes to the right of [ 55.547384] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 55.560230] [ 55.561706] The buggy address belongs to the physical page: [ 55.567263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 55.575250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.581759] page_type: f5(slab) [ 55.584892] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.592615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.600334] page dumped because: kasan: bad access detected [ 55.605889] [ 55.607365] Memory state around the buggy address: [ 55.612143] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.619348] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.626552] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.633754] ^ [ 55.638532] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.645736] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.652938] ================================================================== [ 45.672021] ================================================================== [ 45.679133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 45.686508] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 45.693799] [ 45.695284] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 45.695332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.695348] Hardware name: WinLink E850-96 board (DT) [ 45.695371] Call trace: [ 45.695386] show_stack+0x20/0x38 (C) [ 45.695418] dump_stack_lvl+0x8c/0xd0 [ 45.695453] print_report+0x118/0x608 [ 45.695484] kasan_report+0xdc/0x128 [ 45.695512] __asan_report_load4_noabort+0x20/0x30 [ 45.695547] kasan_atomics_helper+0x40fc/0x4858 [ 45.695576] kasan_atomics+0x198/0x2e0 [ 45.695606] kunit_try_run_case+0x170/0x3f0 [ 45.695641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.695677] kthread+0x328/0x630 [ 45.695708] ret_from_fork+0x10/0x20 [ 45.695741] [ 45.762200] Allocated by task 312: [ 45.765586] kasan_save_stack+0x3c/0x68 [ 45.769406] kasan_save_track+0x20/0x40 [ 45.773225] kasan_save_alloc_info+0x40/0x58 [ 45.777478] __kasan_kmalloc+0xd4/0xd8 [ 45.781211] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.785724] kasan_atomics+0xb8/0x2e0 [ 45.789370] kunit_try_run_case+0x170/0x3f0 [ 45.793537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.799006] kthread+0x328/0x630 [ 45.802217] ret_from_fork+0x10/0x20 [ 45.805776] [ 45.807253] The buggy address belongs to the object at ffff000800c2d400 [ 45.807253] which belongs to the cache kmalloc-64 of size 64 [ 45.819579] The buggy address is located 0 bytes to the right of [ 45.819579] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 45.832425] [ 45.833902] The buggy address belongs to the physical page: [ 45.839460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 45.847445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.853952] page_type: f5(slab) [ 45.857088] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.864810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.872528] page dumped because: kasan: bad access detected [ 45.878085] [ 45.879560] Memory state around the buggy address: [ 45.884339] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.891542] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.898747] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.905948] ^ [ 45.910726] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.917931] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.925132] ================================================================== [ 55.660301] ================================================================== [ 55.667349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 55.674726] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 55.682104] [ 55.683585] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 55.683632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.683646] Hardware name: WinLink E850-96 board (DT) [ 55.683665] Call trace: [ 55.683677] show_stack+0x20/0x38 (C) [ 55.683706] dump_stack_lvl+0x8c/0xd0 [ 55.683738] print_report+0x118/0x608 [ 55.683765] kasan_report+0xdc/0x128 [ 55.683793] kasan_check_range+0x100/0x1a8 [ 55.683823] __kasan_check_write+0x20/0x30 [ 55.683853] kasan_atomics_helper+0x1058/0x4858 [ 55.683882] kasan_atomics+0x198/0x2e0 [ 55.683909] kunit_try_run_case+0x170/0x3f0 [ 55.683943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.683981] kthread+0x328/0x630 [ 55.684013] ret_from_fork+0x10/0x20 [ 55.684045] [ 55.753891] Allocated by task 312: [ 55.757278] kasan_save_stack+0x3c/0x68 [ 55.761096] kasan_save_track+0x20/0x40 [ 55.764915] kasan_save_alloc_info+0x40/0x58 [ 55.769169] __kasan_kmalloc+0xd4/0xd8 [ 55.772901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.777415] kasan_atomics+0xb8/0x2e0 [ 55.781061] kunit_try_run_case+0x170/0x3f0 [ 55.785227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.790696] kthread+0x328/0x630 [ 55.793908] ret_from_fork+0x10/0x20 [ 55.797466] [ 55.798943] The buggy address belongs to the object at ffff000800c2d400 [ 55.798943] which belongs to the cache kmalloc-64 of size 64 [ 55.811269] The buggy address is located 0 bytes to the right of [ 55.811269] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 55.824115] [ 55.825591] The buggy address belongs to the physical page: [ 55.831149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 55.839136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.845643] page_type: f5(slab) [ 55.848776] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.856500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.864219] page dumped because: kasan: bad access detected [ 55.869774] [ 55.871250] Memory state around the buggy address: [ 55.876030] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.883233] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.890437] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.897639] ^ [ 55.902417] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.909621] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.916822] ================================================================== [ 55.924168] ================================================================== [ 55.931234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 55.938611] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 55.945989] [ 55.947472] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 55.947517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.947535] Hardware name: WinLink E850-96 board (DT) [ 55.947553] Call trace: [ 55.947565] show_stack+0x20/0x38 (C) [ 55.947596] dump_stack_lvl+0x8c/0xd0 [ 55.947630] print_report+0x118/0x608 [ 55.947658] kasan_report+0xdc/0x128 [ 55.947686] kasan_check_range+0x100/0x1a8 [ 55.947718] __kasan_check_write+0x20/0x30 [ 55.947749] kasan_atomics_helper+0x10c0/0x4858 [ 55.947779] kasan_atomics+0x198/0x2e0 [ 55.947807] kunit_try_run_case+0x170/0x3f0 [ 55.947840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.947876] kthread+0x328/0x630 [ 55.947908] ret_from_fork+0x10/0x20 [ 55.947940] [ 56.017776] Allocated by task 312: [ 56.021163] kasan_save_stack+0x3c/0x68 [ 56.024981] kasan_save_track+0x20/0x40 [ 56.028800] kasan_save_alloc_info+0x40/0x58 [ 56.033054] __kasan_kmalloc+0xd4/0xd8 [ 56.036786] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.041300] kasan_atomics+0xb8/0x2e0 [ 56.044945] kunit_try_run_case+0x170/0x3f0 [ 56.049112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.054581] kthread+0x328/0x630 [ 56.057793] ret_from_fork+0x10/0x20 [ 56.061351] [ 56.062827] The buggy address belongs to the object at ffff000800c2d400 [ 56.062827] which belongs to the cache kmalloc-64 of size 64 [ 56.075154] The buggy address is located 0 bytes to the right of [ 56.075154] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 56.088000] [ 56.089476] The buggy address belongs to the physical page: [ 56.095032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 56.103021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.109529] page_type: f5(slab) [ 56.112662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.120385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.128104] page dumped because: kasan: bad access detected [ 56.133659] [ 56.135135] Memory state around the buggy address: [ 56.139915] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.147118] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.154322] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.161524] ^ [ 56.166302] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.173506] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.180707] ================================================================== [ 46.196236] ================================================================== [ 46.203256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 46.210632] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 46.218010] [ 46.219492] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 46.219541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.219559] Hardware name: WinLink E850-96 board (DT) [ 46.219579] Call trace: [ 46.219593] show_stack+0x20/0x38 (C) [ 46.219629] dump_stack_lvl+0x8c/0xd0 [ 46.219661] print_report+0x118/0x608 [ 46.219694] kasan_report+0xdc/0x128 [ 46.219722] __asan_report_store4_noabort+0x20/0x30 [ 46.219754] kasan_atomics_helper+0x3f94/0x4858 [ 46.219785] kasan_atomics+0x198/0x2e0 [ 46.219813] kunit_try_run_case+0x170/0x3f0 [ 46.219846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.219883] kthread+0x328/0x630 [ 46.219913] ret_from_fork+0x10/0x20 [ 46.219945] [ 46.286500] Allocated by task 312: [ 46.289884] kasan_save_stack+0x3c/0x68 [ 46.293703] kasan_save_track+0x20/0x40 [ 46.297523] kasan_save_alloc_info+0x40/0x58 [ 46.301776] __kasan_kmalloc+0xd4/0xd8 [ 46.305508] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.310022] kasan_atomics+0xb8/0x2e0 [ 46.313668] kunit_try_run_case+0x170/0x3f0 [ 46.317835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.323303] kthread+0x328/0x630 [ 46.326515] ret_from_fork+0x10/0x20 [ 46.330074] [ 46.331551] The buggy address belongs to the object at ffff000800c2d400 [ 46.331551] which belongs to the cache kmalloc-64 of size 64 [ 46.343876] The buggy address is located 0 bytes to the right of [ 46.343876] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 46.356723] [ 46.358200] The buggy address belongs to the physical page: [ 46.363758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 46.371742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.378250] page_type: f5(slab) [ 46.381383] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.389107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.396826] page dumped because: kasan: bad access detected [ 46.402382] [ 46.403857] Memory state around the buggy address: [ 46.408635] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.415840] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.423045] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.430246] ^ [ 46.435024] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.442229] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.449430] ================================================================== [ 53.820699] ================================================================== [ 53.827794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 53.835170] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 53.842461] [ 53.843943] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 53.843992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.844007] Hardware name: WinLink E850-96 board (DT) [ 53.844025] Call trace: [ 53.844037] show_stack+0x20/0x38 (C) [ 53.844067] dump_stack_lvl+0x8c/0xd0 [ 53.844096] print_report+0x118/0x608 [ 53.844128] kasan_report+0xdc/0x128 [ 53.844158] __asan_report_load8_noabort+0x20/0x30 [ 53.844190] kasan_atomics_helper+0x3f58/0x4858 [ 53.844219] kasan_atomics+0x198/0x2e0 [ 53.844247] kunit_try_run_case+0x170/0x3f0 [ 53.844281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.844320] kthread+0x328/0x630 [ 53.844352] ret_from_fork+0x10/0x20 [ 53.844385] [ 53.910863] Allocated by task 312: [ 53.914250] kasan_save_stack+0x3c/0x68 [ 53.918067] kasan_save_track+0x20/0x40 [ 53.921887] kasan_save_alloc_info+0x40/0x58 [ 53.926141] __kasan_kmalloc+0xd4/0xd8 [ 53.929873] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.934387] kasan_atomics+0xb8/0x2e0 [ 53.938033] kunit_try_run_case+0x170/0x3f0 [ 53.942199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.947668] kthread+0x328/0x630 [ 53.950879] ret_from_fork+0x10/0x20 [ 53.954439] [ 53.955914] The buggy address belongs to the object at ffff000800c2d400 [ 53.955914] which belongs to the cache kmalloc-64 of size 64 [ 53.968241] The buggy address is located 0 bytes to the right of [ 53.968241] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 53.981087] [ 53.982564] The buggy address belongs to the physical page: [ 53.988120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 53.996107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.002615] page_type: f5(slab) [ 54.005748] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.013472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.021193] page dumped because: kasan: bad access detected [ 54.026746] [ 54.028222] Memory state around the buggy address: [ 54.033000] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.040205] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.047410] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.054611] ^ [ 54.059388] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.066593] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.073794] ================================================================== [ 47.247916] ================================================================== [ 47.254976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 47.262265] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 47.269643] [ 47.271126] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 47.271173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.271192] Hardware name: WinLink E850-96 board (DT) [ 47.271212] Call trace: [ 47.271225] show_stack+0x20/0x38 (C) [ 47.271257] dump_stack_lvl+0x8c/0xd0 [ 47.271290] print_report+0x118/0x608 [ 47.271319] kasan_report+0xdc/0x128 [ 47.271347] kasan_check_range+0x100/0x1a8 [ 47.271381] __kasan_check_write+0x20/0x30 [ 47.271414] kasan_atomics_helper+0x4e4/0x4858 [ 47.271443] kasan_atomics+0x198/0x2e0 [ 47.271471] kunit_try_run_case+0x170/0x3f0 [ 47.271505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.271541] kthread+0x328/0x630 [ 47.271573] ret_from_fork+0x10/0x20 [ 47.271605] [ 47.341344] Allocated by task 312: [ 47.344731] kasan_save_stack+0x3c/0x68 [ 47.348548] kasan_save_track+0x20/0x40 [ 47.352368] kasan_save_alloc_info+0x40/0x58 [ 47.356621] __kasan_kmalloc+0xd4/0xd8 [ 47.360354] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.364868] kasan_atomics+0xb8/0x2e0 [ 47.368513] kunit_try_run_case+0x170/0x3f0 [ 47.372680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.378148] kthread+0x328/0x630 [ 47.381360] ret_from_fork+0x10/0x20 [ 47.384919] [ 47.386395] The buggy address belongs to the object at ffff000800c2d400 [ 47.386395] which belongs to the cache kmalloc-64 of size 64 [ 47.398722] The buggy address is located 0 bytes to the right of [ 47.398722] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 47.411568] [ 47.413044] The buggy address belongs to the physical page: [ 47.418600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 47.426589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.433096] page_type: f5(slab) [ 47.436230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.443953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.451672] page dumped because: kasan: bad access detected [ 47.457227] [ 47.458703] Memory state around the buggy address: [ 47.463481] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.470686] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.477890] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.485091] ^ [ 47.489869] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.497074] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.504275] ================================================================== [ 48.039046] ================================================================== [ 48.046110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 48.053399] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 48.060777] [ 48.062258] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 48.062307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.062324] Hardware name: WinLink E850-96 board (DT) [ 48.062343] Call trace: [ 48.062358] show_stack+0x20/0x38 (C) [ 48.062389] dump_stack_lvl+0x8c/0xd0 [ 48.062421] print_report+0x118/0x608 [ 48.062451] kasan_report+0xdc/0x128 [ 48.062479] kasan_check_range+0x100/0x1a8 [ 48.062510] __kasan_check_write+0x20/0x30 [ 48.062543] kasan_atomics_helper+0x61c/0x4858 [ 48.062571] kasan_atomics+0x198/0x2e0 [ 48.062598] kunit_try_run_case+0x170/0x3f0 [ 48.062632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.062670] kthread+0x328/0x630 [ 48.062702] ret_from_fork+0x10/0x20 [ 48.062733] [ 48.132477] Allocated by task 312: [ 48.135864] kasan_save_stack+0x3c/0x68 [ 48.139682] kasan_save_track+0x20/0x40 [ 48.143502] kasan_save_alloc_info+0x40/0x58 [ 48.147755] __kasan_kmalloc+0xd4/0xd8 [ 48.151488] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.156001] kasan_atomics+0xb8/0x2e0 [ 48.159647] kunit_try_run_case+0x170/0x3f0 [ 48.163814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.169282] kthread+0x328/0x630 [ 48.172494] ret_from_fork+0x10/0x20 [ 48.176053] [ 48.177529] The buggy address belongs to the object at ffff000800c2d400 [ 48.177529] which belongs to the cache kmalloc-64 of size 64 [ 48.189855] The buggy address is located 0 bytes to the right of [ 48.189855] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 48.202702] [ 48.204178] The buggy address belongs to the physical page: [ 48.209734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 48.217721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.224229] page_type: f5(slab) [ 48.227362] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.235087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.242806] page dumped because: kasan: bad access detected [ 48.248361] [ 48.249837] Memory state around the buggy address: [ 48.254615] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.261820] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.269024] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.276225] ^ [ 48.281003] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.288208] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.295409] ================================================================== [ 56.979677] ================================================================== [ 56.986775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 56.994150] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 57.001528] [ 57.003012] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 57.003058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.003077] Hardware name: WinLink E850-96 board (DT) [ 57.003096] Call trace: [ 57.003109] show_stack+0x20/0x38 (C) [ 57.003140] dump_stack_lvl+0x8c/0xd0 [ 57.003171] print_report+0x118/0x608 [ 57.003201] kasan_report+0xdc/0x128 [ 57.003228] kasan_check_range+0x100/0x1a8 [ 57.003259] __kasan_check_write+0x20/0x30 [ 57.003290] kasan_atomics_helper+0x126c/0x4858 [ 57.003318] kasan_atomics+0x198/0x2e0 [ 57.003345] kunit_try_run_case+0x170/0x3f0 [ 57.003378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.003416] kthread+0x328/0x630 [ 57.003448] ret_from_fork+0x10/0x20 [ 57.003482] [ 57.073315] Allocated by task 312: [ 57.076702] kasan_save_stack+0x3c/0x68 [ 57.080520] kasan_save_track+0x20/0x40 [ 57.084340] kasan_save_alloc_info+0x40/0x58 [ 57.088593] __kasan_kmalloc+0xd4/0xd8 [ 57.092326] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.096840] kasan_atomics+0xb8/0x2e0 [ 57.100485] kunit_try_run_case+0x170/0x3f0 [ 57.104652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.110120] kthread+0x328/0x630 [ 57.113332] ret_from_fork+0x10/0x20 [ 57.116891] [ 57.118367] The buggy address belongs to the object at ffff000800c2d400 [ 57.118367] which belongs to the cache kmalloc-64 of size 64 [ 57.130693] The buggy address is located 0 bytes to the right of [ 57.130693] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 57.143540] [ 57.145016] The buggy address belongs to the physical page: [ 57.150575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 57.158559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.165069] page_type: f5(slab) [ 57.168200] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.175924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.183644] page dumped because: kasan: bad access detected [ 57.189199] [ 57.190674] Memory state around the buggy address: [ 57.195454] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.202657] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.209862] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.217063] ^ [ 57.221841] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.229046] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.236247] ================================================================== [ 57.771386] ================================================================== [ 57.778429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 57.785805] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 57.793096] [ 57.794579] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 57.794627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.794642] Hardware name: WinLink E850-96 board (DT) [ 57.794664] Call trace: [ 57.794677] show_stack+0x20/0x38 (C) [ 57.794707] dump_stack_lvl+0x8c/0xd0 [ 57.794739] print_report+0x118/0x608 [ 57.794766] kasan_report+0xdc/0x128 [ 57.794794] __asan_report_load8_noabort+0x20/0x30 [ 57.794829] kasan_atomics_helper+0x3f04/0x4858 [ 57.794858] kasan_atomics+0x198/0x2e0 [ 57.794885] kunit_try_run_case+0x170/0x3f0 [ 57.794917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.794956] kthread+0x328/0x630 [ 57.794992] ret_from_fork+0x10/0x20 [ 57.795024] [ 57.861498] Allocated by task 312: [ 57.864885] kasan_save_stack+0x3c/0x68 [ 57.868703] kasan_save_track+0x20/0x40 [ 57.872522] kasan_save_alloc_info+0x40/0x58 [ 57.876776] __kasan_kmalloc+0xd4/0xd8 [ 57.880508] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.885022] kasan_atomics+0xb8/0x2e0 [ 57.888667] kunit_try_run_case+0x170/0x3f0 [ 57.892834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.898303] kthread+0x328/0x630 [ 57.901515] ret_from_fork+0x10/0x20 [ 57.905074] [ 57.906549] The buggy address belongs to the object at ffff000800c2d400 [ 57.906549] which belongs to the cache kmalloc-64 of size 64 [ 57.918876] The buggy address is located 0 bytes to the right of [ 57.918876] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 57.931722] [ 57.933200] The buggy address belongs to the physical page: [ 57.938754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 57.946742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.953250] page_type: f5(slab) [ 57.956383] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.964107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.971826] page dumped because: kasan: bad access detected [ 57.977382] [ 57.978857] Memory state around the buggy address: [ 57.983637] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.990840] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.998045] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.005246] ^ [ 58.010024] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.017229] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.024430] ================================================================== [ 60.924118] ================================================================== [ 60.931158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 60.938535] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 60.945827] [ 60.947309] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 60.947358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.947374] Hardware name: WinLink E850-96 board (DT) [ 60.947393] Call trace: [ 60.947406] show_stack+0x20/0x38 (C) [ 60.947438] dump_stack_lvl+0x8c/0xd0 [ 60.947470] print_report+0x118/0x608 [ 60.947498] kasan_report+0xdc/0x128 [ 60.947526] __asan_report_load8_noabort+0x20/0x30 [ 60.947560] kasan_atomics_helper+0x3e20/0x4858 [ 60.947591] kasan_atomics+0x198/0x2e0 [ 60.947618] kunit_try_run_case+0x170/0x3f0 [ 60.947651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.947690] kthread+0x328/0x630 [ 60.947722] ret_from_fork+0x10/0x20 [ 60.947757] [ 61.014229] Allocated by task 312: [ 61.017616] kasan_save_stack+0x3c/0x68 [ 61.021433] kasan_save_track+0x20/0x40 [ 61.025253] kasan_save_alloc_info+0x40/0x58 [ 61.029506] __kasan_kmalloc+0xd4/0xd8 [ 61.033239] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.037753] kasan_atomics+0xb8/0x2e0 [ 61.041398] kunit_try_run_case+0x170/0x3f0 [ 61.045565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.051033] kthread+0x328/0x630 [ 61.054245] ret_from_fork+0x10/0x20 [ 61.057805] [ 61.059280] The buggy address belongs to the object at ffff000800c2d400 [ 61.059280] which belongs to the cache kmalloc-64 of size 64 [ 61.071607] The buggy address is located 0 bytes to the right of [ 61.071607] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 61.084453] [ 61.085929] The buggy address belongs to the physical page: [ 61.091485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 61.099472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.105980] page_type: f5(slab) [ 61.109115] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.116838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.124557] page dumped because: kasan: bad access detected [ 61.130112] [ 61.131588] Memory state around the buggy address: [ 61.136367] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.143571] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.150775] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.157976] ^ [ 61.162754] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.169959] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.177160] ================================================================== [ 52.248527] ================================================================== [ 52.255594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 52.262971] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 52.270262] [ 52.271746] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 52.271793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.271810] Hardware name: WinLink E850-96 board (DT) [ 52.271829] Call trace: [ 52.271843] show_stack+0x20/0x38 (C) [ 52.271873] dump_stack_lvl+0x8c/0xd0 [ 52.271904] print_report+0x118/0x608 [ 52.271935] kasan_report+0xdc/0x128 [ 52.271964] __asan_report_load4_noabort+0x20/0x30 [ 52.271998] kasan_atomics_helper+0x3de4/0x4858 [ 52.272028] kasan_atomics+0x198/0x2e0 [ 52.272058] kunit_try_run_case+0x170/0x3f0 [ 52.272092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.272131] kthread+0x328/0x630 [ 52.272161] ret_from_fork+0x10/0x20 [ 52.272191] [ 52.338664] Allocated by task 312: [ 52.342051] kasan_save_stack+0x3c/0x68 [ 52.345869] kasan_save_track+0x20/0x40 [ 52.349689] kasan_save_alloc_info+0x40/0x58 [ 52.353942] __kasan_kmalloc+0xd4/0xd8 [ 52.357674] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.362188] kasan_atomics+0xb8/0x2e0 [ 52.365834] kunit_try_run_case+0x170/0x3f0 [ 52.370001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.375469] kthread+0x328/0x630 [ 52.378681] ret_from_fork+0x10/0x20 [ 52.382240] [ 52.383716] The buggy address belongs to the object at ffff000800c2d400 [ 52.383716] which belongs to the cache kmalloc-64 of size 64 [ 52.396042] The buggy address is located 0 bytes to the right of [ 52.396042] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 52.408889] [ 52.410365] The buggy address belongs to the physical page: [ 52.415921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 52.423908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.430416] page_type: f5(slab) [ 52.433549] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.441274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.448993] page dumped because: kasan: bad access detected [ 52.454548] [ 52.456023] Memory state around the buggy address: [ 52.460803] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.468006] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.475211] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.482412] ^ [ 52.487190] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.494395] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.501596] ================================================================== [ 51.984792] ================================================================== [ 51.991883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 51.999173] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 52.006551] [ 52.008034] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 52.008084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.008099] Hardware name: WinLink E850-96 board (DT) [ 52.008117] Call trace: [ 52.008130] show_stack+0x20/0x38 (C) [ 52.008161] dump_stack_lvl+0x8c/0xd0 [ 52.008193] print_report+0x118/0x608 [ 52.008222] kasan_report+0xdc/0x128 [ 52.008252] kasan_check_range+0x100/0x1a8 [ 52.008284] __kasan_check_write+0x20/0x30 [ 52.008314] kasan_atomics_helper+0xc08/0x4858 [ 52.008343] kasan_atomics+0x198/0x2e0 [ 52.008372] kunit_try_run_case+0x170/0x3f0 [ 52.008406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.008444] kthread+0x328/0x630 [ 52.008475] ret_from_fork+0x10/0x20 [ 52.008507] [ 52.078251] Allocated by task 312: [ 52.081639] kasan_save_stack+0x3c/0x68 [ 52.085456] kasan_save_track+0x20/0x40 [ 52.089276] kasan_save_alloc_info+0x40/0x58 [ 52.093529] __kasan_kmalloc+0xd4/0xd8 [ 52.097262] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.101776] kasan_atomics+0xb8/0x2e0 [ 52.105421] kunit_try_run_case+0x170/0x3f0 [ 52.109588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.115056] kthread+0x328/0x630 [ 52.118268] ret_from_fork+0x10/0x20 [ 52.121827] [ 52.123303] The buggy address belongs to the object at ffff000800c2d400 [ 52.123303] which belongs to the cache kmalloc-64 of size 64 [ 52.135629] The buggy address is located 0 bytes to the right of [ 52.135629] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 52.148476] [ 52.149952] The buggy address belongs to the physical page: [ 52.155508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 52.163495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.170004] page_type: f5(slab) [ 52.173138] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.180861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.188580] page dumped because: kasan: bad access detected [ 52.194135] [ 52.195611] Memory state around the buggy address: [ 52.200390] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.207593] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.214798] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.221999] ^ [ 52.226777] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.233982] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.241183] ================================================================== [ 58.295653] ================================================================== [ 58.302726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 58.310103] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 58.317481] [ 58.318964] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 58.319011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.319025] Hardware name: WinLink E850-96 board (DT) [ 58.319042] Call trace: [ 58.319056] show_stack+0x20/0x38 (C) [ 58.319085] dump_stack_lvl+0x8c/0xd0 [ 58.319116] print_report+0x118/0x608 [ 58.319145] kasan_report+0xdc/0x128 [ 58.319172] kasan_check_range+0x100/0x1a8 [ 58.319203] __kasan_check_write+0x20/0x30 [ 58.319234] kasan_atomics_helper+0x147c/0x4858 [ 58.319264] kasan_atomics+0x198/0x2e0 [ 58.319290] kunit_try_run_case+0x170/0x3f0 [ 58.319323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.319361] kthread+0x328/0x630 [ 58.319392] ret_from_fork+0x10/0x20 [ 58.319427] [ 58.389268] Allocated by task 312: [ 58.392655] kasan_save_stack+0x3c/0x68 [ 58.396473] kasan_save_track+0x20/0x40 [ 58.400292] kasan_save_alloc_info+0x40/0x58 [ 58.404545] __kasan_kmalloc+0xd4/0xd8 [ 58.408278] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.412792] kasan_atomics+0xb8/0x2e0 [ 58.416437] kunit_try_run_case+0x170/0x3f0 [ 58.420604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.426073] kthread+0x328/0x630 [ 58.429285] ret_from_fork+0x10/0x20 [ 58.432844] [ 58.434319] The buggy address belongs to the object at ffff000800c2d400 [ 58.434319] which belongs to the cache kmalloc-64 of size 64 [ 58.446646] The buggy address is located 0 bytes to the right of [ 58.446646] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 58.459492] [ 58.460969] The buggy address belongs to the physical page: [ 58.466525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 58.474511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.481020] page_type: f5(slab) [ 58.484154] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.491877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.499596] page dumped because: kasan: bad access detected [ 58.505151] [ 58.506627] Memory state around the buggy address: [ 58.511406] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.518610] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.525815] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.533016] ^ [ 58.537794] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.544998] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.552200] ================================================================== [ 51.200308] ================================================================== [ 51.207346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 51.214723] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 51.222014] [ 51.223497] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 51.223549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.223563] Hardware name: WinLink E850-96 board (DT) [ 51.223584] Call trace: [ 51.223597] show_stack+0x20/0x38 (C) [ 51.223626] dump_stack_lvl+0x8c/0xd0 [ 51.223660] print_report+0x118/0x608 [ 51.223691] kasan_report+0xdc/0x128 [ 51.223720] __asan_report_load4_noabort+0x20/0x30 [ 51.223753] kasan_atomics_helper+0x3dcc/0x4858 [ 51.223785] kasan_atomics+0x198/0x2e0 [ 51.223811] kunit_try_run_case+0x170/0x3f0 [ 51.223844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.223883] kthread+0x328/0x630 [ 51.223916] ret_from_fork+0x10/0x20 [ 51.223948] [ 51.290416] Allocated by task 312: [ 51.293803] kasan_save_stack+0x3c/0x68 [ 51.297621] kasan_save_track+0x20/0x40 [ 51.301440] kasan_save_alloc_info+0x40/0x58 [ 51.305694] __kasan_kmalloc+0xd4/0xd8 [ 51.309426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.313940] kasan_atomics+0xb8/0x2e0 [ 51.317586] kunit_try_run_case+0x170/0x3f0 [ 51.321752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.327221] kthread+0x328/0x630 [ 51.330433] ret_from_fork+0x10/0x20 [ 51.333992] [ 51.335467] The buggy address belongs to the object at ffff000800c2d400 [ 51.335467] which belongs to the cache kmalloc-64 of size 64 [ 51.347794] The buggy address is located 0 bytes to the right of [ 51.347794] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 51.360641] [ 51.362117] The buggy address belongs to the physical page: [ 51.367672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 51.375660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.382168] page_type: f5(slab) [ 51.385304] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.393025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.400744] page dumped because: kasan: bad access detected [ 51.406300] [ 51.407776] Memory state around the buggy address: [ 51.412555] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.419758] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.426963] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.434164] ^ [ 51.438942] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.446147] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.453348] ================================================================== [ 51.460695] ================================================================== [ 51.467759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 51.475049] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 51.482427] [ 51.483910] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 51.483961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.483977] Hardware name: WinLink E850-96 board (DT) [ 51.483996] Call trace: [ 51.484010] show_stack+0x20/0x38 (C) [ 51.484042] dump_stack_lvl+0x8c/0xd0 [ 51.484071] print_report+0x118/0x608 [ 51.484100] kasan_report+0xdc/0x128 [ 51.484128] kasan_check_range+0x100/0x1a8 [ 51.484159] __kasan_check_write+0x20/0x30 [ 51.484191] kasan_atomics_helper+0xb70/0x4858 [ 51.484221] kasan_atomics+0x198/0x2e0 [ 51.484249] kunit_try_run_case+0x170/0x3f0 [ 51.484283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.484322] kthread+0x328/0x630 [ 51.484353] ret_from_fork+0x10/0x20 [ 51.484386] [ 51.554127] Allocated by task 312: [ 51.557515] kasan_save_stack+0x3c/0x68 [ 51.561332] kasan_save_track+0x20/0x40 [ 51.565152] kasan_save_alloc_info+0x40/0x58 [ 51.569405] __kasan_kmalloc+0xd4/0xd8 [ 51.573138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.577651] kasan_atomics+0xb8/0x2e0 [ 51.581297] kunit_try_run_case+0x170/0x3f0 [ 51.585464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.590933] kthread+0x328/0x630 [ 51.594144] ret_from_fork+0x10/0x20 [ 51.597703] [ 51.599180] The buggy address belongs to the object at ffff000800c2d400 [ 51.599180] which belongs to the cache kmalloc-64 of size 64 [ 51.611506] The buggy address is located 0 bytes to the right of [ 51.611506] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 51.624352] [ 51.625828] The buggy address belongs to the physical page: [ 51.631385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 51.639371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.645879] page_type: f5(slab) [ 51.649014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.656737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.664456] page dumped because: kasan: bad access detected [ 51.670011] [ 51.671487] Memory state around the buggy address: [ 51.676266] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.683469] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.690674] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.697875] ^ [ 51.702653] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.709858] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.717059] ================================================================== [ 58.823436] ================================================================== [ 58.830495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 58.837873] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 58.845251] [ 58.846734] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 58.846781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.846796] Hardware name: WinLink E850-96 board (DT) [ 58.846813] Call trace: [ 58.846826] show_stack+0x20/0x38 (C) [ 58.846859] dump_stack_lvl+0x8c/0xd0 [ 58.846892] print_report+0x118/0x608 [ 58.846920] kasan_report+0xdc/0x128 [ 58.846948] kasan_check_range+0x100/0x1a8 [ 58.846978] __kasan_check_write+0x20/0x30 [ 58.847009] kasan_atomics_helper+0x154c/0x4858 [ 58.847040] kasan_atomics+0x198/0x2e0 [ 58.847064] kunit_try_run_case+0x170/0x3f0 [ 58.847095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.847130] kthread+0x328/0x630 [ 58.847163] ret_from_fork+0x10/0x20 [ 58.847194] [ 58.917038] Allocated by task 312: [ 58.920425] kasan_save_stack+0x3c/0x68 [ 58.924243] kasan_save_track+0x20/0x40 [ 58.928062] kasan_save_alloc_info+0x40/0x58 [ 58.932315] __kasan_kmalloc+0xd4/0xd8 [ 58.936048] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.940562] kasan_atomics+0xb8/0x2e0 [ 58.944208] kunit_try_run_case+0x170/0x3f0 [ 58.948374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.953842] kthread+0x328/0x630 [ 58.957055] ret_from_fork+0x10/0x20 [ 58.960614] [ 58.962089] The buggy address belongs to the object at ffff000800c2d400 [ 58.962089] which belongs to the cache kmalloc-64 of size 64 [ 58.974416] The buggy address is located 0 bytes to the right of [ 58.974416] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 58.987263] [ 58.988738] The buggy address belongs to the physical page: [ 58.994294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 59.002282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.008790] page_type: f5(slab) [ 59.011922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.019647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.027366] page dumped because: kasan: bad access detected [ 59.032921] [ 59.034397] Memory state around the buggy address: [ 59.039176] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.046380] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.053585] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.060786] ^ [ 59.065563] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.072768] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.079969] ================================================================== [ 53.296783] ================================================================== [ 53.303844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 53.311219] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 53.318511] [ 53.319993] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 53.320036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.320052] Hardware name: WinLink E850-96 board (DT) [ 53.320073] Call trace: [ 53.320085] show_stack+0x20/0x38 (C) [ 53.320118] dump_stack_lvl+0x8c/0xd0 [ 53.320149] print_report+0x118/0x608 [ 53.320178] kasan_report+0xdc/0x128 [ 53.320206] __asan_report_load4_noabort+0x20/0x30 [ 53.320239] kasan_atomics_helper+0x3e04/0x4858 [ 53.320269] kasan_atomics+0x198/0x2e0 [ 53.320297] kunit_try_run_case+0x170/0x3f0 [ 53.320328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.320367] kthread+0x328/0x630 [ 53.320397] ret_from_fork+0x10/0x20 [ 53.320426] [ 53.386912] Allocated by task 312: [ 53.390299] kasan_save_stack+0x3c/0x68 [ 53.394117] kasan_save_track+0x20/0x40 [ 53.397937] kasan_save_alloc_info+0x40/0x58 [ 53.402190] __kasan_kmalloc+0xd4/0xd8 [ 53.405923] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.410436] kasan_atomics+0xb8/0x2e0 [ 53.414082] kunit_try_run_case+0x170/0x3f0 [ 53.418249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.423717] kthread+0x328/0x630 [ 53.426929] ret_from_fork+0x10/0x20 [ 53.430488] [ 53.431964] The buggy address belongs to the object at ffff000800c2d400 [ 53.431964] which belongs to the cache kmalloc-64 of size 64 [ 53.444290] The buggy address is located 0 bytes to the right of [ 53.444290] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 53.457137] [ 53.458613] The buggy address belongs to the physical page: [ 53.464171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 53.472156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.478665] page_type: f5(slab) [ 53.481799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.489522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.497241] page dumped because: kasan: bad access detected [ 53.502796] [ 53.504272] Memory state around the buggy address: [ 53.509050] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.516254] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.523459] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.530660] ^ [ 53.535438] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.542643] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.549844] ================================================================== [ 45.144774] ================================================================== [ 45.151883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 45.159172] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 45.166550] [ 45.168035] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 45.168089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.168108] Hardware name: WinLink E850-96 board (DT) [ 45.168129] Call trace: [ 45.168145] show_stack+0x20/0x38 (C) [ 45.168176] dump_stack_lvl+0x8c/0xd0 [ 45.168214] print_report+0x118/0x608 [ 45.168246] kasan_report+0xdc/0x128 [ 45.168275] kasan_check_range+0x100/0x1a8 [ 45.168308] __kasan_check_write+0x20/0x30 [ 45.168341] kasan_atomics_helper+0x24c/0x4858 [ 45.168372] kasan_atomics+0x198/0x2e0 [ 45.168400] kunit_try_run_case+0x170/0x3f0 [ 45.168433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.168472] kthread+0x328/0x630 [ 45.168505] ret_from_fork+0x10/0x20 [ 45.168540] [ 45.238250] Allocated by task 312: [ 45.241636] kasan_save_stack+0x3c/0x68 [ 45.245455] kasan_save_track+0x20/0x40 [ 45.249274] kasan_save_alloc_info+0x40/0x58 [ 45.253528] __kasan_kmalloc+0xd4/0xd8 [ 45.257260] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.261774] kasan_atomics+0xb8/0x2e0 [ 45.265420] kunit_try_run_case+0x170/0x3f0 [ 45.269587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.275055] kthread+0x328/0x630 [ 45.278267] ret_from_fork+0x10/0x20 [ 45.281826] [ 45.283303] The buggy address belongs to the object at ffff000800c2d400 [ 45.283303] which belongs to the cache kmalloc-64 of size 64 [ 45.295630] The buggy address is located 0 bytes to the right of [ 45.295630] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 45.308475] [ 45.309952] The buggy address belongs to the physical page: [ 45.315509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 45.323495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.330004] page_type: f5(slab) [ 45.333136] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.340859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.348578] page dumped because: kasan: bad access detected [ 45.354133] [ 45.355609] Memory state around the buggy address: [ 45.360389] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.367592] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.374797] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.381998] ^ [ 45.386776] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.393980] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.401182] ================================================================== [ 50.145438] ================================================================== [ 50.152502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 50.159791] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 50.167169] [ 50.168652] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 50.168697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.168713] Hardware name: WinLink E850-96 board (DT) [ 50.168734] Call trace: [ 50.168747] show_stack+0x20/0x38 (C) [ 50.168778] dump_stack_lvl+0x8c/0xd0 [ 50.168809] print_report+0x118/0x608 [ 50.168837] kasan_report+0xdc/0x128 [ 50.168867] kasan_check_range+0x100/0x1a8 [ 50.168897] __kasan_check_write+0x20/0x30 [ 50.168929] kasan_atomics_helper+0x99c/0x4858 [ 50.168959] kasan_atomics+0x198/0x2e0 [ 50.168986] kunit_try_run_case+0x170/0x3f0 [ 50.169021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.169060] kthread+0x328/0x630 [ 50.169090] ret_from_fork+0x10/0x20 [ 50.169122] [ 50.238869] Allocated by task 312: [ 50.242256] kasan_save_stack+0x3c/0x68 [ 50.246074] kasan_save_track+0x20/0x40 [ 50.249894] kasan_save_alloc_info+0x40/0x58 [ 50.254147] __kasan_kmalloc+0xd4/0xd8 [ 50.257880] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.262394] kasan_atomics+0xb8/0x2e0 [ 50.266039] kunit_try_run_case+0x170/0x3f0 [ 50.270206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.275675] kthread+0x328/0x630 [ 50.278886] ret_from_fork+0x10/0x20 [ 50.282445] [ 50.283921] The buggy address belongs to the object at ffff000800c2d400 [ 50.283921] which belongs to the cache kmalloc-64 of size 64 [ 50.296248] The buggy address is located 0 bytes to the right of [ 50.296248] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 50.309094] [ 50.310570] The buggy address belongs to the physical page: [ 50.316126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 50.324113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.330622] page_type: f5(slab) [ 50.333756] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.341479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.349198] page dumped because: kasan: bad access detected [ 50.354753] [ 50.356229] Memory state around the buggy address: [ 50.361008] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.368211] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.375416] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.382617] ^ [ 50.387395] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.394600] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.401802] ================================================================== [ 50.672852] ================================================================== [ 50.679923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 50.687214] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 50.694592] [ 50.696074] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 50.696120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.696134] Hardware name: WinLink E850-96 board (DT) [ 50.696155] Call trace: [ 50.696165] show_stack+0x20/0x38 (C) [ 50.696195] dump_stack_lvl+0x8c/0xd0 [ 50.696227] print_report+0x118/0x608 [ 50.696257] kasan_report+0xdc/0x128 [ 50.696286] kasan_check_range+0x100/0x1a8 [ 50.696318] __kasan_check_write+0x20/0x30 [ 50.696350] kasan_atomics_helper+0xa6c/0x4858 [ 50.696381] kasan_atomics+0x198/0x2e0 [ 50.696408] kunit_try_run_case+0x170/0x3f0 [ 50.696440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.696476] kthread+0x328/0x630 [ 50.696509] ret_from_fork+0x10/0x20 [ 50.696539] [ 50.766292] Allocated by task 312: [ 50.769679] kasan_save_stack+0x3c/0x68 [ 50.773497] kasan_save_track+0x20/0x40 [ 50.777316] kasan_save_alloc_info+0x40/0x58 [ 50.781570] __kasan_kmalloc+0xd4/0xd8 [ 50.785302] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.789816] kasan_atomics+0xb8/0x2e0 [ 50.793462] kunit_try_run_case+0x170/0x3f0 [ 50.797629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.803097] kthread+0x328/0x630 [ 50.806309] ret_from_fork+0x10/0x20 [ 50.809868] [ 50.811344] The buggy address belongs to the object at ffff000800c2d400 [ 50.811344] which belongs to the cache kmalloc-64 of size 64 [ 50.823670] The buggy address is located 0 bytes to the right of [ 50.823670] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 50.836517] [ 50.837992] The buggy address belongs to the physical page: [ 50.843550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 50.851535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.858044] page_type: f5(slab) [ 50.861177] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.868901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.876621] page dumped because: kasan: bad access detected [ 50.882176] [ 50.883651] Memory state around the buggy address: [ 50.888431] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.895634] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.902839] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.910040] ^ [ 50.914818] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.922022] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.929224] ================================================================== [ 59.351200] ================================================================== [ 59.358266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 59.365642] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 59.372934] [ 59.374418] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 59.374467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.374483] Hardware name: WinLink E850-96 board (DT) [ 59.374503] Call trace: [ 59.374516] show_stack+0x20/0x38 (C) [ 59.374545] dump_stack_lvl+0x8c/0xd0 [ 59.374579] print_report+0x118/0x608 [ 59.374609] kasan_report+0xdc/0x128 [ 59.374636] __asan_report_load8_noabort+0x20/0x30 [ 59.374670] kasan_atomics_helper+0x3db0/0x4858 [ 59.374699] kasan_atomics+0x198/0x2e0 [ 59.374727] kunit_try_run_case+0x170/0x3f0 [ 59.374760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.374795] kthread+0x328/0x630 [ 59.374825] ret_from_fork+0x10/0x20 [ 59.374861] [ 59.441335] Allocated by task 312: [ 59.444722] kasan_save_stack+0x3c/0x68 [ 59.448541] kasan_save_track+0x20/0x40 [ 59.452360] kasan_save_alloc_info+0x40/0x58 [ 59.456613] __kasan_kmalloc+0xd4/0xd8 [ 59.460346] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.464860] kasan_atomics+0xb8/0x2e0 [ 59.468505] kunit_try_run_case+0x170/0x3f0 [ 59.472671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.478140] kthread+0x328/0x630 [ 59.481352] ret_from_fork+0x10/0x20 [ 59.484911] [ 59.486387] The buggy address belongs to the object at ffff000800c2d400 [ 59.486387] which belongs to the cache kmalloc-64 of size 64 [ 59.498713] The buggy address is located 0 bytes to the right of [ 59.498713] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 59.511560] [ 59.513036] The buggy address belongs to the physical page: [ 59.518592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 59.526579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.533088] page_type: f5(slab) [ 59.536222] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.543945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.551664] page dumped because: kasan: bad access detected [ 59.557219] [ 59.558695] Memory state around the buggy address: [ 59.563474] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.570677] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.577882] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.585083] ^ [ 59.589861] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.597066] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.604267] ================================================================== [ 50.409118] ================================================================== [ 50.416213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 50.423502] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 50.430880] [ 50.432363] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 50.432412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.432426] Hardware name: WinLink E850-96 board (DT) [ 50.432444] Call trace: [ 50.432457] show_stack+0x20/0x38 (C) [ 50.432486] dump_stack_lvl+0x8c/0xd0 [ 50.432520] print_report+0x118/0x608 [ 50.432550] kasan_report+0xdc/0x128 [ 50.432577] kasan_check_range+0x100/0x1a8 [ 50.432608] __kasan_check_write+0x20/0x30 [ 50.432639] kasan_atomics_helper+0xa04/0x4858 [ 50.432667] kasan_atomics+0x198/0x2e0 [ 50.432693] kunit_try_run_case+0x170/0x3f0 [ 50.432725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.432760] kthread+0x328/0x630 [ 50.432791] ret_from_fork+0x10/0x20 [ 50.432822] [ 50.502581] Allocated by task 312: [ 50.505968] kasan_save_stack+0x3c/0x68 [ 50.509786] kasan_save_track+0x20/0x40 [ 50.513605] kasan_save_alloc_info+0x40/0x58 [ 50.517858] __kasan_kmalloc+0xd4/0xd8 [ 50.521591] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.526105] kasan_atomics+0xb8/0x2e0 [ 50.529750] kunit_try_run_case+0x170/0x3f0 [ 50.533917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.539385] kthread+0x328/0x630 [ 50.542598] ret_from_fork+0x10/0x20 [ 50.546157] [ 50.547632] The buggy address belongs to the object at ffff000800c2d400 [ 50.547632] which belongs to the cache kmalloc-64 of size 64 [ 50.559959] The buggy address is located 0 bytes to the right of [ 50.559959] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 50.572805] [ 50.574281] The buggy address belongs to the physical page: [ 50.579837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 50.587824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.594333] page_type: f5(slab) [ 50.597466] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.605190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.612909] page dumped because: kasan: bad access detected [ 50.618465] [ 50.619940] Memory state around the buggy address: [ 50.624719] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.631923] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.639127] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.646328] ^ [ 50.651107] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.658311] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.665512] ================================================================== [ 53.557191] ================================================================== [ 53.564257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 53.571545] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 53.578837] [ 53.580319] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 53.580367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.580382] Hardware name: WinLink E850-96 board (DT) [ 53.580402] Call trace: [ 53.580416] show_stack+0x20/0x38 (C) [ 53.580446] dump_stack_lvl+0x8c/0xd0 [ 53.580480] print_report+0x118/0x608 [ 53.580509] kasan_report+0xdc/0x128 [ 53.580537] kasan_check_range+0x100/0x1a8 [ 53.580569] __kasan_check_read+0x20/0x30 [ 53.580602] kasan_atomics_helper+0xdd4/0x4858 [ 53.580631] kasan_atomics+0x198/0x2e0 [ 53.580661] kunit_try_run_case+0x170/0x3f0 [ 53.580693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.580731] kthread+0x328/0x630 [ 53.580763] ret_from_fork+0x10/0x20 [ 53.580794] [ 53.650450] Allocated by task 312: [ 53.653838] kasan_save_stack+0x3c/0x68 [ 53.657655] kasan_save_track+0x20/0x40 [ 53.661475] kasan_save_alloc_info+0x40/0x58 [ 53.665728] __kasan_kmalloc+0xd4/0xd8 [ 53.669460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.673974] kasan_atomics+0xb8/0x2e0 [ 53.677620] kunit_try_run_case+0x170/0x3f0 [ 53.681786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.687255] kthread+0x328/0x630 [ 53.690467] ret_from_fork+0x10/0x20 [ 53.694026] [ 53.695501] The buggy address belongs to the object at ffff000800c2d400 [ 53.695501] which belongs to the cache kmalloc-64 of size 64 [ 53.707828] The buggy address is located 0 bytes to the right of [ 53.707828] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 53.720675] [ 53.722151] The buggy address belongs to the physical page: [ 53.727708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 53.735694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.742204] page_type: f5(slab) [ 53.745335] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.753059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.760778] page dumped because: kasan: bad access detected [ 53.766334] [ 53.767809] Memory state around the buggy address: [ 53.772589] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.779792] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.786997] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.794198] ^ [ 53.798976] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.806180] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.813382] ================================================================== [ 54.344849] ================================================================== [ 54.351918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 54.359294] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 54.366672] [ 54.368154] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 54.368202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.368219] Hardware name: WinLink E850-96 board (DT) [ 54.368239] Call trace: [ 54.368252] show_stack+0x20/0x38 (C) [ 54.368284] dump_stack_lvl+0x8c/0xd0 [ 54.368316] print_report+0x118/0x608 [ 54.368345] kasan_report+0xdc/0x128 [ 54.368374] __asan_report_store8_noabort+0x20/0x30 [ 54.368408] kasan_atomics_helper+0x3e5c/0x4858 [ 54.368437] kasan_atomics+0x198/0x2e0 [ 54.368465] kunit_try_run_case+0x170/0x3f0 [ 54.368498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.368534] kthread+0x328/0x630 [ 54.368565] ret_from_fork+0x10/0x20 [ 54.368598] [ 54.435160] Allocated by task 312: [ 54.438548] kasan_save_stack+0x3c/0x68 [ 54.442366] kasan_save_track+0x20/0x40 [ 54.446185] kasan_save_alloc_info+0x40/0x58 [ 54.450438] __kasan_kmalloc+0xd4/0xd8 [ 54.454171] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.458685] kasan_atomics+0xb8/0x2e0 [ 54.462330] kunit_try_run_case+0x170/0x3f0 [ 54.466497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.471966] kthread+0x328/0x630 [ 54.475177] ret_from_fork+0x10/0x20 [ 54.478737] [ 54.480213] The buggy address belongs to the object at ffff000800c2d400 [ 54.480213] which belongs to the cache kmalloc-64 of size 64 [ 54.492539] The buggy address is located 0 bytes to the right of [ 54.492539] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 54.505385] [ 54.506861] The buggy address belongs to the physical page: [ 54.512418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 54.520405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.526913] page_type: f5(slab) [ 54.530047] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.537770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.545489] page dumped because: kasan: bad access detected [ 54.551044] [ 54.552520] Memory state around the buggy address: [ 54.557299] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.564502] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.571707] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.578908] ^ [ 54.583686] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.590891] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.598092] ================================================================== [ 48.302784] ================================================================== [ 48.309820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 48.317110] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 48.324488] [ 48.325971] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 48.326019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.326037] Hardware name: WinLink E850-96 board (DT) [ 48.326057] Call trace: [ 48.326070] show_stack+0x20/0x38 (C) [ 48.326100] dump_stack_lvl+0x8c/0xd0 [ 48.326133] print_report+0x118/0x608 [ 48.326161] kasan_report+0xdc/0x128 [ 48.326187] kasan_check_range+0x100/0x1a8 [ 48.326219] __kasan_check_write+0x20/0x30 [ 48.326248] kasan_atomics_helper+0x684/0x4858 [ 48.326280] kasan_atomics+0x198/0x2e0 [ 48.326308] kunit_try_run_case+0x170/0x3f0 [ 48.326342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.326379] kthread+0x328/0x630 [ 48.326409] ret_from_fork+0x10/0x20 [ 48.326443] [ 48.396189] Allocated by task 312: [ 48.399575] kasan_save_stack+0x3c/0x68 [ 48.403394] kasan_save_track+0x20/0x40 [ 48.407213] kasan_save_alloc_info+0x40/0x58 [ 48.411466] __kasan_kmalloc+0xd4/0xd8 [ 48.415199] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.419713] kasan_atomics+0xb8/0x2e0 [ 48.423359] kunit_try_run_case+0x170/0x3f0 [ 48.427525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.432994] kthread+0x328/0x630 [ 48.436206] ret_from_fork+0x10/0x20 [ 48.439765] [ 48.441240] The buggy address belongs to the object at ffff000800c2d400 [ 48.441240] which belongs to the cache kmalloc-64 of size 64 [ 48.453567] The buggy address is located 0 bytes to the right of [ 48.453567] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 48.466413] [ 48.467889] The buggy address belongs to the physical page: [ 48.473445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 48.481432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.487941] page_type: f5(slab) [ 48.491074] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.498798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.506517] page dumped because: kasan: bad access detected [ 48.512072] [ 48.513548] Memory state around the buggy address: [ 48.518327] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.525531] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.532736] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.539937] ^ [ 48.544714] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.551919] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.559120] ================================================================== [ 56.715816] ================================================================== [ 56.722889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 56.730265] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 56.737644] [ 56.739126] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 56.739173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.739188] Hardware name: WinLink E850-96 board (DT) [ 56.739209] Call trace: [ 56.739221] show_stack+0x20/0x38 (C) [ 56.739252] dump_stack_lvl+0x8c/0xd0 [ 56.739285] print_report+0x118/0x608 [ 56.739316] kasan_report+0xdc/0x128 [ 56.739344] kasan_check_range+0x100/0x1a8 [ 56.739377] __kasan_check_write+0x20/0x30 [ 56.739407] kasan_atomics_helper+0x11f8/0x4858 [ 56.739438] kasan_atomics+0x198/0x2e0 [ 56.739464] kunit_try_run_case+0x170/0x3f0 [ 56.739497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.739535] kthread+0x328/0x630 [ 56.739564] ret_from_fork+0x10/0x20 [ 56.739597] [ 56.809431] Allocated by task 312: [ 56.812818] kasan_save_stack+0x3c/0x68 [ 56.816636] kasan_save_track+0x20/0x40 [ 56.820455] kasan_save_alloc_info+0x40/0x58 [ 56.824708] __kasan_kmalloc+0xd4/0xd8 [ 56.828441] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.832954] kasan_atomics+0xb8/0x2e0 [ 56.836600] kunit_try_run_case+0x170/0x3f0 [ 56.840767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.846236] kthread+0x328/0x630 [ 56.849447] ret_from_fork+0x10/0x20 [ 56.853006] [ 56.854483] The buggy address belongs to the object at ffff000800c2d400 [ 56.854483] which belongs to the cache kmalloc-64 of size 64 [ 56.866808] The buggy address is located 0 bytes to the right of [ 56.866808] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 56.879655] [ 56.881131] The buggy address belongs to the physical page: [ 56.886687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 56.894674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.901183] page_type: f5(slab) [ 56.904315] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.912040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.919759] page dumped because: kasan: bad access detected [ 56.925315] [ 56.926790] Memory state around the buggy address: [ 56.931569] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.938773] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.945977] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.953178] ^ [ 56.957956] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.965161] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.972362] ================================================================== [ 53.033089] ================================================================== [ 53.040131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 53.047421] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 53.054799] [ 53.056283] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 53.056331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.056347] Hardware name: WinLink E850-96 board (DT) [ 53.056368] Call trace: [ 53.056379] show_stack+0x20/0x38 (C) [ 53.056411] dump_stack_lvl+0x8c/0xd0 [ 53.056445] print_report+0x118/0x608 [ 53.056475] kasan_report+0xdc/0x128 [ 53.056504] kasan_check_range+0x100/0x1a8 [ 53.056534] __kasan_check_write+0x20/0x30 [ 53.056567] kasan_atomics_helper+0xd3c/0x4858 [ 53.056596] kasan_atomics+0x198/0x2e0 [ 53.056624] kunit_try_run_case+0x170/0x3f0 [ 53.056659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.056695] kthread+0x328/0x630 [ 53.056727] ret_from_fork+0x10/0x20 [ 53.056760] [ 53.126500] Allocated by task 312: [ 53.129887] kasan_save_stack+0x3c/0x68 [ 53.133705] kasan_save_track+0x20/0x40 [ 53.137524] kasan_save_alloc_info+0x40/0x58 [ 53.141777] __kasan_kmalloc+0xd4/0xd8 [ 53.145510] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.150024] kasan_atomics+0xb8/0x2e0 [ 53.153670] kunit_try_run_case+0x170/0x3f0 [ 53.157836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.163305] kthread+0x328/0x630 [ 53.166516] ret_from_fork+0x10/0x20 [ 53.170076] [ 53.171551] The buggy address belongs to the object at ffff000800c2d400 [ 53.171551] which belongs to the cache kmalloc-64 of size 64 [ 53.183878] The buggy address is located 0 bytes to the right of [ 53.183878] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 53.196724] [ 53.198201] The buggy address belongs to the physical page: [ 53.203758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 53.211743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.218252] page_type: f5(slab) [ 53.221386] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.229109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.236828] page dumped because: kasan: bad access detected [ 53.242383] [ 53.243859] Memory state around the buggy address: [ 53.248637] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.255842] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.263046] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.270247] ^ [ 53.275025] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.282230] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.289431] ================================================================== [ 49.881752] ================================================================== [ 49.888790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 49.896080] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 49.903458] [ 49.904939] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 49.904986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.905003] Hardware name: WinLink E850-96 board (DT) [ 49.905023] Call trace: [ 49.905036] show_stack+0x20/0x38 (C) [ 49.905067] dump_stack_lvl+0x8c/0xd0 [ 49.905097] print_report+0x118/0x608 [ 49.905126] kasan_report+0xdc/0x128 [ 49.905156] kasan_check_range+0x100/0x1a8 [ 49.905185] __kasan_check_write+0x20/0x30 [ 49.905217] kasan_atomics_helper+0x934/0x4858 [ 49.905245] kasan_atomics+0x198/0x2e0 [ 49.905275] kunit_try_run_case+0x170/0x3f0 [ 49.905305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.905341] kthread+0x328/0x630 [ 49.905371] ret_from_fork+0x10/0x20 [ 49.905403] [ 49.975158] Allocated by task 312: [ 49.978545] kasan_save_stack+0x3c/0x68 [ 49.982363] kasan_save_track+0x20/0x40 [ 49.986183] kasan_save_alloc_info+0x40/0x58 [ 49.990436] __kasan_kmalloc+0xd4/0xd8 [ 49.994168] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.998682] kasan_atomics+0xb8/0x2e0 [ 50.002328] kunit_try_run_case+0x170/0x3f0 [ 50.006495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.011963] kthread+0x328/0x630 [ 50.015175] ret_from_fork+0x10/0x20 [ 50.018734] [ 50.020209] The buggy address belongs to the object at ffff000800c2d400 [ 50.020209] which belongs to the cache kmalloc-64 of size 64 [ 50.032536] The buggy address is located 0 bytes to the right of [ 50.032536] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 50.045383] [ 50.046859] The buggy address belongs to the physical page: [ 50.052416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 50.060403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.066911] page_type: f5(slab) [ 50.070044] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.077767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.085486] page dumped because: kasan: bad access detected [ 50.091042] [ 50.092518] Memory state around the buggy address: [ 50.097297] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.104500] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.111705] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.118906] ^ [ 50.123684] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.130888] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.138090] ================================================================== [ 45.408496] ================================================================== [ 45.415594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 45.422883] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 45.430174] [ 45.431660] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 45.431710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.431727] Hardware name: WinLink E850-96 board (DT) [ 45.431748] Call trace: [ 45.431762] show_stack+0x20/0x38 (C) [ 45.431795] dump_stack_lvl+0x8c/0xd0 [ 45.431829] print_report+0x118/0x608 [ 45.431859] kasan_report+0xdc/0x128 [ 45.431888] kasan_check_range+0x100/0x1a8 [ 45.431920] __kasan_check_read+0x20/0x30 [ 45.431952] kasan_atomics_helper+0x2b0/0x4858 [ 45.431981] kasan_atomics+0x198/0x2e0 [ 45.432007] kunit_try_run_case+0x170/0x3f0 [ 45.432044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.432080] kthread+0x328/0x630 [ 45.432110] ret_from_fork+0x10/0x20 [ 45.432147] [ 45.501787] Allocated by task 312: [ 45.505175] kasan_save_stack+0x3c/0x68 [ 45.508993] kasan_save_track+0x20/0x40 [ 45.512812] kasan_save_alloc_info+0x40/0x58 [ 45.517065] __kasan_kmalloc+0xd4/0xd8 [ 45.520798] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.525312] kasan_atomics+0xb8/0x2e0 [ 45.528958] kunit_try_run_case+0x170/0x3f0 [ 45.533124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.538592] kthread+0x328/0x630 [ 45.541804] ret_from_fork+0x10/0x20 [ 45.545364] [ 45.546841] The buggy address belongs to the object at ffff000800c2d400 [ 45.546841] which belongs to the cache kmalloc-64 of size 64 [ 45.559166] The buggy address is located 0 bytes to the right of [ 45.559166] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 45.572012] [ 45.573489] The buggy address belongs to the physical page: [ 45.579047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 45.587034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.593541] page_type: f5(slab) [ 45.596675] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.604397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.612116] page dumped because: kasan: bad access detected [ 45.617672] [ 45.619147] Memory state around the buggy address: [ 45.623928] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.631130] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.638334] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.645536] ^ [ 45.650314] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.657518] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.664720] ================================================================== [ 54.081167] ================================================================== [ 54.088208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 54.095496] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 54.102874] [ 54.104356] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 54.104402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.104420] Hardware name: WinLink E850-96 board (DT) [ 54.104441] Call trace: [ 54.104456] show_stack+0x20/0x38 (C) [ 54.104487] dump_stack_lvl+0x8c/0xd0 [ 54.104518] print_report+0x118/0x608 [ 54.104549] kasan_report+0xdc/0x128 [ 54.104578] kasan_check_range+0x100/0x1a8 [ 54.104610] __kasan_check_write+0x20/0x30 [ 54.104642] kasan_atomics_helper+0xe44/0x4858 [ 54.104670] kasan_atomics+0x198/0x2e0 [ 54.104698] kunit_try_run_case+0x170/0x3f0 [ 54.104732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.104769] kthread+0x328/0x630 [ 54.104799] ret_from_fork+0x10/0x20 [ 54.104831] [ 54.174574] Allocated by task 312: [ 54.177961] kasan_save_stack+0x3c/0x68 [ 54.181779] kasan_save_track+0x20/0x40 [ 54.185598] kasan_save_alloc_info+0x40/0x58 [ 54.189852] __kasan_kmalloc+0xd4/0xd8 [ 54.193585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.198098] kasan_atomics+0xb8/0x2e0 [ 54.201744] kunit_try_run_case+0x170/0x3f0 [ 54.205911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.211379] kthread+0x328/0x630 [ 54.214591] ret_from_fork+0x10/0x20 [ 54.218150] [ 54.219626] The buggy address belongs to the object at ffff000800c2d400 [ 54.219626] which belongs to the cache kmalloc-64 of size 64 [ 54.231952] The buggy address is located 0 bytes to the right of [ 54.231952] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 54.244799] [ 54.246275] The buggy address belongs to the physical page: [ 54.251831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 54.259818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.266328] page_type: f5(slab) [ 54.269461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.277183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.284902] page dumped because: kasan: bad access detected [ 54.290458] [ 54.291934] Memory state around the buggy address: [ 54.296713] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.303916] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.311120] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.318322] ^ [ 54.323100] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.330305] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.337506] ================================================================== [ 57.507479] ================================================================== [ 57.514545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 57.521920] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 57.529298] [ 57.530782] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 57.530829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.530847] Hardware name: WinLink E850-96 board (DT) [ 57.530864] Call trace: [ 57.530874] show_stack+0x20/0x38 (C) [ 57.530906] dump_stack_lvl+0x8c/0xd0 [ 57.530936] print_report+0x118/0x608 [ 57.530966] kasan_report+0xdc/0x128 [ 57.530994] kasan_check_range+0x100/0x1a8 [ 57.531024] __kasan_check_write+0x20/0x30 [ 57.531055] kasan_atomics_helper+0x1384/0x4858 [ 57.531086] kasan_atomics+0x198/0x2e0 [ 57.531114] kunit_try_run_case+0x170/0x3f0 [ 57.531147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.531187] kthread+0x328/0x630 [ 57.531220] ret_from_fork+0x10/0x20 [ 57.531250] [ 57.601085] Allocated by task 312: [ 57.604472] kasan_save_stack+0x3c/0x68 [ 57.608290] kasan_save_track+0x20/0x40 [ 57.612110] kasan_save_alloc_info+0x40/0x58 [ 57.616363] __kasan_kmalloc+0xd4/0xd8 [ 57.620095] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.624609] kasan_atomics+0xb8/0x2e0 [ 57.628255] kunit_try_run_case+0x170/0x3f0 [ 57.632422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.637890] kthread+0x328/0x630 [ 57.641102] ret_from_fork+0x10/0x20 [ 57.644661] [ 57.646136] The buggy address belongs to the object at ffff000800c2d400 [ 57.646136] which belongs to the cache kmalloc-64 of size 64 [ 57.658463] The buggy address is located 0 bytes to the right of [ 57.658463] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 57.671310] [ 57.672786] The buggy address belongs to the physical page: [ 57.678342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 57.686330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.692837] page_type: f5(slab) [ 57.695970] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.703695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.711413] page dumped because: kasan: bad access detected [ 57.716969] [ 57.718445] Memory state around the buggy address: [ 57.723224] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.730427] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.737632] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.744833] ^ [ 57.749611] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.756816] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.764017] ================================================================== [ 58.031775] ================================================================== [ 58.038840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 58.046218] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 58.053596] [ 58.055077] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 58.055125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.055142] Hardware name: WinLink E850-96 board (DT) [ 58.055161] Call trace: [ 58.055174] show_stack+0x20/0x38 (C) [ 58.055205] dump_stack_lvl+0x8c/0xd0 [ 58.055236] print_report+0x118/0x608 [ 58.055265] kasan_report+0xdc/0x128 [ 58.055294] kasan_check_range+0x100/0x1a8 [ 58.055325] __kasan_check_write+0x20/0x30 [ 58.055357] kasan_atomics_helper+0x1414/0x4858 [ 58.055385] kasan_atomics+0x198/0x2e0 [ 58.055413] kunit_try_run_case+0x170/0x3f0 [ 58.055444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.055480] kthread+0x328/0x630 [ 58.055510] ret_from_fork+0x10/0x20 [ 58.055545] [ 58.125383] Allocated by task 312: [ 58.128770] kasan_save_stack+0x3c/0x68 [ 58.132588] kasan_save_track+0x20/0x40 [ 58.136407] kasan_save_alloc_info+0x40/0x58 [ 58.140660] __kasan_kmalloc+0xd4/0xd8 [ 58.144393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.148907] kasan_atomics+0xb8/0x2e0 [ 58.152553] kunit_try_run_case+0x170/0x3f0 [ 58.156719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.162188] kthread+0x328/0x630 [ 58.165400] ret_from_fork+0x10/0x20 [ 58.168959] [ 58.170434] The buggy address belongs to the object at ffff000800c2d400 [ 58.170434] which belongs to the cache kmalloc-64 of size 64 [ 58.182761] The buggy address is located 0 bytes to the right of [ 58.182761] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 58.195607] [ 58.197084] The buggy address belongs to the physical page: [ 58.202639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 58.210625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.217135] page_type: f5(slab) [ 58.220268] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.227992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.235711] page dumped because: kasan: bad access detected [ 58.241267] [ 58.242742] Memory state around the buggy address: [ 58.247520] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.254725] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.261930] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.269131] ^ [ 58.273909] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.281113] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.288315] ================================================================== [ 56.188078] ================================================================== [ 56.195119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 56.202495] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 56.209874] [ 56.211355] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 56.211403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.211417] Hardware name: WinLink E850-96 board (DT) [ 56.211438] Call trace: [ 56.211448] show_stack+0x20/0x38 (C) [ 56.211478] dump_stack_lvl+0x8c/0xd0 [ 56.211511] print_report+0x118/0x608 [ 56.211541] kasan_report+0xdc/0x128 [ 56.211567] kasan_check_range+0x100/0x1a8 [ 56.211599] __kasan_check_write+0x20/0x30 [ 56.211630] kasan_atomics_helper+0x1128/0x4858 [ 56.211660] kasan_atomics+0x198/0x2e0 [ 56.211687] kunit_try_run_case+0x170/0x3f0 [ 56.211720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.211759] kthread+0x328/0x630 [ 56.211790] ret_from_fork+0x10/0x20 [ 56.211824] [ 56.281661] Allocated by task 312: [ 56.285048] kasan_save_stack+0x3c/0x68 [ 56.288865] kasan_save_track+0x20/0x40 [ 56.292685] kasan_save_alloc_info+0x40/0x58 [ 56.296938] __kasan_kmalloc+0xd4/0xd8 [ 56.300671] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.305184] kasan_atomics+0xb8/0x2e0 [ 56.308830] kunit_try_run_case+0x170/0x3f0 [ 56.312997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.318466] kthread+0x328/0x630 [ 56.321677] ret_from_fork+0x10/0x20 [ 56.325237] [ 56.326712] The buggy address belongs to the object at ffff000800c2d400 [ 56.326712] which belongs to the cache kmalloc-64 of size 64 [ 56.339039] The buggy address is located 0 bytes to the right of [ 56.339039] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 56.351885] [ 56.353361] The buggy address belongs to the physical page: [ 56.358917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 56.366906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.373413] page_type: f5(slab) [ 56.376546] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.384270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.391989] page dumped because: kasan: bad access detected [ 56.397544] [ 56.399020] Memory state around the buggy address: [ 56.403800] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.411002] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.418207] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.425409] ^ [ 56.430186] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.437391] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.444592] ================================================================== [ 52.772654] ================================================================== [ 52.779718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 52.787095] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 52.794387] [ 52.795871] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 52.795920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.795936] Hardware name: WinLink E850-96 board (DT) [ 52.795955] Call trace: [ 52.795967] show_stack+0x20/0x38 (C) [ 52.795999] dump_stack_lvl+0x8c/0xd0 [ 52.796031] print_report+0x118/0x608 [ 52.796060] kasan_report+0xdc/0x128 [ 52.796090] __asan_report_load4_noabort+0x20/0x30 [ 52.796124] kasan_atomics_helper+0x3dd8/0x4858 [ 52.796153] kasan_atomics+0x198/0x2e0 [ 52.796182] kunit_try_run_case+0x170/0x3f0 [ 52.796215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.796253] kthread+0x328/0x630 [ 52.796283] ret_from_fork+0x10/0x20 [ 52.796315] [ 52.862788] Allocated by task 312: [ 52.866176] kasan_save_stack+0x3c/0x68 [ 52.869993] kasan_save_track+0x20/0x40 [ 52.873812] kasan_save_alloc_info+0x40/0x58 [ 52.878066] __kasan_kmalloc+0xd4/0xd8 [ 52.881799] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.886312] kasan_atomics+0xb8/0x2e0 [ 52.889958] kunit_try_run_case+0x170/0x3f0 [ 52.894125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.899593] kthread+0x328/0x630 [ 52.902805] ret_from_fork+0x10/0x20 [ 52.906364] [ 52.907840] The buggy address belongs to the object at ffff000800c2d400 [ 52.907840] which belongs to the cache kmalloc-64 of size 64 [ 52.920166] The buggy address is located 0 bytes to the right of [ 52.920166] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 52.933013] [ 52.934489] The buggy address belongs to the physical page: [ 52.940046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 52.948032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.954541] page_type: f5(slab) [ 52.957675] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.965398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.973117] page dumped because: kasan: bad access detected [ 52.978672] [ 52.980147] Memory state around the buggy address: [ 52.984927] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.992130] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.999335] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.006536] ^ [ 53.011314] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.018519] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.025720] ================================================================== [ 60.135885] ================================================================== [ 60.142976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 60.150353] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 60.157731] [ 60.159213] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 60.159258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.159273] Hardware name: WinLink E850-96 board (DT) [ 60.159294] Call trace: [ 60.159307] show_stack+0x20/0x38 (C) [ 60.159340] dump_stack_lvl+0x8c/0xd0 [ 60.159370] print_report+0x118/0x608 [ 60.159398] kasan_report+0xdc/0x128 [ 60.159425] kasan_check_range+0x100/0x1a8 [ 60.159455] __kasan_check_write+0x20/0x30 [ 60.159486] kasan_atomics_helper+0x16d0/0x4858 [ 60.159516] kasan_atomics+0x198/0x2e0 [ 60.159542] kunit_try_run_case+0x170/0x3f0 [ 60.159574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.159609] kthread+0x328/0x630 [ 60.159643] ret_from_fork+0x10/0x20 [ 60.159674] [ 60.229518] Allocated by task 312: [ 60.232905] kasan_save_stack+0x3c/0x68 [ 60.236723] kasan_save_track+0x20/0x40 [ 60.240542] kasan_save_alloc_info+0x40/0x58 [ 60.244796] __kasan_kmalloc+0xd4/0xd8 [ 60.248528] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.253042] kasan_atomics+0xb8/0x2e0 [ 60.256688] kunit_try_run_case+0x170/0x3f0 [ 60.260854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.266323] kthread+0x328/0x630 [ 60.269535] ret_from_fork+0x10/0x20 [ 60.273094] [ 60.274569] The buggy address belongs to the object at ffff000800c2d400 [ 60.274569] which belongs to the cache kmalloc-64 of size 64 [ 60.286896] The buggy address is located 0 bytes to the right of [ 60.286896] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 60.299743] [ 60.301218] The buggy address belongs to the physical page: [ 60.306774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 60.314762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.321272] page_type: f5(slab) [ 60.324405] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.332127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.339848] page dumped because: kasan: bad access detected [ 60.345401] [ 60.346877] Memory state around the buggy address: [ 60.351657] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.358860] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.366065] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.373266] ^ [ 60.378044] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.385248] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.392450] ================================================================== [ 56.451938] ================================================================== [ 56.459003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 56.466381] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 56.473759] [ 56.475241] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 56.475288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.475303] Hardware name: WinLink E850-96 board (DT) [ 56.475321] Call trace: [ 56.475331] show_stack+0x20/0x38 (C) [ 56.475362] dump_stack_lvl+0x8c/0xd0 [ 56.475393] print_report+0x118/0x608 [ 56.475424] kasan_report+0xdc/0x128 [ 56.475453] kasan_check_range+0x100/0x1a8 [ 56.475484] __kasan_check_write+0x20/0x30 [ 56.475516] kasan_atomics_helper+0x1190/0x4858 [ 56.475544] kasan_atomics+0x198/0x2e0 [ 56.475572] kunit_try_run_case+0x170/0x3f0 [ 56.475603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.475639] kthread+0x328/0x630 [ 56.475671] ret_from_fork+0x10/0x20 [ 56.475701] [ 56.545546] Allocated by task 312: [ 56.548933] kasan_save_stack+0x3c/0x68 [ 56.552751] kasan_save_track+0x20/0x40 [ 56.556570] kasan_save_alloc_info+0x40/0x58 [ 56.560823] __kasan_kmalloc+0xd4/0xd8 [ 56.564556] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.569069] kasan_atomics+0xb8/0x2e0 [ 56.572715] kunit_try_run_case+0x170/0x3f0 [ 56.576882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.582351] kthread+0x328/0x630 [ 56.585562] ret_from_fork+0x10/0x20 [ 56.589121] [ 56.590597] The buggy address belongs to the object at ffff000800c2d400 [ 56.590597] which belongs to the cache kmalloc-64 of size 64 [ 56.602924] The buggy address is located 0 bytes to the right of [ 56.602924] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 56.615770] [ 56.617246] The buggy address belongs to the physical page: [ 56.622802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 56.630789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.637298] page_type: f5(slab) [ 56.640430] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.648155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.655874] page dumped because: kasan: bad access detected [ 56.661429] [ 56.662905] Memory state around the buggy address: [ 56.667684] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.674888] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.682092] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.689294] ^ [ 56.694071] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.701276] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.708477] ================================================================== [ 44.620742] ================================================================== [ 44.627761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 44.635135] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 44.642513] [ 44.643998] CPU: 5 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 44.644053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.644069] Hardware name: WinLink E850-96 board (DT) [ 44.644089] Call trace: [ 44.644101] show_stack+0x20/0x38 (C) [ 44.644134] dump_stack_lvl+0x8c/0xd0 [ 44.644169] print_report+0x118/0x608 [ 44.644202] kasan_report+0xdc/0x128 [ 44.644233] __asan_report_store4_noabort+0x20/0x30 [ 44.644266] kasan_atomics_helper+0x3f7c/0x4858 [ 44.644296] kasan_atomics+0x198/0x2e0 [ 44.644325] kunit_try_run_case+0x170/0x3f0 [ 44.644360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.644397] kthread+0x328/0x630 [ 44.644433] ret_from_fork+0x10/0x20 [ 44.644467] [ 44.711001] Allocated by task 312: [ 44.714388] kasan_save_stack+0x3c/0x68 [ 44.718206] kasan_save_track+0x20/0x40 [ 44.722025] kasan_save_alloc_info+0x40/0x58 [ 44.726279] __kasan_kmalloc+0xd4/0xd8 [ 44.730011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.734525] kasan_atomics+0xb8/0x2e0 [ 44.738171] kunit_try_run_case+0x170/0x3f0 [ 44.742337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.747807] kthread+0x328/0x630 [ 44.751018] ret_from_fork+0x10/0x20 [ 44.754577] [ 44.756054] The buggy address belongs to the object at ffff000800c2d400 [ 44.756054] which belongs to the cache kmalloc-64 of size 64 [ 44.768380] The buggy address is located 0 bytes to the right of [ 44.768380] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 44.781226] [ 44.782705] The buggy address belongs to the physical page: [ 44.788261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 44.796246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.802755] page_type: f5(slab) [ 44.805889] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 44.813610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.821329] page dumped because: kasan: bad access detected [ 44.826884] [ 44.828360] Memory state around the buggy address: [ 44.833140] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.840343] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.847548] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 44.854749] ^ [ 44.859527] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.866732] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.873933] ================================================================== [ 58.559517] ================================================================== [ 58.566610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 58.573988] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 58.581366] [ 58.582849] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 58.582895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.582911] Hardware name: WinLink E850-96 board (DT) [ 58.582932] Call trace: [ 58.582945] show_stack+0x20/0x38 (C) [ 58.582976] dump_stack_lvl+0x8c/0xd0 [ 58.583007] print_report+0x118/0x608 [ 58.583035] kasan_report+0xdc/0x128 [ 58.583065] kasan_check_range+0x100/0x1a8 [ 58.583095] __kasan_check_write+0x20/0x30 [ 58.583128] kasan_atomics_helper+0x14e4/0x4858 [ 58.583157] kasan_atomics+0x198/0x2e0 [ 58.583183] kunit_try_run_case+0x170/0x3f0 [ 58.583215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.583251] kthread+0x328/0x630 [ 58.583284] ret_from_fork+0x10/0x20 [ 58.583316] [ 58.653153] Allocated by task 312: [ 58.656540] kasan_save_stack+0x3c/0x68 [ 58.660358] kasan_save_track+0x20/0x40 [ 58.664177] kasan_save_alloc_info+0x40/0x58 [ 58.668431] __kasan_kmalloc+0xd4/0xd8 [ 58.672163] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.676677] kasan_atomics+0xb8/0x2e0 [ 58.680323] kunit_try_run_case+0x170/0x3f0 [ 58.684489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.689958] kthread+0x328/0x630 [ 58.693169] ret_from_fork+0x10/0x20 [ 58.696728] [ 58.698204] The buggy address belongs to the object at ffff000800c2d400 [ 58.698204] which belongs to the cache kmalloc-64 of size 64 [ 58.710531] The buggy address is located 0 bytes to the right of [ 58.710531] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 58.723377] [ 58.724853] The buggy address belongs to the physical page: [ 58.730410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 58.738396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.744905] page_type: f5(slab) [ 58.748038] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.755762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.763481] page dumped because: kasan: bad access detected [ 58.769037] [ 58.770512] Memory state around the buggy address: [ 58.775290] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.782495] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.789700] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.796901] ^ [ 58.801678] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.808883] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.816085] ================================================================== [ 59.611637] ================================================================== [ 59.618678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 59.626055] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 59.633433] [ 59.634915] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 59.634961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.634976] Hardware name: WinLink E850-96 board (DT) [ 59.634993] Call trace: [ 59.635006] show_stack+0x20/0x38 (C) [ 59.635036] dump_stack_lvl+0x8c/0xd0 [ 59.635066] print_report+0x118/0x608 [ 59.635097] kasan_report+0xdc/0x128 [ 59.635124] kasan_check_range+0x100/0x1a8 [ 59.635156] __kasan_check_write+0x20/0x30 [ 59.635187] kasan_atomics_helper+0x1644/0x4858 [ 59.635217] kasan_atomics+0x198/0x2e0 [ 59.635246] kunit_try_run_case+0x170/0x3f0 [ 59.635280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.635318] kthread+0x328/0x630 [ 59.635349] ret_from_fork+0x10/0x20 [ 59.635381] [ 59.705220] Allocated by task 312: [ 59.708607] kasan_save_stack+0x3c/0x68 [ 59.712425] kasan_save_track+0x20/0x40 [ 59.716245] kasan_save_alloc_info+0x40/0x58 [ 59.720498] __kasan_kmalloc+0xd4/0xd8 [ 59.724231] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.728745] kasan_atomics+0xb8/0x2e0 [ 59.732390] kunit_try_run_case+0x170/0x3f0 [ 59.736557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.742025] kthread+0x328/0x630 [ 59.745237] ret_from_fork+0x10/0x20 [ 59.748796] [ 59.750272] The buggy address belongs to the object at ffff000800c2d400 [ 59.750272] which belongs to the cache kmalloc-64 of size 64 [ 59.762598] The buggy address is located 0 bytes to the right of [ 59.762598] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 59.775445] [ 59.776921] The buggy address belongs to the physical page: [ 59.782477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 59.790464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.796972] page_type: f5(slab) [ 59.800105] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.807830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.815549] page dumped because: kasan: bad access detected [ 59.821104] [ 59.822580] Memory state around the buggy address: [ 59.827359] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.834562] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.841767] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.848968] ^ [ 59.853746] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.860951] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.868152] ================================================================== [ 54.869155] ================================================================== [ 54.876216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 54.883505] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 54.890883] [ 54.892366] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 54.892411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.892426] Hardware name: WinLink E850-96 board (DT) [ 54.892444] Call trace: [ 54.892459] show_stack+0x20/0x38 (C) [ 54.892490] dump_stack_lvl+0x8c/0xd0 [ 54.892522] print_report+0x118/0x608 [ 54.892552] kasan_report+0xdc/0x128 [ 54.892582] kasan_check_range+0x100/0x1a8 [ 54.892613] __kasan_check_write+0x20/0x30 [ 54.892645] kasan_atomics_helper+0xf20/0x4858 [ 54.892673] kasan_atomics+0x198/0x2e0 [ 54.892702] kunit_try_run_case+0x170/0x3f0 [ 54.892735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.892772] kthread+0x328/0x630 [ 54.892803] ret_from_fork+0x10/0x20 [ 54.892834] [ 54.962583] Allocated by task 312: [ 54.965971] kasan_save_stack+0x3c/0x68 [ 54.969788] kasan_save_track+0x20/0x40 [ 54.973608] kasan_save_alloc_info+0x40/0x58 [ 54.977861] __kasan_kmalloc+0xd4/0xd8 [ 54.981594] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.986107] kasan_atomics+0xb8/0x2e0 [ 54.989753] kunit_try_run_case+0x170/0x3f0 [ 54.993920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.999388] kthread+0x328/0x630 [ 55.002600] ret_from_fork+0x10/0x20 [ 55.006159] [ 55.007636] The buggy address belongs to the object at ffff000800c2d400 [ 55.007636] which belongs to the cache kmalloc-64 of size 64 [ 55.019961] The buggy address is located 0 bytes to the right of [ 55.019961] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 55.032808] [ 55.034284] The buggy address belongs to the physical page: [ 55.039839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 55.047827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.054336] page_type: f5(slab) [ 55.057468] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.065192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.072911] page dumped because: kasan: bad access detected [ 55.078467] [ 55.079942] Memory state around the buggy address: [ 55.084722] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.091925] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.099130] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.106331] ^ [ 55.111109] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.118314] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.125515] ================================================================== [ 46.456790] ================================================================== [ 46.463841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 46.471131] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 46.478509] [ 46.479993] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 46.480046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.480064] Hardware name: WinLink E850-96 board (DT) [ 46.480082] Call trace: [ 46.480093] show_stack+0x20/0x38 (C) [ 46.480124] dump_stack_lvl+0x8c/0xd0 [ 46.480156] print_report+0x118/0x608 [ 46.480186] kasan_report+0xdc/0x128 [ 46.480215] kasan_check_range+0x100/0x1a8 [ 46.480246] __kasan_check_write+0x20/0x30 [ 46.480277] kasan_atomics_helper+0x3ac/0x4858 [ 46.480305] kasan_atomics+0x198/0x2e0 [ 46.480333] kunit_try_run_case+0x170/0x3f0 [ 46.480365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.480402] kthread+0x328/0x630 [ 46.480434] ret_from_fork+0x10/0x20 [ 46.480468] [ 46.550210] Allocated by task 312: [ 46.553595] kasan_save_stack+0x3c/0x68 [ 46.557414] kasan_save_track+0x20/0x40 [ 46.561234] kasan_save_alloc_info+0x40/0x58 [ 46.565487] __kasan_kmalloc+0xd4/0xd8 [ 46.569220] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.573733] kasan_atomics+0xb8/0x2e0 [ 46.577379] kunit_try_run_case+0x170/0x3f0 [ 46.581546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.587015] kthread+0x328/0x630 [ 46.590226] ret_from_fork+0x10/0x20 [ 46.593785] [ 46.595260] The buggy address belongs to the object at ffff000800c2d400 [ 46.595260] which belongs to the cache kmalloc-64 of size 64 [ 46.607587] The buggy address is located 0 bytes to the right of [ 46.607587] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 46.620434] [ 46.621910] The buggy address belongs to the physical page: [ 46.627469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 46.635453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.641962] page_type: f5(slab) [ 46.645094] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.652819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.660538] page dumped because: kasan: bad access detected [ 46.666093] [ 46.667568] Memory state around the buggy address: [ 46.672348] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.679552] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.686756] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.693958] ^ [ 46.698735] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.705940] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.713141] ================================================================== [ 54.605459] ================================================================== [ 54.612503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 54.619794] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 54.627172] [ 54.628653] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 54.628699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.628716] Hardware name: WinLink E850-96 board (DT) [ 54.628737] Call trace: [ 54.628748] show_stack+0x20/0x38 (C) [ 54.628779] dump_stack_lvl+0x8c/0xd0 [ 54.628811] print_report+0x118/0x608 [ 54.628841] kasan_report+0xdc/0x128 [ 54.628868] kasan_check_range+0x100/0x1a8 [ 54.628898] __kasan_check_write+0x20/0x30 [ 54.628930] kasan_atomics_helper+0xeb8/0x4858 [ 54.628958] kasan_atomics+0x198/0x2e0 [ 54.628985] kunit_try_run_case+0x170/0x3f0 [ 54.629017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.629054] kthread+0x328/0x630 [ 54.629086] ret_from_fork+0x10/0x20 [ 54.629119] [ 54.698872] Allocated by task 312: [ 54.702257] kasan_save_stack+0x3c/0x68 [ 54.706076] kasan_save_track+0x20/0x40 [ 54.709896] kasan_save_alloc_info+0x40/0x58 [ 54.714150] __kasan_kmalloc+0xd4/0xd8 [ 54.717882] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.722396] kasan_atomics+0xb8/0x2e0 [ 54.726042] kunit_try_run_case+0x170/0x3f0 [ 54.730208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.735677] kthread+0x328/0x630 [ 54.738889] ret_from_fork+0x10/0x20 [ 54.742447] [ 54.743923] The buggy address belongs to the object at ffff000800c2d400 [ 54.743923] which belongs to the cache kmalloc-64 of size 64 [ 54.756250] The buggy address is located 0 bytes to the right of [ 54.756250] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 54.769096] [ 54.770572] The buggy address belongs to the physical page: [ 54.776128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 54.784116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.790624] page_type: f5(slab) [ 54.793758] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.801481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.809200] page dumped because: kasan: bad access detected [ 54.814755] [ 54.816231] Memory state around the buggy address: [ 54.821011] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.828214] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.835419] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.842620] ^ [ 54.847398] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.854602] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.861803] ================================================================== [ 45.932518] ================================================================== [ 45.939545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 45.946833] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 45.954212] [ 45.955696] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 45.955750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.955766] Hardware name: WinLink E850-96 board (DT) [ 45.955786] Call trace: [ 45.955798] show_stack+0x20/0x38 (C) [ 45.955828] dump_stack_lvl+0x8c/0xd0 [ 45.955863] print_report+0x118/0x608 [ 45.955893] kasan_report+0xdc/0x128 [ 45.955922] kasan_check_range+0x100/0x1a8 [ 45.955954] __kasan_check_write+0x20/0x30 [ 45.955986] kasan_atomics_helper+0x32c/0x4858 [ 45.956015] kasan_atomics+0x198/0x2e0 [ 45.956042] kunit_try_run_case+0x170/0x3f0 [ 45.956076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.956114] kthread+0x328/0x630 [ 45.956147] ret_from_fork+0x10/0x20 [ 45.956181] [ 46.025912] Allocated by task 312: [ 46.029299] kasan_save_stack+0x3c/0x68 [ 46.033117] kasan_save_track+0x20/0x40 [ 46.036936] kasan_save_alloc_info+0x40/0x58 [ 46.041190] __kasan_kmalloc+0xd4/0xd8 [ 46.044922] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.049436] kasan_atomics+0xb8/0x2e0 [ 46.053082] kunit_try_run_case+0x170/0x3f0 [ 46.057248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.062717] kthread+0x328/0x630 [ 46.065928] ret_from_fork+0x10/0x20 [ 46.069488] [ 46.070965] The buggy address belongs to the object at ffff000800c2d400 [ 46.070965] which belongs to the cache kmalloc-64 of size 64 [ 46.083290] The buggy address is located 0 bytes to the right of [ 46.083290] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 46.096137] [ 46.097612] The buggy address belongs to the physical page: [ 46.103171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 46.111156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.117664] page_type: f5(slab) [ 46.120797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.128521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.136240] page dumped because: kasan: bad access detected [ 46.141795] [ 46.143271] Memory state around the buggy address: [ 46.148050] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.155254] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.162459] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.169660] ^ [ 46.174437] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.181642] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.188843] ================================================================== [ 59.875469] ================================================================== [ 59.882564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 59.889940] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 59.897231] [ 59.898714] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 59.898760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.898776] Hardware name: WinLink E850-96 board (DT) [ 59.898795] Call trace: [ 59.898806] show_stack+0x20/0x38 (C) [ 59.898839] dump_stack_lvl+0x8c/0xd0 [ 59.898868] print_report+0x118/0x608 [ 59.898897] kasan_report+0xdc/0x128 [ 59.898925] __asan_report_load8_noabort+0x20/0x30 [ 59.898957] kasan_atomics_helper+0x3df4/0x4858 [ 59.898986] kasan_atomics+0x198/0x2e0 [ 59.899015] kunit_try_run_case+0x170/0x3f0 [ 59.899047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.899085] kthread+0x328/0x630 [ 59.899115] ret_from_fork+0x10/0x20 [ 59.899147] [ 59.965633] Allocated by task 312: [ 59.969020] kasan_save_stack+0x3c/0x68 [ 59.972838] kasan_save_track+0x20/0x40 [ 59.976657] kasan_save_alloc_info+0x40/0x58 [ 59.980911] __kasan_kmalloc+0xd4/0xd8 [ 59.984643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.989157] kasan_atomics+0xb8/0x2e0 [ 59.992803] kunit_try_run_case+0x170/0x3f0 [ 59.996970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.002438] kthread+0x328/0x630 [ 60.005650] ret_from_fork+0x10/0x20 [ 60.009209] [ 60.010685] The buggy address belongs to the object at ffff000800c2d400 [ 60.010685] which belongs to the cache kmalloc-64 of size 64 [ 60.023011] The buggy address is located 0 bytes to the right of [ 60.023011] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 60.035858] [ 60.037334] The buggy address belongs to the physical page: [ 60.042890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 60.050877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.057385] page_type: f5(slab) [ 60.060518] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.068243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.075961] page dumped because: kasan: bad access detected [ 60.081517] [ 60.082992] Memory state around the buggy address: [ 60.087772] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.094975] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.102180] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.109381] ^ [ 60.114159] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.121363] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.128565] ================================================================== [ 61.184513] ================================================================== [ 61.191573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 61.198948] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 61.206326] [ 61.207808] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 61.207857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.207873] Hardware name: WinLink E850-96 board (DT) [ 61.207891] Call trace: [ 61.207906] show_stack+0x20/0x38 (C) [ 61.207938] dump_stack_lvl+0x8c/0xd0 [ 61.207970] print_report+0x118/0x608 [ 61.208000] kasan_report+0xdc/0x128 [ 61.208028] kasan_check_range+0x100/0x1a8 [ 61.208058] __kasan_check_write+0x20/0x30 [ 61.208089] kasan_atomics_helper+0x17ec/0x4858 [ 61.208120] kasan_atomics+0x198/0x2e0 [ 61.208148] kunit_try_run_case+0x170/0x3f0 [ 61.208180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.208215] kthread+0x328/0x630 [ 61.208247] ret_from_fork+0x10/0x20 [ 61.208278] [ 61.278113] Allocated by task 312: [ 61.281500] kasan_save_stack+0x3c/0x68 [ 61.285318] kasan_save_track+0x20/0x40 [ 61.289138] kasan_save_alloc_info+0x40/0x58 [ 61.293391] __kasan_kmalloc+0xd4/0xd8 [ 61.297124] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.301637] kasan_atomics+0xb8/0x2e0 [ 61.305283] kunit_try_run_case+0x170/0x3f0 [ 61.309450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.314918] kthread+0x328/0x630 [ 61.318130] ret_from_fork+0x10/0x20 [ 61.321689] [ 61.323165] The buggy address belongs to the object at ffff000800c2d400 [ 61.323165] which belongs to the cache kmalloc-64 of size 64 [ 61.335492] The buggy address is located 0 bytes to the right of [ 61.335492] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 61.348338] [ 61.349814] The buggy address belongs to the physical page: [ 61.355371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 61.363357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.369866] page_type: f5(slab) [ 61.373000] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.380723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.388442] page dumped because: kasan: bad access detected [ 61.393997] [ 61.395473] Memory state around the buggy address: [ 61.400252] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.407455] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.414660] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.421861] ^ [ 61.426639] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.433843] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.441045] ================================================================== [ 44.881315] ================================================================== [ 44.888348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 44.895634] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 44.902925] [ 44.904412] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 44.904465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.904482] Hardware name: WinLink E850-96 board (DT) [ 44.904504] Call trace: [ 44.904517] show_stack+0x20/0x38 (C) [ 44.904552] dump_stack_lvl+0x8c/0xd0 [ 44.904585] print_report+0x118/0x608 [ 44.904616] kasan_report+0xdc/0x128 [ 44.904644] kasan_check_range+0x100/0x1a8 [ 44.904675] __kasan_check_read+0x20/0x30 [ 44.904708] kasan_atomics_helper+0x1ec/0x4858 [ 44.904737] kasan_atomics+0x198/0x2e0 [ 44.904763] kunit_try_run_case+0x170/0x3f0 [ 44.904799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.904838] kthread+0x328/0x630 [ 44.904872] ret_from_fork+0x10/0x20 [ 44.904908] [ 44.974538] Allocated by task 312: [ 44.977926] kasan_save_stack+0x3c/0x68 [ 44.981744] kasan_save_track+0x20/0x40 [ 44.985563] kasan_save_alloc_info+0x40/0x58 [ 44.989816] __kasan_kmalloc+0xd4/0xd8 [ 44.993549] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.998063] kasan_atomics+0xb8/0x2e0 [ 45.001709] kunit_try_run_case+0x170/0x3f0 [ 45.005875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.011345] kthread+0x328/0x630 [ 45.014555] ret_from_fork+0x10/0x20 [ 45.018114] [ 45.019591] The buggy address belongs to the object at ffff000800c2d400 [ 45.019591] which belongs to the cache kmalloc-64 of size 64 [ 45.031918] The buggy address is located 0 bytes to the right of [ 45.031918] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 45.044763] [ 45.046240] The buggy address belongs to the physical page: [ 45.051799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 45.059783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.066292] page_type: f5(slab) [ 45.069428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.077148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.084867] page dumped because: kasan: bad access detected [ 45.090422] [ 45.091898] Memory state around the buggy address: [ 45.096679] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.103881] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.111085] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.118287] ^ [ 45.123064] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.130269] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.137472] ================================================================== [ 47.511594] ================================================================== [ 47.518686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 47.525976] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 47.533355] [ 47.534837] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 47.534884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.534902] Hardware name: WinLink E850-96 board (DT) [ 47.534920] Call trace: [ 47.534933] show_stack+0x20/0x38 (C) [ 47.534965] dump_stack_lvl+0x8c/0xd0 [ 47.534998] print_report+0x118/0x608 [ 47.535028] kasan_report+0xdc/0x128 [ 47.535057] kasan_check_range+0x100/0x1a8 [ 47.535088] __kasan_check_write+0x20/0x30 [ 47.535121] kasan_atomics_helper+0x54c/0x4858 [ 47.535150] kasan_atomics+0x198/0x2e0 [ 47.535178] kunit_try_run_case+0x170/0x3f0 [ 47.535212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.535246] kthread+0x328/0x630 [ 47.535279] ret_from_fork+0x10/0x20 [ 47.535310] [ 47.605055] Allocated by task 312: [ 47.608440] kasan_save_stack+0x3c/0x68 [ 47.612260] kasan_save_track+0x20/0x40 [ 47.616079] kasan_save_alloc_info+0x40/0x58 [ 47.620333] __kasan_kmalloc+0xd4/0xd8 [ 47.624065] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.628579] kasan_atomics+0xb8/0x2e0 [ 47.632225] kunit_try_run_case+0x170/0x3f0 [ 47.636391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.641860] kthread+0x328/0x630 [ 47.645072] ret_from_fork+0x10/0x20 [ 47.648631] [ 47.650106] The buggy address belongs to the object at ffff000800c2d400 [ 47.650106] which belongs to the cache kmalloc-64 of size 64 [ 47.662433] The buggy address is located 0 bytes to the right of [ 47.662433] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 47.675279] [ 47.676755] The buggy address belongs to the physical page: [ 47.682311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 47.690300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.696807] page_type: f5(slab) [ 47.699940] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.707664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.715383] page dumped because: kasan: bad access detected [ 47.720938] [ 47.722414] Memory state around the buggy address: [ 47.727194] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.734397] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.741602] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.748803] ^ [ 47.753580] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.760785] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.767986] ================================================================== [ 52.508944] ================================================================== [ 52.516007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 52.523297] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 52.530675] [ 52.532158] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 52.532204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.532221] Hardware name: WinLink E850-96 board (DT) [ 52.532241] Call trace: [ 52.532255] show_stack+0x20/0x38 (C) [ 52.532287] dump_stack_lvl+0x8c/0xd0 [ 52.532317] print_report+0x118/0x608 [ 52.532347] kasan_report+0xdc/0x128 [ 52.532373] kasan_check_range+0x100/0x1a8 [ 52.532404] __kasan_check_write+0x20/0x30 [ 52.532435] kasan_atomics_helper+0xca0/0x4858 [ 52.532463] kasan_atomics+0x198/0x2e0 [ 52.532492] kunit_try_run_case+0x170/0x3f0 [ 52.532527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.532565] kthread+0x328/0x630 [ 52.532597] ret_from_fork+0x10/0x20 [ 52.532629] [ 52.602375] Allocated by task 312: [ 52.605763] kasan_save_stack+0x3c/0x68 [ 52.609580] kasan_save_track+0x20/0x40 [ 52.613400] kasan_save_alloc_info+0x40/0x58 [ 52.617653] __kasan_kmalloc+0xd4/0xd8 [ 52.621386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.625900] kasan_atomics+0xb8/0x2e0 [ 52.629546] kunit_try_run_case+0x170/0x3f0 [ 52.633712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.639181] kthread+0x328/0x630 [ 52.642393] ret_from_fork+0x10/0x20 [ 52.645951] [ 52.647427] The buggy address belongs to the object at ffff000800c2d400 [ 52.647427] which belongs to the cache kmalloc-64 of size 64 [ 52.659754] The buggy address is located 0 bytes to the right of [ 52.659754] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 52.672600] [ 52.674076] The buggy address belongs to the physical page: [ 52.679632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 52.687619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.694128] page_type: f5(slab) [ 52.697262] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.704985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.712704] page dumped because: kasan: bad access detected [ 52.718259] [ 52.719735] Memory state around the buggy address: [ 52.724514] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.731718] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.738922] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.746123] ^ [ 52.750901] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.758106] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.765307] ================================================================== [ 46.720522] ================================================================== [ 46.727552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 46.734843] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 46.742221] [ 46.743703] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 46.743754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.743773] Hardware name: WinLink E850-96 board (DT) [ 46.743795] Call trace: [ 46.743809] show_stack+0x20/0x38 (C) [ 46.743840] dump_stack_lvl+0x8c/0xd0 [ 46.743871] print_report+0x118/0x608 [ 46.743900] kasan_report+0xdc/0x128 [ 46.743928] kasan_check_range+0x100/0x1a8 [ 46.743959] __kasan_check_write+0x20/0x30 [ 46.743988] kasan_atomics_helper+0x414/0x4858 [ 46.744019] kasan_atomics+0x198/0x2e0 [ 46.744045] kunit_try_run_case+0x170/0x3f0 [ 46.744078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.744117] kthread+0x328/0x630 [ 46.744148] ret_from_fork+0x10/0x20 [ 46.744182] [ 46.813921] Allocated by task 312: [ 46.817307] kasan_save_stack+0x3c/0x68 [ 46.821126] kasan_save_track+0x20/0x40 [ 46.824945] kasan_save_alloc_info+0x40/0x58 [ 46.829199] __kasan_kmalloc+0xd4/0xd8 [ 46.832931] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.837445] kasan_atomics+0xb8/0x2e0 [ 46.841091] kunit_try_run_case+0x170/0x3f0 [ 46.845257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.850726] kthread+0x328/0x630 [ 46.853938] ret_from_fork+0x10/0x20 [ 46.857497] [ 46.858975] The buggy address belongs to the object at ffff000800c2d400 [ 46.858975] which belongs to the cache kmalloc-64 of size 64 [ 46.871299] The buggy address is located 0 bytes to the right of [ 46.871299] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 46.884145] [ 46.885621] The buggy address belongs to the physical page: [ 46.891177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 46.899166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.905673] page_type: f5(slab) [ 46.908806] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.916530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.924249] page dumped because: kasan: bad access detected [ 46.929805] [ 46.931280] Memory state around the buggy address: [ 46.936058] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.943263] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.950468] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.957669] ^ [ 46.962446] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.969651] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.976852] ================================================================== [ 55.132857] ================================================================== [ 55.139927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 55.147216] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 55.154594] [ 55.156077] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 55.156127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.156140] Hardware name: WinLink E850-96 board (DT) [ 55.156159] Call trace: [ 55.156171] show_stack+0x20/0x38 (C) [ 55.156203] dump_stack_lvl+0x8c/0xd0 [ 55.156234] print_report+0x118/0x608 [ 55.156262] kasan_report+0xdc/0x128 [ 55.156291] kasan_check_range+0x100/0x1a8 [ 55.156323] __kasan_check_write+0x20/0x30 [ 55.156354] kasan_atomics_helper+0xf88/0x4858 [ 55.156385] kasan_atomics+0x198/0x2e0 [ 55.156413] kunit_try_run_case+0x170/0x3f0 [ 55.156446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.156484] kthread+0x328/0x630 [ 55.156514] ret_from_fork+0x10/0x20 [ 55.156546] [ 55.226294] Allocated by task 312: [ 55.229682] kasan_save_stack+0x3c/0x68 [ 55.233499] kasan_save_track+0x20/0x40 [ 55.237319] kasan_save_alloc_info+0x40/0x58 [ 55.241572] __kasan_kmalloc+0xd4/0xd8 [ 55.245305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.249818] kasan_atomics+0xb8/0x2e0 [ 55.253464] kunit_try_run_case+0x170/0x3f0 [ 55.257631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.263100] kthread+0x328/0x630 [ 55.266311] ret_from_fork+0x10/0x20 [ 55.269870] [ 55.271346] The buggy address belongs to the object at ffff000800c2d400 [ 55.271346] which belongs to the cache kmalloc-64 of size 64 [ 55.283672] The buggy address is located 0 bytes to the right of [ 55.283672] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 55.296519] [ 55.297995] The buggy address belongs to the physical page: [ 55.303551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 55.311538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.318047] page_type: f5(slab) [ 55.321179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.328904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.336623] page dumped because: kasan: bad access detected [ 55.342178] [ 55.343654] Memory state around the buggy address: [ 55.348433] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.355636] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.362841] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.370043] ^ [ 55.374820] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.382025] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.389226] ================================================================== [ 50.936574] ================================================================== [ 50.943635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 50.950925] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 50.958303] [ 50.959786] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 50.959833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.959848] Hardware name: WinLink E850-96 board (DT) [ 50.959868] Call trace: [ 50.959882] show_stack+0x20/0x38 (C) [ 50.959914] dump_stack_lvl+0x8c/0xd0 [ 50.959947] print_report+0x118/0x608 [ 50.959977] kasan_report+0xdc/0x128 [ 50.960006] kasan_check_range+0x100/0x1a8 [ 50.960037] __kasan_check_write+0x20/0x30 [ 50.960068] kasan_atomics_helper+0xad4/0x4858 [ 50.960096] kasan_atomics+0x198/0x2e0 [ 50.960124] kunit_try_run_case+0x170/0x3f0 [ 50.960158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.960198] kthread+0x328/0x630 [ 50.960230] ret_from_fork+0x10/0x20 [ 50.960261] [ 51.030003] Allocated by task 312: [ 51.033390] kasan_save_stack+0x3c/0x68 [ 51.037209] kasan_save_track+0x20/0x40 [ 51.041027] kasan_save_alloc_info+0x40/0x58 [ 51.045281] __kasan_kmalloc+0xd4/0xd8 [ 51.049014] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.053527] kasan_atomics+0xb8/0x2e0 [ 51.057173] kunit_try_run_case+0x170/0x3f0 [ 51.061340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.066808] kthread+0x328/0x630 [ 51.070020] ret_from_fork+0x10/0x20 [ 51.073579] [ 51.075056] The buggy address belongs to the object at ffff000800c2d400 [ 51.075056] which belongs to the cache kmalloc-64 of size 64 [ 51.087381] The buggy address is located 0 bytes to the right of [ 51.087381] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 51.100228] [ 51.101704] The buggy address belongs to the physical page: [ 51.107260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 51.115247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.121756] page_type: f5(slab) [ 51.124890] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.132613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.140332] page dumped because: kasan: bad access detected [ 51.145887] [ 51.147363] Memory state around the buggy address: [ 51.152142] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.159345] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.166550] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.173751] ^ [ 51.178529] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.185734] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.192935] ================================================================== [ 59.087341] ================================================================== [ 59.094380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 59.101758] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 59.109135] [ 59.110617] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 59.110668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.110684] Hardware name: WinLink E850-96 board (DT) [ 59.110705] Call trace: [ 59.110718] show_stack+0x20/0x38 (C) [ 59.110750] dump_stack_lvl+0x8c/0xd0 [ 59.110782] print_report+0x118/0x608 [ 59.110810] kasan_report+0xdc/0x128 [ 59.110839] kasan_check_range+0x100/0x1a8 [ 59.110869] __kasan_check_write+0x20/0x30 [ 59.110901] kasan_atomics_helper+0x15b4/0x4858 [ 59.110931] kasan_atomics+0x198/0x2e0 [ 59.110957] kunit_try_run_case+0x170/0x3f0 [ 59.110990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.111027] kthread+0x328/0x630 [ 59.111058] ret_from_fork+0x10/0x20 [ 59.111088] [ 59.180923] Allocated by task 312: [ 59.184310] kasan_save_stack+0x3c/0x68 [ 59.188127] kasan_save_track+0x20/0x40 [ 59.191947] kasan_save_alloc_info+0x40/0x58 [ 59.196200] __kasan_kmalloc+0xd4/0xd8 [ 59.199933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.204446] kasan_atomics+0xb8/0x2e0 [ 59.208092] kunit_try_run_case+0x170/0x3f0 [ 59.212259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.217728] kthread+0x328/0x630 [ 59.220939] ret_from_fork+0x10/0x20 [ 59.224499] [ 59.225974] The buggy address belongs to the object at ffff000800c2d400 [ 59.225974] which belongs to the cache kmalloc-64 of size 64 [ 59.238301] The buggy address is located 0 bytes to the right of [ 59.238301] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 59.251147] [ 59.252623] The buggy address belongs to the physical page: [ 59.258181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 59.266166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.272676] page_type: f5(slab) [ 59.275810] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.283532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.291251] page dumped because: kasan: bad access detected [ 59.296806] [ 59.298282] Memory state around the buggy address: [ 59.303062] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.310265] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.317469] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.324671] ^ [ 59.329449] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.336653] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.343854] ================================================================== [ 57.243617] ================================================================== [ 57.250660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 57.258035] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 57.265413] [ 57.266896] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 57.266945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.266962] Hardware name: WinLink E850-96 board (DT) [ 57.266981] Call trace: [ 57.266993] show_stack+0x20/0x38 (C) [ 57.267025] dump_stack_lvl+0x8c/0xd0 [ 57.267056] print_report+0x118/0x608 [ 57.267085] kasan_report+0xdc/0x128 [ 57.267113] kasan_check_range+0x100/0x1a8 [ 57.267144] __kasan_check_write+0x20/0x30 [ 57.267175] kasan_atomics_helper+0x12d8/0x4858 [ 57.267204] kasan_atomics+0x198/0x2e0 [ 57.267233] kunit_try_run_case+0x170/0x3f0 [ 57.267264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.267302] kthread+0x328/0x630 [ 57.267333] ret_from_fork+0x10/0x20 [ 57.267366] [ 57.337201] Allocated by task 312: [ 57.340587] kasan_save_stack+0x3c/0x68 [ 57.344405] kasan_save_track+0x20/0x40 [ 57.348225] kasan_save_alloc_info+0x40/0x58 [ 57.352478] __kasan_kmalloc+0xd4/0xd8 [ 57.356210] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.360724] kasan_atomics+0xb8/0x2e0 [ 57.364370] kunit_try_run_case+0x170/0x3f0 [ 57.368537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.374005] kthread+0x328/0x630 [ 57.377217] ret_from_fork+0x10/0x20 [ 57.380776] [ 57.382252] The buggy address belongs to the object at ffff000800c2d400 [ 57.382252] which belongs to the cache kmalloc-64 of size 64 [ 57.394578] The buggy address is located 0 bytes to the right of [ 57.394578] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 57.407425] [ 57.408901] The buggy address belongs to the physical page: [ 57.414456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 57.422444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.428954] page_type: f5(slab) [ 57.432088] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.439810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.447530] page dumped because: kasan: bad access detected [ 57.453084] [ 57.454560] Memory state around the buggy address: [ 57.459338] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.466542] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.473747] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.480948] ^ [ 57.485726] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.492931] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.500132] ================================================================== [ 60.399820] ================================================================== [ 60.406862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 60.414238] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 60.421529] [ 60.423012] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 60.423063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.423077] Hardware name: WinLink E850-96 board (DT) [ 60.423098] Call trace: [ 60.423111] show_stack+0x20/0x38 (C) [ 60.423145] dump_stack_lvl+0x8c/0xd0 [ 60.423174] print_report+0x118/0x608 [ 60.423203] kasan_report+0xdc/0x128 [ 60.423232] __asan_report_load8_noabort+0x20/0x30 [ 60.423267] kasan_atomics_helper+0x3e10/0x4858 [ 60.423296] kasan_atomics+0x198/0x2e0 [ 60.423324] kunit_try_run_case+0x170/0x3f0 [ 60.423355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.423393] kthread+0x328/0x630 [ 60.423423] ret_from_fork+0x10/0x20 [ 60.423457] [ 60.489930] Allocated by task 312: [ 60.493318] kasan_save_stack+0x3c/0x68 [ 60.497136] kasan_save_track+0x20/0x40 [ 60.500955] kasan_save_alloc_info+0x40/0x58 [ 60.505208] __kasan_kmalloc+0xd4/0xd8 [ 60.508941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.513455] kasan_atomics+0xb8/0x2e0 [ 60.517101] kunit_try_run_case+0x170/0x3f0 [ 60.521267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.526736] kthread+0x328/0x630 [ 60.529948] ret_from_fork+0x10/0x20 [ 60.533507] [ 60.534982] The buggy address belongs to the object at ffff000800c2d400 [ 60.534982] which belongs to the cache kmalloc-64 of size 64 [ 60.547309] The buggy address is located 0 bytes to the right of [ 60.547309] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 60.560155] [ 60.561631] The buggy address belongs to the physical page: [ 60.567187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 60.575175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.581683] page_type: f5(slab) [ 60.584816] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.592540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.600259] page dumped because: kasan: bad access detected [ 60.605814] [ 60.607290] Memory state around the buggy address: [ 60.612070] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.619273] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.626477] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.633679] ^ [ 60.638456] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.645661] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.652863] ================================================================== [ 51.724437] ================================================================== [ 51.731471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 51.738847] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 51.746138] [ 51.747622] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 51.747671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.747686] Hardware name: WinLink E850-96 board (DT) [ 51.747706] Call trace: [ 51.747721] show_stack+0x20/0x38 (C) [ 51.747753] dump_stack_lvl+0x8c/0xd0 [ 51.747786] print_report+0x118/0x608 [ 51.747817] kasan_report+0xdc/0x128 [ 51.747845] __asan_report_load4_noabort+0x20/0x30 [ 51.747879] kasan_atomics_helper+0x3dbc/0x4858 [ 51.747908] kasan_atomics+0x198/0x2e0 [ 51.747937] kunit_try_run_case+0x170/0x3f0 [ 51.747970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.748007] kthread+0x328/0x630 [ 51.748038] ret_from_fork+0x10/0x20 [ 51.748067] [ 51.814540] Allocated by task 312: [ 51.817927] kasan_save_stack+0x3c/0x68 [ 51.821745] kasan_save_track+0x20/0x40 [ 51.825564] kasan_save_alloc_info+0x40/0x58 [ 51.829818] __kasan_kmalloc+0xd4/0xd8 [ 51.833551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.838064] kasan_atomics+0xb8/0x2e0 [ 51.841710] kunit_try_run_case+0x170/0x3f0 [ 51.845877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.851345] kthread+0x328/0x630 [ 51.854557] ret_from_fork+0x10/0x20 [ 51.858116] [ 51.859591] The buggy address belongs to the object at ffff000800c2d400 [ 51.859591] which belongs to the cache kmalloc-64 of size 64 [ 51.871918] The buggy address is located 0 bytes to the right of [ 51.871918] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 51.884765] [ 51.886241] The buggy address belongs to the physical page: [ 51.891796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 51.899784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.906292] page_type: f5(slab) [ 51.909428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.917149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.924868] page dumped because: kasan: bad access detected [ 51.930424] [ 51.931899] Memory state around the buggy address: [ 51.936678] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.943882] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.951087] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.958288] ^ [ 51.963066] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.970271] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.977472] ================================================================== [ 48.566473] ================================================================== [ 48.573531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 48.580822] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 48.588200] [ 48.589681] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 48.589728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.589748] Hardware name: WinLink E850-96 board (DT) [ 48.589766] Call trace: [ 48.589779] show_stack+0x20/0x38 (C) [ 48.589810] dump_stack_lvl+0x8c/0xd0 [ 48.589842] print_report+0x118/0x608 [ 48.589871] kasan_report+0xdc/0x128 [ 48.589899] kasan_check_range+0x100/0x1a8 [ 48.589930] __kasan_check_write+0x20/0x30 [ 48.589962] kasan_atomics_helper+0x6ec/0x4858 [ 48.589991] kasan_atomics+0x198/0x2e0 [ 48.590019] kunit_try_run_case+0x170/0x3f0 [ 48.590054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.590093] kthread+0x328/0x630 [ 48.590124] ret_from_fork+0x10/0x20 [ 48.590156] [ 48.659900] Allocated by task 312: [ 48.663287] kasan_save_stack+0x3c/0x68 [ 48.667105] kasan_save_track+0x20/0x40 [ 48.670924] kasan_save_alloc_info+0x40/0x58 [ 48.675178] __kasan_kmalloc+0xd4/0xd8 [ 48.678910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.683424] kasan_atomics+0xb8/0x2e0 [ 48.687070] kunit_try_run_case+0x170/0x3f0 [ 48.691236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.696705] kthread+0x328/0x630 [ 48.699917] ret_from_fork+0x10/0x20 [ 48.703476] [ 48.704951] The buggy address belongs to the object at ffff000800c2d400 [ 48.704951] which belongs to the cache kmalloc-64 of size 64 [ 48.717278] The buggy address is located 0 bytes to the right of [ 48.717278] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 48.730125] [ 48.731601] The buggy address belongs to the physical page: [ 48.737158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 48.745144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.751652] page_type: f5(slab) [ 48.754785] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.762510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.770228] page dumped because: kasan: bad access detected [ 48.775783] [ 48.777259] Memory state around the buggy address: [ 48.782039] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.789242] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.796447] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.803648] ^ [ 48.808426] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.815630] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.822832] ================================================================== [ 49.621312] ================================================================== [ 49.628377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 49.635754] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 49.643045] [ 49.644528] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 49.644576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.644591] Hardware name: WinLink E850-96 board (DT) [ 49.644610] Call trace: [ 49.644623] show_stack+0x20/0x38 (C) [ 49.644655] dump_stack_lvl+0x8c/0xd0 [ 49.644687] print_report+0x118/0x608 [ 49.644717] kasan_report+0xdc/0x128 [ 49.644745] __asan_report_load4_noabort+0x20/0x30 [ 49.644780] kasan_atomics_helper+0x42d8/0x4858 [ 49.644808] kasan_atomics+0x198/0x2e0 [ 49.644834] kunit_try_run_case+0x170/0x3f0 [ 49.644867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.644904] kthread+0x328/0x630 [ 49.644937] ret_from_fork+0x10/0x20 [ 49.644972] [ 49.711448] Allocated by task 312: [ 49.714834] kasan_save_stack+0x3c/0x68 [ 49.718652] kasan_save_track+0x20/0x40 [ 49.722471] kasan_save_alloc_info+0x40/0x58 [ 49.726725] __kasan_kmalloc+0xd4/0xd8 [ 49.730457] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.734971] kasan_atomics+0xb8/0x2e0 [ 49.738616] kunit_try_run_case+0x170/0x3f0 [ 49.742783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.748252] kthread+0x328/0x630 [ 49.751464] ret_from_fork+0x10/0x20 [ 49.755023] [ 49.756500] The buggy address belongs to the object at ffff000800c2d400 [ 49.756500] which belongs to the cache kmalloc-64 of size 64 [ 49.768825] The buggy address is located 0 bytes to the right of [ 49.768825] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 49.781671] [ 49.783147] The buggy address belongs to the physical page: [ 49.788703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 49.796691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.803199] page_type: f5(slab) [ 49.806333] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.814056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.821775] page dumped because: kasan: bad access detected [ 49.827330] [ 49.828806] Memory state around the buggy address: [ 49.833586] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.840789] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.847993] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.855195] ^ [ 49.859973] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.867177] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.874378] ================================================================== [ 47.775357] ================================================================== [ 47.782399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 47.789688] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 47.797066] [ 47.798548] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 47.798597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.798616] Hardware name: WinLink E850-96 board (DT) [ 47.798635] Call trace: [ 47.798648] show_stack+0x20/0x38 (C) [ 47.798680] dump_stack_lvl+0x8c/0xd0 [ 47.798712] print_report+0x118/0x608 [ 47.798740] kasan_report+0xdc/0x128 [ 47.798767] kasan_check_range+0x100/0x1a8 [ 47.798799] __kasan_check_write+0x20/0x30 [ 47.798831] kasan_atomics_helper+0x5b4/0x4858 [ 47.798860] kasan_atomics+0x198/0x2e0 [ 47.798887] kunit_try_run_case+0x170/0x3f0 [ 47.798919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.798957] kthread+0x328/0x630 [ 47.798989] ret_from_fork+0x10/0x20 [ 47.799021] [ 47.868766] Allocated by task 312: [ 47.872153] kasan_save_stack+0x3c/0x68 [ 47.875971] kasan_save_track+0x20/0x40 [ 47.879790] kasan_save_alloc_info+0x40/0x58 [ 47.884044] __kasan_kmalloc+0xd4/0xd8 [ 47.887776] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.892290] kasan_atomics+0xb8/0x2e0 [ 47.895936] kunit_try_run_case+0x170/0x3f0 [ 47.900103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.905571] kthread+0x328/0x630 [ 47.908783] ret_from_fork+0x10/0x20 [ 47.912342] [ 47.913817] The buggy address belongs to the object at ffff000800c2d400 [ 47.913817] which belongs to the cache kmalloc-64 of size 64 [ 47.926144] The buggy address is located 0 bytes to the right of [ 47.926144] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 47.938991] [ 47.940467] The buggy address belongs to the physical page: [ 47.946022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 47.954009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.960518] page_type: f5(slab) [ 47.963653] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.971375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.979094] page dumped because: kasan: bad access detected [ 47.984650] [ 47.986126] Memory state around the buggy address: [ 47.990905] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.998108] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.005313] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.012514] ^ [ 48.017292] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.024497] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.031697] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 42.737527] ================================================================== [ 42.744626] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 42.753565] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 42.760857] [ 42.762336] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 42.762382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.762398] Hardware name: WinLink E850-96 board (DT) [ 42.762416] Call trace: [ 42.762430] show_stack+0x20/0x38 (C) [ 42.762461] dump_stack_lvl+0x8c/0xd0 [ 42.762492] print_report+0x118/0x608 [ 42.762521] kasan_report+0xdc/0x128 [ 42.762551] __asan_report_load8_noabort+0x20/0x30 [ 42.762585] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 42.762619] kasan_bitops_generic+0x11c/0x1c8 [ 42.762648] kunit_try_run_case+0x170/0x3f0 [ 42.762678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.762718] kthread+0x328/0x630 [ 42.762747] ret_from_fork+0x10/0x20 [ 42.762778] [ 42.831429] Allocated by task 308: [ 42.834815] kasan_save_stack+0x3c/0x68 [ 42.838633] kasan_save_track+0x20/0x40 [ 42.842453] kasan_save_alloc_info+0x40/0x58 [ 42.846706] __kasan_kmalloc+0xd4/0xd8 [ 42.850439] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.854953] kasan_bitops_generic+0xa0/0x1c8 [ 42.859206] kunit_try_run_case+0x170/0x3f0 [ 42.863373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.868841] kthread+0x328/0x630 [ 42.872053] ret_from_fork+0x10/0x20 [ 42.875612] [ 42.877087] The buggy address belongs to the object at ffff0008037171e0 [ 42.877087] which belongs to the cache kmalloc-16 of size 16 [ 42.889414] The buggy address is located 8 bytes inside of [ 42.889414] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 42.901653] [ 42.903129] The buggy address belongs to the physical page: [ 42.908685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 42.916671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.923182] page_type: f5(slab) [ 42.926315] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.934038] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.941757] page dumped because: kasan: bad access detected [ 42.947312] [ 42.948788] Memory state around the buggy address: [ 42.953566] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 42.960771] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 42.967975] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 42.975177] ^ [ 42.981777] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.988982] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.996183] ================================================================== [ 43.538960] ================================================================== [ 43.546003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 43.554942] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 43.562320] [ 43.563801] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 43.563848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.563864] Hardware name: WinLink E850-96 board (DT) [ 43.563883] Call trace: [ 43.563895] show_stack+0x20/0x38 (C) [ 43.563926] dump_stack_lvl+0x8c/0xd0 [ 43.563957] print_report+0x118/0x608 [ 43.563986] kasan_report+0xdc/0x128 [ 43.564014] kasan_check_range+0x100/0x1a8 [ 43.564044] __kasan_check_write+0x20/0x30 [ 43.564076] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 43.564109] kasan_bitops_generic+0x11c/0x1c8 [ 43.564137] kunit_try_run_case+0x170/0x3f0 [ 43.564169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.564207] kthread+0x328/0x630 [ 43.564238] ret_from_fork+0x10/0x20 [ 43.564269] [ 43.636277] Allocated by task 308: [ 43.639665] kasan_save_stack+0x3c/0x68 [ 43.643482] kasan_save_track+0x20/0x40 [ 43.647302] kasan_save_alloc_info+0x40/0x58 [ 43.651555] __kasan_kmalloc+0xd4/0xd8 [ 43.655288] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.659802] kasan_bitops_generic+0xa0/0x1c8 [ 43.664055] kunit_try_run_case+0x170/0x3f0 [ 43.668222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.673690] kthread+0x328/0x630 [ 43.676902] ret_from_fork+0x10/0x20 [ 43.680461] [ 43.681937] The buggy address belongs to the object at ffff0008037171e0 [ 43.681937] which belongs to the cache kmalloc-16 of size 16 [ 43.694263] The buggy address is located 8 bytes inside of [ 43.694263] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 43.706502] [ 43.707978] The buggy address belongs to the physical page: [ 43.713535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 43.721521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.728030] page_type: f5(slab) [ 43.731162] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.738887] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.746606] page dumped because: kasan: bad access detected [ 43.752161] [ 43.753637] Memory state around the buggy address: [ 43.758415] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 43.765620] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 43.772824] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 43.780025] ^ [ 43.786626] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.793831] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.801032] ================================================================== [ 44.074342] ================================================================== [ 44.081411] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 44.090351] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 44.097642] [ 44.099123] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 44.099169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.099185] Hardware name: WinLink E850-96 board (DT) [ 44.099206] Call trace: [ 44.099218] show_stack+0x20/0x38 (C) [ 44.099249] dump_stack_lvl+0x8c/0xd0 [ 44.099279] print_report+0x118/0x608 [ 44.099308] kasan_report+0xdc/0x128 [ 44.099336] __asan_report_load8_noabort+0x20/0x30 [ 44.099371] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 44.099404] kasan_bitops_generic+0x11c/0x1c8 [ 44.099433] kunit_try_run_case+0x170/0x3f0 [ 44.099467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.099504] kthread+0x328/0x630 [ 44.099536] ret_from_fork+0x10/0x20 [ 44.099567] [ 44.168214] Allocated by task 308: [ 44.171600] kasan_save_stack+0x3c/0x68 [ 44.175419] kasan_save_track+0x20/0x40 [ 44.179238] kasan_save_alloc_info+0x40/0x58 [ 44.183492] __kasan_kmalloc+0xd4/0xd8 [ 44.187224] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.191738] kasan_bitops_generic+0xa0/0x1c8 [ 44.195992] kunit_try_run_case+0x170/0x3f0 [ 44.200158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.205627] kthread+0x328/0x630 [ 44.208839] ret_from_fork+0x10/0x20 [ 44.212398] [ 44.213873] The buggy address belongs to the object at ffff0008037171e0 [ 44.213873] which belongs to the cache kmalloc-16 of size 16 [ 44.226200] The buggy address is located 8 bytes inside of [ 44.226200] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 44.238439] [ 44.239915] The buggy address belongs to the physical page: [ 44.245471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 44.253458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.259966] page_type: f5(slab) [ 44.263100] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.270823] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.278542] page dumped because: kasan: bad access detected [ 44.284098] [ 44.285573] Memory state around the buggy address: [ 44.290351] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 44.297556] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 44.304761] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 44.311962] ^ [ 44.318562] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.325768] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.332968] ================================================================== [ 43.808380] ================================================================== [ 43.815443] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 43.824383] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 43.831674] [ 43.833154] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 43.833200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.833216] Hardware name: WinLink E850-96 board (DT) [ 43.833235] Call trace: [ 43.833247] show_stack+0x20/0x38 (C) [ 43.833277] dump_stack_lvl+0x8c/0xd0 [ 43.833310] print_report+0x118/0x608 [ 43.833339] kasan_report+0xdc/0x128 [ 43.833366] __asan_report_load8_noabort+0x20/0x30 [ 43.833400] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 43.833435] kasan_bitops_generic+0x11c/0x1c8 [ 43.833462] kunit_try_run_case+0x170/0x3f0 [ 43.833494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.833532] kthread+0x328/0x630 [ 43.833564] ret_from_fork+0x10/0x20 [ 43.833597] [ 43.902246] Allocated by task 308: [ 43.905633] kasan_save_stack+0x3c/0x68 [ 43.909451] kasan_save_track+0x20/0x40 [ 43.913270] kasan_save_alloc_info+0x40/0x58 [ 43.917523] __kasan_kmalloc+0xd4/0xd8 [ 43.921256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.925770] kasan_bitops_generic+0xa0/0x1c8 [ 43.930023] kunit_try_run_case+0x170/0x3f0 [ 43.934190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.939659] kthread+0x328/0x630 [ 43.942870] ret_from_fork+0x10/0x20 [ 43.946429] [ 43.947905] The buggy address belongs to the object at ffff0008037171e0 [ 43.947905] which belongs to the cache kmalloc-16 of size 16 [ 43.960231] The buggy address is located 8 bytes inside of [ 43.960231] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 43.972470] [ 43.973946] The buggy address belongs to the physical page: [ 43.979502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 43.987489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.993998] page_type: f5(slab) [ 43.997131] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.004855] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.012574] page dumped because: kasan: bad access detected [ 44.018129] [ 44.019605] Memory state around the buggy address: [ 44.024384] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 44.031588] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 44.038792] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 44.045994] ^ [ 44.052594] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.059799] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.067000] ================================================================== [ 42.468115] ================================================================== [ 42.475185] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 42.484125] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 42.491503] [ 42.492983] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 42.493029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.493044] Hardware name: WinLink E850-96 board (DT) [ 42.493063] Call trace: [ 42.493075] show_stack+0x20/0x38 (C) [ 42.493107] dump_stack_lvl+0x8c/0xd0 [ 42.493138] print_report+0x118/0x608 [ 42.493166] kasan_report+0xdc/0x128 [ 42.493195] kasan_check_range+0x100/0x1a8 [ 42.493227] __kasan_check_write+0x20/0x30 [ 42.493258] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 42.493290] kasan_bitops_generic+0x11c/0x1c8 [ 42.493319] kunit_try_run_case+0x170/0x3f0 [ 42.493349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.493386] kthread+0x328/0x630 [ 42.493417] ret_from_fork+0x10/0x20 [ 42.493448] [ 42.565460] Allocated by task 308: [ 42.568846] kasan_save_stack+0x3c/0x68 [ 42.572665] kasan_save_track+0x20/0x40 [ 42.576485] kasan_save_alloc_info+0x40/0x58 [ 42.580738] __kasan_kmalloc+0xd4/0xd8 [ 42.584470] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.588984] kasan_bitops_generic+0xa0/0x1c8 [ 42.593238] kunit_try_run_case+0x170/0x3f0 [ 42.597404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.602873] kthread+0x328/0x630 [ 42.606085] ret_from_fork+0x10/0x20 [ 42.609644] [ 42.611119] The buggy address belongs to the object at ffff0008037171e0 [ 42.611119] which belongs to the cache kmalloc-16 of size 16 [ 42.623446] The buggy address is located 8 bytes inside of [ 42.623446] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 42.635685] [ 42.637161] The buggy address belongs to the physical page: [ 42.642717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 42.650704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.657214] page_type: f5(slab) [ 42.660347] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.668070] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.675789] page dumped because: kasan: bad access detected [ 42.681344] [ 42.682820] Memory state around the buggy address: [ 42.687598] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 42.694802] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 42.702007] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 42.709208] ^ [ 42.715809] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.723014] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.730215] ================================================================== [ 42.202156] ================================================================== [ 42.209217] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 42.218157] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 42.225448] [ 42.226930] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 42.226978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.226997] Hardware name: WinLink E850-96 board (DT) [ 42.227012] Call trace: [ 42.227022] show_stack+0x20/0x38 (C) [ 42.227050] dump_stack_lvl+0x8c/0xd0 [ 42.227083] print_report+0x118/0x608 [ 42.227110] kasan_report+0xdc/0x128 [ 42.227140] __asan_report_load8_noabort+0x20/0x30 [ 42.227172] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 42.227205] kasan_bitops_generic+0x11c/0x1c8 [ 42.227232] kunit_try_run_case+0x170/0x3f0 [ 42.227263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.227300] kthread+0x328/0x630 [ 42.227330] ret_from_fork+0x10/0x20 [ 42.227359] [ 42.296020] Allocated by task 308: [ 42.299407] kasan_save_stack+0x3c/0x68 [ 42.303225] kasan_save_track+0x20/0x40 [ 42.307044] kasan_save_alloc_info+0x40/0x58 [ 42.311298] __kasan_kmalloc+0xd4/0xd8 [ 42.315030] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.319544] kasan_bitops_generic+0xa0/0x1c8 [ 42.323797] kunit_try_run_case+0x170/0x3f0 [ 42.327964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.333433] kthread+0x328/0x630 [ 42.336644] ret_from_fork+0x10/0x20 [ 42.340203] [ 42.341679] The buggy address belongs to the object at ffff0008037171e0 [ 42.341679] which belongs to the cache kmalloc-16 of size 16 [ 42.354006] The buggy address is located 8 bytes inside of [ 42.354006] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 42.366245] [ 42.367720] The buggy address belongs to the physical page: [ 42.373279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 42.381263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.387773] page_type: f5(slab) [ 42.390907] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.398629] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.406348] page dumped because: kasan: bad access detected [ 42.411904] [ 42.413379] Memory state around the buggy address: [ 42.418157] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 42.425362] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 42.432567] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 42.439768] ^ [ 42.446368] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.453573] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.460775] ================================================================== [ 43.003551] ================================================================== [ 43.010594] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 43.019534] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 43.026912] [ 43.028393] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 43.028439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.028457] Hardware name: WinLink E850-96 board (DT) [ 43.028476] Call trace: [ 43.028486] show_stack+0x20/0x38 (C) [ 43.028519] dump_stack_lvl+0x8c/0xd0 [ 43.028549] print_report+0x118/0x608 [ 43.028579] kasan_report+0xdc/0x128 [ 43.028608] kasan_check_range+0x100/0x1a8 [ 43.028639] __kasan_check_write+0x20/0x30 [ 43.028671] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 43.028705] kasan_bitops_generic+0x11c/0x1c8 [ 43.028733] kunit_try_run_case+0x170/0x3f0 [ 43.028767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.028804] kthread+0x328/0x630 [ 43.028836] ret_from_fork+0x10/0x20 [ 43.028866] [ 43.100869] Allocated by task 308: [ 43.104256] kasan_save_stack+0x3c/0x68 [ 43.108074] kasan_save_track+0x20/0x40 [ 43.111893] kasan_save_alloc_info+0x40/0x58 [ 43.116147] __kasan_kmalloc+0xd4/0xd8 [ 43.119879] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.124393] kasan_bitops_generic+0xa0/0x1c8 [ 43.128646] kunit_try_run_case+0x170/0x3f0 [ 43.132813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.138282] kthread+0x328/0x630 [ 43.141493] ret_from_fork+0x10/0x20 [ 43.145053] [ 43.146528] The buggy address belongs to the object at ffff0008037171e0 [ 43.146528] which belongs to the cache kmalloc-16 of size 16 [ 43.158854] The buggy address is located 8 bytes inside of [ 43.158854] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 43.171094] [ 43.172570] The buggy address belongs to the physical page: [ 43.178127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 43.186113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.192622] page_type: f5(slab) [ 43.195756] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.203478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.211197] page dumped because: kasan: bad access detected [ 43.216753] [ 43.218228] Memory state around the buggy address: [ 43.223006] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 43.230211] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 43.237415] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 43.244617] ^ [ 43.251217] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.258422] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.265623] ================================================================== [ 41.932920] ================================================================== [ 41.939950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 41.948803] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 41.956181] [ 41.957662] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 41.957709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.957726] Hardware name: WinLink E850-96 board (DT) [ 41.957747] Call trace: [ 41.957759] show_stack+0x20/0x38 (C) [ 41.957792] dump_stack_lvl+0x8c/0xd0 [ 41.957823] print_report+0x118/0x608 [ 41.957852] kasan_report+0xdc/0x128 [ 41.957882] kasan_check_range+0x100/0x1a8 [ 41.957912] __kasan_check_write+0x20/0x30 [ 41.957943] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 41.957977] kasan_bitops_generic+0x11c/0x1c8 [ 41.958005] kunit_try_run_case+0x170/0x3f0 [ 41.958037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.958074] kthread+0x328/0x630 [ 41.958107] ret_from_fork+0x10/0x20 [ 41.958139] [ 42.030052] Allocated by task 308: [ 42.033439] kasan_save_stack+0x3c/0x68 [ 42.037257] kasan_save_track+0x20/0x40 [ 42.041076] kasan_save_alloc_info+0x40/0x58 [ 42.045329] __kasan_kmalloc+0xd4/0xd8 [ 42.049062] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.053575] kasan_bitops_generic+0xa0/0x1c8 [ 42.057829] kunit_try_run_case+0x170/0x3f0 [ 42.061995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.067464] kthread+0x328/0x630 [ 42.070676] ret_from_fork+0x10/0x20 [ 42.074235] [ 42.075711] The buggy address belongs to the object at ffff0008037171e0 [ 42.075711] which belongs to the cache kmalloc-16 of size 16 [ 42.088037] The buggy address is located 8 bytes inside of [ 42.088037] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 42.100276] [ 42.101752] The buggy address belongs to the physical page: [ 42.107310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 42.115295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.121805] page_type: f5(slab) [ 42.124938] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.132661] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.140380] page dumped because: kasan: bad access detected [ 42.145935] [ 42.147411] Memory state around the buggy address: [ 42.152190] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 42.159394] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 42.166598] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 42.173800] ^ [ 42.180400] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.187605] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.194806] ================================================================== [ 43.272967] ================================================================== [ 43.280034] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 43.288974] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 43.296266] [ 43.297745] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 43.297790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.297804] Hardware name: WinLink E850-96 board (DT) [ 43.297823] Call trace: [ 43.297834] show_stack+0x20/0x38 (C) [ 43.297863] dump_stack_lvl+0x8c/0xd0 [ 43.297895] print_report+0x118/0x608 [ 43.297921] kasan_report+0xdc/0x128 [ 43.297949] __asan_report_load8_noabort+0x20/0x30 [ 43.297982] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 43.298016] kasan_bitops_generic+0x11c/0x1c8 [ 43.298046] kunit_try_run_case+0x170/0x3f0 [ 43.298080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.298117] kthread+0x328/0x630 [ 43.298148] ret_from_fork+0x10/0x20 [ 43.298178] [ 43.366837] Allocated by task 308: [ 43.370223] kasan_save_stack+0x3c/0x68 [ 43.374042] kasan_save_track+0x20/0x40 [ 43.377861] kasan_save_alloc_info+0x40/0x58 [ 43.382115] __kasan_kmalloc+0xd4/0xd8 [ 43.385847] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.390361] kasan_bitops_generic+0xa0/0x1c8 [ 43.394614] kunit_try_run_case+0x170/0x3f0 [ 43.398781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.404250] kthread+0x328/0x630 [ 43.407461] ret_from_fork+0x10/0x20 [ 43.411021] [ 43.412496] The buggy address belongs to the object at ffff0008037171e0 [ 43.412496] which belongs to the cache kmalloc-16 of size 16 [ 43.424823] The buggy address is located 8 bytes inside of [ 43.424823] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 43.437062] [ 43.438538] The buggy address belongs to the physical page: [ 43.444094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 43.452080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.458591] page_type: f5(slab) [ 43.461724] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.469446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.477165] page dumped because: kasan: bad access detected [ 43.482721] [ 43.484196] Memory state around the buggy address: [ 43.488974] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 43.496179] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 43.503384] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 43.510585] ^ [ 43.517185] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.524390] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.531592] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 39.800392] ================================================================== [ 39.807345] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 39.815502] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 39.822880] [ 39.824363] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 39.824410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.824425] Hardware name: WinLink E850-96 board (DT) [ 39.824443] Call trace: [ 39.824455] show_stack+0x20/0x38 (C) [ 39.824491] dump_stack_lvl+0x8c/0xd0 [ 39.824524] print_report+0x118/0x608 [ 39.824552] kasan_report+0xdc/0x128 [ 39.824581] kasan_check_range+0x100/0x1a8 [ 39.824610] __kasan_check_write+0x20/0x30 [ 39.824645] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 39.824675] kasan_bitops_generic+0x110/0x1c8 [ 39.824701] kunit_try_run_case+0x170/0x3f0 [ 39.824736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.824773] kthread+0x328/0x630 [ 39.824803] ret_from_fork+0x10/0x20 [ 39.824839] [ 39.896056] Allocated by task 308: [ 39.899442] kasan_save_stack+0x3c/0x68 [ 39.903261] kasan_save_track+0x20/0x40 [ 39.907080] kasan_save_alloc_info+0x40/0x58 [ 39.911333] __kasan_kmalloc+0xd4/0xd8 [ 39.915066] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.919580] kasan_bitops_generic+0xa0/0x1c8 [ 39.923834] kunit_try_run_case+0x170/0x3f0 [ 39.928000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.933469] kthread+0x328/0x630 [ 39.936680] ret_from_fork+0x10/0x20 [ 39.940240] [ 39.941715] The buggy address belongs to the object at ffff0008037171e0 [ 39.941715] which belongs to the cache kmalloc-16 of size 16 [ 39.954042] The buggy address is located 8 bytes inside of [ 39.954042] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 39.966281] [ 39.967756] The buggy address belongs to the physical page: [ 39.973314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 39.981299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.987808] page_type: f5(slab) [ 39.990941] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 39.998665] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.006384] page dumped because: kasan: bad access detected [ 40.011939] [ 40.013415] Memory state around the buggy address: [ 40.018195] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 40.025398] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 40.032602] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 40.039804] ^ [ 40.046404] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.053609] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.060811] ================================================================== [ 40.068194] ================================================================== [ 40.075224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 40.083381] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 40.090671] [ 40.092156] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 40.092208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.092224] Hardware name: WinLink E850-96 board (DT) [ 40.092244] Call trace: [ 40.092259] show_stack+0x20/0x38 (C) [ 40.092289] dump_stack_lvl+0x8c/0xd0 [ 40.092322] print_report+0x118/0x608 [ 40.092351] kasan_report+0xdc/0x128 [ 40.092381] __asan_report_load8_noabort+0x20/0x30 [ 40.092415] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 40.092447] kasan_bitops_generic+0x110/0x1c8 [ 40.092475] kunit_try_run_case+0x170/0x3f0 [ 40.092511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.092548] kthread+0x328/0x630 [ 40.092582] ret_from_fork+0x10/0x20 [ 40.092614] [ 40.160462] Allocated by task 308: [ 40.163849] kasan_save_stack+0x3c/0x68 [ 40.167667] kasan_save_track+0x20/0x40 [ 40.171486] kasan_save_alloc_info+0x40/0x58 [ 40.175739] __kasan_kmalloc+0xd4/0xd8 [ 40.179472] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.183986] kasan_bitops_generic+0xa0/0x1c8 [ 40.188239] kunit_try_run_case+0x170/0x3f0 [ 40.192406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.197874] kthread+0x328/0x630 [ 40.201086] ret_from_fork+0x10/0x20 [ 40.204645] [ 40.206120] The buggy address belongs to the object at ffff0008037171e0 [ 40.206120] which belongs to the cache kmalloc-16 of size 16 [ 40.218448] The buggy address is located 8 bytes inside of [ 40.218448] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 40.230686] [ 40.232162] The buggy address belongs to the physical page: [ 40.237721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 40.245705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.252215] page_type: f5(slab) [ 40.255349] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 40.263071] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.270790] page dumped because: kasan: bad access detected [ 40.276345] [ 40.277821] Memory state around the buggy address: [ 40.282599] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 40.289804] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 40.297008] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 40.304210] ^ [ 40.310810] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.318015] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.325216] ================================================================== [ 41.668529] ================================================================== [ 41.675545] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 41.683703] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 41.690994] [ 41.692476] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 41.692521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.692540] Hardware name: WinLink E850-96 board (DT) [ 41.692558] Call trace: [ 41.692568] show_stack+0x20/0x38 (C) [ 41.692598] dump_stack_lvl+0x8c/0xd0 [ 41.692630] print_report+0x118/0x608 [ 41.692659] kasan_report+0xdc/0x128 [ 41.692689] __asan_report_load8_noabort+0x20/0x30 [ 41.692722] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 41.692754] kasan_bitops_generic+0x110/0x1c8 [ 41.692785] kunit_try_run_case+0x170/0x3f0 [ 41.692818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.692855] kthread+0x328/0x630 [ 41.692890] ret_from_fork+0x10/0x20 [ 41.692924] [ 41.760785] Allocated by task 308: [ 41.764170] kasan_save_stack+0x3c/0x68 [ 41.767990] kasan_save_track+0x20/0x40 [ 41.771809] kasan_save_alloc_info+0x40/0x58 [ 41.776062] __kasan_kmalloc+0xd4/0xd8 [ 41.779795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.784309] kasan_bitops_generic+0xa0/0x1c8 [ 41.788562] kunit_try_run_case+0x170/0x3f0 [ 41.792729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.798198] kthread+0x328/0x630 [ 41.801409] ret_from_fork+0x10/0x20 [ 41.804968] [ 41.806444] The buggy address belongs to the object at ffff0008037171e0 [ 41.806444] which belongs to the cache kmalloc-16 of size 16 [ 41.818771] The buggy address is located 8 bytes inside of [ 41.818771] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 41.831010] [ 41.832487] The buggy address belongs to the physical page: [ 41.838043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 41.846028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.852539] page_type: f5(slab) [ 41.855671] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.863394] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.871113] page dumped because: kasan: bad access detected [ 41.876668] [ 41.878144] Memory state around the buggy address: [ 41.882923] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 41.890127] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 41.897332] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 41.904533] ^ [ 41.911133] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.918338] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.925540] ================================================================== [ 40.868353] ================================================================== [ 40.875383] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 40.883541] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 40.890833] [ 40.892315] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 40.892359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.892375] Hardware name: WinLink E850-96 board (DT) [ 40.892396] Call trace: [ 40.892409] show_stack+0x20/0x38 (C) [ 40.892440] dump_stack_lvl+0x8c/0xd0 [ 40.892471] print_report+0x118/0x608 [ 40.892499] kasan_report+0xdc/0x128 [ 40.892527] __asan_report_load8_noabort+0x20/0x30 [ 40.892562] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 40.892595] kasan_bitops_generic+0x110/0x1c8 [ 40.892623] kunit_try_run_case+0x170/0x3f0 [ 40.892657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.892696] kthread+0x328/0x630 [ 40.892729] ret_from_fork+0x10/0x20 [ 40.892761] [ 40.960623] Allocated by task 308: [ 40.964010] kasan_save_stack+0x3c/0x68 [ 40.967828] kasan_save_track+0x20/0x40 [ 40.971648] kasan_save_alloc_info+0x40/0x58 [ 40.975901] __kasan_kmalloc+0xd4/0xd8 [ 40.979634] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.984147] kasan_bitops_generic+0xa0/0x1c8 [ 40.988401] kunit_try_run_case+0x170/0x3f0 [ 40.992567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.998036] kthread+0x328/0x630 [ 41.001248] ret_from_fork+0x10/0x20 [ 41.004807] [ 41.006282] The buggy address belongs to the object at ffff0008037171e0 [ 41.006282] which belongs to the cache kmalloc-16 of size 16 [ 41.018609] The buggy address is located 8 bytes inside of [ 41.018609] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 41.030848] [ 41.032324] The buggy address belongs to the physical page: [ 41.037879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 41.045867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.052377] page_type: f5(slab) [ 41.055510] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.063232] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.070952] page dumped because: kasan: bad access detected [ 41.076507] [ 41.077982] Memory state around the buggy address: [ 41.082760] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 41.089966] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 41.097170] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 41.104371] ^ [ 41.110972] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.118177] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.125378] ================================================================== [ 39.535879] ================================================================== [ 39.542940] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 39.551096] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 39.558387] [ 39.559870] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 39.559918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.559934] Hardware name: WinLink E850-96 board (DT) [ 39.559952] Call trace: [ 39.559965] show_stack+0x20/0x38 (C) [ 39.559996] dump_stack_lvl+0x8c/0xd0 [ 39.560034] print_report+0x118/0x608 [ 39.560066] kasan_report+0xdc/0x128 [ 39.560096] __asan_report_load8_noabort+0x20/0x30 [ 39.560130] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 39.560160] kasan_bitops_generic+0x110/0x1c8 [ 39.560189] kunit_try_run_case+0x170/0x3f0 [ 39.560223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.560261] kthread+0x328/0x630 [ 39.560293] ret_from_fork+0x10/0x20 [ 39.560327] [ 39.628178] Allocated by task 308: [ 39.631563] kasan_save_stack+0x3c/0x68 [ 39.635383] kasan_save_track+0x20/0x40 [ 39.639202] kasan_save_alloc_info+0x40/0x58 [ 39.643456] __kasan_kmalloc+0xd4/0xd8 [ 39.647188] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.651702] kasan_bitops_generic+0xa0/0x1c8 [ 39.655956] kunit_try_run_case+0x170/0x3f0 [ 39.660122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.665591] kthread+0x328/0x630 [ 39.668803] ret_from_fork+0x10/0x20 [ 39.672362] [ 39.673837] The buggy address belongs to the object at ffff0008037171e0 [ 39.673837] which belongs to the cache kmalloc-16 of size 16 [ 39.686165] The buggy address is located 8 bytes inside of [ 39.686165] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 39.698403] [ 39.699878] The buggy address belongs to the physical page: [ 39.705437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 39.713422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.719930] page_type: f5(slab) [ 39.723066] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 39.730787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 39.738506] page dumped because: kasan: bad access detected [ 39.744062] [ 39.745537] Memory state around the buggy address: [ 39.750317] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 39.757520] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 39.764725] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 39.771926] ^ [ 39.778527] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.785731] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.792933] ================================================================== [ 39.265705] ================================================================== [ 39.275063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 39.283220] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 39.290597] [ 39.292079] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 39.292137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.292155] Hardware name: WinLink E850-96 board (DT) [ 39.292177] Call trace: [ 39.292189] show_stack+0x20/0x38 (C) [ 39.292222] dump_stack_lvl+0x8c/0xd0 [ 39.292259] print_report+0x118/0x608 [ 39.292290] kasan_report+0xdc/0x128 [ 39.292318] kasan_check_range+0x100/0x1a8 [ 39.292351] __kasan_check_write+0x20/0x30 [ 39.292384] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 39.292415] kasan_bitops_generic+0x110/0x1c8 [ 39.292444] kunit_try_run_case+0x170/0x3f0 [ 39.292480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.292517] kthread+0x328/0x630 [ 39.292552] ret_from_fork+0x10/0x20 [ 39.292589] [ 39.363772] Allocated by task 308: [ 39.367159] kasan_save_stack+0x3c/0x68 [ 39.370977] kasan_save_track+0x20/0x40 [ 39.374796] kasan_save_alloc_info+0x40/0x58 [ 39.379050] __kasan_kmalloc+0xd4/0xd8 [ 39.382783] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.387298] kasan_bitops_generic+0xa0/0x1c8 [ 39.391550] kunit_try_run_case+0x170/0x3f0 [ 39.395716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.401185] kthread+0x328/0x630 [ 39.404397] ret_from_fork+0x10/0x20 [ 39.407955] [ 39.409434] The buggy address belongs to the object at ffff0008037171e0 [ 39.409434] which belongs to the cache kmalloc-16 of size 16 [ 39.421761] The buggy address is located 8 bytes inside of [ 39.421761] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 39.433997] [ 39.435476] The buggy address belongs to the physical page: [ 39.441032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 39.449016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.455524] page_type: f5(slab) [ 39.458661] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 39.466382] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 39.474100] page dumped because: kasan: bad access detected [ 39.479656] [ 39.481132] Memory state around the buggy address: [ 39.485914] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 39.493114] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 39.500319] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 39.507520] ^ [ 39.514122] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.521326] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.528527] ================================================================== [ 40.332606] ================================================================== [ 40.339630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 40.347786] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 40.355164] [ 40.356646] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 40.356690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.356706] Hardware name: WinLink E850-96 board (DT) [ 40.356726] Call trace: [ 40.356739] show_stack+0x20/0x38 (C) [ 40.356769] dump_stack_lvl+0x8c/0xd0 [ 40.356803] print_report+0x118/0x608 [ 40.356829] kasan_report+0xdc/0x128 [ 40.356856] kasan_check_range+0x100/0x1a8 [ 40.356888] __kasan_check_write+0x20/0x30 [ 40.356918] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 40.356950] kasan_bitops_generic+0x110/0x1c8 [ 40.356978] kunit_try_run_case+0x170/0x3f0 [ 40.357012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.357050] kthread+0x328/0x630 [ 40.357083] ret_from_fork+0x10/0x20 [ 40.357116] [ 40.428339] Allocated by task 308: [ 40.431725] kasan_save_stack+0x3c/0x68 [ 40.435545] kasan_save_track+0x20/0x40 [ 40.439364] kasan_save_alloc_info+0x40/0x58 [ 40.443617] __kasan_kmalloc+0xd4/0xd8 [ 40.447350] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.451863] kasan_bitops_generic+0xa0/0x1c8 [ 40.456117] kunit_try_run_case+0x170/0x3f0 [ 40.460284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.465752] kthread+0x328/0x630 [ 40.468964] ret_from_fork+0x10/0x20 [ 40.472523] [ 40.473998] The buggy address belongs to the object at ffff0008037171e0 [ 40.473998] which belongs to the cache kmalloc-16 of size 16 [ 40.486325] The buggy address is located 8 bytes inside of [ 40.486325] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 40.498564] [ 40.500041] The buggy address belongs to the physical page: [ 40.505596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 40.513583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.520093] page_type: f5(slab) [ 40.523226] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 40.530949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.538668] page dumped because: kasan: bad access detected [ 40.544223] [ 40.545699] Memory state around the buggy address: [ 40.550477] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 40.557682] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 40.564886] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 40.572087] ^ [ 40.578688] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.585893] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.593094] ================================================================== [ 40.600482] ================================================================== [ 40.607505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 40.615664] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 40.623042] [ 40.624522] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 40.624568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.624584] Hardware name: WinLink E850-96 board (DT) [ 40.624602] Call trace: [ 40.624614] show_stack+0x20/0x38 (C) [ 40.624645] dump_stack_lvl+0x8c/0xd0 [ 40.624677] print_report+0x118/0x608 [ 40.624707] kasan_report+0xdc/0x128 [ 40.624737] kasan_check_range+0x100/0x1a8 [ 40.624769] __kasan_check_write+0x20/0x30 [ 40.624801] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 40.624831] kasan_bitops_generic+0x110/0x1c8 [ 40.624858] kunit_try_run_case+0x170/0x3f0 [ 40.624893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.624930] kthread+0x328/0x630 [ 40.624963] ret_from_fork+0x10/0x20 [ 40.624996] [ 40.696217] Allocated by task 308: [ 40.699605] kasan_save_stack+0x3c/0x68 [ 40.703422] kasan_save_track+0x20/0x40 [ 40.707242] kasan_save_alloc_info+0x40/0x58 [ 40.711495] __kasan_kmalloc+0xd4/0xd8 [ 40.715228] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.719741] kasan_bitops_generic+0xa0/0x1c8 [ 40.723995] kunit_try_run_case+0x170/0x3f0 [ 40.728161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.733630] kthread+0x328/0x630 [ 40.736842] ret_from_fork+0x10/0x20 [ 40.740401] [ 40.741877] The buggy address belongs to the object at ffff0008037171e0 [ 40.741877] which belongs to the cache kmalloc-16 of size 16 [ 40.754203] The buggy address is located 8 bytes inside of [ 40.754203] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 40.766442] [ 40.767918] The buggy address belongs to the physical page: [ 40.773474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 40.781461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.787971] page_type: f5(slab) [ 40.791105] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 40.798827] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.806546] page dumped because: kasan: bad access detected [ 40.812101] [ 40.813577] Memory state around the buggy address: [ 40.818356] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 40.825559] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 40.832764] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 40.839966] ^ [ 40.846566] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.853771] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.860972] ================================================================== [ 41.400660] ================================================================== [ 41.407667] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 41.415825] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 41.423203] [ 41.424686] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 41.424732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.424751] Hardware name: WinLink E850-96 board (DT) [ 41.424767] Call trace: [ 41.424779] show_stack+0x20/0x38 (C) [ 41.424810] dump_stack_lvl+0x8c/0xd0 [ 41.424842] print_report+0x118/0x608 [ 41.424872] kasan_report+0xdc/0x128 [ 41.424901] kasan_check_range+0x100/0x1a8 [ 41.424931] __kasan_check_write+0x20/0x30 [ 41.424964] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 41.424995] kasan_bitops_generic+0x110/0x1c8 [ 41.425024] kunit_try_run_case+0x170/0x3f0 [ 41.425056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.425093] kthread+0x328/0x630 [ 41.425125] ret_from_fork+0x10/0x20 [ 41.425156] [ 41.496379] Allocated by task 308: [ 41.499765] kasan_save_stack+0x3c/0x68 [ 41.503584] kasan_save_track+0x20/0x40 [ 41.507404] kasan_save_alloc_info+0x40/0x58 [ 41.511657] __kasan_kmalloc+0xd4/0xd8 [ 41.515389] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.519903] kasan_bitops_generic+0xa0/0x1c8 [ 41.524156] kunit_try_run_case+0x170/0x3f0 [ 41.528323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.533792] kthread+0x328/0x630 [ 41.537004] ret_from_fork+0x10/0x20 [ 41.540562] [ 41.542038] The buggy address belongs to the object at ffff0008037171e0 [ 41.542038] which belongs to the cache kmalloc-16 of size 16 [ 41.554365] The buggy address is located 8 bytes inside of [ 41.554365] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 41.566604] [ 41.568080] The buggy address belongs to the physical page: [ 41.573636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 41.581623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.588133] page_type: f5(slab) [ 41.591266] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.598989] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.606708] page dumped because: kasan: bad access detected [ 41.612263] [ 41.613738] Memory state around the buggy address: [ 41.618517] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 41.625721] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 41.632926] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 41.640127] ^ [ 41.646728] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.653932] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.661134] ================================================================== [ 41.132712] ================================================================== [ 41.139789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 41.147947] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 41.155325] [ 41.156806] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 41.156849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.156867] Hardware name: WinLink E850-96 board (DT) [ 41.156887] Call trace: [ 41.156898] show_stack+0x20/0x38 (C) [ 41.156930] dump_stack_lvl+0x8c/0xd0 [ 41.156964] print_report+0x118/0x608 [ 41.156993] kasan_report+0xdc/0x128 [ 41.157021] kasan_check_range+0x100/0x1a8 [ 41.157053] __kasan_check_write+0x20/0x30 [ 41.157084] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 41.157117] kasan_bitops_generic+0x110/0x1c8 [ 41.157145] kunit_try_run_case+0x170/0x3f0 [ 41.157178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.157216] kthread+0x328/0x630 [ 41.157247] ret_from_fork+0x10/0x20 [ 41.157277] [ 41.228501] Allocated by task 308: [ 41.231887] kasan_save_stack+0x3c/0x68 [ 41.235706] kasan_save_track+0x20/0x40 [ 41.239526] kasan_save_alloc_info+0x40/0x58 [ 41.243779] __kasan_kmalloc+0xd4/0xd8 [ 41.247511] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.252025] kasan_bitops_generic+0xa0/0x1c8 [ 41.256279] kunit_try_run_case+0x170/0x3f0 [ 41.260445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.265914] kthread+0x328/0x630 [ 41.269126] ret_from_fork+0x10/0x20 [ 41.272685] [ 41.274160] The buggy address belongs to the object at ffff0008037171e0 [ 41.274160] which belongs to the cache kmalloc-16 of size 16 [ 41.286487] The buggy address is located 8 bytes inside of [ 41.286487] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 41.298726] [ 41.300202] The buggy address belongs to the physical page: [ 41.305758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 41.313745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.320253] page_type: f5(slab) [ 41.323388] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.331111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.338829] page dumped because: kasan: bad access detected [ 41.344385] [ 41.345860] Memory state around the buggy address: [ 41.350640] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 41.357843] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 41.365048] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 41.372249] ^ [ 41.378850] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.386055] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.393256] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 38.965084] ================================================================== [ 38.972116] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 38.978101] Read of size 1 at addr ffff00080394fc10 by task kunit_try_catch/306 [ 38.985393] [ 38.986876] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 38.986931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.986948] Hardware name: WinLink E850-96 board (DT) [ 38.986970] Call trace: [ 38.986982] show_stack+0x20/0x38 (C) [ 38.987014] dump_stack_lvl+0x8c/0xd0 [ 38.987045] print_report+0x118/0x608 [ 38.987077] kasan_report+0xdc/0x128 [ 38.987104] __asan_report_load1_noabort+0x20/0x30 [ 38.987138] strnlen+0x80/0x88 [ 38.987163] kasan_strings+0x478/0xb00 [ 38.987198] kunit_try_run_case+0x170/0x3f0 [ 38.987230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.987269] kthread+0x328/0x630 [ 38.987299] ret_from_fork+0x10/0x20 [ 38.987334] [ 39.052319] Allocated by task 306: [ 39.055704] kasan_save_stack+0x3c/0x68 [ 39.059524] kasan_save_track+0x20/0x40 [ 39.063343] kasan_save_alloc_info+0x40/0x58 [ 39.067596] __kasan_kmalloc+0xd4/0xd8 [ 39.071329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.075843] kasan_strings+0xc8/0xb00 [ 39.079489] kunit_try_run_case+0x170/0x3f0 [ 39.083655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.089124] kthread+0x328/0x630 [ 39.092335] ret_from_fork+0x10/0x20 [ 39.095895] [ 39.097370] Freed by task 306: [ 39.100410] kasan_save_stack+0x3c/0x68 [ 39.104228] kasan_save_track+0x20/0x40 [ 39.108047] kasan_save_free_info+0x4c/0x78 [ 39.112214] __kasan_slab_free+0x6c/0x98 [ 39.116120] kfree+0x214/0x3c8 [ 39.119158] kasan_strings+0x24c/0xb00 [ 39.122891] kunit_try_run_case+0x170/0x3f0 [ 39.127057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.132526] kthread+0x328/0x630 [ 39.135738] ret_from_fork+0x10/0x20 [ 39.139296] [ 39.140772] The buggy address belongs to the object at ffff00080394fc00 [ 39.140772] which belongs to the cache kmalloc-32 of size 32 [ 39.153099] The buggy address is located 16 bytes inside of [ 39.153099] freed 32-byte region [ffff00080394fc00, ffff00080394fc20) [ 39.165164] [ 39.166643] The buggy address belongs to the physical page: [ 39.172196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88394f [ 39.180182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.186691] page_type: f5(slab) [ 39.189826] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 39.197549] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 39.205268] page dumped because: kasan: bad access detected [ 39.210823] [ 39.212299] Memory state around the buggy address: [ 39.217080] ffff00080394fb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.224282] ffff00080394fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.231486] >ffff00080394fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.238688] ^ [ 39.242423] ffff00080394fc80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 39.249628] ffff00080394fd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.256830] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 37.522626] ================================================================== [ 37.532293] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 37.539845] Read of size 1 at addr ffff800089377b4a by task kunit_try_catch/300 [ 37.547133] [ 37.548619] CPU: 3 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 37.548676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.548695] Hardware name: WinLink E850-96 board (DT) [ 37.548722] Call trace: [ 37.548738] show_stack+0x20/0x38 (C) [ 37.548774] dump_stack_lvl+0x8c/0xd0 [ 37.548810] print_report+0x310/0x608 [ 37.548842] kasan_report+0xdc/0x128 [ 37.548873] __asan_report_load1_noabort+0x20/0x30 [ 37.548907] kasan_alloca_oob_right+0x2dc/0x340 [ 37.548944] kunit_try_run_case+0x170/0x3f0 [ 37.548985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.549026] kthread+0x328/0x630 [ 37.549065] ret_from_fork+0x10/0x20 [ 37.549100] [ 37.611805] The buggy address belongs to stack of task kunit_try_catch/300 [ 37.618682] [ 37.620139] The buggy address belongs to the virtual mapping at [ 37.620139] [ffff800089370000, ffff800089379000) created by: [ 37.620139] kernel_clone+0x150/0x7a8 [ 37.635413] [ 37.636894] The buggy address belongs to the physical page: [ 37.642449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867ee [ 37.650434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.656954] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.664672] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.672391] page dumped because: kasan: bad access detected [ 37.677947] [ 37.679423] Memory state around the buggy address: [ 37.684202] ffff800089377a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.691405] ffff800089377a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.698610] >ffff800089377b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 37.705811] ^ [ 37.711370] ffff800089377b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 37.718576] ffff800089377c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 37.725776] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 38.666061] ================================================================== [ 38.673159] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 38.679060] Read of size 1 at addr ffff00080394fc10 by task kunit_try_catch/306 [ 38.686352] [ 38.687835] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 38.687887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.687906] Hardware name: WinLink E850-96 board (DT) [ 38.687928] Call trace: [ 38.687941] show_stack+0x20/0x38 (C) [ 38.687974] dump_stack_lvl+0x8c/0xd0 [ 38.688009] print_report+0x118/0x608 [ 38.688038] kasan_report+0xdc/0x128 [ 38.688068] __asan_report_load1_noabort+0x20/0x30 [ 38.688102] strlen+0xa8/0xb0 [ 38.688128] kasan_strings+0x418/0xb00 [ 38.688161] kunit_try_run_case+0x170/0x3f0 [ 38.688193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.688231] kthread+0x328/0x630 [ 38.688262] ret_from_fork+0x10/0x20 [ 38.688295] [ 38.753191] Allocated by task 306: [ 38.756577] kasan_save_stack+0x3c/0x68 [ 38.760396] kasan_save_track+0x20/0x40 [ 38.764215] kasan_save_alloc_info+0x40/0x58 [ 38.768469] __kasan_kmalloc+0xd4/0xd8 [ 38.772203] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.776715] kasan_strings+0xc8/0xb00 [ 38.780361] kunit_try_run_case+0x170/0x3f0 [ 38.784527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.789996] kthread+0x328/0x630 [ 38.793208] ret_from_fork+0x10/0x20 [ 38.796767] [ 38.798242] Freed by task 306: [ 38.801281] kasan_save_stack+0x3c/0x68 [ 38.805100] kasan_save_track+0x20/0x40 [ 38.808919] kasan_save_free_info+0x4c/0x78 [ 38.813086] __kasan_slab_free+0x6c/0x98 [ 38.816992] kfree+0x214/0x3c8 [ 38.820031] kasan_strings+0x24c/0xb00 [ 38.823763] kunit_try_run_case+0x170/0x3f0 [ 38.827929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.833398] kthread+0x328/0x630 [ 38.836610] ret_from_fork+0x10/0x20 [ 38.840169] [ 38.841645] The buggy address belongs to the object at ffff00080394fc00 [ 38.841645] which belongs to the cache kmalloc-32 of size 32 [ 38.853971] The buggy address is located 16 bytes inside of [ 38.853971] freed 32-byte region [ffff00080394fc00, ffff00080394fc20) [ 38.866037] [ 38.867515] The buggy address belongs to the physical page: [ 38.873070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88394f [ 38.881056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.887564] page_type: f5(slab) [ 38.890698] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 38.898421] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 38.906140] page dumped because: kasan: bad access detected [ 38.911695] [ 38.913171] Memory state around the buggy address: [ 38.917950] ffff00080394fb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.925154] ffff00080394fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.932359] >ffff00080394fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.939560] ^ [ 38.943296] ffff00080394fc80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 38.950501] ffff00080394fd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.957702] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 38.369280] ================================================================== [ 38.376376] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 38.383059] Read of size 1 at addr ffff00080394fc10 by task kunit_try_catch/306 [ 38.390349] [ 38.391834] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 38.391886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.391903] Hardware name: WinLink E850-96 board (DT) [ 38.391924] Call trace: [ 38.391936] show_stack+0x20/0x38 (C) [ 38.391969] dump_stack_lvl+0x8c/0xd0 [ 38.392006] print_report+0x118/0x608 [ 38.392039] kasan_report+0xdc/0x128 [ 38.392067] __asan_report_load1_noabort+0x20/0x30 [ 38.392101] kasan_strings+0x95c/0xb00 [ 38.392136] kunit_try_run_case+0x170/0x3f0 [ 38.392171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.392210] kthread+0x328/0x630 [ 38.392243] ret_from_fork+0x10/0x20 [ 38.392277] [ 38.454237] Allocated by task 306: [ 38.457623] kasan_save_stack+0x3c/0x68 [ 38.461442] kasan_save_track+0x20/0x40 [ 38.465262] kasan_save_alloc_info+0x40/0x58 [ 38.469515] __kasan_kmalloc+0xd4/0xd8 [ 38.473249] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.477763] kasan_strings+0xc8/0xb00 [ 38.481407] kunit_try_run_case+0x170/0x3f0 [ 38.485574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.491042] kthread+0x328/0x630 [ 38.494254] ret_from_fork+0x10/0x20 [ 38.497813] [ 38.499289] Freed by task 306: [ 38.502328] kasan_save_stack+0x3c/0x68 [ 38.506146] kasan_save_track+0x20/0x40 [ 38.509966] kasan_save_free_info+0x4c/0x78 [ 38.514132] __kasan_slab_free+0x6c/0x98 [ 38.518038] kfree+0x214/0x3c8 [ 38.521077] kasan_strings+0x24c/0xb00 [ 38.524809] kunit_try_run_case+0x170/0x3f0 [ 38.528976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.534444] kthread+0x328/0x630 [ 38.537656] ret_from_fork+0x10/0x20 [ 38.541215] [ 38.542690] The buggy address belongs to the object at ffff00080394fc00 [ 38.542690] which belongs to the cache kmalloc-32 of size 32 [ 38.555018] The buggy address is located 16 bytes inside of [ 38.555018] freed 32-byte region [ffff00080394fc00, ffff00080394fc20) [ 38.567083] [ 38.568562] The buggy address belongs to the physical page: [ 38.574116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88394f [ 38.582102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.588612] page_type: f5(slab) [ 38.591745] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 38.599467] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 38.607186] page dumped because: kasan: bad access detected [ 38.612742] [ 38.614217] Memory state around the buggy address: [ 38.618998] ffff00080394fb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.626200] ffff00080394fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.633405] >ffff00080394fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.640606] ^ [ 38.644342] ffff00080394fc80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 38.651547] ffff00080394fd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.658748] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 38.053860] ================================================================== [ 38.077426] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 38.083323] Read of size 1 at addr ffff00080394fc10 by task kunit_try_catch/306 [ 38.090614] [ 38.092101] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 38.092156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.092175] Hardware name: WinLink E850-96 board (DT) [ 38.092198] Call trace: [ 38.092213] show_stack+0x20/0x38 (C) [ 38.092250] dump_stack_lvl+0x8c/0xd0 [ 38.092284] print_report+0x118/0x608 [ 38.092318] kasan_report+0xdc/0x128 [ 38.092348] __asan_report_load1_noabort+0x20/0x30 [ 38.092383] strcmp+0xc0/0xc8 [ 38.092408] kasan_strings+0x340/0xb00 [ 38.092442] kunit_try_run_case+0x170/0x3f0 [ 38.092480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.092521] kthread+0x328/0x630 [ 38.092554] ret_from_fork+0x10/0x20 [ 38.092592] [ 38.157454] Allocated by task 306: [ 38.160841] kasan_save_stack+0x3c/0x68 [ 38.164659] kasan_save_track+0x20/0x40 [ 38.168478] kasan_save_alloc_info+0x40/0x58 [ 38.172731] __kasan_kmalloc+0xd4/0xd8 [ 38.176465] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.180977] kasan_strings+0xc8/0xb00 [ 38.184623] kunit_try_run_case+0x170/0x3f0 [ 38.188790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.194259] kthread+0x328/0x630 [ 38.197470] ret_from_fork+0x10/0x20 [ 38.201029] [ 38.202506] Freed by task 306: [ 38.205545] kasan_save_stack+0x3c/0x68 [ 38.209363] kasan_save_track+0x20/0x40 [ 38.213183] kasan_save_free_info+0x4c/0x78 [ 38.217349] __kasan_slab_free+0x6c/0x98 [ 38.221255] kfree+0x214/0x3c8 [ 38.224293] kasan_strings+0x24c/0xb00 [ 38.228025] kunit_try_run_case+0x170/0x3f0 [ 38.232192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.237661] kthread+0x328/0x630 [ 38.240872] ret_from_fork+0x10/0x20 [ 38.244431] [ 38.245909] The buggy address belongs to the object at ffff00080394fc00 [ 38.245909] which belongs to the cache kmalloc-32 of size 32 [ 38.258235] The buggy address is located 16 bytes inside of [ 38.258235] freed 32-byte region [ffff00080394fc00, ffff00080394fc20) [ 38.270299] [ 38.271778] The buggy address belongs to the physical page: [ 38.277335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88394f [ 38.285320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.291828] page_type: f5(slab) [ 38.294966] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 38.302684] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 38.310403] page dumped because: kasan: bad access detected [ 38.315958] [ 38.317433] Memory state around the buggy address: [ 38.322215] ffff00080394fb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.329417] ffff00080394fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.336622] >ffff00080394fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.343823] ^ [ 38.347558] ffff00080394fc80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 38.354763] ffff00080394fd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 38.361965] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 37.755338] ================================================================== [ 37.765537] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 37.771522] Read of size 1 at addr ffff0008064dea98 by task kunit_try_catch/304 [ 37.778813] [ 37.780301] CPU: 4 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 37.780357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.780376] Hardware name: WinLink E850-96 board (DT) [ 37.780399] Call trace: [ 37.780414] show_stack+0x20/0x38 (C) [ 37.780450] dump_stack_lvl+0x8c/0xd0 [ 37.780488] print_report+0x118/0x608 [ 37.780524] kasan_report+0xdc/0x128 [ 37.780553] __asan_report_load1_noabort+0x20/0x30 [ 37.780591] memcmp+0x198/0x1d8 [ 37.780618] kasan_memcmp+0x16c/0x300 [ 37.780651] kunit_try_run_case+0x170/0x3f0 [ 37.780690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.780731] kthread+0x328/0x630 [ 37.780764] ret_from_fork+0x10/0x20 [ 37.780802] [ 37.845741] Allocated by task 304: [ 37.849129] kasan_save_stack+0x3c/0x68 [ 37.852944] kasan_save_track+0x20/0x40 [ 37.856764] kasan_save_alloc_info+0x40/0x58 [ 37.861017] __kasan_kmalloc+0xd4/0xd8 [ 37.864750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.869263] kasan_memcmp+0xbc/0x300 [ 37.872823] kunit_try_run_case+0x170/0x3f0 [ 37.876989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.882459] kthread+0x328/0x630 [ 37.885670] ret_from_fork+0x10/0x20 [ 37.889228] [ 37.890706] The buggy address belongs to the object at ffff0008064dea80 [ 37.890706] which belongs to the cache kmalloc-32 of size 32 [ 37.903033] The buggy address is located 0 bytes to the right of [ 37.903033] allocated 24-byte region [ffff0008064dea80, ffff0008064dea98) [ 37.915877] [ 37.917357] The buggy address belongs to the physical page: [ 37.922913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8864de [ 37.930898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.937407] page_type: f5(slab) [ 37.940545] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 37.948262] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 37.955981] page dumped because: kasan: bad access detected [ 37.961536] [ 37.963013] Memory state around the buggy address: [ 37.967795] ffff0008064de980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 37.974996] ffff0008064dea00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 37.982199] >ffff0008064dea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.989401] ^ [ 37.993397] ffff0008064deb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.000602] ffff0008064deb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.007804] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 37.310503] ================================================================== [ 37.319886] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 37.327345] Read of size 1 at addr ffff800089357b5f by task kunit_try_catch/298 [ 37.334636] [ 37.336122] CPU: 4 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 37.336181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.336198] Hardware name: WinLink E850-96 board (DT) [ 37.336226] Call trace: [ 37.336241] show_stack+0x20/0x38 (C) [ 37.336274] dump_stack_lvl+0x8c/0xd0 [ 37.336311] print_report+0x310/0x608 [ 37.336344] kasan_report+0xdc/0x128 [ 37.336372] __asan_report_load1_noabort+0x20/0x30 [ 37.336406] kasan_alloca_oob_left+0x2b8/0x310 [ 37.336440] kunit_try_run_case+0x170/0x3f0 [ 37.336475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.336516] kthread+0x328/0x630 [ 37.336552] ret_from_fork+0x10/0x20 [ 37.336586] [ 37.399223] The buggy address belongs to stack of task kunit_try_catch/298 [ 37.406098] [ 37.407558] The buggy address belongs to the virtual mapping at [ 37.407558] [ffff800089350000, ffff800089359000) created by: [ 37.407558] kernel_clone+0x150/0x7a8 [ 37.422829] [ 37.424309] The buggy address belongs to the physical page: [ 37.429865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8868fb [ 37.437849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.444372] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.452089] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.459808] page dumped because: kasan: bad access detected [ 37.465364] [ 37.466839] Memory state around the buggy address: [ 37.471618] ffff800089357a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.478822] ffff800089357a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.486026] >ffff800089357b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 37.493227] ^ [ 37.499307] ffff800089357b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 37.506514] ffff800089357c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 37.513713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 37.069001] ================================================================== [ 37.083341] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 37.090198] Read of size 1 at addr ffff800088a57c2a by task kunit_try_catch/296 [ 37.097487] [ 37.098974] CPU: 6 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 37.099030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.099048] Hardware name: WinLink E850-96 board (DT) [ 37.099071] Call trace: [ 37.099086] show_stack+0x20/0x38 (C) [ 37.099123] dump_stack_lvl+0x8c/0xd0 [ 37.099162] print_report+0x310/0x608 [ 37.099195] kasan_report+0xdc/0x128 [ 37.099225] __asan_report_load1_noabort+0x20/0x30 [ 37.099260] kasan_stack_oob+0x238/0x270 [ 37.099293] kunit_try_run_case+0x170/0x3f0 [ 37.099330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.099373] kthread+0x328/0x630 [ 37.099407] ret_from_fork+0x10/0x20 [ 37.099442] [ 37.161553] The buggy address belongs to stack of task kunit_try_catch/296 [ 37.168407] and is located at offset 138 in frame: [ 37.173266] kasan_stack_oob+0x0/0x270 [ 37.177006] [ 37.178475] This frame has 4 objects: [ 37.182125] [48, 49) '__assertion' [ 37.182151] [64, 72) 'array' [ 37.185594] [96, 112) '__assertion' [ 37.188548] [128, 138) 'stack_array' [ 37.192104] [ 37.197229] The buggy address belongs to the virtual mapping at [ 37.197229] [ffff800088a50000, ffff800088a59000) created by: [ 37.197229] kernel_clone+0x150/0x7a8 [ 37.212503] [ 37.213983] The buggy address belongs to the physical page: [ 37.219539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862e7 [ 37.227523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.234043] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.241762] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.249481] page dumped because: kasan: bad access detected [ 37.255036] [ 37.256512] Memory state around the buggy address: [ 37.261293] ffff800088a57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.268495] ffff800088a57b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 37.275701] >ffff800088a57c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 37.282900] ^ [ 37.287418] ffff800088a57c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 37.294623] ffff800088a57d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 37.301824] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 36.849423] ================================================================== [ 36.860083] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 36.867632] Read of size 1 at addr ffff8000879f14ed by task kunit_try_catch/292 [ 36.874921] [ 36.876407] CPU: 6 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 36.876458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.876477] Hardware name: WinLink E850-96 board (DT) [ 36.876500] Call trace: [ 36.876515] show_stack+0x20/0x38 (C) [ 36.876551] dump_stack_lvl+0x8c/0xd0 [ 36.876589] print_report+0x310/0x608 [ 36.876620] kasan_report+0xdc/0x128 [ 36.876649] __asan_report_load1_noabort+0x20/0x30 [ 36.876686] kasan_global_oob_right+0x230/0x270 [ 36.876721] kunit_try_run_case+0x170/0x3f0 [ 36.876759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.876802] kthread+0x328/0x630 [ 36.876836] ret_from_fork+0x10/0x20 [ 36.876874] [ 36.939589] The buggy address belongs to the variable: [ 36.944711] global_array+0xd/0x40 [ 36.948097] [ 36.949580] The buggy address belongs to the virtual mapping at [ 36.949580] [ffff800085c10000, ffff800087aa1000) created by: [ 36.949580] paging_init+0x66c/0x7d0 [ 36.964763] [ 36.966243] The buggy address belongs to the physical page: [ 36.971800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x879f1 [ 36.979698] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 36.986999] raw: 03fffe0000002000 fffffdffc01e7c48 fffffdffc01e7c48 0000000000000000 [ 36.994717] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.002436] page dumped because: kasan: bad access detected [ 37.007991] [ 37.009467] Memory state around the buggy address: [ 37.014247] ffff8000879f1380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.021450] ffff8000879f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.028655] >ffff8000879f1480: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 37.035856] ^ [ 37.042457] ffff8000879f1500: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 37.049661] ffff8000879f1580: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 [ 37.056864] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 36.610391] ================================================================== [ 36.620503] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.628485] Free of addr ffff000803208001 by task kunit_try_catch/290 [ 36.634907] [ 36.636393] CPU: 5 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 36.636449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.636464] Hardware name: WinLink E850-96 board (DT) [ 36.636485] Call trace: [ 36.636500] show_stack+0x20/0x38 (C) [ 36.636539] dump_stack_lvl+0x8c/0xd0 [ 36.636575] print_report+0x118/0x608 [ 36.636607] kasan_report_invalid_free+0xc0/0xe8 [ 36.636638] __kasan_mempool_poison_object+0xfc/0x150 [ 36.636671] mempool_free+0x28c/0x328 [ 36.636709] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.636745] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 36.636784] kunit_try_run_case+0x170/0x3f0 [ 36.636822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.636863] kthread+0x328/0x630 [ 36.636896] ret_from_fork+0x10/0x20 [ 36.636935] [ 36.711125] The buggy address belongs to the physical page: [ 36.716682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883208 [ 36.724666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.732304] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.739246] page_type: f8(unknown) [ 36.742645] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.750363] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.758090] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.765901] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.773714] head: 0bfffe0000000002 fffffdffe00c8201 00000000ffffffff 00000000ffffffff [ 36.781526] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.789331] page dumped because: kasan: bad access detected [ 36.794887] [ 36.796362] Memory state around the buggy address: [ 36.801144] ffff000803207f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.808345] ffff000803207f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.815553] >ffff000803208000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.822752] ^ [ 36.825968] ffff000803208080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.833171] ffff000803208100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.840375] ================================================================== [ 36.284328] ================================================================== [ 36.294899] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.302882] Free of addr ffff000801dd0801 by task kunit_try_catch/288 [ 36.309304] [ 36.310790] CPU: 6 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 36.310844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.310860] Hardware name: WinLink E850-96 board (DT) [ 36.310883] Call trace: [ 36.310898] show_stack+0x20/0x38 (C) [ 36.310933] dump_stack_lvl+0x8c/0xd0 [ 36.310968] print_report+0x118/0x608 [ 36.311000] kasan_report_invalid_free+0xc0/0xe8 [ 36.311031] check_slab_allocation+0xfc/0x108 [ 36.311064] __kasan_mempool_poison_object+0x78/0x150 [ 36.311099] mempool_free+0x28c/0x328 [ 36.311136] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.311171] mempool_kmalloc_invalid_free+0xc0/0x118 [ 36.311210] kunit_try_run_case+0x170/0x3f0 [ 36.311247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.311288] kthread+0x328/0x630 [ 36.311322] ret_from_fork+0x10/0x20 [ 36.311358] [ 36.389339] Allocated by task 288: [ 36.392726] kasan_save_stack+0x3c/0x68 [ 36.396543] kasan_save_track+0x20/0x40 [ 36.400362] kasan_save_alloc_info+0x40/0x58 [ 36.404615] __kasan_mempool_unpoison_object+0x11c/0x180 [ 36.409910] remove_element+0x130/0x1f8 [ 36.413730] mempool_alloc_preallocated+0x58/0xc0 [ 36.418417] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 36.423972] mempool_kmalloc_invalid_free+0xc0/0x118 [ 36.428921] kunit_try_run_case+0x170/0x3f0 [ 36.433087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.438557] kthread+0x328/0x630 [ 36.441768] ret_from_fork+0x10/0x20 [ 36.445326] [ 36.446804] The buggy address belongs to the object at ffff000801dd0800 [ 36.446804] which belongs to the cache kmalloc-128 of size 128 [ 36.459305] The buggy address is located 1 bytes inside of [ 36.459305] 128-byte region [ffff000801dd0800, ffff000801dd0880) [ 36.470847] [ 36.472325] The buggy address belongs to the physical page: [ 36.477883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd0 [ 36.485868] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.493506] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.500449] page_type: f5(slab) [ 36.503586] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.511304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.519030] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.526842] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.534655] head: 0bfffe0000000001 fffffdffe0077401 00000000ffffffff 00000000ffffffff [ 36.542467] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.550273] page dumped because: kasan: bad access detected [ 36.555830] [ 36.557304] Memory state around the buggy address: [ 36.562084] ffff000801dd0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.569287] ffff000801dd0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.576491] >ffff000801dd0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.583692] ^ [ 36.586908] ffff000801dd0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.594112] ffff000801dd0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.601316] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 35.852760] ================================================================== [ 35.862699] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 35.869817] Free of addr ffff000803244000 by task kunit_try_catch/284 [ 35.876238] [ 35.877725] CPU: 6 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 35.877777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.877793] Hardware name: WinLink E850-96 board (DT) [ 35.877817] Call trace: [ 35.877831] show_stack+0x20/0x38 (C) [ 35.877868] dump_stack_lvl+0x8c/0xd0 [ 35.877903] print_report+0x118/0x608 [ 35.877935] kasan_report_invalid_free+0xc0/0xe8 [ 35.877967] __kasan_mempool_poison_object+0x14c/0x150 [ 35.878000] mempool_free+0x28c/0x328 [ 35.878039] mempool_double_free_helper+0x150/0x2e8 [ 35.878074] mempool_kmalloc_large_double_free+0xc0/0x118 [ 35.878112] kunit_try_run_case+0x170/0x3f0 [ 35.878151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.878190] kthread+0x328/0x630 [ 35.878225] ret_from_fork+0x10/0x20 [ 35.878260] [ 35.951675] The buggy address belongs to the physical page: [ 35.957231] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883244 [ 35.965215] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.972853] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.979796] page_type: f8(unknown) [ 35.983192] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.990914] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 35.998638] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.006452] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.014263] head: 0bfffe0000000002 fffffdffe00c9101 00000000ffffffff 00000000ffffffff [ 36.022075] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.029881] page dumped because: kasan: bad access detected [ 36.035436] [ 36.036913] Memory state around the buggy address: [ 36.041693] ffff000803243f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.048895] ffff000803243f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.056101] >ffff000803244000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.063301] ^ [ 36.066516] ffff000803244080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.073721] ffff000803244100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.080923] ================================================================== [ 35.478975] ================================================================== [ 35.488661] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 35.495777] Free of addr ffff000801bfff00 by task kunit_try_catch/282 [ 35.502198] [ 35.503685] CPU: 4 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 35.503741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.503756] Hardware name: WinLink E850-96 board (DT) [ 35.503778] Call trace: [ 35.503793] show_stack+0x20/0x38 (C) [ 35.503828] dump_stack_lvl+0x8c/0xd0 [ 35.503862] print_report+0x118/0x608 [ 35.503893] kasan_report_invalid_free+0xc0/0xe8 [ 35.503923] check_slab_allocation+0xd4/0x108 [ 35.503956] __kasan_mempool_poison_object+0x78/0x150 [ 35.503989] mempool_free+0x28c/0x328 [ 35.504028] mempool_double_free_helper+0x150/0x2e8 [ 35.504063] mempool_kmalloc_double_free+0xc0/0x118 [ 35.504099] kunit_try_run_case+0x170/0x3f0 [ 35.504135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.504175] kthread+0x328/0x630 [ 35.504208] ret_from_fork+0x10/0x20 [ 35.504245] [ 35.581365] Allocated by task 282: [ 35.584753] kasan_save_stack+0x3c/0x68 [ 35.588569] kasan_save_track+0x20/0x40 [ 35.592388] kasan_save_alloc_info+0x40/0x58 [ 35.596641] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.601936] remove_element+0x130/0x1f8 [ 35.605755] mempool_alloc_preallocated+0x58/0xc0 [ 35.610443] mempool_double_free_helper+0x94/0x2e8 [ 35.615217] mempool_kmalloc_double_free+0xc0/0x118 [ 35.620078] kunit_try_run_case+0x170/0x3f0 [ 35.624245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.629715] kthread+0x328/0x630 [ 35.632925] ret_from_fork+0x10/0x20 [ 35.636484] [ 35.637961] Freed by task 282: [ 35.640998] kasan_save_stack+0x3c/0x68 [ 35.644818] kasan_save_track+0x20/0x40 [ 35.648637] kasan_save_free_info+0x4c/0x78 [ 35.652804] __kasan_mempool_poison_object+0xc0/0x150 [ 35.657838] mempool_free+0x28c/0x328 [ 35.661484] mempool_double_free_helper+0x100/0x2e8 [ 35.666345] mempool_kmalloc_double_free+0xc0/0x118 [ 35.671206] kunit_try_run_case+0x170/0x3f0 [ 35.675373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.680841] kthread+0x328/0x630 [ 35.684053] ret_from_fork+0x10/0x20 [ 35.687612] [ 35.689089] The buggy address belongs to the object at ffff000801bfff00 [ 35.689089] which belongs to the cache kmalloc-128 of size 128 [ 35.701589] The buggy address is located 0 bytes inside of [ 35.701589] 128-byte region [ffff000801bfff00, ffff000801bfff80) [ 35.713132] [ 35.714611] The buggy address belongs to the physical page: [ 35.720169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bfe [ 35.728154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.735792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.742735] page_type: f5(slab) [ 35.745872] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.753590] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000 [ 35.761317] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.769128] head: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000 [ 35.776941] head: 0bfffe0000000001 fffffdffe006ff81 00000000ffffffff 00000000ffffffff [ 35.784753] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.792558] page dumped because: kasan: bad access detected [ 35.798114] [ 35.799589] Memory state around the buggy address: [ 35.804370] ffff000801bffe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.811572] ffff000801bffe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.818778] >ffff000801bfff00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.825978] ^ [ 35.829193] ffff000801bfff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.836400] ffff000801c00000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.843602] ================================================================== [ 36.089945] ================================================================== [ 36.100546] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 36.107660] Free of addr ffff000803208000 by task kunit_try_catch/286 [ 36.114083] [ 36.115567] CPU: 5 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 36.115618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.115635] Hardware name: WinLink E850-96 board (DT) [ 36.115660] Call trace: [ 36.115676] show_stack+0x20/0x38 (C) [ 36.115712] dump_stack_lvl+0x8c/0xd0 [ 36.115747] print_report+0x118/0x608 [ 36.115779] kasan_report_invalid_free+0xc0/0xe8 [ 36.115810] __kasan_mempool_poison_pages+0xe0/0xe8 [ 36.115842] mempool_free+0x24c/0x328 [ 36.115874] mempool_double_free_helper+0x150/0x2e8 [ 36.115909] mempool_page_alloc_double_free+0xbc/0x118 [ 36.115941] kunit_try_run_case+0x170/0x3f0 [ 36.115977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.116016] kthread+0x328/0x630 [ 36.116052] ret_from_fork+0x10/0x20 [ 36.116089] [ 36.188995] The buggy address belongs to the physical page: [ 36.194554] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883208 [ 36.202538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.209059] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 36.216777] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.224496] page dumped because: kasan: bad access detected [ 36.230051] [ 36.231527] Memory state around the buggy address: [ 36.236307] ffff000803207f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.243510] ffff000803207f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.250716] >ffff000803208000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.257916] ^ [ 36.261131] ffff000803208080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.268336] ffff000803208100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.275539] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 34.737221] ================================================================== [ 34.746745] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.753425] Read of size 1 at addr ffff000803244000 by task kunit_try_catch/276 [ 34.760716] [ 34.762203] CPU: 6 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 34.762252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.762269] Hardware name: WinLink E850-96 board (DT) [ 34.762291] Call trace: [ 34.762306] show_stack+0x20/0x38 (C) [ 34.762340] dump_stack_lvl+0x8c/0xd0 [ 34.762375] print_report+0x118/0x608 [ 34.762404] kasan_report+0xdc/0x128 [ 34.762432] __asan_report_load1_noabort+0x20/0x30 [ 34.762466] mempool_uaf_helper+0x314/0x340 [ 34.762500] mempool_kmalloc_large_uaf+0xc4/0x120 [ 34.762537] kunit_try_run_case+0x170/0x3f0 [ 34.762574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.762613] kthread+0x328/0x630 [ 34.762647] ret_from_fork+0x10/0x20 [ 34.762682] [ 34.829730] The buggy address belongs to the physical page: [ 34.835286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883244 [ 34.843271] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.850910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.857850] page_type: f8(unknown) [ 34.861248] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.868968] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.876694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.884505] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.892318] head: 0bfffe0000000002 fffffdffe00c9101 00000000ffffffff 00000000ffffffff [ 34.900130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.907936] page dumped because: kasan: bad access detected [ 34.913492] [ 34.914967] Memory state around the buggy address: [ 34.919748] ffff000803243f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.926950] ffff000803243f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.934156] >ffff000803244000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.941356] ^ [ 34.944571] ffff000803244080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.951775] ffff000803244100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.958979] ================================================================== [ 35.297251] ================================================================== [ 35.300729] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 35.307412] Read of size 1 at addr ffff000803270000 by task kunit_try_catch/280 [ 35.314702] [ 35.316188] CPU: 7 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 35.316243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.316256] Hardware name: WinLink E850-96 board (DT) [ 35.316277] Call trace: [ 35.316293] show_stack+0x20/0x38 (C) [ 35.316331] dump_stack_lvl+0x8c/0xd0 [ 35.316362] print_report+0x118/0x608 [ 35.316394] kasan_report+0xdc/0x128 [ 35.316426] __asan_report_load1_noabort+0x20/0x30 [ 35.316460] mempool_uaf_helper+0x314/0x340 [ 35.316491] mempool_page_alloc_uaf+0xc0/0x118 [ 35.316523] kunit_try_run_case+0x170/0x3f0 [ 35.316560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.316599] kthread+0x328/0x630 [ 35.316634] ret_from_fork+0x10/0x20 [ 35.316670] [ 35.383455] The buggy address belongs to the physical page: [ 35.389011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883270 [ 35.396995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.403518] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.411234] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.418954] page dumped because: kasan: bad access detected [ 35.424508] [ 35.425984] Memory state around the buggy address: [ 35.430766] ffff00080326ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.437967] ffff00080326ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.445171] >ffff000803270000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.452373] ^ [ 35.455588] ffff000803270080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.462793] ffff000803270100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.469996] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 34.381155] ================================================================== [ 34.385467] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.392581] Read of size 1 at addr ffff000802408800 by task kunit_try_catch/274 [ 34.399871] [ 34.401360] CPU: 5 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 34.401412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.401431] Hardware name: WinLink E850-96 board (DT) [ 34.401454] Call trace: [ 34.401471] show_stack+0x20/0x38 (C) [ 34.401510] dump_stack_lvl+0x8c/0xd0 [ 34.401548] print_report+0x118/0x608 [ 34.401579] kasan_report+0xdc/0x128 [ 34.401609] __asan_report_load1_noabort+0x20/0x30 [ 34.401642] mempool_uaf_helper+0x314/0x340 [ 34.401678] mempool_kmalloc_uaf+0xc4/0x120 [ 34.401710] kunit_try_run_case+0x170/0x3f0 [ 34.401749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.401790] kthread+0x328/0x630 [ 34.401827] ret_from_fork+0x10/0x20 [ 34.401863] [ 34.468361] Allocated by task 274: [ 34.471748] kasan_save_stack+0x3c/0x68 [ 34.475564] kasan_save_track+0x20/0x40 [ 34.479385] kasan_save_alloc_info+0x40/0x58 [ 34.483637] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.488932] remove_element+0x130/0x1f8 [ 34.492751] mempool_alloc_preallocated+0x58/0xc0 [ 34.497439] mempool_uaf_helper+0xa4/0x340 [ 34.501519] mempool_kmalloc_uaf+0xc4/0x120 [ 34.505687] kunit_try_run_case+0x170/0x3f0 [ 34.509852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.515321] kthread+0x328/0x630 [ 34.518532] ret_from_fork+0x10/0x20 [ 34.522091] [ 34.523568] Freed by task 274: [ 34.526607] kasan_save_stack+0x3c/0x68 [ 34.530425] kasan_save_track+0x20/0x40 [ 34.534244] kasan_save_free_info+0x4c/0x78 [ 34.538410] __kasan_mempool_poison_object+0xc0/0x150 [ 34.543445] mempool_free+0x28c/0x328 [ 34.547091] mempool_uaf_helper+0x104/0x340 [ 34.551258] mempool_kmalloc_uaf+0xc4/0x120 [ 34.555424] kunit_try_run_case+0x170/0x3f0 [ 34.559592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.565059] kthread+0x328/0x630 [ 34.568271] ret_from_fork+0x10/0x20 [ 34.571830] [ 34.573308] The buggy address belongs to the object at ffff000802408800 [ 34.573308] which belongs to the cache kmalloc-128 of size 128 [ 34.585807] The buggy address is located 0 bytes inside of [ 34.585807] freed 128-byte region [ffff000802408800, ffff000802408880) [ 34.597871] [ 34.599351] The buggy address belongs to the physical page: [ 34.604908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 34.612892] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.620531] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.627474] page_type: f5(slab) [ 34.630611] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 34.638329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.646055] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 34.653866] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.661680] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 34.669491] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.677298] page dumped because: kasan: bad access detected [ 34.682854] [ 34.684328] Memory state around the buggy address: [ 34.689110] ffff000802408700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.696311] ffff000802408780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.703517] >ffff000802408800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.710717] ^ [ 34.713932] ffff000802408880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.721137] ffff000802408900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.728340] ================================================================== [ 34.968570] ================================================================== [ 34.977908] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.985022] Read of size 1 at addr ffff000806953240 by task kunit_try_catch/278 [ 34.992311] [ 34.993798] CPU: 5 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 34.993855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.993871] Hardware name: WinLink E850-96 board (DT) [ 34.993894] Call trace: [ 34.993908] show_stack+0x20/0x38 (C) [ 34.993942] dump_stack_lvl+0x8c/0xd0 [ 34.993977] print_report+0x118/0x608 [ 34.994006] kasan_report+0xdc/0x128 [ 34.994034] __asan_report_load1_noabort+0x20/0x30 [ 34.994068] mempool_uaf_helper+0x314/0x340 [ 34.994102] mempool_slab_uaf+0xc0/0x118 [ 34.994133] kunit_try_run_case+0x170/0x3f0 [ 34.994169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.994207] kthread+0x328/0x630 [ 34.994243] ret_from_fork+0x10/0x20 [ 34.994277] [ 35.060540] Allocated by task 278: [ 35.063926] kasan_save_stack+0x3c/0x68 [ 35.067743] kasan_save_track+0x20/0x40 [ 35.071562] kasan_save_alloc_info+0x40/0x58 [ 35.075816] __kasan_mempool_unpoison_object+0xbc/0x180 [ 35.081024] remove_element+0x16c/0x1f8 [ 35.084843] mempool_alloc_preallocated+0x58/0xc0 [ 35.089532] mempool_uaf_helper+0xa4/0x340 [ 35.093611] mempool_slab_uaf+0xc0/0x118 [ 35.097517] kunit_try_run_case+0x170/0x3f0 [ 35.101683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.107152] kthread+0x328/0x630 [ 35.110364] ret_from_fork+0x10/0x20 [ 35.113923] [ 35.115400] Freed by task 278: [ 35.118439] kasan_save_stack+0x3c/0x68 [ 35.122256] kasan_save_track+0x20/0x40 [ 35.126075] kasan_save_free_info+0x4c/0x78 [ 35.130242] __kasan_mempool_poison_object+0xc0/0x150 [ 35.135277] mempool_free+0x28c/0x328 [ 35.138922] mempool_uaf_helper+0x104/0x340 [ 35.143089] mempool_slab_uaf+0xc0/0x118 [ 35.146995] kunit_try_run_case+0x170/0x3f0 [ 35.151162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.156631] kthread+0x328/0x630 [ 35.159842] ret_from_fork+0x10/0x20 [ 35.163402] [ 35.164878] The buggy address belongs to the object at ffff000806953240 [ 35.164878] which belongs to the cache test_cache of size 123 [ 35.177292] The buggy address is located 0 bytes inside of [ 35.177292] freed 123-byte region [ffff000806953240, ffff0008069532bb) [ 35.189356] [ 35.190835] The buggy address belongs to the physical page: [ 35.196392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886953 [ 35.204375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.210885] page_type: f5(slab) [ 35.214022] raw: 0bfffe0000000000 ffff00080240a000 dead000000000122 0000000000000000 [ 35.221740] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 35.229461] page dumped because: kasan: bad access detected [ 35.235014] [ 35.236490] Memory state around the buggy address: [ 35.241273] ffff000806953100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.248473] ffff000806953180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.255678] >ffff000806953200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 35.262879] ^ [ 35.268177] ffff000806953280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.275382] ffff000806953300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.282585] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 33.864859] ================================================================== [ 33.874886] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.882431] Read of size 1 at addr ffff00080320a001 by task kunit_try_catch/270 [ 33.889722] [ 33.891209] CPU: 5 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 33.891260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.891276] Hardware name: WinLink E850-96 board (DT) [ 33.891296] Call trace: [ 33.891309] show_stack+0x20/0x38 (C) [ 33.891342] dump_stack_lvl+0x8c/0xd0 [ 33.891376] print_report+0x118/0x608 [ 33.891406] kasan_report+0xdc/0x128 [ 33.891435] __asan_report_load1_noabort+0x20/0x30 [ 33.891467] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.891504] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 33.891542] kunit_try_run_case+0x170/0x3f0 [ 33.891577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.891617] kthread+0x328/0x630 [ 33.891651] ret_from_fork+0x10/0x20 [ 33.891685] [ 33.959778] The buggy address belongs to the physical page: [ 33.965334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883208 [ 33.973319] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.980958] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.987898] page_type: f8(unknown) [ 33.991296] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.999015] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.006742] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.014553] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.022366] head: 0bfffe0000000002 fffffdffe00c8201 00000000ffffffff 00000000ffffffff [ 34.030178] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.037984] page dumped because: kasan: bad access detected [ 34.043539] [ 34.045015] Memory state around the buggy address: [ 34.049796] ffff000803209f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.056998] ffff000803209f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.064202] >ffff00080320a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.071404] ^ [ 34.074619] ffff00080320a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.081824] ffff00080320a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.089025] ================================================================== [ 33.563921] ================================================================== [ 33.564101] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.564242] Read of size 1 at addr ffff000801dd0473 by task kunit_try_catch/268 [ 33.570630] [ 33.572118] CPU: 6 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 33.572173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.572188] Hardware name: WinLink E850-96 board (DT) [ 33.572211] Call trace: [ 33.572226] show_stack+0x20/0x38 (C) [ 33.572266] dump_stack_lvl+0x8c/0xd0 [ 33.572301] print_report+0x118/0x608 [ 33.572333] kasan_report+0xdc/0x128 [ 33.572364] __asan_report_load1_noabort+0x20/0x30 [ 33.572399] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.572434] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.572468] kunit_try_run_case+0x170/0x3f0 [ 33.572505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.572544] kthread+0x328/0x630 [ 33.572579] ret_from_fork+0x10/0x20 [ 33.572617] [ 33.640162] Allocated by task 268: [ 33.643548] kasan_save_stack+0x3c/0x68 [ 33.647365] kasan_save_track+0x20/0x40 [ 33.651184] kasan_save_alloc_info+0x40/0x58 [ 33.655438] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.660733] remove_element+0x130/0x1f8 [ 33.664552] mempool_alloc_preallocated+0x58/0xc0 [ 33.669240] mempool_oob_right_helper+0x98/0x2f0 [ 33.673840] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.678528] kunit_try_run_case+0x170/0x3f0 [ 33.682693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.688165] kthread+0x328/0x630 [ 33.691375] ret_from_fork+0x10/0x20 [ 33.694934] [ 33.696411] The buggy address belongs to the object at ffff000801dd0400 [ 33.696411] which belongs to the cache kmalloc-128 of size 128 [ 33.708911] The buggy address is located 0 bytes to the right of [ 33.708911] allocated 115-byte region [ffff000801dd0400, ffff000801dd0473) [ 33.721843] [ 33.723323] The buggy address belongs to the physical page: [ 33.728880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd0 [ 33.736864] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.744504] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.751445] page_type: f5(slab) [ 33.754581] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 33.762301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.770027] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 33.777838] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.785651] head: 0bfffe0000000001 fffffdffe0077401 00000000ffffffff 00000000ffffffff [ 33.793463] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.801269] page dumped because: kasan: bad access detected [ 33.806824] [ 33.808300] Memory state around the buggy address: [ 33.813080] ffff000801dd0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.820282] ffff000801dd0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.827488] >ffff000801dd0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.834688] ^ [ 33.841549] ffff000801dd0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.848754] ffff000801dd0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.855957] ================================================================== [ 34.098396] ================================================================== [ 34.108476] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.116022] Read of size 1 at addr ffff00080682f2bb by task kunit_try_catch/272 [ 34.123312] [ 34.124800] CPU: 6 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 34.124848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.124864] Hardware name: WinLink E850-96 board (DT) [ 34.124885] Call trace: [ 34.124900] show_stack+0x20/0x38 (C) [ 34.124934] dump_stack_lvl+0x8c/0xd0 [ 34.124968] print_report+0x118/0x608 [ 34.124999] kasan_report+0xdc/0x128 [ 34.125030] __asan_report_load1_noabort+0x20/0x30 [ 34.125065] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.125101] mempool_slab_oob_right+0xc0/0x118 [ 34.125133] kunit_try_run_case+0x170/0x3f0 [ 34.125169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.125207] kthread+0x328/0x630 [ 34.125240] ret_from_fork+0x10/0x20 [ 34.125277] [ 34.192584] Allocated by task 272: [ 34.195970] kasan_save_stack+0x3c/0x68 [ 34.199787] kasan_save_track+0x20/0x40 [ 34.203607] kasan_save_alloc_info+0x40/0x58 [ 34.207860] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.213070] remove_element+0x16c/0x1f8 [ 34.216888] mempool_alloc_preallocated+0x58/0xc0 [ 34.221575] mempool_oob_right_helper+0x98/0x2f0 [ 34.226176] mempool_slab_oob_right+0xc0/0x118 [ 34.230602] kunit_try_run_case+0x170/0x3f0 [ 34.234769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.240238] kthread+0x328/0x630 [ 34.243450] ret_from_fork+0x10/0x20 [ 34.247008] [ 34.248487] The buggy address belongs to the object at ffff00080682f240 [ 34.248487] which belongs to the cache test_cache of size 123 [ 34.260900] The buggy address is located 0 bytes to the right of [ 34.260900] allocated 123-byte region [ffff00080682f240, ffff00080682f2bb) [ 34.273831] [ 34.275310] The buggy address belongs to the physical page: [ 34.280867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88682f [ 34.288852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.295360] page_type: f5(slab) [ 34.298496] raw: 0bfffe0000000000 ffff000801dd23c0 dead000000000122 0000000000000000 [ 34.306216] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.313935] page dumped because: kasan: bad access detected [ 34.319490] [ 34.320966] Memory state around the buggy address: [ 34.325746] ffff00080682f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.332950] ffff00080682f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.340155] >ffff00080682f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 34.347354] ^ [ 34.352392] ffff00080682f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.359597] ffff00080682f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.366799] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 32.677716] ================================================================== [ 32.677908] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 32.678049] Read of size 1 at addr ffff000802440280 by task kunit_try_catch/262 [ 32.681603] [ 32.683090] CPU: 7 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 32.683147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.683164] Hardware name: WinLink E850-96 board (DT) [ 32.683187] Call trace: [ 32.683205] show_stack+0x20/0x38 (C) [ 32.683238] dump_stack_lvl+0x8c/0xd0 [ 32.683275] print_report+0x118/0x608 [ 32.683303] kasan_report+0xdc/0x128 [ 32.683332] __kasan_check_byte+0x54/0x70 [ 32.683360] kmem_cache_destroy+0x34/0x218 [ 32.683393] kmem_cache_double_destroy+0x174/0x300 [ 32.683426] kunit_try_run_case+0x170/0x3f0 [ 32.683463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.683505] kthread+0x328/0x630 [ 32.683539] ret_from_fork+0x10/0x20 [ 32.683573] [ 32.749833] Allocated by task 262: [ 32.753221] kasan_save_stack+0x3c/0x68 [ 32.757036] kasan_save_track+0x20/0x40 [ 32.760855] kasan_save_alloc_info+0x40/0x58 [ 32.765109] __kasan_slab_alloc+0xa8/0xb0 [ 32.769101] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.773702] __kmem_cache_create_args+0x178/0x280 [ 32.778389] kmem_cache_double_destroy+0xc0/0x300 [ 32.783077] kunit_try_run_case+0x170/0x3f0 [ 32.787245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.792713] kthread+0x328/0x630 [ 32.795924] ret_from_fork+0x10/0x20 [ 32.799483] [ 32.800960] Freed by task 262: [ 32.803998] kasan_save_stack+0x3c/0x68 [ 32.807816] kasan_save_track+0x20/0x40 [ 32.811636] kasan_save_free_info+0x4c/0x78 [ 32.815802] __kasan_slab_free+0x6c/0x98 [ 32.819710] kmem_cache_free+0x260/0x468 [ 32.823615] slab_kmem_cache_release+0x38/0x50 [ 32.828042] kmem_cache_release+0x1c/0x30 [ 32.832035] kobject_put+0x17c/0x420 [ 32.835593] sysfs_slab_release+0x1c/0x30 [ 32.839587] kmem_cache_destroy+0x118/0x218 [ 32.843753] kmem_cache_double_destroy+0x128/0x300 [ 32.848528] kunit_try_run_case+0x170/0x3f0 [ 32.852694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.858163] kthread+0x328/0x630 [ 32.861375] ret_from_fork+0x10/0x20 [ 32.864933] [ 32.866411] The buggy address belongs to the object at ffff000802440280 [ 32.866411] which belongs to the cache kmem_cache of size 208 [ 32.878824] The buggy address is located 0 bytes inside of [ 32.878824] freed 208-byte region [ffff000802440280, ffff000802440350) [ 32.890888] [ 32.892368] The buggy address belongs to the physical page: [ 32.897924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882440 [ 32.905909] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.913548] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.920492] page_type: f5(slab) [ 32.923627] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 32.931345] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 32.939072] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 32.946883] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 32.954696] head: 0bfffe0000000001 fffffdffe0091001 00000000ffffffff 00000000ffffffff [ 32.962508] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.970314] page dumped because: kasan: bad access detected [ 32.975869] [ 32.977345] Memory state around the buggy address: [ 32.982125] ffff000802440180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.989328] ffff000802440200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.996532] >ffff000802440280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.003734] ^ [ 33.006949] ffff000802440300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 33.014153] ffff000802440380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.021356] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 32.282681] ================================================================== [ 32.282876] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 32.283009] Read of size 1 at addr ffff000801dd6000 by task kunit_try_catch/260 [ 32.286394] [ 32.287880] CPU: 6 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 32.287933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.287952] Hardware name: WinLink E850-96 board (DT) [ 32.287976] Call trace: [ 32.287991] show_stack+0x20/0x38 (C) [ 32.288024] dump_stack_lvl+0x8c/0xd0 [ 32.288061] print_report+0x118/0x608 [ 32.288093] kasan_report+0xdc/0x128 [ 32.288121] __asan_report_load1_noabort+0x20/0x30 [ 32.288154] kmem_cache_rcu_uaf+0x388/0x468 [ 32.288189] kunit_try_run_case+0x170/0x3f0 [ 32.288228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.288265] kthread+0x328/0x630 [ 32.288299] ret_from_fork+0x10/0x20 [ 32.288339] [ 32.350716] Allocated by task 260: [ 32.354103] kasan_save_stack+0x3c/0x68 [ 32.357920] kasan_save_track+0x20/0x40 [ 32.361739] kasan_save_alloc_info+0x40/0x58 [ 32.365992] __kasan_slab_alloc+0xa8/0xb0 [ 32.369985] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.374586] kmem_cache_rcu_uaf+0x12c/0x468 [ 32.378753] kunit_try_run_case+0x170/0x3f0 [ 32.382919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.388389] kthread+0x328/0x630 [ 32.391601] ret_from_fork+0x10/0x20 [ 32.395158] [ 32.396636] Freed by task 0: [ 32.399502] kasan_save_stack+0x3c/0x68 [ 32.403318] kasan_save_track+0x20/0x40 [ 32.407139] kasan_save_free_info+0x4c/0x78 [ 32.411304] __kasan_slab_free+0x6c/0x98 [ 32.415211] slab_free_after_rcu_debug+0xd4/0x2f8 [ 32.419898] rcu_core+0x9f4/0x1e20 [ 32.423283] rcu_core_si+0x18/0x30 [ 32.426668] handle_softirqs+0x374/0xb28 [ 32.430575] __do_softirq+0x1c/0x28 [ 32.434047] [ 32.435522] Last potentially related work creation: [ 32.440385] kasan_save_stack+0x3c/0x68 [ 32.444203] kasan_record_aux_stack+0xb4/0xc8 [ 32.448545] kmem_cache_free+0x120/0x468 [ 32.452450] kmem_cache_rcu_uaf+0x16c/0x468 [ 32.456616] kunit_try_run_case+0x170/0x3f0 [ 32.460783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.466251] kthread+0x328/0x630 [ 32.469463] ret_from_fork+0x10/0x20 [ 32.473022] [ 32.474498] The buggy address belongs to the object at ffff000801dd6000 [ 32.474498] which belongs to the cache test_cache of size 200 [ 32.486913] The buggy address is located 0 bytes inside of [ 32.486913] freed 200-byte region [ffff000801dd6000, ffff000801dd60c8) [ 32.498978] [ 32.500456] The buggy address belongs to the physical page: [ 32.506012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd6 [ 32.513997] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.521636] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.528579] page_type: f5(slab) [ 32.531716] raw: 0bfffe0000000040 ffff000801dd2140 dead000000000122 0000000000000000 [ 32.539434] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.547161] head: 0bfffe0000000040 ffff000801dd2140 dead000000000122 0000000000000000 [ 32.554972] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.562785] head: 0bfffe0000000001 fffffdffe0077581 00000000ffffffff 00000000ffffffff [ 32.570596] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.578402] page dumped because: kasan: bad access detected [ 32.583958] [ 32.585433] Memory state around the buggy address: [ 32.590213] ffff000801dd5f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.597416] ffff000801dd5f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.604622] >ffff000801dd6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.611822] ^ [ 32.615038] ffff000801dd6080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 32.622242] ffff000801dd6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.629445] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.885707] ================================================================== [ 31.889174] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 31.896116] Free of addr ffff000802444001 by task kunit_try_catch/258 [ 31.902538] [ 31.904026] CPU: 7 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 31.904080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.904101] Hardware name: WinLink E850-96 board (DT) [ 31.904124] Call trace: [ 31.904138] show_stack+0x20/0x38 (C) [ 31.904178] dump_stack_lvl+0x8c/0xd0 [ 31.904214] print_report+0x118/0x608 [ 31.904246] kasan_report_invalid_free+0xc0/0xe8 [ 31.904280] check_slab_allocation+0xfc/0x108 [ 31.904312] __kasan_slab_pre_free+0x2c/0x48 [ 31.904340] kmem_cache_free+0xf0/0x468 [ 31.904371] kmem_cache_invalid_free+0x184/0x3c8 [ 31.904406] kunit_try_run_case+0x170/0x3f0 [ 31.904441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.904482] kthread+0x328/0x630 [ 31.904517] ret_from_fork+0x10/0x20 [ 31.904552] [ 31.975975] Allocated by task 258: [ 31.979363] kasan_save_stack+0x3c/0x68 [ 31.983179] kasan_save_track+0x20/0x40 [ 31.986999] kasan_save_alloc_info+0x40/0x58 [ 31.991251] __kasan_slab_alloc+0xa8/0xb0 [ 31.995244] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.999845] kmem_cache_invalid_free+0x12c/0x3c8 [ 32.004446] kunit_try_run_case+0x170/0x3f0 [ 32.008612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.014081] kthread+0x328/0x630 [ 32.017293] ret_from_fork+0x10/0x20 [ 32.020852] [ 32.022329] The buggy address belongs to the object at ffff000802444000 [ 32.022329] which belongs to the cache test_cache of size 200 [ 32.034744] The buggy address is located 1 bytes inside of [ 32.034744] 200-byte region [ffff000802444000, ffff0008024440c8) [ 32.046285] [ 32.047764] The buggy address belongs to the physical page: [ 32.053322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882444 [ 32.061306] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.068945] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.075888] page_type: f5(slab) [ 32.079027] raw: 0bfffe0000000040 ffff000802440140 dead000000000122 0000000000000000 [ 32.086743] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.094469] head: 0bfffe0000000040 ffff000802440140 dead000000000122 0000000000000000 [ 32.102280] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 32.110093] head: 0bfffe0000000001 fffffdffe0091101 00000000ffffffff 00000000ffffffff [ 32.117905] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.125711] page dumped because: kasan: bad access detected [ 32.131266] [ 32.132742] Memory state around the buggy address: [ 32.137525] ffff000802443f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.144726] ffff000802443f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.151931] >ffff000802444000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.159131] ^ [ 32.162346] ffff000802444080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 32.169551] ffff000802444100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.176754] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 31.549704] ================================================================== [ 31.549887] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 31.550017] Free of addr ffff000801dd4000 by task kunit_try_catch/256 [ 31.551416] [ 31.552904] CPU: 6 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 31.552958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.552977] Hardware name: WinLink E850-96 board (DT) [ 31.552999] Call trace: [ 31.553013] show_stack+0x20/0x38 (C) [ 31.553049] dump_stack_lvl+0x8c/0xd0 [ 31.553081] print_report+0x118/0x608 [ 31.553113] kasan_report_invalid_free+0xc0/0xe8 [ 31.553147] check_slab_allocation+0xd4/0x108 [ 31.553177] __kasan_slab_pre_free+0x2c/0x48 [ 31.553208] kmem_cache_free+0xf0/0x468 [ 31.553239] kmem_cache_double_free+0x190/0x3c8 [ 31.553273] kunit_try_run_case+0x170/0x3f0 [ 31.553309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.553350] kthread+0x328/0x630 [ 31.553387] ret_from_fork+0x10/0x20 [ 31.553425] [ 31.624765] Allocated by task 256: [ 31.628151] kasan_save_stack+0x3c/0x68 [ 31.631969] kasan_save_track+0x20/0x40 [ 31.635790] kasan_save_alloc_info+0x40/0x58 [ 31.640042] __kasan_slab_alloc+0xa8/0xb0 [ 31.644035] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.648635] kmem_cache_double_free+0x12c/0x3c8 [ 31.653149] kunit_try_run_case+0x170/0x3f0 [ 31.657315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.662784] kthread+0x328/0x630 [ 31.665997] ret_from_fork+0x10/0x20 [ 31.669555] [ 31.671032] Freed by task 256: [ 31.674071] kasan_save_stack+0x3c/0x68 [ 31.677888] kasan_save_track+0x20/0x40 [ 31.681708] kasan_save_free_info+0x4c/0x78 [ 31.685874] __kasan_slab_free+0x6c/0x98 [ 31.689782] kmem_cache_free+0x260/0x468 [ 31.693687] kmem_cache_double_free+0x140/0x3c8 [ 31.698200] kunit_try_run_case+0x170/0x3f0 [ 31.702367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.707836] kthread+0x328/0x630 [ 31.711047] ret_from_fork+0x10/0x20 [ 31.714606] [ 31.716084] The buggy address belongs to the object at ffff000801dd4000 [ 31.716084] which belongs to the cache test_cache of size 200 [ 31.728498] The buggy address is located 0 bytes inside of [ 31.728498] 200-byte region [ffff000801dd4000, ffff000801dd40c8) [ 31.740040] [ 31.741520] The buggy address belongs to the physical page: [ 31.747076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd4 [ 31.755061] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.762700] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.769642] page_type: f5(slab) [ 31.772780] raw: 0bfffe0000000040 ffff000801dd2000 dead000000000122 0000000000000000 [ 31.780498] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 31.788224] head: 0bfffe0000000040 ffff000801dd2000 dead000000000122 0000000000000000 [ 31.796035] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 31.803848] head: 0bfffe0000000001 fffffdffe0077501 00000000ffffffff 00000000ffffffff [ 31.811661] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.819466] page dumped because: kasan: bad access detected [ 31.825021] [ 31.826497] Memory state around the buggy address: [ 31.831279] ffff000801dd3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.838480] ffff000801dd3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.845686] >ffff000801dd4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.852887] ^ [ 31.856101] ffff000801dd4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.863306] ffff000801dd4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.870508] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 31.223337] ================================================================== [ 31.232914] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 31.239592] Read of size 1 at addr ffff0008024420c8 by task kunit_try_catch/254 [ 31.246882] [ 31.248368] CPU: 7 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 31.248425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.248442] Hardware name: WinLink E850-96 board (DT) [ 31.248462] Call trace: [ 31.248476] show_stack+0x20/0x38 (C) [ 31.248510] dump_stack_lvl+0x8c/0xd0 [ 31.248547] print_report+0x118/0x608 [ 31.248579] kasan_report+0xdc/0x128 [ 31.248608] __asan_report_load1_noabort+0x20/0x30 [ 31.248645] kmem_cache_oob+0x344/0x430 [ 31.248679] kunit_try_run_case+0x170/0x3f0 [ 31.248714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.248754] kthread+0x328/0x630 [ 31.248787] ret_from_fork+0x10/0x20 [ 31.248823] [ 31.310858] Allocated by task 254: [ 31.314244] kasan_save_stack+0x3c/0x68 [ 31.318061] kasan_save_track+0x20/0x40 [ 31.321881] kasan_save_alloc_info+0x40/0x58 [ 31.326134] __kasan_slab_alloc+0xa8/0xb0 [ 31.330129] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.334729] kmem_cache_oob+0x12c/0x430 [ 31.338548] kunit_try_run_case+0x170/0x3f0 [ 31.342714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.348182] kthread+0x328/0x630 [ 31.351394] ret_from_fork+0x10/0x20 [ 31.354953] [ 31.356431] The buggy address belongs to the object at ffff000802442000 [ 31.356431] which belongs to the cache test_cache of size 200 [ 31.368844] The buggy address is located 0 bytes to the right of [ 31.368844] allocated 200-byte region [ffff000802442000, ffff0008024420c8) [ 31.381775] [ 31.383255] The buggy address belongs to the physical page: [ 31.388812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882442 [ 31.396797] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.404435] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.411378] page_type: f5(slab) [ 31.414517] raw: 0bfffe0000000040 ffff000802440000 dead000000000122 0000000000000000 [ 31.422233] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 31.429959] head: 0bfffe0000000040 ffff000802440000 dead000000000122 0000000000000000 [ 31.437771] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 31.445584] head: 0bfffe0000000001 fffffdffe0091081 00000000ffffffff 00000000ffffffff [ 31.453395] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.461203] page dumped because: kasan: bad access detected [ 31.466756] [ 31.468234] Memory state around the buggy address: [ 31.473012] ffff000802441f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.480216] ffff000802442000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.487421] >ffff000802442080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.494621] ^ [ 31.500180] ffff000802442100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.507385] ffff000802442180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.514586] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 30.876564] ================================================================== [ 30.883787] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 30.890464] Read of size 8 at addr ffff0008064fc3c0 by task kunit_try_catch/247 [ 30.897755] [ 30.899242] CPU: 5 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 30.899297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.899312] Hardware name: WinLink E850-96 board (DT) [ 30.899334] Call trace: [ 30.899348] show_stack+0x20/0x38 (C) [ 30.899383] dump_stack_lvl+0x8c/0xd0 [ 30.899421] print_report+0x118/0x608 [ 30.899455] kasan_report+0xdc/0x128 [ 30.899483] __asan_report_load8_noabort+0x20/0x30 [ 30.899517] workqueue_uaf+0x480/0x4a8 [ 30.899549] kunit_try_run_case+0x170/0x3f0 [ 30.899588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.899627] kthread+0x328/0x630 [ 30.899662] ret_from_fork+0x10/0x20 [ 30.899699] [ 30.961643] Allocated by task 247: [ 30.965032] kasan_save_stack+0x3c/0x68 [ 30.968848] kasan_save_track+0x20/0x40 [ 30.972667] kasan_save_alloc_info+0x40/0x58 [ 30.976920] __kasan_kmalloc+0xd4/0xd8 [ 30.980655] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.985167] workqueue_uaf+0x13c/0x4a8 [ 30.988899] kunit_try_run_case+0x170/0x3f0 [ 30.993066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.998535] kthread+0x328/0x630 [ 31.001746] ret_from_fork+0x10/0x20 [ 31.005305] [ 31.006782] Freed by task 91: [ 31.009734] kasan_save_stack+0x3c/0x68 [ 31.013552] kasan_save_track+0x20/0x40 [ 31.017372] kasan_save_free_info+0x4c/0x78 [ 31.021538] __kasan_slab_free+0x6c/0x98 [ 31.025444] kfree+0x214/0x3c8 [ 31.028482] workqueue_uaf_work+0x18/0x30 [ 31.032476] process_one_work+0x530/0xf98 [ 31.036468] worker_thread+0x618/0xf38 [ 31.040202] kthread+0x328/0x630 [ 31.043413] ret_from_fork+0x10/0x20 [ 31.046971] [ 31.048448] Last potentially related work creation: [ 31.053310] kasan_save_stack+0x3c/0x68 [ 31.057128] kasan_record_aux_stack+0xb4/0xc8 [ 31.061468] __queue_work+0x65c/0x1008 [ 31.065201] queue_work_on+0xbc/0xf8 [ 31.068759] workqueue_uaf+0x210/0x4a8 [ 31.072492] kunit_try_run_case+0x170/0x3f0 [ 31.076659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.082127] kthread+0x328/0x630 [ 31.085339] ret_from_fork+0x10/0x20 [ 31.088898] [ 31.090375] The buggy address belongs to the object at ffff0008064fc3c0 [ 31.090375] which belongs to the cache kmalloc-32 of size 32 [ 31.102702] The buggy address is located 0 bytes inside of [ 31.102702] freed 32-byte region [ffff0008064fc3c0, ffff0008064fc3e0) [ 31.114679] [ 31.116157] The buggy address belongs to the physical page: [ 31.121715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8864fc [ 31.129700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.136208] page_type: f5(slab) [ 31.139347] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 31.147063] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.154784] page dumped because: kasan: bad access detected [ 31.160339] [ 31.161814] Memory state around the buggy address: [ 31.166594] ffff0008064fc280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 31.173796] ffff0008064fc300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.181001] >ffff0008064fc380: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 31.188202] ^ [ 31.193502] ffff0008064fc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.200706] ffff0008064fc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.207908] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 30.510633] ================================================================== [ 30.510812] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 30.510940] Read of size 4 at addr ffff000806717080 by task swapper/6/0 [ 30.511997] [ 30.513484] CPU: 6 UID: 0 PID: 0 Comm: swapper/6 Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 30.513535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.513551] Hardware name: WinLink E850-96 board (DT) [ 30.513573] Call trace: [ 30.513586] show_stack+0x20/0x38 (C) [ 30.513627] dump_stack_lvl+0x8c/0xd0 [ 30.513662] print_report+0x118/0x608 [ 30.513692] kasan_report+0xdc/0x128 [ 30.513720] __asan_report_load4_noabort+0x20/0x30 [ 30.513755] rcu_uaf_reclaim+0x64/0x70 [ 30.513786] rcu_core+0x9f4/0x1e20 [ 30.513819] rcu_core_si+0x18/0x30 [ 30.513846] handle_softirqs+0x374/0xb28 [ 30.513881] __do_softirq+0x1c/0x28 [ 30.513908] ____do_softirq+0x18/0x30 [ 30.513938] call_on_irq_stack+0x24/0x58 [ 30.513969] do_softirq_own_stack+0x24/0x38 [ 30.514001] __irq_exit_rcu+0x1fc/0x318 [ 30.514031] irq_exit_rcu+0x1c/0x80 [ 30.514057] el1_interrupt+0x38/0x58 [ 30.514091] el1h_64_irq_handler+0x18/0x28 [ 30.514124] el1h_64_irq+0x6c/0x70 [ 30.514152] arch_local_irq_enable+0x4/0x8 (P) [ 30.514184] do_idle+0x384/0x4e8 [ 30.514214] cpu_startup_entry+0x68/0x80 [ 30.514245] secondary_start_kernel+0x288/0x340 [ 30.514285] __secondary_switched+0xc0/0xc8 [ 30.514323] [ 30.623196] Allocated by task 245: [ 30.626579] kasan_save_stack+0x3c/0x68 [ 30.630398] kasan_save_track+0x20/0x40 [ 30.634217] kasan_save_alloc_info+0x40/0x58 [ 30.638471] __kasan_kmalloc+0xd4/0xd8 [ 30.642203] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.646717] rcu_uaf+0xb0/0x2d8 [ 30.649842] kunit_try_run_case+0x170/0x3f0 [ 30.654008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.659479] kthread+0x328/0x630 [ 30.662689] ret_from_fork+0x10/0x20 [ 30.666248] [ 30.667725] Freed by task 0: [ 30.670589] kasan_save_stack+0x3c/0x68 [ 30.674408] kasan_save_track+0x20/0x40 [ 30.678227] kasan_save_free_info+0x4c/0x78 [ 30.682394] __kasan_slab_free+0x6c/0x98 [ 30.686301] kfree+0x214/0x3c8 [ 30.689338] rcu_uaf_reclaim+0x28/0x70 [ 30.693071] rcu_core+0x9f4/0x1e20 [ 30.696456] rcu_core_si+0x18/0x30 [ 30.699841] handle_softirqs+0x374/0xb28 [ 30.703748] __do_softirq+0x1c/0x28 [ 30.707220] [ 30.708697] Last potentially related work creation: [ 30.713556] kasan_save_stack+0x3c/0x68 [ 30.717376] kasan_record_aux_stack+0xb4/0xc8 [ 30.721717] __call_rcu_common.constprop.0+0x70/0x8b0 [ 30.726751] call_rcu+0x18/0x30 [ 30.729876] rcu_uaf+0x14c/0x2d8 [ 30.733087] kunit_try_run_case+0x170/0x3f0 [ 30.737254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.742723] kthread+0x328/0x630 [ 30.745934] ret_from_fork+0x10/0x20 [ 30.749493] [ 30.750972] The buggy address belongs to the object at ffff000806717080 [ 30.750972] which belongs to the cache kmalloc-32 of size 32 [ 30.763298] The buggy address is located 0 bytes inside of [ 30.763298] freed 32-byte region [ffff000806717080, ffff0008067170a0) [ 30.775274] [ 30.776752] The buggy address belongs to the physical page: [ 30.782310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886717 [ 30.790295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.796804] page_type: f5(slab) [ 30.799941] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 30.807659] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 30.815379] page dumped because: kasan: bad access detected [ 30.820933] [ 30.822409] Memory state around the buggy address: [ 30.827189] ffff000806716f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.834393] ffff000806717000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 30.841598] >ffff000806717080: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 30.848798] ^ [ 30.852013] ffff000806717100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.859218] ffff000806717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.866420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 29.788242] ================================================================== [ 29.795255] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 29.801587] Read of size 1 at addr ffff000800dac200 by task kunit_try_catch/243 [ 29.808879] [ 29.810365] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 29.810418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.810434] Hardware name: WinLink E850-96 board (DT) [ 29.810454] Call trace: [ 29.810465] show_stack+0x20/0x38 (C) [ 29.810495] dump_stack_lvl+0x8c/0xd0 [ 29.810529] print_report+0x118/0x608 [ 29.810557] kasan_report+0xdc/0x128 [ 29.810585] __asan_report_load1_noabort+0x20/0x30 [ 29.810616] ksize_uaf+0x598/0x5f8 [ 29.810646] kunit_try_run_case+0x170/0x3f0 [ 29.810679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.810717] kthread+0x328/0x630 [ 29.810754] ret_from_fork+0x10/0x20 [ 29.810788] [ 29.872421] Allocated by task 243: [ 29.875808] kasan_save_stack+0x3c/0x68 [ 29.879624] kasan_save_track+0x20/0x40 [ 29.883444] kasan_save_alloc_info+0x40/0x58 [ 29.887697] __kasan_kmalloc+0xd4/0xd8 [ 29.891430] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.895943] ksize_uaf+0xb8/0x5f8 [ 29.899242] kunit_try_run_case+0x170/0x3f0 [ 29.903409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.908877] kthread+0x328/0x630 [ 29.912089] ret_from_fork+0x10/0x20 [ 29.915648] [ 29.917124] Freed by task 243: [ 29.920163] kasan_save_stack+0x3c/0x68 [ 29.923981] kasan_save_track+0x20/0x40 [ 29.927800] kasan_save_free_info+0x4c/0x78 [ 29.931967] __kasan_slab_free+0x6c/0x98 [ 29.935873] kfree+0x214/0x3c8 [ 29.938911] ksize_uaf+0x11c/0x5f8 [ 29.942298] kunit_try_run_case+0x170/0x3f0 [ 29.946463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.951932] kthread+0x328/0x630 [ 29.955144] ret_from_fork+0x10/0x20 [ 29.958703] [ 29.960180] The buggy address belongs to the object at ffff000800dac200 [ 29.960180] which belongs to the cache kmalloc-128 of size 128 [ 29.972679] The buggy address is located 0 bytes inside of [ 29.972679] freed 128-byte region [ffff000800dac200, ffff000800dac280) [ 29.984744] [ 29.986224] The buggy address belongs to the physical page: [ 29.991780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 29.999761] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.007403] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.014346] page_type: f5(slab) [ 30.017478] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.025201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.032928] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.040739] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.048552] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 30.056364] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.064170] page dumped because: kasan: bad access detected [ 30.069725] [ 30.071201] Memory state around the buggy address: [ 30.075981] ffff000800dac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.083184] ffff000800dac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.090389] >ffff000800dac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.097590] ^ [ 30.100805] ffff000800dac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.108009] ffff000800dac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.115211] ================================================================== [ 29.448975] ================================================================== [ 29.458801] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 29.465135] Read of size 1 at addr ffff000800dac200 by task kunit_try_catch/243 [ 29.472425] [ 29.473911] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 29.473968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.473983] Hardware name: WinLink E850-96 board (DT) [ 29.474007] Call trace: [ 29.474020] show_stack+0x20/0x38 (C) [ 29.474061] dump_stack_lvl+0x8c/0xd0 [ 29.474095] print_report+0x118/0x608 [ 29.474130] kasan_report+0xdc/0x128 [ 29.474159] __kasan_check_byte+0x54/0x70 [ 29.474188] ksize+0x30/0x88 [ 29.474216] ksize_uaf+0x168/0x5f8 [ 29.474250] kunit_try_run_case+0x170/0x3f0 [ 29.474288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.474330] kthread+0x328/0x630 [ 29.474364] ret_from_fork+0x10/0x20 [ 29.474399] [ 29.538050] Allocated by task 243: [ 29.541439] kasan_save_stack+0x3c/0x68 [ 29.545254] kasan_save_track+0x20/0x40 [ 29.549074] kasan_save_alloc_info+0x40/0x58 [ 29.553327] __kasan_kmalloc+0xd4/0xd8 [ 29.557060] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.561573] ksize_uaf+0xb8/0x5f8 [ 29.564872] kunit_try_run_case+0x170/0x3f0 [ 29.569039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.574507] kthread+0x328/0x630 [ 29.577719] ret_from_fork+0x10/0x20 [ 29.581278] [ 29.582754] Freed by task 243: [ 29.585792] kasan_save_stack+0x3c/0x68 [ 29.589611] kasan_save_track+0x20/0x40 [ 29.593431] kasan_save_free_info+0x4c/0x78 [ 29.597597] __kasan_slab_free+0x6c/0x98 [ 29.601503] kfree+0x214/0x3c8 [ 29.604541] ksize_uaf+0x11c/0x5f8 [ 29.607928] kunit_try_run_case+0x170/0x3f0 [ 29.612094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.617562] kthread+0x328/0x630 [ 29.620774] ret_from_fork+0x10/0x20 [ 29.624333] [ 29.625811] The buggy address belongs to the object at ffff000800dac200 [ 29.625811] which belongs to the cache kmalloc-128 of size 128 [ 29.638311] The buggy address is located 0 bytes inside of [ 29.638311] freed 128-byte region [ffff000800dac200, ffff000800dac280) [ 29.650374] [ 29.651854] The buggy address belongs to the physical page: [ 29.657409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 29.665395] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.673034] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.679976] page_type: f5(slab) [ 29.683112] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.690832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.698558] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.706370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.714182] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 29.721994] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.729800] page dumped because: kasan: bad access detected [ 29.735355] [ 29.736831] Memory state around the buggy address: [ 29.741612] ffff000800dac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.748814] ffff000800dac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.756020] >ffff000800dac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.763220] ^ [ 29.766435] ffff000800dac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.773640] ffff000800dac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.780842] ================================================================== [ 30.122630] ================================================================== [ 30.129625] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 30.135957] Read of size 1 at addr ffff000800dac278 by task kunit_try_catch/243 [ 30.143249] [ 30.144733] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 30.144787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.144802] Hardware name: WinLink E850-96 board (DT) [ 30.144820] Call trace: [ 30.144832] show_stack+0x20/0x38 (C) [ 30.144862] dump_stack_lvl+0x8c/0xd0 [ 30.144896] print_report+0x118/0x608 [ 30.144924] kasan_report+0xdc/0x128 [ 30.144951] __asan_report_load1_noabort+0x20/0x30 [ 30.144983] ksize_uaf+0x544/0x5f8 [ 30.145016] kunit_try_run_case+0x170/0x3f0 [ 30.145049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.145087] kthread+0x328/0x630 [ 30.145120] ret_from_fork+0x10/0x20 [ 30.145152] [ 30.206789] Allocated by task 243: [ 30.210177] kasan_save_stack+0x3c/0x68 [ 30.213994] kasan_save_track+0x20/0x40 [ 30.217814] kasan_save_alloc_info+0x40/0x58 [ 30.222067] __kasan_kmalloc+0xd4/0xd8 [ 30.225800] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.230313] ksize_uaf+0xb8/0x5f8 [ 30.233612] kunit_try_run_case+0x170/0x3f0 [ 30.237779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.243247] kthread+0x328/0x630 [ 30.246459] ret_from_fork+0x10/0x20 [ 30.250018] [ 30.251494] Freed by task 243: [ 30.254533] kasan_save_stack+0x3c/0x68 [ 30.258351] kasan_save_track+0x20/0x40 [ 30.262170] kasan_save_free_info+0x4c/0x78 [ 30.266337] __kasan_slab_free+0x6c/0x98 [ 30.270243] kfree+0x214/0x3c8 [ 30.273281] ksize_uaf+0x11c/0x5f8 [ 30.276667] kunit_try_run_case+0x170/0x3f0 [ 30.280833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.286302] kthread+0x328/0x630 [ 30.289514] ret_from_fork+0x10/0x20 [ 30.293073] [ 30.294550] The buggy address belongs to the object at ffff000800dac200 [ 30.294550] which belongs to the cache kmalloc-128 of size 128 [ 30.307049] The buggy address is located 120 bytes inside of [ 30.307049] freed 128-byte region [ffff000800dac200, ffff000800dac280) [ 30.319288] [ 30.320763] The buggy address belongs to the physical page: [ 30.326324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 30.334307] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.341945] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.348889] page_type: f5(slab) [ 30.352023] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.359745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.367471] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.375282] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.383096] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 30.390908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.398713] page dumped because: kasan: bad access detected [ 30.404268] [ 30.405745] Memory state around the buggy address: [ 30.410525] ffff000800dac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.417727] ffff000800dac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.424932] >ffff000800dac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.432133] ^ [ 30.439255] ffff000800dac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.446459] ffff000800dac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.453661] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 28.546978] ================================================================== [ 28.556558] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 28.563938] Read of size 1 at addr ffff000802408573 by task kunit_try_catch/241 [ 28.571224] [ 28.572710] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 28.572763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.572779] Hardware name: WinLink E850-96 board (DT) [ 28.572803] Call trace: [ 28.572816] show_stack+0x20/0x38 (C) [ 28.572854] dump_stack_lvl+0x8c/0xd0 [ 28.572892] print_report+0x118/0x608 [ 28.572920] kasan_report+0xdc/0x128 [ 28.572951] __asan_report_load1_noabort+0x20/0x30 [ 28.572986] ksize_unpoisons_memory+0x628/0x740 [ 28.573020] kunit_try_run_case+0x170/0x3f0 [ 28.573057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.573096] kthread+0x328/0x630 [ 28.573133] ret_from_fork+0x10/0x20 [ 28.573168] [ 28.635895] Allocated by task 241: [ 28.639280] kasan_save_stack+0x3c/0x68 [ 28.643097] kasan_save_track+0x20/0x40 [ 28.646917] kasan_save_alloc_info+0x40/0x58 [ 28.651170] __kasan_kmalloc+0xd4/0xd8 [ 28.654903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.659417] ksize_unpoisons_memory+0xc0/0x740 [ 28.663844] kunit_try_run_case+0x170/0x3f0 [ 28.668010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.673480] kthread+0x328/0x630 [ 28.676691] ret_from_fork+0x10/0x20 [ 28.680250] [ 28.681727] The buggy address belongs to the object at ffff000802408500 [ 28.681727] which belongs to the cache kmalloc-128 of size 128 [ 28.694227] The buggy address is located 0 bytes to the right of [ 28.694227] allocated 115-byte region [ffff000802408500, ffff000802408573) [ 28.707159] [ 28.708638] The buggy address belongs to the physical page: [ 28.714195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 28.722180] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.729817] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.736762] page_type: f5(slab) [ 28.739899] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.747617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.755343] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.763154] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.770967] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 28.778779] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.786585] page dumped because: kasan: bad access detected [ 28.792140] [ 28.793616] Memory state around the buggy address: [ 28.798396] ffff000802408400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.805601] ffff000802408480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.812803] >ffff000802408500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.820005] ^ [ 28.826865] ffff000802408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.834072] ffff000802408600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.841274] ================================================================== [ 29.148098] ================================================================== [ 29.155073] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 29.162448] Read of size 1 at addr ffff00080240857f by task kunit_try_catch/241 [ 29.169739] [ 29.171226] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 29.171276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.171291] Hardware name: WinLink E850-96 board (DT) [ 29.171312] Call trace: [ 29.171323] show_stack+0x20/0x38 (C) [ 29.171356] dump_stack_lvl+0x8c/0xd0 [ 29.171389] print_report+0x118/0x608 [ 29.171419] kasan_report+0xdc/0x128 [ 29.171447] __asan_report_load1_noabort+0x20/0x30 [ 29.171481] ksize_unpoisons_memory+0x690/0x740 [ 29.171514] kunit_try_run_case+0x170/0x3f0 [ 29.171549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.171586] kthread+0x328/0x630 [ 29.171620] ret_from_fork+0x10/0x20 [ 29.171652] [ 29.234408] Allocated by task 241: [ 29.237796] kasan_save_stack+0x3c/0x68 [ 29.241614] kasan_save_track+0x20/0x40 [ 29.245433] kasan_save_alloc_info+0x40/0x58 [ 29.249686] __kasan_kmalloc+0xd4/0xd8 [ 29.253418] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.257932] ksize_unpoisons_memory+0xc0/0x740 [ 29.262359] kunit_try_run_case+0x170/0x3f0 [ 29.266526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.271994] kthread+0x328/0x630 [ 29.275206] ret_from_fork+0x10/0x20 [ 29.278765] [ 29.280242] The buggy address belongs to the object at ffff000802408500 [ 29.280242] which belongs to the cache kmalloc-128 of size 128 [ 29.292742] The buggy address is located 12 bytes to the right of [ 29.292742] allocated 115-byte region [ffff000802408500, ffff000802408573) [ 29.305761] [ 29.307239] The buggy address belongs to the physical page: [ 29.312795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 29.320779] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.328419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.335363] page_type: f5(slab) [ 29.338495] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.346219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.353945] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.361756] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.369569] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 29.377381] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.385187] page dumped because: kasan: bad access detected [ 29.390743] [ 29.392218] Memory state around the buggy address: [ 29.396999] ffff000802408400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.404201] ffff000802408480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.411406] >ffff000802408500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.418607] ^ [ 29.425728] ffff000802408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.432934] ffff000802408600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.440135] ================================================================== [ 28.848597] ================================================================== [ 28.855688] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 28.863061] Read of size 1 at addr ffff000802408578 by task kunit_try_catch/241 [ 28.870352] [ 28.871838] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 28.871889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.871905] Hardware name: WinLink E850-96 board (DT) [ 28.871924] Call trace: [ 28.871935] show_stack+0x20/0x38 (C) [ 28.871971] dump_stack_lvl+0x8c/0xd0 [ 28.872005] print_report+0x118/0x608 [ 28.872036] kasan_report+0xdc/0x128 [ 28.872063] __asan_report_load1_noabort+0x20/0x30 [ 28.872098] ksize_unpoisons_memory+0x618/0x740 [ 28.872134] kunit_try_run_case+0x170/0x3f0 [ 28.872168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.872203] kthread+0x328/0x630 [ 28.872239] ret_from_fork+0x10/0x20 [ 28.872272] [ 28.935020] Allocated by task 241: [ 28.938408] kasan_save_stack+0x3c/0x68 [ 28.942225] kasan_save_track+0x20/0x40 [ 28.946045] kasan_save_alloc_info+0x40/0x58 [ 28.950298] __kasan_kmalloc+0xd4/0xd8 [ 28.954030] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.958544] ksize_unpoisons_memory+0xc0/0x740 [ 28.962971] kunit_try_run_case+0x170/0x3f0 [ 28.967138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.972607] kthread+0x328/0x630 [ 28.975818] ret_from_fork+0x10/0x20 [ 28.979377] [ 28.980854] The buggy address belongs to the object at ffff000802408500 [ 28.980854] which belongs to the cache kmalloc-128 of size 128 [ 28.993354] The buggy address is located 5 bytes to the right of [ 28.993354] allocated 115-byte region [ffff000802408500, ffff000802408573) [ 29.006287] [ 29.007766] The buggy address belongs to the physical page: [ 29.013322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 29.021307] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.028944] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.035888] page_type: f5(slab) [ 29.039022] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.046744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.054470] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.062282] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.070095] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 29.077907] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.085712] page dumped because: kasan: bad access detected [ 29.091268] [ 29.092743] Memory state around the buggy address: [ 29.097525] ffff000802408400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.104726] ffff000802408480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.111931] >ffff000802408500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.119132] ^ [ 29.126254] ffff000802408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.133460] ffff000802408600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.140660] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 28.231850] ================================================================== [ 28.238854] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 28.244840] Free of addr ffff000800a7c640 by task kunit_try_catch/239 [ 28.251263] [ 28.252749] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 28.252806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.252824] Hardware name: WinLink E850-96 board (DT) [ 28.252843] Call trace: [ 28.252856] show_stack+0x20/0x38 (C) [ 28.252886] dump_stack_lvl+0x8c/0xd0 [ 28.252920] print_report+0x118/0x608 [ 28.252949] kasan_report_invalid_free+0xc0/0xe8 [ 28.252979] check_slab_allocation+0xd4/0x108 [ 28.253011] __kasan_slab_pre_free+0x2c/0x48 [ 28.253041] kfree+0xe8/0x3c8 [ 28.253074] kfree_sensitive+0x3c/0xb0 [ 28.253102] kmalloc_double_kzfree+0x168/0x308 [ 28.253137] kunit_try_run_case+0x170/0x3f0 [ 28.253171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.253207] kthread+0x328/0x630 [ 28.253239] ret_from_fork+0x10/0x20 [ 28.253276] [ 28.327390] Allocated by task 239: [ 28.330778] kasan_save_stack+0x3c/0x68 [ 28.334595] kasan_save_track+0x20/0x40 [ 28.338415] kasan_save_alloc_info+0x40/0x58 [ 28.342668] __kasan_kmalloc+0xd4/0xd8 [ 28.346401] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.350914] kmalloc_double_kzfree+0xb8/0x308 [ 28.355255] kunit_try_run_case+0x170/0x3f0 [ 28.359421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.364890] kthread+0x328/0x630 [ 28.368102] ret_from_fork+0x10/0x20 [ 28.371661] [ 28.373136] Freed by task 239: [ 28.376176] kasan_save_stack+0x3c/0x68 [ 28.379994] kasan_save_track+0x20/0x40 [ 28.383813] kasan_save_free_info+0x4c/0x78 [ 28.387980] __kasan_slab_free+0x6c/0x98 [ 28.391886] kfree+0x214/0x3c8 [ 28.394924] kfree_sensitive+0x80/0xb0 [ 28.398657] kmalloc_double_kzfree+0x11c/0x308 [ 28.403084] kunit_try_run_case+0x170/0x3f0 [ 28.407252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.412719] kthread+0x328/0x630 [ 28.415931] ret_from_fork+0x10/0x20 [ 28.419490] [ 28.420965] The buggy address belongs to the object at ffff000800a7c640 [ 28.420965] which belongs to the cache kmalloc-16 of size 16 [ 28.433293] The buggy address is located 0 bytes inside of [ 28.433293] 16-byte region [ffff000800a7c640, ffff000800a7c650) [ 28.444750] [ 28.446229] The buggy address belongs to the physical page: [ 28.451784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880a7c [ 28.459770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.466279] page_type: f5(slab) [ 28.469411] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 28.477135] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.484853] page dumped because: kasan: bad access detected [ 28.490409] [ 28.491884] Memory state around the buggy address: [ 28.496664] ffff000800a7c500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.503867] ffff000800a7c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.511072] >ffff000800a7c600: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 28.518273] ^ [ 28.523571] ffff000800a7c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.530776] ffff000800a7c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.537978] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 27.917363] ================================================================== [ 27.931136] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 27.938508] Read of size 1 at addr ffff000800a7c640 by task kunit_try_catch/239 [ 27.945799] [ 27.947286] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 27.947342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.947358] Hardware name: WinLink E850-96 board (DT) [ 27.947380] Call trace: [ 27.947395] show_stack+0x20/0x38 (C) [ 27.947426] dump_stack_lvl+0x8c/0xd0 [ 27.947463] print_report+0x118/0x608 [ 27.947493] kasan_report+0xdc/0x128 [ 27.947523] __kasan_check_byte+0x54/0x70 [ 27.947553] kfree_sensitive+0x30/0xb0 [ 27.947585] kmalloc_double_kzfree+0x168/0x308 [ 27.947619] kunit_try_run_case+0x170/0x3f0 [ 27.947655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.947692] kthread+0x328/0x630 [ 27.947728] ret_from_fork+0x10/0x20 [ 27.947763] [ 28.013333] Allocated by task 239: [ 28.016720] kasan_save_stack+0x3c/0x68 [ 28.020538] kasan_save_track+0x20/0x40 [ 28.024357] kasan_save_alloc_info+0x40/0x58 [ 28.028610] __kasan_kmalloc+0xd4/0xd8 [ 28.032343] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.036857] kmalloc_double_kzfree+0xb8/0x308 [ 28.041197] kunit_try_run_case+0x170/0x3f0 [ 28.045364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.050832] kthread+0x328/0x630 [ 28.054044] ret_from_fork+0x10/0x20 [ 28.057603] [ 28.059080] Freed by task 239: [ 28.062118] kasan_save_stack+0x3c/0x68 [ 28.065936] kasan_save_track+0x20/0x40 [ 28.069755] kasan_save_free_info+0x4c/0x78 [ 28.073922] __kasan_slab_free+0x6c/0x98 [ 28.077828] kfree+0x214/0x3c8 [ 28.080866] kfree_sensitive+0x80/0xb0 [ 28.084599] kmalloc_double_kzfree+0x11c/0x308 [ 28.089026] kunit_try_run_case+0x170/0x3f0 [ 28.093194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.098661] kthread+0x328/0x630 [ 28.101873] ret_from_fork+0x10/0x20 [ 28.105432] [ 28.106909] The buggy address belongs to the object at ffff000800a7c640 [ 28.106909] which belongs to the cache kmalloc-16 of size 16 [ 28.119236] The buggy address is located 0 bytes inside of [ 28.119236] freed 16-byte region [ffff000800a7c640, ffff000800a7c650) [ 28.131213] [ 28.132693] The buggy address belongs to the physical page: [ 28.138249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880a7c [ 28.146234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.152742] page_type: f5(slab) [ 28.155881] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 28.163597] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.171316] page dumped because: kasan: bad access detected [ 28.176872] [ 28.178348] Memory state around the buggy address: [ 28.183127] ffff000800a7c500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.190330] ffff000800a7c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.197536] >ffff000800a7c600: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 28.204736] ^ [ 28.210035] ffff000800a7c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.217239] ffff000800a7c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.224442] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 19.736288] ================================================================== [ 19.750528] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 19.756861] Read of size 1 at addr ffff0008065f0000 by task kunit_try_catch/201 [ 19.764151] [ 19.765636] CPU: 5 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 19.765689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.765706] Hardware name: WinLink E850-96 board (DT) [ 19.765728] Call trace: [ 19.765742] show_stack+0x20/0x38 (C) [ 19.765779] dump_stack_lvl+0x8c/0xd0 [ 19.765813] print_report+0x118/0x608 [ 19.765843] kasan_report+0xdc/0x128 [ 19.765875] __asan_report_load1_noabort+0x20/0x30 [ 19.765908] page_alloc_uaf+0x328/0x350 [ 19.765944] kunit_try_run_case+0x170/0x3f0 [ 19.765980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.766021] kthread+0x328/0x630 [ 19.766057] ret_from_fork+0x10/0x20 [ 19.766090] [ 19.828128] The buggy address belongs to the physical page: [ 19.833686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865f0 [ 19.841671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.848178] page_type: f0(buddy) [ 19.851403] raw: 0bfffe0000000000 ffff00087f61bbe0 ffff00087f61bbe0 0000000000000000 [ 19.859123] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 19.866841] page dumped because: kasan: bad access detected [ 19.872396] [ 19.873871] Memory state around the buggy address: [ 19.878652] ffff0008065eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.885854] ffff0008065eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.893059] >ffff0008065f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.900260] ^ [ 19.903475] ffff0008065f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.910680] ffff0008065f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.917883] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 27.613942] ================================================================== [ 27.623330] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 27.629921] Read of size 1 at addr ffff000800d61628 by task kunit_try_catch/235 [ 27.637210] [ 27.638698] CPU: 7 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 27.638753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.638770] Hardware name: WinLink E850-96 board (DT) [ 27.638792] Call trace: [ 27.638806] show_stack+0x20/0x38 (C) [ 27.638841] dump_stack_lvl+0x8c/0xd0 [ 27.638876] print_report+0x118/0x608 [ 27.638908] kasan_report+0xdc/0x128 [ 27.638935] __asan_report_load1_noabort+0x20/0x30 [ 27.638971] kmalloc_uaf2+0x3f4/0x468 [ 27.639002] kunit_try_run_case+0x170/0x3f0 [ 27.639039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.639080] kthread+0x328/0x630 [ 27.639115] ret_from_fork+0x10/0x20 [ 27.639151] [ 27.701013] Allocated by task 235: [ 27.704398] kasan_save_stack+0x3c/0x68 [ 27.708216] kasan_save_track+0x20/0x40 [ 27.712035] kasan_save_alloc_info+0x40/0x58 [ 27.716289] __kasan_kmalloc+0xd4/0xd8 [ 27.720023] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.724535] kmalloc_uaf2+0xc4/0x468 [ 27.728096] kunit_try_run_case+0x170/0x3f0 [ 27.732260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.737729] kthread+0x328/0x630 [ 27.740941] ret_from_fork+0x10/0x20 [ 27.744500] [ 27.745977] Freed by task 235: [ 27.749015] kasan_save_stack+0x3c/0x68 [ 27.752833] kasan_save_track+0x20/0x40 [ 27.756653] kasan_save_free_info+0x4c/0x78 [ 27.760819] __kasan_slab_free+0x6c/0x98 [ 27.764726] kfree+0x214/0x3c8 [ 27.767764] kmalloc_uaf2+0x134/0x468 [ 27.771409] kunit_try_run_case+0x170/0x3f0 [ 27.775576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.781045] kthread+0x328/0x630 [ 27.784256] ret_from_fork+0x10/0x20 [ 27.787815] [ 27.789293] The buggy address belongs to the object at ffff000800d61600 [ 27.789293] which belongs to the cache kmalloc-64 of size 64 [ 27.801619] The buggy address is located 40 bytes inside of [ 27.801619] freed 64-byte region [ffff000800d61600, ffff000800d61640) [ 27.813683] [ 27.815162] The buggy address belongs to the physical page: [ 27.820719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 27.828704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.835212] page_type: f5(slab) [ 27.838350] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 27.846068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.853788] page dumped because: kasan: bad access detected [ 27.859342] [ 27.860818] Memory state around the buggy address: [ 27.865598] ffff000800d61500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.872801] ffff000800d61580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.880006] >ffff000800d61600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.887207] ^ [ 27.891723] ffff000800d61680: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 27.898928] ffff000800d61700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.906131] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 27.309667] ================================================================== [ 27.318471] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 27.325584] Write of size 33 at addr ffff000800c2d200 by task kunit_try_catch/233 [ 27.333048] [ 27.334534] CPU: 5 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 27.334589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.334605] Hardware name: WinLink E850-96 board (DT) [ 27.334626] Call trace: [ 27.334639] show_stack+0x20/0x38 (C) [ 27.334672] dump_stack_lvl+0x8c/0xd0 [ 27.334706] print_report+0x118/0x608 [ 27.334737] kasan_report+0xdc/0x128 [ 27.334764] kasan_check_range+0x100/0x1a8 [ 27.334797] __asan_memset+0x34/0x78 [ 27.334827] kmalloc_uaf_memset+0x170/0x310 [ 27.334859] kunit_try_run_case+0x170/0x3f0 [ 27.334895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.334935] kthread+0x328/0x630 [ 27.334969] ret_from_fork+0x10/0x20 [ 27.335005] [ 27.400236] Allocated by task 233: [ 27.403622] kasan_save_stack+0x3c/0x68 [ 27.407439] kasan_save_track+0x20/0x40 [ 27.411260] kasan_save_alloc_info+0x40/0x58 [ 27.415512] __kasan_kmalloc+0xd4/0xd8 [ 27.419245] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.423758] kmalloc_uaf_memset+0xb8/0x310 [ 27.427838] kunit_try_run_case+0x170/0x3f0 [ 27.432005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.437473] kthread+0x328/0x630 [ 27.440685] ret_from_fork+0x10/0x20 [ 27.444244] [ 27.445721] Freed by task 233: [ 27.448761] kasan_save_stack+0x3c/0x68 [ 27.452577] kasan_save_track+0x20/0x40 [ 27.456397] kasan_save_free_info+0x4c/0x78 [ 27.460563] __kasan_slab_free+0x6c/0x98 [ 27.464471] kfree+0x214/0x3c8 [ 27.467508] kmalloc_uaf_memset+0x11c/0x310 [ 27.471674] kunit_try_run_case+0x170/0x3f0 [ 27.475841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.481310] kthread+0x328/0x630 [ 27.484521] ret_from_fork+0x10/0x20 [ 27.488080] [ 27.489559] The buggy address belongs to the object at ffff000800c2d200 [ 27.489559] which belongs to the cache kmalloc-64 of size 64 [ 27.501885] The buggy address is located 0 bytes inside of [ 27.501885] freed 64-byte region [ffff000800c2d200, ffff000800c2d240) [ 27.513861] [ 27.515341] The buggy address belongs to the physical page: [ 27.520896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 27.528882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.535390] page_type: f5(slab) [ 27.538529] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 27.546246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.553965] page dumped because: kasan: bad access detected [ 27.559520] [ 27.560997] Memory state around the buggy address: [ 27.565776] ffff000800c2d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.572978] ffff000800c2d180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.580184] >ffff000800c2d200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.587384] ^ [ 27.590600] ffff000800c2d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.597804] ffff000800c2d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.605007] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 27.007228] ================================================================== [ 27.017346] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 27.023851] Read of size 1 at addr ffff0008037171c8 by task kunit_try_catch/231 [ 27.031143] [ 27.032630] CPU: 4 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 27.032684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.032699] Hardware name: WinLink E850-96 board (DT) [ 27.032726] Call trace: [ 27.032737] show_stack+0x20/0x38 (C) [ 27.032771] dump_stack_lvl+0x8c/0xd0 [ 27.032803] print_report+0x118/0x608 [ 27.032833] kasan_report+0xdc/0x128 [ 27.032862] __asan_report_load1_noabort+0x20/0x30 [ 27.032896] kmalloc_uaf+0x300/0x338 [ 27.032927] kunit_try_run_case+0x170/0x3f0 [ 27.032965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.033006] kthread+0x328/0x630 [ 27.033038] ret_from_fork+0x10/0x20 [ 27.033072] [ 27.094858] Allocated by task 231: [ 27.098245] kasan_save_stack+0x3c/0x68 [ 27.102062] kasan_save_track+0x20/0x40 [ 27.105881] kasan_save_alloc_info+0x40/0x58 [ 27.110135] __kasan_kmalloc+0xd4/0xd8 [ 27.113867] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.118381] kmalloc_uaf+0xb8/0x338 [ 27.121854] kunit_try_run_case+0x170/0x3f0 [ 27.126020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.131488] kthread+0x328/0x630 [ 27.134699] ret_from_fork+0x10/0x20 [ 27.138259] [ 27.139736] Freed by task 231: [ 27.142774] kasan_save_stack+0x3c/0x68 [ 27.146591] kasan_save_track+0x20/0x40 [ 27.150412] kasan_save_free_info+0x4c/0x78 [ 27.154578] __kasan_slab_free+0x6c/0x98 [ 27.158484] kfree+0x214/0x3c8 [ 27.161523] kmalloc_uaf+0x11c/0x338 [ 27.165081] kunit_try_run_case+0x170/0x3f0 [ 27.169248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.174717] kthread+0x328/0x630 [ 27.177929] ret_from_fork+0x10/0x20 [ 27.181488] [ 27.182965] The buggy address belongs to the object at ffff0008037171c0 [ 27.182965] which belongs to the cache kmalloc-16 of size 16 [ 27.195291] The buggy address is located 8 bytes inside of [ 27.195291] freed 16-byte region [ffff0008037171c0, ffff0008037171d0) [ 27.207268] [ 27.208748] The buggy address belongs to the physical page: [ 27.214304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 27.222289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.228798] page_type: f5(slab) [ 27.231936] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 27.239653] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.247372] page dumped because: kasan: bad access detected [ 27.252927] [ 27.254403] Memory state around the buggy address: [ 27.259182] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 27.266386] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 27.273590] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc fc fc fc fc [ 27.280792] ^ [ 27.286352] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.293555] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.300758] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 26.740219] ================================================================== [ 26.750510] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 26.758404] Read of size 64 at addr ffff000800c2d184 by task kunit_try_catch/229 [ 26.765784] [ 26.767270] CPU: 5 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 26.767329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.767344] Hardware name: WinLink E850-96 board (DT) [ 26.767365] Call trace: [ 26.767378] show_stack+0x20/0x38 (C) [ 26.767411] dump_stack_lvl+0x8c/0xd0 [ 26.767444] print_report+0x118/0x608 [ 26.767475] kasan_report+0xdc/0x128 [ 26.767502] kasan_check_range+0x100/0x1a8 [ 26.767536] __asan_memmove+0x3c/0x98 [ 26.767566] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 26.767603] kunit_try_run_case+0x170/0x3f0 [ 26.767639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.767678] kthread+0x328/0x630 [ 26.767710] ret_from_fork+0x10/0x20 [ 26.767745] [ 26.833925] Allocated by task 229: [ 26.837311] kasan_save_stack+0x3c/0x68 [ 26.841128] kasan_save_track+0x20/0x40 [ 26.844949] kasan_save_alloc_info+0x40/0x58 [ 26.849201] __kasan_kmalloc+0xd4/0xd8 [ 26.852934] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.857448] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 26.862395] kunit_try_run_case+0x170/0x3f0 [ 26.866562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.872030] kthread+0x328/0x630 [ 26.875242] ret_from_fork+0x10/0x20 [ 26.878801] [ 26.880280] The buggy address belongs to the object at ffff000800c2d180 [ 26.880280] which belongs to the cache kmalloc-64 of size 64 [ 26.892606] The buggy address is located 4 bytes inside of [ 26.892606] allocated 64-byte region [ffff000800c2d180, ffff000800c2d1c0) [ 26.904929] [ 26.906407] The buggy address belongs to the physical page: [ 26.911965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 26.919950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.926459] page_type: f5(slab) [ 26.929596] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 26.937314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.945034] page dumped because: kasan: bad access detected [ 26.950587] [ 26.952064] Memory state around the buggy address: [ 26.956846] ffff000800c2d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.964046] ffff000800c2d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.971253] >ffff000800c2d180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.978452] ^ [ 26.983753] ffff000800c2d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.990956] ffff000800c2d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.998158] ==================================================================
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 26.475302] ================================================================== [ 26.485148] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 26.492698] Read of size 18446744073709551614 at addr ffff000800cab184 by task kunit_try_catch/227 [ 26.501637] [ 26.503124] CPU: 6 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 26.503175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.503189] Hardware name: WinLink E850-96 board (DT) [ 26.503212] Call trace: [ 26.503230] show_stack+0x20/0x38 (C) [ 26.503265] dump_stack_lvl+0x8c/0xd0 [ 26.503300] print_report+0x118/0x608 [ 26.503333] kasan_report+0xdc/0x128 [ 26.503364] kasan_check_range+0x100/0x1a8 [ 26.503398] __asan_memmove+0x3c/0x98 [ 26.503430] kmalloc_memmove_negative_size+0x154/0x2e0 [ 26.503471] kunit_try_run_case+0x170/0x3f0 [ 26.503509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.503547] kthread+0x328/0x630 [ 26.503583] ret_from_fork+0x10/0x20 [ 26.503621] [ 26.569866] Allocated by task 227: [ 26.573252] kasan_save_stack+0x3c/0x68 [ 26.577070] kasan_save_track+0x20/0x40 [ 26.580889] kasan_save_alloc_info+0x40/0x58 [ 26.585143] __kasan_kmalloc+0xd4/0xd8 [ 26.588875] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.593389] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 26.598425] kunit_try_run_case+0x170/0x3f0 [ 26.602589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.608059] kthread+0x328/0x630 [ 26.611271] ret_from_fork+0x10/0x20 [ 26.614829] [ 26.616308] The buggy address belongs to the object at ffff000800cab180 [ 26.616308] which belongs to the cache kmalloc-64 of size 64 [ 26.628635] The buggy address is located 4 bytes inside of [ 26.628635] 64-byte region [ffff000800cab180, ffff000800cab1c0) [ 26.640089] [ 26.641569] The buggy address belongs to the physical page: [ 26.647125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cab [ 26.655110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.661618] page_type: f5(slab) [ 26.664755] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 26.672474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.680193] page dumped because: kasan: bad access detected [ 26.685748] [ 26.687224] Memory state around the buggy address: [ 26.692006] ffff000800cab080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.699207] ffff000800cab100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.706412] >ffff000800cab180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.713613] ^ [ 26.716829] ffff000800cab200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.724032] ffff000800cab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.731234] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 26.169575] ================================================================== [ 26.179164] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 26.186451] Write of size 16 at addr ffff000802408469 by task kunit_try_catch/225 [ 26.193916] [ 26.195402] CPU: 5 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 26.195456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.195471] Hardware name: WinLink E850-96 board (DT) [ 26.195491] Call trace: [ 26.195506] show_stack+0x20/0x38 (C) [ 26.195543] dump_stack_lvl+0x8c/0xd0 [ 26.195579] print_report+0x118/0x608 [ 26.195607] kasan_report+0xdc/0x128 [ 26.195634] kasan_check_range+0x100/0x1a8 [ 26.195669] __asan_memset+0x34/0x78 [ 26.195698] kmalloc_oob_memset_16+0x150/0x2f8 [ 26.195730] kunit_try_run_case+0x170/0x3f0 [ 26.195764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.195801] kthread+0x328/0x630 [ 26.195834] ret_from_fork+0x10/0x20 [ 26.195869] [ 26.261364] Allocated by task 225: [ 26.264750] kasan_save_stack+0x3c/0x68 [ 26.268567] kasan_save_track+0x20/0x40 [ 26.272388] kasan_save_alloc_info+0x40/0x58 [ 26.276640] __kasan_kmalloc+0xd4/0xd8 [ 26.280373] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.284887] kmalloc_oob_memset_16+0xb0/0x2f8 [ 26.289227] kunit_try_run_case+0x170/0x3f0 [ 26.293394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.298862] kthread+0x328/0x630 [ 26.302074] ret_from_fork+0x10/0x20 [ 26.305633] [ 26.307110] The buggy address belongs to the object at ffff000802408400 [ 26.307110] which belongs to the cache kmalloc-128 of size 128 [ 26.319610] The buggy address is located 105 bytes inside of [ 26.319610] allocated 120-byte region [ffff000802408400, ffff000802408478) [ 26.332195] [ 26.333674] The buggy address belongs to the physical page: [ 26.339231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 26.347215] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.354854] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.361796] page_type: f5(slab) [ 26.364934] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 26.372652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.380378] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 26.388190] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.396003] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 26.403815] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.411620] page dumped because: kasan: bad access detected [ 26.417176] [ 26.418652] Memory state around the buggy address: [ 26.423433] ffff000802408300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.430634] ffff000802408380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.437840] >ffff000802408400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.445041] ^ [ 26.452162] ffff000802408480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.459366] ffff000802408500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.466569] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 25.864148] ================================================================== [ 25.873613] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 25.880815] Write of size 8 at addr ffff000801dd0171 by task kunit_try_catch/223 [ 25.888191] [ 25.889679] CPU: 6 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 25.889734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.889747] Hardware name: WinLink E850-96 board (DT) [ 25.889767] Call trace: [ 25.889780] show_stack+0x20/0x38 (C) [ 25.889816] dump_stack_lvl+0x8c/0xd0 [ 25.889853] print_report+0x118/0x608 [ 25.889886] kasan_report+0xdc/0x128 [ 25.889914] kasan_check_range+0x100/0x1a8 [ 25.889946] __asan_memset+0x34/0x78 [ 25.889976] kmalloc_oob_memset_8+0x150/0x2f8 [ 25.890008] kunit_try_run_case+0x170/0x3f0 [ 25.890045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.890084] kthread+0x328/0x630 [ 25.890116] ret_from_fork+0x10/0x20 [ 25.890152] [ 25.955553] Allocated by task 223: [ 25.958938] kasan_save_stack+0x3c/0x68 [ 25.962756] kasan_save_track+0x20/0x40 [ 25.966575] kasan_save_alloc_info+0x40/0x58 [ 25.970829] __kasan_kmalloc+0xd4/0xd8 [ 25.974561] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.979075] kmalloc_oob_memset_8+0xb0/0x2f8 [ 25.983330] kunit_try_run_case+0x170/0x3f0 [ 25.987495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.992964] kthread+0x328/0x630 [ 25.996176] ret_from_fork+0x10/0x20 [ 25.999734] [ 26.001213] The buggy address belongs to the object at ffff000801dd0100 [ 26.001213] which belongs to the cache kmalloc-128 of size 128 [ 26.013712] The buggy address is located 113 bytes inside of [ 26.013712] allocated 120-byte region [ffff000801dd0100, ffff000801dd0178) [ 26.026296] [ 26.027775] The buggy address belongs to the physical page: [ 26.033333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd0 [ 26.041318] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.048955] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.055899] page_type: f5(slab) [ 26.059036] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 26.066754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.074480] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 26.082292] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.090105] head: 0bfffe0000000001 fffffdffe0077401 00000000ffffffff 00000000ffffffff [ 26.097917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.105722] page dumped because: kasan: bad access detected [ 26.111278] [ 26.112755] Memory state around the buggy address: [ 26.117533] ffff000801dd0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.124736] ffff000801dd0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.131942] >ffff000801dd0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.139142] ^ [ 26.146263] ffff000801dd0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.153470] ffff000801dd0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.160671] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 25.558510] ================================================================== [ 25.568065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 25.575266] Write of size 4 at addr ffff000802408375 by task kunit_try_catch/221 [ 25.582639] [ 25.584127] CPU: 5 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 25.584183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.584199] Hardware name: WinLink E850-96 board (DT) [ 25.584221] Call trace: [ 25.584234] show_stack+0x20/0x38 (C) [ 25.584268] dump_stack_lvl+0x8c/0xd0 [ 25.584302] print_report+0x118/0x608 [ 25.584331] kasan_report+0xdc/0x128 [ 25.584356] kasan_check_range+0x100/0x1a8 [ 25.584386] __asan_memset+0x34/0x78 [ 25.584415] kmalloc_oob_memset_4+0x150/0x300 [ 25.584451] kunit_try_run_case+0x170/0x3f0 [ 25.584486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.584523] kthread+0x328/0x630 [ 25.584556] ret_from_fork+0x10/0x20 [ 25.584590] [ 25.650001] Allocated by task 221: [ 25.653388] kasan_save_stack+0x3c/0x68 [ 25.657205] kasan_save_track+0x20/0x40 [ 25.661026] kasan_save_alloc_info+0x40/0x58 [ 25.665278] __kasan_kmalloc+0xd4/0xd8 [ 25.669010] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.673524] kmalloc_oob_memset_4+0xb0/0x300 [ 25.677778] kunit_try_run_case+0x170/0x3f0 [ 25.681944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.687413] kthread+0x328/0x630 [ 25.690625] ret_from_fork+0x10/0x20 [ 25.694183] [ 25.695661] The buggy address belongs to the object at ffff000802408300 [ 25.695661] which belongs to the cache kmalloc-128 of size 128 [ 25.708161] The buggy address is located 117 bytes inside of [ 25.708161] allocated 120-byte region [ffff000802408300, ffff000802408378) [ 25.720745] [ 25.722224] The buggy address belongs to the physical page: [ 25.727782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 25.735766] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.743405] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.750348] page_type: f5(slab) [ 25.753483] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.761203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.768929] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.776741] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.784555] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 25.792366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.800171] page dumped because: kasan: bad access detected [ 25.805728] [ 25.807202] Memory state around the buggy address: [ 25.811984] ffff000802408200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.819185] ffff000802408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.826390] >ffff000802408300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.833591] ^ [ 25.840713] ffff000802408380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.847919] ffff000802408400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.855120] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 25.252973] ================================================================== [ 25.262512] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 25.269713] Write of size 2 at addr ffff000801dd0077 by task kunit_try_catch/219 [ 25.277089] [ 25.278576] CPU: 6 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 25.278621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.278635] Hardware name: WinLink E850-96 board (DT) [ 25.278652] Call trace: [ 25.278666] show_stack+0x20/0x38 (C) [ 25.278698] dump_stack_lvl+0x8c/0xd0 [ 25.278731] print_report+0x118/0x608 [ 25.278761] kasan_report+0xdc/0x128 [ 25.278786] kasan_check_range+0x100/0x1a8 [ 25.278815] __asan_memset+0x34/0x78 [ 25.278843] kmalloc_oob_memset_2+0x150/0x2f8 [ 25.278877] kunit_try_run_case+0x170/0x3f0 [ 25.278914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.278952] kthread+0x328/0x630 [ 25.278988] ret_from_fork+0x10/0x20 [ 25.279023] [ 25.344451] Allocated by task 219: [ 25.347837] kasan_save_stack+0x3c/0x68 [ 25.351654] kasan_save_track+0x20/0x40 [ 25.355474] kasan_save_alloc_info+0x40/0x58 [ 25.359727] __kasan_kmalloc+0xd4/0xd8 [ 25.363459] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.367974] kmalloc_oob_memset_2+0xb0/0x2f8 [ 25.372228] kunit_try_run_case+0x170/0x3f0 [ 25.376395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.381862] kthread+0x328/0x630 [ 25.385074] ret_from_fork+0x10/0x20 [ 25.388632] [ 25.390110] The buggy address belongs to the object at ffff000801dd0000 [ 25.390110] which belongs to the cache kmalloc-128 of size 128 [ 25.402610] The buggy address is located 119 bytes inside of [ 25.402610] allocated 120-byte region [ffff000801dd0000, ffff000801dd0078) [ 25.415195] [ 25.416673] The buggy address belongs to the physical page: [ 25.422231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd0 [ 25.430215] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.437854] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.444797] page_type: f5(slab) [ 25.447933] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.455652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.463378] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.471190] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.479003] head: 0bfffe0000000001 fffffdffe0077401 00000000ffffffff 00000000ffffffff [ 25.486815] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.494620] page dumped because: kasan: bad access detected [ 25.500176] [ 25.501652] Memory state around the buggy address: [ 25.506433] ffff000801dcff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.513634] ffff000801dcff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.520841] >ffff000801dd0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.528040] ^ [ 25.535162] ffff000801dd0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.542366] ffff000801dd0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.549569] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 24.947449] ================================================================== [ 24.956613] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 24.963903] Write of size 128 at addr ffff000802408200 by task kunit_try_catch/217 [ 24.971451] [ 24.972938] CPU: 5 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 24.972992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.973007] Hardware name: WinLink E850-96 board (DT) [ 24.973029] Call trace: [ 24.973041] show_stack+0x20/0x38 (C) [ 24.973072] dump_stack_lvl+0x8c/0xd0 [ 24.973106] print_report+0x118/0x608 [ 24.973135] kasan_report+0xdc/0x128 [ 24.973164] kasan_check_range+0x100/0x1a8 [ 24.973196] __asan_memset+0x34/0x78 [ 24.973227] kmalloc_oob_in_memset+0x144/0x2d0 [ 24.973259] kunit_try_run_case+0x170/0x3f0 [ 24.973294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.973334] kthread+0x328/0x630 [ 24.973368] ret_from_fork+0x10/0x20 [ 24.973402] [ 25.038899] Allocated by task 217: [ 25.042287] kasan_save_stack+0x3c/0x68 [ 25.046103] kasan_save_track+0x20/0x40 [ 25.049924] kasan_save_alloc_info+0x40/0x58 [ 25.054176] __kasan_kmalloc+0xd4/0xd8 [ 25.057908] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.062422] kmalloc_oob_in_memset+0xb0/0x2d0 [ 25.066762] kunit_try_run_case+0x170/0x3f0 [ 25.070929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.076397] kthread+0x328/0x630 [ 25.079609] ret_from_fork+0x10/0x20 [ 25.083168] [ 25.084646] The buggy address belongs to the object at ffff000802408200 [ 25.084646] which belongs to the cache kmalloc-128 of size 128 [ 25.097146] The buggy address is located 0 bytes inside of [ 25.097146] allocated 120-byte region [ffff000802408200, ffff000802408278) [ 25.109557] [ 25.111035] The buggy address belongs to the physical page: [ 25.116594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 25.124578] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.132216] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.139158] page_type: f5(slab) [ 25.142296] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.150014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.157741] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 25.165552] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.173365] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 25.181177] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.188983] page dumped because: kasan: bad access detected [ 25.194538] [ 25.196014] Memory state around the buggy address: [ 25.200793] ffff000802408100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.207997] ffff000802408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.215203] >ffff000802408200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.222402] ^ [ 25.229524] ffff000802408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.236728] ffff000802408300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.243931] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 24.644129] ================================================================== [ 24.653145] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 24.659912] Read of size 16 at addr ffff000800cac060 by task kunit_try_catch/215 [ 24.667290] [ 24.668779] CPU: 6 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 24.668831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.668847] Hardware name: WinLink E850-96 board (DT) [ 24.668866] Call trace: [ 24.668879] show_stack+0x20/0x38 (C) [ 24.668911] dump_stack_lvl+0x8c/0xd0 [ 24.668945] print_report+0x118/0x608 [ 24.668976] kasan_report+0xdc/0x128 [ 24.669001] __asan_report_load16_noabort+0x20/0x30 [ 24.669035] kmalloc_uaf_16+0x3bc/0x438 [ 24.669066] kunit_try_run_case+0x170/0x3f0 [ 24.669102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.669144] kthread+0x328/0x630 [ 24.669179] ret_from_fork+0x10/0x20 [ 24.669214] [ 24.731352] Allocated by task 215: [ 24.734737] kasan_save_stack+0x3c/0x68 [ 24.738555] kasan_save_track+0x20/0x40 [ 24.742375] kasan_save_alloc_info+0x40/0x58 [ 24.746628] __kasan_kmalloc+0xd4/0xd8 [ 24.750361] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.754875] kmalloc_uaf_16+0x140/0x438 [ 24.758694] kunit_try_run_case+0x170/0x3f0 [ 24.762861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.768329] kthread+0x328/0x630 [ 24.771541] ret_from_fork+0x10/0x20 [ 24.775100] [ 24.776577] Freed by task 215: [ 24.779614] kasan_save_stack+0x3c/0x68 [ 24.783433] kasan_save_track+0x20/0x40 [ 24.787253] kasan_save_free_info+0x4c/0x78 [ 24.791419] __kasan_slab_free+0x6c/0x98 [ 24.795325] kfree+0x214/0x3c8 [ 24.798363] kmalloc_uaf_16+0x190/0x438 [ 24.802184] kunit_try_run_case+0x170/0x3f0 [ 24.806349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.811818] kthread+0x328/0x630 [ 24.815030] ret_from_fork+0x10/0x20 [ 24.818588] [ 24.820067] The buggy address belongs to the object at ffff000800cac060 [ 24.820067] which belongs to the cache kmalloc-16 of size 16 [ 24.832393] The buggy address is located 0 bytes inside of [ 24.832393] freed 16-byte region [ffff000800cac060, ffff000800cac070) [ 24.844370] [ 24.845850] The buggy address belongs to the physical page: [ 24.851406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cac [ 24.859391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.865899] page_type: f5(slab) [ 24.869035] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 24.876754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.884473] page dumped because: kasan: bad access detected [ 24.890029] [ 24.891504] Memory state around the buggy address: [ 24.896287] ffff000800cabf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.903487] ffff000800cabf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.910694] >ffff000800cac000: 00 04 fc fc 00 05 fc fc 00 00 fc fc fa fb fc fc [ 24.917893] ^ [ 24.924234] ffff000800cac080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.931438] ffff000800cac100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.938641] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 24.385729] ================================================================== [ 24.394641] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 24.401321] Write of size 16 at addr ffff000800c2e0a0 by task kunit_try_catch/213 [ 24.408786] [ 24.410272] CPU: 5 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 24.410329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.410345] Hardware name: WinLink E850-96 board (DT) [ 24.410366] Call trace: [ 24.410380] show_stack+0x20/0x38 (C) [ 24.410415] dump_stack_lvl+0x8c/0xd0 [ 24.410448] print_report+0x118/0x608 [ 24.410480] kasan_report+0xdc/0x128 [ 24.410507] __asan_report_store16_noabort+0x20/0x30 [ 24.410541] kmalloc_oob_16+0x3a0/0x3f8 [ 24.410572] kunit_try_run_case+0x170/0x3f0 [ 24.410607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.410646] kthread+0x328/0x630 [ 24.410677] ret_from_fork+0x10/0x20 [ 24.410711] [ 24.472935] Allocated by task 213: [ 24.476322] kasan_save_stack+0x3c/0x68 [ 24.480139] kasan_save_track+0x20/0x40 [ 24.483960] kasan_save_alloc_info+0x40/0x58 [ 24.488212] __kasan_kmalloc+0xd4/0xd8 [ 24.491945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.496459] kmalloc_oob_16+0xb4/0x3f8 [ 24.500191] kunit_try_run_case+0x170/0x3f0 [ 24.504358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.509827] kthread+0x328/0x630 [ 24.513038] ret_from_fork+0x10/0x20 [ 24.516597] [ 24.518076] The buggy address belongs to the object at ffff000800c2e0a0 [ 24.518076] which belongs to the cache kmalloc-16 of size 16 [ 24.530401] The buggy address is located 0 bytes inside of [ 24.530401] allocated 13-byte region [ffff000800c2e0a0, ffff000800c2e0ad) [ 24.542725] [ 24.544204] The buggy address belongs to the physical page: [ 24.549760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 24.557745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.564255] page_type: f5(slab) [ 24.567393] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 24.575110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.582830] page dumped because: kasan: bad access detected [ 24.588384] [ 24.589859] Memory state around the buggy address: [ 24.594640] ffff000800c2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.601843] ffff000800c2e000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.609047] >ffff000800c2e080: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 24.616248] ^ [ 24.620766] ffff000800c2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.627971] ffff000800c2e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.635173] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 23.707591] ================================================================== [ 23.717393] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 23.723988] Read of size 1 at addr ffff000801c37c00 by task kunit_try_catch/211 [ 23.731279] [ 23.732765] CPU: 4 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 23.732815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.732828] Hardware name: WinLink E850-96 board (DT) [ 23.732849] Call trace: [ 23.732862] show_stack+0x20/0x38 (C) [ 23.732893] dump_stack_lvl+0x8c/0xd0 [ 23.732926] print_report+0x118/0x608 [ 23.732956] kasan_report+0xdc/0x128 [ 23.732984] __kasan_check_byte+0x54/0x70 [ 23.733013] krealloc_noprof+0x44/0x360 [ 23.733040] krealloc_uaf+0x180/0x520 [ 23.733070] kunit_try_run_case+0x170/0x3f0 [ 23.733103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.733141] kthread+0x328/0x630 [ 23.733174] ret_from_fork+0x10/0x20 [ 23.733208] [ 23.798120] Allocated by task 211: [ 23.801508] kasan_save_stack+0x3c/0x68 [ 23.805323] kasan_save_track+0x20/0x40 [ 23.809143] kasan_save_alloc_info+0x40/0x58 [ 23.813396] __kasan_kmalloc+0xd4/0xd8 [ 23.817128] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.821642] krealloc_uaf+0xc8/0x520 [ 23.825201] kunit_try_run_case+0x170/0x3f0 [ 23.829368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.834836] kthread+0x328/0x630 [ 23.838048] ret_from_fork+0x10/0x20 [ 23.841607] [ 23.843084] Freed by task 211: [ 23.846121] kasan_save_stack+0x3c/0x68 [ 23.849940] kasan_save_track+0x20/0x40 [ 23.853760] kasan_save_free_info+0x4c/0x78 [ 23.857927] __kasan_slab_free+0x6c/0x98 [ 23.861833] kfree+0x214/0x3c8 [ 23.864871] krealloc_uaf+0x12c/0x520 [ 23.868516] kunit_try_run_case+0x170/0x3f0 [ 23.872683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.878152] kthread+0x328/0x630 [ 23.881364] ret_from_fork+0x10/0x20 [ 23.884923] [ 23.886401] The buggy address belongs to the object at ffff000801c37c00 [ 23.886401] which belongs to the cache kmalloc-256 of size 256 [ 23.898900] The buggy address is located 0 bytes inside of [ 23.898900] freed 256-byte region [ffff000801c37c00, ffff000801c37d00) [ 23.910964] [ 23.912443] The buggy address belongs to the physical page: [ 23.917999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c34 [ 23.925985] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.933623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.940566] page_type: f5(slab) [ 23.943702] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.951421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.959148] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 23.966959] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.974772] head: 0bfffe0000000002 fffffdffe0070d01 00000000ffffffff 00000000ffffffff [ 23.982584] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.990390] page dumped because: kasan: bad access detected [ 23.995945] [ 23.997421] Memory state around the buggy address: [ 24.002202] ffff000801c37b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.009403] ffff000801c37b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.016608] >ffff000801c37c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.023809] ^ [ 24.027024] ffff000801c37c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.034229] ffff000801c37d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.041432] ================================================================== [ 24.048984] ================================================================== [ 24.055848] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 24.062438] Read of size 1 at addr ffff000801c37c00 by task kunit_try_catch/211 [ 24.069729] [ 24.071215] CPU: 2 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 24.071267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.071283] Hardware name: WinLink E850-96 board (DT) [ 24.071307] Call trace: [ 24.071318] show_stack+0x20/0x38 (C) [ 24.071352] dump_stack_lvl+0x8c/0xd0 [ 24.071383] print_report+0x118/0x608 [ 24.071410] kasan_report+0xdc/0x128 [ 24.071436] __asan_report_load1_noabort+0x20/0x30 [ 24.071467] krealloc_uaf+0x4c8/0x520 [ 24.071497] kunit_try_run_case+0x170/0x3f0 [ 24.071535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.071574] kthread+0x328/0x630 [ 24.071609] ret_from_fork+0x10/0x20 [ 24.071643] [ 24.133530] Allocated by task 211: [ 24.136916] kasan_save_stack+0x3c/0x68 [ 24.140735] kasan_save_track+0x20/0x40 [ 24.144554] kasan_save_alloc_info+0x40/0x58 [ 24.148808] __kasan_kmalloc+0xd4/0xd8 [ 24.152540] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.157054] krealloc_uaf+0xc8/0x520 [ 24.160613] kunit_try_run_case+0x170/0x3f0 [ 24.164779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.170248] kthread+0x328/0x630 [ 24.173460] ret_from_fork+0x10/0x20 [ 24.177019] [ 24.178494] Freed by task 211: [ 24.181533] kasan_save_stack+0x3c/0x68 [ 24.185352] kasan_save_track+0x20/0x40 [ 24.189171] kasan_save_free_info+0x4c/0x78 [ 24.193338] __kasan_slab_free+0x6c/0x98 [ 24.197244] kfree+0x214/0x3c8 [ 24.200282] krealloc_uaf+0x12c/0x520 [ 24.203928] kunit_try_run_case+0x170/0x3f0 [ 24.208095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.213564] kthread+0x328/0x630 [ 24.216775] ret_from_fork+0x10/0x20 [ 24.220334] [ 24.221812] The buggy address belongs to the object at ffff000801c37c00 [ 24.221812] which belongs to the cache kmalloc-256 of size 256 [ 24.234310] The buggy address is located 0 bytes inside of [ 24.234310] freed 256-byte region [ffff000801c37c00, ffff000801c37d00) [ 24.246375] [ 24.247853] The buggy address belongs to the physical page: [ 24.253411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c34 [ 24.261394] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.269035] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.275978] page_type: f5(slab) [ 24.279111] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.286833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.294559] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 24.302370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.310184] head: 0bfffe0000000002 fffffdffe0070d01 00000000ffffffff 00000000ffffffff [ 24.317996] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.325801] page dumped because: kasan: bad access detected [ 24.331357] [ 24.332832] Memory state around the buggy address: [ 24.337613] ffff000801c37b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.344815] ffff000801c37b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.352020] >ffff000801c37c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.359221] ^ [ 24.362436] ffff000801c37c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.369641] ffff000801c37d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.376842] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 22.781909] ================================================================== [ 22.789020] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 22.796571] Write of size 1 at addr ffff0008032360d0 by task kunit_try_catch/209 [ 22.803949] [ 22.805432] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 22.805479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.805496] Hardware name: WinLink E850-96 board (DT) [ 22.805517] Call trace: [ 22.805528] show_stack+0x20/0x38 (C) [ 22.805559] dump_stack_lvl+0x8c/0xd0 [ 22.805592] print_report+0x118/0x608 [ 22.805620] kasan_report+0xdc/0x128 [ 22.805645] __asan_report_store1_noabort+0x20/0x30 [ 22.805678] krealloc_less_oob_helper+0xb9c/0xc50 [ 22.805712] krealloc_large_less_oob+0x20/0x38 [ 22.805748] kunit_try_run_case+0x170/0x3f0 [ 22.805784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.805821] kthread+0x328/0x630 [ 22.805855] ret_from_fork+0x10/0x20 [ 22.805890] [ 22.873306] The buggy address belongs to the physical page: [ 22.878865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234 [ 22.886850] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.894489] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.901430] page_type: f8(unknown) [ 22.904825] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.912548] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.920274] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.928085] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.935899] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff [ 22.943711] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.951516] page dumped because: kasan: bad access detected [ 22.957072] [ 22.958547] Memory state around the buggy address: [ 22.963327] ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.970530] ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.977735] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.984936] ^ [ 22.990755] ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.997960] ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.005162] ================================================================== [ 21.466255] ================================================================== [ 21.473245] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 21.480792] Write of size 1 at addr ffff0008030fcaea by task kunit_try_catch/205 [ 21.488170] [ 21.489655] CPU: 2 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 21.489706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.489722] Hardware name: WinLink E850-96 board (DT) [ 21.489742] Call trace: [ 21.489754] show_stack+0x20/0x38 (C) [ 21.489787] dump_stack_lvl+0x8c/0xd0 [ 21.489821] print_report+0x118/0x608 [ 21.489848] kasan_report+0xdc/0x128 [ 21.489875] __asan_report_store1_noabort+0x20/0x30 [ 21.489907] krealloc_less_oob_helper+0xae4/0xc50 [ 21.489941] krealloc_less_oob+0x20/0x38 [ 21.489973] kunit_try_run_case+0x170/0x3f0 [ 21.490009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.490044] kthread+0x328/0x630 [ 21.490078] ret_from_fork+0x10/0x20 [ 21.490111] [ 21.557006] Allocated by task 205: [ 21.560394] kasan_save_stack+0x3c/0x68 [ 21.564211] kasan_save_track+0x20/0x40 [ 21.568030] kasan_save_alloc_info+0x40/0x58 [ 21.572284] __kasan_krealloc+0x118/0x178 [ 21.576276] krealloc_noprof+0x128/0x360 [ 21.580183] krealloc_less_oob_helper+0x168/0xc50 [ 21.584872] krealloc_less_oob+0x20/0x38 [ 21.588777] kunit_try_run_case+0x170/0x3f0 [ 21.592943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.598412] kthread+0x328/0x630 [ 21.601624] ret_from_fork+0x10/0x20 [ 21.605183] [ 21.606658] The buggy address belongs to the object at ffff0008030fca00 [ 21.606658] which belongs to the cache kmalloc-256 of size 256 [ 21.619160] The buggy address is located 33 bytes to the right of [ 21.619160] allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9) [ 21.632179] [ 21.633656] The buggy address belongs to the physical page: [ 21.639214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 21.647198] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.654835] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.661779] page_type: f5(slab) [ 21.664913] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.672636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.680362] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.688174] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.695987] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 21.703799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.711604] page dumped because: kasan: bad access detected [ 21.717160] [ 21.718634] Memory state around the buggy address: [ 21.723414] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.730618] ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.737823] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.745024] ^ [ 21.751625] ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.758829] ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.766031] ================================================================== [ 21.159529] ================================================================== [ 21.166567] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 21.174115] Write of size 1 at addr ffff0008030fcada by task kunit_try_catch/205 [ 21.181491] [ 21.182977] CPU: 2 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 21.183032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.183047] Hardware name: WinLink E850-96 board (DT) [ 21.183069] Call trace: [ 21.183081] show_stack+0x20/0x38 (C) [ 21.183115] dump_stack_lvl+0x8c/0xd0 [ 21.183147] print_report+0x118/0x608 [ 21.183175] kasan_report+0xdc/0x128 [ 21.183201] __asan_report_store1_noabort+0x20/0x30 [ 21.183231] krealloc_less_oob_helper+0xa80/0xc50 [ 21.183264] krealloc_less_oob+0x20/0x38 [ 21.183297] kunit_try_run_case+0x170/0x3f0 [ 21.183334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.183372] kthread+0x328/0x630 [ 21.183405] ret_from_fork+0x10/0x20 [ 21.183440] [ 21.250326] Allocated by task 205: [ 21.253715] kasan_save_stack+0x3c/0x68 [ 21.257531] kasan_save_track+0x20/0x40 [ 21.261351] kasan_save_alloc_info+0x40/0x58 [ 21.265604] __kasan_krealloc+0x118/0x178 [ 21.269597] krealloc_noprof+0x128/0x360 [ 21.273503] krealloc_less_oob_helper+0x168/0xc50 [ 21.278192] krealloc_less_oob+0x20/0x38 [ 21.282097] kunit_try_run_case+0x170/0x3f0 [ 21.286264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.291732] kthread+0x328/0x630 [ 21.294944] ret_from_fork+0x10/0x20 [ 21.298503] [ 21.299981] The buggy address belongs to the object at ffff0008030fca00 [ 21.299981] which belongs to the cache kmalloc-256 of size 256 [ 21.312480] The buggy address is located 17 bytes to the right of [ 21.312480] allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9) [ 21.325499] [ 21.326977] The buggy address belongs to the physical page: [ 21.332535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 21.340519] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.348157] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.355101] page_type: f5(slab) [ 21.358235] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.365956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.373683] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.381494] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.389307] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 21.397119] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.404925] page dumped because: kasan: bad access detected [ 21.410480] [ 21.411956] Memory state around the buggy address: [ 21.416736] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.423939] ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.431143] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.438345] ^ [ 21.444424] ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.451629] ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.458831] ================================================================== [ 20.544885] ================================================================== [ 20.554163] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 20.561709] Write of size 1 at addr ffff0008030fcac9 by task kunit_try_catch/205 [ 20.569087] [ 20.570572] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 20.570621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.570637] Hardware name: WinLink E850-96 board (DT) [ 20.570659] Call trace: [ 20.570670] show_stack+0x20/0x38 (C) [ 20.570706] dump_stack_lvl+0x8c/0xd0 [ 20.570742] print_report+0x118/0x608 [ 20.570772] kasan_report+0xdc/0x128 [ 20.570801] __asan_report_store1_noabort+0x20/0x30 [ 20.570836] krealloc_less_oob_helper+0xa48/0xc50 [ 20.570870] krealloc_less_oob+0x20/0x38 [ 20.570900] kunit_try_run_case+0x170/0x3f0 [ 20.570935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.570971] kthread+0x328/0x630 [ 20.571006] ret_from_fork+0x10/0x20 [ 20.571041] [ 20.637924] Allocated by task 205: [ 20.641311] kasan_save_stack+0x3c/0x68 [ 20.645128] kasan_save_track+0x20/0x40 [ 20.648947] kasan_save_alloc_info+0x40/0x58 [ 20.653201] __kasan_krealloc+0x118/0x178 [ 20.657193] krealloc_noprof+0x128/0x360 [ 20.661099] krealloc_less_oob_helper+0x168/0xc50 [ 20.665786] krealloc_less_oob+0x20/0x38 [ 20.669693] kunit_try_run_case+0x170/0x3f0 [ 20.673860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.679328] kthread+0x328/0x630 [ 20.682540] ret_from_fork+0x10/0x20 [ 20.686099] [ 20.687577] The buggy address belongs to the object at ffff0008030fca00 [ 20.687577] which belongs to the cache kmalloc-256 of size 256 [ 20.700076] The buggy address is located 0 bytes to the right of [ 20.700076] allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9) [ 20.713008] [ 20.714487] The buggy address belongs to the physical page: [ 20.720044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 20.728029] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.735668] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.742610] page_type: f5(slab) [ 20.745748] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.753466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.761192] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.769003] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.776817] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 20.784628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.792434] page dumped because: kasan: bad access detected [ 20.797989] [ 20.799465] Memory state around the buggy address: [ 20.804247] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.811448] ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.818654] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.825853] ^ [ 20.831413] ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.838618] ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.845820] ================================================================== [ 22.548747] ================================================================== [ 22.558729] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 22.566281] Write of size 1 at addr ffff0008032360c9 by task kunit_try_catch/209 [ 22.573657] [ 22.575142] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 22.575195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.575211] Hardware name: WinLink E850-96 board (DT) [ 22.575234] Call trace: [ 22.575250] show_stack+0x20/0x38 (C) [ 22.575282] dump_stack_lvl+0x8c/0xd0 [ 22.575314] print_report+0x118/0x608 [ 22.575343] kasan_report+0xdc/0x128 [ 22.575370] __asan_report_store1_noabort+0x20/0x30 [ 22.575403] krealloc_less_oob_helper+0xa48/0xc50 [ 22.575442] krealloc_large_less_oob+0x20/0x38 [ 22.575475] kunit_try_run_case+0x170/0x3f0 [ 22.575514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.575553] kthread+0x328/0x630 [ 22.575589] ret_from_fork+0x10/0x20 [ 22.575623] [ 22.643017] The buggy address belongs to the physical page: [ 22.648573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234 [ 22.656559] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.664198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.671139] page_type: f8(unknown) [ 22.674536] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.682256] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.689982] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.697794] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.705607] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff [ 22.713419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.721224] page dumped because: kasan: bad access detected [ 22.726780] [ 22.728255] Memory state around the buggy address: [ 22.733035] ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.740238] ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.747443] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.754644] ^ [ 22.760203] ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.767408] ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.774611] ================================================================== [ 23.474648] ================================================================== [ 23.481720] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.489272] Write of size 1 at addr ffff0008032360eb by task kunit_try_catch/209 [ 23.496648] [ 23.498131] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 23.498181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.498196] Hardware name: WinLink E850-96 board (DT) [ 23.498215] Call trace: [ 23.498229] show_stack+0x20/0x38 (C) [ 23.498262] dump_stack_lvl+0x8c/0xd0 [ 23.498295] print_report+0x118/0x608 [ 23.498325] kasan_report+0xdc/0x128 [ 23.498351] __asan_report_store1_noabort+0x20/0x30 [ 23.498385] krealloc_less_oob_helper+0xa58/0xc50 [ 23.498423] krealloc_large_less_oob+0x20/0x38 [ 23.498459] kunit_try_run_case+0x170/0x3f0 [ 23.498494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.498534] kthread+0x328/0x630 [ 23.498567] ret_from_fork+0x10/0x20 [ 23.498600] [ 23.566007] The buggy address belongs to the physical page: [ 23.571563] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234 [ 23.579545] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.587186] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.594128] page_type: f8(unknown) [ 23.597524] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.605246] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.612971] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.620783] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.628597] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff [ 23.636409] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.644214] page dumped because: kasan: bad access detected [ 23.649771] [ 23.651245] Memory state around the buggy address: [ 23.656025] ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.663228] ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.670432] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.677634] ^ [ 23.684235] ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.691440] ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.698642] ================================================================== [ 23.012480] ================================================================== [ 23.019575] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.027125] Write of size 1 at addr ffff0008032360da by task kunit_try_catch/209 [ 23.034501] [ 23.035985] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 23.036031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.036046] Hardware name: WinLink E850-96 board (DT) [ 23.036066] Call trace: [ 23.036077] show_stack+0x20/0x38 (C) [ 23.036109] dump_stack_lvl+0x8c/0xd0 [ 23.036140] print_report+0x118/0x608 [ 23.036167] kasan_report+0xdc/0x128 [ 23.036195] __asan_report_store1_noabort+0x20/0x30 [ 23.036231] krealloc_less_oob_helper+0xa80/0xc50 [ 23.036266] krealloc_large_less_oob+0x20/0x38 [ 23.036303] kunit_try_run_case+0x170/0x3f0 [ 23.036338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.036376] kthread+0x328/0x630 [ 23.036410] ret_from_fork+0x10/0x20 [ 23.036444] [ 23.103859] The buggy address belongs to the physical page: [ 23.109416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234 [ 23.117401] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.125038] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.131983] page_type: f8(unknown) [ 23.135378] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.143100] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.150826] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.158637] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.166451] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff [ 23.174263] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.182068] page dumped because: kasan: bad access detected [ 23.187624] [ 23.189100] Memory state around the buggy address: [ 23.193879] ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.201083] ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.208287] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.215488] ^ [ 23.221568] ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.228773] ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.235974] ================================================================== [ 21.773353] ================================================================== [ 21.780443] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 21.787992] Write of size 1 at addr ffff0008030fcaeb by task kunit_try_catch/205 [ 21.795371] [ 21.796856] CPU: 2 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 21.796902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.796917] Hardware name: WinLink E850-96 board (DT) [ 21.796935] Call trace: [ 21.796946] show_stack+0x20/0x38 (C) [ 21.796978] dump_stack_lvl+0x8c/0xd0 [ 21.797011] print_report+0x118/0x608 [ 21.797042] kasan_report+0xdc/0x128 [ 21.797068] __asan_report_store1_noabort+0x20/0x30 [ 21.797100] krealloc_less_oob_helper+0xa58/0xc50 [ 21.797136] krealloc_less_oob+0x20/0x38 [ 21.797167] kunit_try_run_case+0x170/0x3f0 [ 21.797202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.797241] kthread+0x328/0x630 [ 21.797272] ret_from_fork+0x10/0x20 [ 21.797305] [ 21.864206] Allocated by task 205: [ 21.867593] kasan_save_stack+0x3c/0x68 [ 21.871411] kasan_save_track+0x20/0x40 [ 21.875231] kasan_save_alloc_info+0x40/0x58 [ 21.879484] __kasan_krealloc+0x118/0x178 [ 21.883477] krealloc_noprof+0x128/0x360 [ 21.887383] krealloc_less_oob_helper+0x168/0xc50 [ 21.892072] krealloc_less_oob+0x20/0x38 [ 21.895977] kunit_try_run_case+0x170/0x3f0 [ 21.900143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.905612] kthread+0x328/0x630 [ 21.908824] ret_from_fork+0x10/0x20 [ 21.912382] [ 21.913859] The buggy address belongs to the object at ffff0008030fca00 [ 21.913859] which belongs to the cache kmalloc-256 of size 256 [ 21.926360] The buggy address is located 34 bytes to the right of [ 21.926360] allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9) [ 21.939379] [ 21.940855] The buggy address belongs to the physical page: [ 21.946413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 21.954397] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.962035] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.968979] page_type: f5(slab) [ 21.972114] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.979836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.987563] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.995374] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.003187] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 22.010999] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.018805] page dumped because: kasan: bad access detected [ 22.024360] [ 22.025836] Memory state around the buggy address: [ 22.030616] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.037818] ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.045023] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 22.052224] ^ [ 22.058825] ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.066030] ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.073232] ================================================================== [ 23.243259] ================================================================== [ 23.250386] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.257936] Write of size 1 at addr ffff0008032360ea by task kunit_try_catch/209 [ 23.265314] [ 23.266796] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 23.266841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.266857] Hardware name: WinLink E850-96 board (DT) [ 23.266873] Call trace: [ 23.266882] show_stack+0x20/0x38 (C) [ 23.266914] dump_stack_lvl+0x8c/0xd0 [ 23.266944] print_report+0x118/0x608 [ 23.266972] kasan_report+0xdc/0x128 [ 23.267000] __asan_report_store1_noabort+0x20/0x30 [ 23.267033] krealloc_less_oob_helper+0xae4/0xc50 [ 23.267068] krealloc_large_less_oob+0x20/0x38 [ 23.267101] kunit_try_run_case+0x170/0x3f0 [ 23.267134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.267173] kthread+0x328/0x630 [ 23.267205] ret_from_fork+0x10/0x20 [ 23.267237] [ 23.334671] The buggy address belongs to the physical page: [ 23.340228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234 [ 23.348212] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.355850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.362795] page_type: f8(unknown) [ 23.366189] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.373912] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.381638] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.389450] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.397263] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff [ 23.405075] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.412881] page dumped because: kasan: bad access detected [ 23.418437] [ 23.419912] Memory state around the buggy address: [ 23.424690] ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.431895] ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.439100] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.446301] ^ [ 23.452901] ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.460106] ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.467307] ================================================================== [ 20.853212] ================================================================== [ 20.860234] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 20.867780] Write of size 1 at addr ffff0008030fcad0 by task kunit_try_catch/205 [ 20.875159] [ 20.876644] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 20.876690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.876705] Hardware name: WinLink E850-96 board (DT) [ 20.876724] Call trace: [ 20.876738] show_stack+0x20/0x38 (C) [ 20.876772] dump_stack_lvl+0x8c/0xd0 [ 20.876804] print_report+0x118/0x608 [ 20.876830] kasan_report+0xdc/0x128 [ 20.876857] __asan_report_store1_noabort+0x20/0x30 [ 20.876888] krealloc_less_oob_helper+0xb9c/0xc50 [ 20.876922] krealloc_less_oob+0x20/0x38 [ 20.876953] kunit_try_run_case+0x170/0x3f0 [ 20.876989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.877025] kthread+0x328/0x630 [ 20.877059] ret_from_fork+0x10/0x20 [ 20.877091] [ 20.943994] Allocated by task 205: [ 20.947381] kasan_save_stack+0x3c/0x68 [ 20.951199] kasan_save_track+0x20/0x40 [ 20.955018] kasan_save_alloc_info+0x40/0x58 [ 20.959272] __kasan_krealloc+0x118/0x178 [ 20.963265] krealloc_noprof+0x128/0x360 [ 20.967171] krealloc_less_oob_helper+0x168/0xc50 [ 20.971860] krealloc_less_oob+0x20/0x38 [ 20.975765] kunit_try_run_case+0x170/0x3f0 [ 20.979932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.985400] kthread+0x328/0x630 [ 20.988612] ret_from_fork+0x10/0x20 [ 20.992171] [ 20.993648] The buggy address belongs to the object at ffff0008030fca00 [ 20.993648] which belongs to the cache kmalloc-256 of size 256 [ 21.006148] The buggy address is located 7 bytes to the right of [ 21.006148] allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9) [ 21.019080] [ 21.020559] The buggy address belongs to the physical page: [ 21.026115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 21.034100] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.041739] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.048682] page_type: f5(slab) [ 21.051816] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.059537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.067264] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 21.075075] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.082888] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 21.090700] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.098506] page dumped because: kasan: bad access detected [ 21.104061] [ 21.105537] Memory state around the buggy address: [ 21.110319] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.117520] ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.124725] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 21.131926] ^ [ 21.137745] ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.144950] ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.152151] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 22.315679] ================================================================== [ 22.322798] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 22.330346] Write of size 1 at addr ffff0008031fe0f0 by task kunit_try_catch/207 [ 22.337724] [ 22.339206] CPU: 5 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 22.339256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.339272] Hardware name: WinLink E850-96 board (DT) [ 22.339287] Call trace: [ 22.339300] show_stack+0x20/0x38 (C) [ 22.339329] dump_stack_lvl+0x8c/0xd0 [ 22.339361] print_report+0x118/0x608 [ 22.339393] kasan_report+0xdc/0x128 [ 22.339419] __asan_report_store1_noabort+0x20/0x30 [ 22.339451] krealloc_more_oob_helper+0x5c0/0x678 [ 22.339486] krealloc_large_more_oob+0x20/0x38 [ 22.339518] kunit_try_run_case+0x170/0x3f0 [ 22.339553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.339591] kthread+0x328/0x630 [ 22.339622] ret_from_fork+0x10/0x20 [ 22.339653] [ 22.407080] The buggy address belongs to the physical page: [ 22.412638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831fc [ 22.420623] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.428262] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.435205] page_type: f8(unknown) [ 22.438598] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.446322] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.454048] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.461860] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.469673] head: 0bfffe0000000002 fffffdffe00c7f01 00000000ffffffff 00000000ffffffff [ 22.477485] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.485291] page dumped because: kasan: bad access detected [ 22.490846] [ 22.492322] Memory state around the buggy address: [ 22.497101] ffff0008031fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.504305] ffff0008031fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.511509] >ffff0008031fe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 22.518710] ^ [ 22.525571] ffff0008031fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.532776] ffff0008031fe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.539977] ================================================================== [ 19.926730] ================================================================== [ 19.935854] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.943403] Write of size 1 at addr ffff0008030fc8eb by task kunit_try_catch/203 [ 19.950780] [ 19.952266] CPU: 5 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 19.952319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.952333] Hardware name: WinLink E850-96 board (DT) [ 19.952352] Call trace: [ 19.952364] show_stack+0x20/0x38 (C) [ 19.952400] dump_stack_lvl+0x8c/0xd0 [ 19.952440] print_report+0x118/0x608 [ 19.952471] kasan_report+0xdc/0x128 [ 19.952497] __asan_report_store1_noabort+0x20/0x30 [ 19.952531] krealloc_more_oob_helper+0x60c/0x678 [ 19.952565] krealloc_more_oob+0x20/0x38 [ 19.952596] kunit_try_run_case+0x170/0x3f0 [ 19.952631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.952668] kthread+0x328/0x630 [ 19.952701] ret_from_fork+0x10/0x20 [ 19.952736] [ 20.019617] Allocated by task 203: [ 20.023005] kasan_save_stack+0x3c/0x68 [ 20.026821] kasan_save_track+0x20/0x40 [ 20.030640] kasan_save_alloc_info+0x40/0x58 [ 20.034894] __kasan_krealloc+0x118/0x178 [ 20.038887] krealloc_noprof+0x128/0x360 [ 20.042793] krealloc_more_oob_helper+0x168/0x678 [ 20.047482] krealloc_more_oob+0x20/0x38 [ 20.051386] kunit_try_run_case+0x170/0x3f0 [ 20.055553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.061021] kthread+0x328/0x630 [ 20.064233] ret_from_fork+0x10/0x20 [ 20.067792] [ 20.069271] The buggy address belongs to the object at ffff0008030fc800 [ 20.069271] which belongs to the cache kmalloc-256 of size 256 [ 20.081770] The buggy address is located 0 bytes to the right of [ 20.081770] allocated 235-byte region [ffff0008030fc800, ffff0008030fc8eb) [ 20.094701] [ 20.096181] The buggy address belongs to the physical page: [ 20.101738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 20.109722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.117360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.124304] page_type: f5(slab) [ 20.127440] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.135159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.142886] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.150697] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.158510] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 20.166322] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.174127] page dumped because: kasan: bad access detected [ 20.179684] [ 20.181160] Memory state around the buggy address: [ 20.185940] ffff0008030fc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.193141] ffff0008030fc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.200347] >ffff0008030fc880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 20.207547] ^ [ 20.214148] ffff0008030fc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.221353] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.228555] ================================================================== [ 22.082075] ================================================================== [ 22.091464] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 22.099014] Write of size 1 at addr ffff0008031fe0eb by task kunit_try_catch/207 [ 22.106391] [ 22.107876] CPU: 5 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 22.107926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.107941] Hardware name: WinLink E850-96 board (DT) [ 22.107961] Call trace: [ 22.107976] show_stack+0x20/0x38 (C) [ 22.108012] dump_stack_lvl+0x8c/0xd0 [ 22.108045] print_report+0x118/0x608 [ 22.108076] kasan_report+0xdc/0x128 [ 22.108104] __asan_report_store1_noabort+0x20/0x30 [ 22.108139] krealloc_more_oob_helper+0x60c/0x678 [ 22.108175] krealloc_large_more_oob+0x20/0x38 [ 22.108207] kunit_try_run_case+0x170/0x3f0 [ 22.108244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.108284] kthread+0x328/0x630 [ 22.108322] ret_from_fork+0x10/0x20 [ 22.108356] [ 22.175750] The buggy address belongs to the physical page: [ 22.181306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831fc [ 22.189292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.196931] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.203873] page_type: f8(unknown) [ 22.207267] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.214989] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.222715] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.230527] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.238339] head: 0bfffe0000000002 fffffdffe00c7f01 00000000ffffffff 00000000ffffffff [ 22.246151] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.253957] page dumped because: kasan: bad access detected [ 22.259514] [ 22.260990] Memory state around the buggy address: [ 22.265768] ffff0008031fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.272972] ffff0008031fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.280176] >ffff0008031fe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 22.287377] ^ [ 22.293978] ffff0008031fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.301183] ffff0008031fe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.308385] ================================================================== [ 20.236014] ================================================================== [ 20.242969] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 20.250515] Write of size 1 at addr ffff0008030fc8f0 by task kunit_try_catch/203 [ 20.257894] [ 20.259378] CPU: 5 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 20.259432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.259447] Hardware name: WinLink E850-96 board (DT) [ 20.259467] Call trace: [ 20.259479] show_stack+0x20/0x38 (C) [ 20.259512] dump_stack_lvl+0x8c/0xd0 [ 20.259543] print_report+0x118/0x608 [ 20.259570] kasan_report+0xdc/0x128 [ 20.259599] __asan_report_store1_noabort+0x20/0x30 [ 20.259633] krealloc_more_oob_helper+0x5c0/0x678 [ 20.259666] krealloc_more_oob+0x20/0x38 [ 20.259698] kunit_try_run_case+0x170/0x3f0 [ 20.259732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.259768] kthread+0x328/0x630 [ 20.259800] ret_from_fork+0x10/0x20 [ 20.259830] [ 20.326731] Allocated by task 203: [ 20.330115] kasan_save_stack+0x3c/0x68 [ 20.333934] kasan_save_track+0x20/0x40 [ 20.337754] kasan_save_alloc_info+0x40/0x58 [ 20.342007] __kasan_krealloc+0x118/0x178 [ 20.346000] krealloc_noprof+0x128/0x360 [ 20.349906] krealloc_more_oob_helper+0x168/0x678 [ 20.354595] krealloc_more_oob+0x20/0x38 [ 20.358500] kunit_try_run_case+0x170/0x3f0 [ 20.362667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.368135] kthread+0x328/0x630 [ 20.371347] ret_from_fork+0x10/0x20 [ 20.374906] [ 20.376383] The buggy address belongs to the object at ffff0008030fc800 [ 20.376383] which belongs to the cache kmalloc-256 of size 256 [ 20.388883] The buggy address is located 5 bytes to the right of [ 20.388883] allocated 235-byte region [ffff0008030fc800, ffff0008030fc8eb) [ 20.401815] [ 20.403292] The buggy address belongs to the physical page: [ 20.408848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 20.416834] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.424473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.431417] page_type: f5(slab) [ 20.434549] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.442272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.449999] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 20.457810] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.465623] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 20.473435] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.481241] page dumped because: kasan: bad access detected [ 20.486798] [ 20.488272] Memory state around the buggy address: [ 20.493052] ffff0008030fc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.500255] ffff0008030fc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.507460] >ffff0008030fc880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 20.514661] ^ [ 20.521521] ffff0008030fc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.528726] ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.535928] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 19.500953] ================================================================== [ 19.510253] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 19.515633] Free of addr ffff0008031f8001 by task kunit_try_catch/197 [ 19.522054] [ 19.523540] CPU: 5 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 19.523596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.523612] Hardware name: WinLink E850-96 board (DT) [ 19.523633] Call trace: [ 19.523648] show_stack+0x20/0x38 (C) [ 19.523681] dump_stack_lvl+0x8c/0xd0 [ 19.523714] print_report+0x118/0x608 [ 19.523745] kasan_report_invalid_free+0xc0/0xe8 [ 19.523776] __kasan_kfree_large+0x5c/0xa8 [ 19.523807] free_large_kmalloc+0x64/0x190 [ 19.523840] kfree+0x270/0x3c8 [ 19.523870] kmalloc_large_invalid_free+0x108/0x270 [ 19.523906] kunit_try_run_case+0x170/0x3f0 [ 19.523940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.523980] kthread+0x328/0x630 [ 19.524015] ret_from_fork+0x10/0x20 [ 19.524052] [ 19.594539] The buggy address belongs to the physical page: [ 19.600097] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831f8 [ 19.608081] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.615718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.622660] page_type: f8(unknown) [ 19.626060] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.633777] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.641504] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.649315] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.657128] head: 0bfffe0000000002 fffffdffe00c7e01 00000000ffffffff 00000000ffffffff [ 19.664941] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.672746] page dumped because: kasan: bad access detected [ 19.678301] [ 19.679778] Memory state around the buggy address: [ 19.684559] ffff0008031f7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.691760] ffff0008031f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.698966] >ffff0008031f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.706166] ^ [ 19.709381] ffff0008031f8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.716586] ffff0008031f8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.723790] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 19.317473] ================================================================== [ 19.327446] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 19.334039] Read of size 1 at addr ffff000803264000 by task kunit_try_catch/195 [ 19.341328] [ 19.342816] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 19.342870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.342885] Hardware name: WinLink E850-96 board (DT) [ 19.342906] Call trace: [ 19.342922] show_stack+0x20/0x38 (C) [ 19.342959] dump_stack_lvl+0x8c/0xd0 [ 19.342994] print_report+0x118/0x608 [ 19.343024] kasan_report+0xdc/0x128 [ 19.343051] __asan_report_load1_noabort+0x20/0x30 [ 19.343085] kmalloc_large_uaf+0x2cc/0x2f8 [ 19.343115] kunit_try_run_case+0x170/0x3f0 [ 19.343154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.343193] kthread+0x328/0x630 [ 19.343226] ret_from_fork+0x10/0x20 [ 19.343260] [ 19.405567] The buggy address belongs to the physical page: [ 19.411122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883264 [ 19.419107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.425629] raw: 0bfffe0000000000 fffffdffe00c9a08 ffff00085b03f040 0000000000000000 [ 19.433346] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 19.441065] page dumped because: kasan: bad access detected [ 19.446622] [ 19.448098] Memory state around the buggy address: [ 19.452877] ffff000803263f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.460079] ffff000803263f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.467284] >ffff000803264000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.474485] ^ [ 19.477701] ffff000803264080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.484905] ffff000803264100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.492108] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 19.090022] ================================================================== [ 19.099585] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 19.107048] Write of size 1 at addr ffff0008031fa00a by task kunit_try_catch/193 [ 19.114421] [ 19.115907] CPU: 5 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 19.115958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.115974] Hardware name: WinLink E850-96 board (DT) [ 19.115995] Call trace: [ 19.116007] show_stack+0x20/0x38 (C) [ 19.116040] dump_stack_lvl+0x8c/0xd0 [ 19.116076] print_report+0x118/0x608 [ 19.116107] kasan_report+0xdc/0x128 [ 19.116135] __asan_report_store1_noabort+0x20/0x30 [ 19.116169] kmalloc_large_oob_right+0x278/0x2b8 [ 19.116203] kunit_try_run_case+0x170/0x3f0 [ 19.116238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.116276] kthread+0x328/0x630 [ 19.116312] ret_from_fork+0x10/0x20 [ 19.116346] [ 19.179267] The buggy address belongs to the physical page: [ 19.184824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831f8 [ 19.192809] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.200448] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.207390] page_type: f8(unknown) [ 19.210785] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.218506] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.226232] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.234043] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.241857] head: 0bfffe0000000002 fffffdffe00c7e01 00000000ffffffff 00000000ffffffff [ 19.249669] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.257475] page dumped because: kasan: bad access detected [ 19.263031] [ 19.264507] Memory state around the buggy address: [ 19.269286] ffff0008031f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.276488] ffff0008031f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.283693] >ffff0008031fa000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.290894] ^ [ 19.294370] ffff0008031fa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.301575] ffff0008031fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.308777] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 18.789078] ================================================================== [ 18.800028] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 18.807310] Write of size 1 at addr ffff00080270df00 by task kunit_try_catch/191 [ 18.814686] [ 18.816172] CPU: 7 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 18.816225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.816240] Hardware name: WinLink E850-96 board (DT) [ 18.816261] Call trace: [ 18.816274] show_stack+0x20/0x38 (C) [ 18.816309] dump_stack_lvl+0x8c/0xd0 [ 18.816344] print_report+0x118/0x608 [ 18.816374] kasan_report+0xdc/0x128 [ 18.816401] __asan_report_store1_noabort+0x20/0x30 [ 18.816438] kmalloc_big_oob_right+0x2a4/0x2f0 [ 18.816470] kunit_try_run_case+0x170/0x3f0 [ 18.816505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.816542] kthread+0x328/0x630 [ 18.816578] ret_from_fork+0x10/0x20 [ 18.816614] [ 18.879357] Allocated by task 191: [ 18.882743] kasan_save_stack+0x3c/0x68 [ 18.886560] kasan_save_track+0x20/0x40 [ 18.890380] kasan_save_alloc_info+0x40/0x58 [ 18.894633] __kasan_kmalloc+0xd4/0xd8 [ 18.898366] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.902879] kmalloc_big_oob_right+0xb8/0x2f0 [ 18.907220] kunit_try_run_case+0x170/0x3f0 [ 18.911386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.916855] kthread+0x328/0x630 [ 18.920066] ret_from_fork+0x10/0x20 [ 18.923625] [ 18.925103] The buggy address belongs to the object at ffff00080270c000 [ 18.925103] which belongs to the cache kmalloc-8k of size 8192 [ 18.937603] The buggy address is located 0 bytes to the right of [ 18.937603] allocated 7936-byte region [ffff00080270c000, ffff00080270df00) [ 18.950622] [ 18.952101] The buggy address belongs to the physical page: [ 18.957657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882708 [ 18.965642] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.973281] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.980224] page_type: f5(slab) [ 18.983362] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 18.991079] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 18.998805] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 19.006616] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 19.014430] head: 0bfffe0000000003 fffffdffe009c201 00000000ffffffff 00000000ffffffff [ 19.022242] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 19.030047] page dumped because: kasan: bad access detected [ 19.035604] [ 19.037080] Memory state around the buggy address: [ 19.041859] ffff00080270de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.049061] ffff00080270de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.056267] >ffff00080270df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.063467] ^ [ 19.066682] ffff00080270df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.073888] ffff00080270e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.081090] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 18.322780] ================================================================== [ 18.332667] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 18.340736] Write of size 1 at addr ffff000802408078 by task kunit_try_catch/189 [ 18.348113] [ 18.349599] CPU: 5 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 18.349657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.349670] Hardware name: WinLink E850-96 board (DT) [ 18.349690] Call trace: [ 18.349700] show_stack+0x20/0x38 (C) [ 18.349734] dump_stack_lvl+0x8c/0xd0 [ 18.349766] print_report+0x118/0x608 [ 18.349795] kasan_report+0xdc/0x128 [ 18.349824] __asan_report_store1_noabort+0x20/0x30 [ 18.349858] kmalloc_track_caller_oob_right+0x40c/0x488 [ 18.349895] kunit_try_run_case+0x170/0x3f0 [ 18.349930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.349967] kthread+0x328/0x630 [ 18.350000] ret_from_fork+0x10/0x20 [ 18.350033] [ 18.413565] Allocated by task 189: [ 18.416952] kasan_save_stack+0x3c/0x68 [ 18.420769] kasan_save_track+0x20/0x40 [ 18.424588] kasan_save_alloc_info+0x40/0x58 [ 18.428841] __kasan_kmalloc+0xd4/0xd8 [ 18.432574] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 18.438130] kmalloc_track_caller_oob_right+0xa8/0x488 [ 18.443251] kunit_try_run_case+0x170/0x3f0 [ 18.447417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.452886] kthread+0x328/0x630 [ 18.456098] ret_from_fork+0x10/0x20 [ 18.459657] [ 18.461135] The buggy address belongs to the object at ffff000802408000 [ 18.461135] which belongs to the cache kmalloc-128 of size 128 [ 18.473634] The buggy address is located 0 bytes to the right of [ 18.473634] allocated 120-byte region [ffff000802408000, ffff000802408078) [ 18.486566] [ 18.488045] The buggy address belongs to the physical page: [ 18.493602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 18.501587] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.509226] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.516168] page_type: f5(slab) [ 18.519306] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 18.527023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.534749] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 18.542563] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.550374] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 18.558186] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.565992] page dumped because: kasan: bad access detected [ 18.571547] [ 18.573023] Memory state around the buggy address: [ 18.577803] ffff000802407f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.585006] ffff000802407f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.592212] >ffff000802408000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.599412] ^ [ 18.606533] ffff000802408080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.613738] ffff000802408100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.620940] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 18.023287] ================================================================== [ 18.032504] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 18.039872] Read of size 1 at addr ffff000806541000 by task kunit_try_catch/187 [ 18.047164] [ 18.048650] CPU: 7 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 18.048703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.048717] Hardware name: WinLink E850-96 board (DT) [ 18.048738] Call trace: [ 18.048752] show_stack+0x20/0x38 (C) [ 18.048788] dump_stack_lvl+0x8c/0xd0 [ 18.048823] print_report+0x118/0x608 [ 18.048854] kasan_report+0xdc/0x128 [ 18.048883] __asan_report_load1_noabort+0x20/0x30 [ 18.048917] kmalloc_node_oob_right+0x2f4/0x330 [ 18.048955] kunit_try_run_case+0x170/0x3f0 [ 18.048991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.049029] kthread+0x328/0x630 [ 18.049065] ret_from_fork+0x10/0x20 [ 18.049099] [ 18.111832] Allocated by task 187: [ 18.115220] kasan_save_stack+0x3c/0x68 [ 18.119038] kasan_save_track+0x20/0x40 [ 18.122856] kasan_save_alloc_info+0x40/0x58 [ 18.127109] __kasan_kmalloc+0xd4/0xd8 [ 18.130842] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 18.135790] kmalloc_node_oob_right+0xbc/0x330 [ 18.140217] kunit_try_run_case+0x170/0x3f0 [ 18.144384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.149854] kthread+0x328/0x630 [ 18.153064] ret_from_fork+0x10/0x20 [ 18.156623] [ 18.158102] The buggy address belongs to the object at ffff000806540000 [ 18.158102] which belongs to the cache kmalloc-4k of size 4096 [ 18.170601] The buggy address is located 0 bytes to the right of [ 18.170601] allocated 4096-byte region [ffff000806540000, ffff000806541000) [ 18.183619] [ 18.185097] The buggy address belongs to the physical page: [ 18.190655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886540 [ 18.198640] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.206279] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.213221] page_type: f5(slab) [ 18.216358] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 18.224077] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.231803] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 18.239614] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 18.247427] head: 0bfffe0000000003 fffffdffe0195001 00000000ffffffff 00000000ffffffff [ 18.255239] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 18.263045] page dumped because: kasan: bad access detected [ 18.268600] [ 18.270078] Memory state around the buggy address: [ 18.274856] ffff000806540f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.282058] ffff000806540f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.289264] >ffff000806541000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.296465] ^ [ 18.299680] ffff000806541080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.306885] ffff000806541100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.314088] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 17.726033] ================================================================== [ 17.735368] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 17.742221] Read of size 1 at addr ffff000800c2e07f by task kunit_try_catch/185 [ 17.749511] [ 17.750997] CPU: 5 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.751049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.751064] Hardware name: WinLink E850-96 board (DT) [ 17.751089] Call trace: [ 17.751106] show_stack+0x20/0x38 (C) [ 17.751139] dump_stack_lvl+0x8c/0xd0 [ 17.751174] print_report+0x118/0x608 [ 17.751205] kasan_report+0xdc/0x128 [ 17.751234] __asan_report_load1_noabort+0x20/0x30 [ 17.751270] kmalloc_oob_left+0x2ec/0x320 [ 17.751301] kunit_try_run_case+0x170/0x3f0 [ 17.751338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.751376] kthread+0x328/0x630 [ 17.751411] ret_from_fork+0x10/0x20 [ 17.751448] [ 17.813661] Allocated by task 56: [ 17.816961] kasan_save_stack+0x3c/0x68 [ 17.820779] kasan_save_track+0x20/0x40 [ 17.824598] kasan_save_alloc_info+0x40/0x58 [ 17.828850] __kasan_kmalloc+0xd4/0xd8 [ 17.832583] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.838138] kstrdup+0x54/0xc8 [ 17.841177] devtmpfs_work_loop+0x6f8/0xa58 [ 17.845343] devtmpfsd+0x50/0x58 [ 17.848555] kthread+0x328/0x630 [ 17.851766] ret_from_fork+0x10/0x20 [ 17.855325] [ 17.856803] Freed by task 56: [ 17.859756] kasan_save_stack+0x3c/0x68 [ 17.863572] kasan_save_track+0x20/0x40 [ 17.867391] kasan_save_free_info+0x4c/0x78 [ 17.871558] __kasan_slab_free+0x6c/0x98 [ 17.875466] kfree+0x214/0x3c8 [ 17.878502] devtmpfs_work_loop+0x804/0xa58 [ 17.882668] devtmpfsd+0x50/0x58 [ 17.885881] kthread+0x328/0x630 [ 17.889092] ret_from_fork+0x10/0x20 [ 17.892651] [ 17.894129] The buggy address belongs to the object at ffff000800c2e060 [ 17.894129] which belongs to the cache kmalloc-16 of size 16 [ 17.906455] The buggy address is located 15 bytes to the right of [ 17.906455] allocated 16-byte region [ffff000800c2e060, ffff000800c2e070) [ 17.919387] [ 17.920865] The buggy address belongs to the physical page: [ 17.926425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 17.934408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.940917] page_type: f5(slab) [ 17.944054] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 17.951771] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.959490] page dumped because: kasan: bad access detected [ 17.965046] [ 17.966522] Memory state around the buggy address: [ 17.971303] ffff000800c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.978504] ffff000800c2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.985712] >ffff000800c2e000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.992912] ^ [ 18.000032] ffff000800c2e080: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.007237] ffff000800c2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.014439] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 17.132065] ================================================================== [ 17.139112] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.146048] Write of size 1 at addr ffff00080243e178 by task kunit_try_catch/183 [ 17.153426] [ 17.154911] CPU: 7 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.154970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.154984] Hardware name: WinLink E850-96 board (DT) [ 17.155004] Call trace: [ 17.155017] show_stack+0x20/0x38 (C) [ 17.155050] dump_stack_lvl+0x8c/0xd0 [ 17.155084] print_report+0x118/0x608 [ 17.155115] kasan_report+0xdc/0x128 [ 17.155142] __asan_report_store1_noabort+0x20/0x30 [ 17.155176] kmalloc_oob_right+0x538/0x660 [ 17.155208] kunit_try_run_case+0x170/0x3f0 [ 17.155241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.155283] kthread+0x328/0x630 [ 17.155315] ret_from_fork+0x10/0x20 [ 17.155350] [ 17.217748] Allocated by task 183: [ 17.221137] kasan_save_stack+0x3c/0x68 [ 17.224953] kasan_save_track+0x20/0x40 [ 17.228772] kasan_save_alloc_info+0x40/0x58 [ 17.233026] __kasan_kmalloc+0xd4/0xd8 [ 17.236758] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.241272] kmalloc_oob_right+0xb0/0x660 [ 17.245265] kunit_try_run_case+0x170/0x3f0 [ 17.249432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.254902] kthread+0x328/0x630 [ 17.258112] ret_from_fork+0x10/0x20 [ 17.261671] [ 17.263150] The buggy address belongs to the object at ffff00080243e100 [ 17.263150] which belongs to the cache kmalloc-128 of size 128 [ 17.275647] The buggy address is located 5 bytes to the right of [ 17.275647] allocated 115-byte region [ffff00080243e100, ffff00080243e173) [ 17.288580] [ 17.290060] The buggy address belongs to the physical page: [ 17.295616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 17.303601] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.311240] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.318182] page_type: f5(slab) [ 17.321316] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.329038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.336764] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.344576] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.352390] head: 0bfffe0000000001 fffffdffe0090f81 00000000ffffffff 00000000ffffffff [ 17.360201] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.368006] page dumped because: kasan: bad access detected [ 17.373562] [ 17.375038] Memory state around the buggy address: [ 17.379817] ffff00080243e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.387021] ffff00080243e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.394225] >ffff00080243e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.401426] ^ [ 17.408547] ffff00080243e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.415752] ffff00080243e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.422954] ================================================================== [ 16.830434] ================================================================== [ 16.837031] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.843972] Write of size 1 at addr ffff00080243e173 by task kunit_try_catch/183 [ 16.851349] [ 16.852836] CPU: 7 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G N 6.15.1-rc1 #1 PREEMPT [ 16.852884] Tainted: [N]=TEST [ 16.852898] Hardware name: WinLink E850-96 board (DT) [ 16.852922] Call trace: [ 16.852936] show_stack+0x20/0x38 (C) [ 16.852973] dump_stack_lvl+0x8c/0xd0 [ 16.853010] print_report+0x118/0x608 [ 16.853046] kasan_report+0xdc/0x128 [ 16.853078] __asan_report_store1_noabort+0x20/0x30 [ 16.853112] kmalloc_oob_right+0x5a4/0x660 [ 16.853144] kunit_try_run_case+0x170/0x3f0 [ 16.853179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.853221] kthread+0x328/0x630 [ 16.853256] ret_from_fork+0x10/0x20 [ 16.853291] [ 16.914455] Allocated by task 183: [ 16.917843] kasan_save_stack+0x3c/0x68 [ 16.921659] kasan_save_track+0x20/0x40 [ 16.925478] kasan_save_alloc_info+0x40/0x58 [ 16.929732] __kasan_kmalloc+0xd4/0xd8 [ 16.933464] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.937978] kmalloc_oob_right+0xb0/0x660 [ 16.941971] kunit_try_run_case+0x170/0x3f0 [ 16.946138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.951608] kthread+0x328/0x630 [ 16.954818] ret_from_fork+0x10/0x20 [ 16.958377] [ 16.959856] The buggy address belongs to the object at ffff00080243e100 [ 16.959856] which belongs to the cache kmalloc-128 of size 128 [ 16.972355] The buggy address is located 0 bytes to the right of [ 16.972355] allocated 115-byte region [ffff00080243e100, ffff00080243e173) [ 16.985286] [ 16.986765] The buggy address belongs to the physical page: [ 16.992323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 17.000307] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.007946] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.014889] page_type: f5(slab) [ 17.018027] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.025744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.033470] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.041282] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.049095] head: 0bfffe0000000001 fffffdffe0090f81 00000000ffffffff 00000000ffffffff [ 17.056907] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.064712] page dumped because: kasan: bad access detected [ 17.070268] [ 17.071743] Memory state around the buggy address: [ 17.076527] ffff00080243e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.083727] ffff00080243e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.090932] >ffff00080243e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.098132] ^ [ 17.104993] ffff00080243e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.112199] ffff00080243e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.119401] ================================================================== [ 17.430257] ================================================================== [ 17.437365] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.444308] Read of size 1 at addr ffff00080243e180 by task kunit_try_catch/183 [ 17.451599] [ 17.453082] CPU: 7 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.453130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.453145] Hardware name: WinLink E850-96 board (DT) [ 17.453166] Call trace: [ 17.453177] show_stack+0x20/0x38 (C) [ 17.453208] dump_stack_lvl+0x8c/0xd0 [ 17.453241] print_report+0x118/0x608 [ 17.453272] kasan_report+0xdc/0x128 [ 17.453300] __asan_report_load1_noabort+0x20/0x30 [ 17.453332] kmalloc_oob_right+0x5d0/0x660 [ 17.453364] kunit_try_run_case+0x170/0x3f0 [ 17.453400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.453437] kthread+0x328/0x630 [ 17.453472] ret_from_fork+0x10/0x20 [ 17.453505] [ 17.515834] Allocated by task 183: [ 17.519222] kasan_save_stack+0x3c/0x68 [ 17.523039] kasan_save_track+0x20/0x40 [ 17.526858] kasan_save_alloc_info+0x40/0x58 [ 17.531112] __kasan_kmalloc+0xd4/0xd8 [ 17.534844] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.539358] kmalloc_oob_right+0xb0/0x660 [ 17.543351] kunit_try_run_case+0x170/0x3f0 [ 17.547517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.552986] kthread+0x328/0x630 [ 17.556198] ret_from_fork+0x10/0x20 [ 17.559757] [ 17.561234] The buggy address belongs to the object at ffff00080243e100 [ 17.561234] which belongs to the cache kmalloc-128 of size 128 [ 17.573733] The buggy address is located 13 bytes to the right of [ 17.573733] allocated 115-byte region [ffff00080243e100, ffff00080243e173) [ 17.586753] [ 17.588229] The buggy address belongs to the physical page: [ 17.593788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 17.601774] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.609411] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.616353] page_type: f5(slab) [ 17.619489] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.627211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.634937] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 17.642748] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.650561] head: 0bfffe0000000001 fffffdffe0090f81 00000000ffffffff 00000000ffffffff [ 17.658374] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.666179] page dumped because: kasan: bad access detected [ 17.671734] [ 17.673210] Memory state around the buggy address: [ 17.677988] ffff00080243e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.685193] ffff00080243e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.692398] >ffff00080243e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.699599] ^ [ 17.702814] ffff00080243e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.710019] ffff00080243e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.717220] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 161.135845] WARNING: CPU: 7 PID: 703 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 161.143307] Modules linked in: [ 161.146354] CPU: 7 UID: 0 PID: 703 Comm: kunit_try_catch Tainted: G B D W N 6.15.1-rc1 #1 PREEMPT [ 161.156250] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 161.162057] Hardware name: WinLink E850-96 board (DT) [ 161.167096] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 161.174035] pc : intlog10+0x38/0x48 [ 161.177505] lr : intlog10_test+0xe4/0x200 [ 161.181498] sp : ffff80008abc7c10 [ 161.184798] x29: ffff80008abc7c90 x28: 0000000000000000 x27: 0000000000000000 [ 161.191915] x26: 1fffe00100466841 x25: 0000000000000000 x24: ffff80008abc7ce0 [ 161.199036] x23: ffff80008abc7d00 x22: 0000000000000000 x21: 1ffff00011578f82 [ 161.206151] x20: ffff800083c24e80 x19: ffff800087ba7990 x18: ffff800087ba7b00 [ 161.213269] x17: 0000000000000001 x16: ffff00085b03af60 x15: ffff8000811f07b8 [ 161.220387] x14: ffff8000808d50ac x13: 1fffe0010b6075d0 x12: ffff700010f37769 [ 161.227505] x11: 1ffff00010f37768 x10: ffff700010f37768 x9 : ffff80008121011c [ 161.234622] x8 : ffff8000879bbb43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 161.241740] x5 : ffff700011578f82 x4 : 1ffff00010f74f3a x3 : 1ffff000107849d0 [ 161.248859] x2 : 1ffff000107849d0 x1 : 0000000000000003 x0 : 0000000000000000 [ 161.255979] Call trace: [ 161.258411] intlog10+0x38/0x48 (P) [ 161.261882] kunit_try_run_case+0x170/0x3f0 [ 161.266046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 161.271515] kthread+0x328/0x630 [ 161.274728] ret_from_fork+0x10/0x20 [ 161.278289] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 160.933417] WARNING: CPU: 1 PID: 685 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 160.940706] Modules linked in: [ 160.943752] CPU: 1 UID: 0 PID: 685 Comm: kunit_try_catch Tainted: G B D N 6.15.1-rc1 #1 PREEMPT [ 160.953648] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 160.958585] Hardware name: WinLink E850-96 board (DT) [ 160.963625] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 160.970564] pc : intlog2+0xd8/0xf8 [ 160.973950] lr : intlog2_test+0xe4/0x200 [ 160.977856] sp : ffff80008aaa7c10 [ 160.981155] x29: ffff80008aaa7c90 x28: 0000000000000000 x27: 0000000000000000 [ 160.988272] x26: 1fffe00100380be1 x25: 0000000000000000 x24: ffff80008aaa7ce0 [ 160.995390] x23: ffff80008aaa7d00 x22: 0000000000000000 x21: 1ffff00011554f82 [ 161.002508] x20: ffff800083c24d80 x19: ffff800087ba7990 x18: 000000004d8b5b7f [ 161.009626] x17: 0000000000000001 x16: ffff00085af6ef60 x15: 0000000000000000 [ 161.016744] x14: 00000000f1f1f1f1 x13: 1fffe0010b5eddd0 x12: ffff700010f37769 [ 161.023862] x11: 1ffff00010f37768 x10: ffff700010f37768 x9 : ffff80008121031c [ 161.030980] x8 : ffff8000879bbb43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 161.038098] x5 : ffff700011554f82 x4 : 1ffff00010f74f3a x3 : 1ffff000107849b0 [ 161.045216] x2 : 1ffff000107849b0 x1 : 0000000000000003 x0 : 0000000000000000 [ 161.052337] Call trace: [ 161.054769] intlog2+0xd8/0xf8 (P) [ 161.058153] kunit_try_run_case+0x170/0x3f0 [ 161.062317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 161.067787] kthread+0x328/0x630 [ 161.070998] ret_from_fork+0x10/0x20 [ 161.074559] ---[ end trace 0000000000000000 ]---
Failure - lava - job
(no logs available)
Failure - lava - fastboot-boot
(no logs available)
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)